Abstract:
In accordance with one aspect, presented herein is a method to encrypt beacon device telemetry broadcast packets while respecting the low power and low processing requirements inherent to wireless beacon devices and various other challenges which such an encryption scheme brings. In accordance with another aspect, a methodology is provided through which the network can identify if an unauthorized connection is being established with a beacon device and thereby prevent potential beacon device tampering.
Abstract:
In one embodiment, a device obtains radio frequency (RF) characteristic data for a wireless client. The device inputs the RF characteristic data for the wireless client to a deep learning-based encoder. The device learns a latent space representation of the RF characteristic data from the encoder. The device uses the learned latent space representation as a unique signature to identify the wireless client in a wireless network.
Abstract:
A wireless access point uses broadcast Service Set Identifiers (SSIDs) to advertise services available to a user device within range of the access point. The access point receives information about a first service available from a first service provider, and generates a first SSID associated with the first service. The access point receives information about a second service available from a second service provider, and generates a second SSID associated with the second service. The access point broadcasts the first SSID during a first period of time in a wireless network, and broadcasts the second SSID in the wireless network during a second period of time that is non-overlapping with the first period of time.
Abstract:
Steering for location-assisted inter-set roaming, between different networks of the same or different types is provided by: identifying a first station connected to a first wireless network in an environment; identifying a direction of travel of the first station; identifying a second wireless network and a third wireless network as candidate roaming targets, based on the second wireless network and the third wireless network neighboring the first wireless network in the direction of travel, wherein the second wireless network and the third wireless network are different from the first wireless network; modifying a neighbor list for the first station to include an Access Point (AP) included in the third wireless network based on environmental knowledge; removing APs included in the second wireless network based on the environmental knowledge; and transmitting the neighbor list to the first station.
Abstract:
An emergency caller location system uses enterprise Wireless Local Area Network (WLAN) location systems to provide more accurate location information on an emergency caller. A cellular telephone modifies its WLAN identifier, such as its Media Access Control (MAC) address, in response to a user initiating an emergency call. The MAC address is modified based on an identifier known to the cellular network, such as the phone number, subscriber name, International Mobile Equipment Identifier (IMEI), International Mobile Subscriber Identifier (IMSI), and/or International Circuit Card Identifier (ICCID). The cellular telephone may additionally modify the probe timer of the WLAN interface to enhance the ability of the WLAN location system to determine the location of the device.
Abstract:
An emergency caller location system uses enterprise Wireless Local Area Network (WLAN) location systems to provide more accurate location information on an emergency caller. A cellular telephone modifies its WLAN identifier, such as its Media Access Control (MAC) address, in response to a user initiating an emergency call. The MAC address is modified based on an identifier known to the cellular network, such as the phone number, subscriber name, International Mobile Equipment Identifier (IMEI), International Mobile Subscriber Identifier (IMSI), and/or International Circuit Card Identifier (ICCID). The cellular telephone may additionally modify the probe timer of the WLAN interface to enhance the ability of the WLAN location system to determine the location of the device.
Abstract:
A method includes generating, at a server, an event policy for controlling one or more wireless beacon devices in a network; detecting an event in the network; determining whether the event matches the event policy; when the event matches the event policy, generating programming information for configuring the one or more wireless beacon devices; and forwarding the programming information via one or more wireless access points to the one or more wireless beacon devices for configuring the one or more wireless beacon devices based on the programming information.
Abstract:
A method includes generating, at a server, an event policy for controlling one or more wireless beacon devices in a network; detecting an event in the network; determining whether the event matches the event policy; when the event matches the event policy, generating programming information for configuring the one or more wireless beacon devices; and forwarding the programming information via one or more wireless access points to the one or more wireless beacon devices for configuring the one or more wireless beacon devices based on the programming information.
Abstract:
In one embodiment, a method includes creating at a network device, a user session with an interactive digital sign, generating a session tag for the user session, wherein the session tag is configured for input at a mobile device, transmitting the session tag to the interactive digital sign, and continuing at the network device, the user session with the mobile device. An apparatus and logic are also disclosed herein.
Abstract:
Techniques are presented to enable a network element in a network to receive a request from an application on a device, the request being encapsulated in a packet that includes a header that contains a physical layer identifier of the device to which the application does not have access. The physical layer identifier at the network element may be obtained. A response may be sent to the application on the device, the response containing at least one of the physical layer identifier of the device and location information of the device.