-
公开(公告)号:US20240244448A1
公开(公告)日:2024-07-18
申请号:US18096481
申请日:2023-01-12
Applicant: QUALCOMM Incorporated
Inventor: Thanigaivel Nagendran , Vignesh Elumalai , Nitin Barattwaj Prabakar , Yashwanth Jayaprakash , Antony Sivi Siddharth Thomas
IPC: H04W16/28 , H04B17/318 , H04W24/10
CPC classification number: H04W16/28 , H04B17/318 , H04W24/10
Abstract: This disclosure provides methods, components, devices and systems for steering a wireless device in a multi-AP environment based on target AP information. The target AP information includes signal strength data for a particular region in which the wireless device is located. The coverage areas of the multiple APs are each segmented into regions and a unique identifier is assigned to each region. When the wireless device is first eligible for steering in a particular region, it generates a measurement report which is associated with that region in a measurement map. When the wireless device is subsequently eligible for steering in that region, instead of generating another measurement report, the previously collected target AP information in the measurement map is used to steer the wireless device to a target AP.
-
公开(公告)号:US20210282016A1
公开(公告)日:2021-09-09
申请号:US16812047
申请日:2020-03-06
Applicant: QUALCOMM Incorporated
Inventor: Manikandan Mohan , Yashwanth Jayaprakash , Subramaninan Anantharaman
Abstract: Wireless communications systems may detect network attacks based on analysis of medium access control (MAC) addresses and origination locations associated with incoming authentication requests. For example, a DoS attack may be detected by determining (e.g., via a database) whether a particular MAC address is associated with multiple authentication request messages without proceeding to an authentication step. According to the described techniques, a system (e.g., an AP, controller/cloud, etc.) may maintain a database of authentication requests and associated MAC addresses, timestamps, and location information. As such, upon reception of an authentication request corresponding to a MAC address, the MAC address may be compared to the database. If the delta (e.g., timestamp difference) between authentication requests from a same MAC address is less than a threshold, the system may detect a potential DoS attack by a client associated with the MAC address and the MAC address may be removed from the AP.
-