H04W12/50

RANDOM MEDIA ACCESS CONTROL ADDRESS WITH FAST RECONNECTION MECHANISM
20230043950 · 2023-02-09 · ·

The present invention provides a wireless communication method of an access point. The wireless communication method comprises the steps of: establishing a cache table comprising a plurality of reference MAC and corresponding PMKs and reference PMKIDs; receiving an association request from a station; reading a MAC address of the station and a PMKID from the association request; if the MAC address of the station and the PMKID do not match items of the cache table, performing a calculation on the PMKID to obtain an original PMKID; determining if the original PMKID matches any one of the reference PMKIDs within the cache table; and if the original PMKID matches one reference PMKID within the cache table, determining that the reference MAC recorded in the cache table and the MAC address belong to the same station.

DIGITAL PHOTO FRAME, A SYSTEM THEREOF, AND A METHOD THEREOF
20230044090 · 2023-02-09 ·

The present disclosure provides a method for generating a code by a digital photo frame. The method including receiving, from the terminal and by a controller of the digital photo frame, a request for connecting the terminal to the digital photo frame; and generating, by the controller of the digital photo frame, a code according to authorization information of the digital photo frame, wherein a server issuing the authorization information of the digital photo frame does not generate the code. The present disclosure also provides a method for transmitting photos or videos between a terminal and a digital photo frame, the method comprising: receiving a request for transmitting the photos or the videos; determining whether the digital photo frame and the terminal use a same WLAN; and instructing the terminal or the digital photo frame to transmit the photos or the videos via the WLAN.

WIRELESS CONNECTION SYSTEM, INFORMATION TERMINAL, DISPLAY DEVICE, AND WIRELESS CONNECTION METHOD
20230009449 · 2023-01-12 ·

A wireless connection system executes wireless connection between an information terminal of a user and a display device installed in environment. In a case where an information terminal existing in the vicinity thereof is detected, the display device displays device ID information related to authentication for wireless connection with the detected information terminal (or an image obtained by coding it) on a display screen. The information terminal confirms whether the device ID information read from the display screen match device ID information of an own device or not, and establishes wireless connection using an authentication ID for wireless connection with the display device after matching is confirmed. The display device establishes wireless connection with the information terminal using an authentication ID.

LOCATION-INDEPENDENT PROGRAMMING DATA PLANE FOR PACKET PROCESSING
20230041806 · 2023-02-09 · ·

Techniques are disclosed for efficient communications over a network path between an accelerator of a smart network interface card (smartNIC) and a remote programming data plane of a remote device. In one example, the accelerator receives an instruction to register a pairing between the accelerator and the remote programming data plane, and then stores registration data indicating the pairing. The accelerator then receives from the remote programming data plane a second instruction associated with processing one or more flows. The accelerator then stores instruction data corresponding to the second instruction based on confirming the registered pairing with the remote programming data plane. Subsequently, the accelerator receives a data packet and processes the data packet in accordance with the stored instruction data. In some embodiments, the accelerator may transmit packets to the pair remote programming data plane, for example, requesting further instructions associated with processing a packet.

ELECTRONIC DEVICE AND METHOD OF USING PAIRWISE MASTER KEY

An electronic device may include at least one wireless communication module configured to transmit and receive a wireless signal; a memory electrically configured to store instructions; and at least one processor operatively connected to the at least one wireless communication module and the memory, the at least one processor being configured to execute the instructions to: based on an attempt to connect to an access point (AP), identify whether a pairwise master key security association (PMKSA) for the AP, generated based on to a previous connection of the electronic device to the AP, is present, and based on identifying that the PMKSA is present, determine whether to reuse a pairwise master key (PMK) stored in the PMKSA by comparing a lifetime of the PMK with a margin time in which a use of the PMK is guaranteed.

Multi-link wireless communications connections

A method includes establishing a multi-link security association between a transmitter upper Media Access Control (MAC) logic entity of a transmitter and a receiver upper MAC logic entity of a receiver. The transmitter includes one or more transmitter links. The receiver includes one or more receiver links.

Multi-link wireless communications connections

A method includes establishing a multi-link security association between a transmitter upper Media Access Control (MAC) logic entity of a transmitter and a receiver upper MAC logic entity of a receiver. The transmitter includes one or more transmitter links. The receiver includes one or more receiver links.

Method for reading meters for fluids
11592316 · 2023-02-28 · ·

A system, referred to as a reading system, used in an automated metering management system in the context of a fluid-distribution service comprising a plurality of fluid meters is disclosed. The first communication module in accordance with a wireless communication standard is used by each fluid meter and a second communication module suitable for communicating by powerline with a data concentrator via a first network, said data concentrator communicating with a management entity of the automated metering management system via a second network. Instancing an application emulating a virtual fluid meter able to communicate directly with the data concentrator for each fluid meter in the plurality, and, for each fluid meter in the plurality, the corresponding virtual fluid meter takes responsibility for retransmitting information representing a fluid-consumption reading, said information having been supplied to the reading system by said fluid meter to the management entity via the data concentrator.

Method for reading meters for fluids
11592316 · 2023-02-28 · ·

A system, referred to as a reading system, used in an automated metering management system in the context of a fluid-distribution service comprising a plurality of fluid meters is disclosed. The first communication module in accordance with a wireless communication standard is used by each fluid meter and a second communication module suitable for communicating by powerline with a data concentrator via a first network, said data concentrator communicating with a management entity of the automated metering management system via a second network. Instancing an application emulating a virtual fluid meter able to communicate directly with the data concentrator for each fluid meter in the plurality, and, for each fluid meter in the plurality, the corresponding virtual fluid meter takes responsibility for retransmitting information representing a fluid-consumption reading, said information having been supplied to the reading system by said fluid meter to the management entity via the data concentrator.

CONTROLLING ACCESS TO PROTECTED FUNCTIONALITY OF A HOST DEVICE USING A WIRELESS DEVICE
20180007558 · 2018-01-04 · ·

A wearable device can establish a verified session with a host device (e.g., by establishing that the wearable device is present in the vicinity of the host device and is currently being worn). The existence of such a verified session can be used to control user access to sensitive information that may be stored in or otherwise accessible to a host device. For example, the host device and/or application programs executing thereon can be configured to restrict a user's ability to invoke program functionality that accesses sensitive information based on whether a verified session with a wearable device is currently in progress.