H04W84/12

Communications Method and Communications Apparatus
20230050803 · 2023-02-16 ·

This application provides a communications method and a communications apparatus. A first station in a first multi-link device sends first information to a second multi-link device, where the first information is used to indicate a frequency at which a station in a power saving mode in the first multi-link device receives a beacon frame. In this way, the second multi-link device may learn about, based on the first information, a frequency at which a station in the first multi-link device receives a beacon frame, thereby helping the second multi-link device effectively manage a cache service of each station in the first multi-link device and manage a data buffer space.

INFORMATION PROCESSING METHOD AND APPARATUS BASED ON FACE RECOGNITION, STORAGE MEDIUM, AND TERMINAL
20230050957 · 2023-02-16 ·

A method includes: in response to detecting a communication connection between the electronic device and the user equipment, obtaining a user instruction transmitted to the user equipment, the user instruction including at least one preset parameter for setting an interface feature of a target logical interface on the electronic device. The target logical interface is used for verifying an identity of a user. The method includes generating the target logical interface, by setting the interface feature based on the user instruction on the electronic device; obtaining verification information of a user; collecting a face image of the current user through the target logical interface; and verifying an identity of the current user based on the face image and the verification information.

PRIORITIZED SERVICE PERIOD FOR TIME SENSITIVE TRANSMISSIONS

Embodiments of the present invention provide A TID-based RTWT SP that can be configured for either trigger-based transmission or EDCA-based transmission for time sensitive traffic to reduce the chance of contention/collision on time sensitive traffic caused by non-time sensitive traffic using an EDCA mechanism. This can also reduce the chance of contention on time sensitive traffic when both trigger-based transmission and EDCA-based-transmission are used in the same TID-based RTWT SP. The AP MLD can dynamically adjust the schedule of TID-SPs for ether trigger-based or EDCA-based transmission and announce the new schedule of the TID-SPs according to the requirements of time sensitive traffic and/or traffic load condition, and can prioritize time sensitive transmission to meet QoS requirements.

NETWORK MANAGEMENT ACTIONS BASED ON ACCESS POINT CLASSIFICATION
20230053044 · 2023-02-16 ·

An example system includes access point (AP) devices configured to provide a wireless network at a site; and a network management system that stores network data received from the AP devices, the network data collected by the AP devices or client devices associated with the wireless network, and one or more processors configured to: receive a time series of SLE metrics based on the network data, determine, based on the time series, whether a network event has occurred, in response to a determination that a network event has occurred, determine a root cause for the network event, and in response to a determination that the root cause of the network event is associated with an AP device, determine a classification of the AP device, and determine a network management action for the AP device based on the network event and the classification of the AP device.

METHOD AND SYSTEM OF AUTOMATICALLY CONNECTING A WIRELESS DEVICE TO NETWORK VIA PHONE
20230050968 · 2023-02-16 ·

A method includes responsive to a device sensing a phone being adjacent to the device, triggering the device and the phone in a preliminary communication mode; periodically broadcasting by the device in the preliminary communication mode a broadcast message (P2) with a unique identification; detecting a strength of the broadcast message (P2) by the phone; responsive to detecting the strength of the broadcast message (P2) greater than a first threshold (T1), establishing a restricted wireless connection between the phone and the device; transmitting packages between the device and the phone via the restricted wireless connection; detecting strengths of the packages; and responsive to detecting strengths of the packages respectively greater than the first threshold (T1) and a second threshold (T2), establishing a complete wireless communication between the device and the phone so as to connect the device to the network via the phone.

Method and Apparatus of Handling Coordinated Association in a Wireless Network with Multiple Access Points

A method and an apparatus for handling coordinated association in a wireless network with multiple access points are described. A method comprises receiving network parameters, determining a plurality of AP-STA associations, and sending the plurality of associations to the STAs. An apparatus includes controlling, managing, and optimization modules implementing the method of handling coordinated association in a wireless network.

THIRD PARTY CERTIFICATE MANAGEMENT FOR NATIVE AND THIRD PARTY MOBILE APPS
20230049095 · 2023-02-16 · ·

Systems and methods are disclosed herein for real-time digital authentication. According to some embodiments, a certification authentication method includes receiving a list of third party root certificates from a remote server, the list of third party root certificates including at least one association between a program configured to run on the computing apparatus and a public key for authenticating communication between the program and an associated server of the program. The method may also include authenticating the list of third party root certificates. The method may also include initiating a communication between the computing apparatus and the associated server and authenticating the communication with the associated server using the public key. Furthermore, the method may also include loading the program onto the one or more memories during a bootstrapping process in response to determining that the communication with the associated server is authentic.

WiFi STATION AND ASSOCIATED PASSIVE SCANNING METHOD
20230049701 · 2023-02-16 ·

The application discloses a WiFi station and an associated passive scanning method, including receiving an RF signal within a specific frequency band to generate a baseband signal; detecting whether the baseband signal includes a first preamble corresponding to a first channel and generating a first detecting result accordingly; detecting whether the baseband signal includes a second preamble corresponding to a second channel and generating a second detecting result accordingly; according to the first detecting result and the second detecting result, determining to use a center frequency of the first channel or a center frequency of the second channel to perform frequency shifting on the baseband signal, to generate the frequency-shifted baseband signal.

Advanced dual band virtual concurrent for WiFi

Example methods of advanced DBVC for WiFi relate to one or more of avoiding beacon collisions between a repeater and a root AP, optimizing traffic flows based on buffers queued within hardware, optimizing TCP throughput through DPI and prioritization of TCP ACK packets, or optimizing transmissions through a trigger-based mechanism. An example method may include receiving a transmission from a root AP. The method may include obtaining a next root AP TBTT of a next beacon to be sent by the root AP from the transmission. The method may include determining an amount of time to delay a next repeater TBTT of a next beacon to be sent by a repeater to avoid conflict between the next root AP TBTT and the next repeater TBTT. The method may include delaying the next repeater TBTT based on the determined amount of time.

Terminal verification method, and AP device, terminal and system

Disclosed are a terminal verification method, an AP device, a terminal and a system, wherein the AP device is an encrypted AP device. The method comprises: receiving a connection request sent by a first terminal, wherein the connection request comprises identification information of the first terminal; querying an authorization list according to the identification information of the first terminal, wherein the authorization list includes identification information of terminals located within a preset password-free range; and returning an authorization response to the first terminal when the authorization list includes the identification information of the first terminal, wherein the authorization response is used for instructing the first terminal to establish a network connection with the AP device. The AP device does not need to verify a first terminal located within a password-free range, thereby reducing the number of first terminals that require identity verification within a WLAN coverage range, reducing the resource consumption of the identity verification for the AP device, and enabling the use of a WLAN to be more convenient.