Patent application number | Description | Published |
20090003319 | Network interface apparatus - An intelligent network interface apparatus to provide always-on, always-connected processing for call signals is described. One embodiment of the apparatus includes logic to selectively handle incoming call signals even when a computer to which the apparatus is operably connected is unavailable (e.g., asleep). The apparatus may also include logic for selectively waking up a sleeping computer upon determining that incoming call signals indicate that a communication with the computer is desired. The incoming call signals may be associated with a voice over internet protocol (VoIP) communication. | 01-01-2009 |
20090016247 | FAST TRANSITIONING RESOURCE NEGOTIATION - Embodiments of apparatuses, articles, methods, and systems for fast transitioning resource negotiation in wireless networks are generally described herein. Other embodiments may be described and claimed. | 01-15-2009 |
20090052393 | METHOD FOR SECURE TRANSFER OF DATA TO A WIRELESS DEVICE FOR ENABLING MULTI-NETWORK ROAMING - Disclosed is a method for secure transfer of data for enabling roaming of the wireless device between a plurality of wireless networks. The wireless device data from an authentication server via a first channel. The authentication server sends the request for the data to an information server using a second channel. The information server generates the data bases on parameters of the wireless device and provides the data to the wireless device through the authentication server. The secure transfer of data to the wireless device enables roaming of the wireless device in a plurality of wireless networks. | 02-26-2009 |
20090061799 | DEVICE, SYSTEM, AND METHOD OF POWER SAVING IN WIRELESS NETWORK - Device, system, and method of power saving in wireless network. For example, a method includes: receiving from a wireless access point a wireless communication signal indicting wireless network load information represented as a value of a parameter in a Basic Service Set load information element, wherein the parameter comprises a parameter selected from a group consisting of: a station count parameter, a channel utilization ratio parameter, an available admission control parameter, a network congestion parameter, a transmission power suggestion parameter, a reception power suggestion parameter, and a late adaptation suggestion parameter; and modifying a power consumption mode of a communication unit of a wireless communication device based on said parameter. | 03-05-2009 |
20090086660 | POWER SAVING OPERATION OF ALWAYS-CONNECTED WIRELESS ROAMING - Methods and apparatuses enable maintaining wireless connectivity while the wireless client device is in a power save mode. The system includes a host operating system (OS) that handles wireless connections while the device is executing in normal operation, and an embedded agent that handles the wireless connections when the device switches to power saving operation and the host OS switches to a sleep or standby state. The system detects a change in the power save mode and triggers an exchange of session context information between the host OS and the embedded agent (from the host OS to the embedded agent when the system enters the power save mode, and from the embedded agent to the host OS when the system returns to normal operation from the power save mode). The system also triggers the switching of management consistent with the passing of session context information. | 04-02-2009 |
20090185536 | Apparatus, system and method capable of pre-allocating and communicating IP address information during wireless communication - An embodiment of the present invention provides an apparatus, comprising a wireless station (STA) operable to communicate with a first access point (AP) and roam to a next access point (AP), wherein said next AP pre-caches a number of IP addresses from a backend Dynamic Host Configuration Protocol (DHCP) server; and wherein said wireless station (STA) gathers IP layer address and sub-network information from said next Access Point (AP) during roaming. | 07-23-2009 |
20090215404 | DEVICE, SYSTEM, AND METHOD OF WIRELESS NETWORK SELECTION AND HANDOVER - Device, system, and method of wireless network selection and handover. For example, a multi-transceiver wireless device includes: at least first and second co-located wireless transceivers; one or more firmware modules to handle network selection of at least one of the first and second wireless transceivers based on one or more commands received from one or more drivers when the multi-transceiver wireless device is in full-power mode; and a manageability engine to handle network selection of at least one of the first and second wireless transceivers when the multi-transceiver wireless device is in reduced-power mode. | 08-27-2009 |
20090327694 | Methods and apparatus for providing integrity protection for management and control traffic of wireless communication networks - Embodiments of the present invention provide a method comprising transmitting, by a communication node, an information element (IE), the IE including a feature field indicating whether the communication node operates in accordance with an integrity protection protocol specifically for management frames, and the IE further including an enforcement field that advertises whether the integrity protection protocol for management and control frames is mandatory, and generating, by the communication node, a pairwise transient key (PTK), the PTK including a first plurality of keys and a pairwise integrity key (PIK), wherein the first plurality of keys are configured to protect an integrity of data frames transmitted by the communication node and the PIK is configured to protect an integrity of management frames transmitted by the communication node, wherein management frames are dedicated to management traffic and wherein the first plurality of keys and the PIK are different keys. Other embodiments may be described and claimed. | 12-31-2009 |
20100071032 | Techniques for Authenticated Posture Reporting and Associated Enforcement of Network Access - Architectures and techniques that allow a firmware agent to operate as a tamper-resistant agent on a host platform that may be used as a trusted policy enforcement point (PEP) on the host platform to enforce policies even when the host operating system is compromised. The PEP may be used to open access control and/or remediation channels on the host platform. The firmware agent may also act as a local policy decision point (PDP) on the host platform in accordance with an authorized enterprise PDP entity by providing policies if a host trust agent is non-responsive and may function as a passive agent when the host trust agent is functional. | 03-18-2010 |
20100107224 | Techniques for authenticated posture reporting and associated enforcement of network access - Architectures and techniques that allow a firmware agent to operate as a tamper-resistant agent on a host platform that may be used as a trusted policy enforcement point (PEP) on the host platform to enforce policies even when the host operating system is compromised. The PEP may be used to open access control and/or remediation channels on the host platform. The firmware agent may also act as a local policy decision point (PDP) on the host platform in accordance with an authorized enterprise PDP entity by providing policies if a host trust agent is non-responsive and may function as a passive agent when the host trust agent is functional. | 04-29-2010 |
20100153763 | Method and apparatus to modulate multi-core usage for energy efficient platform operations - An energy efficient multi-core computing device and method are disclosed. According to embodiments of the invention, the processing load on a multi-core computing device may be monitored to determine whether one or more cores on the device may be dynamically shut down. Conversely, any core that is shut down may be dynamically powered up if the processing load on the device increases. Embodiments of the present invention therefore provide significant energy savings on multi-core platforms by minimizing the active cores on the device without affecting the device's processing capabilities. | 06-17-2010 |
20100161959 | METHOD AND APPARATUS FOR EXTENDING TRANSPORT LAYER SECURITY PROTOCOL FOR POWER-EFFICIENT WIRELESS SECURITY PROCESSING - Embodiments of the invention relate to apparatus, system and method for security extensions to the IETF Transport Layer Protocol (TLS) and IPsec standards that enable wireless devices to perform power-efficient and streamlined security packet processing. Embodiments of the invention enable a processor to use its existing cryptographic processing engines (e.g., AES-CCM) to perform TLS and IPsec security processing. Packets processed for WLAN and TLS security are processed pipelined, eliminating the multi-loop processing that currently exists, and decreases power consumed to process each packet. In addition, the host/chipset complex is woken up after all security processing has been done in the WNIC. | 06-24-2010 |
20100161980 | APPARATUS AND METHOD OF SECURITY IDENTITY CHECKER - A method and apparatus that establish secure communications between two stations. The apparatus includes a low power communication processor and a host processor in a sleep mode. The low power communication processor receives a protocol message to initiate a communication. The protocol message includes an encrypted cryptographic identity token and triggers a wake-up event in order to wake up the host processor according to a result of identity a freshness checks performed by the low power communication processor. | 06-24-2010 |
20100165897 | Reduced Power State Network Processing - A network interface controller of a computing device is disclosed that processes network packets without waking the computing device. The network interface controller may detect that a secured connection with an access point has been disconnected and may reconnect to the access point without waking the computing device. The network interface controller may support roaming between access points without waking the computing device. The network interface controller may also support establishing, re-establishing and maintaining a secured session with another computing device while a computing device is in a sleep state. | 07-01-2010 |
20100241854 | Method and apparatus for low-power ap-assisted fast wireless roaming using optimized neighbor graphs - An embodiment of the present invention provides a method, comprising using optimized neighbor graphs for low-power access point assisted fast wireless roaming by a wireless station (STA) operating in a wireless network. | 09-23-2010 |
20110019556 | Quality of service packet processing without explicit control negotiations - Apparatuses, methods, systems, and computer program products to process QoS packets of wireless traffic without explicit control negotiations are disclosed. An embodiment may comprise a mobile computing device with wireless communications capabilities. The mobile computing device may be a client that associates or connects with an access point or communicates another client device, such as a peripheral device with wireless capabilities. The mobile computing device may monitor wireless packet traffic being transmitted from the mobile computing device. For example, the mobile computing device may monitor the packets being transmitted from a video streaming application to the peripheral device, which may comprise an LCD monitor that has wireless communications capabilities. The mobile computing device may mark the packets of the video stream as QoS packets even though the video streaming application may not do so, and place the marked packets in a QoS queue for priority processing. | 01-27-2011 |
20110040969 | METHOD AND SYSTEM FOR DYNAMIC SERVICE NEGOTIATION WITH A UNIFORM SECURITY CONTROL PLANE IN A WIRELESS NETWORK - A method and system to facilitate dynamic service negotiation with a uniform and persistent security control plane in a wireless network. In one embodiment of the invention, a node in the wireless network determines each capability provided by each of one or more virtual nodes that it supports and transmits a frame that has information of each capability provided by each of the one or more virtual nodes. By combining all the information of each capability provided by each of the one or more virtual nodes into one frame, the node reduces the volume of management traffic required and increases the available usable channel bandwidth in one embodiment of the invention. | 02-17-2011 |
20110103232 | APPARATUS, SYSTEM AND METHOD OF PRIORITIZING A MANAGEMENT FRAME OF A WIRELESS NETWORK - A method and apparatus to enable configuring of a management frame priority and security type. The method and the apparatus may set a priority level and a transmission data rate of a management frame. The apparatus includes a memory including a priority queue for each management frame and a transmitter to transmit said management frame according to the priority queue of said frame. | 05-05-2011 |
20110110222 | QUALITY OF SERVICE RESOURCE NEGOTIATION - Embodiments of apparatuses, articles, methods, and systems for negotiating quality of service resources in wireless networks are generally described herein. Other embodiments may be described and claimed. | 05-12-2011 |
20110145421 | METHOD AND APPARATUS FOR AUTONOMOUS PEER DISCOVERY AND ENHANCING LINK RELIABILITY FOR WIRELESS PEER DIRECT LINKS - A system, method and device may include triggering a direct connection setup based on one or more communication parameters communicated with a mobile device via a fixed device. It may be determined whether the mobile device is a peer. The quality of service with the mobile device via the fixed device may be compared with quality of service of a mobile device via a direct link. A channel for the direct link may be selected and information may be sent to the mobile device over the direct link via the channel. | 06-16-2011 |
20110154035 | Method and apparatus for client-driven profile update in an enterprise wireless network - A technique for allowing client-driven profile updates in a wireless network uses a shared character password and a shared image that is known by both a client device and a network server. In some embodiments, a random character table is generated by a client device and is used, along with the shared character password and shared image, to calculate a one-time password (OTP). The OTP is then used to both encrypt and sign a new security profile to be delivered to the network server in a profile update request. The server may then generate the same OTP using information within the request and the shared character password and shared image. The new profile may then be decrypted and validated within the server. | 06-23-2011 |
20120084411 | METHOD, APPARATUS AND SYSTEM FOR MAINTAINING MOBILITY RESISTANT IP TUNNELS USING A MOBILE ROUTER - A method, apparatus and system enable a mobile device to roam while maintaining a persistent IP tunnel. Specifically, a mobile router may be utilized to enable a mobile device to maintain a persistent IP tunnel while the device roams. In one embodiment, the mobile device is a virtual host and the mobile router is a virtual mobile router. | 04-05-2012 |
20120087344 | QUALITY OF SERVICE RESOURCE NEGOTIATION - Embodiments of apparatuses, articles, methods, and systems for negotiating quality of service resources in wireless networks are generally described herein. Other embodiments may be described and claimed. | 04-12-2012 |
20120102212 | METHOD, APPARATUS AND SYSTEM FOR PLATFORM IDENTITY BINDING IN A NETWORK NODE - Embodiments of apparatuses, articles, methods, and systems for binding various platform identities for a policy negotiation are generally described herein. Other embodiments may be described and claimed. | 04-26-2012 |
20120226825 | NETWORK ACCESS CONTROL FOR MANY-CORE SYSTEMS - In a processor based system comprising a plurality of logical machines, selecting a logical machine of the system to serve as a host; the host communicating with a policy decision point (PDP) of a network to provision a data channel interconnecting the processor based system and the network and to provision a logical data channel interconnecting each logical machine of the system to the network. | 09-06-2012 |
20120272079 | POWER SAVING OPERATION OF ALWAYS-CONNECTED WIRELESS ROAMING - Methods and apparatuses enable maintaining wireless connectivity while the wireless client device is in a power save mode. The system includes a host operating system (OS) that handles wireless connections while the device is executing in normal operation, and an embedded agent that handles the wireless connections when the device switches to power saving operation and the host OS switches to a sleep or standby state. The system detects a change in the power save mode and triggers an exchange of session context information between the host OS and the embedded agent (from the host OS to the embedded agent when the system enters the power save mode, and from the embedded agent to the host OS when the system returns to normal operation from the power save mode). The system also triggers the switching of management consistent with the passing of session context information. | 10-25-2012 |
20130311809 | REDUCED POWER STATE NETWORK PROCESSING - Technologies for reduced power network processing include a main processor, a low-power co-processor, and a network interface controller. The network interface controller receives one or more network packets while the computing device is in a sleep state, filters the one or more network packets to identify network packets to be handled by the low-power co-processor without waking the main processor from the sleep state, and wakes the low-power co-processor, without waking the main processor, to handle at least one network packet of the identified network packets to be handled by the low-power co-processor. | 11-21-2013 |
20140337913 | METHOD, APPARATUS, AND SYSTEM FOR ISOLATING A TEMPORARY PARTITION ON A HOST - A method, apparatus and system enable a temporary partition on a host to be isolated. More specifically, a temporary partition may be initialized in a partitioned host, assigned its own security policy and given the necessary resources to complete a task. Thereafter, the temporary partition may be dismantled. Since the temporary partition is isolated from the remaining partitions on the host, the temporary partition may be allowed to run a “weaker” security policy than the rest of the partitions because the isolation of the temporary partition ensures that the security of the remaining partitions may remain uncompromised. | 11-13-2014 |