CN115701006A - Enhancements to WI-FI aware device with respect to protected data path setup - Google Patents

Enhancements to WI-FI aware device with respect to protected data path setup Download PDF

Info

Publication number
CN115701006A
CN115701006A CN202111590481.2A CN202111590481A CN115701006A CN 115701006 A CN115701006 A CN 115701006A CN 202111590481 A CN202111590481 A CN 202111590481A CN 115701006 A CN115701006 A CN 115701006A
Authority
CN
China
Prior art keywords
key
encrypted
ptk
request frame
response frame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111590481.2A
Other languages
Chinese (zh)
Inventor
E·奥伦
I·皮尔
E·齐
P-K·黄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Publication of CN115701006A publication Critical patent/CN115701006A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

Described herein are techniques related to enhancements to WI-FI aware devices with respect to securing data path establishment. In one embodiment, an apparatus includes a processing circuit coupled to a memory. The processing circuitry is configured to: generating a request frame to a Neighbor Awareness Network (NAN) data path (NDP), wherein the request frame is encrypted using a first key; authentication information to be used for establishing a second key, which is different from the first key, is contained in the request frame; and transmitting the request frame to the second device. Other embodiments may be claimed and described.

Description

Enhancements to WI-FI aware device with respect to protected data path setup
Technical Field
The present disclosure relates generally to systems and methods for wireless communication, and more particularly to enhancements to WI-FI aware devices with respect to protecting data path establishment.
Background
Wireless devices are becoming widely popular. Recently, a transition has occurred in technologies that support direct wireless communication between wireless devices. Neighbor Aware Network (NAN) may refer to a Wi-Fi specification for device and/or service discovery and peer-to-peer communication. The NAN may describe the formation of device clusters of devices that are physically close to each other (referred to as NAN clusters).
Neighbor Aware Networks (NANs) (e.g., wi-Fi aware) represent a power efficient, scalable point-to-point technology for wireless networking. The NAN enables various devices to discover peers and/or services in their vicinity and establish data paths with the peers.
Drawings
The features and advantages of the present disclosure will become apparent from the following detailed description, which, when taken in conjunction with the drawings, illustrate by way of example the features of the present disclosure; and, wherein:
fig. 1 is a network diagram illustrating an example network environment for NAN data path establishment in accordance with one or more example embodiments of the present disclosure.
Fig. 2 depicts an illustrative schematic diagram for NAN data path setup protection in accordance with one or more example embodiments of the present disclosure.
Fig. 3A shows a flowchart of an illustrative process for illustrative NAN data path setup protection in accordance with one or more example embodiments of the present disclosure.
Fig. 3B shows a flowchart of another illustrative process for illustrative NAN data path establishment protection in accordance with one or more example embodiments of the present disclosure.
Fig. 4 illustrates a functional diagram of an exemplary communication station that may be suitable for use as a user equipment in accordance with one or more example embodiments of the present disclosure.
Fig. 5 illustrates a block diagram of an example machine on which any of one or more techniques (e.g., methods) may be performed in accordance with one or more example embodiments of the present disclosure.
Fig. 6 is a block diagram of a radio architecture according to some examples.
Fig. 7 illustrates example front end module circuitry for use in the radio architecture of fig. 6, in accordance with one or more example embodiments of the present disclosure.
Fig. 8 illustrates an example radio IC circuit for use in the radio architecture of fig. 6, according to one or more example embodiments of the present disclosure.
Fig. 9 shows example baseband processing circuitry for use in the radio architecture of fig. 6, according to one or more example embodiments of the present disclosure.
Detailed Description
The following description and the drawings sufficiently illustrate specific embodiments to enable those skilled in the art to practice them. Other embodiments may include structural, logical, electrical, process, algorithmic, and other changes. Portions and features of some embodiments may be included in or substituted for those of others. Embodiments set forth in the claims encompass all available equivalents of those claims.
Neighbor Aware Networks (NANs) are a specification for Wi-Fi devices to enable device/service discovery in their vicinity. The main idea is that NAN clusters are formed for neighboring devices, and devices in the same NAN cluster will follow the same wake-up time schedule (called discovery window) to facilitate cluster formation and enable low power consumption operation. In a Discovery Window (DW), a device may send NAN service discovery frames to subscribe to or publish services that the device is interested in or provides. Once a device finds a service of interest, it can establish a data path with a peer. Prior to the R3 version of the specification, as part of the data path setup, a security key (referred to as a Pairwise Transient Key (PTK)) may be generated, assuming that a Pairwise Master Key (PMK) is available to both peers through OOB (out-of-band) information (e.g., application data or information from the cloud). In Wi-Fi aware R4, one of the goals is to establish a pairing protocol, generating a PMK without the need for such OOB information, by using the latest and most advanced security protocols, such as pre-association security negotiation (PASN), a mechanism that establishes security associations and allows management frame protection before association. The protocol may be used in an unauthenticated mode or an authenticated mode (e.g., SAE (simultaneous peer authentication) tunnel) to derive a Pairwise Master Key (PMK) and a Pairwise Transient Key (PTK). The PMK is generated prior to any other NAN operations that may require security, including data path establishment (in addition to other operations such as discovery or ranging).
Although the PMK and PTK are generated using PASN, the data path establishment itself is not defined as Protected and The Keys (PTKs) are only generated at the establishment stage. This creates a problematic situation: a third party can listen to the data path setup frames and can find out what is NDL (NAN data link) (which contains the availability slots where two devices are scheduled on one channel) and can easily create a denial of service attack (DOS).
Similarly, even when using randomized Media Access Control (MAC) addresses, an attacker may use the content of NAN Data Path (DP) action frames to track NAN devices (e.g., based on NAN device capability attribute content), thereby defeating privacy aspects. The current data path establishment procedure is not protected. As described above, since NDP (NAN data path) and NDL (NAN data link) setups are unprotected, a third party may listen and find NDL availability slots. This third party may block the channel on a particular time slot and may create a denial of service attack by doing so.
The present disclosure describes a method of protecting data path establishment using TK (transient key) generated during PASN protocol.
Example embodiments of the present disclosure relate to systems, methods, and devices for enhancements to Wi-Fi aware devices with respect to protecting data path establishment.
In one embodiment, a device may facilitate protecting NDP and NDL setup frames using PMKs, PTKs, and other keys derived prior to NDP setup by the PASN protocol. During this setup, the two peers can exchange new keys for the data path setup without generating keys from the PMK, since the setup itself is secure.
The proposed enhancements will make the data path setup more protected, which better addresses the privacy issue, an attacker cannot listen to the data path frames and create a DOS attack due to listening to the availability (NDL) slots.
The foregoing description is for the purpose of illustration and is not meant to be limiting. Many other examples, configurations, processes, algorithms, etc., are possible, some of which are described in more detail below. Example embodiments will now be described with reference to the accompanying drawings.
Fig. 1 is a network diagram illustrating an example network environment for NAN data path establishment in accordance with some example embodiments of the present disclosure. Wireless network 100 may include one or more user devices 120 (e.g., 122, 124, 126, or 128) that may communicate according to a wireless standard (e.g., an IEEE 802.11 communication standard). The user device 120 may be a mobile device that is non-stationary (e.g., does not have a fixed location), or may be a stationary device.
In some embodiments, the user device 120 may include one or more computer systems similar to the functional diagram of fig. 4 and/or the example machine/system of fig. 5.
One or more illustrative user devices 120 may be operated by one or more users 110. It should be noted that any addressable unit may be a Station (STA). A STA may exhibit a number of different characteristics, each of which shapes its functionality. For example, a single addressable unit may be a portable STA, a quality of service (QoS) STA, a dependent STA, and a hidden STA at the same time. One or more of the illustrative user devices 120 may be STAs. One or more illustrative user devices 120 may operate as a Personal Basic Service Set (PBSS) control point/access point (PCP/AP). User device 120 (e.g., 122, 124, 126, or 128) may include any suitable processor-driven device,including but not limited to mobile devices or non-mobile devices (e.g., stationary devices). For example, the user device 120 may include a user device (UE), a Station (STA), an Access Point (AP), a software-enabled AP (SoftAP), a Personal Computer (PC), a wearable wireless device (e.g., a bracelet, watch, glasses, ring, etc.), a desktop computer, a mobile computer, a laptop computer, an ultrabook, etc TM <xnotran> , , , , , , (IoT) , , PDA , PDA , , , (, PDA ), , , , , , , , PCS , PDA , GPS , DVB , , , "carry small live large" (CSLL) , (UMD), PC (UMPC), (MID), "origami" , (DCC) , , , , A/V , (STB), (BD) , BD , (DVD) , (HD) DVD , DVD , HD DVD , (PVR), HD , , , , , , , , (PMP), (DVC), , , , , , , , </xnotran> Digital cameras (DSCs), media players, smart phones, televisions, music players, and the like. Other devices, including smart devices (e.g., lights, climate controls, automotive components, household components, appliances, etc.) may also be included in the list.
As used herein, the term "internet of things (IoT) device" is used to refer to any object (e.g., appliance, sensor, etc.) that has an addressable interface (e.g., an Internet Protocol (IP) address, a bluetooth Identifier (ID), a Near Field Communication (NFC) ID, etc.) and is capable of sending information to one or more other devices over a wired or wireless connection. IoT devices may have passive communication interfaces (e.g., quick Response (QR) codes, radio Frequency Identification (RFID) tags, NFC tags, etc.) or active communication interfaces (e.g., modems, transceivers, transmitter-receivers, etc.). IoT devices may have a particular set of attributes (e.g., device status or state (e.g., whether the IoT device is on or off, idle or active, available for task execution or busy, etc.), cooling or heating functions, environmental monitoring or recording functions, lighting functions, sound emitting functions, etc.), which may be embedded in and/or controlled/monitored by a Central Processing Unit (CPU), microprocessor, ASIC, etc., and configured to connect to an IoT network (e.g., a local ad-hoc network or the internet). For example, ioT devices may include, but are not limited to, refrigerators, toasters, ovens, microwaves, freezers, dishwashers, hand tools, washers, dryers, furnaces, air conditioners, thermostats, televisions, light fixtures, dust collectors, sprinklers, electricity meters, gas meters, and the like, so long as the devices are equipped with an addressable communication interface for communicating with the IoT network. IoT devices may also include cell phones, desktop computers, laptop computers, tablet computers, personal Digital Assistants (PDAs), and the like. Thus, an IoT network may be composed of "legacy" internet-accessible devices (e.g., laptop or desktop computers, cell phones, etc.) as well as devices that typically do not have internet connectivity (e.g., dishwashers, etc.).
The user equipment 120 may also comprise a mesh station in a mesh network, for example, according to one or more IEEE 802.11 standards and/or 3GPP standards.
Any of the user devices 120 (e.g., user devices 122, 124, 126, 128) may be configured to communicate with each other wirelessly or wiredly via one or more communication networks 130. The user devices 120 may also communicate with each other peer-to-peer or directly, with or without an Access Point (AP). Any communication network 130 may include, but is not limited to, any of a combination of different types of suitable communication networks, such as a broadcast network, a wired network, a public network (e.g., the internet), a proprietary network, a wireless network, a cellular network, or any other suitable proprietary and/or public network. Further, any communication network 130 may have any suitable communication range associated therewith, and may include, for example, a global network (e.g., the internet), a Metropolitan Area Network (MAN), a Wide Area Network (WAN), a Local Area Network (LAN), or a Personal Area Network (PAN). Further, any communication network 130 may include any type of medium that can carry network traffic, including but not limited to coaxial cable, twisted pair, fiber optic, hybrid Fiber Coaxial (HFC) medium, microwave terrestrial transceiver, radio frequency communication medium, white space communication medium, ultra-high frequency communication medium, satellite communication medium, or any combination thereof.
Any user equipment 120 (e.g., user equipment 122, 124, 126, 128) may include one or more communication antennas. The one or more communication antennas may be any suitable type of antenna corresponding to a communication protocol used by user device 120 (e.g., user devices 122, 124, 126, 128). Some non-limiting examples of suitable communication antennas include Wi-Fi antennas, institute of Electrical and Electronics Engineers (IEEE) 802.11 standards series compliant antennas, directional antennas, non-directional antennas, dipole antennas, folded dipole antennas, patch antennas, multiple-input multiple-output (MIMO) antennas, omnidirectional antennas, quasi-omnidirectional antennas, and the like. One or more communication antennas can be communicatively coupled to the radio to transmit signals (e.g., communication signals) to user device 120 and/or receive signals from user device 120.
Any user device 120 (e.g., user devices 124, 126, 128) may be configured to perform directional transmission and/or directional reception in connection with wireless communication in a wireless network. Any user equipment 120 (e.g., user equipment 124, 126, 128) may be configured to perform such directional transmission and/or reception using a set of multiple antenna arrays (e.g., DMG antenna arrays, etc.). Each of the plurality of antenna arrays may be used for transmission and/or reception in a particular respective direction or range of directions. Any user device 120 (e.g., user devices 124, 126, 128) can be configured to perform any given directional transmission to one or more defined transmit sectors. Any user device 120 (e.g., user devices 124, 126, 128) may be configured to perform any given directional reception from one or more defined reception sectors.
MIMO beamforming in wireless networks may be implemented using RF beamforming and/or digital beamforming. In some embodiments, in performing a given MIMO transmission, the user equipment 120 may be configured to perform MIMO beamforming using all or a subset of its one or more communication antennas.
Any user device 120 (e.g., user devices 122, 124, 126, 128) may include any suitable radio and/or transceiver for transmitting and/or receiving Radio Frequency (RF) signals in a bandwidth and/or channel corresponding to a communication protocol used by any user devices 120 to communicate with each other. The radio may include hardware and/or software for modulating and/or demodulating communication signals according to a pre-established transmission protocol. The radio may also have hardware and/or software instructions to communicate via one or more Wi-Fi and/or Wi-Fi direct protocols standardized by the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard. In some example embodiments, the radio in cooperation with the communications antenna may be configured to communicate via 2.4GHz channels (e.g., 802.11b, 802.11g, 802.11n, 802.11 ax), 5GHz channels (e.g., 802.11n, 802.11ac, 802.11 ax), or 60GHz channels (e.g., 802.11ad, 802.11 ay), 800MHz channels (e.g., 802.11 ah). The communication antenna may operate at 28GHz and 40 GHz. It should be appreciated that this list of communication channels according to some 802.11 standards is only a partial list, and other 802.11 standards (e.g., next generation Wi-Fi or other standards) may be used. In some embodiments, non-Wi-Fi protocols may be used for communication between devices, such as bluetooth, dedicated Short Range Communication (DSRC), ultra High Frequency (UHF) (e.g., IEEE 802.11af, IEEE 802.22), white band frequencies (e.g., white space), or other packetized radio communication. The radio may include any known receiver and baseband suitable for communicating via a communication protocol. The radio components may also include a Low Noise Amplifier (LNA), additional signal amplifiers, analog-to-digital (a/D) converters, one or more buffers, and a digital baseband.
In one embodiment, and referring to fig. 1, NAN data path establishment protection may be facilitated between one or more user devices 120.
Fig. 2 depicts an illustrative schematic diagram for NAN data path setup protection in accordance with one or more example embodiments of the present disclosure.
In fig. 2, two devices are depicted: a first device having two layers, a publisher and a NAN publisher; a second device having two layers, a NAN subscriber and a subscriber. The two devices may be one or more of the user devices 120 shown in fig. 1. In one or more embodiments, the NAN data path establishment protection procedure to establish the secure and protected NDP is as follows:
phase i.
Phase ii.
The PASN process may derive a PMK and a corresponding PTK, where the PTK includes a Transient Key (TK) and an optional Key Derivation Key (KDK) (which may be used to derive additional keys).
The subscriber may request to establish a NAN data path with the publisher and provide PMK, PTK and other optional information needed for protected NDP setup.
The NAN subscriber may construct a NAN data path request and encrypt and authenticate the NDP request frame using the PTK. This can be done by either:
-encrypting a frame using TK at the Medium Access Control (MAC) level; or alternatively
Encrypt and authenticate the relevant frame data using a key derived from the KDK (which is part of the PTK).
The NAN subscriber may include information in the NAN data path request that can be used to establish a new PMK identifier (PMKID), PTK, etc. once the NDP establishment is successful.
The NAN subscriber may send an encrypted and authenticated NDP request to the NAN publisher.
Upon receiving the encrypted and authenticated NDP request, the NAN publisher may issue a NAN data path indication to the publisher that includes information that may be used to establish a new PMKID, PTK, etc.
Phase v. Assuming the request is granted, the publisher provides the PMK, PTK, and other optional information needed to continue the protected NDP setup.
The NAN publisher may construct a NAN data path response and use the PTK to encrypt and authenticate the NDP response frame. This can be done by either:
-encrypting a frame using TK at MAC level; or
-encrypting and authenticating the relevant frame data using a key derived from the KDK (which is part of the PTK).
The NAN publisher may include information in the NAN data path response that can be used to establish a new PMKID, PTK, etc. once the NDP establishment is successful.
The NAN publisher may send an encrypted and authenticated NDP response to the NAN subscriber.
Since the NAN data path setup may also include a NAN data link, a third NDL acknowledgement frame may be needed, in which case it will also be encrypted and protected.
Upon receiving the encrypted and authenticated NDP response, a data validation indication is issued to the publisher with information that can be used to create a new PMKID, PTK, etc.
The motivation for deriving the new PMKID is to deal with the following: PMKID may be used in unprotected NAN action frames so that an attacker can track the corresponding NAN device even with randomized MAC addresses.
Deriving the new PMKID may be accomplished, for example, by:
option i. The subscriber can select the random SEED PMKID-SEED and then generate a new PMKID using the following formula. The subscriber will include the random SEED PMKID-SEED in the NDP request frame so the publisher can also derive a new PMKID.
PMKID=L(HMAC-Hash(PMK,“NAN PMKID GENERATE”||PMKID-SEED),0,128)
Option ii. The subscriber can select the random SEED PMKID-SEED-S and include it in the NDP request frame. The publisher may select the random SEED PMKID-SEED-P and include it in the NDP response frame. After the NDP is successfully established, both the subscriber and the publisher can derive a new PMKID using the following formula:
PMKID=L(HMAC-Hash(PMK,“NAN PMKID GENERATE”||
PMKID-SEED-S||PMKID-SEED-P),0,128)
the motivation for deriving new PTKs was: avoiding the continued use of transient keys after NDP termination, e.g., for ranging or other management frames. While the derivation of a new PTK may be done using PASN, it may alternatively be done as part of the NDP setup.
Fig. 3A shows a flowchart of an illustrative process 300a for NAN data path setup protection in accordance with one or more example embodiments of the present disclosure.
At block 302a, a device (e.g., user device 120 of fig. 1) may generate a request frame to a Neighbor Aware Network (NAN) data path (NDP), wherein the request frame is encrypted using a first key. In some embodiments, the first key comprises a Pairwise Transient Key (PTK). In some of these embodiments, the PTK includes a Transient Key (TK), and the request frame is encrypted by encrypting the request frame at a Media Access Control (MAC) level using the TK. In some of these embodiments, the PTK includes a Key Derivation Key (KDK), and the request frame is encrypted by encrypting data of the request frame using a key derived from the KDK.
In block 304a, the device may include authentication information in the request frame to be used to establish a second key, the second key being different from the first key.
At block 306a, the device may send a request frame to the second device.
Thereafter, the device may establish a protected NDP with the second device based on the authentication information.
Fig. 3B shows a flow diagram of another illustrative process 300B for NAN data path setup protection in accordance with one or more example embodiments of the present disclosure.
At block 302b, a device (e.g., user device 120 of fig. 1) may generate a response frame to a request for a Neighbor Aware Network (NAN) data path (NDP), wherein the response frame is encrypted using a first key. In some embodiments, the first key comprises a Pairwise Transient Key (PTK). In some of these embodiments, the PTK includes a Transient Key (TK), and the response frame is encrypted by encrypting the response frame at a Media Access Control (MAC) level using the TK. In some of these embodiments, the PTK includes a Key Derivation Key (KDK), and the response frame is encrypted by encrypting data of the response frame using a key derived from the KDK.
In block 304b, the device may include authentication information in the response frame to be used to establish a second key, the second key being different from the first key.
At block 306b, the device may send a response frame to the second device.
Thereafter, the device may establish a protected NDP with the second device based on the authentication information.
Fig. 4 illustrates a functional diagram of an example communication station 400 in accordance with one or more example embodiments of the present disclosure. In one embodiment, fig. 4 illustrates a functional block diagram of a communication station that may be suitable for use as user equipment 120 (fig. 1) in accordance with some embodiments. Communication station 400 may also be suitable for use as a handheld device, mobile device, cellular telephone, smartphone, tablet computer, netbook, wireless terminal, laptop computer, wearable computer device, femtocell, high Data Rate (HDR) subscriber station, access point, access terminal, or other Personal Communication System (PCS) device.
Communication station 400 may include communication circuitry 402 and a transceiver 410 for transmitting signals to and receiving signals from other communication stations using one or more antennas 401. The communication circuitry 402 may include circuitry that may operate physical layer (PHY) communication and/or Medium Access Control (MAC) communication for controlling access to a wireless medium, and/or any other communication layers for transmitting and receiving signals. Communication station 400 may also include processing circuitry 406 and memory 408 arranged to perform the operations described herein. In some embodiments, the communication circuitry 402 and the processing circuitry 406 may be configured to perform the operations detailed in the above figures, diagrams, and flows.
According to some embodiments, the communication circuitry 402 may be arranged to: contend for the wireless medium, and configure the frame or packet for communication over the wireless medium. The communication circuit 402 may be arranged to transmit and receive signals. The communication circuit 402 may also include circuits for modulation/demodulation, up/down conversion, filtering, amplification, and so forth. In some embodiments, processing circuitry 406 of communication station 400 may include one or more processors. In other embodiments, two or more antennas 401 may be coupled to the communication circuit 402 arranged to transmit and receive signals. The memory 408 may store information for configuring the processing circuitry 406 to perform operations for configuring and transmitting message frames and performing various operations described herein. Memory 408 can comprise any type of memory, including non-transitory memory, for storing information in a form readable by a machine (e.g., a computer). For example, memory 408 may include a computer-readable storage device, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk storage media, an optical storage media, a flash memory device, and other storage devices and media.
In some embodiments, the communication station 400 may be part of a portable wireless communication device, such as a Personal Digital Assistant (PDA), a laptop or portable computer with wireless communication capability, a web tablet, a wireless telephone, a smart phone, a wireless headset, a pager, an instant messaging device, a digital camera, an access point, a television, a medical device (e.g., a heart rate monitor, a blood pressure monitor, etc.), a wearable computer device, or another device that may receive and/or transmit information wirelessly.
In some embodiments, communication station 400 may include one or more antennas 401. Antenna 401 may include one or more directional or omnidirectional antennas, including, for example, dipole antennas, monopole antennas, patch antennas, loop antennas, microstrip antennas or other types of antennas suitable for transmission of RF signals. In some embodiments, instead of two or more antennas, a single antenna with multiple apertures may be used. In these embodiments, each aperture may be considered a separate antenna. In some multiple-input multiple-output (MIMO) embodiments, antennas may be effectively separated for spatial diversity and different channel characteristics that may result between each antenna and the antennas of the transmitting station.
In some embodiments, the communication station 400 may include one or more of a keypad, a display, a non-volatile memory port, multiple antennas, a graphics processor, an application processor, speakers, and other mobile device elements. The display may be an LCD screen including a touch screen.
Although communication station 400 is illustrated as having several separate functional elements, two or more of the functional elements may be combined and may be implemented by combinations of software-configured elements, such as processing elements including Digital Signal Processors (DSPs), and/or other hardware elements. For example, some elements may comprise one or more microprocessors, DSPs, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), radio Frequency Integrated Circuits (RFICs), and combinations of various hardware and logic circuitry for performing at least the functions described herein. In some embodiments, the functional elements of communication station 400 may refer to one or more processes operating on one or more processing elements.
Some embodiments may be implemented in one or a combination of hardware, firmware, and software. Other embodiments may also be implemented as instructions stored on a computer-readable storage device, which may be read and executed by at least one processor to perform the operations described herein. A computer-readable storage device may include any non-transitory memory mechanism for storing information in a form readable by a machine (e.g., a computer). For example, a computer-readable storage device may include Read Only Memory (ROM), random Access Memory (RAM), magnetic disk storage media, optical storage media, flash memory devices, and other storage devices and media. In some embodiments, communication station 400 may include one or more processors and may be configured with instructions stored on a computer-readable storage device.
Fig. 5 illustrates a block diagram of an example of a machine 500 or system on which any one or more of the techniques (e.g., methods) discussed herein may be implemented. In other embodiments, the machine 500 may operate as a standalone device or may be connected (e.g., networked) to other machines. In a networked deployment, the machine 500 may operate in the role of a server machine, a client machine, or both, in server-client network environments. In an example, the machine 500 may operate in a peer-to-peer (P2P) (or other distributed) network environment as a peer machine. The machine 500 may be a Personal Computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a mobile telephone, a wearable computer device, a network appliance, a network router, switch or bridge, or any machine capable of executing instructions (sequential or otherwise) that specify actions to be taken by that machine (e.g., a base station). Further, while only a single machine is illustrated, the term "machine" shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein, such as cloud computing, software as a service (SaaS), or other computer cluster configurations.
Examples as described herein may include, or may operate on, logic or multiple components, modules, or mechanisms. A module is a tangible entity (e.g., hardware) capable, when operated, of performing specified operations. The modules include hardware. In an example, the hardware may be specifically configured to perform certain operations (e.g., hardwired). In another example, the hardware may include configurable execution units (e.g., transistors, circuits, etc.) and a computer readable medium containing instructions that configure the execution units to perform specific operations when operated. Configuration may occur under the direction of an execution unit or loading mechanism. Thus, when the device is operating, the execution unit is communicatively coupled to the computer-readable medium. In this example, an execution unit may be a member of more than one module. For example, in operation, an execution unit may be configured by a first set of instructions to implement a first module at one point in time and reconfigured by a second set of instructions to implement a second module at a second point in time.
The machine (e.g., computer system) 500 may include a hardware processor 502 (e.g., a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a hardware processor core, or any combination thereof), a main memory 504 and a static memory 506, some or all of which may communicate with each other via an interconnection link (e.g., bus) 508. The machine 500 may also include a power management device 532, a graphical display device 510, an alphanumeric input device 512 (e.g., a keyboard), and a User Interface (UI) navigation device 514 (e.g., a mouse). In an example, the graphical display device 510, the alphanumeric input device 512, and the UI navigation device 514 may be touch screen displays. The machine 500 may additionally include a storage device (i.e., drive unit) 516, a signal generation device 518 (e.g., a speaker), a network interface device/transceiver 520 coupled to an antenna 530, and one or more sensors 528 (e.g., a Global Positioning System (GPS) sensor, compass, accelerometer, or other sensor). The machine 500 may include an output controller 534, such as a serial (e.g., universal Serial Bus (USB)) connection, a parallel connection, or other wired or wireless (e.g., infrared (IR), near Field Communication (NFC), etc.) connection to communicate with or control one or more peripheral devices (e.g., a printer, card reader, etc.). Operations according to one or more example embodiments of the present disclosure may be performed by a baseband processor. The baseband processor may be configured to generate a corresponding baseband signal. The baseband processor may also include physical layer (PHY) and media access control layer (MAC) circuitry, and may also interface with the hardware processor 502 for generating and processing baseband signals and controlling the operation of the main memory 504 and/or the storage device 516. The baseband processor may be provided on a single radio card, a single chip, or an Integrated Circuit (IC).
The storage device 516 may include a machine-readable medium 522 on which is stored one or more sets of data structures or instructions 524 (e.g., software) embodying or used by any one or more of the techniques or functions described herein. The instructions 524 may also reside, completely or at least partially, within the main memory 504, within static memory 506, or within the hardware processor 502 during execution thereof by the machine 500. In an example, one or any combination of the hardware processor 502, the main memory 504, the static memory 506, or the storage device 516 may constitute machine-readable media.
While the machine-readable medium 522 is shown to be a single medium, the term "machine-readable medium" can include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) configured to store the one or more instructions 524.
Various embodiments may be implemented in whole or in part in software and/or firmware. The software and/or firmware may take the form of instructions contained in or on a non-transitory computer-readable storage medium. Those instructions may then be read and executed by one or more processors to enable performance of the operations described herein. The instructions may be in any suitable form, such as but not limited to source code, compiled code, interpreted code, executable code, static code, dynamic code, and the like. Such computer-readable media may include any tangible, non-transitory media for storing information in one or more computer-readable forms, such as, but not limited to, read-only memory (ROM); random Access Memory (RAM); a magnetic disk storage medium; an optical storage medium; flash memory and the like
The term "machine-readable medium" may include any medium that is capable of storing, encoding or carrying instructions for execution by the machine 500 and that cause the machine 500 to perform any one or more of the techniques of this disclosure, or that is capable of storing, encoding or carrying data structures used by or associated with such instructions. Non-limiting examples of machine-readable media may include solid-state memory, as well as optical and magnetic media. In an example, a mass machine-readable medium includes a machine-readable medium having a plurality of particles with a static mass. Specific examples of a mass machine-readable medium may include non-volatile memory, such as semiconductor memory devices (e.g., electrically programmable read-only memory (EPROM) or electrically erasable programmable read-only memory (EEPROM)) and flash memory devices); magnetic disks, such as internal hard disks and removable disks; a magneto-optical disk; CD-ROM and DVD-ROM disks.
The instructions 524 may further be transmitted or received over a communication network 526 using a transmission medium via the network interface device/transceiver 520 using any of a number of transmission protocols (e.g., frame relay, internet Protocol (IP), transmission Control Protocol (TCP), user Datagram Protocol (UDP), hypertext transfer protocol (HTTP), etc.). Example communication networks can include a Local Area Network (LAN), a Wide Area Network (WAN), a packet data network (e.g., the internet), a mobile telephone network (e.g., a cellular network), a Plain Old Telephone (POTS) network, a wireless data network (e.g., referred to as
Figure BDA0003428893780000141
Of the Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards, referred to as
Figure BDA0003428893780000142
IEEE 802.16 family of standards), IEEE 802.15.4 family of standards, and point-to-point (P2P) networks, etc. In an example, the network interface device/transceiver 520 may include one or more physical jacks (e.g., ethernet jacks, coaxial jacks, or telephone jacks) or one or more antennas to connect to the communications network 526. In an example, the network interface device/transceiver 520 may include multiple antennas to wirelessly communicate using at least one of single-input multiple-output (SIMO), multiple-input multiple-output (MIMO), or multiple-input single-output (MISO) techniques. The term "transmission medium" shall be taken to include any intangible medium that is capable of storing, encoding or carrying instructions for execution by the machine 500, and includes digital or analog communications signals or other intangible medium to facilitate communication of such software.
The operations and processes described and illustrated above may be performed or carried out in any suitable order as desired in various implementations. Further, in some implementations, at least a portion of the operations may be performed in parallel. Moreover, in some implementations, fewer or more operations than are described may be performed.
Fig. 6 is a block diagram of radio architectures 105A, 105B according to some embodiments, which may be implemented in any of the example STAs 120 of fig. 1. The radio architectures 105A, 105B may include radio Front End Module (FEM) circuits 604a-B, radio IC circuits 606a-B, and baseband processing circuits 608a-B. The illustrated radio architectures 105A, 105B include Wireless Local Area Network (WLAN) functionality and Bluetooth (BT) functionality, but the embodiments are not so limited. In this disclosure, "WLAN" and "Wi-Fi" may be used interchangeably.
The FEM circuits 604a-b may include a WLAN or Wi-Fi FEM circuit 604a and a Bluetooth (BT) FEM circuit 604b. The WLAN FEM circuitry 604a may include a receive signal path including circuitry configured to operate on WLAN RF signals received from the one or more antennas 601, amplify the received signals, and provide an amplified version of the received signals to the WLAN radio IC circuitry 606a for further processing. BT FEM circuitry 604b may include a receive signal path, which may include circuitry configured to operate on BT RF signals received from one or more antennas 601, amplify the receive signal, and provide an amplified version of the receive signal to BT radio IC circuitry 606b for further processing. FEM circuitry 604a may also include a transmit signal path, which may include circuitry configured to amplify WLAN signals provided by radio IC circuitry 606a for wireless transmission through one or more antennas 601. Further, FEM circuitry 604b may also include a transmit signal path, which may include circuitry configured to amplify BT signals provided by radio IC circuitry 606b for wireless transmission through one or more antennas. In the embodiment of fig. 6, although FEM 604a and FEM 604b are shown as being different from each other, embodiments are not limited thereto and include within their scope: a FEM (not shown) is used that contains transmit and/or receive paths for both WLAN and BT signals, or one or more FEM circuits are used, where at least some of the FEM circuits share transmit and/or receive signal paths for both WLAN and BT signals.
The radio IC circuits 606a-b as shown may include a WLAN radio IC circuit 606a and a BT radio IC circuit 606b. The WLAN radio IC circuitry 606a may include a receive signal path that may include circuitry to down-convert WLAN RF signals received from the FEM circuitry 604a and provide baseband signals to WLAN baseband processing circuitry 608 a. The BT radio IC circuitry 606b may also include a receive signal path, which may include circuitry to down-convert BT RF signals received from the FEM circuitry 604b and provide baseband signals to the BT baseband processing circuitry 608b. The WLAN radio IC circuitry 606a may also include a transmit signal path that may include circuitry to up-convert WLAN baseband signals provided by the WLAN baseband processing circuitry 608a and provide WLAN RF output signals to the FEM circuitry 604a for subsequent wireless transmission through the one or more antennas 601. BT radio IC circuitry 606b may also include a transmit signal path that may include circuitry to up-convert BT baseband signals provided by BT baseband processing circuitry 608b and provide BT RF output signals to FEM circuitry 604b for subsequent wireless transmission via one or more antennas 601. In the embodiment of fig. 6, although radio IC circuits 606a and 606b are shown as being different from each other, embodiments are not so limited and are included within their scope; a radio IC circuit (not shown) containing transmit and/or receive signal paths for both WLAN and BT signals is used, or one or more radio IC circuits are used, wherein at least some of the radio IC circuits share transmit and/or receive signal paths for both WLAN and BT signals.
The baseband processing circuits 608a-b may include a WLAN baseband processing circuit 608a and a BT baseband processing circuit 608b. The WLAN baseband processing circuit 608a may include a memory, such as a set of RAM arrays of fast fourier transform or inverse fast fourier transform blocks (not shown) of the WLAN baseband processing circuit 608 a. Each of the WLAN baseband circuitry 608a and BT baseband circuitry 608b may also include one or more processors and control logic to process signals received from a corresponding WLAN or BT receive signal path of the radio IC circuitry 606a-b and also to generate corresponding WLAN or BT baseband signals for a transmit signal path of the radio IC circuitry 606 a-b. Each of the baseband processing circuits 608a and 608b may also include physical layer (PHY) and media access control layer (MAC) circuits and may also interface with devices for generating and processing baseband signals and controlling operation of the radio IC circuits 606 a-b.
Still referring to fig. 6, in accordance with the illustrated embodiment, the WLAN-BT coexistence circuit 613 may include logic to provide an interface between the WLAN baseband circuit 608a and the BT baseband circuit 608b to implement use cases requiring WLAN and BT coexistence. Further, a switch 603 may be provided between the WLAN FEM circuitry 604a and the BT FEM circuitry 604b to allow switching between WLAN and BT radios according to application needs. Further, although antenna 601 is depicted as being connected to WLAN FEM circuit 604a and BT FEM circuit 604b, respectively, embodiments include within their scope: one or more antennas are shared between the WLAN and BT FEMs, or more than one antenna is provided connected to each FEM 604a or 604b.
In some embodiments, front-end module circuits 604a-b, radio IC circuits 606a-b, and baseband processing circuits 608a-b may be provided on a single radio card (e.g., radio card 602). In some other embodiments, one or more antennas 601, FEM circuits 604a-b, and radio IC circuits 606a-b may be provided on a single radio card. In some other embodiments, the radio IC circuits 606a-b and the baseband processing circuits 608a-b may be provided on a single chip or Integrated Circuit (IC) (e.g., IC 612).
In some embodiments, radio card 602 may comprise a WLAN radio card and may be configured for Wi-Fi communication, although the scope of the embodiments is not limited in this respect. In some of these embodiments, the radio architectures 105A, 105B may be configured to receive and transmit Orthogonal Frequency Division Multiplexed (OFDM) or Orthogonal Frequency Division Multiple Access (OFDMA) communication signals over a multicarrier communication channel. An OFDM or OFDMA signal may include a plurality of orthogonal subcarriers.
In some of these multicarrier embodiments, the radio architectures 105A, 105B may be part of a Wi-Fi communication Station (STA) (e.g., a wireless Access Point (AP), a base station, or a mobile device that includes a Wi-Fi device). In some of these embodiments, the radio architecture 105A, 105B may be configured to: signals may be transmitted and received in accordance with particular communication standards and/or protocols, such as any of the Institute of Electrical and Electronics Engineers (IEEE) standards, including the 802.11n-2009, IEEE 802.11-2012, IEEE 802.11-2016, 802.11n-2009, 802.11ac, 802.11ah, 802.11ad, 802.11ay, and/or 802.11ax standards, and/or the specifications set forth for WLANs, although the scope of the embodiments is not limited in this respect. The radio architectures 105A, 105B may also be adapted to transmit and/or receive communications in accordance with other techniques and standards.
In some embodiments, the radio architectures 105A, 105B may be configured for high-efficiency Wi-Fi (HEW) communications according to the IEEE 802.11ax standard. In these embodiments, the radio architectures 105A, 105B may be configured to communicate in accordance with OFDMA techniques, although the scope of the embodiments is not limited in this respect.
In some other embodiments, the radio architecture 105A, 105B may be configured to: transmit signals using one or more other modulation techniques and receive signals transmitted using one or more other modulation techniques such as spread spectrum modulation (e.g., direct sequence code division multiple access (DS-CDMA) and/or frequency hopping code division multiple access (FH-CDMA)), time Division Multiplexing (TDM) modulation, and/or Frequency Division Multiplexing (FDM) modulation, although the scope of the embodiments is not limited in this respect.
In some embodiments, as further shown in fig. 6, the BT baseband circuit 608b may conform to a Bluetooth (BT) connection standard, such as bluetooth, bluetooth 8.0, or bluetooth 6.0, or any other generation of the bluetooth standard.
In some embodiments, the radio architecture 105A, 105B may include other radio cards, for example cellular radio cards configured for cellular (e.g., 5GPP such as LTE, LTE-Advanced, or 7G communications).
In some IEEE 802.11 embodiments, radio architectures 105A, 105B may be configured for communication over various channel bandwidths, including bandwidths having center frequencies of approximately 900MHz, 2.4GHz, 5GHz, and bandwidths of approximately 2MHz, 4MHz, 5MHz, 5.5MHz, 6MHz, 8MHz, 10MHz, 20MHz, 40MHz, 80MHz (continuous bandwidth), or 80+80MHz (160 MHz) (discontinuous bandwidth). In some embodiments, a 920MHz channel bandwidth may be used. However, the scope of the embodiments is not limited to the above center frequencies.
Fig. 7 illustrates a WLAN FEM circuit 604a according to some embodiments. While the example of fig. 7 is described in connection with WLAN FEM circuitry 604a, the example of fig. 7 may be described in connection with example BT FEM circuitry 604b (fig. 6), other circuit configurations may also be suitable.
In some embodiments, FEM circuitry 604a may include TX/RX switch 702 to switch between transmit mode and receive mode operation. FEM circuit 604a may include a receive signal path and a transmit signal path. The receive signal path of FEM circuitry 604a may include a Low Noise Amplifier (LNA) 706 to amplify received RF signal 703 and provide an amplified received RF signal 707 as an output (e.g., to radio IC circuitry 606a-b (fig. 6)). The transmit signal path of circuit 604a may include: a Power Amplifier (PA) to amplify an input RF signal 709 (e.g., provided by radio IC circuits 606 a-b) and one or more filters 712, such as Band Pass Filters (BPFs), low Pass Filters (LPFs), or other types of filters, to generate an RF signal 715 for subsequent transmission via an example duplexer 714 (e.g., via one or more antennas 601 (fig. 6)).
In some dual-mode embodiments for Wi-Fi communications, FEM circuitry 604a may be configured to operate in the 2.4GHz spectrum or the 5GHz spectrum. In these embodiments, the receive signal path of FEM circuit 604a may include a receive signal path duplexer 704 to separate signals from each spectrum and provide a separate LNA 706 for each spectrum, as shown. In these embodiments, the transmit signal path of FEM circuit 604a may also include a power amplifier 710 and filter 712 (e.g., a BPF, LPF, or another type of filter) for each spectrum and a transmit signal path duplexer 704 to provide signals of one of the different spectrums onto a single transmit path for subsequent transmission through one or more antennas 601 (fig. 6). In some embodiments, BT communications may utilize a 2.4GHz signal path and may utilize the same FEM circuitry 604a as is used for WLAN communications.
Fig. 8 illustrates a radio IC circuit 606a according to some embodiments. The radio IC circuit 606a is one example of a circuit that may be suitable for use as the WLAN or BT radio IC circuits 606a/606b (fig. 6), but other circuit configurations may also be suitable. Alternatively, the example of fig. 8 may be described in connection with the example BT radio IC circuit 606b.
In some embodiments, radio IC circuitry 606a may include a receive signal path and a transmit signal path. The receive signal path of radio IC circuit 606a may include at least a mixer circuit 802 (e.g., a down-conversion mixer circuit), an amplifier circuit 806, and a filter circuit 808. The transmit signal path of the radio IC circuit 606a may include at least a filter circuit 812 and a mixer circuit 814 (e.g., an up-conversion mixer circuit). The radio IC circuit 606a may also include a synthesizer circuit 804 for synthesizing the frequency 805 for use by the mixer circuit 802 and the mixer circuit 814. According to some embodiments, mixer circuits 802 and/or 814 may each be configured to provide direct conversion functionality. The latter type of circuit presents a simpler architecture than standard superheterodyne mixer circuits and any flicker noise brought by it can be mitigated by using OFDM modulation, for example. Fig. 8 shows only a simplified version of the radio IC circuitry, and may include (although not shown) embodiments in which each of the depicted circuits may include more than one component. For example, the mixer circuits 814 may each include one or more mixers and the filter circuits 808 and/or 812 may each include one or more filters, e.g., one or more BPFs and/or LPFs, as desired by the application. For example, when the mixer circuits are of the direct conversion type, they may each comprise two or more mixers.
In some embodiments, the mixer circuit 802 may be configured to: the RF signals 707 received from the FEM circuits 604a-b (fig. 6) are downconverted based on the composite frequency 805 provided by the synthesizer circuit 804. The amplifier circuit 806 may be configured to amplify the downconverted signal, and the filter circuit 808 may include an LPF configured to: unwanted signals are removed from the down-converted signal to generate an output baseband signal 807. The output baseband signal 807 may be provided to baseband processing circuits 608a-b (fig. 6) for further processing. In some embodiments, the output baseband signal 807 may be a zero frequency baseband signal, although this is not required. In some embodiments, mixer circuit 802 may comprise a passive mixer, although the scope of the embodiments is not limited in this respect.
In some embodiments, mixer circuit 814 may be configured to: an input baseband signal 811 is upconverted based on a synthesized frequency 805 provided by a synthesizer circuit 804 to generate an RF output signal 709 for the FEM circuits 604 a-b. The baseband signal 811 may be provided by the baseband processing circuits 608a-b and may be filtered by the filter circuit 812. Filter circuitry 812 may include an LPF or BPF, although the scope of the embodiments is not limited in this respect.
In some embodiments, mixer circuit 802 and mixer circuit 814 may each comprise two or more mixers and may be arranged for quadrature down-conversion and/or up-conversion, respectively, with the aid of synthesizer 804. In some embodiments, mixer circuit 802 and mixer circuit 814 may each include two or more mixers, each configured for image rejection (e.g., hartley image rejection). In some embodiments, mixer circuit 802 and mixer circuit 814 may be arranged for direct down-conversion and/or direct up-conversion, respectively. In some embodiments, mixer circuit 802 and mixer circuit 814 may be configured for superheterodyne operation, but this is not required.
According to one embodiment, the mixer circuit 802 may include: quadrature passive mixers (e.g., for in-phase (I) and quadrature-phase (Q) paths). In such embodiments, the RF input signal 707 from fig. 8 may be down-converted to provide I and Q baseband output signals to be sent to the baseband processor.
The quadrature passive mixers may be driven by zero and ninety degree time-varying LO switching signals provided by quadrature circuits that may be configured to receive an LO frequency (fLO), such as LO frequency 805 of synthesizer 804 (fig. 8), from a local oscillator or synthesizer. In some embodiments, the LO frequency may be the carrier frequency, while in other embodiments the LO frequency may be a fraction of the carrier frequency (e.g., half the carrier frequency, one third of the carrier frequency). In some embodiments, zero and ninety degree time-varying switching signals may be generated by a synthesizer, although the scope of the embodiments is not limited in this respect.
In some embodiments, the LO signals may differ in duty cycle (percentage of a cycle in which the LO signal is high) and/or offset (difference between the start of the cycle). In some embodiments, the LO signal may have a duty cycle of 85% and an offset of 80%. In some embodiments, each branch of the mixer circuit (e.g., in-phase (I) and quadrature-phase (Q) paths) may operate at an 80% duty cycle, which may result in a significant reduction in power consumption.
RF input signal 707 (fig. 7) may comprise a balanced signal, although the scope of the embodiments is not limited in this respect. The I and Q baseband output signals may be provided to a low noise amplifier (e.g., amplifier circuit 806 (fig. 8)) or filter circuit 808 (fig. 8).
In some embodiments, output baseband signal 807 and input baseband signal 811 may be analog baseband signals, although the scope of the embodiments is not limited in this respect. In some alternative embodiments, the output baseband signal 807 and the input baseband signal 811 may be digital baseband signals. In these alternative embodiments, the radio IC circuitry may include analog-to-digital converter (ADC) and digital-to-analog converter (DAC) circuitry.
In some dual-mode embodiments, separate radio IC circuitry may be provided to process signals for each spectrum or other spectrum not mentioned herein, although the scope of the embodiments is not limited in this respect.
In some embodiments, synthesizer circuit 804 may be a fractional-N synthesizer or a fractional-N/N +1 synthesizer, although the scope of the embodiments is not limited in this respect as other types of frequency synthesizers may be suitable. For example, the synthesizer circuit 804 may be a delta-sigma synthesizer, a frequency multiplier, or a synthesizer including a phase locked loop with a frequency divider. According to some embodiments, the synthesizer circuit 804 can include a digital synthesizer circuit. An advantage of using a digital synthesizer circuit is that although it may still include some analog components, its footprint may be much smaller than that of an analog synthesizer circuit. In some embodiments, the frequency input to the synthesizer circuit 804 may be provided by a Voltage Controlled Oscillator (VCO), but this is not required. The baseband processing circuits 608a-b (fig. 6) may further provide divider control inputs depending on the desired output frequency 805. In some embodiments, the divider control input (e.g., N) may be determined from a look-up table (e.g., within a Wi-Fi card) based on the channel number and channel center frequency determined or indicated by the example application processor 610. The application processor 610 may include or otherwise be connected to one of the example secure signal converter 101 or the example receive signal converter 103 (e.g., depending on which device the example radio architecture is implemented in).
In some embodiments, the synthesizer circuit 804 may be configured to generate the carrier frequency as the output frequency 805, while in other embodiments, the output frequency 805 may be a portion of the carrier frequency (e.g., half the carrier frequency, one third of the carrier frequency). In some embodiments, output frequency 805 may be an LO frequency (fLO).
Fig. 9 illustrates a functional block diagram of a baseband processing circuit 608a, according to some embodiments. The baseband processing circuit 608a is one example of a circuit that may be suitable for use as the baseband processing circuit 608a (fig. 6), although other circuit configurations may also be suitable. Alternatively, the example BT baseband processing circuit 608b of fig. 6 may be implemented using the example of fig. 8.
The baseband processing circuitry 608a may include a receive baseband processor (RX BBP) 902 to process receive baseband signals 809 provided by the radio IC circuitry 606a-b (fig. 6) and a transmit baseband processor (TX BBP) 904 to generate transmit baseband signals 811 for the radio IC circuitry 606 a-b. The baseband processing circuit 608a may also include control logic 906 to coordinate the operation of the baseband processing circuit 608 a.
In some embodiments (e.g., when analog baseband signals are exchanged between the baseband processing circuits 608a-b and the radio IC circuits 606 a-b), the baseband processing circuits 608a may include an ADC 910 to convert analog baseband signals 909 received from the radio IC circuits 606a-b to digital baseband signals for processing by the RX BBP 902. In these embodiments, the baseband processing circuit 608a may also include a DAC 912 to convert the digital baseband signal from the TX BBP 904 to an analog baseband signal 911.
In some embodiments, for example, where the OFDM signal or OFDMA signal is communicated by the baseband processor 608a, the transmit baseband processor 904 may be configured to: an OFDM or OFDMA signal suitable for transmission is generated by performing an Inverse Fast Fourier Transform (IFFT). The receive baseband processor 902 may be configured to: the received OFDM signal or OFDMA signal is processed by performing FFT. In some embodiments, the receive baseband processor 902 may be configured to: the presence of the OFDM signal or the OFDMA signal is detected by performing autocorrelation to detect a preamble (e.g., a short preamble) and by performing cross-correlation to detect a long preamble. The preamble may be part of a predetermined frame structure for Wi-Fi communication.
Referring back to fig. 6, in some embodiments, antennas 601 (fig. 6) may each include one or more directional or omnidirectional antennas, including, for example, dipole antennas, monopole antennas, patch antennas, loop antennas, microstrip antennas or other types of antennas suitable for transmission of RF signals. In some multiple-input multiple-output (MIMO) embodiments, antennas may be effectively separated to take advantage of spatial diversity and the different channel characteristics that may result. Antennas 601 may each include a set of phased array antennas, but embodiments are not limited thereto.
Although the radio architectures 105A, 105B are illustrated as having several separate functional elements, one or more of the functional elements may be combined and may be implemented by combinations of software-configured elements, such as processing elements including Digital Signal Processors (DSPs), and/or other hardware elements. For example, some elements may comprise one or more microprocessors, DSPs, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), radio Frequency Integrated Circuits (RFICs), and combinations of various hardware and logic circuitry for performing at least the functions described herein. In some embodiments, a functional element may refer to one or more processes operating on one or more processing elements.
The word "exemplary" is used herein to mean "serving as an example, instance, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments. As used herein, the terms "computing device," "user device," "communication station," "handheld device," "mobile device," "wireless device," and "user equipment" (UE) refer to a wireless communication device, such as a cellular telephone, smartphone, tablet computer, netbook, wireless terminal, laptop computer, femtocell, high Data Rate (HDR) subscriber station, access point, printer, point-of-sale device, access terminal, or other Personal Communication System (PCS) device. The device may be mobile or stationary.
As used in this document, the term "communication" is intended to include either transmission or reception, or both. This may be particularly useful in the claims when describing the organization of data sent by one device and received by another device, but only the functionality of one of the devices is required to infringe the claims. Similarly, when the functionality of only one of the devices is claimed, the two-way data exchange between the two devices (the two devices transmitting and receiving during the exchange) may be described as "communicating. The term "communicate" as used herein with respect to wireless communication signals includes transmitting wireless communication signals and/or receiving wireless communication signals. For example, a wireless communication unit capable of communicating wireless communication signals may include a wireless transmitter for transmitting wireless communication signals to at least one other wireless communication unit, and/or a wireless communication receiver for receiving wireless communication signals from at least one other wireless communication unit.
As used herein, unless otherwise specified the use of the ordinal adjectives "first", "second", "third", etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.
The term "access point" (AP) as used herein may be a fixed station. An access point may also be referred to as an access node, a base station, an evolved node B (eNodeB), or some other similar terminology known in the art. An access terminal may also be called a mobile station, user Equipment (UE), a wireless communication device, or some other similar terminology known in the art. Embodiments disclosed herein relate generally to wireless networks. Some embodiments may relate to a wireless network operating according to one of the IEEE 802.11 standards.
Some embodiments may be used in conjunction with various devices and systems, such as Personal Computers (PCs), desktop computers, mobile computers, laptop computers, notebook computers, tablet computers, server computers, handheld devices, personal Digital Assistant (PDA) devices, handheld PDA devices, onboard devices, off-board devices, hybrid devices, onboard devices, offboard devices, mobile or portable devices, consumer devices, non-mobile or non-portable devices, wireless communication stations, wireless communication devices, wireless Access Points (APs), wired or wireless routers, wired or wireless modems, video devices, audio-video (A/V) devices, wired or wireless networks, wireless local area networks, wireless video local area networks (WVANs), local Area Networks (LANs), wireless Local Area Networks (WLANs), personal Area Networks (PANs), wireless PANs (WPANs), and the like.
Some embodiments may be used in conjunction with the following devices: one-way and/or two-way radio communication systems, cellular radiotelephone communication systems, mobile telephones, cellular telephones, radiotelephones, personal Communication Systems (PCS) devices, PDA devices that incorporate wireless communication devices, mobile or portable Global Positioning System (GPS) devices, devices that incorporate GPS receivers or transceivers or chips, devices that incorporate RFID elements or chips, multiple-input multiple-output (MIMO) transceivers or devices, single-input multiple-output (SIMO) transceivers or devices, multiple-input single-output (MISO) transceivers or devices, devices having one or more internal and/or external antennas, digital Video Broadcasting (DVB) devices or systems, multi-standard radio devices or systems, wired or wireless handheld devices (e.g., smartphones), wireless Application Protocol (WAP) devices, and the like.
Some embodiments may be used in conjunction with one or more types of wireless communication signals and/or systems that conform to one or more wireless communication protocols, e.g., radioFrequency (RF), infrared (IR), frequency Division Multiplexing (FDM), orthogonal FDM (OFDM), time Division Multiplexing (TDM), time Division Multiple Access (TDMA), extended TDMA (E-TDMA), general Packet Radio Service (GPRS), extended GPRS, code Division Multiple Access (CDMA), wideband CDMA (WCDMA), CDMA 2000, single carrier CDMA, multi-carrier modulation (MDM), discrete multi-tone (DMT),
Figure BDA0003428893780000251
Global Positioning System (GPS), wi-Fi, wi-Max, zigBee, ultra Wideband (UWB), global system for mobile communications (GSM), 2G, 2.5G, 3G, 3.5G, 4G, fifth generation (5G) mobile networks, 3GPP, long Term Evolution (LTE), LTE-Advance, enhanced data rates for GSM evolution (EDGE), and the like. Other embodiments may be used in various other devices, systems, and/or networks.
The following examples pertain to further embodiments.
Example 1 may include an apparatus comprising processing circuitry coupled to a memory, the processing circuitry configured to: generating a request frame for a Neighbor Awareness Network (NAN) data path (NDP), wherein the request frame is encrypted using a first key; including authentication information to be used for establishing a second key in the request frame, the second key being different from the first key; and transmitting the request frame to the second device.
Example 2 may include the apparatus of example 1 and/or some other example herein, wherein the first key comprises a Pairwise Transient Key (PTK).
Example 3 may include the apparatus of example 2 and/or some other example herein, wherein the PTK includes a Transient Key (TK), and wherein the request frame is encrypted by encrypting the request frame at a Media Access Control (MAC) level using the TK.
Example 4 may include the apparatus of example 2 and/or some other example herein, wherein the PTK comprises a Key Derivation Key (KDK), and wherein the request frame is encrypted by encrypting data of the request frame using a key derived from the KDK.
Example 5 may include the apparatus of example 1 and/or some other example herein, wherein the processing circuitry is further configured to: establishing a protected NDP with the second device based on the authentication information.
Example 6 may include a non-transitory computer-readable storage medium storing computer-executable instructions that, when executed by processing circuitry of a device, cause the device to: generating a request frame to a Neighbor Awareness Network (NAN) data path (NDP), wherein the request frame is encrypted using a first key; including authentication information to be used for establishing a second key in the request frame, the second key being different from the first key; and transmitting the request frame to the second device.
Example 7 may include the storage medium of example 6 and/or some other example herein, wherein the first key comprises a Pairwise Transient Key (PTK).
Example 8 may include the storage medium of example 7 and/or some other example herein, wherein the PTK includes a Transient Key (TK), and wherein the request frame is encrypted by encrypting the request frame at a Media Access Control (MAC) level using the TK.
Example 9 may include the storage medium of example 7 and/or some other example herein, wherein the PTK includes a Key Derivation Key (KDK), and wherein the request frame is encrypted by encrypting data of the request frame using a key derived from the KDK.
Example 10 may include the storage medium of example 6 and/or some other example herein, further comprising instructions that, when executed by processing circuitry of a device, cause the device to: establishing a protected NDP with the second device based on the authentication information.
Example 11 may include an apparatus comprising processing circuitry coupled to the storage, the processing circuitry configured to: generating a response frame to a request for a Neighbor Awareness Network (NAN) data path (NDP), wherein the response frame is encrypted using a first key; including authentication information to be used to establish a second key in the response frame, the second key being different from the first key; and transmitting the response frame to the second device.
Example 12 may include the apparatus of example 11 and/or some other example herein, wherein the first key comprises a Pairwise Transient Key (PTK).
Example 13 may include the apparatus of example 12 and/or some other example herein, wherein the PTK comprises a Transient Key (TK), and wherein the response frame is encrypted by encrypting the response frame at a Media Access Control (MAC) level using the TK.
Example 14 may include the apparatus of example 12 and/or some other example herein, wherein the PTK includes a Key Derivation Key (KDK), and wherein the response frame is encrypted by encrypting data of the response frame using a key derived from the KDK.
Example 15 may include the apparatus of example 11 and/or some other example herein, wherein the processing circuitry is further configured to: establishing a protected NDP with the second device based on the authentication information.
Example 16 may include a non-transitory computer-readable storage medium storing computer-executable instructions that, when executed by processing circuitry of a device, cause the device to: generating a response frame to a request for a Neighbor Awareness Network (NAN) data path (NDP), wherein the response frame is encrypted using a first key; including authentication information to be used to establish a second key in the response frame, the second key being different from the first key; and transmitting the response frame to the second device.
Example 17 may include the storage medium of example 16 and/or some other example herein, wherein the first key comprises a Pairwise Transient Key (PTK).
Example 18 may include the storage medium of example 17 and/or some other example herein, wherein the PTK comprises a Transient Key (TK), and wherein the response frame is encrypted by encrypting the response frame at a Media Access Control (MAC) level using the TK.
Example 19 may include the storage medium of example 17 and/or some other example herein, wherein the PTK includes a Key Derivation Key (KDK), and wherein the response frame is encrypted by encrypting data of the response frame using a key derived from the KDK.
Example 20 may include the storage medium of example 16 and/or some other example herein, further comprising instructions that, when executed by processing circuitry of a device, cause the device to: establishing a protected NDP with the second device based on the authentication information.
Example 21 may include a method comprising: generating a request frame to a Neighbor Awareness Network (NAN) data path (NDP), wherein the request frame is encrypted using a first key; including in the request frame authentication information to be used to establish a second key, the second key being different from the first key; and transmitting the request frame to the second device.
Example 22 may include the method of example 21 and/or some other example herein, wherein the first key comprises a Pairwise Transient Key (PTK).
Example 23 may include the method of example 22 and/or some other example herein, wherein the PTK includes a Transient Key (TK), and wherein the request frame is encrypted by encrypting the request frame at a Media Access Control (MAC) level using the TK.
Example 24 may include the method of example 22 and/or some other example herein, wherein the PTK includes a Key Derivation Key (KDK), and wherein the request frame is encrypted by encrypting data of the request frame using a key derived from the KDK.
Example 25 may include the method of example 21 and/or some other example herein, further comprising: establishing a protected NDP with the second device based on the authentication information.
Example 26 may include an apparatus comprising: means for generating a request frame to a Neighbor Awareness Network (NAN) data path (NDP), wherein the request frame is encrypted using a first key; means for including in the request frame authentication information to be used for establishing a second key, the second key being different from the first key; and means for transmitting the request frame to a second device.
Example 27 may include the apparatus of example 26 and/or some other example herein, wherein the first key comprises a Pairwise Transient Key (PTK).
Example 28 may include the apparatus of example 22 and/or some other example herein, wherein the PTK comprises a Transient Key (TK), and wherein the request frame is encrypted by encrypting the request frame at a Media Access Control (MAC) level using the TK.
Example 29 may include the apparatus of example 22 and/or some other example herein, wherein the PTK includes a Key Derivation Key (KDK), and wherein the request frame is encrypted by encrypting data of the request frame using a key derived from the KDK.
Example 30 may include the apparatus of example 26 and/or some other example herein, further comprising: means for establishing a protected NDP with the second device based on the authentication information.
Example 31 may include a method comprising: generating a response frame to a request for a Neighbor Awareness Network (NAN) data path (NDP), wherein the response frame is encrypted using a first key; including authentication information to be used for establishing a second key in the response frame, the second key being different from the first key; and transmitting the response frame to the second device.
Example 32 may include the method of example 31 and/or some other example herein, wherein the first key comprises a Pairwise Transient Key (PTK).
Example 33 may include the method of example 32 and/or some other example herein, wherein the PTK includes a Transient Key (TK), and wherein the response frame is encrypted by encrypting the response frame at a Media Access Control (MAC) level using the TK.
Example 34 may include the method of example 32 and/or some other example herein, wherein the PTK includes a Key Derivation Key (KDK), and wherein the response frame is encrypted by encrypting data of the response frame using a key derived from the KDK.
Example 35 may include the method of example 31 and/or some other example herein, further comprising: establishing a protected NDP with the second device based on the authentication information.
Example 36 may include a method comprising: generating a response frame to a request for a Neighbor Awareness Network (NAN) data path (NDP), wherein the response frame is encrypted using a first key; including authentication information to be used to establish a second key in the response frame, the second key being different from the first key; and transmitting the response frame to the second device.
Example 37 may include the method of example 36 and/or some other example herein, wherein the first key comprises a Pairwise Transient Key (PTK).
Example 38 may include the method of example 37 and/or some other example herein, wherein the PTK includes a Transient Key (TK), and wherein the response frame is encrypted by encrypting the response frame at a Media Access Control (MAC) level using the TK.
Example 39 may include the method of example 37 and/or some other example herein, wherein the PTK includes a Key Derivation Key (KDK), and wherein the response frame is encrypted by encrypting data of the response frame using a key derived from the KDK.
Example 40 may include the method of example 36 and/or some other example herein, further comprising: establishing a protected NDP with the second device based on the authentication information.
Embodiments in accordance with the present disclosure are disclosed in particular in the accompanying claims directed to methods, storage media, devices and computer program products, wherein any feature mentioned in one claim category (e.g., method) may also be claimed in another claim category (e.g., system). The dependencies or references in the appended claims are chosen solely for formal reasons. However, any subject matter resulting from an intentional reference to any previous claim (in particular multiple dependencies) may also be claimed, such that any combination of a claim and its features is disclosed and can be claimed, irrespective of the dependency selected in the appended claims. The subject matter that can be claimed comprises not only the combinations of features set forth in the appended claims, but also any other combination of features in the claims, wherein each feature mentioned in the claims can be combined with any other feature or combination of other features in the claims. Furthermore, any embodiments and features described or depicted herein may be claimed in a separate claim and/or in any combination with any embodiment or feature described or depicted herein or with any feature of the appended claims.
The foregoing description of one or more implementations provides illustration and description, but is not intended to be exhaustive or to limit the scope of the embodiments to the precise form disclosed. Modifications and variations are possible in light of the above teachings or may be acquired from practice of various embodiments.
Certain aspects of the present disclosure are described above with reference to block diagrams and flowchart illustrations of systems, methods, apparatuses, and/or computer program products according to various implementations. It will be understood that one or more blocks of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, respectively, can be implemented by computer-executable program instructions. Likewise, some blocks of the block diagrams and flow diagrams may not necessarily need to be performed in the order presented, or may not need to be performed at all, according to some implementations.
These computer-executable program instructions may be loaded onto a special purpose computer or other specific machine, processor, or other programmable data processing apparatus to produce a particular machine, such that the instructions which execute on the computer, processor, or other programmable data processing apparatus create means for implementing one or more functions specified in the flowchart block or blocks. These computer program instructions may also be stored in a computer-readable storage medium or memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable storage medium produce an article of manufacture including instruction means which implement the function specified in the flowchart block or blocks. As an example, certain implementations may provide a computer program product comprising a computer readable storage medium having computer readable program code or program instructions embodied therein, said computer readable program code adapted to be executed to implement one or more functions specified in the flowchart block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational elements or steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide elements or steps for implementing the functions specified in the flowchart block or blocks.
Accordingly, blocks of the block diagrams and flowchart illustrations support combinations of means for performing the specified functions, combinations of elements or steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, can be implemented by special purpose, hardware-based computer systems that perform the specified functions, elements or steps, or combinations of special purpose hardware and computer instructions.
Conditional language, such as "may," "can," "might," or "may," unless expressly stated otherwise or otherwise understood within the context of usage, is generally intended to convey that certain implementations may include, while other implementations do not include, certain features, elements, and/or operations. Thus, such conditional language is not generally intended to imply that features, elements, and/or operations are in any way required for one or more implementations or that one or more implementations necessarily include logic for making decisions, with or without user input or prompting, whether or not such features, elements, and/or operations are included or are to be performed in any particular implementation.
Many modifications and other implementations of the disclosure set forth herein will come to mind to one skilled in the art to which this disclosure pertains having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the disclosure is not to be limited to the specific implementations disclosed and that modifications and other implementations are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims (20)

1. An apparatus comprising processing circuitry coupled to storage, the processing circuitry configured to:
generating a request frame for a Neighbor Awareness Network (NAN) data path (NDP), wherein the request frame is encrypted using a first key;
including in the request frame authentication information to be used to establish a second key, the second key being different from the first key; and
transmitting the request frame to the second device.
2. The device of claim 1, wherein the first key comprises a Pairwise Transient Key (PTK).
3. The device of claim 2, wherein the PTK comprises a Transient Key (TK), and wherein the request frame is encrypted by encrypting the request frame at a Media Access Control (MAC) level using the TK.
4. The device of claim 2, wherein the PTK comprises a Key Derivation Key (KDK), and wherein the request frame is encrypted by encrypting data of the request frame using a key derived from the KDK.
5. The device of claim 1, wherein the processing circuitry is further configured to:
establishing a protected NDP with the second device based on the authentication information.
6. A non-transitory computer-readable storage medium storing computer-executable instructions that, when executed by processing circuitry of an apparatus, cause the apparatus to:
generating a request frame to a Neighbor Awareness Network (NAN) data path (NDP), wherein the request frame is encrypted using a first key;
including authentication information to be used for establishing a second key in the request frame, the second key being different from the first key; and
transmitting the request frame to the second device.
7. The storage medium of claim 6, wherein the first key comprises a Pairwise Transient Key (PTK).
8. The storage medium of claim 7, wherein the PTK comprises a Transient Key (TK), and wherein the request frame is encrypted by encrypting the request frame at a Media Access Control (MAC) level using the TK.
9. The storage medium of claim 7, wherein the PTK comprises a Key Derivation Key (KDK), and wherein the request frame is encrypted by encrypting data of the request frame using a key derived from the KDK.
10. The storage medium of claim 6, further comprising instructions that, when executed by the processing circuitry of the device, cause the device to:
establishing a protected NDP with the second device based on the authentication information.
11. An apparatus comprising processing circuitry coupled to storage, the processing circuitry configured to:
generating a response frame to a request for a Neighbor Awareness Network (NAN) data path (NDP), wherein the response frame is encrypted using a first key;
including authentication information to be used for establishing a second key in the response frame, the second key being different from the first key; and
transmitting the response frame to the second device.
12. The apparatus of claim 11, wherein the first key comprises a Pairwise Transient Key (PTK).
13. The device of claim 12, wherein the PTK comprises a Transient Key (TK), and wherein the response frame is encrypted by encrypting the response frame at a Media Access Control (MAC) level using the TK.
14. The apparatus of claim 12, wherein the PTK comprises a Key Derivation Key (KDK), and wherein the response frame is encrypted by encrypting data of the response frame using a key derived from the KDK.
15. The device of claim 11, wherein the processing circuitry is further configured to:
establishing a protected NDP with the second device based on the authentication information.
16. A non-transitory computer-readable storage medium storing computer-executable instructions that, when executed by processing circuitry of a device, cause the device to:
generating a response frame to a request for a Neighbor Awareness Network (NAN) data path (NDP), wherein the response frame is encrypted using a first key;
including authentication information to be used for establishing a second key in the response frame, the second key being different from the first key; and
transmitting the response frame to the second device.
17. The storage medium of claim 16, wherein the first key comprises a Pairwise Transient Key (PTK).
18. The storage medium of claim 17, wherein the PTK comprises a Transient Key (TK), and wherein the response frame is encrypted by encrypting the response frame at a Media Access Control (MAC) level using the TK.
19. The storage medium of claim 17, wherein the PTK comprises a Key Derivation Key (KDK), and wherein the response frame is encrypted by encrypting data of the response frame using a key derived from the KDK.
20. The storage medium of claim 16, further comprising instructions that, when executed by the processing circuitry of the device, cause the device to:
establishing a protected NDP with the second device based on the authentication information.
CN202111590481.2A 2021-07-16 2021-12-23 Enhancements to WI-FI aware device with respect to protected data path setup Pending CN115701006A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202163222910P 2021-07-16 2021-07-16
US63/222,910 2021-07-16

Publications (1)

Publication Number Publication Date
CN115701006A true CN115701006A (en) 2023-02-07

Family

ID=85120853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111590481.2A Pending CN115701006A (en) 2021-07-16 2021-12-23 Enhancements to WI-FI aware device with respect to protected data path setup

Country Status (1)

Country Link
CN (1) CN115701006A (en)

Similar Documents

Publication Publication Date Title
US11558750B2 (en) Security for multi-link operation
US20190349758A1 (en) Ultrasound-assisted wi-fi and bluetooth authentication
US11973679B2 (en) Enhanced frame exchange and multi-link device messaging for secure communications
US20210195497A1 (en) Enhanced beacon frames in wireless communications
US11630200B2 (en) Passive location measurement
US20210392494A1 (en) Multi-link device resetup and transition with station device address authentication
US20210345105A1 (en) 4-way handshake optimization
US20240138006A1 (en) Enhanced signaling of addition and deletion of communication links for multi-link devices
WO2022094297A1 (en) Restricted service periods
US20210127273A1 (en) Enhanced beacon protection rekeying and attack detection for wireless communications
US10972909B2 (en) Synched group key rekeying
US20220116833A1 (en) Enhanced wi-fi fast roaming transition for mobile devices
US11777769B2 (en) Data scrambler in extreme high throughput
CN117378268A (en) Dynamically enabling and disabling Extremely High Throughput (EHT) for multiple links
CN115378477A (en) Power spectral density threshold for transmit mask and sounding feedback types
CN115701006A (en) Enhancements to WI-FI aware device with respect to protected data path setup
US11770710B2 (en) Man in the middle attack detection using operating channel validation under protected beacon
US20240147230A1 (en) Optimizing the coexistence of opportunistic wireless encryption and open mode in wireless networks
US20210120410A1 (en) Apparatus and method for wi-fi network profile verification
US11337068B1 (en) Multi-link device and method performed therein
EP4258717A1 (en) Key negotiation for association frame encryption
EP4293963A1 (en) Secure medium access control (mac) header
US20220353677A1 (en) Enhanced security keys for wi-fi association frames
CN115396874A (en) Privacy enhancement for Pairwise Master Key Security Association (PMKSA) caching
CN115397046A (en) Privacy enhancement to avoid element fingerprints

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication