WO2024156070A1 - Wi-fi for mobile station wake up - Google Patents
Wi-fi for mobile station wake up Download PDFInfo
- Publication number
- WO2024156070A1 WO2024156070A1 PCT/CN2023/073458 CN2023073458W WO2024156070A1 WO 2024156070 A1 WO2024156070 A1 WO 2024156070A1 CN 2023073458 W CN2023073458 W CN 2023073458W WO 2024156070 A1 WO2024156070 A1 WO 2024156070A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile station
- vehicle
- operating system
- message
- aspects
- Prior art date
Links
- 238000004891 communication Methods 0.000 claims abstract description 157
- 230000004044 response Effects 0.000 claims abstract description 50
- 239000000523 sample Substances 0.000 claims abstract description 40
- 238000000034 method Methods 0.000 claims description 111
- 230000002618 waking effect Effects 0.000 claims description 32
- 230000009471 action Effects 0.000 claims description 25
- 230000005540 biological transmission Effects 0.000 description 40
- 230000008569 process Effects 0.000 description 38
- 238000010586 diagram Methods 0.000 description 24
- 230000006870 function Effects 0.000 description 12
- 238000012545 processing Methods 0.000 description 12
- 238000007726 management method Methods 0.000 description 7
- 238000012549 training Methods 0.000 description 7
- 238000001914 filtration Methods 0.000 description 6
- 230000001419 dependent effect Effects 0.000 description 5
- 230000003321 amplification Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000013507 mapping Methods 0.000 description 4
- 238000003199 nucleic acid amplification method Methods 0.000 description 4
- 230000011664 signaling Effects 0.000 description 4
- VYLDEYYOISNGST-UHFFFAOYSA-N bissulfosuccinimidyl suberate Chemical compound O=C1C(S(=O)(=O)O)CC(=O)N1OC(=O)CCCCCCC(=O)ON1C(=O)C(S(O)(=O)=O)CC1=O VYLDEYYOISNGST-UHFFFAOYSA-N 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 238000013468 resource allocation Methods 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 239000003607 modifier Substances 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 108700026140 MAC combination Proteins 0.000 description 1
- 241000700159 Rattus Species 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 239000000872 buffer Substances 0.000 description 1
- 238000005266 casting Methods 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 230000003750 conditioning effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 230000006735 deficit Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- VJYFKVYYMZPMAB-UHFFFAOYSA-N ethoprophos Chemical compound CCCSP(=O)(OCC)SCCC VJYFKVYYMZPMAB-UHFFFAOYSA-N 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000010438 heat treatment Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000010363 phase shift Effects 0.000 description 1
- 229920000117 poly(dioxanone) Polymers 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3206—Monitoring of events, devices or parameters that trigger a change in power modality
- G06F1/3209—Monitoring remote activity, e.g. over telephone lines or network connections
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3234—Power saving characterised by the action undertaken
- G06F1/3293—Power saving characterised by the action undertaken by switching to a less power-consuming processor, e.g. sub-CPU
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0225—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
- H04W52/0229—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal where the received signal is a wanted signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- aspects of the present disclosure generally relate to wireless communication and to techniques and apparatuses for waking up a mobile station using Wi-Fi.
- a wireless local area network may be formed by one or more access points (APs) that provide a shared wireless communication medium for use by a number of client devices, also referred to as stations (STAs) .
- the basic building block of a WLAN conforming to the Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards is a Basic Service Set (BSS) , which is managed by an AP.
- BSS Basic Service Set
- Each BSS is identified by a Basic Service Set Identifier (BSSID) that is advertised by the AP.
- An AP periodically broadcasts beacon frames to enable any STAs within a wireless range of the AP to establish or maintain a communication link with the WLAN.
- the AP may communicate with one or more STAs over multiple concurrent communication links.
- Each of the communication links may be of various bandwidths, for example, by bonding a number of 20 MHz-wide channels together to form 40 MHz-wide channels, 80 MHz-wide channels, or 160 MHz-wide channels.
- the AP may establish BSSs on any of the different communication links, and therefore it is desirable to improve communication between the AP and the one or more STAs over each of the communication links.
- the method may include setting a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode.
- the method may include transmitting a probe message to scan for access points (APs) using a Wi-Fi network profile.
- the method may include receiving a response message from an AP.
- the method may include waking up the operating system based at least in part on receiving the response message from the AP.
- the method may include exchanging a public key with a mobile station.
- the method may include receiving, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile.
- the method may include transmitting a response message that uses a security key and that includes a vendor information element (IE) that indicates ownership or authorized control of the mobile station.
- IE vendor information element
- the mobile station may include a memory and one or more processors coupled to the memory.
- the one or more processors may be configured to set a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode.
- the one or more processors may be configured to transmit a probe message to scan for APs using a Wi-Fi network profile.
- the one or more processors may be configured to receive a response message from an AP.
- the one or more processors may be configured to wake up the operating system based at least in part on receiving the response message from the AP.
- the access point may include a memory and one or more processors coupled to the memory.
- the one or more processors may be configured to exchange a public key with a mobile station.
- the one or more processors may be configured to receive, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile.
- the one or more processors may be configured to transmit a response message that uses a security key and that includes a vendor IE that indicates ownership or authorized control of the mobile station.
- Some aspects described herein relate to a non-transitory computer-readable medium that stores a set of instructions for wireless communication by a mobile station.
- the set of instructions when executed by one or more processors of the mobile station, may cause the mobile station to set a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode.
- the set of instructions when executed by one or more processors of the mobile station, may cause the mobile station to transmit a probe message to scan for APs using a Wi-Fi network profile.
- the set of instructions when executed by one or more processors of the mobile station, may cause the mobile station to receive a response message from an AP.
- the set of instructions when executed by one or more processors of the mobile station, may cause the mobile station to wake up the operating system based at least in part on receiving the response message from the AP.
- Some aspects described herein relate to a non-transitory computer-readable medium that stores a set of instructions for wireless communication by an AP.
- the set of instructions when executed by one or more processors of the AP, may cause the AP to exchange a public key with a mobile station.
- the set of instructions when executed by one or more processors of the AP, may cause the AP to receive, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile.
- the set of instructions when executed by one or more processors of the AP, may cause the AP to transmit a response message that uses a security key and that includes a vendor IE that indicates ownership or authorized control of the mobile station.
- the apparatus may include means for setting a scan offload for Wi-Fi based at least in part on an operating system of the apparatus entering a low power mode.
- the apparatus may include means for transmitting a probe message to scan for APs using a Wi-Fi network profile.
- the apparatus may include means for receiving a response message from an AP.
- the apparatus may include means for waking up the operating system based at least in part on receiving the response message from the AP.
- the apparatus may include means for exchanging a public key with a mobile station.
- the apparatus may include means for receiving, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile.
- the apparatus may include means for transmitting a response message that uses a security key and that includes a vendor IE that indicates ownership or authorized control of the mobile station.
- aspects generally include a method, apparatus, system, computer program product, non-transitory computer-readable medium, user equipment, station, AP, wireless communication device, and/or processing system as substantially described herein with reference to and as illustrated by the drawings and specification.
- aspects are described in the present disclosure by illustration to some examples, those skilled in the art will understand that such aspects may be implemented in many different arrangements and scenarios.
- Techniques described herein may be implemented using different platform types, devices, systems, shapes, sizes, and/or packaging arrangements.
- some aspects may be implemented via integrated chip embodiments or other non-module-component based devices (e.g., end-user devices, vehicles, communication devices, computing devices, industrial equipment, retail/purchasing devices, medical devices, and/or artificial intelligence devices) .
- Aspects may be implemented in chip-level components, modular components, non-modular components, non-chip-level components, device-level components, and/or system-level components.
- Devices incorporating described aspects and features may include additional components and features for implementation and practice of claimed and described aspects.
- transmission and reception of wireless signals may include one or more components for analog and digital purposes (e.g., hardware components including antennas, radio frequency (RF) chains, power amplifiers, modulators, buffers, processors, interleavers, adders, and/or summers) .
- RF radio frequency
- aspects described herein may be practiced in a wide variety of devices, components, systems, distributed arrangements, and/or end-user devices of varying size, shape, and constitution.
- Fig. 1A is a diagram illustrating an example of a wireless communication network, in accordance with the present disclosure.
- Fig. 1B shows a block diagram of an example wireless communication device, in accordance with the present disclosure.
- Fig. 1C shows a block diagram of an example access point (AP) , in accordance with the present disclosure.
- Fig. 1D shows a block diagram of an example station (STA) , in accordance with the present disclosure.
- Fig. 2A shows an example protocol data unit (PDU) usable for communications between an AP and a number of STAs, in accordance with the present disclosure.
- PDU protocol data unit
- Fig. 2B shows an example field in the PDU of Fig. 2A, in accordance with the present disclosure.
- Fig. 3A shows another example PDU usable for communications between an AP and one or more STAs, in accordance with the present disclosure.
- Fig. 3B shows another example PDU usable for communications between an AP and one or more STAs, in accordance with the present disclosure.
- Fig. 4 is a diagram illustrating an example of accessing a vehicle remotely, in accordance with the present disclosure.
- Fig. 5 is a diagram illustrating an example of using Wi-Fi to control actions of a vehicle, in accordance with the present disclosure.
- Fig. 6 is a diagram illustrating an example of using a simultaneous authentication of equals public key (SAE-PK) to authenticate an AP, in accordance with the present disclosure.
- SAE-PK simultaneous authentication of equals public key
- Fig. 7 is a diagram illustrating an example of using a Rivest-Shamir-Adleman (RSA) algorithm to authenticate an AP, in accordance with the present disclosure.
- RSA Rivest-Shamir-Adleman
- Fig. 8 is a diagram illustrating an example process performed, for example, by a mobile station, in accordance with the present disclosure.
- Fig. 9 is a diagram illustrating an example process performed, for example, by an AP, in accordance with the present disclosure.
- Fig. 10 is a diagram of an example apparatus for wireless communication, in accordance with the present disclosure.
- Fig. 11 is a diagram of an example apparatus for wireless communication, in accordance with the present disclosure.
- the following description is directed to certain implementations for the purposes of describing innovative aspects of this disclosure.
- RF radio frequency
- IEEE Institute of Electrical and Electronics Engineers
- IEEE 802.11 standards
- the IEEE 802.15 standards
- the standards as defined by the Bluetooth Special Interest Group (SIG) or the Long Term Evolution (LTE)
- 3G, 4G or 5G New Radio (NR) ) standards promulgated by the 3rd Generation Partnership Project (3GPP) , among others.
- 3GPP 3rd Generation Partnership Project
- CDMA code division multiple access
- TDMA time division multiple access
- FDMA frequency division multiple access
- OFDMA orthogonal FDMA
- SC-FDMA single-carrier FDMA
- SU single-user
- MIMO multiple-input multiple-output
- MU multi-user MIMO
- the described implementations also can be implemented using other wireless communication protocols or RF signals suitable for use in one or more of a wireless personal area network (WPAN) , a wireless local area network (WLAN) , a wireless wide area network (WWAN) , or an internet of things (IOT) network.
- WPAN wireless personal area network
- WLAN wireless local area network
- WWAN wireless wide area network
- IOT internet of things
- IEEE 802 e.g., IEEE 802
- RAT radio access technology
- Fig. 1A shows a block diagram of an example wireless communication network 100.
- the wireless communication network 100 can be an example of a WLAN such as a Wi-Fi network (and will hereinafter be referred to as WLAN 100) .
- the WLAN 100 can be a network implementing at least one of the IEEE 802.11 family of standards (such as that defined by the IEEE 802.11-2016 specification or amendments thereof including, but not limited to, 802.11ah, 802.11ad, 802.11ay, 802.11ax, 802.11az, 802.11ba, and 802.11be) .
- the WLAN 100 may include numerous wireless communication devices such as an access point (AP) 102 and multiple stations (STAs) 104. While only one AP 102 is shown, the WLAN network 100 also can include multiple APs 102.
- AP access point
- STAs stations
- Each of the STAs 104 also may be referred to as a mobile station (MS) , a mobile device, a mobile handset, a wireless handset, an access terminal (AT) , a user equipment (UE) , a subscriber station (SS) , or a subscriber unit, among other possibilities.
- MS mobile station
- AT access terminal
- UE user equipment
- SS subscriber station
- subscriber unit a subscriber unit
- the STAs 104 may represent various devices such as mobile phones, personal digital assistant (PDAs) , other handheld devices, netbooks, notebook computers, tablet computers, laptops, display devices (for example, TVs, computer monitors, navigation systems, among others) , music or other audio or stereo devices, remote control devices ( “remotes” ) , printers, kitchen or other household appliances, key fobs (for example, for passive keyless entry and start systems) , among other possibilities.
- PDAs personal digital assistant
- other handheld devices netbooks
- notebook computers tablet computers
- laptops display devices
- music or other audio or stereo devices for example, music or other audio or stereo devices
- remote control devices “remotes”
- printers printers
- kitchen or other household appliances key fobs (for example, for passive keyless entry and start systems) , among other possibilities.
- key fobs for example, for passive keyless entry and start systems
- a single AP 102 and an associated set of STAs 104 may be referred to as a basic service set (BSS) , which is managed by the respective AP 102.
- Fig. 1A additionally shows an example coverage area 105 of the AP 102, which may represent a basic service area (BSA) of the WLAN 100.
- the BSS may be identified to users by a service set identifier (SSID) , as well as to other devices by a basic service set identifier (BSSID) , which may be a medium access control (MAC) address of the AP 102.
- SSID service set identifier
- BSSID basic service set identifier
- MAC medium access control
- the AP 102 periodically broadcasts beacon frames ( “beacons” ) including the BSSID to enable any STAs 104 within wireless range of the AP 102 to “associate” or re-associate with the AP 102 to establish a respective communication link 106 (hereinafter also referred to as a “Wi-Fi link” ) , or to maintain a communication link 106, with the AP 102.
- the beacons can include an identification of a primary channel used by the respective AP 102 as well as a timing synchronization function for establishing or maintaining timing synchronization with the AP 102.
- the AP 102 may provide access to external networks to various STAs 104 in the WLAN via respective communication links 106.
- each of the STAs 104 is configured to perform passive or active scanning operations ( “scans” ) on frequency channels in one or more frequency bands (for example, the 2.4 GHz, 5.0 GHz, 6.0 GHz, or 60 GHz bands) .
- scans passive or active scanning operations
- an STA 104 listens for beacons, which are transmitted by respective APs 102 at a periodic time interval referred to as the target beacon transmission time (TBTT) (measured in time units (TUs) , where one TU may be equal to 1024 microseconds ( ⁇ s) ) .
- TBTT target beacon transmission time
- TUs time units
- ⁇ s microseconds
- an STA 104 To perform active scanning, an STA 104 generates and sequentially transmits probe requests on each channel to be scanned and listens for probe responses from APs 102. Each STA 104 may be configured to identify or select an AP 102 with which to associate based on discovery information obtained through the passive or active scans, and to perform authentication and association operations to establish a communication link 106 with the selected AP 102. After authentication, the AP 102 may assign an association identifier (AID) to each associated STA 104.
- AID association identifier
- an STA 104 may have an opportunity to select one of many BSSs within range of the STA or to select among multiple APs 102 that together form an extended service set (ESS) including multiple connected BSSs.
- An extended network station associated with the WLAN 100 may be connected to a wired or wireless distribution system that may allow multiple APs 102 to be connected in such an ESS.
- an STA 104 can be covered by more than one AP 102 and can associate with different APs 102 at different times for different transmissions.
- an STA 104 after association with an AP 102, an STA 104 also may be configured to periodically scan its surroundings to find a more suitable AP 102 with which to associate. For example, an STA 104 that is moving relative to its associated AP 102 may perform a “roaming” scan to find another AP 102 having more desirable network characteristics such as a greater received signal strength indicator (RSSI) or a reduced traffic load.
- RSSI received signal strength indicator
- STAs 104 may form networks without APs 102 or other equipment other than the STAs 104 themselves.
- a network is an ad hoc network (or wireless ad hoc network) .
- Ad hoc networks may alternatively be referred to as mesh networks or peer-to-peer (P2P) networks.
- P2P peer-to-peer
- ad hoc networks may be implemented within a larger wireless network such as the WLAN 100.
- the STAs 104 may be capable of communicating with each other through the AP 102 using communication links 106, STAs 104 also can communicate directly with each other via direct wireless links 108.
- two STAs 104 may communicate via a direct wireless link 108 regardless of whether both STAs 104 are associated with and served by the same AP 102.
- one or more of the STAs 104 may assume the role filled by the AP 102 in a BSS.
- Such an STA 104 may be referred to as a group owner (GO) and may coordinate transmissions within the ad hoc network.
- Examples of direct wireless links 108 include Wi-Fi Direct connections, connections established by using a Wi-Fi Tunneled Direct Link Setup (TDLS) link, and other P2P group connections.
- TDLS Wi-Fi Tunneled Direct Link Setup
- the APs 102 and STAs 104 may function and communicate (via the respective communication links 106) according to the IEEE 802.11 family of standards (such as that defined by the IEEE 802.11-2016 specification or amendments thereof including, but not limited to, 802.11ah, 802.11ad, 802.11ay, 802.11ax, 802.11az, 802.11ba, and 802.11be) .
- IEEE 802.11 family of standards such as that defined by the IEEE 802.11-2016 specification or amendments thereof including, but not limited to, 802.11ah, 802.11ad, 802.11ay, 802.11ax, 802.11az, 802.11ba, and 802.11be.
- These standards define the WLAN radio and baseband protocols for the physical (PHY) and MAC layers.
- the APs 102 and STAs 104 transmit and receive wireless communications (hereinafter also referred to as “Wi-Fi communications” ) to and from one another in the form of physical layer convergence protocol (PLCP) protocol data units (PDSs) , or PPDUs.
- the APs 102 and STAs 104 in the WLAN 100 may transmit PPDUs over an unlicensed spectrum, which may be a portion of spectrum that includes frequency bands traditionally used by Wi-Fi technology, such as the 2.4 GHz band, the 5.0 GHz band, the 60 GHz band, the 3.6 GHz band, and the 900 MHz band.
- Some implementations of the APs 102 and STAs 104 described herein also may communicate in other frequency bands, such as the 6.0 GHz band, which may support both licensed and unlicensed communications.
- the APs 102 and STAs 104 also can be configured to communicate over other frequency bands such as shared licensed frequency bands, where multiple operators may have a license to operate in the same or overlapping frequency band or bands.
- Each of the frequency bands may include multiple sub-bands or frequency channels.
- 802.11ax standard amendments may be transmitted over the 2.4 and 5.0 GHz bands, each of which is divided into multiple 20 MHz channels. These PPDUs are transmitted over a physical channel having a minimum bandwidth of 20 MHz, but larger channels can be formed through channel bonding. For example, PPDUs may be transmitted over physical channels having bandwidths of 40 MHz, 80 MHz, 160 MHz, or 320 MHz by bonding together multiple 20 MHz channels.
- Each PPDU is a composite structure that includes a PHY preamble and a payload in the form of a PLCP service data unit (PSDU) .
- the information provided in the preamble may be used by a receiving device to decode the subsequent data in the PSDU.
- the preamble fields may be duplicated and transmitted in each of the multiple component channels.
- the PHY preamble may include both a legacy portion (or “legacy preamble” ) and a non-legacy portion (or “non-legacy preamble” ) .
- the legacy preamble may be used for packet detection, automatic gain control, and channel estimation, among other uses.
- the legacy preamble also may generally be used to maintain compatibility with legacy devices.
- the format of, coding of, and information provided in the non-legacy portion of the preamble is based on the particular IEEE 802.11 protocol to be used to transmit the payload.
- Fig. 1B shows a block diagram of an example wireless communication device 110.
- the wireless communication device 110 can be an example of a device for use in an STA such as one of the STAs 104 described above with reference to Fig. 1A.
- the wireless communication device 110 can be an example of a device for use in an AP such as the AP 102 described above with reference to Fig. 1A.
- the wireless communication device 110 is capable of transmitting (or outputting for transmission) and receiving wireless communications (for example, in the form of wireless packets) .
- the wireless communication device can be configured to transmit and receive packets in the form of PPDUs and MAC protocol data units (MPDUs) conforming to an IEEE 802.11 standard, such as that defined by the IEEE 802.11-2016 specification or amendments thereof including, but not limited to, 802.11ah, 802.11ad, 802.11ay, 802.11ax, 802.11az, 802.11ba, and 802.11be.
- IEEE 802.11 standard such as that defined by the IEEE 802.11-2016 specification or amendments thereof including, but not limited to, 802.11ah, 802.11ad, 802.11ay, 802.11ax, 802.11az, 802.11ba, and 802.11be.
- the wireless communication device 110 can be, or can include, a chip, system on chip (SoC) , chipset, package, or device that includes one or more modems 112 (for example, a Wi-Fi (IEEE 802.11 compliant) modem) .
- the one or more modems 112 (collectively “the modem 112” ) additionally include a WWAN modem (for example, a 3GPP 4G LTE or 5G compliant modem) .
- the wireless communication device 110 also includes one or more radios 114 (collectively “the radio 114” ) .
- the wireless communication device 116 further includes one or more processors, processing blocks or processing elements 116 (collectively “the processor 116” ) , and one or more memory blocks or elements 118 (collectively “the memory 118” ) .
- the modem 112 can include an intelligent hardware block or device such as, for example, an application-specific integrated circuit (ASIC) , among other possibilities.
- the modem 112 is generally configured to implement a PHY layer.
- the modem 112 is configured to modulate packets and to output the modulated packets to the radio 114 for transmission over the wireless medium.
- the modem 112 is similarly configured to obtain modulated packets received by the radio 114 and to demodulate the packets to provide demodulated packets.
- the modem 112 may further include digital signal processor (DSP) circuitry, automatic gain control (AGC) , a coder, a decoder, a multiplexer, and a demultiplexer.
- DSP digital signal processor
- AGC automatic gain control
- data obtained from the processor 116 is provided to a coder, which encodes the data to provide encoded bits.
- the encoded bits are then mapped to points in a modulation constellation (using a selected modulation and coding scheme (MCS) ) to provide modulated symbols.
- MCS modulation and coding scheme
- the modulated symbols may then be mapped to a number NSS of spatial streams or a number NSTS of space-time streams.
- the modulated symbols in the respective spatial or space-time streams may then be multiplexed, transformed via an inverse fast Fourier transform (IFFT) block, and subsequently provided to the DSP circuitry for Tx windowing and filtering.
- IFFT inverse fast Fourier transform
- the digital signals may then be provided to a digital-to-analog converter (DAC) .
- DAC digital-to-analog converter
- the resultant analog signals may then be provided to a frequency upconverter, and ultimately, the radio 114.
- the modulated symbols in the respective spatial streams
- the DSP circuitry is further configured to digitally condition the digital signals, for example, using channel (narrowband) filtering, analog impairment conditioning (such as correcting for in-phase and quadrature (I/Q) imbalance) , and applying digital gain to ultimately obtain a narrowband signal.
- the output of the DSP circuitry may then be fed to the AGC, which is configured to use information extracted from the digital signals, for example, in one or more received training fields, to determine an appropriate gain.
- the output of the DSP circuitry also is coupled with the demodulator, which is configured to extract modulated symbols from the signal and, for example, compute the logarithm likelihood ratios (LLRs) for each bit position of each subcarrier in each spatial stream.
- the demodulator is coupled with the decoder, which may be configured to process the LLRs to provide decoded bits.
- the decoded bits from all of the spatial streams are then fed to the demultiplexer for demultiplexing.
- the demultiplexed bits may then be descrambled and provided to the MAC layer (the processor 116) for processing, evaluation, or interpretation.
- the radio 114 generally includes at least one RF transmitter (or “transmitter chain” ) and at least one RF receiver (or “receiver chain” ) , which may be combined into one or more transceivers.
- the RF transmitters and receivers may include various DSP circuitry including at least one power amplifier (PA) and at least one low-noise amplifier (LNA) , respectively.
- PA power amplifier
- LNA low-noise amplifier
- the RF transmitters and receivers may in turn be coupled to one or more antennas.
- the wireless communication device 110 can include, or be coupled with, multiple transmit antennas (each with a corresponding transmit chain) and multiple receive antennas (each with a corresponding receive chain) .
- the symbols output from the modem 112 are provided to the radio 114, which then transmits the symbols via the coupled antennas.
- symbols received via the antennas are obtained by the radio 114, which then provides the symbols to the modem 112.
- the processor 116 can include an intelligent hardware block or device such as, for example, a processing core, a processing block, a central processing unit (CPU) , a microprocessor, a microcontroller, a digital signal processor (DSP) , an ASIC, a programmable logic device (PLD) such as a field programmable gate array (FPGA) , discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein.
- the processor 116 processes information received through the radio 114 and the modem 112, and processes information to be output through the modem 112 and the radio 114 for transmission through the wireless medium.
- the processor 116 may implement a control plane and MAC layer configured to perform various operations related to the generation and transmission of MPDUs, frames, or packets.
- the MAC layer is configured to perform or facilitate the coding and decoding of frames, spatial multiplexing, space-time block coding (STBC) , beamforming, and OFDMA resource allocation, among other operations or techniques.
- STBC space-time block coding
- OFDMA OFDMA resource allocation
- the memory 118 can include tangible storage media such as random-access memory (RAM) or read-only memory (ROM) , or combinations thereof.
- the memory 118 also can store non-transitory processor-or computer-executable software code containing instructions that, when executed by the processor 116, cause the processor to perform various operations described herein for wireless communication, including the generation, transmission, reception, and interpretation of MPDUs, frames, or packets.
- various functions of components disclosed herein, or various blocks or steps of a method, operation, process, or algorithm disclosed herein can be implemented as one or more modules of one or more computer programs.
- Fig. 1C shows a block diagram of an example AP 120.
- the AP 120 can be an example implementation of the AP 102 described with reference to Fig. 1A.
- the AP 120 includes a wireless communication device (WCD) 122.
- the wireless communication device 122 may be an example implementation of the wireless communication device 110 described with reference to Fig. 1B.
- the AP 120 also includes multiple antennas 124 coupled with the wireless communication device 122 to transmit and receive wireless communications.
- the AP 120 additionally includes an application processor 126 coupled with the wireless communication device 122, and a memory 128 coupled with the application processor 126.
- the AP 120 further includes at least one external network interface 130 that enables the AP 120 to communicate with a core network or backhaul network to gain access to external networks including the Internet.
- the external network interface 130 may include one or both of a wired (for example, Ethernet) network interface and a wireless network interface (such as a WWAN interface) .
- a wired (for example, Ethernet) network interface and a wireless network interface (such as a WWAN interface) .
- a wireless network interface such as a WWAN interface
- Ones of the aforementioned components can communicate with other ones of the components directly or indirectly, over at least one bus.
- the AP 120 further includes a housing that encompasses the wireless communication device 122, the application processor 126, the memory 128, and at least portions of the antennas 124 and external network interface 130.
- an AP may include a communication manager 132.
- the communication manager 132 may exchange a public key with a mobile station.
- the communication manager 132 may receive, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile.
- the communication manager 132 may transmit a response message that uses a security key and that includes a vendor information element (IE) that indicates ownership or authorized control of the mobile station. Additionally, or alternatively, the communication manager 132 may perform one or more other operations described herein.
- IE vendor information element
- an AP (e.g., AP 120) includes means for exchanging a public key with a mobile station; means for receiving, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile; and/or means for transmitting a response message that uses a security key and that includes a vendor IE that indicates ownership or authorized control of the mobile station.
- the means for the AP to perform operations described herein may include, for example, one or more of communication manager 132, antenna 124, application processor 126, WCD 122, and/or memory 128.
- Fig. 1D shows a block diagram of an example STA 140.
- the STA 140 can be an example implementation of the STA 104 described with reference to Fig. 1A.
- the STA 140 includes a wireless communication device 142.
- the wireless communication device 142 may be an example implementation of the wireless communication device 110 described with reference to Fig. 1B.
- the STA 140 also includes one or more antennas 144 coupled with the wireless communication device 142 to transmit and receive wireless communications.
- the STA 140 additionally includes an application processor 146 coupled with the wireless communication device 142, and a memory 148 coupled with the application processor 146.
- the STA 140 further includes a user interface (UI) 150 (such as a touchscreen or keypad) and a display 152, which may be integrated with the UI 150 to form a touchscreen display.
- the STA 140 may further include one or more sensors 154 such as, for example, one or more inertial sensors, accelerometers, temperature sensors, pressure sensors, or altitude sensors.
- sensors 154 such as, for example, one or more inertial sensors, accelerometers, temperature sensors, pressure sensors, or altitude sensors.
- Ones of the aforementioned components can communicate with other ones of the components directly or indirectly, over at least one bus.
- the STA 140 further includes a housing that encompasses the wireless communication device 142, the application processor 146, the memory 148, and at least portions of the antennas 144, UI 150, and display 152.
- a mobile station may include a communication manager 156.
- the communication manager 156 may set a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode.
- the communication manager 156 may transmit a probe message to scan for APs using a Wi-Fi network profile.
- the communication manager 156 may receive a response message from an AP.
- the communication manager 156 may wake up the operating system based at least in part on receiving the response message from the AP. Additionally, or alternatively, the communication manager 156 may perform one or more other operations described herein.
- a mobile station (e.g., STA 140) includes means for setting a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode; means for transmitting a probe message to scan for APs using a Wi-Fi network profile; means for receiving a response message from an AP; and/or means for waking up the operating system based at least in part on receiving the response message from the AP.
- the means for the mobile station to perform operations described herein may include, for example, one or more of communication manager 156, antenna 144, application processor 146, WCD 142, and/or memory 148.
- Figs. 1A-1D are provided as examples. Other examples may differ from what is described with regard to Fig. 1A-1D.
- Fig. 2A shows an example PDU 200 usable for communications between an AP and a number of STAs.
- the PDU 200 can be configured as a PPDU.
- the PDU 200 includes a PHY preamble 202 and a PHY payload 204.
- the PHY preamble 202 may include a legacy portion that itself includes a legacy short training field (L-STF) 206, a legacy long training field (L-LTF) 208, and a legacy signaling field (L-SIG) 210.
- L-STF legacy short training field
- L-LTF legacy long training field
- L-SIG legacy signaling field
- the PHY preamble 202 may also include a non-legacy portion with non-legacy fields 212.
- the L-STF 206 generally enables a receiving device to perform AGC and coarse timing and frequency estimation.
- the L-LTF 208 generally enables a receiving device to perform fine timing and frequency estimation and also to estimate the wireless channel.
- the L-SIG 210 generally enables a receiving device to determine a duration of the PDU and use the determined duration to avoid transmitting on top of the PDU.
- the L-STF 206, the L-LTF 208, and the L-SIG 210 may be modulated according to a binary phase shift keying (BPSK) modulation scheme.
- the payload 204 may be modulated according to a BPSK modulation scheme, a quadrature BPSK (Q-BPSK) modulation scheme, a quadrature amplitude modulation (QAM) modulation scheme, or another appropriate modulation scheme.
- the payload 204 may generally carry higher layer data 214, for example, in the form of MPDUs or aggregated MPDUs (A-MPDUs) .
- Fig. 2B shows an example L-SIG field 210 in the PDU of Fig. 2A.
- the L-SIG 210 includes a data rate field 222, a reserved bit 224, a length field 226, a parity bit 228, and a tail field 230.
- the data rate field 222 indicates a data rate (note that the data rate indicated in the data rate field 222 may not be the actual data rate of the data carried in the payload 204) .
- the length field 226 indicates a length of the packet in units of, for example, bytes.
- the parity bit 228 is used to detect bit errors.
- the tail field 230 includes tail bits that are used by the receiving device to terminate operation of a decoder (for example, a Viterbi decoder) .
- the receiving device utilizes the data rate and the length indicated in the data rate field 222 and the length field 226 to determine a duration of the packet in units of, for example, microseconds ( ⁇ s) .
- FIGS. 2A-2B provide examples. Other examples may differ from what is described with regard to Figs. 2A-2B.
- Fig. 3A shows another example PDU 300 usable for wireless communication between an AP and one or more STAs.
- the PDU 300 may be used for SU, OFDMA, or MU-MIMO transmissions.
- the PDU 300 may be formatted as a High Efficiency (HE) WLAN PPDU in accordance with the IEEE 802.11ax amendment to the IEEE 802.11 wireless communication protocol standard.
- the PDU 300 includes a PHY preamble including a legacy portion 302 and a non-legacy portion 304.
- the PDU 300 may further include a PHY payload 306 after the preamble, for example, in the form of a PSDU including a data field 324.
- the legacy portion 302 of the preamble includes an L-STF 308, an L-LTF 310, and an L-SIG 312.
- the non-legacy portion 304 includes a repetition of L-SIG (RL-SIG) 314, a first HE signal field (HE-SIG-A) 316, an HE short training field (HE-STF) 320, and one or more HE long training fields (or symbols) (HE-LTFs) 322.
- the non-legacy portion 304 further includes a second HE signal field (HE-SIG-B) 318 encoded separately from HE-SIG-A316.
- the information in RL-SIG 314 and HE-SIG-A316 may be duplicated and transmitted in each of the component 20 MHz channels in instances involving the use of a bonded channel.
- the content in HE-SIG-B 318 may be unique to each 20 MHz channel and target specific STAs 104.
- RL-SIG 314 may indicate to HE-compatible STAs 104 that the PDU 300 is an HE PPDU.
- An AP 102 may use HE-SIG-A316 to identify and inform multiple STAs 104 that the AP has scheduled uplink (UL) or downlink (DL) resources for them.
- HE-SIG-A316 may include a resource allocation subfield that indicates resource allocations for the identified STAs 104.
- HE-SIG-A316 may be decoded by each HE-compatible STA 104 served by the AP 102.
- HE-SIG-A 316 further includes information usable by each identified STA 104 to decode an associated HE-SIG-B 318.
- HE-SIG-A316 may indicate the frame format, including locations and lengths of HE-SIG-Bs 318, available channel bandwidths and MCSs, among other examples.
- HE-SIG-A316 also may include HE WLAN signaling information usable by STAs 104 other than the identified STAs 104.
- HE-SIG-B 318 may carry STA-specific scheduling information such as, for example, STA-specific (or “user-specific” ) MCS values and STA-specific RU allocation information. In the context of DL MU-OFDMA, such information enables the respective STAs 104 to identify and decode corresponding resource units (RUs) in the associated data field 324.
- Each HE-SIG-B 318 includes a common field and at least one STA-specific field. The common field can indicate RU allocations to multiple STAs 104 including RU assignments in the frequency domain, indicate which RUs are allocated for MU-MIMO transmissions and which RUs correspond to MU-OFDMA transmissions, and the number of users in allocations, among other examples.
- the common field may be encoded with common bits, cyclic redundancy check (CRC) bits, and tail bits.
- CRC cyclic redundancy check
- the user-specific fields are assigned to particular STAs 104 and may be used to schedule specific RUs and to indicate the scheduling to other WLAN devices.
- Each user-specific field may include multiple user block fields.
- Each user block field may include two user fields that contain information for two respective STAs to decode their respective RU payloads in data field 324.
- Fig. 3B shows another example PDU 350 usable for wireless communication between an AP and one or more STAs.
- the PDU 350 may be used for SU, OFDMA, or MU-MIMO transmissions.
- the PDU 350 may be formatted as an Extreme High Throughput (EHT) WLAN PPDU in accordance with the IEEE 802.11be amendment to the IEEE 802.11 wireless communication protocol standard or may be formatted as a PPDU conforming to any later (post-EHT) version of a new wireless communication protocol conforming to a future IEEE 802.11 wireless communication protocol standard or other wireless communication standard.
- the PDU 350 includes a PHY preamble including a legacy portion 352 and a non-legacy portion 354.
- the PDU 350 may further include a PHY payload 356 after the preamble, for example, in the form of a PSDU including a data field 374.
- the legacy portion 352 of the preamble includes an L-STF 358, an L-LTF 360, and an L-SIG 362.
- the non-legacy portion 354 of the preamble includes an RL-SIG 364 and multiple wireless communication protocol version-dependent signal fields after RL-SIG 364.
- the non-legacy portion 354 may include a universal signal field 366 (referred to herein as “U-SIG 366” ) and an EHT signal field 368 (referred to herein as “EHT-SIG 368” ) .
- U-SIG 366 and EHT-SIG 368 may be structured as, and carry version-dependent information for, other wireless communication protocol versions beyond EHT.
- the non-legacy portion 354 further includes an additional short training field 370 (referred to herein as “EHT-STF 370, ” although it may be structured as, and carry version-dependent information for, other wireless communication protocol versions beyond EHT) and one or more additional long training fields 372 (referred to herein as “EHT-LTFs 372, ” although they may be structured as, and carry version-dependent information for, other wireless communication protocol versions beyond EHT) .
- EHT-STF 370 an additional short training field 370
- EHT-LTFs 372 additional long training fields 372
- the information in U-SIG 366 and EHT-SIG 368 may be duplicated and transmitted in each of the component 20 MHz channels in instances involving the use of a bonded channel.
- EHT-SIG 368 may additionally or alternatively carry information in one or more non-primary 20 MHz channels that is different than the information carried in the primary 20 MHz channel.
- EHT-SIG 368 may include one or more jointly encoded symbols and may be encoded in a different block from the block in which U-SIG 366 is encoded. EHT-SIG 368 may be used by an AP to identify and inform multiple STAs 104 that the AP has scheduled UL or DL resources for them. EHT-SIG 368 may be decoded by each compatible STA 104 served by the AP 102. EHT-SIG 368 may generally be used by a receiving device to interpret bits in the data field 374. For example, EHT-SIG 368 may include RU allocation information, spatial stream configuration information, and per-user signaling information such as MCSs, among other examples.
- EHT-SIG 368 may further include a CRC (for example, four bits) and a tail (for example, 6 bits) that may be used for binary convolutional code (BCC) .
- EHT-SIG 368 may include one or more code blocks that each include a CRC and a tail. In some aspects, each of the code blocks may be encoded separately.
- EHT-SIG 368 may carry STA-specific scheduling information such as, for example, user-specific MCS values and user-specific RU allocation information.
- EHT-SIG 368 may generally be used by a receiving device to interpret bits in the data field 374. In the context of DL MU-OFDMA, such information enables the respective STAs 104 to identify and decode corresponding RUs in the associated data field 374.
- Each EHT-SIG 368 may include a common field and at least one user-specific field.
- the common field can indicate RU distributions to multiple STAs 104, indicate the RU assignments in the frequency domain, indicate which RUs are allocated for MU-MIMO transmissions and which RUs correspond to MU-OFDMA transmissions, and the number of users in allocations, among other examples.
- the common field may be encoded with common bits, CRC bits, and tail bits.
- the user-specific fields are assigned to particular STAs 104 and may be used to schedule specific RUs and to indicate the scheduling to other WLAN devices.
- Each user-specific field may include multiple user block fields. Each user block field may include, for example, two user fields that contain information for two respective STAs to decode their respective RU payloads.
- RL-SIG 364 and U-SIG 366 may indicate to EHT-or later version-compliant STAs 104 that the PDU 350 is an EHT PPDU or a PPDU conforming to any later (post-EHT) version of a new wireless communication protocol conforming to a future IEEE 802.11 wireless communication protocol standard.
- U-SIG 366 may be used by a receiving device to interpret bits in one or more of EHT-SIG 368 or the data field 374.
- FIGS. 3A-3B provide some examples. Other examples may differ from what is described with regard to Figs. 3A-3B.
- Fig. 4 is a diagram illustrating an example 400 of accessing a vehicle remotely, in accordance with the present disclosure.
- a vehicle 402 may be locked by an owner 404 of the vehicle 402.
- the vehicle 402 may have an operating system (OS) that hosts applications and functionality of the vehicle 402.
- OS operating system
- the OS may enter a low power mode.
- the low power mode may operate with less power than a power mode when the OS is fully active and/or may operate below a threshold power.
- the OS of the vehicle 402 may awaken and unlock the vehicle 402 or start the vehicle 402 via messaging that occurs in a near-field communication (NFC) mode, messaging, or UWB messaging.
- NFC near-field communication
- the NFC mode may be used to securely unlock the vehicle 402, but the NFC mode only supports limited scenarios.
- Bluetooth messaging may be used to lock or unlock the vehicle 402, remote start the vehicle 402, heat the cabin of the vehicle 402, or provide a location of the vehicle 402, but security is an issue for the Bluetooth personal identification number (PIN) .
- UWB messaging may also lock or unlock the vehicle 402, remote start the vehicle 402, heat the cabin, or provide a location, but additional UWB chipsets are necessary communications involving the vehicle 402.
- the vehicle 402 may be equipped with a mobile station, such as STA 406, for providing Wi-Fi to the owner 404 and other passengers of the vehicle 402.
- a mobile station such as STA 406, for providing Wi-Fi to the owner 404 and other passengers of the vehicle 402.
- the Wi-Fi is not used for such scenarios as locking or unlocking the vehicle 402, remote starting the vehicle 402, heating the cabin, or providing a location of the vehicle 402.
- the vehicle 402 may use Wi-Fi to provide such functionality securely and to handle high-throughput traffic that are not provided by the NFC mode or Bluetooth messaging.
- the STA 406 in the vehicle 402 may provide such functionality securely by scanning for an AP (with a Wi-Fi network profile) while in a low power mode and waking up the OS when an AP response message is received.
- the OS may not be active in the low power mode, but embedded Wi-Fi firmware may remain active. Using Wi-Fi also does not involve the additional chipsets or costs that are necessary for UWB messaging.
- the OS may wake up based at least in part on an authentication associated with the Wi-Fi network profile.
- the STA 406 may be configured to set a scan offload for Wi-Fi based at least in part on the OS entering the low power mode.
- the scan offload e.g., preferred network offload (PNO)
- PNO preferred network offload
- the Wi-Fi firmware may handle security to authorize an AP if the SSID provided by the AP matches the SSID stored at the Wi-Fi firmware.
- the Wi-Fi firmware may perform the scanning and detecting of APs. This may involve transmitting a probe message (e.g., probe request frame) .
- the Wi-Fi firmware may scan for surrounding APs periodically.
- the STA 406 may receive a response message from an AP, such as the AP 408 (e.g., located within a smartphone) of the owner 404. If the response message from the AP 408 matches a network profile stored at the STA 406 and the authentication is successful, the Wi-Fi may attempt to wake up the OS and establish a secure connection to the AP 408. Once the secure connection is established, the owner 404 may use the AP 408 to perform one or more actions that use features of the vehicle 402, such as unlocking or remote starting the vehicle 402.
- an AP such as the AP 408 (e.g., located within a smartphone) of the owner 404.
- the STA 406 may authenticate the AP 408 using a robust security operation, which may include using a security key that is a simultaneous authentication of equals public key (SAE-PK) defined by a Wi-Fi protected access 3 (WPA3) security implementation.
- SAE-PK public key
- WPA3 Wi-Fi protected access 3
- the robust security operation may also use a Rivest-Shamir-Adleman (RSA) key, which may be part of a pair of a public key and a private key used in management action frames to complete authentication.
- the STA 406 may also authenticate the AP 408 using a vendor IE, which includes information that indicates authorized control or ownership of the vehicle 402.
- the owner 404 may use the Wi-Fi functionality of the vehicle 402 to wake up the OS. As a result, the owner 404 may remotely control the vehicle using Wi-Fi and take advantage of security features provided by Wi-Fi without requiring additional hardware. Increased security conserves power, processing resources, and signaling resources that would otherwise be consumed with unauthorized control of the vehicle 402.
- the OS may wake up based at least in part on a service set identifier match, a robust security network authentication, a security key, and/or a public key.
- Such security techniques prevent an unauthorized party 410, with an unauthentic AP 412, from spoofing some information or obtaining control of the vehicle 402.
- the increased security and high throughput provided by Wi-Fi not only improves the operation of the STA 406 but also prevents theft of the vehicle 402 or dangerous situations for the owner 404.
- Fig. 4 is provided as an example. Other examples may differ from what is described with regard to Fig. 4.
- Fig. 5 is a diagram illustrating an example 500 of using Wi-Fi to control actions of a vehicle, in accordance with the present disclosure.
- Example 500 shows the AP 408 (e.g., in a smartphone) of the owner 404 that can communicate with the STA 406 in the vehicle 402.
- the STA 406 may include an OS host 502 that hosts the OS, a Wi-Fi driver 504 that provides Wi-Fi communications for the OS, and an embedded Wi-Fi module 506 that controls the Wi-Fi communications.
- the OS host 502 may be separate from the STA 406.
- the Wi-Fi driver 504 and/or the embedded Wi-Fi module 506 may be configured to use an SSID, key management, a password, a protected channel, a public key generated by an RSA algorithm and/or an SAE-PK credential generator with the STA 406 to secure Wi-Fi communications. These elements may be part of a network profile of the AP 408.
- the owner 404 may park the vehicle 402.
- the vehicle 402 when turned off, may indicate that the OS host 502 is to enter a low power mode. This may include a message to suspend the OS, as shown by reference number 512.
- the OS host 502 may prepare to suspend the OS. This may include closing applications or placing applications in a sleep mode.
- the OS host 502 may transmit a request for the Wi-Fi to enter a low power mode. As shown by reference number 516, the request may include a request to suspend the Wi-Fi.
- the Wi-Fi driver 504 may set a PNO scan offload. This may include transmitting a PNO scan offload message that includes a network profile for the owner 404 and/or the AP 408.
- the message may include one or more other network profiles, such as for family members and/or friends of the owner 404. Each network profile may include IDs, keys, and/or other security information.
- the PNO scan offload may offload control or scan detection functionality from the Wi-Fi driver 504 to the embedded Wi-Fi module 506.
- the PNO scan offload message may include other parameters, such as a dwell time (e.g., 20 milliseconds) of each channel and/or a public key (e.g., generated by an RSA algorithm or an SAE-PK credential generator) of each channel.
- the PNO scan offload message may indicate a limited set of channels to scan (e.g., 1, 6, or 11, rather than more than 100 channels) to conserve energy.
- other applications may configure the limited set of channels for the PNO scan offload.
- the embedded Wi-Fi module 506 may transmit a scan offload success message, as shown by reference number 520.
- the Wi-Fi driver 504 may report to the OS host 502 that the Wi-Fi driver 504 is suspended in a low power mode.
- the OS host may suspend the OS, as shown by reference number 524, and indicate that the OS is suspended, as shown by reference number 526.
- the vehicle 402 may be locked.
- the OS host 502 and the Wi-Fi driver 504 may be asleep or inactive.
- the embedded Wi-Fi module 506 e.g., embedded Wi-Fi firmware
- the embedded Wi-Fi module 506 may remain awake or active to scan for authorized APs.
- the embedded Wi-Fi module 506 may perform a scan loop. As shown by reference number 532, the embedded Wi-Fi module 506 may sleep for N seconds. The power consumption when the embedded Wi-Fi module 506 is in the low power mode may be estimated by dwell time ⁇ (quantity of channels) / (1000 ⁇ N) .
- the embedded Wi-Fi module 506 may then wake up and scan for surrounding APs.
- the embedded Wi-Fi module 506 may transmit one or more probe request frames as part of the scan.
- the scan may be performed while the host OS is inactive and may use a subset of the channels that are normally used when the host OS is active.
- the transmit probe request frames may include information that identifies the vehicle 402, a network profile for the vehicle 402, and/or a vendor IE that is specific to the owner 404 and/or the vehicle 402.
- the embedded Wi-Fi module 506 may use a security key, such as an RSA private key or a private key associated with an SAE-PK network.
- the embedded Wi-Fi module 506 may receive a probe response message from an AP, such as from the AP 408.
- the AP 408 may be a preferred AP. If a preferred AP is found, as shown by reference number 536, the embedded Wi-Fi module 506 may proceed with authentication. If a preferred AP is not found, the scan loop may begin again.
- the AP 408 and other APs may transmit (e.g., broadcast) beacon messages.
- the beacon messages may indicate the presence of an AP to a STA.
- the beacon messages may include the vendor IE or vendor information from the vendor IE.
- the beacon messages may also include security information, such as an SSID or a security method indication.
- the AP 408 may generate a pair of a public key and a private key for authentication.
- the embedded Wi-Fi module 506 may attempt to authenticate the AP 408.
- the embedded Wi-Fi module 506 may authenticate the AP 408 using an RSA public key, using an SAE-PK (e.g., SAE-PK bit 6 set to 1) , if an SSID in the probe response message matches (e.g., is the same as) an SSID of the network profile (or another authorized network profile) , if information in the vendor IE matches stored vendor information, or any combination thereof.
- SAE-PK e.g., SAE-PK bit 6 set to 1
- Vendor information in the vendor IE may include an IE ID field (e.g., one octet) with a value of 0xDD, for example, that is vendor-specific.
- the vendor information may also include a length field (e.g., two octets) that indicates a length of the vendor IE, an organizationally unique identifier (OUI) field (e.g., three octets) , a type field (e.g., one octet) , and/or a payload length field (e.g., two octets) that indicates a length of the payload.
- a length field e.g., two octets
- UUI organizationally unique identifier
- type field e.g., one octet
- payload length field e.g., two octets
- the vendor information may include a subtype field (e.g., one octet) , such as a value of 0 to 3 for RSA. More specifically, a subtype value of 0 may indicate a broadcast in beacon frames from the AP 408 or a probe response. A subtype value of 1 may indicate a STA request to authenticate an AP, a subtype value of 2 may indicate an AP response associated with an authentication result, a subtype of 3 may indicate STA active scan use that is attached in a probe request. A subtype of 4 may be used for SAE-PK and may indicate a broadcast in beacon frame, a probe response, or use with a probe request.
- a subtype field e.g., one octet
- a subtype value of 0 may indicate a broadcast in beacon frames from the AP 408 or a probe response.
- a subtype value of 1 may indicate a STA request to authenticate an AP
- a subtype value of 2 may indicate an AP response
- Vendor information may include a payload (e.g., variable quantity of octets) that includes data.
- a payload e.g., variable quantity of octets
- the payload length may be set to 0.
- a subtype set to 1 may indicate encryption with a MAC element (e.g., PK, A + STA MAC) .
- a subtype set to 2 may indicate a message-digest algorithm 5 (MD5) code of (A+ STA MAC) .
- the MD5 code may be 128-bit hash that is represented by a 32-digit hexadecimal.
- the payload length may be set to 0.
- the embedded Wi-Fi module 506 may, as shown by reference number 542, transmit a message to wake up the OS host 502 (and the Wi-Fi driver 504) . As shown by reference number 544, the OS host 502 may wake up. If an AP is not authenticated, the scan loop may begin again. As shown by reference number 546, the OS host 502 may establish a connection between the AP 408 and the vehicle 402 (e.g., the OS host 502 or the STA 406 more generally) . The connection may be a Wi-Fi connection.
- the STA 406 may grant permission for control of the vehicle to the AP 408.
- the AP 408 may cause the vehicle 402 to perform an action.
- The may include transmitting an instruction message.
- the action may include causing the vehicle 402 to unlock the vehicle 402, start the vehicle 402, set a climate control feature of the vehicle 402, play music, provide status information, provide a location, lower or raise windows, open a trunk door, turn on or off lights, drive to the owner, park, proceed to an indicated destination, or other actions that involve the vehicle 402.
- the AP 408 may transmit an instruction message that indicates an action the vehicle 402 is to perform.
- another user with another AP may be authenticated by the embedded Wi-Fi module 506 if the user has a network profile that is authorized for use by the owner 404.
- the owner 404 may have family members with other authorized network profiles that use the vendor IE and any security keys
- the owner 404 may have better security and allow for high data throughput.
- High data throughput may be used for motion detection, mirror casting, video entertainment, and file transfers between the AP 408 and the STA 406. Multiple vehicles keys or NFC cards may be avoided, which reduces costs. Because Wi-Fi is used for scanning for APs when the OS is in a low power mode, the vehicle 402 may also conserve power.
- Fig. 5 is provided as an example. Other examples may differ from what is described with regard to Fig. 5.
- Fig. 6 is a diagram illustrating an example 600 of using an SAE-PK to authenticate an AP, in accordance with the present disclosure.
- the STA 406 may use an SAE-PK to authenticate the AP 408 or any other AP.
- the AP 408 may transmit in a beacon or another message, a vendor IE and the SAE-PK.
- the beacon or message may also indicate an indication that the AP 408 is able to use a solution such as Wi-Fi to perform an action (e.g., unlock the vehicle 402) .
- the STA 406 may transmit a message such as an SAE commit message with a status code (e.g., 127 for an SAE-PK) .
- the AP 408 may transmit an SAE commit message.
- the STA 406 may transmit an SAE confirm message.
- a key-encryption-key (KEK) may be derived.
- the STA 406 may decrypt the modifier using the KEK, marked as M.
- the AP 408 may transmit an SAE confirm message with an SAE-PK (e.g., signature, public key, modifier encrypted by KEK) .
- SAE-PK e.g., signature, public key, modifier encrypted by KEK
- Example 600 also shows other information that may be used for verification (e.g., keyseed, key confirmation key (KCK) , platform-managed key (PMK) , KEK) .
- the STA 406 may restore Fingerprint2 from a password. The STA 406 may then compare the two fingerprints. If they are the same, this means the public key is correct.
- the STA 406 may use the public key to verify the signature. Success means the AP 408 is able to control the vehicle 402. Failure means that control is rejected, and the STA 406 may temporarily add the AP to a blacklist.
- the STA 406 may use the SAE-PK to ensure that the STA 406 connects to an authorized AP for the purpose of controlling the vehicle 402.
- Fig. 6 is provided as an example. Other examples may differ from what is described with regard to Fig. 6.
- Fig. 7 is a diagram illustrating an example 700 of using an RSA algorithm to authenticate an AP, in accordance with the present disclosure.
- the STA 406 may use an RSA algorithm to authenticate the AP 408 or any other AP. As shown by reference number 702, the STA 406 may have obtained the AP 408’s public key prior to authentication. The owner 404 of the vehicle 402 may use an RSA algorithm to generate a pair of keys, a public key and a private key. The STA 406 may obtain the public key by scanning a quick response (QR) code or by receiving the public key from the network and saving the public key to a non-transitory disk.
- QR quick response
- An authentication procedure based on the RSA algorithm may include the STA 406 transmitting a management action frame that includes a vendor IE, as shown by reference number 704.
- the STA 406 may generate a random non-zero string A, concatenate A with an STA MAC address, where the total length is limited to a proper value (e.g., 32 or 64 bytes) .
- the STA 406 may use the public key to encrypt (A+ STA MAC) and attach the encrypted (A+ STA MAC) to a vendor IE.
- the management frame may act as an authentication request.
- the AP 408 may decrypt the management action frame using the private key.
- the AP 408 may use the private key to decrypt the management action frame. If successful, the authentication procedure may continue.
- the AP 408 may parse (A+ STA MAC) , calculate its MD5 code and attach the MD5 code to the vendor IE.
- the AP 408 may transmit a management action frame that includes the vendor IE, as an authentication response.
- the STA 406 may check the response (e.g., check MD5 code) and indicate whether authentication is successful, as shown by reference number 710. If the authentication fails for an AP, the STA 406 may temporarily add the AP to a blacklist.
- Fig. 7 is provided as an example. Other examples may differ from what is described with regard to Fig. 7.
- Fig. 8 is a diagram illustrating an example process 800 performed, for example, by a mobile station, in accordance with the present disclosure.
- Example process 800 is an example where the mobile station (e.g., STA 140, STA 406) performs operations associated with using Wi-Fi to control a vehicle.
- the mobile station e.g., STA 140, STA 406
- process 800 may include setting a scan offload for Wi-Fi based at least in part on an OS of the mobile station entering a low power mode (block 810) .
- the mobile station e.g., using communication manager 1008 and/or scan component 1010 depicted in Fig. 10) may set a scan offload for Wi-Fi based at least in part on an OS of the mobile station entering a low power mode, as described above.
- process 800 may include transmitting a probe message to scan for APs using a Wi-Fi network profile (block 820) .
- the mobile station e.g., using communication manager 1008 and/or transmission component 1004 depicted in Fig. 10) may transmit a probe message to scan for APs using a Wi-Fi network profile, as described above.
- process 800 may include receiving a response message from an AP (block 830) .
- the mobile station e.g., using communication manager 1008 and/or reception component 1002 depicted in Fig. 10) may receive a response message from an AP, as described above.
- process 800 may include waking up the OS based at least in part on receiving the response message from the AP (block 840) .
- the mobile station e.g., using communication manager 1008 and/or OS component 1012 depicted in Fig. 10) may wake up the OS based at least in part on receiving the response message from the AP, as described above.
- Process 800 may include additional aspects, such as any single aspect or any combination of aspects described below and/or in connection with one or more other processes described elsewhere herein.
- the mobile station is associated with a vehicle
- process 800 includes receiving an instruction message to perform an action, and causing the vehicle to perform the action based at least in part on the instruction message.
- the mobile station is associated with a vehicle
- process 800 includes receiving an instruction message to unlock one or more doors of the vehicle, and causing one or more doors to be unlocked based at least in part on the instruction message.
- the mobile station is associated with a vehicle
- process 800 includes receiving an instruction message to start the vehicle, and causing the vehicle to start based at least in part on the instruction message.
- transmitting the probe message includes scanning, while the OS is inactive, a subset of channels from among channels that are used when the OS is active.
- waking up the OS includes waking up the OS further based at least in part on a service set identifier match.
- waking up the OS includes waking up the OS further based at least in part on a robust security network authentication.
- waking up the OS includes waking up the OS further based at least in part on an authentication using a security key.
- the security key is a public key that is associated with an SAE-PK network.
- the security key is an RSA public key.
- waking up the OS includes waking up the OS further based at least in part on a vendor IE that indicates ownership or authorized control of the mobile station.
- the Wi-Fi network profile is one of multiple authorized network profiles that are authorized for the mobile station.
- process 800 may include additional blocks, fewer blocks, different blocks, or differently arranged blocks than those depicted in Fig. 8. Additionally, or alternatively, two or more of the blocks of process 800 may be performed in parallel.
- Fig. 9 is a diagram illustrating an example process 900 performed, for example, by an AP, in accordance with the present disclosure.
- Example process 900 is an example where the AP (e.g., AP 120, AP 408) performs operations associated with using Wi-Fi to control a vehicle.
- the AP e.g., AP 120, AP 408 performs operations associated with using Wi-Fi to control a vehicle.
- process 900 may include exchanging a public key with a mobile station (block 910) .
- the AP e.g., using communication manager 1108 and/or security component 1110 depicted in Fig. 11
- process 900 may include receiving, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile (block 920) .
- the AP e.g., using communication manager 1108 and/or reception component 1102 depicted in Fig. 11
- process 900 may include transmitting a response message that uses a security key and that includes a vendor IE that indicates ownership or authorized control of the mobile station (block 930) .
- the AP e.g., using communication manager 1108 and/or transmission component 1104 depicted in Fig. 11
- Process 900 may include additional aspects, such as any single aspect or any combination of aspects described below and/or in connection with one or more other processes described elsewhere herein.
- the mobile station is associated with a vehicle, and process 900 includes transmitting an instruction message for the vehicle to perform the action.
- the mobile station is associated with a vehicle, and process 900 includes transmitting an instruction message to unlock one or more doors of the vehicle.
- the mobile station is associated with a vehicle, and process 900 includes transmitting an instruction message to start the vehicle.
- the security key is a public key that is associated with an SAE-PK network.
- the security key is an RSA private key.
- process 900 may include additional blocks, fewer blocks, different blocks, or differently arranged blocks than those depicted in Fig. 9. Additionally, or alternatively, two or more of the blocks of process 900 may be performed in parallel.
- Fig. 10 is a diagram of an example apparatus 1000 for wireless communication, in accordance with the present disclosure.
- the apparatus 1000 may be a mobile station (e.g., STA 140, STA 406) , or a mobile station may include the apparatus 1000.
- the apparatus 1000 includes a reception component 1002 and a transmission component 1004, which may be in communication with one another (for example, via one or more buses and/or one or more other components) .
- the apparatus 1000 may communicate with another apparatus 1006 (such as a UE, a mobile station, an AP, a base station, or another wireless communication device) using the reception component 1002 and the transmission component 1004.
- the apparatus 1000 may include the communication manager 1008.
- the communication manager 1008 may control and/or otherwise manage one or more operations of the reception component 1002 and/or the transmission component 1004.
- the communication manager 1008 may include one or more antennas, a modem, a controller/processor, a memory, or a combination thereof, of the STA described in connection with Figs. 1A and 1D.
- the communication manager 1008 may be, or be similar to, the communication manager 156 depicted in Fig. 1D.
- the communication manager 1008 may be configured to perform one or more of the functions described as being performed by the communication manager 156.
- the communication manager 1008 may include the reception component 1002 and/or the transmission component 1004.
- the communication manager 1008 may include one or more of scan component 1010 and/or an OS component 1012, among other examples.
- the apparatus 1000 may be configured to perform one or more operations described herein in connection with Figs. 1-7. Additionally, or alternatively, the apparatus 1000 may be configured to perform one or more processes described herein, such as process 800 of Fig. 8.
- the apparatus 1000 and/or one or more components shown in Fig. 10 may include one or more components of the mobile station described in connection with Fig. 2. Additionally, or alternatively, one or more components shown in Fig. 10 may be implemented within one or more components described in connection with Fig. 2. Additionally, or alternatively, one or more components of the set of components may be implemented at least in part as software stored in a memory. For example, a component (or a portion of a component) may be implemented as instructions or code stored in a non-transitory computer-readable medium and executable by a controller or a processor to perform the functions or operations of the component.
- the reception component 1002 may receive communications, such as reference signals, control information, data communications, or a combination thereof, from the apparatus 1006.
- the reception component 1002 may provide received communications to one or more other components of the apparatus 1000.
- the reception component 1002 may perform signal processing on the received communications (such as filtering, amplification, demodulation, analog-to-digital conversion, demultiplexing, deinterleaving, de-mapping, equalization, interference cancellation, or decoding, among other examples) , and may provide the processed signals to the one or more other components of the apparatus 1000.
- the reception component 1002 may include one or more antennas, a modem, a demodulator, a MIMO detector, a receive processor, a controller/processor, a memory, or a combination thereof, of the mobile station described in connection with Fig. 2.
- the transmission component 1004 may transmit communications, such as reference signals, control information, data communications, or a combination thereof, to the apparatus 1006.
- one or more other components of the apparatus 1000 may generate communications and may provide the generated communications to the transmission component 1004 for transmission to the apparatus 1006.
- the transmission component 1004 may perform signal processing on the generated communications (such as filtering, amplification, modulation, digital-to-analog conversion, multiplexing, interleaving, mapping, or encoding, among other examples) , and may transmit the processed signals to the apparatus 1006.
- the transmission component 1004 may include one or more antennas, a modem, a modulator, a transmit MIMO processor, a transmit processor, a controller/processor, a memory, or a combination thereof, of the mobile station described in connection with Fig. 2. In some aspects, the transmission component 1004 may be co-located with the reception component 1002 in a transceiver.
- the scan component 1010 may set a scan offload for Wi-Fi based at least in part on an OS of the mobile station entering a low power mode.
- the transmission component 1004 may transmit a probe message to scan for APs using a Wi-Fi network profile.
- the reception component 1002 may receive a response message from an AP.
- the OS component 1012 may wake up the OS based at least in part on receiving the response message from the AP.
- Fig. 10 The number and arrangement of components shown in Fig. 10 are provided as an example. In practice, there may be additional components, fewer components, different components, or differently arranged components than those shown in Fig. 10. Furthermore, two or more components shown in Fig. 10 may be implemented within a single component, or a single component shown in Fig. 10 may be implemented as multiple, distributed components. Additionally, or alternatively, a set of (one or more) components shown in Fig. 10 may perform one or more functions described as being performed by another set of components shown in Fig. 10.
- Fig. 11 is a diagram of an example apparatus 1100 for wireless communication, in accordance with the present disclosure.
- the apparatus 1100 may be an AP (e.g., AP 120, AP 408) , or an AP may include the apparatus 1100.
- the apparatus 1100 may communicate with another apparatus 1106 (such as a UE, a mobile station, an AP, a base station, or another wireless communication device) using the reception component 1102 and the transmission component 1104.
- the apparatus 1000 may include the communication manager 1108.
- the communication manager 1108 may control and/or otherwise manage one or more operations of the reception component 1102 and/or the transmission component 1104.
- the communication manager 1108 may include one or more antennas, a modem, a controller/processor, a memory, or a combination thereof, of the AP described in connection with Figs. 1A and 1C.
- the communication manager 1108 may be, or be similar to, the communication manager 132 depicted in Fig. 1C.
- the communication manager 1108 may be configured to perform one or more of the functions described as being performed by the communication manager 132.
- the communication manager 1108 may include the reception component 1102 and/or the transmission component 1104.
- the communication manager 1108 may include a security component 1110, among other examples.
- the apparatus 1100 may be configured to perform one or more operations described herein in connection with Figs. 1-7. Additionally, or alternatively, the apparatus 1100 may be configured to perform one or more processes described herein, such as process 900 of Fig. 9.
- the apparatus 1100 and/or one or more components shown in Fig. 11 may include one or more components of the AP described in connection with Fig. 2. Additionally, or alternatively, one or more components shown in Fig. 11 may be implemented within one or more components described in connection with Fig. 2. Additionally, or alternatively, one or more components of the set of components may be implemented at least in part as software stored in a memory. For example, a component (or a portion of a component) may be implemented as instructions or code stored in a non-transitory computer-readable medium and executable by a controller or a processor to perform the functions or operations of the component.
- the reception component 1102 may receive communications, such as reference signals, control information, data communications, or a combination thereof, from the apparatus 1106.
- the reception component 1102 may provide received communications to one or more other components of the apparatus 1100.
- the reception component 1102 may perform signal processing on the received communications (such as filtering, amplification, demodulation, analog-to-digital conversion, demultiplexing, deinterleaving, de-mapping, equalization, interference cancellation, or decoding, among other examples) , and may provide the processed signals to the one or more other components of the apparatus 1100.
- the reception component 1102 may include one or more antennas, a modem, a demodulator, a MIMO detector, a receive processor, a controller/processor, a memory, or a combination thereof, of the AP described in connection with Fig. 2.
- the transmission component 1104 may transmit communications, such as reference signals, control information, data communications, or a combination thereof, to the apparatus 1106.
- one or more other components of the apparatus 1100 may generate communications and may provide the generated communications to the transmission component 1104 for transmission to the apparatus 1106.
- the transmission component 1104 may perform signal processing on the generated communications (such as filtering, amplification, modulation, digital-to-analog conversion, multiplexing, interleaving, mapping, or encoding, among other examples) , and may transmit the processed signals to the apparatus 1106.
- the transmission component 1104 may include one or more antennas, a modem, a modulator, a transmit MIMO processor, a transmit processor, a controller/processor, a memory, or a combination thereof, of the AP described in connection with Fig. 2. In some aspects, the transmission component 1104 may be co-located with the reception component 1102 in a transceiver.
- the security component 1110 may exchange a public key with a mobile station.
- the reception component 1102 may receive, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile.
- the transmission component 1104 may transmit a response message that uses a security key and that includes a vendor IE that indicates ownership or authorized control of the mobile station.
- Fig. 11 The number and arrangement of components shown in Fig. 11 are provided as an example. In practice, there may be additional components, fewer components, different components, or differently arranged components than those shown in Fig. 11. Furthermore, two or more components shown in Fig. 11 may be implemented within a single component, or a single component shown in Fig. 11 may be implemented as multiple, distributed components. Additionally, or alternatively, a set of (one or more) components shown in Fig. 11 may perform one or more functions described as being performed by another set of components shown in Fig. 11.
- a method of wireless communication performed by a mobile station comprising: setting a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode; transmitting a probe message to scan for access points (APs) using a Wi-Fi network profile; receiving a response message from an AP; and waking up the operating system based at least in part on receiving the response message from the AP.
- APs access points
- Aspect 2 The method of Aspect 1, wherein the mobile station is associated with a vehicle, and wherein the method further comprises: receiving an instruction message to perform an action; and causing the vehicle to perform the action based at least in part on the instruction message.
- Aspect 3 The method of any of Aspects 1-2, wherein the mobile station is associated with a vehicle, and wherein the method further comprises: receiving an instruction message to unlock one or more doors of the vehicle; and causing one or more doors to be unlocked based at least in part on the instruction message.
- Aspect 4 The method of any of Aspects 1-3, wherein the mobile station is associated with a vehicle, and wherein the method further comprises: receiving an instruction message to start the vehicle; and causing the vehicle to start based at least in part on the instruction message.
- Aspect 5 The method of any of Aspects 1-4, wherein transmitting the probe message includes scanning, while the operating system is inactive, a subset of channels from among channels that are used when the operating system is active.
- Aspect 6 The method of any of Aspects 1-5, wherein waking up the operating system includes waking up the operating system further based at least in part on a service set identifier match.
- Aspect 7 The method of any of Aspects 1-6, wherein waking up the operating system includes waking up the operating system further based at least in part on a robust security network authentication.
- Aspect 8 The method of any of Aspects 1-7, wherein waking up the operating system includes waking up the operating system further based at least in part on an authentication using a security key.
- Aspect 9 The method of Aspect 8, wherein the security key is a public key that is associated with a simultaneous authentication of equals public key (SAE-PK) network.
- SAE-PK public key
- Aspect 10 The method of Aspect 8, wherein the security key is a Rivest-Shamir-Adleman (RSA) public key.
- RSA Rivest-Shamir-Adleman
- Aspect 11 The method of any of Aspects 1-10, wherein waking up the operating system includes waking up the operating system further based at least in part on a vendor information element that indicates ownership or authorized control of the mobile station.
- Aspect 12 The method of any of Aspects 1-11, wherein the Wi-Fi network profile is one of multiple authorized network profiles that are authorized for the mobile station.
- a method of wireless communication performed by an access point (AP) comprising: exchanging a public key with a mobile station; receiving, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile; and transmitting a response message that uses a security key and that includes a vendor information element (IE) that indicates ownership or authorized control of the mobile station.
- AP access point
- Aspect 14 The method of Aspect 13, wherein the mobile station is associated with a vehicle, and wherein the method further comprises transmitting an instruction message for the vehicle to perform the action.
- Aspect 15 The method of any of Aspects 13-14, wherein the mobile station is associated with a vehicle, and wherein the method further comprises transmitting an instruction message to unlock one or more doors of the vehicle.
- Aspect 16 The method of any of Aspects 13-15, wherein the mobile station is associated with a vehicle, and wherein the method further comprises transmitting an instruction message to start the vehicle.
- Aspect 17 The method of any of Aspects 13-16, wherein the security key is a public key that is associated with a simultaneous authentication of equals public key (SAE-PK) network.
- SAE-PK public key
- Aspect 18 The method of any of Aspects 13-17, wherein the security key is a Rivest-Shamir-Adleman (RSA) private key.
- RSA Rivest-Shamir-Adleman
- Aspect 19 An apparatus for wireless communication at a device, comprising a processor; memory coupled with the processor; and instructions stored in the memory and executable by the processor to cause the apparatus to perform the method of one or more of Aspects 1-18.
- Aspect 20 A device for wireless communication, comprising a memory and one or more processors coupled to the memory, the one or more processors configured to perform the method of one or more of Aspects 1-18.
- Aspect 21 An apparatus for wireless communication, comprising at least one means for performing the method of one or more of Aspects 1-18.
- Aspect 22 A non-transitory computer-readable medium storing code for wireless communication, the code comprising instructions executable by a processor to perform the method of one or more of Aspects 1-18.
- Aspect 23 A non-transitory computer-readable medium storing a set of instructions for wireless communication, the set of instructions comprising one or more instructions that, when executed by one or more processors of a device, cause the device to perform the method of one or more of Aspects 1-18.
- the term “component” is intended to be broadly construed as hardware and/or a combination of hardware and software.
- “Software” shall be construed broadly to mean instructions, instruction sets, code, code segments, program code, programs, subprograms, software modules, applications, software applications, software packages, routines, subroutines, objects, executables, threads of execution, procedures, and/or functions, among other examples, whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise.
- a “processor” is implemented in hardware and/or a combination of hardware and software. It will be apparent that systems and/or methods described herein may be implemented in different forms of hardware and/or a combination of hardware and software.
- satisfying a threshold may, depending on the context, refer to a value being greater than the threshold, greater than or equal to the threshold, less than the threshold, less than or equal to the threshold, equal to the threshold, not equal to the threshold, or the like.
- “at least one of: a, b, or c” is intended to cover a, b, c, a + b, a + c, b + c, and a + b + c, as well as any combination with multiples of the same element (e.g., a + a, a + a + a, a + a + b, a + a + c, a + b + b, a + c + c, b + b, b + b + b, b + b + c, c + c, and c + c + c, or any other ordering of a, b, and c) .
- the terms “has, ” “have, ” “having, ” or the like are intended to be open-ended terms that do not limit an element that they modify (e.g., an element “having” A may also have B) .
- the phrase “based on” is intended to mean “based, at least in part, on” unless explicitly stated otherwise.
- the term “or” is intended to be inclusive when used in a series and may be used interchangeably with “and/or, ” unless explicitly stated otherwise (e.g., if used in combination with “either” or “only one of” ) .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a mobile station may set a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode. The mobile station may transmit a probe message to scan for access points (APs) using a Wi-Fi network profile. The mobile station may receive a response message from an AP. The mobile station may wake up the operating system based at least in part on receiving the response message from the AP. Numerous other aspects are described.
Description
FIELD OF THE DISCLOSURE
Aspects of the present disclosure generally relate to wireless communication and to techniques and apparatuses for waking up a mobile station using Wi-Fi.
A wireless local area network (WLAN) may be formed by one or more access points (APs) that provide a shared wireless communication medium for use by a number of client devices, also referred to as stations (STAs) . The basic building block of a WLAN conforming to the Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards is a Basic Service Set (BSS) , which is managed by an AP. Each BSS is identified by a Basic Service Set Identifier (BSSID) that is advertised by the AP. An AP periodically broadcasts beacon frames to enable any STAs within a wireless range of the AP to establish or maintain a communication link with the WLAN.
To improve data throughput, the AP may communicate with one or more STAs over multiple concurrent communication links. Each of the communication links may be of various bandwidths, for example, by bonding a number of 20 MHz-wide channels together to form 40 MHz-wide channels, 80 MHz-wide channels, or 160 MHz-wide channels. The AP may establish BSSs on any of the different communication links, and therefore it is desirable to improve communication between the AP and the one or more STAs over each of the communication links.
SUMMARY
Some aspects described herein relate to a method of wireless communication performed by a mobile station. The method may include setting a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode. The method may include transmitting a probe message to scan for access points (APs) using a Wi-Fi network profile. The method may include receiving a response message from an AP. The method may include waking up the operating system based at least in part on receiving the response message from the AP.
Some aspects described herein relate to a method of wireless communication performed by an AP. The method may include exchanging a public key with a mobile station. The method may include receiving, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile. The method may include transmitting a response message that uses a security key and that includes a vendor information element (IE) that indicates ownership or authorized control of the mobile station.
Some aspects described herein relate to a mobile station for wireless communication. The mobile station may include a memory and one or more processors coupled to the memory. The one or more processors may be configured to set a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode. The one or more processors may be configured to transmit a probe message to scan for APs using a Wi-Fi network profile. The one or more processors may be configured to receive a response message from an AP. The one or more processors may be configured to wake up the operating system based at least in part on receiving the response message from the AP.
Some aspects described herein relate to an AP for wireless communication. The access point may include a memory and one or more processors coupled to the memory. The one or more processors may be configured to exchange a public key with a mobile station. The one or more processors may be configured to receive, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile. The one or more processors may be configured to transmit a response message that uses a security key and that includes a vendor IE that indicates ownership or authorized control of the mobile station.
Some aspects described herein relate to a non-transitory computer-readable medium that stores a set of instructions for wireless communication by a mobile station. The set of instructions, when executed by one or more processors of the mobile station, may cause the mobile station to set a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode. The set of instructions, when executed by one or more processors of the mobile station, may cause the mobile station to transmit a probe message to scan for APs using a Wi-Fi network profile. The set of instructions, when executed by one or more processors of the mobile station, may cause the mobile station to receive a response message from an AP. The set of instructions, when executed by one or more processors of the mobile station, may
cause the mobile station to wake up the operating system based at least in part on receiving the response message from the AP.
Some aspects described herein relate to a non-transitory computer-readable medium that stores a set of instructions for wireless communication by an AP. The set of instructions, when executed by one or more processors of the AP, may cause the AP to exchange a public key with a mobile station. The set of instructions, when executed by one or more processors of the AP, may cause the AP to receive, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile. The set of instructions, when executed by one or more processors of the AP, may cause the AP to transmit a response message that uses a security key and that includes a vendor IE that indicates ownership or authorized control of the mobile station.
Some aspects described herein relate to an apparatus for wireless communication. The apparatus may include means for setting a scan offload for Wi-Fi based at least in part on an operating system of the apparatus entering a low power mode. The apparatus may include means for transmitting a probe message to scan for APs using a Wi-Fi network profile. The apparatus may include means for receiving a response message from an AP. The apparatus may include means for waking up the operating system based at least in part on receiving the response message from the AP.
Some aspects described herein relate to an apparatus for wireless communication. The apparatus may include means for exchanging a public key with a mobile station. The apparatus may include means for receiving, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile. The apparatus may include means for transmitting a response message that uses a security key and that includes a vendor IE that indicates ownership or authorized control of the mobile station.
Aspects generally include a method, apparatus, system, computer program product, non-transitory computer-readable medium, user equipment, station, AP, wireless communication device, and/or processing system as substantially described herein with reference to and as illustrated by the drawings and specification.
The foregoing has outlined rather broadly the features and technical advantages of examples according to the disclosure in order that the detailed description that follows may be better understood. Additional features and advantages will be described hereinafter. The conception and specific examples disclosed may be readily
utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present disclosure. Such equivalent constructions do not depart from the scope of the appended claims. Characteristics of the concepts disclosed herein, both their organization and method of operation, together with associated advantages, will be better understood from the following description when considered in connection with the accompanying figures. Each of the figures is provided for the purposes of illustration and description, and not as a definition of the limits of the claims.
While aspects are described in the present disclosure by illustration to some examples, those skilled in the art will understand that such aspects may be implemented in many different arrangements and scenarios. Techniques described herein may be implemented using different platform types, devices, systems, shapes, sizes, and/or packaging arrangements. For example, some aspects may be implemented via integrated chip embodiments or other non-module-component based devices (e.g., end-user devices, vehicles, communication devices, computing devices, industrial equipment, retail/purchasing devices, medical devices, and/or artificial intelligence devices) . Aspects may be implemented in chip-level components, modular components, non-modular components, non-chip-level components, device-level components, and/or system-level components. Devices incorporating described aspects and features may include additional components and features for implementation and practice of claimed and described aspects. For example, transmission and reception of wireless signals may include one or more components for analog and digital purposes (e.g., hardware components including antennas, radio frequency (RF) chains, power amplifiers, modulators, buffers, processors, interleavers, adders, and/or summers) . It is intended that aspects described herein may be practiced in a wide variety of devices, components, systems, distributed arrangements, and/or end-user devices of varying size, shape, and constitution.
So that the above-recited features of the present disclosure can be understood in detail, a more particular description, briefly summarized above, may be had by reference to aspects, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only certain typical aspects of this disclosure and are therefore not to be considered limiting of its scope, for the
description may admit to other equally effective aspects. The same reference numbers in different drawings may identify the same or similar elements.
Fig. 1A is a diagram illustrating an example of a wireless communication network, in accordance with the present disclosure.
Fig. 1B shows a block diagram of an example wireless communication device, in accordance with the present disclosure.
Fig. 1C shows a block diagram of an example access point (AP) , in accordance with the present disclosure.
Fig. 1D shows a block diagram of an example station (STA) , in accordance with the present disclosure.
Fig. 2A shows an example protocol data unit (PDU) usable for communications between an AP and a number of STAs, in accordance with the present disclosure.
Fig. 2B shows an example field in the PDU of Fig. 2A, in accordance with the present disclosure.
Fig. 3A shows another example PDU usable for communications between an AP and one or more STAs, in accordance with the present disclosure.
Fig. 3B shows another example PDU usable for communications between an AP and one or more STAs, in accordance with the present disclosure.
Fig. 4 is a diagram illustrating an example of accessing a vehicle remotely, in accordance with the present disclosure.
Fig. 5 is a diagram illustrating an example of using Wi-Fi to control actions of a vehicle, in accordance with the present disclosure.
Fig. 6 is a diagram illustrating an example of using a simultaneous authentication of equals public key (SAE-PK) to authenticate an AP, in accordance with the present disclosure.
Fig. 7 is a diagram illustrating an example of using a Rivest-Shamir-Adleman (RSA) algorithm to authenticate an AP, in accordance with the present disclosure.
Fig. 8 is a diagram illustrating an example process performed, for example, by a mobile station, in accordance with the present disclosure.
Fig. 9 is a diagram illustrating an example process performed, for example, by an AP, in accordance with the present disclosure.
Fig. 10 is a diagram of an example apparatus for wireless communication, in accordance with the present disclosure.
Fig. 11 is a diagram of an example apparatus for wireless communication, in accordance with the present disclosure.
The following description is directed to certain implementations for the purposes of describing innovative aspects of this disclosure. However, a person having ordinary skill in the art will readily recognize that the teachings herein can be applied in a multitude of different ways. The described implementations can be implemented in any device, system, or network that is capable of transmitting and receiving radio frequency (RF) signals according to one or more of the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standards, the IEEE 802.15 standards, the standards as defined by the Bluetooth Special Interest Group (SIG) , or the Long Term Evolution (LTE) , 3G, 4G or 5G (New Radio (NR) ) standards promulgated by the 3rd Generation Partnership Project (3GPP) , among others. The described implementations can be implemented in any device, system or network that is capable of transmitting and receiving RF signals according to one or more of the following technologies or techniques: code division multiple access (CDMA) , time division multiple access (TDMA) , frequency division multiple access (FDMA) , orthogonal FDMA (OFDMA) , single-carrier FDMA (SC-FDMA) , single-user (SU) multiple-input multiple-output (MIMO) , and multi-user (MU) MIMO. The described implementations also can be implemented using other wireless communication protocols or RF signals suitable for use in one or more of a wireless personal area network (WPAN) , a wireless local area network (WLAN) , a wireless wide area network (WWAN) , or an internet of things (IOT) network.
Various aspects of the disclosure are described more fully hereinafter with reference to the accompanying drawings. This disclosure may, however, be embodied in many different forms and should not be construed as limited to any specific structure or function presented throughout this disclosure. Rather, these aspects are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art. One skilled in the art should appreciate that the scope of the disclosure is intended to cover any aspect of the disclosure disclosed herein, whether implemented independently of or combined with any other aspect of the disclosure. For example, an apparatus may be implemented or a method may be
practiced using any number of the aspects set forth herein. In addition, the scope of the disclosure is intended to cover such an apparatus or method which is practiced using other structure, functionality, or structure and functionality in addition to or other than the various aspects of the disclosure set forth herein. It should be understood that any aspect of the disclosure disclosed herein may be embodied by one or more elements of a claim.
Several aspects of telecommunication systems will now be presented with reference to various apparatuses and techniques. These apparatuses and techniques will be described in the following detailed description and illustrated in the accompanying drawings by various blocks, modules, components, circuits, steps, processes, algorithms, or the like (collectively referred to as “elements” ) . These elements may be implemented using hardware, software, or combinations thereof. Whether such elements are implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system.
While aspects may be described herein using terminology commonly associated with IEEE standards (e.g., IEEE 802) or 5G or NR radio access technology (RAT) , aspects of the present disclosure can be applied to other RATs, such as ultra-wideband (UWB) technologies, a 3G RAT, a 4G RAT, and/or a RAT subsequent to 5G (e.g., 6G) .
Fig. 1A shows a block diagram of an example wireless communication network 100. According to some aspects, the wireless communication network 100 can be an example of a WLAN such as a Wi-Fi network (and will hereinafter be referred to as WLAN 100) . For example, the WLAN 100 can be a network implementing at least one of the IEEE 802.11 family of standards (such as that defined by the IEEE 802.11-2016 specification or amendments thereof including, but not limited to, 802.11ah, 802.11ad, 802.11ay, 802.11ax, 802.11az, 802.11ba, and 802.11be) . The WLAN 100 may include numerous wireless communication devices such as an access point (AP) 102 and multiple stations (STAs) 104. While only one AP 102 is shown, the WLAN network 100 also can include multiple APs 102.
Each of the STAs 104 also may be referred to as a mobile station (MS) , a mobile device, a mobile handset, a wireless handset, an access terminal (AT) , a user equipment (UE) , a subscriber station (SS) , or a subscriber unit, among other possibilities. The STAs 104 may represent various devices such as mobile phones, personal digital assistant (PDAs) , other handheld devices, netbooks, notebook
computers, tablet computers, laptops, display devices (for example, TVs, computer monitors, navigation systems, among others) , music or other audio or stereo devices, remote control devices ( “remotes” ) , printers, kitchen or other household appliances, key fobs (for example, for passive keyless entry and start systems) , among other possibilities.
A single AP 102 and an associated set of STAs 104 may be referred to as a basic service set (BSS) , which is managed by the respective AP 102. Fig. 1A additionally shows an example coverage area 105 of the AP 102, which may represent a basic service area (BSA) of the WLAN 100. The BSS may be identified to users by a service set identifier (SSID) , as well as to other devices by a basic service set identifier (BSSID) , which may be a medium access control (MAC) address of the AP 102. The AP 102 periodically broadcasts beacon frames ( “beacons” ) including the BSSID to enable any STAs 104 within wireless range of the AP 102 to “associate” or re-associate with the AP 102 to establish a respective communication link 106 (hereinafter also referred to as a “Wi-Fi link” ) , or to maintain a communication link 106, with the AP 102. For example, the beacons can include an identification of a primary channel used by the respective AP 102 as well as a timing synchronization function for establishing or maintaining timing synchronization with the AP 102. The AP 102 may provide access to external networks to various STAs 104 in the WLAN via respective communication links 106.
To establish a communication link 106 with an AP 102, each of the STAs 104 is configured to perform passive or active scanning operations ( “scans” ) on frequency channels in one or more frequency bands (for example, the 2.4 GHz, 5.0 GHz, 6.0 GHz, or 60 GHz bands) . To perform passive scanning, an STA 104 listens for beacons, which are transmitted by respective APs 102 at a periodic time interval referred to as the target beacon transmission time (TBTT) (measured in time units (TUs) , where one TU may be equal to 1024 microseconds (μs) ) . To perform active scanning, an STA 104 generates and sequentially transmits probe requests on each channel to be scanned and listens for probe responses from APs 102. Each STA 104 may be configured to identify or select an AP 102 with which to associate based on discovery information obtained through the passive or active scans, and to perform authentication and association operations to establish a communication link 106 with the selected AP 102. After authentication, the AP 102 may assign an association identifier (AID) to each associated STA 104.
As a result of the increasing ubiquity of wireless networks, an STA 104 may have an opportunity to select one of many BSSs within range of the STA or to select among multiple APs 102 that together form an extended service set (ESS) including multiple connected BSSs. An extended network station associated with the WLAN 100 may be connected to a wired or wireless distribution system that may allow multiple APs 102 to be connected in such an ESS. As a result, an STA 104 can be covered by more than one AP 102 and can associate with different APs 102 at different times for different transmissions. Additionally, after association with an AP 102, an STA 104 also may be configured to periodically scan its surroundings to find a more suitable AP 102 with which to associate. For example, an STA 104 that is moving relative to its associated AP 102 may perform a “roaming” scan to find another AP 102 having more desirable network characteristics such as a greater received signal strength indicator (RSSI) or a reduced traffic load.
In some cases, STAs 104 may form networks without APs 102 or other equipment other than the STAs 104 themselves. One example of such a network is an ad hoc network (or wireless ad hoc network) . Ad hoc networks may alternatively be referred to as mesh networks or peer-to-peer (P2P) networks. In some cases, ad hoc networks may be implemented within a larger wireless network such as the WLAN 100. In such implementations, while the STAs 104 may be capable of communicating with each other through the AP 102 using communication links 106, STAs 104 also can communicate directly with each other via direct wireless links 108. Additionally, two STAs 104 may communicate via a direct wireless link 108 regardless of whether both STAs 104 are associated with and served by the same AP 102. In such an ad hoc system, one or more of the STAs 104 may assume the role filled by the AP 102 in a BSS. Such an STA 104 may be referred to as a group owner (GO) and may coordinate transmissions within the ad hoc network. Examples of direct wireless links 108 include Wi-Fi Direct connections, connections established by using a Wi-Fi Tunneled Direct Link Setup (TDLS) link, and other P2P group connections.
The APs 102 and STAs 104 may function and communicate (via the respective communication links 106) according to the IEEE 802.11 family of standards (such as that defined by the IEEE 802.11-2016 specification or amendments thereof including, but not limited to, 802.11ah, 802.11ad, 802.11ay, 802.11ax, 802.11az, 802.11ba, and 802.11be) . These standards define the WLAN radio and baseband protocols for the physical (PHY) and MAC layers. The APs 102 and STAs 104 transmit and receive
wireless communications (hereinafter also referred to as “Wi-Fi communications” ) to and from one another in the form of physical layer convergence protocol (PLCP) protocol data units (PDSs) , or PPDUs. The APs 102 and STAs 104 in the WLAN 100 may transmit PPDUs over an unlicensed spectrum, which may be a portion of spectrum that includes frequency bands traditionally used by Wi-Fi technology, such as the 2.4 GHz band, the 5.0 GHz band, the 60 GHz band, the 3.6 GHz band, and the 900 MHz band. Some implementations of the APs 102 and STAs 104 described herein also may communicate in other frequency bands, such as the 6.0 GHz band, which may support both licensed and unlicensed communications. The APs 102 and STAs 104 also can be configured to communicate over other frequency bands such as shared licensed frequency bands, where multiple operators may have a license to operate in the same or overlapping frequency band or bands.
Each of the frequency bands may include multiple sub-bands or frequency channels. For example, PPDUs conforming to the IEEE 802.11n, 802.11ac, and
802.11ax standard amendments may be transmitted over the 2.4 and 5.0 GHz bands, each of which is divided into multiple 20 MHz channels. These PPDUs are transmitted over a physical channel having a minimum bandwidth of 20 MHz, but larger channels can be formed through channel bonding. For example, PPDUs may be transmitted over physical channels having bandwidths of 40 MHz, 80 MHz, 160 MHz, or 320 MHz by bonding together multiple 20 MHz channels.
Each PPDU is a composite structure that includes a PHY preamble and a payload in the form of a PLCP service data unit (PSDU) . The information provided in the preamble may be used by a receiving device to decode the subsequent data in the PSDU. In instances in which PPDUs are transmitted over a bonded channel, the preamble fields may be duplicated and transmitted in each of the multiple component channels. The PHY preamble may include both a legacy portion (or “legacy preamble” ) and a non-legacy portion (or “non-legacy preamble” ) . The legacy preamble may be used for packet detection, automatic gain control, and channel estimation, among other uses. The legacy preamble also may generally be used to maintain compatibility with legacy devices. The format of, coding of, and information provided in the non-legacy portion of the preamble is based on the particular IEEE 802.11 protocol to be used to transmit the payload.
Fig. 1B shows a block diagram of an example wireless communication device 110. In some implementations, the wireless communication device 110 can be an
example of a device for use in an STA such as one of the STAs 104 described above with reference to Fig. 1A. In some implementations, the wireless communication device 110 can be an example of a device for use in an AP such as the AP 102 described above with reference to Fig. 1A. The wireless communication device 110 is capable of transmitting (or outputting for transmission) and receiving wireless communications (for example, in the form of wireless packets) . For example, the wireless communication device can be configured to transmit and receive packets in the form of PPDUs and MAC protocol data units (MPDUs) conforming to an IEEE 802.11 standard, such as that defined by the IEEE 802.11-2016 specification or amendments thereof including, but not limited to, 802.11ah, 802.11ad, 802.11ay, 802.11ax, 802.11az, 802.11ba, and 802.11be.
The wireless communication device 110 can be, or can include, a chip, system on chip (SoC) , chipset, package, or device that includes one or more modems 112 (for example, a Wi-Fi (IEEE 802.11 compliant) modem) . In some implementations, the one or more modems 112 (collectively “the modem 112” ) additionally include a WWAN modem (for example, a 3GPP 4G LTE or 5G compliant modem) . In some implementations, the wireless communication device 110 also includes one or more radios 114 (collectively “the radio 114” ) . In some implementations, the wireless communication device 116 further includes one or more processors, processing blocks or processing elements 116 (collectively “the processor 116” ) , and one or more memory blocks or elements 118 (collectively “the memory 118” ) .
The modem 112 can include an intelligent hardware block or device such as, for example, an application-specific integrated circuit (ASIC) , among other possibilities. The modem 112 is generally configured to implement a PHY layer. For example, the modem 112 is configured to modulate packets and to output the modulated packets to the radio 114 for transmission over the wireless medium. The modem 112 is similarly configured to obtain modulated packets received by the radio 114 and to demodulate the packets to provide demodulated packets. In addition to a modulator and a demodulator, the modem 112 may further include digital signal processor (DSP) circuitry, automatic gain control (AGC) , a coder, a decoder, a multiplexer, and a demultiplexer. For example, while in a transmission mode, data obtained from the processor 116 is provided to a coder, which encodes the data to provide encoded bits. The encoded bits are then mapped to points in a modulation constellation (using a selected modulation and coding scheme (MCS) ) to provide modulated symbols. The modulated symbols
may then be mapped to a number NSS of spatial streams or a number NSTS of space-time streams. The modulated symbols in the respective spatial or space-time streams may then be multiplexed, transformed via an inverse fast Fourier transform (IFFT) block, and subsequently provided to the DSP circuitry for Tx windowing and filtering. The digital signals may then be provided to a digital-to-analog converter (DAC) . The resultant analog signals may then be provided to a frequency upconverter, and ultimately, the radio 114. In implementations involving beamforming, the modulated symbols in the respective spatial streams are precoded via a steering matrix prior to their provision to the IFFT block.
While the modem 112 is in a reception mode, digital signals received from the radio 114 are provided to the DSP circuitry, which is configured to acquire a received signal, for example, by detecting the presence of the signal and estimating the initial timing and frequency offsets. The DSP circuitry is further configured to digitally condition the digital signals, for example, using channel (narrowband) filtering, analog impairment conditioning (such as correcting for in-phase and quadrature (I/Q) imbalance) , and applying digital gain to ultimately obtain a narrowband signal. The output of the DSP circuitry may then be fed to the AGC, which is configured to use information extracted from the digital signals, for example, in one or more received training fields, to determine an appropriate gain. The output of the DSP circuitry also is coupled with the demodulator, which is configured to extract modulated symbols from the signal and, for example, compute the logarithm likelihood ratios (LLRs) for each bit position of each subcarrier in each spatial stream. The demodulator is coupled with the decoder, which may be configured to process the LLRs to provide decoded bits. The decoded bits from all of the spatial streams are then fed to the demultiplexer for demultiplexing. The demultiplexed bits may then be descrambled and provided to the MAC layer (the processor 116) for processing, evaluation, or interpretation.
The radio 114 generally includes at least one RF transmitter (or “transmitter chain” ) and at least one RF receiver (or “receiver chain” ) , which may be combined into one or more transceivers. For example, the RF transmitters and receivers may include various DSP circuitry including at least one power amplifier (PA) and at least one low-noise amplifier (LNA) , respectively. The RF transmitters and receivers may in turn be coupled to one or more antennas. For example, in some implementations, the wireless communication device 110 can include, or be coupled with, multiple transmit antennas (each with a corresponding transmit chain) and multiple receive antennas (each with a
corresponding receive chain) . The symbols output from the modem 112 are provided to the radio 114, which then transmits the symbols via the coupled antennas. Similarly, symbols received via the antennas are obtained by the radio 114, which then provides the symbols to the modem 112.
The processor 116 can include an intelligent hardware block or device such as, for example, a processing core, a processing block, a central processing unit (CPU) , a microprocessor, a microcontroller, a digital signal processor (DSP) , an ASIC, a programmable logic device (PLD) such as a field programmable gate array (FPGA) , discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. The processor 116 processes information received through the radio 114 and the modem 112, and processes information to be output through the modem 112 and the radio 114 for transmission through the wireless medium. For example, the processor 116 may implement a control plane and MAC layer configured to perform various operations related to the generation and transmission of MPDUs, frames, or packets. The MAC layer is configured to perform or facilitate the coding and decoding of frames, spatial multiplexing, space-time block coding (STBC) , beamforming, and OFDMA resource allocation, among other operations or techniques. In some implementations, the processor 116 may generally control the modem 112 to cause the modem to perform various operations described above.
The memory 118 can include tangible storage media such as random-access memory (RAM) or read-only memory (ROM) , or combinations thereof. The memory 118 also can store non-transitory processor-or computer-executable software code containing instructions that, when executed by the processor 116, cause the processor to perform various operations described herein for wireless communication, including the generation, transmission, reception, and interpretation of MPDUs, frames, or packets. For example, various functions of components disclosed herein, or various blocks or steps of a method, operation, process, or algorithm disclosed herein, can be implemented as one or more modules of one or more computer programs.
Fig. 1C shows a block diagram of an example AP 120. For example, the AP 120 can be an example implementation of the AP 102 described with reference to Fig. 1A. The AP 120 includes a wireless communication device (WCD) 122. For example, the wireless communication device 122 may be an example implementation of the wireless communication device 110 described with reference to Fig. 1B. The AP 120
also includes multiple antennas 124 coupled with the wireless communication device 122 to transmit and receive wireless communications. In some implementations, the AP 120 additionally includes an application processor 126 coupled with the wireless communication device 122, and a memory 128 coupled with the application processor 126. The AP 120 further includes at least one external network interface 130 that enables the AP 120 to communicate with a core network or backhaul network to gain access to external networks including the Internet. For example, the external network interface 130 may include one or both of a wired (for example, Ethernet) network interface and a wireless network interface (such as a WWAN interface) . Ones of the aforementioned components can communicate with other ones of the components directly or indirectly, over at least one bus. The AP 120 further includes a housing that encompasses the wireless communication device 122, the application processor 126, the memory 128, and at least portions of the antennas 124 and external network interface 130.
In some aspects, an AP (e.g., AP 120) may include a communication manager 132. As described in more detail elsewhere herein, the communication manager 132 may exchange a public key with a mobile station. The communication manager 132 may receive, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile. The communication manager 132 may transmit a response message that uses a security key and that includes a vendor information element (IE) that indicates ownership or authorized control of the mobile station. Additionally, or alternatively, the communication manager 132 may perform one or more other operations described herein.
In some aspects, an AP (e.g., AP 120) includes means for exchanging a public key with a mobile station; means for receiving, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile; and/or means for transmitting a response message that uses a security key and that includes a vendor IE that indicates ownership or authorized control of the mobile station. In some aspects, the means for the AP to perform operations described herein may include, for example, one or more of communication manager 132, antenna 124, application processor 126, WCD 122, and/or memory 128.
Fig. 1D shows a block diagram of an example STA 140. For example, the STA 140 can be an example implementation of the STA 104 described with reference to Fig. 1A. The STA 140 includes a wireless communication device 142. For example,
the wireless communication device 142 may be an example implementation of the wireless communication device 110 described with reference to Fig. 1B. The STA 140 also includes one or more antennas 144 coupled with the wireless communication device 142 to transmit and receive wireless communications. The STA 140 additionally includes an application processor 146 coupled with the wireless communication device 142, and a memory 148 coupled with the application processor 146. In some implementations, the STA 140 further includes a user interface (UI) 150 (such as a touchscreen or keypad) and a display 152, which may be integrated with the UI 150 to form a touchscreen display. In some implementations, the STA 140 may further include one or more sensors 154 such as, for example, one or more inertial sensors, accelerometers, temperature sensors, pressure sensors, or altitude sensors. Ones of the aforementioned components can communicate with other ones of the components directly or indirectly, over at least one bus. The STA 140 further includes a housing that encompasses the wireless communication device 142, the application processor 146, the memory 148, and at least portions of the antennas 144, UI 150, and display 152.
In some aspects, a mobile station (e.g., STA 140) may include a communication manager 156. As described in more detail elsewhere herein, the communication manager 156 may set a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode. The communication manager 156 may transmit a probe message to scan for APs using a Wi-Fi network profile. The communication manager 156 may receive a response message from an AP. The communication manager 156 may wake up the operating system based at least in part on receiving the response message from the AP. Additionally, or alternatively, the communication manager 156 may perform one or more other operations described herein.
In some aspects, a mobile station (e.g., STA 140) includes means for setting a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode; means for transmitting a probe message to scan for APs using a Wi-Fi network profile; means for receiving a response message from an AP; and/or means for waking up the operating system based at least in part on receiving the response message from the AP. In some aspects, the means for the mobile station to perform operations described herein may include, for example, one or more of
communication manager 156, antenna 144, application processor 146, WCD 142, and/or memory 148.
As indicated above, Figs. 1A-1D are provided as examples. Other examples may differ from what is described with regard to Fig. 1A-1D.
Fig. 2A shows an example PDU 200 usable for communications between an AP and a number of STAs. For example, the PDU 200 can be configured as a PPDU. As shown, the PDU 200 includes a PHY preamble 202 and a PHY payload 204. For example, the PHY preamble 202 may include a legacy portion that itself includes a legacy short training field (L-STF) 206, a legacy long training field (L-LTF) 208, and a legacy signaling field (L-SIG) 210. The PHY preamble 202 may also include a non-legacy portion with non-legacy fields 212. The L-STF 206 generally enables a receiving device to perform AGC and coarse timing and frequency estimation. The L-LTF 208 generally enables a receiving device to perform fine timing and frequency estimation and also to estimate the wireless channel. The L-SIG 210 generally enables a receiving device to determine a duration of the PDU and use the determined duration to avoid transmitting on top of the PDU. For example, the L-STF 206, the L-LTF 208, and the L-SIG 210 may be modulated according to a binary phase shift keying (BPSK) modulation scheme. The payload 204 may be modulated according to a BPSK modulation scheme, a quadrature BPSK (Q-BPSK) modulation scheme, a quadrature amplitude modulation (QAM) modulation scheme, or another appropriate modulation scheme. The payload 204 may generally carry higher layer data 214, for example, in the form of MPDUs or aggregated MPDUs (A-MPDUs) .
Fig. 2B shows an example L-SIG field 210 in the PDU of Fig. 2A. The L-SIG 210 includes a data rate field 222, a reserved bit 224, a length field 226, a parity bit 228, and a tail field 230. The data rate field 222 indicates a data rate (note that the data rate indicated in the data rate field 222 may not be the actual data rate of the data carried in the payload 204) . The length field 226 indicates a length of the packet in units of, for example, bytes. The parity bit 228 is used to detect bit errors. The tail field 230 includes tail bits that are used by the receiving device to terminate operation of a decoder (for example, a Viterbi decoder) . The receiving device utilizes the data rate and the length indicated in the data rate field 222 and the length field 226 to determine a duration of the packet in units of, for example, microseconds (μs) .
As indicated above, Figs. 2A-2B provide examples. Other examples may differ from what is described with regard to Figs. 2A-2B.
Fig. 3A shows another example PDU 300 usable for wireless communication between an AP and one or more STAs. The PDU 300 may be used for SU, OFDMA, or MU-MIMO transmissions. The PDU 300 may be formatted as a High Efficiency (HE) WLAN PPDU in accordance with the IEEE 802.11ax amendment to the IEEE 802.11 wireless communication protocol standard. The PDU 300 includes a PHY preamble including a legacy portion 302 and a non-legacy portion 304. The PDU 300 may further include a PHY payload 306 after the preamble, for example, in the form of a PSDU including a data field 324.
The legacy portion 302 of the preamble includes an L-STF 308, an L-LTF 310, and an L-SIG 312. The non-legacy portion 304 includes a repetition of L-SIG (RL-SIG) 314, a first HE signal field (HE-SIG-A) 316, an HE short training field (HE-STF) 320, and one or more HE long training fields (or symbols) (HE-LTFs) 322. For OFDMA or MU-MIMO communications, the non-legacy portion 304 further includes a second HE signal field (HE-SIG-B) 318 encoded separately from HE-SIG-A316. Like the L-STF 308, L-LTF 310, and L-SIG 312, the information in RL-SIG 314 and HE-SIG-A316 may be duplicated and transmitted in each of the component 20 MHz channels in instances involving the use of a bonded channel. In contrast, the content in HE-SIG-B 318 may be unique to each 20 MHz channel and target specific STAs 104.
RL-SIG 314 may indicate to HE-compatible STAs 104 that the PDU 300 is an HE PPDU. An AP 102 may use HE-SIG-A316 to identify and inform multiple STAs 104 that the AP has scheduled uplink (UL) or downlink (DL) resources for them. For example, HE-SIG-A316 may include a resource allocation subfield that indicates resource allocations for the identified STAs 104. HE-SIG-A316 may be decoded by each HE-compatible STA 104 served by the AP 102. For MU transmissions, HE-SIG-A 316 further includes information usable by each identified STA 104 to decode an associated HE-SIG-B 318. For example, HE-SIG-A316 may indicate the frame format, including locations and lengths of HE-SIG-Bs 318, available channel bandwidths and MCSs, among other examples. HE-SIG-A316 also may include HE WLAN signaling information usable by STAs 104 other than the identified STAs 104.
HE-SIG-B 318 may carry STA-specific scheduling information such as, for example, STA-specific (or “user-specific” ) MCS values and STA-specific RU allocation information. In the context of DL MU-OFDMA, such information enables the respective STAs 104 to identify and decode corresponding resource units (RUs) in the associated data field 324. Each HE-SIG-B 318 includes a common field and at least
one STA-specific field. The common field can indicate RU allocations to multiple STAs 104 including RU assignments in the frequency domain, indicate which RUs are allocated for MU-MIMO transmissions and which RUs correspond to MU-OFDMA transmissions, and the number of users in allocations, among other examples. The common field may be encoded with common bits, cyclic redundancy check (CRC) bits, and tail bits. The user-specific fields are assigned to particular STAs 104 and may be used to schedule specific RUs and to indicate the scheduling to other WLAN devices. Each user-specific field may include multiple user block fields. Each user block field may include two user fields that contain information for two respective STAs to decode their respective RU payloads in data field 324.
Fig. 3B shows another example PDU 350 usable for wireless communication between an AP and one or more STAs. The PDU 350 may be used for SU, OFDMA, or MU-MIMO transmissions. The PDU 350 may be formatted as an Extreme High Throughput (EHT) WLAN PPDU in accordance with the IEEE 802.11be amendment to the IEEE 802.11 wireless communication protocol standard or may be formatted as a PPDU conforming to any later (post-EHT) version of a new wireless communication protocol conforming to a future IEEE 802.11 wireless communication protocol standard or other wireless communication standard. The PDU 350 includes a PHY preamble including a legacy portion 352 and a non-legacy portion 354. The PDU 350 may further include a PHY payload 356 after the preamble, for example, in the form of a PSDU including a data field 374.
The legacy portion 352 of the preamble includes an L-STF 358, an L-LTF 360, and an L-SIG 362. The non-legacy portion 354 of the preamble includes an RL-SIG 364 and multiple wireless communication protocol version-dependent signal fields after RL-SIG 364. For example, the non-legacy portion 354 may include a universal signal field 366 (referred to herein as “U-SIG 366” ) and an EHT signal field 368 (referred to herein as “EHT-SIG 368” ) . One or both of U-SIG 366 and EHT-SIG 368 may be structured as, and carry version-dependent information for, other wireless communication protocol versions beyond EHT. The non-legacy portion 354 further includes an additional short training field 370 (referred to herein as “EHT-STF 370, ” although it may be structured as, and carry version-dependent information for, other wireless communication protocol versions beyond EHT) and one or more additional long training fields 372 (referred to herein as “EHT-LTFs 372, ” although they may be structured as, and carry version-dependent information for, other wireless
communication protocol versions beyond EHT) . Like L-STF 358, L-LTF 360, and L-SIG 362, the information in U-SIG 366 and EHT-SIG 368 may be duplicated and transmitted in each of the component 20 MHz channels in instances involving the use of a bonded channel. In some implementations, EHT-SIG 368 may additionally or alternatively carry information in one or more non-primary 20 MHz channels that is different than the information carried in the primary 20 MHz channel.
EHT-SIG 368 may include one or more jointly encoded symbols and may be encoded in a different block from the block in which U-SIG 366 is encoded. EHT-SIG 368 may be used by an AP to identify and inform multiple STAs 104 that the AP has scheduled UL or DL resources for them. EHT-SIG 368 may be decoded by each compatible STA 104 served by the AP 102. EHT-SIG 368 may generally be used by a receiving device to interpret bits in the data field 374. For example, EHT-SIG 368 may include RU allocation information, spatial stream configuration information, and per-user signaling information such as MCSs, among other examples. EHT-SIG 368 may further include a CRC (for example, four bits) and a tail (for example, 6 bits) that may be used for binary convolutional code (BCC) . In some implementations, EHT-SIG 368 may include one or more code blocks that each include a CRC and a tail. In some aspects, each of the code blocks may be encoded separately.
EHT-SIG 368 may carry STA-specific scheduling information such as, for example, user-specific MCS values and user-specific RU allocation information. EHT-SIG 368 may generally be used by a receiving device to interpret bits in the data field 374. In the context of DL MU-OFDMA, such information enables the respective STAs 104 to identify and decode corresponding RUs in the associated data field 374. Each EHT-SIG 368 may include a common field and at least one user-specific field. The common field can indicate RU distributions to multiple STAs 104, indicate the RU assignments in the frequency domain, indicate which RUs are allocated for MU-MIMO transmissions and which RUs correspond to MU-OFDMA transmissions, and the number of users in allocations, among other examples. The common field may be encoded with common bits, CRC bits, and tail bits. The user-specific fields are assigned to particular STAs 104 and may be used to schedule specific RUs and to indicate the scheduling to other WLAN devices. Each user-specific field may include multiple user block fields. Each user block field may include, for example, two user fields that contain information for two respective STAs to decode their respective RU payloads.
The presence of RL-SIG 364 and U-SIG 366 may indicate to EHT-or later version-compliant STAs 104 that the PDU 350 is an EHT PPDU or a PPDU conforming to any later (post-EHT) version of a new wireless communication protocol conforming to a future IEEE 802.11 wireless communication protocol standard. For example, U-SIG 366 may be used by a receiving device to interpret bits in one or more of EHT-SIG 368 or the data field 374.
As indicated above, Figs. 3A-3B provide some examples. Other examples may differ from what is described with regard to Figs. 3A-3B.
Fig. 4 is a diagram illustrating an example 400 of accessing a vehicle remotely, in accordance with the present disclosure.
A vehicle 402 may be locked by an owner 404 of the vehicle 402. The vehicle 402 may have an operating system (OS) that hosts applications and functionality of the vehicle 402. Upon the owner 404 turning off, leaving, and locking the vehicle 402, the OS may enter a low power mode. The low power mode may operate with less power than a power mode when the OS is fully active and/or may operate below a threshold power. In some scenarios, the OS of the vehicle 402 may awaken and unlock the vehicle 402 or start the vehicle 402 via messaging that occurs in a near-field communication (NFC) mode,messaging, or UWB messaging. The NFC mode may be used to securely unlock the vehicle 402, but the NFC mode only supports limited scenarios. Bluetooth messaging may be used to lock or unlock the vehicle 402, remote start the vehicle 402, heat the cabin of the vehicle 402, or provide a location of the vehicle 402, but security is an issue for the Bluetooth personal identification number (PIN) . UWB messaging may also lock or unlock the vehicle 402, remote start the vehicle 402, heat the cabin, or provide a location, but additional UWB chipsets are necessary communications involving the vehicle 402.
The vehicle 402 may be equipped with a mobile station, such as STA 406, for providing Wi-Fi to the owner 404 and other passengers of the vehicle 402. Currently, the Wi-Fi is not used for such scenarios as locking or unlocking the vehicle 402, remote starting the vehicle 402, heating the cabin, or providing a location of the vehicle 402. According to various aspects described herein, the vehicle 402 may use Wi-Fi to provide such functionality securely and to handle high-throughput traffic that are not provided by the NFC mode or Bluetooth messaging. The STA 406 in the vehicle 402 may provide such functionality securely by scanning for an AP (with a Wi-Fi network profile) while in a low power mode and waking up the OS when an AP response
message is received. The OS may not be active in the low power mode, but embedded Wi-Fi firmware may remain active. Using Wi-Fi also does not involve the additional chipsets or costs that are necessary for UWB messaging. The OS may wake up based at least in part on an authentication associated with the Wi-Fi network profile.
For example, the STA 406 may be configured to set a scan offload for Wi-Fi based at least in part on the OS entering the low power mode. The scan offload (e.g., preferred network offload (PNO) ) may include a procedure for offloading the scanning for APs from the OS to the embedded Wi-Fi firmware. The Wi-Fi firmware may handle security to authorize an AP if the SSID provided by the AP matches the SSID stored at the Wi-Fi firmware. The Wi-Fi firmware may perform the scanning and detecting of APs. This may involve transmitting a probe message (e.g., probe request frame) . The Wi-Fi firmware may scan for surrounding APs periodically.
The STA 406 may receive a response message from an AP, such as the AP 408 (e.g., located within a smartphone) of the owner 404. If the response message from the AP 408 matches a network profile stored at the STA 406 and the authentication is successful, the Wi-Fi may attempt to wake up the OS and establish a secure connection to the AP 408. Once the secure connection is established, the owner 404 may use the AP 408 to perform one or more actions that use features of the vehicle 402, such as unlocking or remote starting the vehicle 402.
In some aspects, the STA 406 may authenticate the AP 408 using a robust security operation, which may include using a security key that is a simultaneous authentication of equals public key (SAE-PK) defined by a Wi-Fi protected access 3 (WPA3) security implementation. The robust security operation may also use a Rivest-Shamir-Adleman (RSA) key, which may be part of a pair of a public key and a private key used in management action frames to complete authentication. The STA 406 may also authenticate the AP 408 using a vendor IE, which includes information that indicates authorized control or ownership of the vehicle 402.
By using a Wi-Fi network profile to scan for APs when the OS is in the low power mode, the owner 404 may use the Wi-Fi functionality of the vehicle 402 to wake up the OS. As a result, the owner 404 may remotely control the vehicle using Wi-Fi and take advantage of security features provided by Wi-Fi without requiring additional hardware. Increased security conserves power, processing resources, and signaling resources that would otherwise be consumed with unauthorized control of the vehicle 402. In some aspects, the OS may wake up based at least in part on a service set
identifier match, a robust security network authentication, a security key, and/or a public key. Such security techniques prevent an unauthorized party 410, with an unauthentic AP 412, from spoofing some information or obtaining control of the vehicle 402. The increased security and high throughput provided by Wi-Fi not only improves the operation of the STA 406 but also prevents theft of the vehicle 402 or dangerous situations for the owner 404.
As indicated above, Fig. 4 is provided as an example. Other examples may differ from what is described with regard to Fig. 4.
Fig. 5 is a diagram illustrating an example 500 of using Wi-Fi to control actions of a vehicle, in accordance with the present disclosure. Example 500 shows the AP 408 (e.g., in a smartphone) of the owner 404 that can communicate with the STA 406 in the vehicle 402. The STA 406 may include an OS host 502 that hosts the OS, a Wi-Fi driver 504 that provides Wi-Fi communications for the OS, and an embedded Wi-Fi module 506 that controls the Wi-Fi communications. In some aspects, the OS host 502 may be separate from the STA 406. The Wi-Fi driver 504 and/or the embedded Wi-Fi module 506 may be configured to use an SSID, key management, a password, a protected channel, a public key generated by an RSA algorithm and/or an SAE-PK credential generator with the STA 406 to secure Wi-Fi communications. These elements may be part of a network profile of the AP 408.
As shown by reference number 510, the owner 404 may park the vehicle 402. The vehicle 402, when turned off, may indicate that the OS host 502 is to enter a low power mode. This may include a message to suspend the OS, as shown by reference number 512. As shown by reference number 514, the OS host 502 may prepare to suspend the OS. This may include closing applications or placing applications in a sleep mode. The OS host 502 may transmit a request for the Wi-Fi to enter a low power mode. As shown by reference number 516, the request may include a request to suspend the Wi-Fi.
As shown by reference number 518, when the Wi-Fi receives a request to suspend the Wi-Fi and/or the Wi-Fi enters the low power mode, the Wi-Fi driver 504 may set a PNO scan offload. This may include transmitting a PNO scan offload message that includes a network profile for the owner 404 and/or the AP 408. The message may include one or more other network profiles, such as for family members and/or friends of the owner 404. Each network profile may include IDs, keys, and/or other security information. The PNO scan offload may offload control or scan detection
functionality from the Wi-Fi driver 504 to the embedded Wi-Fi module 506. The PNO scan offload message may include other parameters, such as a dwell time (e.g., 20 milliseconds) of each channel and/or a public key (e.g., generated by an RSA algorithm or an SAE-PK credential generator) of each channel. In some aspects, the PNO scan offload message may indicate a limited set of channels to scan (e.g., 1, 6, or 11, rather than more than 100 channels) to conserve energy. Alternatively, other applications may configure the limited set of channels for the PNO scan offload.
If the PNO scan offload is successful, the embedded Wi-Fi module 506 may transmit a scan offload success message, as shown by reference number 520. As shown by reference number 522, the Wi-Fi driver 504 may report to the OS host 502 that the Wi-Fi driver 504 is suspended in a low power mode. The OS host may suspend the OS, as shown by reference number 524, and indicate that the OS is suspended, as shown by reference number 526.
As shown by reference number 528, the vehicle 402 may be locked. When the vehicle 402 is parked and locked, the OS host 502 and the Wi-Fi driver 504 may be asleep or inactive. However, the embedded Wi-Fi module 506 (e.g., embedded Wi-Fi firmware) may remain awake or active to scan for authorized APs.
As shown by reference number 530, the embedded Wi-Fi module 506 may perform a scan loop. As shown by reference number 532, the embedded Wi-Fi module 506 may sleep for N seconds. The power consumption when the embedded Wi-Fi module 506 is in the low power mode may be estimated by dwell time × (quantity of channels) / (1000 × N) .
As shown by reference number 534, the embedded Wi-Fi module 506 may then wake up and scan for surrounding APs. The embedded Wi-Fi module 506 may transmit one or more probe request frames as part of the scan. The scan may be performed while the host OS is inactive and may use a subset of the channels that are normally used when the host OS is active. The transmit probe request frames may include information that identifies the vehicle 402, a network profile for the vehicle 402, and/or a vendor IE that is specific to the owner 404 and/or the vehicle 402. The embedded Wi-Fi module 506 may use a security key, such as an RSA private key or a private key associated with an SAE-PK network. The embedded Wi-Fi module 506 may receive a probe response message from an AP, such as from the AP 408. The AP 408 may be a preferred AP. If a preferred AP is found, as shown by reference number
536, the embedded Wi-Fi module 506 may proceed with authentication. If a preferred AP is not found, the scan loop may begin again.
In some aspects, the AP 408 and other APs may transmit (e.g., broadcast) beacon messages. The beacon messages may indicate the presence of an AP to a STA. The beacon messages may include the vendor IE or vendor information from the vendor IE. The beacon messages may also include security information, such as an SSID or a security method indication. The AP 408 may generate a pair of a public key and a private key for authentication.
As shown by reference number 538, the embedded Wi-Fi module 506 may attempt to authenticate the AP 408. The embedded Wi-Fi module 506 may authenticate the AP 408 using an RSA public key, using an SAE-PK (e.g., SAE-PK bit 6 set to 1) , if an SSID in the probe response message matches (e.g., is the same as) an SSID of the network profile (or another authorized network profile) , if information in the vendor IE matches stored vendor information, or any combination thereof.
Vendor information in the vendor IE may include an IE ID field (e.g., one octet) with a value of 0xDD, for example, that is vendor-specific. The vendor information may also include a length field (e.g., two octets) that indicates a length of the vendor IE, an organizationally unique identifier (OUI) field (e.g., three octets) , a type field (e.g., one octet) , and/or a payload length field (e.g., two octets) that indicates a length of the payload. The vendor information may include a subtype field (e.g., one octet) , such as a value of 0 to 3 for RSA. More specifically, a subtype value of 0 may indicate a broadcast in beacon frames from the AP 408 or a probe response. A subtype value of 1 may indicate a STA request to authenticate an AP, a subtype value of 2 may indicate an AP response associated with an authentication result, a subtype of 3 may indicate STA active scan use that is attached in a probe request. A subtype of 4 may be used for SAE-PK and may indicate a broadcast in beacon frame, a probe response, or use with a probe request. Vendor information may include a payload (e.g., variable quantity of octets) that includes data. When the subtype is set to 0, the payload length may be set to 0. A subtype set to 1 may indicate encryption with a MAC element (e.g., PK, A + STA MAC) . A subtype set to 2 may indicate a message-digest algorithm 5 (MD5) code of (A+ STA MAC) . The MD5 code may be 128-bit hash that is represented by a 32-digit hexadecimal. For a subtype of 3 or 4, the payload length may be set to 0.
As shown by reference number 540, if the AP 408 is authenticated (e.g., using an RSA public key or a public key associated with an SAE-PK network) , the embedded Wi-Fi module 506 may, as shown by reference number 542, transmit a message to wake up the OS host 502 (and the Wi-Fi driver 504) . As shown by reference number 544, the OS host 502 may wake up. If an AP is not authenticated, the scan loop may begin again. As shown by reference number 546, the OS host 502 may establish a connection between the AP 408 and the vehicle 402 (e.g., the OS host 502 or the STA 406 more generally) . The connection may be a Wi-Fi connection. As shown by reference number 548, the STA 406 may grant permission for control of the vehicle to the AP 408. As shown by reference number 550, the AP 408 may cause the vehicle 402 to perform an action. The may include transmitting an instruction message. The action may include causing the vehicle 402 to unlock the vehicle 402, start the vehicle 402, set a climate control feature of the vehicle 402, play music, provide status information, provide a location, lower or raise windows, open a trunk door, turn on or off lights, drive to the owner, park, proceed to an indicated destination, or other actions that involve the vehicle 402. The AP 408 may transmit an instruction message that indicates an action the vehicle 402 is to perform.
In some aspects, another user with another AP may be authenticated by the embedded Wi-Fi module 506 if the user has a network profile that is authorized for use by the owner 404. For example, the owner 404 may have family members with other authorized network profiles that use the vendor IE and any security keys
By using Wi-Fi to control the vehicle 402, the owner 404 may have better security and allow for high data throughput. High data throughput may be used for motion detection, mirror casting, video entertainment, and file transfers between the AP 408 and the STA 406. Multiple vehicles keys or NFC cards may be avoided, which reduces costs. Because Wi-Fi is used for scanning for APs when the OS is in a low power mode, the vehicle 402 may also conserve power.
As indicated above, Fig. 5 is provided as an example. Other examples may differ from what is described with regard to Fig. 5.
Fig. 6 is a diagram illustrating an example 600 of using an SAE-PK to authenticate an AP, in accordance with the present disclosure.
In some aspects, the STA 406 may use an SAE-PK to authenticate the AP 408 or any other AP. As shown by reference number 602, the AP 408 may transmit in a beacon or another message, a vendor IE and the SAE-PK. The beacon or message may
also indicate an indication that the AP 408 is able to use a solution such as Wi-Fi to perform an action (e.g., unlock the vehicle 402) . As shown by reference number 604, the STA 406 may transmit a message such as an SAE commit message with a status code (e.g., 127 for an SAE-PK) . As shown by reference number 606, the AP 408 may transmit an SAE commit message. As shown by reference number 608, the STA 406 may transmit an SAE confirm message. After the STA 406 receives the SAE confirm message, a key-encryption-key (KEK) may be derived. The STA 406 may decrypt the modifier using the KEK, marked as M. With the AP 408’s public key marked as K_AP, the fingerprint may be calculated as Fingerprint1 = L (Hash (SSID || M || K_AP) , 0, 8*Sec + 19*λ/4 -5) . As shown by reference number 610, the AP 408 may transmit an SAE confirm message with an SAE-PK (e.g., signature, public key, modifier encrypted by KEK) . Example 600 also shows other information that may be used for verification (e.g., keyseed, key confirmation key (KCK) , platform-managed key (PMK) , KEK) .
Alternatively, in some aspects, the STA 406 may restore Fingerprint2 from a password. The STA 406 may then compare the two fingerprints. If they are the same, this means the public key is correct. The AP 408 may encrypt the signature using a private key. Key authentication information may be included in an SAE confirm frame, such as KeyAuth = Sig_AP (eleAP || eleSTA || scaAP || scaSTA || M || K_AP || AP-BSSID || STA-MAC) . As shown by reference number 612, the STA 406 may use the public key to verify the signature. Success means the AP 408 is able to control the vehicle 402. Failure means that control is rejected, and the STA 406 may temporarily add the AP to a blacklist.
If an attacker tries to generate a pair of public/private keys to form a signature, the signature will fail because the fingerprint is not the same fingerprint restored from the password. If the attacker uses the public key in the SAE confirm frame, the signature will fail due to the signature not having the correct private key. Accordingly, the STA 406 may use the SAE-PK to ensure that the STA 406 connects to an authorized AP for the purpose of controlling the vehicle 402.
As indicated above, Fig. 6 is provided as an example. Other examples may differ from what is described with regard to Fig. 6.
Fig. 7 is a diagram illustrating an example 700 of using an RSA algorithm to authenticate an AP, in accordance with the present disclosure.
In some aspects, the STA 406 may use an RSA algorithm to authenticate the AP 408 or any other AP. As shown by reference number 702, the STA 406 may have
obtained the AP 408’s public key prior to authentication. The owner 404 of the vehicle 402 may use an RSA algorithm to generate a pair of keys, a public key and a private key. The STA 406 may obtain the public key by scanning a quick response (QR) code or by receiving the public key from the network and saving the public key to a non-transitory disk.
An authentication procedure based on the RSA algorithm may include the STA 406 transmitting a management action frame that includes a vendor IE, as shown by reference number 704. The STA 406 may generate a random non-zero string A, concatenate A with an STA MAC address, where the total length is limited to a proper value (e.g., 32 or 64 bytes) . The STA 406 may use the public key to encrypt (A+ STA MAC) and attach the encrypted (A+ STA MAC) to a vendor IE. The management frame may act as an authentication request.
As shown by reference number 706, the AP 408 may decrypt the management action frame using the private key. The AP 408 may use the private key to decrypt the management action frame. If successful, the authentication procedure may continue. The AP 408 may parse (A+ STA MAC) , calculate its MD5 code and attach the MD5 code to the vendor IE. As shown by reference number 708, the AP 408 may transmit a management action frame that includes the vendor IE, as an authentication response. The STA 406 may check the response (e.g., check MD5 code) and indicate whether authentication is successful, as shown by reference number 710. If the authentication fails for an AP, the STA 406 may temporarily add the AP to a blacklist.
As indicated above, Fig. 7 is provided as an example. Other examples may differ from what is described with regard to Fig. 7.
Fig. 8 is a diagram illustrating an example process 800 performed, for example, by a mobile station, in accordance with the present disclosure. Example process 800 is an example where the mobile station (e.g., STA 140, STA 406) performs operations associated with using Wi-Fi to control a vehicle.
As shown in Fig. 8, in some aspects, process 800 may include setting a scan offload for Wi-Fi based at least in part on an OS of the mobile station entering a low power mode (block 810) . For example, the mobile station (e.g., using communication manager 1008 and/or scan component 1010 depicted in Fig. 10) may set a scan offload for Wi-Fi based at least in part on an OS of the mobile station entering a low power mode, as described above.
As further shown in Fig. 8, in some aspects, process 800 may include transmitting a probe message to scan for APs using a Wi-Fi network profile (block 820) . For example, the mobile station (e.g., using communication manager 1008 and/or transmission component 1004 depicted in Fig. 10) may transmit a probe message to scan for APs using a Wi-Fi network profile, as described above.
As further shown in Fig. 8, in some aspects, process 800 may include receiving a response message from an AP (block 830) . For example, the mobile station (e.g., using communication manager 1008 and/or reception component 1002 depicted in Fig. 10) may receive a response message from an AP, as described above.
As further shown in Fig. 8, in some aspects, process 800 may include waking up the OS based at least in part on receiving the response message from the AP (block 840) . For example, the mobile station (e.g., using communication manager 1008 and/or OS component 1012 depicted in Fig. 10) may wake up the OS based at least in part on receiving the response message from the AP, as described above.
Process 800 may include additional aspects, such as any single aspect or any combination of aspects described below and/or in connection with one or more other processes described elsewhere herein.
In a first aspect, the mobile station is associated with a vehicle, and process 800 includes receiving an instruction message to perform an action, and causing the vehicle to perform the action based at least in part on the instruction message.
In a second aspect, alone or in combination with the first aspect, the mobile station is associated with a vehicle, and process 800 includes receiving an instruction message to unlock one or more doors of the vehicle, and causing one or more doors to be unlocked based at least in part on the instruction message.
In a third aspect, alone or in combination with one or more of the first and second aspects, the mobile station is associated with a vehicle, and process 800 includes receiving an instruction message to start the vehicle, and causing the vehicle to start based at least in part on the instruction message.
In a fourth aspect, alone or in combination with one or more of the first through third aspects, transmitting the probe message includes scanning, while the OS is inactive, a subset of channels from among channels that are used when the OS is active.
In a fifth aspect, alone or in combination with one or more of the first through fourth aspects, waking up the OS includes waking up the OS further based at least in part on a service set identifier match.
In a sixth aspect, alone or in combination with one or more of the first through fifth aspects, waking up the OS includes waking up the OS further based at least in part on a robust security network authentication.
In a seventh aspect, alone or in combination with one or more of the first through sixth aspects, waking up the OS includes waking up the OS further based at least in part on an authentication using a security key.
In an eighth aspect, alone or in combination with one or more of the first through seventh aspects, the security key is a public key that is associated with an SAE-PK network.
In a ninth aspect, alone or in combination with one or more of the first through eighth aspects, the security key is an RSA public key.
In a tenth aspect, alone or in combination with one or more of the first through ninth aspects, waking up the OS includes waking up the OS further based at least in part on a vendor IE that indicates ownership or authorized control of the mobile station.
In an eleventh aspect, alone or in combination with one or more of the first through tenth aspects, the Wi-Fi network profile is one of multiple authorized network profiles that are authorized for the mobile station.
Although Fig. 8 shows example blocks of process 800, in some aspects, process 800 may include additional blocks, fewer blocks, different blocks, or differently arranged blocks than those depicted in Fig. 8. Additionally, or alternatively, two or more of the blocks of process 800 may be performed in parallel.
Fig. 9 is a diagram illustrating an example process 900 performed, for example, by an AP, in accordance with the present disclosure. Example process 900 is an example where the AP (e.g., AP 120, AP 408) performs operations associated with using Wi-Fi to control a vehicle.
As shown in Fig. 9, in some aspects, process 900 may include exchanging a public key with a mobile station (block 910) . For example, the AP (e.g., using communication manager 1108 and/or security component 1110 depicted in Fig. 11) may exchange a public key with a mobile station, as described above.
As further shown in Fig. 9, in some aspects, process 900 may include receiving, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile (block 920) . For example, the AP (e.g., using communication manager 1108 and/or reception component 1102 depicted in Fig. 11)
may receive, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile, as described above.
As further shown in Fig. 9, in some aspects, process 900 may include transmitting a response message that uses a security key and that includes a vendor IE that indicates ownership or authorized control of the mobile station (block 930) . For example, the AP (e.g., using communication manager 1108 and/or transmission component 1104 depicted in Fig. 11) may transmit a response message that uses a security key and that includes a vendor IE that indicates ownership or authorized control of the mobile station, as described above.
Process 900 may include additional aspects, such as any single aspect or any combination of aspects described below and/or in connection with one or more other processes described elsewhere herein.
In a first aspect, the mobile station is associated with a vehicle, and process 900 includes transmitting an instruction message for the vehicle to perform the action.
In a second aspect, alone or in combination with the first aspect, the mobile station is associated with a vehicle, and process 900 includes transmitting an instruction message to unlock one or more doors of the vehicle.
In a third aspect, alone or in combination with one or more of the first and second aspects, the mobile station is associated with a vehicle, and process 900 includes transmitting an instruction message to start the vehicle.
In a fourth aspect, alone or in combination with one or more of the first through third aspects, the security key is a public key that is associated with an SAE-PK network.
In a fifth aspect, alone or in combination with one or more of the first through fourth aspects, the security key is an RSA private key.
Although Fig. 9 shows example blocks of process 900, in some aspects, process 900 may include additional blocks, fewer blocks, different blocks, or differently arranged blocks than those depicted in Fig. 9. Additionally, or alternatively, two or more of the blocks of process 900 may be performed in parallel.
Fig. 10 is a diagram of an example apparatus 1000 for wireless communication, in accordance with the present disclosure. The apparatus 1000 may be a mobile station (e.g., STA 140, STA 406) , or a mobile station may include the apparatus 1000. In some aspects, the apparatus 1000 includes a reception component 1002 and a transmission component 1004, which may be in communication with one
another (for example, via one or more buses and/or one or more other components) . As shown, the apparatus 1000 may communicate with another apparatus 1006 (such as a UE, a mobile station, an AP, a base station, or another wireless communication device) using the reception component 1002 and the transmission component 1004. As further shown, the apparatus 1000 may include the communication manager 1008. The communication manager 1008 may control and/or otherwise manage one or more operations of the reception component 1002 and/or the transmission component 1004. In some aspects, the communication manager 1008 may include one or more antennas, a modem, a controller/processor, a memory, or a combination thereof, of the STA described in connection with Figs. 1A and 1D. The communication manager 1008 may be, or be similar to, the communication manager 156 depicted in Fig. 1D. For example, in some aspects, the communication manager 1008 may be configured to perform one or more of the functions described as being performed by the communication manager 156. In some aspects, the communication manager 1008 may include the reception component 1002 and/or the transmission component 1004. The communication manager 1008 may include one or more of scan component 1010 and/or an OS component 1012, among other examples.
In some aspects, the apparatus 1000 may be configured to perform one or more operations described herein in connection with Figs. 1-7. Additionally, or alternatively, the apparatus 1000 may be configured to perform one or more processes described herein, such as process 800 of Fig. 8. In some aspects, the apparatus 1000 and/or one or more components shown in Fig. 10 may include one or more components of the mobile station described in connection with Fig. 2. Additionally, or alternatively, one or more components shown in Fig. 10 may be implemented within one or more components described in connection with Fig. 2. Additionally, or alternatively, one or more components of the set of components may be implemented at least in part as software stored in a memory. For example, a component (or a portion of a component) may be implemented as instructions or code stored in a non-transitory computer-readable medium and executable by a controller or a processor to perform the functions or operations of the component.
The reception component 1002 may receive communications, such as reference signals, control information, data communications, or a combination thereof, from the apparatus 1006. The reception component 1002 may provide received communications to one or more other components of the apparatus 1000. In some
aspects, the reception component 1002 may perform signal processing on the received communications (such as filtering, amplification, demodulation, analog-to-digital conversion, demultiplexing, deinterleaving, de-mapping, equalization, interference cancellation, or decoding, among other examples) , and may provide the processed signals to the one or more other components of the apparatus 1000. In some aspects, the reception component 1002 may include one or more antennas, a modem, a demodulator, a MIMO detector, a receive processor, a controller/processor, a memory, or a combination thereof, of the mobile station described in connection with Fig. 2.
The transmission component 1004 may transmit communications, such as reference signals, control information, data communications, or a combination thereof, to the apparatus 1006. In some aspects, one or more other components of the apparatus 1000 may generate communications and may provide the generated communications to the transmission component 1004 for transmission to the apparatus 1006. In some aspects, the transmission component 1004 may perform signal processing on the generated communications (such as filtering, amplification, modulation, digital-to-analog conversion, multiplexing, interleaving, mapping, or encoding, among other examples) , and may transmit the processed signals to the apparatus 1006. In some aspects, the transmission component 1004 may include one or more antennas, a modem, a modulator, a transmit MIMO processor, a transmit processor, a controller/processor, a memory, or a combination thereof, of the mobile station described in connection with Fig. 2. In some aspects, the transmission component 1004 may be co-located with the reception component 1002 in a transceiver.
The scan component 1010 may set a scan offload for Wi-Fi based at least in part on an OS of the mobile station entering a low power mode. The transmission component 1004 may transmit a probe message to scan for APs using a Wi-Fi network profile. The reception component 1002 may receive a response message from an AP. The OS component 1012 may wake up the OS based at least in part on receiving the response message from the AP.
The number and arrangement of components shown in Fig. 10 are provided as an example. In practice, there may be additional components, fewer components, different components, or differently arranged components than those shown in Fig. 10. Furthermore, two or more components shown in Fig. 10 may be implemented within a single component, or a single component shown in Fig. 10 may be implemented as multiple, distributed components. Additionally, or alternatively, a set of (one or more)
components shown in Fig. 10 may perform one or more functions described as being performed by another set of components shown in Fig. 10.
Fig. 11 is a diagram of an example apparatus 1100 for wireless communication, in accordance with the present disclosure. The apparatus 1100 may be an AP (e.g., AP 120, AP 408) , or an AP may include the apparatus 1100. As shown, the apparatus 1100 may communicate with another apparatus 1106 (such as a UE, a mobile station, an AP, a base station, or another wireless communication device) using the reception component 1102 and the transmission component 1104. As further shown, the apparatus 1000 may include the communication manager 1108. The communication manager 1108 may control and/or otherwise manage one or more operations of the reception component 1102 and/or the transmission component 1104. In some aspects, the communication manager 1108 may include one or more antennas, a modem, a controller/processor, a memory, or a combination thereof, of the AP described in connection with Figs. 1A and 1C. The communication manager 1108 may be, or be similar to, the communication manager 132 depicted in Fig. 1C. For example, in some aspects, the communication manager 1108 may be configured to perform one or more of the functions described as being performed by the communication manager 132. In some aspects, the communication manager 1108 may include the reception component 1102 and/or the transmission component 1104. The communication manager 1108 may include a security component 1110, among other examples.
In some aspects, the apparatus 1100 may be configured to perform one or more operations described herein in connection with Figs. 1-7. Additionally, or alternatively, the apparatus 1100 may be configured to perform one or more processes described herein, such as process 900 of Fig. 9. In some aspects, the apparatus 1100 and/or one or more components shown in Fig. 11 may include one or more components of the AP described in connection with Fig. 2. Additionally, or alternatively, one or more components shown in Fig. 11 may be implemented within one or more components described in connection with Fig. 2. Additionally, or alternatively, one or more components of the set of components may be implemented at least in part as software stored in a memory. For example, a component (or a portion of a component) may be implemented as instructions or code stored in a non-transitory computer-readable medium and executable by a controller or a processor to perform the functions or operations of the component.
The reception component 1102 may receive communications, such as reference signals, control information, data communications, or a combination thereof, from the apparatus 1106. The reception component 1102 may provide received communications to one or more other components of the apparatus 1100. In some aspects, the reception component 1102 may perform signal processing on the received communications (such as filtering, amplification, demodulation, analog-to-digital conversion, demultiplexing, deinterleaving, de-mapping, equalization, interference cancellation, or decoding, among other examples) , and may provide the processed signals to the one or more other components of the apparatus 1100. In some aspects, the reception component 1102 may include one or more antennas, a modem, a demodulator, a MIMO detector, a receive processor, a controller/processor, a memory, or a combination thereof, of the AP described in connection with Fig. 2.
The transmission component 1104 may transmit communications, such as reference signals, control information, data communications, or a combination thereof, to the apparatus 1106. In some aspects, one or more other components of the apparatus 1100 may generate communications and may provide the generated communications to the transmission component 1104 for transmission to the apparatus 1106. In some aspects, the transmission component 1104 may perform signal processing on the generated communications (such as filtering, amplification, modulation, digital-to-analog conversion, multiplexing, interleaving, mapping, or encoding, among other examples) , and may transmit the processed signals to the apparatus 1106. In some aspects, the transmission component 1104 may include one or more antennas, a modem, a modulator, a transmit MIMO processor, a transmit processor, a controller/processor, a memory, or a combination thereof, of the AP described in connection with Fig. 2. In some aspects, the transmission component 1104 may be co-located with the reception component 1102 in a transceiver.
The security component 1110 may exchange a public key with a mobile station. The reception component 1102 may receive, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile. The transmission component 1104 may transmit a response message that uses a security key and that includes a vendor IE that indicates ownership or authorized control of the mobile station.
The number and arrangement of components shown in Fig. 11 are provided as an example. In practice, there may be additional components, fewer components,
different components, or differently arranged components than those shown in Fig. 11. Furthermore, two or more components shown in Fig. 11 may be implemented within a single component, or a single component shown in Fig. 11 may be implemented as multiple, distributed components. Additionally, or alternatively, a set of (one or more) components shown in Fig. 11 may perform one or more functions described as being performed by another set of components shown in Fig. 11.
The following provides an overview of some Aspects of the present disclosure:
Aspect 1: A method of wireless communication performed by a mobile station, comprising: setting a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode; transmitting a probe message to scan for access points (APs) using a Wi-Fi network profile; receiving a response message from an AP; and waking up the operating system based at least in part on receiving the response message from the AP.
Aspect 2: The method of Aspect 1, wherein the mobile station is associated with a vehicle, and wherein the method further comprises: receiving an instruction message to perform an action; and causing the vehicle to perform the action based at least in part on the instruction message.
Aspect 3: The method of any of Aspects 1-2, wherein the mobile station is associated with a vehicle, and wherein the method further comprises: receiving an instruction message to unlock one or more doors of the vehicle; and causing one or more doors to be unlocked based at least in part on the instruction message.
Aspect 4: The method of any of Aspects 1-3, wherein the mobile station is associated with a vehicle, and wherein the method further comprises: receiving an instruction message to start the vehicle; and causing the vehicle to start based at least in part on the instruction message.
Aspect 5: The method of any of Aspects 1-4, wherein transmitting the probe message includes scanning, while the operating system is inactive, a subset of channels from among channels that are used when the operating system is active.
Aspect 6: The method of any of Aspects 1-5, wherein waking up the operating system includes waking up the operating system further based at least in part on a service set identifier match.
Aspect 7: The method of any of Aspects 1-6, wherein waking up the operating system includes waking up the operating system further based at least in part on a robust security network authentication.
Aspect 8: The method of any of Aspects 1-7, wherein waking up the operating system includes waking up the operating system further based at least in part on an authentication using a security key.
Aspect 9: The method of Aspect 8, wherein the security key is a public key that is associated with a simultaneous authentication of equals public key (SAE-PK) network.
Aspect 10: The method of Aspect 8, wherein the security key is a Rivest-Shamir-Adleman (RSA) public key.
Aspect 11: The method of any of Aspects 1-10, wherein waking up the operating system includes waking up the operating system further based at least in part on a vendor information element that indicates ownership or authorized control of the mobile station.
Aspect 12: The method of any of Aspects 1-11, wherein the Wi-Fi network profile is one of multiple authorized network profiles that are authorized for the mobile station.
Aspect 13: A method of wireless communication performed by an access point (AP) , comprising: exchanging a public key with a mobile station; receiving, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile; and transmitting a response message that uses a security key and that includes a vendor information element (IE) that indicates ownership or authorized control of the mobile station.
Aspect 14: The method of Aspect 13, wherein the mobile station is associated with a vehicle, and wherein the method further comprises transmitting an instruction message for the vehicle to perform the action.
Aspect 15: The method of any of Aspects 13-14, wherein the mobile station is associated with a vehicle, and wherein the method further comprises transmitting an instruction message to unlock one or more doors of the vehicle.
Aspect 16: The method of any of Aspects 13-15, wherein the mobile station is associated with a vehicle, and wherein the method further comprises transmitting an instruction message to start the vehicle.
Aspect 17: The method of any of Aspects 13-16, wherein the security key is a public key that is associated with a simultaneous authentication of equals public key (SAE-PK) network.
Aspect 18: The method of any of Aspects 13-17, wherein the security key is a Rivest-Shamir-Adleman (RSA) private key.
Aspect 19: An apparatus for wireless communication at a device, comprising a processor; memory coupled with the processor; and instructions stored in the memory and executable by the processor to cause the apparatus to perform the method of one or more of Aspects 1-18.
Aspect 20: A device for wireless communication, comprising a memory and one or more processors coupled to the memory, the one or more processors configured to perform the method of one or more of Aspects 1-18.
Aspect 21: An apparatus for wireless communication, comprising at least one means for performing the method of one or more of Aspects 1-18.
Aspect 22: A non-transitory computer-readable medium storing code for wireless communication, the code comprising instructions executable by a processor to perform the method of one or more of Aspects 1-18.
Aspect 23: A non-transitory computer-readable medium storing a set of instructions for wireless communication, the set of instructions comprising one or more instructions that, when executed by one or more processors of a device, cause the device to perform the method of one or more of Aspects 1-18.
The foregoing disclosure provides illustration and description but is not intended to be exhaustive or to limit the aspects to the precise forms disclosed. Modifications and variations may be made in light of the above disclosure or may be acquired from practice of the aspects.
As used herein, the term “component” is intended to be broadly construed as hardware and/or a combination of hardware and software. “Software” shall be construed broadly to mean instructions, instruction sets, code, code segments, program code, programs, subprograms, software modules, applications, software applications, software packages, routines, subroutines, objects, executables, threads of execution, procedures, and/or functions, among other examples, whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise. As used herein, a “processor” is implemented in hardware and/or a combination of hardware and software. It will be apparent that systems and/or methods described herein may be implemented in different forms of hardware and/or a combination of hardware and software. The actual specialized control hardware or software code used to implement these systems and/or methods is not limiting of the aspects. Thus, the
operation and behavior of the systems and/or methods are described herein without reference to specific software code, since those skilled in the art will understand that software and hardware can be designed to implement the systems and/or methods based, at least in part, on the description herein.
As used herein, “satisfying a threshold” may, depending on the context, refer to a value being greater than the threshold, greater than or equal to the threshold, less than the threshold, less than or equal to the threshold, equal to the threshold, not equal to the threshold, or the like.
Even though particular combinations of features are recited in the claims and/or disclosed in the specification, these combinations are not intended to limit the disclosure of various aspects. Many of these features may be combined in ways not specifically recited in the claims and/or disclosed in the specification. The disclosure of various aspects includes each dependent claim in combination with every other claim in the claim set. As used herein, a phrase referring to “at least one of” a list of items refers to any combination of those items, including single members. As an example, “at least one of: a, b, or c” is intended to cover a, b, c, a + b, a + c, b + c, and a + b + c, as well as any combination with multiples of the same element (e.g., a + a, a + a + a, a + a + b, a + a + c, a + b + b, a + c + c, b + b, b + b + b, b + b + c, c + c, and c + c + c, or any other ordering of a, b, and c) .
No element, act, or instruction used herein should be construed as critical or essential unless explicitly described as such. Also, as used herein, the articles “a” and “an” are intended to include one or more items and may be used interchangeably with “one or more. ” Further, as used herein, the article “the” is intended to include one or more items referenced in connection with the article “the” and may be used interchangeably with “the one or more. ” Furthermore, as used herein, the terms “set” and “group” are intended to include one or more items and may be used interchangeably with “one or more. ” Where only one item is intended, the phrase “only one” or similar language is used. Also, as used herein, the terms “has, ” “have, ” “having, ” or the like are intended to be open-ended terms that do not limit an element that they modify (e.g., an element “having” A may also have B) . Further, the phrase “based on” is intended to mean “based, at least in part, on” unless explicitly stated otherwise. Also, as used herein, the term “or” is intended to be inclusive when used in a series and may be used interchangeably with “and/or, ” unless explicitly stated otherwise (e.g., if used in combination with “either” or “only one of” ) .
Claims (30)
- A mobile station for wireless communication, comprising:a memory; andone or more processors, coupled to the memory, configured to:set a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode;transmit a probe message to scan for access points (APs) using a Wi-Fi network profile;receive a response message from an AP; andwake up the operating system based at least in part on receiving the response message from the AP.
- The mobile station of claim 1, wherein the mobile station is associated with a vehicle, and wherein the one or more processors are configured to:receive an instruction message to perform an action; andcause the vehicle to perform the action based at least in part on the instruction message.
- The mobile station of claim 1, wherein the mobile station is associated with a vehicle, and wherein the one or more processors are configured to:receive an instruction message to unlock one or more doors of the vehicle; andcause one or more doors to be unlocked based at least in part on the instruction message.
- The mobile station of claim 1, wherein the mobile station is associated with a vehicle, and wherein the one or more processors are configured to:receive an instruction message to start the vehicle; andcause the vehicle to start based at least in part on the instruction message.
- The mobile station of claim 1, wherein the one or more processors, to transmit the probe message, are configured to scan, while the operating system is inactive, a subset of channels from among channels that are used when the operating system is active.
- The mobile station of claim 1, wherein the one or more processors, to wake up the operating system, are configured to wake up the operating system based at least in part on a service set identifier match.
- The mobile station of claim 1, wherein the one or more processors, to wake up the operating system, are configured to wake up the operating system based at least in part on a robust security network authentication.
- The mobile station of claim 1, wherein the one or more processors, to wake up the operating system, are configured to wake up the operating system based at least in part on an authentication using a security key.
- The mobile station of claim 8, wherein the security key is a public key that is associated with a simultaneous authentication of equals public key (SAE-PK) network.
- The mobile station of claim 8, wherein the security key is a Rivest-Shamir-Adleman (RSA) public key.
- The mobile station of claim 1, wherein the one or more processors, to wake up the operating system, are configured to wake up the operating system based at least in part on a vendor information element that indicates ownership or authorized control of the mobile station.
- The mobile station of claim 1, wherein the Wi-Fi network profile is one of multiple authorized network profiles that are authorized for the mobile station.
- An access point (AP) for wireless communication, comprising:a memory; andone or more processors, coupled to the memory, configured to:exchange a public key with a mobile station;receive, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile; andtransmit a response message that uses a security key and that includes a vendor information element (IE) that indicates ownership or authorized control of the mobile station.
- The AP of claim 13, wherein the mobile station is associated with a vehicle, and wherein the one or more processors are configured to transmit an instruction message for the vehicle to perform an action.
- The AP of claim 13, wherein the mobile station is associated with a vehicle, and wherein the one or more processors are configured to transmit an instruction message to unlock one or more doors of the vehicle.
- The AP of claim 13, wherein the mobile station is associated with a vehicle, and wherein the one or more processors are configured to transmit an instruction message to start the vehicle.
- The AP of claim 13, wherein the security key is a public key that is associated with a simultaneous authentication of equals public key (SAE-PK) network.
- The AP of claim 13, wherein the security key is a Rivest-Shamir-Adleman (RSA) private key.
- A method of wireless communication performed by a mobile station, comprising:setting a scan offload for Wi-Fi based at least in part on an operating system of the mobile station entering a low power mode;transmitting a probe message to scan for access points (APs) using a Wi-Fi network profile;receiving a response message from an AP; andwaking up the operating system based at least in part on receiving the response message from the AP.
- The method of claim 19, wherein the mobile station is associated with a vehicle, and wherein the method further comprises:receiving an instruction message to perform an action; andcausing the vehicle to perform the action based at least in part on the instruction message.
- The method of claim 19, wherein waking up the operating system includes waking up the operating system further based at least in part on a service set identifier match.
- The method of claim 19, wherein waking up the operating system includes waking up the operating system further based at least in part on a robust security network authentication.
- The method of claim 19, wherein waking up the operating system includes waking up the operating system further based at least in part on an authentication using a security key.
- The method of claim 23, wherein the security key is a public key that is associated with a simultaneous authentication of equals public key (SAE-PK) network.
- The method of claim 23, wherein the security key is a Rivest-Shamir-Adleman (RSA) public key.
- The method of claim 19, wherein waking up the operating system includes waking up the operating system further based at least in part on a vendor information element that indicates ownership or authorized control of the mobile station.
- A method of wireless communication performed by an access point (AP) , comprising:exchanging a public key with a mobile station;receiving, from the mobile station, a probe message that is associated with scanning for APs using a Wi-Fi network profile; andtransmitting a response message that uses a security key and that includes a vendor information element (IE) that indicates ownership or authorized control of the mobile station.
- The method of claim 27, wherein the mobile station is associated with a vehicle, and wherein the method further comprises transmitting an instruction message for the vehicle to perform an action.
- The method of claim 27, wherein the security key is a public key that is associated with a simultaneous authentication of equals public key (SAE-PK) network.
- The method of claim 27, wherein the security key is a Rivest-Shamir-Adleman (RSA) private key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2023/073458 WO2024156070A1 (en) | 2023-01-24 | 2023-01-24 | Wi-fi for mobile station wake up |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2023/073458 WO2024156070A1 (en) | 2023-01-24 | 2023-01-24 | Wi-fi for mobile station wake up |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024156070A1 true WO2024156070A1 (en) | 2024-08-02 |
Family
ID=91969813
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2023/073458 WO2024156070A1 (en) | 2023-01-24 | 2023-01-24 | Wi-fi for mobile station wake up |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2024156070A1 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160198326A1 (en) * | 2015-01-03 | 2016-07-07 | Google Inc. | Methods and Systems for Varying Channel Scanning Duration |
US20190191375A1 (en) * | 2016-08-16 | 2019-06-20 | Huawei Technologies Co., Ltd. | Method and Apparatus for Waking Up Wireless Device |
US20190191301A1 (en) * | 2016-08-31 | 2019-06-20 | Huawei Technologies Co., Ltd. | Association Establishment Method in Wireless Local Area Network, Terminal, and Access Point |
US20200351772A1 (en) * | 2019-04-30 | 2020-11-05 | Qualcomm Incorporated | Bracketed scans |
US20220176999A1 (en) * | 2020-12-08 | 2022-06-09 | Ford Global Technologies, Llc | Employing Wi-Fi Communications To Activate An Operation Of An Autonomous Vehicle At A Scheduled Time |
-
2023
- 2023-01-24 WO PCT/CN2023/073458 patent/WO2024156070A1/en unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160198326A1 (en) * | 2015-01-03 | 2016-07-07 | Google Inc. | Methods and Systems for Varying Channel Scanning Duration |
US20190191375A1 (en) * | 2016-08-16 | 2019-06-20 | Huawei Technologies Co., Ltd. | Method and Apparatus for Waking Up Wireless Device |
US20190191301A1 (en) * | 2016-08-31 | 2019-06-20 | Huawei Technologies Co., Ltd. | Association Establishment Method in Wireless Local Area Network, Terminal, and Access Point |
US20200351772A1 (en) * | 2019-04-30 | 2020-11-05 | Qualcomm Incorporated | Bracketed scans |
US20220176999A1 (en) * | 2020-12-08 | 2022-06-09 | Ford Global Technologies, Llc | Employing Wi-Fi Communications To Activate An Operation Of An Autonomous Vehicle At A Scheduled Time |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11863978B2 (en) | Fast basic service set transition for multi-link operation | |
EP4059302B1 (en) | Priority access in a wireless local area network (wlan) | |
US12250741B2 (en) | Security for multi-link operation in a wireless local area network (WLAN) | |
US11812257B2 (en) | Multi-link wireless communication security | |
KR102432309B1 (en) | Systems and Methods Enabling Network-Adjusted MAC Randomization for Wi-Fi Privacy | |
EP4427501A1 (en) | Coordinated scheduling and signaling of restricted target wake time (r-twt) service periods | |
US20200059784A1 (en) | Authentication of wireless communications | |
US20200044844A1 (en) | Authentication of wireless communications | |
CN115462107B (en) | Safety Long Training Field (LTF) | |
US11102036B2 (en) | Preamble design for wake-up signals | |
US20230087211A1 (en) | Variable authentication identifier (aid) for access point (ap) privacy | |
US20230098093A1 (en) | Variable authentication identifier (aid) for access point (ap) privacy | |
US20230239139A1 (en) | Methods and arrangements for encryption of group addressed management frames | |
WO2024156070A1 (en) | Wi-fi for mobile station wake up | |
US20240314555A1 (en) | Common frames for authentication and encryption | |
WO2024007239A1 (en) | Preventing attacks in a mixed wpa2 and wpa3 environment | |
WO2025151279A2 (en) | Secure control frames in wireless communications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23918079 Country of ref document: EP Kind code of ref document: A1 |