WO2024188857A1 - Dynamic setting of station association parameters to improve user privacy and communication reliability - Google Patents
Dynamic setting of station association parameters to improve user privacy and communication reliability Download PDFInfo
- Publication number
- WO2024188857A1 WO2024188857A1 PCT/EP2024/056189 EP2024056189W WO2024188857A1 WO 2024188857 A1 WO2024188857 A1 WO 2024188857A1 EP 2024056189 W EP2024056189 W EP 2024056189W WO 2024188857 A1 WO2024188857 A1 WO 2024188857A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- station
- public identifier
- value
- new value
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/73—Access point logical identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/61—Time-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
Definitions
- the present disclosure relates to wireless communications and more specifically to user privacy during wireless communications.
- Wireless communication networks are widely deployed to provide various communication services such as voice, video, packet data, messaging, broadcast, etc. These wireless networks may be multiple-access networks capable of supporting multiple users by sharing the available network resources. Examples of such multiple-access networks include Code Division Multiple Access (CDMA) networks, Time Division Multiple Access (TDMA) networks, Frequency Division Multiple Access (FDMA) networks, Orthogonal FDMA (OFDMA) networks, and Single-Carrier FDMA (SC-FDMA) networks.
- CDMA Code Division Multiple Access
- TDMA Time Division Multiple Access
- FDMA Frequency Division Multiple Access
- OFDMA Orthogonal FDMA
- SC-FDMA Single-Carrier FDMA
- the Media Access Control (MAC) address of a user device constitutes a piece of data that can be used to track this user.
- the access points (APs) of wireless networks can monitor the locations of mobile devices (tablets, laptops, mobile phones, etc.) of a user without his/her consent, by means of their MAC addresses. This is because mobile phones are configured to discover surrounding access points to wireless networks. As a user moves, his/her mobile phone sends requests to determine if there are any access points nearby, these requests identifying the mobile phone which sends these requests and including in particular the MAC address of the mobile phone. Access points that hear these requests can respond. In the context of Wi-Fi networks as defined by IEEE 802.11 standards (Wi-Fi is a trademark), this procedure is called Probe Request/Response exchange.
- surrounding access points may receive its MAC address. It is then possible to track a user by reconstructing his/her trajectory from access points to which his/her mobile phone has sent its MAC address.
- the access point may have recorded in a database the MAC address of the phone in association with the identification information. Therefore, even if the user is not connected to the Wi-Fi network, this identity information could be recovered by comparing the MAC address contained in a Probe Request to the MAC address used for the past association.
- Randomized and Changing MAC (RCM) procedure. It has been originally introduced as a privacy enhancing feature in the 802.11aq Pre-Association Service Discovery Task Group and finally included in the standard IEEE Std 802.11-2020. It comprises periodical change of the MAC address of a non-AP station (i.e. a station which is not an access point) to a random value, while the non-AP station is not associated with a network (or, equivalently, with an access point).
- the non-AP station may construct the randomized MAC address from the locally administered address space as defined in IEEE Std 8020-2014 and IEEE Std 802cTM-2017.
- MIB Management Information Base
- the MAC address, or Elll-48 address, of a device is an Extended Unique Identifier (EUI) composed of 48 bits. It can be administered universally or locally. A universally administered address is uniquely assigned to the device by the manufacturer. On the contrary, a locally administered address is assigned to the device by a software or a network administrator, and replaces the physical burned- in address.
- the second-least-significant bit of the first octet of the MAC address i.e. the seventh bit of the first octet of the address, also referred to as “U/L bit” (for “Universal/Local bit”), indicates whether it is universally (when set to 0) or locally (when set to 1) administered.
- the least-significant bit of the first octet of the MAC address i.e. the eighth bit of the first octet of the address, also referred to as “l/G bit” (for “Individual/Group bit”), indicates whether the frame is sent to only one receiving device (when set to 0, indicating unicast transmission) or to a plurality of devices (when set to 1 , indicating multicast transmission).
- the MAC address of the non-AP station is randomly changed (for instance periodically). More specifically, the U/L bit is set to 1 , the l/G bit is set to 0, and the remaining 46 bits are randomly generated by using a pseudorandom function (PRF).
- PRF pseudorandom function
- RCM When the RCM is operated, counters in all sequence number spaces used to identify data frames (MAC service data units, MSDUs, packets or Management MAC Protocol Data Units, MMPDUs, frames) have to be reset and the non-AP station also resets seeds used within the PHY DATA scrambler on the next physical layer protocol data unit, PPDU, to be transmitted.
- Some RCM implementations propose a mechanism for an AP and an associated non-AP station (denoted STA) to generate a new MAC address without exchanging it.
- the inventors have observed that the MAC address is not the only identifier present in clear in frames exchanged between stations of a wireless LAN, and an eavesdropper may capture other elements that uniquely identify emitting stations.
- one of these unique identifiers is the Association Identifier (AID).
- AID Association Identifier
- This identifier that is assigned by an access point upon association with a station, is communicated in an Association Response frame sent by the access point in the last frame exchange of the association process.
- the AID is a 16 bit identifier that is locally unique. This means that two stations associated with two different Basic Service Sets (BSSs) of an AP station may have the same AID value, but two stations associated with the same BSS shall not share the same AID value.
- BSSs Basic Service Sets
- the AID has been originally introduced to reduce the signaling overhead when an AP wants to identify a station for delivery of buffered frames when power-saving is enabled.
- the AID is advantageously used in replacement of the MAC address (that is 48 bit long) when an AP indicates in Traffic Indication Messages that it has some traffic waiting for transmission to a station in power save state. But of course, the range of value for the AID selection is much shorter. In addition, in IEEE 802.11 series, the AID for a station is limited to a sub range [1 ; 2,007] of an 11 bit identifier (instead of the 2,045 possible values), the other values being reserved to identify some groups of stations, or specific signalling (unassigned resource, resources for random access, etc.).
- an IEEE 802.11 bi requirement document includes requirements mandating to define a mechanism for a station to change its AID address.
- the present disclosure proposes a mechanism that allows a non-AP station (STA) to generate its new AID upon MAC address change and also propose a mechanism for the AP station to solve potential collision issues before such collisions effectively occur.
- STA non-AP station
- a method for changing a value of a public identifier of a non-access point, non-AP, station associated with an access point, AP, station, the non-AP station and the AP station both using a same mechanism for determining a new value of the public identifier comprising at the AP station: obtaining a new value for the public identifier; identifying a need for changing the obtained new value; generating a request for changing a new value for the public identifier, obtained by the non-AP station, corresponding to the new value obtained by the AP station; and transmitting the generated request to the non-AP station.
- the method of the disclosure makes it possible to change efficiently one or more public identifier values to improve user privacy, communication reliability, and use of communication resources. More particularly, user privacy may be improved by allowing a station to change its AID upon MAC address change, while being associated, without breaking the ongoing connection. In most cases, the change of the AID is not easily detectable since there is no (or few) message exchange.
- the determining a need for changing the obtained new value comprises determining that the obtained new value is assigned to another non-AP station.
- the determining a need for changing the obtained new value comprises determining that the obtained new value is in violation of at least one value assignment rule of the AP station.
- the method further comprises generating another new value for the public identifier.
- the generated request comprises the generated another new value.
- the generated request comprises at least one item of information enabling the non-AP station to generate another new value for the public identifier.
- the at least one item of information comprises a range of values to which the another new value should belong, an offset for computing another new value from a new value, a number of iterations of a value generation process, or at least one initialization parameter of a pseudo-random number generator.
- the method further comprises a forbidding of using the new value for the public identifier to transmit one or more messages to a non-AP station.
- using the new value for the public identifier to transmit one or more messages to a non-AP station is forbidden until another new value for the public identifier is determined.
- the generated request is a request for changing the value of a plurality of public identifiers.
- the generated request is a protected action frame.
- the generated request comprises an indication of a moment at which a new value for the public identifier is to be used.
- the generated request comprises an item of information for identifying the public identifier.
- the method of the disclosure makes it possible to change efficiently one or more public identifier values to improve user privacy, communication reliability, and use of communication resources. More particularly, user privacy may be improved by allowing a station to change its AID upon MAC address change, while being associated, without breaking the ongoing connection. In most cases, the change of the AID is not easily detectable since there is no (or few) message exchange.
- the method further comprises determining whether the non-AP station is in a transition period and, if the non-AP station is not in a transition period, initiating a transition period.
- the method further comprises generating and transmitting a response to the request for changing the new value for the public identifier, the response being indicative of the determination of the another new value.
- the method further comprises determining the moment at which the another new value is to be used, based on at least one item of information of the received request.
- the public identifier is an Association Identifier, AID.
- a method for changing a value of a public identifier of a non-access point, non-AP, station associated with an access point, AP, station, the non-AP station and the AP station both using a same mechanism for determining a new value of the public identifier comprising at the AP station: obtaining a range of values for the value of the public identifier; generating an information element comprising a representation of the obtained range of values, the obtained range of values having to be used by the non-AP station each time a new value of the public identifier is to be determined; and transmitting the generated information element to the non-AP station.
- a method for changing a value of a public identifier of a non-access point, non-AP, station associated with an access point, AP, station, the non-AP station and the AP station both using a same mechanism for determining a new value of the public identifier comprising at the non-AP station: receiving, from the AP station, an information element comprising a representation of a range of values of the public identifier and storing the received range of values; and each time a value of the public identifier is needed, determining a value of the public identifier, the determined value belonging to the range of values stored.
- the public identifier is an Association Identifier, AID.
- the third and fourth aspects of the disclosure make it possible to improve use of communication resources, in particular to reduce the number of messages to be exchanged and the risk of conflicting public identifier values.
- a device comprising a processing unit configured for carrying out each of the steps of the method described above.
- the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a "circuit", "module” or "system”.
- the present disclosure may take the form of a computer program product embodied in any tangible medium of expression having computer usable program code embodied in the medium.
- a tangible carrier medium may comprise a storage medium such as a floppy disk, a CD-ROM, a hard disk drive, a magnetic tape device or a solid state memory device and the like.
- a transient carrier medium may include a signal such as an electrical signal, an electronic signal, an optical signal, an acoustic signal, a magnetic signal or an electromagnetic signal, e.g. a microwave or RF signal.
- Figure 1 illustrates an example of a network system in which some embodiments of the disclosure may be implemented
- Figure 2a illustrates a first example of a sequence of steps for operating a procedure for changing a public identifier of a non-AP station associated with an AP station, according to some embodiments of the disclosure
- Figure 2b illustrates a particular case of the example illustrated in Figure 2a, illustrating an example of a sequence of steps wherein the public identity change is initiated by the AP, according to some embodiments of the disclosure
- Figure 4 illustrates an example of steps performed by an AP station for determining a new public identifier value to be used, according to some embodiments of the disclosure
- Figure 5 illustrates an example of steps carried out by a non-AP station upon reception of a frame requesting a change of one or more public identifier values
- Figure 6 illustrates examples of the format of change request frames
- Figure 7 illustrates an example of the format of a change response frame
- Figure 8 illustrates an example of frame formats of two Information Elements enabling a non-AP station to change its AID
- Figure 9 illustrates an example of a communication device of a wireless network, configured to implement at least one embodiment of the present disclosure.
- the value of one or more particular station association parameters may be changed after the values of a set of station association parameters, comprising the particular parameters, are set.
- the change may occur for example in case of conflicting values.
- Such particular parameters may be identifiers, in particular public identifiers also referred to as obfuscated identifiers, blind identifiers, concealed identifiers, or over the air (OTA) identifiers, that is to say parameters that value is transmitted in clear in different fields of frames exchanged between a station and its associated access point.
- OTA over the air
- public identifiers that are typically part of the headers of the frames and may change over time to avoid an eavesdropper to track a station activity and movement
- private identifiers also called device identifiers, or device IDs
- device IDs may remain the same for a much longer period of time and remain secret.
- a new value of one or more public identifiers is determined independently in an AP station and in a non-AP station, using the same mechanism to provide same results, and it is checked in the AP station whether the new value may be used reliably (e.g., whether the new value is not conflicting with a value already in use). If there is a risk, the AP station generates another new value and requests the non-AP station to use this another new value. The AP station may provide this another new value to the non-AP station or may provide the non-AP station with items of information enabling the non-AP station to generate this value.
- Figure 1 illustrates an example of a network system in which some embodiments of the disclosure may be implemented.
- Figure 1 represents an 802.11 network (i.e. a Wi-Fi network) system 100 comprising four wireless devices: an access point station (AP) 105 and three non-AP stations (non-AP STAs) 110a, 110b, and 110c.
- AP station 105 provides wireless connections between non-AP stations 110a, 110b, 110c and a wider network, such as the Internet (not represented).
- the connection of one of non-AP stations 110a, 110b, and 110c to AP 105 may be performed by a standardized process called association.
- the non-AP station can send data to the network and receive data from the network through the AP station.
- AP station 105 may comprise, be implemented as, or known as a Node B, Radio Network Controller (RNC), evolved Node B (eNB), 5G Next generation base station (gNB), Base Station Controller (BSC), Base Transceiver Station (BTS), Base Station (BS), Transceiver Function (TF), Radio Router, Radio Transceiver, Basic Service Set (BSS), Extended Service Set (ESS), Radio Base Station (RBS), or some other terminology. It can be a standalone product or it may be integrated in a device, for instance in a broadband remote access server (BRAS).
- Non-AP stations 110a, 110b, and/or 110c may comprise, be implemented as, or known as a subscriber station, a subscriber unit, a mobile station (MS), a remote station, a remote terminal, a user terminal (UT), a user agent, a user device, a user equipment (UE), a user station (STA), or some other terminology.
- a non-AP station may be or may comprise a cellular telephone, a cordless telephone, a Session Initiation Protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a handheld device having wireless connection capability, or some other suitable processing device connected to a wireless modem.
- SIP Session Initiation Protocol
- WLL wireless local loop
- PDA personal digital assistant
- a phone e.g., a cellular phone or a smartphone
- a computer e.g., a laptop
- a tablet e.g., a portable communication device, a portable computing device (e.g., a personal data assistant), an entertainment device (e.g., a music or video device, or a satellite radio), a global positioning system (GPS) device, or any other suitable device that is configured to communicate via a wireless or wired medium.
- some of non-AP stations 110a, 110b, and 110c may be wireless nodes. Such a wireless node may provide, for example, connectivity for or to a network (e.g., a wide area network such as the Internet or a cellular network) via a wired or wireless communication link.
- a network e.g., a wide area network such as the Internet or a cellular network
- AP station 105 manages a set of stations that together organize their accesses to the wireless medium for communication purposes. All the stations (AP station 105 and non-AP stations 110a, 110b, and 110c) form a service set, which may be referred to as basic service set, BSS (although other terminology can be used). It is noted that AP station 105 may manage more than one BSS: each BSS is thus uniquely identified by a specific basic service set identifier (BSSID) and managed by a separate virtual AP station implemented in physical AP station 105.
- BSSID basic service set identifier
- Figure 2a illustrates a first example of a sequence of steps for operating a procedure for changing a public identifier (for example the AID or the Over The Air (OTA) MAC address) of a non-AP station associated with an AP station, according to some embodiments of the disclosure.
- a public identifier for example the AID or the Over The Air (OTA) MAC address
- the public identifier changing procedure basically comprises two phases: a first phase during which new public identifier values for one or more non-AP stations are computed and during which the AP station and the one or more non-AP stations identify the effective change start time, and a second phase corresponding to an effective change of the public identifier values of these non-AP stations.
- the effective change of public identifier values starts at a time called SERCPI change start time and ends at the latest at a time called maximum SERCPI change end time, from which the new calculated public identifier values are used for data exchanges between the considered non-AP stations and the AP station with which they are associated, SERCPI standing for Seamless Enhanced Randomized and Changing Public Identifier.
- each considered non- AP station changes its public identifier value from a current value (for instance AID(n) or @MAC(n)) to a new value (AID(n+1) or @MAC(n+1)).
- AID(n+1) or @MAC(n+1) AID(n+1) or @MAC(n+1)
- the new public identifier values must be calculated by the considered non-AP station(s) and by the AP station.
- the non-AP station(s) and the AP station start the effective change procedure and, at the maximum SERCPI change end time (or earlier), they modify their respective registry by updating the public identifier values of each of the considered non-AP stations from old to new values for each public identifier.
- both AP and non-AP STA initiate the public identifier change for the changing non-AP STA.
- the way the AP station and the non-AP stations initially determine the new public identifier values to be used, for example the new MAC addresses or Al Ds, is out of scope of the disclosure.
- the AP station and the non-AP stations may, for instance, store a list of identifier values, and each time a change of public identifier values must be performed, the next value in the list is chosen as the identifier value.
- Such embodiments could, however, lead to security issues if a third party had access to the list.
- the same function may be used by a non-AP station and the AP station with which it is associated to determine, for example, an index of the next identifier values to use in a predetermined list of identifier values. This index may be advantageously determined randomly.
- Another public identifier selection method can be used. For example, it may be based on the usage of a pseudorandom function (PRF) with the same input parameters. Therefore, both a non-AP station and the AP station with which it is associated obtain the same value for their public identifiers (AID(n+1) and/or @MAC(n+1) for instance).
- PRF pseudorandom function
- AP station 105 indicates to non-AP stations 110a and 110b for which the initiation procedure has been performed that they have to change their respective public identifier values, and non-AP stations 110a and 110b initiate the change of their respective public identifier values at the same time (the SERCPI change start time).
- the SERCPI change start time may be expressed in terms of a number of Target Beacon Transmission Times (TBTTs).
- TBTTs Target Beacon Transmission Times
- the SERCPI change start time may be expressed differently, for example as an actual time (which may be rounded to avoid any problem due to an imperfect synchronization of the clocks of the non-AP and AP stations).
- beacon frames may include a field storing an item of information to indicate a SERCPI change date.
- an item of information may represent a value of a counter that is decremented within each successive beacon frame transmitted by the AP station so as to indicate that a change of a public identifier value is in progress and to indicate the SERCPI change date.
- each beacon frame transmitted by AP station 105 to non-AP stations 110a and 110b of the BSS may contain an information element providing a SERCPI maximum transition period.
- the counter may be initially set to a value corresponding to the time at which the change must be operated (for instance, an initial value of k may indicate that the change must be operated in (k+1) TBTTs, k being an integer), and decremented of one unit at each transmission of a next beacon frame.
- an initial value of k may indicate that the change must be operated in (k+1) TBTTs, k being an integer
- the counter When the counter reaches the value 0, the change must be operated. Therefore, all transmissions of frames subsequent to the beacon frame associated with a counter equal to 0 must be performed with the new public identifier value(s).
- the counter is initialized to its maximum value and is constantly decreasing of one unit (going back to its maximum value when reaching 0) at each transmission of a next beacon. When the counter reaches a predetermined value, that can be different for each non-AP station associated with the AP station, the change must be operated by the corresponding non-AP stations.
- non-AP stations 110a and 110b receive a beacon frame including a counter, denoted SERCPI Change counter, initially set to value k (step 200). It indicates that non-AP stations 110a and 110b (for which an initiation procedure has been done) must change their respective public identifier values at a time corresponding to (k+1) TBTTs. Then, a next beacon frame is sent from AP station 105 to non-AP stations 110a and 110b (step 205), comprising SERCPI Change counter with a value (k-1).
- SERCPI Change counter a counter
- AP station 105 After (k+1) beacon frame transmissions, AP station 105 sends a beacon frame with SERCPI Change counter equal to 0 to non- AP stations 110a and 110b (step 210), indicating that the change of the respective public identifier values of non-AP stations 110a and 110b must be initiated.
- the new public identifier values of non-AP stations 110a and 110b should be determined at any time between steps 200 and 210, that it to say after requesting the public identifier change and before starting the effective public identifier change.
- the transition duration (referenced 220) between SERCPI change start time 210 and max SERCPI change end time 215 advantageously allows the AP station and the non-AP stations to transmit the frames addressed with the old public identifier values (e.g., AID(n) or @MAC(n)) that were buffered in their transmission buffer. This allows to change the public identifier values without breaking the on-going transmissions, making it possible that frequent public identifier changes do not have negative effects on the performances.
- the old public identifier values e.g., AID(n) or @MAC(n)
- AP 105 may initiate a public identifier change by sending a public identifier change request to non-AP stations 110a and/or 110b that in turn confirm determination of another new public identifier in a public identifier change response (referenced 230).
- a request for another new public identifier value may be needed if it is determined that a new public identifier value to be used conflicts with another public identifier value, for example a public identifier used by another non-AP station. This may happen in particular when the considered public identifier is an AID since the number of AID possible values is rather small compared to the number of possible MAC address values.
- Figure 2b illustrates a particular case of the example illustrated in Figure 2a, illustrating an example of a sequence of steps wherein the public identity change is initiated by the AP station contrary to the example of figure 3 where the public identifier changing procedure may be initiated by non-AP station 110a.
- AP station 105 detects a conflict only on AID of the non-AP station 110a (STA2) and selects another new public identifier value (another new AID value in this example) that is sent to the non-AP station to be used in place of the new public identifier value computed by the non- AP station.
- STA2 AID of the non-AP station 110a
- another new public identifier value another new AID value in this example
- each non-AP station (STA1 and STA2) computes locally new public identity values (STA1 : @MACi and AIDi computing, STA2: @MAC2 and AID2 computing).
- the AP station performs the same operations and computes same values (STAs @MAC and AID computing);
- This example describes a mechanism to generate a new AID for an associated STA upon its OTA MAC address modification.
- the described mechanism allows the generation of a new AID for an associated STA without any message exchange in most scenario.
- the resolution of potential AIDs conflict by the AP is also described.
- the AP can provide a new AID to the STA.
- Figures 4 and 5 illustrates examples of steps for requesting and setting other new public identifier values, in particular in case of conflict or when a new public identifier value to be used does not meet required conditions.
- Figure 3 illustrates a second example of a sequence of steps for operating a procedure for changing a public identifier of a non-AP station associated with an AP station, according to some embodiments of the disclosure.
- the public identifier changing procedure may be initiated by non-AP station 110a.
- a request for changing the public identifier value of the considered non-AP station i.e. non-AP station 110a in this example
- This request may be an “SERCPI change Request”, for example “SERCPI change Request” 300.
- This request may contain an indication relative to the SERCPI change date and to the SERCPI max. transition period duration.
- it may comprise a field indicating, for example in terms of TBTTs, the date of the next public identifier change.
- a value set to k may indicate that the change must be operated in (k+1) TBTTs
- a value set to 0 may indicate that the next public identifier is to be applied immediately. Accordingly, all message transmissions subsequent to the transmission of the beacon frame associated with a counter equal to 0 should be performed by using the new public identifier.
- the SERCPI change request frame may also contain a field indicating the maximum duration of the transition period. At the expiration of the transition period, both the AP station and the non-AP station should use the new public identifier value.
- AP station 105 may acknowledge that it has received the request and that it agrees to change the public identifier value of non-AP station 110a (step 305), for example by sending to non-AP station 110a a “SERCPI change Response”.
- non-AP station 110a may implement a counter reflecting the SERCPI change date (e.g. a counter equal to k or (k-1)) when it sends the request for changing its public identifier, the SERCPI change date being here expressed in a number of TBTTs.
- the counter may be decremented by one unit.
- the change of the public identifier is initiated.
- the new public identifier of non-AP station 110a is effective (at the beginning of the next TBTT). This means that all transmissions subsequent to the transmission of the beacon frame corresponding to the maximum SERCPI change end time (step 315) are done with the new public identifier value.
- the new public identifier value of non-AP station 110a should be determined at any time between steps 300 and 310, that it to say after requesting the public identifier change and before starting the effective public identifier change.
- an AP station may request that only one non-AP station changes its public identifier value.
- a SERCPI change request similar to the one described by reference to Figure 3 may be sent from the AP station to the considered non-AP station.
- AP 105 may initiate a public identifier change by sending a public identifier change request to non-AP stations 110a that in turn confirm determination of another new public identifier value in a public identifier change response (referenced 330).
- a request for another new public identifier value may be needed if it is determined that a new public identifier value to be used conflicts with another public identifier value, for example a public identifier value used by another non-AP station.
- Figure 4 illustrates an example of steps performed by an AP station for determining a new public identifier value to be used, according to some embodiments of the disclosure. Such steps may be carried out between steps 225 and 230 in Figure 2a or 2b or steps 325 and 330 in Figure 3 to determine that another new public identifier value is needed.
- the AP station After having determined association parameter values enabling exchange of data between an AP station and a non-AP station (step 400), the AP station determines that one or more of these parameter values, representing here public identifier values, need to be changed (step 405), for example for user privacy reasons. For the sake of illustration, this determination may be based on a previously negotiated frequency of change of these parameter values or, according to the examples illustrated in Figures 2a, 2b, and 3, upon transmission of a beacon indicating that a change is to be made.
- the AP station and the non-AP station generate almost simultaneously the same value for one or more public identifiers, for example the AID (i.e., the AP station and the non-AP station generate the same value locally using the same shared function and parameters).
- This embodiment makes it possible to avoid exchange of additional messages between the AP station and the non-AP station thus increasing privacy and reducing overhead.
- the AP station may determine whether the one or more newly generated public identifier values create a conflict with existing values of the same public identifier for another non-AP station associated with the AP station. Since the AP station knows the public identifier values assigned to each of its associated stations, it is able to determine whether the newly generated values have already been assigned to other stations.
- the AP station may determine whether the newly generated public identifier values conform with an existing identifier value assignment plan: an AP may decide to assign public identifier values to public stations according to a predetermined plan. For instance, an AP station may divide the AID plan into several distinct ranges corresponding to different types or profiles of devices. This allows the AP station to group non-AP stations per types in a single request (like the NFRP trigger frame that polls non-AP stations using a range of AIDS).
- the new public identifier values are used without any need for additional frame exchanges.
- step 415 if the AP determines that a conflict occurred, another new public identifier value (or other new public identifier values) is selected or determined (step 415).
- this step may comprise repeating the generation operation until the generated public identifier value is not conflicting any more with previous public identifier values assigned.
- the pseudo random generation may be run using the previously conflicting value as changing parameters in the pseudo random generation process.
- the AP station counts the number of times it repeats the process in a dedicated retry counter that can be transmitted as a pseudo random generation parameter, as described with references 620-1 and 620-3 in Figure 6.
- the AP station selects the next acceptable value for the public identifier (for instance by increasing the value of the generated public identifier value, modulo the acceptable range, for this non-AP station, until obtaining a non-conflicting value).
- the increasing value (offset) can be sent in a parameter field like parameter field 620-1 or 620-3 in Figure 6.
- the non-AP station apply the corresponding offset to its current generated value upon reception of the corresponding frame to obtain a new nonconflicting value.
- the AP station selects the new public identifier value by any other means and just provide the resulting value in a field value like field value 640-2 in Figure 6.
- the non-AP station just replaces its current generated public identifier value by the new one received in the corresponding frame.
- the conflicting public identifier value is preferably set in a quarantine list of public identifiers that should not be used until the conflict is solved (step 420). This means that until the conflict is not solved, the AP station does not transmit frames containing the conflicting public identifier value (to the non-AP station that public identifier value is being changed, but also to the other non-AP station that already uses this public identifier value).
- the AP station creates an identifier change request frame (e.g., frame 600- 1 , 600-2, or 600-3 in Figure 6) to indicate to the non-AP station having generated a conflicting public identifier value that the latter should be changed according to the parameters transmitted by the AP station.
- an identifier change request frame e.g., frame 600- 1 , 600-2, or 600-3 in Figure 6
- the AP station may indicate an identifier index corresponding to the public identifier, enabling the non-AP station to identify the public identifier.
- identifier indexes can be found in the following table (of course, this list of identifiers and associated index values is not limitative, it is just provided as an example).
- the AP station may indicate an acceptable range for public identifier values to be generated, for example by setting a minimum value field and a maximum value field (e.g., min value field 625-1 and max value field 630-1 in Figure 6), if the AP station determines that a public identifier value is conflicting its internal public identifier value plan.
- a minimum value field and a maximum value field e.g., min value field 625-1 and max value field 630-1 in Figure 6
- the AP station After creating a public identifier change request frame, the AP station sends the frame to the non-AP station to change its corresponding public identifier value. Next, after reception of an acknowledgement of the request frame or reception of an optional public identifier change response (e.g. public identifier change response 700 in Figure 7), the AP station removes the conflicting identifier value from the quarantine list (so that it may be used again without any conflict) and the newly generated public identifier value is considered as valid.
- an acknowledgement of the request frame or reception of an optional public identifier change response e.g. public identifier change response 700 in Figure 7
- steps 405 to 425 are carried out before the SERCPI change end time (e.g., before SERCPI change end time 215 in Figure 2a or 2b or before SERCPI change end time 315 in Figure 3) so that the non-AP station directly takes into account a potential new public identifier value, avoiding any conflict.
- the AP station may indicate a new max SERCPI change end time if it determines that a conflict occurred.
- it may indicate a new max SERCPI change end time 215 or 315 by indicating the new value in a switch count field like switch count field 635-1 , 635-2, or 635-3 in Figure 6, that indicates a number of beacons or TBTTs to wait before the effective use of the identifier value, of the identifier change request 225 or 325.
- This enables the AP station to provide more time to the non-AP station to change the public identifier value with the one that is to be used. This may be especially useful in the case of frequent identifier changes in a heavily loaded network (creating delay in medium access for transmission), or if the request sent by the AP station requires additional computation on the station side (new pseudo random generation for instance).
- the AP station can repeat steps 415 to 425 for each of the conflicting public identifier values, if it determines that more than one public identifier value are conflicting with values already assigned to non-AP stations.
- an additional signaling providing a list of public identifiers that values are to be regenerated by a given non-AP station may be provided in a change request frame, for example in identifier index field 615-1 , 615- 2, or 615-3 of the change request frame 600-1 , 600-2, or 600-3, respectively, in Figure 6, allowing the AP station to send a single request instead of a request per identifier value to change.
- the encoding of the identifier index field is different.
- each bit corresponds to a public identifier (for example, a bit set to 1 in the bitmap indicates that the corresponding public identifier value should be regenerated according to the parameters provided in the frame).
- the bit value corresponding to the public identifier may be the identifier index indicated in the previous table.
- Figure 5 illustrates an example of steps carried out by a non-AP station upon reception of a frame requesting a change of one or more public identifier values.
- the non-AP station After having determined association parameter values enabling exchange of data between an AP station and a non-AP station (step 500), the non-AP station receives a public identifier change request (e.g., public identifier change request 600-1 , 600- 2, or 600-3 in Figure 6) from its associated AP station (step 505).
- a public identifier change request e.g., public identifier change request 600-1 , 600- 2, or 600-3 in Figure 6
- a test is carried out to determine whether the non-AP station is in a transition period (step 410), that is to say a period of time between the SERCPI change start time and ERCPI change end time.
- the non-AP station is in the process of changing the value of one or more of its public identifiers. Accordingly, upon reception of a request frame (e.g., request frame 600-1 , 600-2, or 600-3 in Figure 6), the non-AP station updates its internal transition parameters (i.e., the parameters used to generate public identifier values) according to the parameters received in the request frame (step 420), for example in field 620-1 or 620-3 in Figure 6. On the contrary, if the non-AP station is not in a transition period, the non-AP station initiates a new transition period (step 415) for generating all public identifier values before updating its internal transition parameters (step 420).
- a request frame e.g., request frame 600-1 , 600-2, or 600-3 in Figure 6
- the non-AP station updates its internal transition parameters (i.e., the parameters used to generate public identifier values) according to the parameters received in the request frame (step 420), for example in field 620-1 or 620-3 in Figure 6.
- the non-AP station generates the value of the one or more public identifiers to be changed, using the new transition parameters, for example according to the different embodiments described with reference to Figure 4.
- the AP station provides the new public identifier value and the non- AP station simply replaces its newly generated public identifier value with the one provided by the AP station.
- the change request frames e.g., request frame 225 in Figure 2a or 2b or 325 in Figure 3
- the change response frames e.g., change response frame 230 in Figure 2a or 2b or 330 in Figure 3 are protected action frames therefore, the new value is protected (i.e., encrypted).
- Figure 6 illustrates examples of the format of change request frames and Figure 7 illustrates an example of the format of a change request frame.
- Frames 600-1 , 600-2, and 600-3 are examples of public identifier change request frames sent by an AP station to one of its associated non-AP stations to change the value of one or more of its current public identifiers according to the new parameters transmitted in their subfields.
- Frame 700 is an example of a public identifier change response frame that may be sent by the non-AP station to the AP station in response to a public identifier change request frame.
- each of the frames referenced 600-1 , 600-2, 600-3, and 700 comprises a category field referenced 605-1 , 605-2, 605-3, and 705, respectively, that indicates that the aim of the frame is directed to changing a public identifier value.
- Table 9-51 of the IEEE 802.11-2020 standard may be modified to comprise a specific category, for example by adding the following category value:
- frames 600-1 , 600-2, 600-3, and 700 are further identified by a field denoted ‘Change ID Action’, referenced 610-1 , 610-2, 610-3, and 710, respectively, that may be a single bit field and that may immediately follow the category field.
- the values of the Change ID Action field may be defined according to the following table, that may be inserted at the end of the “9.6 Action frame format details” paragraph of the IEEE 802.11-2020 standard:
- an identifier action field value set to 6 may correspond to a public identifier change request and an identifier action field value set to 7 may correspond to a public identifier change response.
- each of the frames referenced 600-1 , 600-2, and 600-3 comprises an identifier index field referenced 615-1 , 615-2, and 615-3, respectively, to indicate the public identifier(s) that value is to be changed.
- each of the frames 600-1 , 600-2, and 600-3 comprises fields to provide information to a non-AP station to enable it to obtain public identifier values to be used.
- frame 600-1 comprises a parameter field 620-1 , a min value field 625-1 , a max value field 630-1 , and a switch count field 635-1 .
- parameter field 620-1 is used to transmit a number of times the process of generating a public identifier value should be repeated to obtain the public identifier value to be used.
- parameter field 620-1 is used to transmit an increasing value (offset) that is to be used to obtain the public identifier value to be used from the public identifier value previously generated.
- min value field 625-1 and max value field 630-1 are used to provide an acceptable range of values in which the public identifier value to be used is to be chosen.
- Frame 600-2 comprises a switch count field 635-2 and a value field 640-2.
- switch count field 635-2 may indicate a number of beacons or TBTTs to wait before the effective use of the new public identifier value provided in value field 640-2 (that has been generated by the AP station).
- frame 600-3 comprises a parameter field 620-3 and a switch count field 635-3.
- Parameter field 620-3 is similar to parameter field 620-1.
- parameter field 620-3 is used to transmit a number of times the process of generating a public identifier value should be repeated to obtain the public identifier value to be used.
- parameter field 620-3 is used to transmit an increasing value (offset) that is to be used to obtain the public identifier value to be used from the public identifier value previously generated.
- switch count field 635-3 may indicate a number of beacons or TBTTs to wait before the effective use of the new public identifier value.
- the change request frame 600-1 , 600-2, or 600-3 and the response frame 700 are two new protected action frames part of the Enhanced Data Privacy (EDP) action frames as defined in the IEEE 802.11 standard.
- EDP Enhanced Data Privacy
- the protected action frames are specialized per identifier.
- the following table indicates an encoding scheme of the corresponding protected action fields for such protected action frames for the change of AID in the scope of the EDP.
- an example of the simplest information elements carried may be based on the information elements illustrated in Figure 9 wherein field 915 carries the new value of the AID and field 925 carries the number of beacons (TBTTs) to wait before the effective change of the public identifier value.
- TBTTs beacons
- Figure 8 illustrates an example of frame formats of two new Information Elements enabling a non-AP station to change its AID. They may correspond to Information Elements (IE) as specified in section 9.4.2 in the IEEE 802.11-2020 standard.
- IE Information Elements
- a first dedicated IE may be specified for the AID value change procedure, referred to as AID IE, for example AID IE 800.
- the IE may be identified by an Element ID, for example Element ID 805.
- AID IE 800 further comprises a length field referenced 810 that indicates the number of octets in the IE 900, excluding Element ID field 805 and length field 810.
- AID IE 800 further comprises an AID field 815 indicating the type of public identifiers that are to be changed and an AID switch counter field 820.
- the AID switch counter field indicates the number of beacons (TBTTs) to wait before the effective change of the AIDS.
- TBTTs beacons
- a second dedicated new AID Range IE 850 may be specified to transmit information regarding an acceptable range of values for a given public identifier (the AID in the illustrated example).
- This information element can be used by the AP station prior to generating public identifier values to inform the non-AP stations about the allowable ranges of values for a given public identifier according to its internal identifier value plan. This reduces the probability for a non-AP station to generate conflicting public identifier values.
- This information element can be transmitted during an association I re-association procedure in the association response frame in addition to the initial AID value provided by the AP station during this association procedure.
- AID IE 850 may be identified by Element ID 855, and an Element ID Extension, for example Element ID Extension 865 assigned to a specific value in the range [99,255] as specified in Table 9-92 of the IEEE 802.11-2020 standard.
- AID IE 850 comprises a length field referenced 860 that indicates the number of octets in the AID IE 850, excluding Element ID field 855 and length field 860.
- AID IE 850 further comprises min value field 870 and max value field 875 that are used to provide an acceptable range of values in which the AID value to be used is to be chosen. These min and max values are stored by the non-AP station, to be used by the non-AP station each time an AID value is to be generated.
- an IE may transmit several ranges of values, for example for different types of non-AP stations.
- Figure 9 schematically illustrates an example of a communication device, that may correspond to any of the stations described by reference to Figure 1 , of a wireless network, configured to implement at least some embodiments of the present disclosure.
- the communication device, referenced 900 may preferably be a device such as a micro-computer, a workstation, or a light portable device.
- Communication device 900 may comprise a communication bus 913 to which may be connected:
- central processing unit 901 such as a processor, denoted CPU;
- MEM memory 903, denoted MEM, for storing an executable code of methods or steps of the methods according to embodiments of the disclosure as well as the registers adapted to record variables and parameters necessary for implementing the methods;
- the wireless communication network for example a communication network according to one of the IEEE 802.11 family of standards, via transmitting and receiving antennas 904 and 904’, respectively.
- communication bus 913 may provide communication and interoperability between the various elements included in the communication device 900 or connected to it.
- the representation of the bus is not limiting and in particular the central processing unit is operable to communicate instructions to any element of the communication device 900 directly or by means of another element of the communication device 900.
- the executable code may be stored in a memory that may either be read only, a hard disk, or on a removable digital medium such as for example a disk.
- the executable code of the programs can be received by means of the communication network, via the interface 902 or 902’, in order to be stored in the memory 903 of communication device 900 before being executed.
- communication device 900 may be a programmable apparatus which uses software to implement embodiments of the disclosure.
- some embodiments of the present disclosure may be implemented, totally or in partially, in hardware (for example, in the form of an Application Specific Integrated Circuit or ASIC).
- Embodiment(s) of the present disclosure can also be realized by a computer of a system or apparatus that reads out and executes computer executable instructions (e.g., one or more programs) recorded on a storage medium (which may also be referred to more fully as a “non-transitory computer-readable storage medium”) to perform the functions of one or more of the above-described embodiment(s) and/or that includes one or more circuits (e.g., application specific integrated circuit (ASIC)) for performing the functions of one or more of the above-described embodiment(s), and by a method performed by the computer of the system or apparatus by, for example, reading out and executing the computer executable instructions from the storage medium to perform the functions of one or more of the above-described embodiment(s) and/or controlling the one or more circuits to perform the functions of one or more of the above-described embodiment(s).
- computer executable instructions e.g., one or more programs
- a storage medium which may also be referred to more fully as a “
- the computer may comprise one or more processors (e.g., central processing unit (CPU), micro processing unit (MPU)) and may include a network of separate computers or separate processors to read out and execute the computer executable instructions.
- the computer executable instructions may be provided to the computer, for example, from a network or the storage medium.
- the storage medium may include, for example, one or more of a hard disk, a random-access memory (RAM), a read only memory (ROM), a storage of distributed computing systems, an optical disk (such as a compact disc (CD), digital versatile disc (DVD), etc.), a flash memory device, a memory card, and the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020257029301A KR20250141238A (en) | 2023-03-10 | 2024-03-08 | Dynamic configuration of station-associated parameters to improve user privacy and communication reliability. |
| CN202480018251.4A CN120770169A (en) | 2023-03-10 | 2024-03-08 | Dynamic setting of station-associated parameters to improve user privacy and communication reliability |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB2303588.4 | 2023-03-10 | ||
| GB2303588.4A GB2628008A (en) | 2023-03-10 | 2023-03-10 | Dynamic setting of station association parameters to improve user privacy and communication reliability |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024188857A1 true WO2024188857A1 (en) | 2024-09-19 |
Family
ID=86052756
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/EP2024/056189 Pending WO2024188857A1 (en) | 2023-03-10 | 2024-03-08 | Dynamic setting of station association parameters to improve user privacy and communication reliability |
Country Status (4)
| Country | Link |
|---|---|
| KR (1) | KR20250141238A (en) |
| CN (1) | CN120770169A (en) |
| GB (1) | GB2628008A (en) |
| WO (1) | WO2024188857A1 (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150163666A1 (en) * | 2012-06-28 | 2015-06-11 | Kt Corporation | Method for changing aid in wireless lan system |
| US20210367872A1 (en) * | 2020-08-03 | 2021-11-25 | Po-Kai Huang | Enhanced frame exchange and multi-link device messaging for secure communications |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12439241B2 (en) * | 2021-09-13 | 2025-10-07 | Apple Inc. | Address randomization schemes for multi-link devices |
| GB2615796B (en) * | 2022-02-18 | 2024-10-02 | Canon Kk | Method for changing a value of an extended unique identifier of a non-AP station associated with an AP station |
| GB2614584B (en) * | 2022-01-07 | 2024-10-02 | Canon Kk | Method for changing the value of one or more privacy parameters of stations within a basic service set |
-
2023
- 2023-03-10 GB GB2303588.4A patent/GB2628008A/en active Pending
-
2024
- 2024-03-08 KR KR1020257029301A patent/KR20250141238A/en active Pending
- 2024-03-08 WO PCT/EP2024/056189 patent/WO2024188857A1/en active Pending
- 2024-03-08 CN CN202480018251.4A patent/CN120770169A/en active Pending
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150163666A1 (en) * | 2012-06-28 | 2015-06-11 | Kt Corporation | Method for changing aid in wireless lan system |
| US20210367872A1 (en) * | 2020-08-03 | 2021-11-25 | Po-Kai Huang | Enhanced frame exchange and multi-link device messaging for secure communications |
Also Published As
| Publication number | Publication date |
|---|---|
| KR20250141238A (en) | 2025-09-26 |
| GB202303588D0 (en) | 2023-04-26 |
| GB2628008A (en) | 2024-09-11 |
| CN120770169A (en) | 2025-10-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6104984B2 (en) | Device for reduced overhead paging | |
| US12439241B2 (en) | Address randomization schemes for multi-link devices | |
| US12401992B2 (en) | Address randomization schemes | |
| US20250071542A1 (en) | Method for changing the value of one or more privacy parameters of stations within a basic service set | |
| US20250184306A1 (en) | Method for changing the mac address of a non-ap station for a next association with an ap station | |
| US20240284305A1 (en) | Mld bss parameters change count at mld level in management frames | |
| JP2025170290A (en) | Method for seamlessly changing the value of an extended unique identifier of a non-AP station associated with an AP station - Patents.com | |
| WO2024008841A1 (en) | Obfuscation of ies in management frames using container ies with encrypted information section | |
| GB2635417A (en) | Methods, devices, and computer programs for determining when to change values of privacy enhancement parameters of a multi link wireless station | |
| WO2024188857A1 (en) | Dynamic setting of station association parameters to improve user privacy and communication reliability | |
| GB2614562A (en) | Method for changing a value of an extended unique identifier of a non-AP station associated with an AP station | |
| GB2615796A (en) | Method for changing a value of an extended unique identifier of a non-AP station associated with an AP station | |
| CN119923879A (en) | Privacy management method and device in wireless network | |
| WO2024088863A1 (en) | Method for resynchronizing the mac address of a non-ap station | |
| WO2025224126A1 (en) | Methods, devices, and computer programs for managing secret key for group and individual privacy | |
| WO2025099056A1 (en) | Methods, devices, and computer programs for determining when to change values of privacy enhancement parameters of a multi link wireless station in a bss context | |
| WO2025061600A1 (en) | Method of communication with privacy management through privacy groups of non-ap stations | |
| GB2631527A (en) | Method for changing a value of an extended unique identifier of a non-AP station associated with an AP station | |
| GB2623820A (en) | Method, device, and computer program for reporting an amount of particular data to be transmitted in a wireless network | |
| GB2633864A (en) | Method of communication with privacy management through privacy groups of non-AP stations | |
| TW202520745A (en) | Methods, devices, and computer programs for determining when to change values of privacy enhancement parameters of a multi link wireless station in a bss context | |
| CN118511558A (en) | Method for changing the value of one or more privacy parameters of a station within a basic service set |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24711155 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 202480018251.4 Country of ref document: CN |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2024711155 Country of ref document: EP |
|
| WWP | Wipo information: published in national office |
Ref document number: 202480018251.4 Country of ref document: CN |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 2024711155 Country of ref document: EP Effective date: 20251010 |
|
| ENP | Entry into the national phase |
Ref document number: 2024711155 Country of ref document: EP Effective date: 20251010 |
|
| ENP | Entry into the national phase |
Ref document number: 2024711155 Country of ref document: EP Effective date: 20251010 |
|
| ENP | Entry into the national phase |
Ref document number: 2024711155 Country of ref document: EP Effective date: 20251010 |