Identity Obscuration for a Wireless Station
A technology of site and identity, applied in the field of wireless communication, can solve problems such as privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] Disclosed herein are system, apparatus, apparatus, method, and / or computer program product embodiments, and / or combinations and subcombinations thereof, for obfuscating the identity of a station (STA) connected to a wireless network to prevent the STA from being tracked. Some embodiments operated by STAs establish a mapping between the STA's short-term identity (e.g., AID) and the STA's long-term identity (e.g., Media Access Control (MAC) address), which is "explicitly" transmitted over the wireless network and Changing periodically, this long-term identity remains constant while the STA is associated with an access point (AP) and is never "explicitly" transmitted over the wireless network. In addition, embodiments operated by STAs periodically alter or mask various "fingerprint" fields stored in frames transmitted over the wireless network.
[0023] Users typically use their electronic devices (e.g., mobile phones, laptops, smart watches, and various other electronic d...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


