-
公开(公告)号:AT390008T
公开(公告)日:2008-04-15
申请号:AT03027400
申请日:2003-11-27
Applicant: MICROSOFT CORP
Inventor: KRANTZ ANTON W , MOORE TIMOTHY M , ABRAHAM DALEN M , GUDAY SHAI , BAHL PRADEEP , ADOBA BERNHARD D
IPC: G06F21/20 , H04L29/06 , G06F15/00 , G09C1/00 , H04L9/32 , H04L12/22 , H04L12/24 , H04L12/28 , H04L12/56 , H04L29/08
Abstract: A computer system attempts to authenticate with a server to gain authorization to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface for receiving user-entered signup information is automatically presented at the computer system. A first schema-based document including user-entered information is transferred to the server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatible configure the computer system for accessing the first network.
-
公开(公告)号:AT376733T
公开(公告)日:2007-11-15
申请号:AT04102063
申请日:2004-05-12
Applicant: MICROSOFT CORP
Inventor: BARKLEY WARREN V , AYYAGARI ARUN , MOORE TIMOTHY M , BARON ANDREW THOMAS
Abstract: A wireless device that adaptively makes the determination of whether or not to pre-authenticate. If the wireless device (220) is running an application that is sensitive to latency (also referred to herein as a low latency application), then pre-authentication is performed and latency is reduced during the switch between wireless access points (204,205). Such low latency applications may include voice over IP, video, interactive whiteboard, or video teleconferencing. On the other hand, if the wireless device is not running a low latency application, the wireless device is less susceptible to latency when making the wireless access point switch. In that case, pre-authentication is not performed and processing and battery resources are preserved.
-
公开(公告)号:AT347217T
公开(公告)日:2006-12-15
申请号:AT02005127
申请日:2002-03-07
Applicant: MICROSOFT CORP
Inventor: AYYAGARI ARUN , SHETH SACHIN C , GANUGAPATI KRISHNA , MOORE TIMOTHY M , BAHL PRADEEP , PEICU MIHAI S , TEODORESCU FLORIN
Abstract: A system and method for enabling a zero configuration nomadic wireless and wired computing environment presenting a just works experience is presented. The system examines predefined user preference or profile settings to determine to which of a competing number of wireless networks available it should connect, and what type of authentication should be used for such connection. Nomadic wireless computing between infrastructure wireless networks and ad hoc wireless networks may be accomplished without further user intervention required in an auto mode. Also, both infrastructure only and ad hoc only modes are available through the system of the invention. Further, the user may set a preference for infrastructure or ad hoc modes in the auto mode. With an infrastructure mode preference set, the system will automatically detect and transfer connectivity to a newly available infrastructure wireless network if the user was previously operating off-line or in ad hoc mode.
-
公开(公告)号:DE60300158T2
公开(公告)日:2005-04-14
申请号:DE60300158
申请日:2003-05-06
Applicant: MICROSOFT CORP
Inventor: HERNANDEZ EDWIN , AYYAGARI ARUN , MOORE TIMOTHY M , GANUGAPATI KRISHNA , BAHL PRADEEP
Abstract: A power management scheme for use in a wireless device reduces the power consumption of the network interface module of the wireless device by selectively putting the network interface module into a low-power state for an idle time. The length of the idle time is calculated such that the amount of delayed traffic data accumulated is expected to be less than or equal to a pre-selected threshold when the network interface module is put in the low-power state for the calculated idle time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data.
-
公开(公告)号:HK1060458A1
公开(公告)日:2004-08-06
申请号:HK04103317
申请日:2004-05-12
Applicant: MICROSOFT CORP
Inventor: HERNANDEZ EDWIN , AYYAGARI ARUN , MOORE TIMOTHY M , GANUGAPATI KRISHNA , BAHL PRADEEP
Abstract: A power management scheme for use in a wireless device reduces the power consumption of the network interface module of the wireless device by selectively putting the network interface module into a low-power state for an idle time. The length of the idle time is calculated such that the amount of delayed traffic data accumulated is expected to be less than or equal to a pre-selected threshold when the network interface module is put in the low-power state for the calculated idle time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data.
-
公开(公告)号:AU2003204025A1
公开(公告)日:2003-11-27
申请号:AU2003204025
申请日:2003-05-05
Applicant: MICROSOFT CORP
Inventor: BAHL PRADEEP , GANUGAPATI KRISHNA , MOORE TIMOTHY M , AYYAGARI ARUN , HERNANDEZ EDWIN
Abstract: A power management scheme for use in a wireless device reduces the power consumption of the network interface module of the wireless device by selectively putting the network interface module into a low-power state for an idle time. The length of the idle time is calculated such that the amount of delayed traffic data accumulated is expected to be less than or equal to a pre-selected threshold when the network interface module is put in the low-power state for the calculated idle time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data.
-
公开(公告)号:NO20032049L
公开(公告)日:2003-11-10
申请号:NO20032049
申请日:2003-05-07
Applicant: MICROSOFT CORP
Inventor: HERNANDEZ EDWIN , AYYAGARI ARUN , GANUGAPATI KRISHNA , MOORE TIMOTHY M , BAHL PRADEEP
Abstract: A power management scheme for use in a wireless device reduces the power consumption of the network interface module of the wireless device by selectively putting the network interface module into a low-power state for an idle time. The length of the idle time is calculated such that the amount of delayed traffic data accumulated is expected to be less than or equal to a pre-selected threshold when the network interface module is put in the low-power state for the calculated idle time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data.
-
公开(公告)号:CA2424833A1
公开(公告)日:2003-10-30
申请号:CA2424833
申请日:2003-04-09
Applicant: MICROSOFT CORP
Inventor: SIMON DANIEL R , AYYAGARI ARUN , GANUGAPATI KRISHNA , MOORE TIMOTHY M , BAHL PRADEEP
Abstract: Disclosed are methods for an authentication client, having been authenticate d by an authentication server, to leverage the effects of that authentication to implement a new communications password. The authentication client gets a new password from its user. From the new password and from information provided by the authentication server, the authentication client derives a "password verifier." The password verifier is then shared with the authentication server. The new password itself is never sent to the authentication server, and it is essentially impossible to derive the new password from the password verifier. The authentication client and the authentication server, in parallel, derive a new set of authentication a nd encryption security keys from the new password and from the password verifier, respectively. Thi s process may be repeated to limit the amount of data sent using any one particular set of security keys and thus to limit the effectiveness of any statistical attacker.
-
公开(公告)号:ZA200302773B
公开(公告)日:2003-10-14
申请号:ZA200302773
申请日:2003-04-09
Applicant: MICROSOFT CORP
Inventor: AYYAGARI ARUN , GANUGAPATI KRISHNA , SIMON DANIEL R , MOORE TIMOTHY M , BAHL PRADEEP
Abstract: Disclosed are methods for an authentication client, having been authenticated by an authentication server, to leverage the effects of that authentication to implement a new communications password. The authentication client gets a new password from its user. From the new password and from information provided by the authentication server, the authentication client derives a "password verifier." The password verifier is then shared with the authentication server. The new password itself is never sent to the authentication server, and it is essentially impossible to derive the new password from the password verifier. The authentication client and the authentication server, in parallel, derive a new set of authentication and encryption security keys from the new password and from the password verifier, respectively. This process may be repeated to limit the amount of data sent using any one particular set of security keys and thus to limit the effectiveness of any statistical attacker.
-
公开(公告)号:MXPA02010500A
公开(公告)日:2003-09-22
申请号:MXPA02010500
申请日:2001-03-22
Applicant: MICROSOFT CORP
Inventor: MOORE TIMOTHY M
-
-
-
-
-
-
-
-
-