-
公开(公告)号:NO20032049A
公开(公告)日:2003-11-10
申请号:NO20032049
申请日:2003-05-07
Applicant: MICROSOFT CORP
Inventor: HERNANDEZ EDWIN , AYYAGARI ARUN , GANUGAPATI KRISHNA , MOORE TIMOTHY M , BAHL PRADEEP
CPC classification number: H04W52/0232 , Y02D70/142 , Y02D70/22
Abstract: A power management scheme for use in a wireless device reduces the power consumption of the network interface module of the wireless device by selectively putting the network interface module into a low-power state for an idle time. The length of the idle time is calculated such that the amount of delayed traffic data accumulated is expected to be less than or equal to a pre-selected threshold when the network interface module is put in the low-power state for the calculated idle time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data.
-
公开(公告)号:CA2427307A1
公开(公告)日:2003-11-08
申请号:CA2427307
申请日:2003-04-30
Applicant: MICROSOFT CORP
Inventor: AYYAGARI ARUN , HERNANDEZ EDWIN , GANUGAPATI KRISHNA , MOORE TIMOTHY M , BAHL PRADEEP
Abstract: A power management scheme for use in a wireless device reduces the powe r consumption of the network interface module of the wireless device by selectively putting the network interface module into a low-power state for an idle time . The length of the idle time is calculated such that the amount of delayed traffi c data accumulated is expected to be less than or equal to a pre-selected threshold when the network interface module is put in the low-power state for the calculated id le time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data.
-
公开(公告)号:NO20031913A
公开(公告)日:2003-10-31
申请号:NO20031913
申请日:2003-04-29
Applicant: MICROSOFT CORP
Inventor: AYYAGARI ARUN , GANUGAPATI KRISHNA , SIMON DANIEL R , MOORE TIMOTHY M , BAHL PRADEEP
CPC classification number: H04L63/0846 , G06F21/445 , G06F21/46 , H04L63/0869 , H04L63/162
-
公开(公告)号:NO20031913D0
公开(公告)日:2003-04-29
申请号:NO20031913
申请日:2003-04-29
Applicant: MICROSOFT CORP
Inventor: AYYAGARI ARUN , GANUGAPATI KRISHNA , SIMON DANIEL R , MOORE TIMOTHY M , BAHL PRADEEP
Abstract: Disclosed are methods for an authentication client, having been authenticated by an authentication server, to leverage the effects of that authentication to implement a new communications password. The authentication client gets a new password from its user. From the new password and from information provided by the authentication server, the authentication client derives a "password verifier." The password verifier is then shared with the authentication server. The new password itself is never sent to the authentication server, and it is essentially impossible to derive the new password from the password verifier. The authentication client and the authentication server, in parallel, derive a new set of authentication and encryption security keys from the new password and from the password verifier, respectively. This process may be repeated to limit the amount of data sent using any one particular set of security keys and thus to limit the effectiveness of any statistical attacker.
-
公开(公告)号:AU4165401A
公开(公告)日:2001-09-03
申请号:AU4165401
申请日:2001-02-22
Applicant: MICROSOFT CORP
Inventor: AYYAGARI ARUN , BERNET YORAM , MOORE TIMOTHY M
Abstract: The invention provides Quality of Service assurances in a manner expected in other media to communications over paths that include one or more wireless links. The invention combines a subnet bandwidth manager ("SBM") at an access point ("AP") to track allocations of wireless bandwidth. The invention further incorporates multiple priority levels for packet transmission in a two-prong stochastic scheme. The first prong reserves bandwidth at each of the intermediate nodes in a transmission path subject to a veto by any intermediate node. The second prong modulates the transmission probability of a packet based on the previous failed attempts at transmission and the priority level of the packet. The overall result of this hybrid scheme is to not shut out users with the lowest priority, e.g., "best effort" priority, while assuring adequate bandwidth to higher priority applications.
-
公开(公告)号:ES2389651T3
公开(公告)日:2012-10-30
申请号:ES04025545
申请日:2004-10-27
Applicant: MICROSOFT CORP
Inventor: KRANTZ ANTON W , PALEKAR ASHWIN , DUPLESSIS JEAN-PIERRE , ALAM MOHAMMAD SHABBIR , LYNDERSAY SEAN O , MOORE TIMOTHY M
IPC: H04L9/08 , H04W48/16 , H04B7/26 , H04L12/26 , H04L12/28 , H04L29/06 , H04W12/02 , H04W12/06 , H04W48/14 , H04W48/18 , H04W84/12
Abstract: Un sistema implementado por ordenador para facilitar la detección automática de un tipo de red inalámbrica sinrequerir indicaciones del usuario, refiriéndose el tipo al procedimiento de autenticación y cifrado que requiere lared, comprendiendo el sistema:un componente (110) de conexión que puede conectar un dispositivo con una pluralidad de redesinalámbricas (210-250); yun componente (120) de detección que identifica automáticamente un tipo de cifrado de una red inalámbricadisponible (140), en el que la identificación del tipo de cifrado se basa en la detección de un fallo de unaporción de una secuencia de autenticación de la red inalámbrica disponible o en la superación de un umbralde tiempo sin haber detectado una porción esperada de la secuencia de autenticación de la red inalámbricadisponible, en el que la identificación del tipo de cifrado incluye:que el componente de detección intente (310) una secuencia de autenticación 802.1x con la redinalámbrica y determine (330) que la red inalámbrica, como una red (222) de privacidad equivalente auna cableada, requiere una clave de privacidad equivalente a una cableada cuando ocurren un fallo deuna porción de la secuencia de autenticación 802.1x o la superación de un umbral de tiempo sin haberdetectado una porción esperada de la secuencia de autenticación 802.1x;que el componente de detección, en respuesta a la tentativa de una secuencia de autenticación 802.1x,identifique (432) la red inalámbrica como una red 802.1x (224) cuando no ocurren el fallo de una porciónde la secuencia de autenticación 802.1x ni la superación de un umbral de tiempo sin haber detectado laporción esperada de la secuencia de autenticación 802.1x;que el componente de detección, en respuesta a la identificación de la red inalámbrica como una red802.1x, intente una secuencia de servicios de dotación inalámbrica y determine (444) que la redinalámbrica no soporta servicios (244) de dotación inalámbrica cuando ocurren un fallo de una porciónde la secuencia de autenticación de servicios de dotación inalámbrica o la superación de un umbral detiempo sin haber detectado una porción esperada de la secuencia de autenticación de servicios dedotación inalámbrica; yque el componente de detección, en respuesta a la tentativa de una secuencia de servicios de dotacióninalámbrica, identifique (370) la red inalámbrica como una red (242) de servicios de dotación inalámbricacon soporte de 802.1x cuando no ocurren el fallo de una porción de la secuencia de autenticación deservicios de dotación inalámbrica ni la superación de un umbral de tiempo sin haber detectado unaporción esperada de la secuencia de autenticación de servicios de dotación inalámbrica.
-
公开(公告)号:DE602006017619D1
公开(公告)日:2010-12-02
申请号:DE602006017619
申请日:2006-03-14
Applicant: MICROSOFT CORP
Inventor: BARKLEY WARREN VINCENT , TIDWELL PAUL D , MOORE TIMOTHY M
-
公开(公告)号:AT485661T
公开(公告)日:2010-11-15
申请号:AT06111100
申请日:2006-03-14
Applicant: MICROSOFT CORP
Inventor: BARKLEY WARREN VINCENT , TIDWELL PAUL D , MOORE TIMOTHY M
Abstract: A method and system for reducing the number of ports allocated by a relay server is provided. A connection system uses a bidirectional technique to establish a connection via the relay server between two endpoints (e.g., client computers) that can be used bidirectionally to send a stream from a first endpoint to a second endpoint and a stream from the second endpoint to the first endpoint. The connection system may also use a stream multiplexing technique to further reduce the number of ports allocated by a relay server by multiplexing multiple streams onto a single connection. The connection system may also use an endpoint multiplexing technique to reduce the number of ports allocated by a relay server by multiplexing streams from different endpoints through a single connection via the relay server.
-
公开(公告)号:CA2711482A1
公开(公告)日:2009-08-20
申请号:CA2711482
申请日:2009-01-19
Applicant: MICROSOFT CORP
Inventor: SRINIVASAN SRIVATSA K , MOORE TIMOTHY M , SEKARAN DHIGHA D , NARAYANAN SANKARAN
Abstract: Protocol architecture for wiring media streams and specifying mixing behavior in a multipoint control unit. The protocol provides the capability to expose the core mixing algorithms to modification for mixing media without dealing with the functionality of the mixer itself (e.g., ports and IP specifics). The protocol facilitates the wiring of input media streams to output media streams by changing the mixing behavior via changes to the mixing algorithms using the protocol. The protocol operates based on a schema that includes controls related to route, wire, and filter for the mixer input and mixer output.
-
公开(公告)号:DE60319791T2
公开(公告)日:2009-04-16
申请号:DE60319791
申请日:2003-11-27
Applicant: MICROSOFT CORP
Inventor: KRANTZ ANTON W , MOORE TIMOTHY M , ABRAHAM DALEN M , GUDAY SHAI , BAHL PRADEEP , ADOBA BERNHARD D
IPC: G06F21/20 , H04L29/06 , G06F15/00 , G09C1/00 , H04L9/32 , H04L12/22 , H04L12/24 , H04L12/28 , H04L12/56 , H04L29/08
Abstract: A computer system attempts to authenticate with a server to gain authorization to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface for receiving user-entered signup information is automatically presented at the computer system. A first schema-based document including user-entered information is transferred to the server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatible configure the computer system for accessing the first network.
-
-
-
-
-
-
-
-
-