71.
    发明专利
    未知

    公开(公告)号:NO20032049A

    公开(公告)日:2003-11-10

    申请号:NO20032049

    申请日:2003-05-07

    Applicant: MICROSOFT CORP

    CPC classification number: H04W52/0232 Y02D70/142 Y02D70/22

    Abstract: A power management scheme for use in a wireless device reduces the power consumption of the network interface module of the wireless device by selectively putting the network interface module into a low-power state for an idle time. The length of the idle time is calculated such that the amount of delayed traffic data accumulated is expected to be less than or equal to a pre-selected threshold when the network interface module is put in the low-power state for the calculated idle time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data.

    74.
    发明专利
    未知

    公开(公告)号:NO20031913D0

    公开(公告)日:2003-04-29

    申请号:NO20031913

    申请日:2003-04-29

    Applicant: MICROSOFT CORP

    Abstract: Disclosed are methods for an authentication client, having been authenticated by an authentication server, to leverage the effects of that authentication to implement a new communications password. The authentication client gets a new password from its user. From the new password and from information provided by the authentication server, the authentication client derives a "password verifier." The password verifier is then shared with the authentication server. The new password itself is never sent to the authentication server, and it is essentially impossible to derive the new password from the password verifier. The authentication client and the authentication server, in parallel, derive a new set of authentication and encryption security keys from the new password and from the password verifier, respectively. This process may be repeated to limit the amount of data sent using any one particular set of security keys and thus to limit the effectiveness of any statistical attacker.

    Quality of service over paths having a wireless-link

    公开(公告)号:AU4165401A

    公开(公告)日:2001-09-03

    申请号:AU4165401

    申请日:2001-02-22

    Applicant: MICROSOFT CORP

    Abstract: The invention provides Quality of Service assurances in a manner expected in other media to communications over paths that include one or more wireless links. The invention combines a subnet bandwidth manager ("SBM") at an access point ("AP") to track allocations of wireless bandwidth. The invention further incorporates multiple priority levels for packet transmission in a two-prong stochastic scheme. The first prong reserves bandwidth at each of the intermediate nodes in a transmission path subject to a veto by any intermediate node. The second prong modulates the transmission probability of a packet based on the previous failed attempts at transmission and the priority level of the packet. The overall result of this hybrid scheme is to not shut out users with the lowest priority, e.g., "best effort" priority, while assuring adequate bandwidth to higher priority applications.

    Detección automática del tipo de red inalámbrica

    公开(公告)号:ES2389651T3

    公开(公告)日:2012-10-30

    申请号:ES04025545

    申请日:2004-10-27

    Applicant: MICROSOFT CORP

    Abstract: Un sistema implementado por ordenador para facilitar la detección automática de un tipo de red inalámbrica sinrequerir indicaciones del usuario, refiriéndose el tipo al procedimiento de autenticación y cifrado que requiere lared, comprendiendo el sistema:un componente (110) de conexión que puede conectar un dispositivo con una pluralidad de redesinalámbricas (210-250); yun componente (120) de detección que identifica automáticamente un tipo de cifrado de una red inalámbricadisponible (140), en el que la identificación del tipo de cifrado se basa en la detección de un fallo de unaporción de una secuencia de autenticación de la red inalámbrica disponible o en la superación de un umbralde tiempo sin haber detectado una porción esperada de la secuencia de autenticación de la red inalámbricadisponible, en el que la identificación del tipo de cifrado incluye:que el componente de detección intente (310) una secuencia de autenticación 802.1x con la redinalámbrica y determine (330) que la red inalámbrica, como una red (222) de privacidad equivalente auna cableada, requiere una clave de privacidad equivalente a una cableada cuando ocurren un fallo deuna porción de la secuencia de autenticación 802.1x o la superación de un umbral de tiempo sin haberdetectado una porción esperada de la secuencia de autenticación 802.1x;que el componente de detección, en respuesta a la tentativa de una secuencia de autenticación 802.1x,identifique (432) la red inalámbrica como una red 802.1x (224) cuando no ocurren el fallo de una porciónde la secuencia de autenticación 802.1x ni la superación de un umbral de tiempo sin haber detectado laporción esperada de la secuencia de autenticación 802.1x;que el componente de detección, en respuesta a la identificación de la red inalámbrica como una red802.1x, intente una secuencia de servicios de dotación inalámbrica y determine (444) que la redinalámbrica no soporta servicios (244) de dotación inalámbrica cuando ocurren un fallo de una porciónde la secuencia de autenticación de servicios de dotación inalámbrica o la superación de un umbral detiempo sin haber detectado una porción esperada de la secuencia de autenticación de servicios dedotación inalámbrica; yque el componente de detección, en respuesta a la tentativa de una secuencia de servicios de dotacióninalámbrica, identifique (370) la red inalámbrica como una red (242) de servicios de dotación inalámbricacon soporte de 802.1x cuando no ocurren el fallo de una porción de la secuencia de autenticación deservicios de dotación inalámbrica ni la superación de un umbral de tiempo sin haber detectado unaporción esperada de la secuencia de autenticación de servicios de dotación inalámbrica.

    78.
    发明专利
    未知

    公开(公告)号:AT485661T

    公开(公告)日:2010-11-15

    申请号:AT06111100

    申请日:2006-03-14

    Applicant: MICROSOFT CORP

    Abstract: A method and system for reducing the number of ports allocated by a relay server is provided. A connection system uses a bidirectional technique to establish a connection via the relay server between two endpoints (e.g., client computers) that can be used bidirectionally to send a stream from a first endpoint to a second endpoint and a stream from the second endpoint to the first endpoint. The connection system may also use a stream multiplexing technique to further reduce the number of ports allocated by a relay server by multiplexing multiple streams onto a single connection. The connection system may also use an endpoint multiplexing technique to reduce the number of ports allocated by a relay server by multiplexing streams from different endpoints through a single connection via the relay server.

    MEDIA MIX WIRING PROTOCOL FOR MEDIA CONTROL

    公开(公告)号:CA2711482A1

    公开(公告)日:2009-08-20

    申请号:CA2711482

    申请日:2009-01-19

    Applicant: MICROSOFT CORP

    Abstract: Protocol architecture for wiring media streams and specifying mixing behavior in a multipoint control unit. The protocol provides the capability to expose the core mixing algorithms to modification for mixing media without dealing with the functionality of the mixer itself (e.g., ports and IP specifics). The protocol facilitates the wiring of input media streams to output media streams by changing the mixing behavior via changes to the mixing algorithms using the protocol. The protocol operates based on a schema that includes controls related to route, wire, and filter for the mixer input and mixer output.

    80.
    发明专利
    未知

    公开(公告)号:DE60319791T2

    公开(公告)日:2009-04-16

    申请号:DE60319791

    申请日:2003-11-27

    Applicant: MICROSOFT CORP

    Abstract: A computer system attempts to authenticate with a server to gain authorization to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface for receiving user-entered signup information is automatically presented at the computer system. A first schema-based document including user-entered information is transferred to the server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatible configure the computer system for accessing the first network.

Patent Agency Ranking