-
公开(公告)号:MY131926A
公开(公告)日:2007-09-28
申请号:MYPI20031597
申请日:2003-04-28
Applicant: MICROSOFT CORP
Inventor: HERNANDEZ EDWIN , AYYAGARI ARUN , MOORE TIMOTHY M , GANUGAPATI KRISHNA , BAHL PRADEEP
Abstract: A POWER MANAGEMENT SCHEME FOR USE IN A WIRELESS DEVICE (100) REDUCES THE POWER CONSUMPTION OF THE NETWORK INTERFACE MODULE (201) OF THE WIRELESS DEVICE (100) BY SELECTIVELY PUTTING THE NETWORK INTERFACE MODULE (201) INTO A LOW-POWER STATE FOR AN IDLE TIME.THE LENGTH OF THE IDLE TIME IS CALCULATED (401) SUCH THAT THE AMOUNT OF DELAYED TRAFFIC DATA ACCUMULATED IS EXPECTED TO BE LESS THAN OR EQUAL TO A PRE-SELECTED THRESHOLD WHEN THE NETWORK INTERFACE MODULE IS PUT IN THE LOW-POWER STATE FOR THE CALCULATED IDLE TIME.THE AMOUNT OF DELAYED TRAFFIC DATA AS A FUNCTION OF THE IDLE TIME IS MODELED (401) USING AVERAGE INTER-ARRIVAL AND SERVICE RATES THAT ARE DERIVED FROM TRAFFIC STATISTICS DATA.(FIG 2)
-
公开(公告)号:ES2276864T3
公开(公告)日:2007-07-01
申请号:ES02005127
申请日:2002-03-07
Applicant: MICROSOFT CORP
Inventor: AYYAGARI ARUN , SHETH SACHIN C , GANUGAPATI KRISHNA , MOORE TIMOTHY M , BAHL PRADEEP , PEICU MIHAI S
Abstract: Un procedimiento de configuración automática para habilitar la informática inalámbrica nómada, comprendiendo el procedimiento: efectuar un barrido (264, 292) para determinar la presencia de redes inalámbricas (206, 240, 242, 256, 258) y otras estaciones inalámbricas (200-204, 260), intentar selectivamente (274) conectarse con las redes inalámbricas en una modalidad de infraestructura, cuando no sea posible conectarse con ninguna red inalámbrica en una modalidad de infraestructura, intentar selectivamente asociarse (286) con las otras estaciones inalámbricas en una modalidad ad hoc, y si no existe ninguna célula en modalidad ad hoc, crear una célula en modalidad ad hoc.
-
公开(公告)号:DE60216344T2
公开(公告)日:2007-03-29
申请号:DE60216344
申请日:2002-03-07
Applicant: MICROSOFT CORP
Inventor: AYYAGARI ARUN , SHETH SACHIN C , GANUGAPATI KRISHNA , MOORE TIMOTHY M , BAHL PRADEEP , PEICU MIHAI S , TEODORESCU FLORIN
Abstract: A system and method for enabling a zero configuration nomadic wireless and wired computing environment presenting a just works experience is presented. The system examines predefined user preference or profile settings to determine to which of a competing number of wireless networks available it should connect, and what type of authentication should be used for such connection. Nomadic wireless computing between infrastructure wireless networks and ad hoc wireless networks may be accomplished without further user intervention required in an auto mode. Also, both infrastructure only and ad hoc only modes are available through the system of the invention. Further, the user may set a preference for infrastructure or ad hoc modes in the auto mode. With an infrastructure mode preference set, the system will automatically detect and transfer connectivity to a newly available infrastructure wireless network if the user was previously operating off-line or in ad hoc mode.
-
公开(公告)号:DE60302276T2
公开(公告)日:2006-06-08
申请号:DE60302276
申请日:2003-04-14
Applicant: MICROSOFT CORP
Inventor: AYYAGARI ARUN , GANUGAPATI KRISHNA , SIMON DANIEL R , MOORE TIMOTHY M , BAHL PRADEEP
Abstract: Disclosed are methods for an authentication client, having been authenticated by an authentication server, to leverage the effects of that authentication to implement a new communications password. The authentication client gets a new password from its user. From the new password and from information provided by the authentication server, the authentication client derives a "password verifier." The password verifier is then shared with the authentication server. The new password itself is never sent to the authentication server, and it is essentially impossible to derive the new password from the password verifier. The authentication client and the authentication server, in parallel, derive a new set of authentication and encryption security keys from the new password and from the password verifier, respectively. This process may be repeated to limit the amount of data sent using any one particular set of security keys and thus to limit the effectiveness of any statistical attacker.
-
公开(公告)号:DK1361708T3
公开(公告)日:2005-03-21
申请号:DK03010199
申请日:2003-05-06
Applicant: MICROSOFT CORP
Inventor: HERNANDEZ EDWIN , AYYAGARI ARUN , MOORE TIMOTHY M , GANUGAPATI KRISHNA , BAHL PRADEEP
Abstract: A power management scheme for use in a wireless device reduces the power consumption of the network interface module of the wireless device by selectively putting the network interface module into a low-power state for an idle time. The length of the idle time is calculated such that the amount of delayed traffic data accumulated is expected to be less than or equal to a pre-selected threshold when the network interface module is put in the low-power state for the calculated idle time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data.
-
公开(公告)号:BR0110332A
公开(公告)日:2004-12-21
申请号:BR0110332
申请日:2001-02-23
Applicant: MICROSOFT CORP
Inventor: MOORE TIMOTHY M , AYYAGARI ARUN , SHETH SACHIN C , BAHL PRADEEP
IPC: G06F15/00 , G06F1/00 , G06F21/00 , G06F21/20 , G09C1/00 , H04L9/08 , H04L9/32 , H04L29/06 , H04W12/06 , H04W88/02
Abstract: A method for setting up and managing secure data/audio/video links with secure key exchanges, authentication and authorization is described. An embodiment of the invention enables establishment of a secure link with limited privileges using the machine identifier of a trusted machine. This is particularly useful if the user of the machine does not have a user identifying information suitable for authentication. Furthermore, the presentation of a default user identifying information by a user advantageously initiates intervention by a system administrator instead of a blanket denial. This decentralized procedure allows new users access to the network without having to physically access a centralized facility to present their credentials. Another embodiment of the invention enables a remote user to connect to a secure network with limited privileges.
-
87.
公开(公告)号:AU2003266437A1
公开(公告)日:2004-06-24
申请号:AU2003266437
申请日:2003-12-03
Applicant: MICROSOFT CORP
Inventor: ABOBA BERNARD D , BAHL PRADEEP , GUDAY SHAI , ABRAHAM DALEN M , MOORE TIMOTHY M , KRANTZ ANTON W
Abstract: A computer system attempts to authenticate with a server to gain authorization to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface for receiving user-entered signup information is automatically presented at the computer system. A first schema-based document including user-entered information is transferred to the server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatible configure the computer system for accessing the first network.
-
公开(公告)号:HK1055822A1
公开(公告)日:2004-01-21
申请号:HK03108065
申请日:2003-11-06
Applicant: MICROSOFT CORP
Inventor: MOORE TIMOTHY M , AYYAGARI ARUN , SHETH SACHIN C , BAHL PRADEEP
IPC: G06F15/00 , G06F1/00 , G06F21/00 , G06F21/20 , G09C1/00 , H04L9/08 , H04L9/32 , H04L29/06 , H04W12/06 , H04W88/02
Abstract: A method for setting up and managing secure data/audio/video links with secure key exchanges, authentication and authorization is described. An embodiment of the invention enables establishment of a secure link with limited privileges using the machine identifier of a trusted machine. This is particularly useful if the user of the machine does not have a user identifying information suitable for authentication. Furthermore, the presentation of a default user identifying information by a user advantageously initiates intervention by a system administrator instead of a blanket denial. This decentralized procedure allows new users access to the network without having to physically access a centralized facility to present their credentials. Another embodiment of the invention enables a remote user to connect to a secure network with limited privileges.
-
89.
公开(公告)号:PL359992A1
公开(公告)日:2003-11-17
申请号:PL35999203
申请日:2003-05-07
Applicant: MICROSOFT CORP
Inventor: HERNANDEZ EDWIN , AYYAGARI ARUN , MOORE TIMOTHY M , GANUGAPATI KRISHNA , BAHL PRADEEP
Abstract: A power management scheme for use in a wireless device reduces the power consumption of the network interface module of the wireless device by selectively putting the network interface module into a low-power state for an idle time. The length of the idle time is calculated such that the amount of delayed traffic data accumulated is expected to be less than or equal to a pre-selected threshold when the network interface module is put in the low-power state for the calculated idle time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data.
-
公开(公告)号:BR0110273A
公开(公告)日:2003-07-08
申请号:BR0110273
申请日:2001-03-22
Applicant: MICROSOFT CORP
Inventor: MOORE TIMOTHY M , PERETZ ERVIN , RAY KENNETH D
Abstract: The present invention provides a method and computer program product for providing, over a RF link conforming to the Bluetooth specification, a network message protocol which is bus-independent and was originally designed for bus-attached networking devices. One such network message protocol is the NDIS device management protocol. In such a manner, many computer software products designed to operate over a hard-wired (or bus-attached) network can also be used over a Bluetooth wireless network.
-
-
-
-
-
-
-
-
-