83.
    发明专利
    未知

    公开(公告)号:DE60216344T2

    公开(公告)日:2007-03-29

    申请号:DE60216344

    申请日:2002-03-07

    Applicant: MICROSOFT CORP

    Abstract: A system and method for enabling a zero configuration nomadic wireless and wired computing environment presenting a just works experience is presented. The system examines predefined user preference or profile settings to determine to which of a competing number of wireless networks available it should connect, and what type of authentication should be used for such connection. Nomadic wireless computing between infrastructure wireless networks and ad hoc wireless networks may be accomplished without further user intervention required in an auto mode. Also, both infrastructure only and ad hoc only modes are available through the system of the invention. Further, the user may set a preference for infrastructure or ad hoc modes in the auto mode. With an infrastructure mode preference set, the system will automatically detect and transfer connectivity to a newly available infrastructure wireless network if the user was previously operating off-line or in ad hoc mode.

    84.
    发明专利
    未知

    公开(公告)号:DE60302276T2

    公开(公告)日:2006-06-08

    申请号:DE60302276

    申请日:2003-04-14

    Applicant: MICROSOFT CORP

    Abstract: Disclosed are methods for an authentication client, having been authenticated by an authentication server, to leverage the effects of that authentication to implement a new communications password. The authentication client gets a new password from its user. From the new password and from information provided by the authentication server, the authentication client derives a "password verifier." The password verifier is then shared with the authentication server. The new password itself is never sent to the authentication server, and it is essentially impossible to derive the new password from the password verifier. The authentication client and the authentication server, in parallel, derive a new set of authentication and encryption security keys from the new password and from the password verifier, respectively. This process may be repeated to limit the amount of data sent using any one particular set of security keys and thus to limit the effectiveness of any statistical attacker.

    85.
    发明专利
    未知

    公开(公告)号:DK1361708T3

    公开(公告)日:2005-03-21

    申请号:DK03010199

    申请日:2003-05-06

    Applicant: MICROSOFT CORP

    Abstract: A power management scheme for use in a wireless device reduces the power consumption of the network interface module of the wireless device by selectively putting the network interface module into a low-power state for an idle time. The length of the idle time is calculated such that the amount of delayed traffic data accumulated is expected to be less than or equal to a pre-selected threshold when the network interface module is put in the low-power state for the calculated idle time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data.

    86.
    发明专利
    未知

    公开(公告)号:BR0110332A

    公开(公告)日:2004-12-21

    申请号:BR0110332

    申请日:2001-02-23

    Applicant: MICROSOFT CORP

    Abstract: A method for setting up and managing secure data/audio/video links with secure key exchanges, authentication and authorization is described. An embodiment of the invention enables establishment of a secure link with limited privileges using the machine identifier of a trusted machine. This is particularly useful if the user of the machine does not have a user identifying information suitable for authentication. Furthermore, the presentation of a default user identifying information by a user advantageously initiates intervention by a system administrator instead of a blanket denial. This decentralized procedure allows new users access to the network without having to physically access a centralized facility to present their credentials. Another embodiment of the invention enables a remote user to connect to a secure network with limited privileges.

    Increasing the level of automation when provisioning a computer system to access a network

    公开(公告)号:AU2003266437A1

    公开(公告)日:2004-06-24

    申请号:AU2003266437

    申请日:2003-12-03

    Applicant: MICROSOFT CORP

    Abstract: A computer system attempts to authenticate with a server to gain authorization to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface for receiving user-entered signup information is automatically presented at the computer system. A first schema-based document including user-entered information is transferred to the server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatible configure the computer system for accessing the first network.

    METHOD FOR SECURITY LINK MANAGEMENT IN DYNAMIC NETWORKS

    公开(公告)号:HK1055822A1

    公开(公告)日:2004-01-21

    申请号:HK03108065

    申请日:2003-11-06

    Applicant: MICROSOFT CORP

    Abstract: A method for setting up and managing secure data/audio/video links with secure key exchanges, authentication and authorization is described. An embodiment of the invention enables establishment of a secure link with limited privileges using the machine identifier of a trusted machine. This is particularly useful if the user of the machine does not have a user identifying information suitable for authentication. Furthermore, the presentation of a default user identifying information by a user advantageously initiates intervention by a system administrator instead of a blanket denial. This decentralized procedure allows new users access to the network without having to physically access a centralized facility to present their credentials. Another embodiment of the invention enables a remote user to connect to a secure network with limited privileges.

    90.
    发明专利
    未知

    公开(公告)号:BR0110273A

    公开(公告)日:2003-07-08

    申请号:BR0110273

    申请日:2001-03-22

    Applicant: MICROSOFT CORP

    Abstract: The present invention provides a method and computer program product for providing, over a RF link conforming to the Bluetooth specification, a network message protocol which is bus-independent and was originally designed for bus-attached networking devices. One such network message protocol is the NDIS device management protocol. In such a manner, many computer software products designed to operate over a hard-wired (or bus-attached) network can also be used over a Bluetooth wireless network.

Patent Agency Ranking