-
公开(公告)号:JP2004234667A
公开(公告)日:2004-08-19
申请号:JP2004026110
申请日:2004-02-02
Applicant: Microsoft Corp , マイクロソフト コーポレイションMicrosoft Corporation
Inventor: KRANTZ ANTON W , ABHISHEK ABHISHEK , AYYAGARI ARUN , RUAN JIANDONG , MOORE TIMOTHY M , GEIGER AVI R , BARKLEY WARREN V
CPC classification number: H04W52/0216 , G06F1/3203 , G06F1/3209 , G06F1/325 , H04M2250/06 , H04W52/0225 , Y02D70/00 , Y02D70/1222 , Y02D70/1224 , Y02D70/142 , Y02D70/144 , Y02D70/162 , Y02D70/22
Abstract: PROBLEM TO BE SOLVED: To provide a method and system for managing power consumption, in a portable computing device having a network interface module. SOLUTION: A power management module receives inputs from other modules, and determines whether the network interface module is to be put in a doze state for a predetermined number of beacon intervals, to prevent waste of power consumption in the network interface module. The network interface module in a device, that is associated with a network, is put in the doze state, after an event has occurred including when a scan has been performed, after a delayed sleep timer has reached time out; and after transmission of beacon has been completed and when no traffic is buffered with respect to the device. The delayed sleep-time is set, based on the estimated round trip time of a packet. COPYRIGHT: (C)2004,JPO&NCIPI
-
公开(公告)号:JP2004364310A
公开(公告)日:2004-12-24
申请号:JP2004166450
申请日:2004-06-03
Applicant: Microsoft Corp , マイクロソフト コーポレーション
Inventor: BARKLEY WARREN V , AYYAGARI ARUN , MOORE TIMOTHY M , BARON ANDREW THOMAS
CPC classification number: H04W12/06 , H04L63/08 , H04L65/40 , H04W36/0016 , H04W36/08
Abstract: PROBLEM TO BE SOLVED: To provide a radio device which adaptively determines whether to perform preceding authentication.
SOLUTION: When a latency-sensitive application (low-latency application) is being executed on a radio device, preceding authentication is performed and latency related to changeover between radio access points is reduced. Low-latency applications of this kind include VoIP, video, interactive whiteboards, or video conference. When the low latency application is not being run on the radio device, the radio device is not sensitive to latency, when changing from one radio access point to another. In such a case, the preceding authentication will not be performed, and processing and battery resources are retained.
COPYRIGHT: (C)2005,JPO&NCIPI-
公开(公告)号:JP2006340380A
公开(公告)日:2006-12-14
申请号:JP2006175717
申请日:2006-06-26
Applicant: Microsoft Corp , マイクロソフト コーポレーション
Inventor: AYYAGARI ARUN , SHETH SACHIN C , GANUGAPATI KRISHNA , MOORE TIMOTHY M , BAHL PRADEEP , PEICU MIHAI S , TEODORESCU FLORIN
IPC: H04L12/28 , H04L12/56 , H04L29/06 , H04M3/00 , H04M11/00 , H04W8/00 , H04W28/18 , H04W76/02 , H04W84/18
Abstract: PROBLEM TO BE SOLVED: To attain a zero configuration nomadic wireless and wired computing environment. SOLUTION: This system examines predefined user preference or profile settings (step 268) to determine to which of a competing number of wireless networks available it should connect, and what type of authentication should be used for such connection (step 274). A user may set a preference for infrastructure (288) or ad hoc modes (step 280) in the auto mode. With infrastructure mode preference setting, when the user has already operated off-line or in ad hoc mode (step 288), the system automatically detects and transfers connection to a newly available infrastructure wireless network (steps 292 to 294 to 266). COPYRIGHT: (C)2007,JPO&INPIT
Abstract translation: 要解决的问题:实现零配置游牧无线和有线计算环境。 解决方案:该系统检查预定义的用户偏好或配置文件设置(步骤268),以确定应连接哪个可竞争数量的无线网络,以及应该使用什么类型的认证来进行此类连接(步骤274)。 用户可以在自动模式中设置基础设施(288)或自组织模式(步骤280)的偏好。 利用基础架构模式首选项设置,当用户已经离线或自组织模式运行时(步骤288),系统自动检测并传送到新可用的基础设施无线网络的连接(步骤292至294至266)。 版权所有(C)2007,JPO&INPIT
-
公开(公告)号:JP2004030611A
公开(公告)日:2004-01-29
申请号:JP2003125927
申请日:2003-04-30
Applicant: Microsoft Corp , マイクロソフト コーポレイションMicrosoft Corporation
Inventor: AYYAGARI ARUN , GANUGAPATI KRISHNA , SIMON DANIEL R , MOORE TIMOTHY M , BAHL PRADEEP
CPC classification number: H04L63/0846 , G06F21/445 , G06F21/46 , H04L63/0869 , H04L63/162
Abstract: PROBLEM TO BE SOLVED: To provide a method by which an authentication client which is authenticated by an authentication server enhances security of authentication and use a new communication password. SOLUTION: The authentication client obtains a new password from the user. A "password verifier" is guided from information provided from the new password and by the authentication server. The password verifier is shared with the authentication server. The new password itself is not transmitted to the authentication server and introduction of the new password from the password verifier is basically impossible. Each of the authentication client and the authentication server guides a set of new authentication and an encryption security key simultaneously. This process is repeated for controlling data amount to be transmitted by using a set of security key having specific security. COPYRIGHT: (C)2004,JPO
-
公开(公告)号:JP2002344458A
公开(公告)日:2002-11-29
申请号:JP2002069273
申请日:2002-03-13
Applicant: MICROSOFT CORP
Inventor: AYYAGARI ARUN , SHETH SACHIN C , GANUGAPATI KRISHNA , MOORE TIMOTHY M , BAHL PRADEEP , PEICU MIHAI S , TEODORESCU FLORIN
Abstract: PROBLEM TO BE SOLVED: To enable a zero configuration nomadic wireless and wired computing environment. SOLUTION: The system examines predefined user preferences or profile settings (Step 268), to determine to which of competing number of wireless networks available it should connect, and what type of authentication should be used for such a connection (step 274). In automatic mode, the user may set a preference for infrastructure (step 288) or and hoc modes (step 280); and in infrastructure mode preference set, if the user has previously operated off-line or in ad hoc mode (step 288), the system will automatically detect and transfer connectivity to a newly available infrastructure wireless network (steps 292-294-266).
-
公开(公告)号:JP2004362582A
公开(公告)日:2004-12-24
申请号:JP2004165079
申请日:2004-06-02
Applicant: Microsoft Corp , マイクロソフト コーポレーション
Inventor: SHETH SACHIN C , ALAM MOHAMMED SHABBIR , AYYAGARI ARUN , ABHISHEK ABHISHEK
CPC classification number: H04L63/08
Abstract: PROBLEM TO BE SOLVED: To allow a supplicant on a first computing system to execute authentication of the first computing system to an authenticator on a second computing system independent of data link layer and physical layer protocols. SOLUTION: The first computing system establishes data link layer connection with the second computing system by using specific underlying data link and physical layer protocols. The supplicant on the first data link layer and the authenticator on the second computing system receive an indication that the data link connection is established. The supplicant determines that authentication should be generated by the authenticator. The supplicant instructs the authenticator to generate the authentication by a method independent of the underlying data link and physical layer protocols used for establishing the connection. COPYRIGHT: (C)2005,JPO&NCIPI
-
公开(公告)号:JP2004266835A
公开(公告)日:2004-09-24
申请号:JP2004055384
申请日:2004-02-27
Applicant: Microsoft Corp , マイクロソフト コーポレーション
Inventor: ABHISHEK ABHISHEK , AYYAGARI ARUN , SHEN HUI
IPC: H04L12/46 , H04L12/28 , H04L12/56 , H04W8/26 , H04W12/06 , H04W48/16 , H04W48/20 , H04W84/12 , H04W88/08 , H04W92/20 , H04Q7/34 , H04Q7/36
CPC classification number: H04W48/16 , H04L61/6022 , H04W12/06 , H04W48/20 , H04W84/047 , H04W84/12 , H04W92/20
Abstract: PROBLEM TO BE SOLVED: To provide an architecture and method for extending the depth of a WLAN (wireless local area network) as a hierarchical access point structure including wireless access points (AP). SOLUTION: Each wireless AP of the WLAN scans a network, collects one or a plurality of packets from one or a plurality of APs to identify a network (each packet includes an address for identifying an ancestry of the APs up to an ancestral wired AP), and applying an access point selection algorithm for configuring a parent AP to configure a network. The architecture includes: a scanning object configured to issue a scan request to a network interface for collecting data of the APs; a selection object configured to filter / sort the collected AP data; an authentication state machine configured to execute an authentication / propriety inspection; and an association state machine configured to compose a packet including hierarchical data indicating AP ancestry up to a conventional AP. COPYRIGHT: (C)2004,JPO&NCIPI
-
公开(公告)号:JP2004252928A
公开(公告)日:2004-09-09
申请号:JP2003130776
申请日:2003-05-08
Applicant: Microsoft Corp , マイクロソフト コーポレイションMicrosoft Corporation
Inventor: HERNANDEZ EDWIN , AYYAGARI ARUN , MOORE TIMOTHY M , GANUGAPATI KRISHNA , BAHL PRADEEP
CPC classification number: H04W52/0232 , Y02D70/00 , Y02D70/142 , Y02D70/22
Abstract: PROBLEM TO BE SOLVED: To provide a new power management system that determines when and how long to switch a network interface of a wireless device into a low-power state without causing excessive delay in network traffic. SOLUTION: The power management system for use in the wireless device reduces the power consumption of the network interface module 201 of the wireless device by selectively putting the network interface module into a low-power state for an idle time. The length of the idle time is calculated such that the amount of delayed traffic data accumulated is expected to be less than or equal to a preselected threshold when the network interface module is put in the low-power state for the calculated idle time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data. COPYRIGHT: (C)2004,JPO&NCIPI
-
公开(公告)号:JP2004180324A
公开(公告)日:2004-06-24
申请号:JP2003398057
申请日:2003-11-27
Applicant: Microsoft Corp , マイクロソフト コーポレイションMicrosoft Corporation
Inventor: ABHISHEK ABHISHEK , AYYAGARI ARUN , SHEN HUI , GANUGAPATI KRISHNA , RUAN JIANDONG
Abstract: PROBLEM TO BE SOLVED: To provide a software-based wireless infrastructure system. SOLUTION: The system has a driver for communicating with a network stack and network interface card (NIC), a station driver and a station server for communicating with 802.1X supplicant or 802.1X authenticator. Each NIC provides station and/or access point functionality support. The driver drops a received packet when the packet is neither authenticated nor related. A fragmented or encrypted packet is defragmented and decrypted. A relating manager should be used with a configuration table manager to relate the station and the access point via a management packet. COPYRIGHT: (C)2004,JPO
-
公开(公告)号:WO0182038A2
公开(公告)日:2001-11-01
申请号:PCT/US0109448
申请日:2001-03-26
Applicant: MICROSOFT CORP
Inventor: MOORE TIMOTHY M , AYYAGARI ARUN , SHETH SACHIN C , BAHL PRADEEP
IPC: G06F15/00 , G06F1/00 , G06F21/00 , G06F21/20 , G09C1/00 , H04L9/08 , H04L9/32 , H04L29/06 , H04W12/06 , H04W88/02
CPC classification number: H04L63/0823 , G06F21/33 , G06F2221/2129 , G06F2221/2149 , H04L63/162 , H04L63/166 , H04W12/06 , H04W88/02
Abstract: A method for setting up and managing secure data/audio/video links with secure key exchanges, authentication and authorization is described. An embodiment of the invention enables establishment of a secure link with limited privileges using the machine identifier of a trusted machine. This is particularly useful if the user of the machine does not have a user identifying information suitable for authentication. Furthermore, the presentation of a default user identifying information by a user advantageously initiates intervention by a system administrator instead of a blanket denial. This decentralized procedure allows new users access to the network without having to physically access a centralized facility to present their credentials. Another embodiment of the invention enables a remote user to connect to a secure network with limited privileges.
Abstract translation: 描述了通过安全密钥交换,认证和授权建立和管理安全数据/音频/视频链路的方法。 本发明的实施例使得能够使用受信任机器的机器标识符来建立具有有限权限的安全链路。 如果机器的用户没有适合于认证的用户识别信息,这是特别有用的。 此外,由用户识别信息的默认用户的呈现有利地启动系统管理员的干预,而不是一致拒绝。 这种分散式过程允许新用户访问网络,而无需物理访问集中式设施来呈现其凭据。 本发明的另一实施例使得远程用户能够以有限的权限连接到安全网络。
-
-
-
-
-
-
-
-
-