Abstract:
PROBLEM TO BE SOLVED: To provide method and system for reducing the number of ports allotted by a relay server. SOLUTION: A connecting system establishes a connection between two end points (client computers for example) via a relay server employing bidirectional technique. This connection is used bidirectionally whereby a stream can be transmitted from a first end point to a second end point, and the stream can be transmitted from the second end point to the first end point. Further, the connecting system can reduce further the number of ports allotted by the relay server by multiplexing a plurality of streams on a single connection employing the stream multiplexing technique, and the number of ports allotted by a relay server can also be reduced by multiplexing the streams from different end points and passing through a single connection via a relay server employing an end point multiplexing technique. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a radio device which adaptively determines whether to perform preceding authentication. SOLUTION: When a latency-sensitive application (low-latency application) is being executed on a radio device, preceding authentication is performed and latency related to changeover between radio access points is reduced. Low-latency applications of this kind include VoIP, video, interactive whiteboards, or video conference. When the low latency application is not being run on the radio device, the radio device is not sensitive to latency, when changing from one radio access point to another. In such a case, the preceding authentication will not be performed, and processing and battery resources are retained. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a system and method for facilitating automatic wireless network detection. SOLUTION: A wireless network client can automatically detect the "type" of a network (e.g., method of authentication and encryption) without requiring input from the user. For example, unencrypted network, WEP encrypted network requiring a WEP key, WPA encrypted network requiring a pre-shared key, an IEEE 802.1x enabled network supporting WPA and/or an IEEE 802.1x enabled network not supporting WPA. In a wireless network detection system having a connection component and a detection component, the connection component facilitates connection of a client system to at least one of a plurality of wireless networks. The detection component identifies a type of an available wireless network. Identification can be performed based upon information received in an information element and/or repeated probing of the wireless network beacon. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a system and a method for selecting a network and an interface which span a plurality of media. SOLUTION: This disclosed system facilitates automated network interface configuration decision-making, that spans a set of networks supporting communications via differing media. A set of media specific modules associated with differing communications media acquire network interface status/capabilities information. A rules engine thereafter applies a designated network selection rules to the acquired network interface status/capabilities information, and any other appropriate parameters attributable to either an interface or network, and selects one or more networks and interfaces, in order to establish/maintain a connection. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a method and system for managing power consumption, in a portable computing device having a network interface module. SOLUTION: A power management module receives inputs from other modules, and determines whether the network interface module is to be put in a doze state for a predetermined number of beacon intervals, to prevent waste of power consumption in the network interface module. The network interface module in a device, that is associated with a network, is put in the doze state, after an event has occurred including when a scan has been performed, after a delayed sleep timer has reached time out; and after transmission of beacon has been completed and when no traffic is buffered with respect to the device. The delayed sleep-time is set, based on the estimated round trip time of a packet. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
The invention provides Quality of Service assurances in a manner expected in other media to communications over paths that include one or more wireless links. The invention combines a subnet bandwidth manager ("SBM") at an access point ("AP") to track allocations of wireless bandwidth. The invention further incorporates multiple priority levels for packet transmission in a two-prong stochastic scheme. The first prong reserves bandwidth at each of the intermediate nodes in a transmission path subject to a veto by any intermediate node. The second prong modulates the transmission probability of a packet based on the previous failed attempts at transmission and the priority level of the packet. The overall result of this hybrid scheme is to not shut out users with the lowest priority, e.g., "best effort" priority, while assuring adequate bandwidth to higher priority applications.
Abstract:
PROBLEM TO BE SOLVED: To attain a zero configuration nomadic wireless and wired computing environment. SOLUTION: This system examines predefined user preference or profile settings (step 268) to determine to which of a competing number of wireless networks available it should connect, and what type of authentication should be used for such connection (step 274). A user may set a preference for infrastructure (288) or ad hoc modes (step 280) in the auto mode. With infrastructure mode preference setting, when the user has already operated off-line or in ad hoc mode (step 288), the system automatically detects and transfers connection to a newly available infrastructure wireless network (steps 292 to 294 to 266). COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a system and method for surely limiting access from a machine having a status, such as invalidity to a network resource. SOLUTION: A quarantine control client (QCC) that is positioned on a client machine acquires statements of health from a plurality of quarantine policy clients. The QCC packages these statements and provides the package to a quarantine execution client (QEC). The QEC transmits the package to a quarantine execution server (QES) together with a request of network access. The QES delivers the package to a quarantine control server (QCS) and the QCS decomposes the package and delivers each of the statements to a corresponding quarantine policy server (QPS). The QPS inspects the validity of the statement and notifies the QCS of a result. If a client provides a valid statement, the QES permits the client to access a network. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a method by which an authentication client which is authenticated by an authentication server enhances security of authentication and use a new communication password. SOLUTION: The authentication client obtains a new password from the user. A "password verifier" is guided from information provided from the new password and by the authentication server. The password verifier is shared with the authentication server. The new password itself is not transmitted to the authentication server and introduction of the new password from the password verifier is basically impossible. Each of the authentication client and the authentication server guides a set of new authentication and an encryption security key simultaneously. This process is repeated for controlling data amount to be transmitted by using a set of security key having specific security. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To enable a zero configuration nomadic wireless and wired computing environment. SOLUTION: The system examines predefined user preferences or profile settings (Step 268), to determine to which of competing number of wireless networks available it should connect, and what type of authentication should be used for such a connection (step 274). In automatic mode, the user may set a preference for infrastructure (step 288) or and hoc modes (step 280); and in infrastructure mode preference set, if the user has previously operated off-line or in ad hoc mode (step 288), the system will automatically detect and transfer connectivity to a newly available infrastructure wireless network (steps 292-294-266).