Method for accessing a WLAN by establishing an ad-hoc network with a wireless connected device
    2.
    发明公开
    Method for accessing a WLAN by establishing an ad-hoc network with a wireless connected device 有权
    通过建立到网络连接的无线设备的ad hoc连接接入无线局域网(WLAN)

    公开(公告)号:EP1641184A1

    公开(公告)日:2006-03-29

    申请号:EP05108256.8

    申请日:2005-09-08

    CPC classification number: H04W24/04 H04W12/12 H04W24/08 H04W84/18 H04W88/06

    Abstract: Systems and methods are described for using client conduits to enable bootstrapping and fault diagnosis of disconnected wireless clients. Client conduits are used to enable disconnected clients to diagnose their problems with the help of nearby clients. This technique may take advantage of the beaconing and probing mechanisms of IEEE 802.11 to ensure that connected clients do not pay unnecessary overheads for detecting disconnected clients. Methods are also described for detecting rogue devices disguising as disconnected clients.

    Abstract translation: 系统和方法描述了使用客户端的导管,使引导和断开无线客户端的故障诊断。 客户端的管道用于启用断开连接的客户诊断其问题与附近客户的帮助。 这种技术可以把信标优势和探测IEEE 802.11的机制,以确保没有连接的客户端不支付不必要的费用,用于检测断开连接的客户端。 所以方法描述用于检测恶意设备伪装成断开客户机。

    Collaboratively locating disconnected clients and rogue access points in a wireless network
    3.
    发明公开
    Collaboratively locating disconnected clients and rogue access points in a wireless network 有权
    无党派合作的客户和未经授权的Zuganspunkten定位在无线网络

    公开(公告)号:EP1641183A2

    公开(公告)日:2006-03-29

    申请号:EP05108255.0

    申请日:2005-09-08

    CPC classification number: H04W12/12 H04W24/08 H04W64/00

    Abstract: Methods are described for using collaboration of neighboring wireless devices to enable location of disconnected wireless devices and rogue wireless access points. A central server computes the locations of the neighboring clients and uses those locations to estimate the location of a disconnected client. These techniques may take advantage of the beaconing and probing mechanisms of IEEE 802.11 to ensure that connected clients do not pay unnecessary overheads for detecting disconnected clients. Methods are also described for detecting and locating rogue devices by collaboratively collecting information from neighboring devices and comparing the information to a database.

    Abstract translation: 方法被描述用于使用相邻无线设备的协作,以使断开的无线设备和恶意无线接入点的位置。 中央服务器计算相邻客户端的位置,并使用这些位置估计断开连接的客户端的位置。 这些技术可采取信标优势和探测IEEE 802.11的机制,以确保没有连接的客户端不支付不必要的费用,用于检测断开连接的客户端。 所以方法描述用于检测和协作收集来自周边设备的信息和比较信息到数据库中查找恶意设备。

    Secure recovery in a serverless distributed file system
    4.
    发明公开
    Secure recovery in a serverless distributed file system 有权
    在分布式文件系统的安全恢复,而不服务器

    公开(公告)号:EP1426848A3

    公开(公告)日:2005-03-30

    申请号:EP03026963.3

    申请日:2003-11-25

    Abstract: Systems and methods for secure file writes after a catastrophic event are allowed over an unauthenticated channel in a serverless distributed file system if an authenticator accompanies the secure file writes. The authenticator can be a power-of-attorney certificate with time limitations, a vector of message authenticated code, or a single message authenticator with secured with a secret shared among members of the serverless distributed file system. The serverless distributed file system includes at least 3 f + 1 participating computer members, with f representing a number of faults tolerable by the system. The group requires at least one authenticator for file creation and file uploads. Any changes to files stored among the members can be made over an unauthenticated channel if the file changes are secured by the authenticator and the group is able to verify the authenticator.

    Neighbor location discovery with directional antennas in a mesh network
    8.
    发明公开
    Neighbor location discovery with directional antennas in a mesh network 有权
    Enteckung und Ortung von benachbarten Knoten mit Richtantennen in einem Maschennetz

    公开(公告)号:EP1708437A1

    公开(公告)日:2006-10-04

    申请号:EP06111038.3

    申请日:2006-03-13

    CPC classification number: H04W8/005 H04W84/18

    Abstract: Disclosed is a Neighbor Location Discovery Protocol (NLDP) that determines the relative locations of the nodes in a mesh network. In one embodiment, NLDP can be implemented for an ad-hoc wireless network where the nodes are equipped with directional antennas and are not able to use GPS. While NLDP relies on nodes having at least two RF transceivers, it offers significant advantages over previously proposed protocols that employ only one RF transceiver. In NLDP antenna hardware is simple, easy to implement, and readily available. Further, NLDP exploits the host node's ability to operate simultaneously over non-overlapping channels to quickly converge on the neighbor's location. NLDP is limited by the range of the control channel, which operates in a omni-directional fashion. However, by choosing a low frequency band, high power, and low data rate, the range of the control channel can be increased to match the range on the data channel.

    Abstract translation: 公开了一种确定网状网络中节点的相对位置的邻居位置发现协议(NLDP)。 在一个实施例中,可以为节点配备有定向天线并且不能使用GPS的自组织无线网络实现NLDP。 虽然NLDP依赖于具有至少两个RF收发器的节点,但它提供了比仅采用一个RF收发器的先前提出的协议的显着优点。 在NLDP天线硬件简单,易于实现,并且随时可用。 此外,NLDP利用主机​​节点在非重叠信道上同时操作的能力,以快速收敛在邻居的位置。 NLDP受限于以全方式运行的控制通道的范围。 然而,通过选择低频带,高功率和低数据速率,可以增加控制信道的范围以匹配数据信道上的范围。

    Power efficient channel scheduling in a wireless network
    9.
    发明公开
    Power efficient channel scheduling in a wireless network 有权
    在无线网络规划电力有效信道分配

    公开(公告)号:EP1357704A3

    公开(公告)日:2005-10-05

    申请号:EP03007307.6

    申请日:2003-03-31

    Abstract: A method and system for optimizing channel access scheduling for multiple wireless computing devices over a wireless network improves channel access efficiency with respect to a primary channel. An access point, or host computer, includes a host transceiver for receiving control information from the wireless computing devices over a low power channel. Upon receiving the control information, the access point applies a scheduling algorithm to schedule channel access for the wireless computing devices to transmit data over the primary communication channel. The wireless computing devices include a low power radio for receiving scheduling information via the low power channel during idle periods. When the scheduling information is received, the wireless computing device activates its primary channel network interface components to communicate data through the primary channel. When the computing device is idle, the device is configured to power down all of its components with the exception of the circuitry required to power the low power channel. As such, the low power channel is maintained in an active state for receiving scheduling information, such as an access schedule, during both idle and non-idle periods.

    Secure recovery in a serverless distributed file system
    10.
    发明公开
    Secure recovery in a serverless distributed file system 审中-公开
    无服务器分布式文件系统中的安全恢复

    公开(公告)号:EP1526700A2

    公开(公告)日:2005-04-27

    申请号:EP05001147.7

    申请日:2003-11-25

    Abstract: Systems and methods for secure file writes after a catastrophic event are allowed over an unauthenticated channel in a serverless distributed file system if an authenticator accompanies the secure file writes. The authenticator can be a power-of-attorney certificate with time limitations, a vector of message authenticated code, or a single message authenticator with secured with a secret shared among members of the serverless distributed file system. The serverless distributed file system includes at least 3 f + 1 participating computer members, with f representing a number of faults tolerable by the system. The group requires at least one authenticator for file creation and file uploads. Any changes to files stored among the members can be made over an unauthenticated channel if the file changes are secured by the authenticator and the group is able to verify the authenticator.

    Abstract translation: 如果验证器伴随安全文件写入,则在无服务器分布式文件系统中的未经身份验证的通道上允许灾难性事件之后进行安全文件写入的系统和方法。 认证者可以是具有时间限制的授权书授权证书,消息验证码的向量或单个消息验证者,其具有在无服务器分布式文件系统的成员之间共享的秘密。 无服务器分布式文件系统至少包含3f + 1个参与计算机成员,其中f表示系统可容忍的故障数量。 该组需要至少一个用于文件创建和文件上传的认证器。 如果文件更改受到身份验证器的保护并且该组能够验证身份验证器,则可以在未经身份验证的通道上对存储在成员中的文件进行任何更改。

Patent Agency Ranking