Abstract:
PROBLEM TO BE SOLVED: To execute a peer-to-peer call in an ad hoc wireless communication network. SOLUTION: The peer-to-peer call is executed by at least one processor configured to transmit response to another wireless device when an identifier extracted from a frame received from the other wireless communication device is included in an identifier peer-to-peer (PTP) list and a memory connected to the processor. The PTP list does not have all the peers available to perform communication in the ad hoc communication network, but has the identifier of a peer with which the wireless device is expected to communicate. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method for supporting peer-to-peer (PTP) communication between wireless devices. SOLUTION: For a peer-to-peer call in an ad hoc wireless communication network, a wireless device performs discovery of a target wireless device, performs authentication of the target wireless device, generates a session key, forms an ad hoc wireless communication network with the target wireless device, and communicates peer-to-peer with the target wireless device via the ad hoc wireless network. The wireless device may perform discovery with a list of identifiers for wireless devices designated to communicate with this wireless device. The wireless device may derive a service set identifier (SSID) used to identify the ad hoc wireless communication network based on its user-specific identifier (e.g., its phone number) and/or a user-specific identifier for the target wireless device. The wireless device may also perform IP address discovery using the user-specific identifier for the target wireless device. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method for executing peer-to-peer call in an ad hoc wireless communication network. SOLUTION: A wireless device searches a target wireless device (312), authenticates the target wireless device and generates a session key (e.g., using a pre-shared key or a certificate provisioned on the wireless device) (314), forms an ad hoc wireless network with the target wireless device (316), and communicates peer-to-peer with the target wireless device via the ad hoc wireless network (318). The wireless device may perform search with a list of identifiers for wireless devices designated to communicate with this wireless device. The wireless device may derive a service set identifier (SSID) used to identify the ad hoc wireless network based on its user-specific identifier (e.g., its phone number) and/or a user-specific identifier for the target wireless device. The wireless device may also performs IP address search using the user-specific identifier for the target wireless device. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To generate a session key of a peer-to-peer call in an ad hoc wireless communication network and to perform communication. SOLUTION: A wireless device 130 performs discovery of a target wireless device 130, performs authentication of the target wireless device 130 after the discovery, generates a session key on the basis of a pre-shared key provided on a wireless device or the authentication, or generates a session key on the basis of a master key and a group master key received from a wireless communication network, uses the generated session key to form an ad hoc wireless communication network with the target wireless device 130, and performs communication peer-to-peer with the target wireless device 130 via the ad hoc wireless communication network. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method for rapidly and efficiently connecting a peer-to-peer call in an ad hoc wireless communication network. SOLUTION: The method is executed by a wireless device including at least one processor configured to request access to the wireless communication network and obtain authentication for communication from a wireless client device of the wireless communication network, the at least one processor being configured to start communication via the wireless communication network after obtaining authentication from the wireless client device, and a memory connected the processor. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To execute a peer-to-peer call in an ad hoc wireless communication network. SOLUTION: The peer-to-peer call is executed by a wireless device including at least one processor configured to obtain a timing from a wireless communication network, and monitor a frame coming from the other wireless device for peer-to-peer communication during a predetermined time interval decided on the basis of the timing from the communication network and a memory connected to the processor. The at least one processor wakes up prior to each designated time interval in order to maintain a sleep state during the designated time interval and monitor the frame coming from the other wireless device. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method and a device for peer-to-peer communication in an ad hoc wireless communication network. SOLUTION: A wireless device includes at least one processor configured to process traffic data about a peer-to-peer call with a target wireless device of the peer-to-peer call in accordance with requirements of quality of service (QoS) confirmed with respect to the peer-to-peer call, and transmit the processed traffic data to the target wireless device and a memory connected to the processor. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
Techniques for performing traffic classification for uplink and bi-directional traffic streams are described. A station receives packets for transmission on the uplink to an access point. The station identifies packets for each uplink traffic stream and packets for each bi-directional traffic stream based on at least one classification parameter for each traffic stream. The station sends packets for each traffic stream in accordance with at least one QoS parameter for the traffic stream. The access point receives packets for transmission on the downlink to at least one station. The access point identifies packets for each downlink traffic stream and packets for each bi-directional traffic stream based on at least one classification parameter for each traffic stream. The access point sends packets for each traffic stream in accordance with at least one QoS parameter for the traffic stream.
Abstract:
Disclosed herein are platform- and device-independent systems and methods for serializing and deserializing data. A method of serializing data stored in a data structure comprises generating a data structure descriptor representing information about a memory layout of the data structure and serializing the stored data based upon the data structure descriptor. The data structure descriptor may include a layout array, including a memory offset and a size corresponding to each member of the data structure. A method of processing serially received data for storage in a data structure comprises receiving a serial data stream, allocating memory for storing the data based upon a data structure descriptor, and deserializing the data stream based upon the data structure descriptor. The data structure descriptor may include a layout array, including a memory offset and a size corresponding to each member of the data structure.
Abstract:
For a peer-to-peer call in an ad hoc wireless network, a wireless device performs discovery of a target wireless device, performs authentication of the target wireless device and generates a session key (e.g., using a pre-shared key or a certificate provisioned on the wireless device), forms an ad hoc wireless network with the target wireless device, and communicates peer-to-peer with the target wireless device via the ad hoc wireless network. The wireless device may perform discovery with a list of identifiers for wireless devices designated to communicate with this wireless device. The wireless device may derive a service set identifier (SSID) used to identify the ad hoc wireless network based on its user-specific identifier (e.g., its phone number) and/or a user-specific identifier for the target wireless device. The wireless device may also performs IP address discovery using the user-specific identifier for the target wireless device.