摘要:
An arrangement and a method that, for a given pair of nodes that wish to intercommunicate with a high QoS measure, converts a portion of the contention-based network into a contention-less subnetwork by sending a reservation message and a confirmation message between the given pair of nodes. All nodes that are on the paths used for communicating between the pair of nodes are protected from interference by causing all nodes that potentially can interfere to enter a non-transmitting state.
摘要:
Intra-cell upstream data forwarding is utilized in a wireless network such as a wireless local area network. A network forwarding path is determined based on the signal strength of an access point signal received at client stations within the network, referred to as the OASS. In particular embodiments, a station that is either originating or forwarding a frame inserts its own OASS into the frame before transmitting it and a client station that receives a frame forwards it only if its own OASS exceeds the frame-enclosed OASS, illustratively by at least a predetermined amount.
摘要:
A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The Secure Nomadic Wireless Network, or SNOWNET, follows a hierarchical approach. Special SNOWNET nodes are deployed in the area where networking service is needed and form a backbone network. At the same time, SNOWNET nodes provide local access service to regular mobile clients. SNOWNET provides security through authentication of the nodes and clients, as well as through encryption of the data.
摘要:
A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The Secure Nomadic Wireless Network, or SNOWNET, follows a hierarchical approach. Special SNOWNET nodes are deployed in the area where networking service is needed and form a backbone network. At the same time, SNOWNET nodes provide local access service to regular mobile clients. SNOWNET provides security through authentication of the nodes and clients, as well as through encryption of the data.
摘要:
The subject disclosure provides a system and method for a set-top box for monitoring telehealth and biometric sensors. A subject patient is associated with telehealth and biometric sensors which measure the subject patient's vital signs and other health related attributes. In one aspect, the system includes a set-top box for continuously gathering biometric and telehealth sensor data. The set-top box includes a sensor interface for interfacing with the sensors and supports wireless and wired connections to the sensors. The system additionally may include a system management station for providing feedback to the subject patient.
摘要:
An arrangement and a method that, for a given pair of nodes that wish to intercommunicate with a high QoS measure, converts a portion of the contention-based network into a contention-less subnetwork by sending a reservation message and a confirmation message between the given pair of nodes. All nodes that are on the paths used for communicating between the pair of nodes are protected from interference by causing all nodes that potentially can interfere to enter a non-transmitting state.
摘要:
A method, a computer readable medium and an apparatus for optimizing a cellular network architecture are disclosed. For example, the method obtains network traffic data for a plurality of different endpoint device types, wherein the network traffic data comprises network traffic data for each of the plurality of different endpoint device types, and predicts a future traffic pattern for one of the plurality of different endpoint device types based on the network traffic data. The method then adjusts a parameter of the cellular network architecture in response to the future traffic pattern predicted for the one of the plurality of different endpoint device types.
摘要:
The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
摘要:
A security management approach that combines network security management with application layer or software service security to address the threat of internal network security attacks. The invention is directed to a method for enhancing network security on a computer network. Data access privileges relating to users and services are interpreted, network access rules are determined based on the interpreted privileges, and network message traffic is monitored and filtered based on the determined network access rules. The interpreting, determining, monitoring, and filtering are performed at a network layer responsible for controlling how a network device gains access to the network, such as the Media Access Control (MAC) layer.
摘要:
Methods, systems, and products measure health data related to a user. A time-stamped device identifier is received that uniquely identifies a communications device. A time-stamped sensor measurement is separately-received. A difference in time between the time-stamped device identifier and the time-stamped sensor measurement is determined. When the difference in time is within a window of time, then the sensor measurement is associated with the device identifier.