摘要:
Synchronized UWB piconets for SOP (Simultaneously Operating Piconet) performance. A common backbone (either wired or wireless) is employed that provides a common CLK (clock signal) to all of the various PNCs (piconet coordinators) of various piconets that may operate within a sufficiently close region such that interference could undesirably occur. By providing a very reliable CLK signal from a common backbone to all of the PNCs of the various piconets operating within a substantially close proximity to one another, very precise synchronization may be ensured for all of the communications performed therein. The various piconets may then even operate using TDMA (Time Division Multiple Access)—whose performance would be substantially compromised without effective synchronization. In addition, combined TFC (time frequency code) and TDMA may also be employed to support the communications therein thereby providing even another degree of orthogonality that provided by TDMA alone.
摘要:
A method for revoking access to a mobile device includes providing a plurality of authenticated applications accessible by the mobile device, and providing a plurality of revocation timeout intervals for revoking access by the mobile device to the plurality of authenticated applications. Access to a first authenticated application is revoked after a first timeout interval and access to a second authenticated application is revoked after a second timeout interval.
摘要:
A Wireless Local Area Network (WLAN) system based upon peer-to-peer communications. A wireless terminal for peer-to-peer communications acts either as a WLAN master or as a WLAN slave. When the wireless terminal acts a master, the wireless terminal undertakes mastering duties that include transmitting a beacon interval in the frame cycle. When the wireless terminal is not tethered to a power source, mastering duties alternate according to a round-robin WLAN mastering cycle, wherein the wireless terminal acts the WLAN master during at least one frame cycle and acts the WLAN slave during other frame cycles to conserve an untethered power source of the wireless terminal.
摘要:
Multi-mode WLAN/PAN MAC. A novel solution is presented in which a MAC (Medium Access Controller) is implemented that includes multiple functionality types. This MAC may include functionality supporting communication according to one or more of the IEEE 802.11 WLAN (Wireless Local Area Network) related standards and also to one or more of the standards generated by the IEEE 802.15.3 PAN (Personal Area Network) working group. By providing this dual functionality of a multi-mode WLAN/PAN MAC, a communication device may adaptively change the manner in which it communicates with other communication devices. For example, in an effort to maximize throughput and overall efficiency of communication within a communication system, certain of the various devices may change from using the WLAN related standards to using the PAN related standards, and vice versa, based on any one or more of a variety of operational parameters including system configuration.
摘要翻译:多模式WLAN / PAN MAC。 提出了一种新颖的解决方案,其中实现了包括多种功能类型的MAC(介质访问控制器)。 该MAC可以包括支持根据IEEE 802.11 WLAN(无线局域网)相关标准中的一个或多个的通信的功能,并且还可以包括由IEEE 802.15.3 PAN(个人区域网络)工作组生成的一个或多个标准。 通过提供多模式WLAN / PAN MAC的这种双重功能,通信设备可以自适应地改变与其他通信设备进行通信的方式。 例如,为了最大限度地提高通信系统内的通信的吞吐量和整体效率,各种设备中的某些设备可以从使用WLAN相关标准改变为使用PAN相关标准,反之亦然,基于以下任何一种或多种 各种操作参数包括系统配置。
摘要:
A secure digital system including a number of ICs that exchange data among each other. Each of the ICs includes a key generator for generating a cipher key; a memory for securely storing the generated cipher key; an authenticating module for authenticating neighboring ICs of a respective IC; an encryption module for encrypting data communicated from the respective IC to the neighboring ICs; and a decryption module for decrypting data received from the neighboring ICs.
摘要:
A Wireless Local Area Network (WLAN) system based upon peer-to-peer communications. A wireless terminal for peer-to-peer communications acts either as a WLAN master or as a WLAN slave. When the wireless terminal acts a master, the wireless terminal undertakes mastering duties that include transmitting a beacon interval in the frame cycle. When the wireless terminal is not tethered to a power source, mastering duties alternate according to a round-robin WLAN mastering cycle, wherein the wireless terminal acts the WLAN master during at least one frame cycle and acts the WLAN slave during other frame cycles to conserve an untethered power source of the wireless terminal.
摘要:
Methods and systems are provided that authenticate an intended user of a mobile client in a roaming environment. One embodiment of the invention provides a mobile communication network architecture that includes a first base station (e.g., a first base station controller and/or a first transceiver station), a second base station (e.g., a second base station controller and/or a second transceiver station), a mobile client, and a server coupled to the mobile client via either the first base station controller or the second base station. The first base station is coupled to an authentication center that authenticates an intended user so that the user can communicate a message between the mobile client and the server via the first base station. A credential (or status) of the authentication made at the authentication center is then transmitted from the first base station to the second base station when the mobile client moves to utilize the second base station to communicate with the server.
摘要:
Methods and systems are provided that use smartcards, such as subscriber identity module (SIM) cards to provide secure functions for a mobile client. One embodiment of the invention provides a mobile communication network system that includes a mobile network, a mobile terminal, a server coupled to the mobile terminal via the mobile network, and a subscriber identity module (SIM) card coupled to the mobile terminal. The SIM card includes a first key and a second key. The first key is used to authenticate an intended user of the mobile terminal to the mobile network. Upon successful authentication of the intended user to the mobile network, the mobile terminal downloads a function offered from the server through the mobile network. The second key is then used by the mobile terminal to authenticate the intended user to the downloaded function so that the intended user can utilize the function.
摘要:
A wireless interface device services communications between a wirelessly enabled host and at least one user input device. The wireless interface device includes a wireless interface unit, a processing unit, an input/output unit, and may include a power management unit. The wireless interface unit wirelessly interfaces with the wirelessly enabled host. The processing unit and the wireless interface unit interact to determine when the wireless interface unit has established a link with the wirelessly enabled host. When the wireless interface unit has established a link with the wirelessly enabled host, the processing unit interacts with the input/output unit to direct the input/output unit to output a link established indication. When the wireless interface unit enters a sniff mode or a park mode, a second link established indication may be provided. When the link is taken down or lost, a link non-established indication may be provided.
摘要:
A modem and method for operating same. A receiver circuit of the modem is coupled to receive a continuous analog signal from a communication channel. This analog signal includes both packet and idle information. The receiver circuit monitors the analog signal to detect the presence of idle information. Upon detecting idle information, the receiver circuit enters a standby mode in which the processing requirements of the receiver circuit are reduced. A burst mode protocol is also provided, in which packets of digital information are modulated by a transmitter circuit the modem, thereby converting the packets of digital information into analog signal bursts of discrete duration. These analog signal bursts are transmitted from the transmitter circuit to a telephone line. However, the transmitter circuit does not generate any signals between the analog signal bursts. A receiver circuit monitors the telephone line to detect the analog signal bursts. Upon detecting the presence of the analog signal bursts on the telephone line, the receiver circuit demodulates the analog signal bursts using full processing capabilities of the receiver circuit. However, upon detecting the absence of the analog signal bursts on the telephone line, the demodulating function of the receiver circuit is disabled. The burst mode protocol enables multi-drop and multi-cast operation, as well as reducing required DSP resources.