摘要:
A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The Secure Nomadic Wireless Network, or SNOWNET, follows a hierarchical approach. Special SNOWNET nodes are deployed in the area where networking service is needed and form a backbone network. At the same time, SNOWNET nodes provide local access service to regular mobile clients. SNOWNET provides security through authentication of the nodes and clients, as well as through encryption of the data.
摘要:
A system for conducting an agreement between two parties relying on a trusted a third party includes a first party generating a first view of the agreement and transmitting the first view of the agreement to the third party, a second party independently generating a second view of the agreement and transmitting the second view of the agreement to the third party, a wireless network connecting the first party and the second party, and a wired or wireless network connecting the second party to the third party. The trusted third party, receives the first view of the agreement and the second view of the agreement, verifies conditions including that the identities of the parties that transmitted the agreements and that the independent views of the agreement are consistent with each other, and takes action to execute the agreement if the conditions are satisfied.
摘要:
In one or more embodiments of the disclosed technology, an Access Point (AP) schedules communication traffic flows or service tasks between an Access Point (AP) and one or more member stations in a Wireless Local Area Network (WLAN). The communication traffic flows or service tasks may include both control and management flows and data traffic flows. The communication traffic flows or service tasks may include traffic flows or streams of different types, each of which may have different service intervals. The order of service tasks can be changed from cycle to cycle, randomly, by rotation, or based on historical delay records.
摘要:
Intra-cell upstream data forwarding is utilized in a wireless network such as a wireless local area network. A network forwarding path is determined based on the signal strength of an access point signal received at client stations within the network, referred to as the OASS. In particular embodiments, a station that is either originating or forwarding a frame inserts its own OASS into the frame before transmitting it and a client station that receives a frame forwards it only if its own OASS exceeds the frame-enclosed OASS, illustratively by at least a predetermined amount.
摘要:
The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
摘要:
A system and method are disclosed for forwarding data in hybrid wireless mesh networks. The method includes configuring a number of mesh network nodes as Potential Relay Nodes (PRNs) in an overlay network associated with a hybrid wireless mesh network, streaming data packets from a source node to a destination node using a native data forwarding algorithm of the hybrid wireless mesh network, dynamically identifying Relay Nodes (RNs) among PRNs in the overlay network, creating secondary paths for sending data packets towards selected RNs in the overlay network, and relaying data packets from RNs to the destination node using the overlay network.
摘要:
Disclosed is a protocol used by wireless stations sharing a single wireless channel. When a local station senses a communication between remote stations using the channel, the local station estimates whether its local transmissions would disrupt this on-going remote communication. To estimate, the local station forms capture models of the remote stations. From the capture models, the local station determines if its local transmission would prevent each remote station from capturing the signal from the other remote station. If the local transmission would not disrupt the remote communications, the local station transmits its message over the channel at the same time the remote stations use the channel. The local station performs the estimation using parameters of the remote stations. The stations could share their parameters by including them in headers of frames. The protocol can be implemented as an enhancement to the IEEE 802.11 standard.
摘要:
System(s), device(s), and method(s) are provided to route data in a mesh network of devices that can communicate wirelessly through a plurality of technologies. One or more of such devices receive broadcast message(s) from a destination device intended to receive the data, and generate a first radio link quality metric (RLQM) value based on the broadcast message(s). A source device originates and delivers a quantum of data with an embedded first RLQM value. A set of intermediate devices relays the quantum of data if a forwarding criterion is fulfilled; the forwarding criterion is based in part on the first RLQM value and a second RLQM value generated by an intermediate device in the set of intermediate devices based on the broadcast message(s). The intermediate device exploits an optical interface to transmit the quantum of data. The destination device broadcasts an acknowledgement signal in response to receiving intended data.
摘要:
A wireless computer network includes a backbone network including backbone network nodes authenticated to each other and in communication with each other. The wireless computer network also includes a master authenticator node and a proxy authenticator node among the backbone network nodes. When an unauthenticated new node requests authentication to the backbone network and the unauthenticated new node is in communication with at least one of the backbone network nodes, the at least one of the backbone network nodes becoming the proxy authenticator node for the unauthenticated new node and communicates with the master authenticator node to authenticate the unauthenticated new node to the backbone network.
摘要:
In a wireless local area network, a first and second access point in which the RF coverage areas overlap are synchronized by positioning a monitor station within the overlap area. The monitor station receives beacon frames from both access points and records the arrival times. A manager in communication with both access points and the monitor station calculates a retardation interval and issues a control command to the second access point to retard transmission of its beacon frame. The retardation interval is calculated such that the contention-free period of the second access point does not overlap the contention-free period of the first access point. The manager may also issue control commands to the first and second access points to adjust their contention-free periods.