摘要:
Authorized access by a user to an application server in a wireless local area network is obtained by printing machine-readable indicia on a portable, physical ticket, and by presenting the ticket to an electro-optical reader for reading the indicia.
摘要:
Described is an arrangement including a receiver and an enveloped detection arrangement. The receiver receives radio frequency signals generated according to a predetermined wireless communication protocol. The envelope detection arrangement screens the radio frequency signals for a predetermined signal which utilizes the predetermined wireless communication protocol and has a predetermined envelope sequence. Upon detection of the predetermined signal, the arrangement transmits a further signal to a computing device coupled thereto. The further signal is an instruction for the computing device to execute a predetermined action.
摘要:
A semiconductor device for securely controlling access to a cryptographic processor including a semiconductor package with a biometric data capture device therein operative to acquire data associated with predetermined biometric characteristic of a user and store it as a biometric key, and a processing unit in the package coupled to the data capture device. An encryption/decryption circuit is also disposed in the semiconductor package and is operative to perform encryption or decryption on input data utilizing the biometric key.
摘要:
Unauthorized use of a wireless local area network is detected, wherein the network includes mobile units that communicate with at least one server computer through access points. The messages transmitted over the wireless local area network are analyzed for compliance with rules set out in the specification for the selected wireless local area network protocol. If an inconsistency is detected, an alarm is generated to indicate a possible intruder access attempt to the wireless local area network.
摘要:
A intrusion detection method is disclosed for use in a wireless local area data communications system, wherein mobile units communicate with access points, and wherein the system is arranged to locate transmitters using signals transmitted by the transmitters. A database relating authorized transmitters to location is maintained. Selected signals are detected at the access points and location data corresponding to the selected signals for use in locating a source of the signals is recorded. The source location is determined using the location data, and the source location is compared to a corresponding location in the database. An alarm is signaled if the source location is inconsistent with the corresponding database location.
摘要:
Described is a system and method for resilient coverage in a wireless environment. The system may include a first wireless device having a first wireless transceiver; a second wireless device having a second wireless transceiver; and an envelope detection arrangement (“EDA”) coupled to the second device. The second wireless device has a first communication mode and a second communication mode, The second wireless transceiver conducts wireless communications with the first wireless transceiver using a predetermined wireless communication protocol (e.g., IEEE 802.11/16) only when the second wireless device is in the first communication mode. The second wireless transceiver is in a low-power state when in the second communication mode. The EDA screens radio frequency signals for a signal having a predetermined envelope sequence; the signal is generated according to the same predetermined wireless communication protocol. When the EDA receives the signal, the arrangement causes the second wireless device to switch into the first communication mode.
摘要:
A system and method for detecting unauthorized use of a wireless local area network is described, wherein the network includes mobile units that communicate with at least one access point. First network traffic data is accumulated at a mobile unit. Second network traffic data is accumulated at an access point. The first and second traffic data is communicated to a computer and is correlated by the computer to identify non-correlated traffic data. An alarm condition is signaled when the non-correlated traffic data exceeds a threshold.
摘要:
A method that enables the power saving frame transmission comprising an AP informing a plurality of stations within its range in a WLAN about a plurality of scheduled service periods during which the AP has access to a channel in a scheduled service time, receiving the information about the plurality of scheduled service periods by the plurality of stations and deciding about initiating or not initiating a frame transmission, whether or not an acknowledgement and an immediate response expected from other APs pertaining to said WLAN are received prior to a subsequent scheduled service time, wherein the frame is transmitted in a cooperative frame transmission scenario.
摘要:
Described is a method and system for fast roaming of a mobile unit in a wireless network. An access point receives a packet from a wireless computing unit which includes unit identifying data and an association request to establish communications via the access point. The packet is processed to initiate an authentication procedure of the unit using the unit identifying data. The authentication procedure is performed by at least one of the access point and an authentication server connected to the access point. Wireless transmissions of further packets between the unit and the access point (e.g., the further packets being related to the authentication procedure) are prioritized. The authentication procedure is completed to determine if the association request of the unit be granted.
摘要:
An auto ID reader and a radio frequency transceiver are supported on a common support having a predetermined form factor, such as that of a scan engine module commonly utilized in hand-held bar code symbol scanners. Common digital processing circuitry is used for processing the signal from the auto ID sensor, and the RF transceiver baseband signal, making a highly integrated and compact arrangement.