摘要:
A system and method is described that enables autonomic discovery of wireless network security mechanisms by mobile devices. Stateful monitoring of wireless devices facilitates identification of pending network connectivity loss, enabling a handoff server to proactively advertise new points of access and their associated security mechanisms to devices before connectivity is lost. As a result, devices may seamlessly transition between secure networks. Stateful monitoring of device reachability may be used together with device certificates and/or tokens to decrease the potential of MAC spoofing and further secure the network. Stateful monitoring of device connectivity status during network transitions facilitates the identification of rogue access points. The token or certificate on the device may be used to authenticate the device while transitioning between networks by a centralized entity, managing the initiation and the execution of the handover for the device.
摘要:
A system and method is described that enables autonomic discovery of wireless network security mechanisms by mobile devices. Stateful monitoring of wireless devices facilitates identification of pending network connectivity loss, enabling a handoff server to proactively advertise new points of access and their associated security mechanisms to devices before connectivity is lost. As a result, devices may seamlessly transition between secure networks. Stateful monitoring of device reachability may be used together with device certificates and/or tokens to decrease the potential of MAC spoofing and further secure the network. Stateful monitoring of device connectivity status during network transitions facilitates the identification of rogue access points. The token or certificate on the device may be used to authenticate the device while transitioning between networks by a centralized entity, managing the initiation and the execution of the handover for the device.
摘要:
A telecommunication station set such as an IP phone is configured based on proximity of a user. Proximity of the user relative to the station set can be determined using RF-ID, UWB, GPS, direct user input, contextual information or other technology. For example, the user may carry a badge equipped with an RF-ID tag. The RF-ID tag is operative in response to an RF-ID reader associated with the phone, when in close proximity, to signal user ID and password, which may be encrypted. The user ID and password are sent to a SIP server, which authenticates the user and retrieves user-specific configuration details which are returned to the IP phone. The IP phone configures itself with the user-specific parameters. If the user moves away from the phone, as determined by the RF-ID tag being out of range of the reader, the IP phone de-configures itself.
摘要:
A telecommunication station set such as an IP phone is configured based on proximity of a user. Proximity of the user relative to the station set can be determined using RF-ID, UWB, GPS, direct user input, contextual information or other technology. For example, the user may carry a badge equipped with an RF-ID tag. The RF-ID tag is operative in response to an RF-ID reader associated with the phone, when in close proximity, to signal user ID and password, which may be encrypted. The user ID and password are sent to a SIP server, which authenticates the user and retrieves user-specific configuration details which are returned to the IP phone. The IP phone configures itself with the user-specific parameters. If the user moves away from the phone, as determined by the RF-ID tag being out of range of the reader, the IP phone de-configures itself.
摘要:
An elastic band feeding and tensioning mechanism and method for the application of an elastic band, having at least a portion thereof tensioned, on a fabric piece fed under a stitching needle of a sewing machine. A footplate guide is provided for positioning the elastic band in alignment on a fabric piece. A sewing guide member is adapted for securement to a foot arm of a sewing machine, and has a jaw opening for receiving the elastic band. A guide mechanism is provided for guiding the elastic band toward the jaw opening. The elastic band is advanced through the sewing machine by the feeddog of the sewing machine and tension is applied to the band by tension members. The tension members comprise a drive and idler rolls driven at a band feeding speed slower than the feeddog, and a further band stretching roll which instantaneously stitches the band between the drive roll and feeddog. A control circuit activates the tension members whereby to feed a predetermined length of the elastic band in a predetermined stretched condition through the sewing guide member for sewing the stretched elastic band on the fabric piece. A cutting element also cuts the elastic band at a predetermined location.