摘要:
A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The Secure Nomadic Wireless Network, or SNOWNET, follows a hierarchical approach. Special SNOWNET nodes are deployed in the area where networking service is needed and form a backbone network. At the same time, SNOWNET nodes provide local access service to regular mobile clients. SNOWNET provides security through authentication of the nodes and clients, as well as through encryption of the data.
摘要:
A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The Secure Nomadic Wireless Network, or SNOWNET, follows a hierarchical approach. Special SNOWNET nodes are deployed in the area where networking service is needed and form a backbone network. At the same time, SNOWNET nodes provide local access service to regular mobile clients. SNOWNET provides security through authentication of the nodes and clients, as well as through encryption of the data.
摘要:
A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The Secure Nomadic Wireless Network, or SNOWNET, follows a hierarchical approach. Special SNOWNET nodes are deployed in the area where networking service is needed and form a backbone network. At the same time, SNOWNET nodes provide local access service to regular mobile clients. SNOWNET provides security through authentication of the nodes and clients, as well as through encryption of the data.
摘要:
A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The Secure Nomadic Wireless Network, or SNOWNET, follows a hierarchical approach. Special SNOWNET nodes are deployed in the area where networking service is needed and form a backbone network. At the same time, SNOWNET nodes provide local access service to regular mobile clients. SNOWNET provides security through authentication of the nodes and clients, as well as through encryption of the data.
摘要:
A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The Secure Nomadic Wireless Network, or SNOWNET, follows a hierarchical approach. Special SNOWNET nodes are deployed in the area where networking service is needed and form a backbone network. At the same time, SNOWNET nodes provide local access service to regular mobile clients. SNOWNET provides security through authentication of the nodes and clients, as well as through encryption of the data.
摘要:
Methods, systems, and articles of manufacture for tracking users based upon wireless fingerprint information are provided. These include accessing proximity records, clustering the proximity records based upon time information and user information to generate a plurality of clusters, identifying one or more events based upon the generated clusters, and outputting information related to the identified one or more events. Each proximity record includes user information. User information includes at least a first user identifier and a second user identifier respectively identifying a first user and a second user, and time information. Time information specifies one or more times when the first user and the second user have respective wireless fingerprints that are within a threshold fingerprint distance of each other.
摘要:
Methods, systems, and apparatus, including computer programs for receiving communication data, determining a current geographic location of a computing device in response to receipt of the communication data, defining location data corresponding to the current geographic location, receiving user input at the computing device, the user input being indicative of a reaction of a user to receipt of the communication data, defining user reaction data based at least in part on the user input, defining one or more rules for reacting to received communication data based at least in part on the user reaction data and the location data, receiving subsequent communication data, and responding to the subsequent communication data based at least in part on the one or more rules.
摘要:
A computer-implemented method for scheduling a packet for transmission in a wireless local area network can be used to account for hidden and/or exposed terminals. The method includes determining whether the packet is to be transmitted to a computing device through a wireless access point that is in conflict with at least one other computing device associated with a different access point. The method further includes determining whether there is a conflicting packet scheduled to be transmitted for any conflicting computing devices associated with a different access points and scheduling the packet for transmission based on any conflicting packets. The method yet further includes forwarding the packet to a wireless access point at the scheduled time.
摘要:
The invention pertains to location approximation of devices, e.g., wireless access points and client devices in a wireless network. Location estimates may be obtained by observation/analysis of packets transmitted or received by the access point. For instance, data rate information associated with a packet is used to approximate the distance between a client device and the access point. This may be coupled with known positioning information to arrive at an approximate location for the access point. Confidence information and metrics about whether a device is an access point and the location of that device may also be determined. Accuracy of the location determination may be affected by factors including propagation and environmental factors, transmit power, antenna gain and diversity, etc. A location information database of access points may employ measurements from various devices over time. Such information may identify the location of client devices and provide location-based services to them.
摘要:
A roaming service method for a fast and secure wireless network is provided. In an embodiment of the present invention, an AP, which an STA associates with, transmits proactive keys needed for roaming to neighbor APs of the AP. When the STA moves to one of the neighbor APs, a reassociation is carried out between the STA and the neighbor AP using the already provided proactive key. In another embodiment of the present invention, an authentication server transmits proactive keys needed for roaming to neighbor APs to which the STA is likely to move, so that when the STA moves to one of the neighbor APs, a reassociation is carried out between the STA and the neighbor AP using the already provided proactive key.