会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Wireless network security
    • 无线网络安全
    • US08612743B2
    • 2013-12-17
    • US13191094
    • 2011-07-26
    • Gavin D. HollandKarim M. El Defrawy
    • Gavin D. HollandKarim M. El Defrawy
    • H04W12/00
    • H04W12/12H04W12/04H04W84/18
    • A method includes identifying a suspect node of a network that includes multiple nodes in wireless communication. The method also includes initiating formation of a sub-network of the network in response to identifying the suspect node. The suspect node is not a member of the sub-network. After formation of the sub-network, first communications between the suspect node and a device of the network are routed to or through at least one of the members of the sub-network. The sub-network is configured to enable second communications between members of the sub-network, where the second communications are communicated in a manner that is secured against access by the suspect node.
    • 一种方法包括识别包括无线通信中的多个节点的网络的可疑节点。 该方法还包括响应于识别可疑节点而启动网络的子网络的形成。 可疑节点不是子网的成员。 在形成子网络之后,可疑节点和网络的设备之间的第一通信被路由到或通过子网络的至少一个成员。 子网络被配置为启用子网络的成员之间的第二通信,其中第二通信以被抵御可疑节点访问的方式进行通信。
    • 3. 发明申请
    • WIRELESS NETWORK SECURITY
    • 无线网络安全
    • US20130031358A1
    • 2013-01-31
    • US13191094
    • 2011-07-26
    • Gavin D. HollandKarim M. El Defrawy
    • Gavin D. HollandKarim M. El Defrawy
    • H04W12/00
    • H04W12/12H04W12/04H04W84/18
    • A method includes identifying a suspect node of a network that includes multiple nodes in wireless communication. The method also includes initiating formation of a sub-network of the network in response to identifying the suspect node. The suspect node is not a member of the sub-network. After formation of the sub-network, first communications between the suspect node and a device of the network are routed to or through at least one of the members of the sub-network. The sub-network is configured to enable second communications between members of the sub-network, where the second communications are communicated in a manner that is secured against access by the suspect node.
    • 一种方法包括识别包括无线通信中的多个节点的网络的可疑节点。 该方法还包括响应于识别可疑节点而启动网络的子网络的形成。 可疑节点不是子网的成员。 在形成子网络之后,可疑节点和网络的设备之间的第一通信被路由到或通过子网络的至少一个成员。 子网络被配置为启用子网络的成员之间的第二通信,其中第二通信以被抵御可疑节点访问的方式进行通信。