会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • TLS TUNNELING
    • TLS隧道
    • US20070157027A1
    • 2007-07-05
    • US11685075
    • 2007-03-12
    • Ashwin PalekarArun AyyagariDaniel Simon
    • Ashwin PalekarArun AyyagariDaniel Simon
    • H04L9/00
    • H04L63/0428H04L63/08H04L63/162
    • An authentication protocol can be used to establish a secure method of communication between two devices on a network. Once established, the secure communication can be used to authenticate a client through various authentication methods, providing security in environments where intermediate devices cannot be trusted, such as wireless networks, or foreign network access points. Additionally, the caching of session keys and other relevant information can enable the two securely communicating endpoints to quickly resume their communication despite interruptions, such as when one endpoint changes the access point through which it is connected to the network. Also, the secure communication between the two devices can enable users to roam off of their home network, providing a mechanism by which access through foreign networks can be granted, while allowing the foreign network to monitor and control the use of its bandwidth.
    • 可以使用认证协议来建立网络上的两个设备之间的安全通信方法。 一旦建立,安全通信可以用于通过各种认证方法认证客户端,在中间设备不能被信任的环境中提供安全性,例如无线网络或外部网络接入点。 此外,会话密钥和其他相关信息的高速缓存可以使得两个安全通信的端点能够快速恢复其通信,尽管中断,例如当一个端点改变其连接到网络的接入点时。 而且,两台设备之间的安全通信可以使用户能够从家庭网络中漫游,从而提供通过外部网络进行访问的机制,同时允许外部网络监视和控制其带宽的使用。
    • 2. 发明授权
    • TLS tunneling
    • TLS隧道
    • US07529933B2
    • 2009-05-05
    • US10157806
    • 2002-05-30
    • Ashwin PalekarArun AyyagariDaniel R. Simon
    • Ashwin PalekarArun AyyagariDaniel R. Simon
    • H04L9/00H04K1/00
    • H04L63/0428H04L63/08H04L63/162
    • An authentication protocol can be used to establish a secure method of communication between two devices on a network. Once established, the secure communication can be used to authenticate a client through various authentication methods, providing security in environments where intermediate devices cannot be trusted, such as wireless networks, or foreign network access points. Additionally, the caching of session keys and other relevant information can enable the two securely communicating endpoints to quickly resume their communication despite interruptions, such as when one endpoint changes the access point through which it is connected to the network. Also, the secure communication between the two devices can enable users to roam off of their home network, providing a mechanism by which access through foreign networks can be granted, while allowing the foreign network to monitor and control the use of its bandwidth.
    • 可以使用认证协议来建立网络上的两个设备之间的安全通信方法。 一旦建立,安全通信可以用于通过各种认证方法认证客户端,在中间设备不能被信任的环境中提供安全性,例如无线网络或外部网络接入点。 此外,会话密钥和其他相关信息的高速缓存可以使得两个安全通信的端点能够快速恢复其通信,尽管中断,例如当一个端点改变其连接到网络的接入点时。 而且,两台设备之间的安全通信可以使用户能够从家庭网络中漫游,从而提供通过外部网络进行访问的机制,同时允许外部网络监视和控制其带宽的使用。
    • 3. 发明授权
    • TLS tunneling
    • TLS隧道
    • US07917758B2
    • 2011-03-29
    • US11685075
    • 2007-03-12
    • Ashwin PalekarArun AyyagariDaniel R. Simon
    • Ashwin PalekarArun AyyagariDaniel R. Simon
    • H04L9/32G06F15/16
    • H04L63/0428H04L63/08H04L63/162
    • An authentication protocol can be used to establish a secure method of communication between two devices on a network. Once established, the secure communication can be used to authenticate a client through various authentication methods, providing security in environments where intermediate devices cannot be trusted, such as wireless networks, or foreign network access points. Additionally, the caching of session keys and other relevant information can enable the two securely communicating endpoints to quickly resume their communication despite interruptions, such as when one endpoint changes the access point through which it is connected to the network. Also, the secure communication between the two devices can enable users to roam off of their home network, providing a mechanism by which access through foreign networks can be granted, while allowing the foreign network to monitor and control the use of its bandwidth.
    • 可以使用认证协议来建立网络上的两个设备之间的安全通信方法。 一旦建立,安全通信可以用于通过各种认证方法认证客户端,在中间设备不能被信任的环境中提供安全性,例如无线网络或外部网络接入点。 此外,会话密钥和其他相关信息的高速缓存可以使得两个安全通信的端点能够快速恢复其通信,尽管中断,例如当一个端点改变其连接到网络的接入点时。 而且,两台设备之间的安全通信可以使用户能够从家庭网络中漫游,从而提供通过外部网络进行访问的机制,同时允许外部网络监视和控制其带宽的使用。
    • 5. 发明授权
    • Servers and methods for operating a communication system
    • 用于操作通信系统的服务器和方法
    • US09277554B2
    • 2016-03-01
    • US13604437
    • 2012-09-05
    • Anil KumarArun Ayyagari
    • Anil KumarArun Ayyagari
    • G06F15/16H04W72/04H04W16/14
    • H04W72/0453H04W16/14
    • A server includes a memory device configured to store a plurality of computer-executable instructions, and a processor coupled to the memory device. When the processor executes the plurality of computer-executable instructions, the processor is programmed to determine an available spectrum of frequencies within a location over time, and receive a request from a wireless device to access the available spectrum for a predefined duration. The processor is also programmed to select a frequency band within the spectrum that is available to be used by the wireless device for the predefined duration, and transmit an authorization message to the wireless device to use the selected frequency band.
    • 服务器包括被配置为存储多个计算机可执行指令的存储器件以及耦合到存储器件的处理器。 当处理器执行多个计算机可执行指令时,处理器被编程为确定时间内的位置内的频率的可用频谱,并且接收来自无线设备的访问可用频谱预定持续时间的请求。 处理器还被编程为选择频谱内可用于预定义持续时间的无线设备使用的频带,并向无线设备发送授权消息以使用所选择的频带。
    • 9. 发明授权
    • Interpolating cubic spline filter and method
    • 插值三次样条滤波器及方法
    • US07953783B2
    • 2011-05-31
    • US11833039
    • 2007-08-02
    • Pathamadai V. SankarJohn J. HanrahanMahesh C. ReddyArun Ayyagari
    • Pathamadai V. SankarJohn J. HanrahanMahesh C. ReddyArun Ayyagari
    • G06F17/17
    • G06F17/17H03H17/026H03H17/06H03H2017/0072
    • A filter for high speed digital signal processing. In one embodiment the filter includes a linear, phase-B, interpolating cubic spline filter having a pre-filter section and an interpolating post-filter section. The pre-filter section may be formed to implement any one of a 1-4-1 cubic spline function, a 2-5-2 cubic spline function or a 1-2-1 cubic spline function. The post-filter may be formed using a plurality of running average filters arranged in a cascade (i.e., serial) fashion. The filter can be constructed using significantly fewer independent component parts for a given level of pass band and stop band performance criteria, as compared with a conventional finite impulse response (FIR) filter. The filter is thus ideally suited for implementation with very large scale integration (VLSI) technology, and in a wide variety of electronic devices where high speed digital filtering is required.
    • 用于高速数字信号处理的滤波器。 在一个实施例中,滤波器包括具有预滤波器部分和插值后置滤波器部分的线性B相内插三次样条滤波器。 预过滤器部分可以形成为实现1-4-1三次样条函数,2-5-2个三次样条函数或1-2-1三次样条函数中的任何一个。 后置滤波器可以使用以级联(即串行)方式布置的多个运行平均滤波器形成。 与传统的有限脉冲响应(FIR)滤波器相比,可以对于给定的通带水平和阻带性能标准,使用显着更少的独立分量部分来构建滤波器。 因此,滤波器非常适合实现具有大规模集成(VLSI)技术的实现,以及需要高速数字滤波的各种电子设备。
    • 10. 发明授权
    • Access point to access point range extension
    • 接入点接入点范围扩展
    • US07664075B2
    • 2010-02-16
    • US11102612
    • 2005-04-08
    • Abhishek AbhishekArun AyyagariHui Shen
    • Abhishek AbhishekArun AyyagariHui Shen
    • G06F15/16
    • H04W48/16H04L61/6022H04W12/06H04W48/20H04W84/047H04W84/12H04W92/20
    • An architecture and methods for extending the depth of a WLAN to a four-level hierarchal access point structure including wireless access points. The wireless access points in the WLAN can be networked by scanning for a network, collecting one or more packets that identify the network from one or more access points, each packet including an address identifying an ancestry of the access points to an ancestral wired access point; and applying an access point selection algorithm to configure a parent access point. The architecture includes a scanning object configured to issue a scan request to a network interface and collect access point data; a selection object configured to filter and sort the collected access point data; an authentication state machine configured to perform authentication and validate; and an association state machine configured to compose a packet including hierarchical data indicative of access point ancestry to a conventional access point.
    • 一种用于将WLAN的深度扩展到包括无线接入点的四级分层接入点结构的架构和方法。 可以通过扫描网络来联网WLAN中的无线接入点,从一个或多个接入点收集标识网络的一个或多个分组,每个分组包括标识到祖先有线接入点的接入点的祖先的地址 ; 以及应用接入点选择算法来配置父接入点。 该架构包括被配置为向网络接口发出扫描请求并收集接入点数据的扫描对象; 被配置为对所收集的接入点数据进行过滤和排序的选择对象; 认证状态机被配置为执行认证和验证; 以及关联状态机,被配置为将包括指示接入点祖先的分层数据的分组组成到常规接入点。