会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明公开
    • Detecting legacy spoofing in a user terminal
    • 埃因肯·冯遗传 - 在einemBenutzerendgerät的欺骗
    • EP2288081A1
    • 2011-02-23
    • EP10011620.1
    • 2005-10-05
    • Qualcomm Incorporated(1/3)
    • Nanda, Sanjiv
    • H04L12/28H04W12/12
    • H04B17/382H04B17/309H04W24/00H04W52/0209Y02D70/142Y02D70/22Y02D70/23
    • Backward compatibility may require the use of fields or other indicators that are interpreted by new nodes or stations in a system in a manner different from the way legacy nodes interpret those same fields. In some circumstances, these indicators may be used to 'spoof' legacy nodes to behave in certain ways, to allow a next generation protocol to be performed without interference from those legacy nodes. While this practice is may increase communication effectiveness, spoofing may lead to inefficient operation of legacy nodes. Legacy nodes may detect spoofing, including detecting field settings in a legacy portion of a transmitted message, or detecting phase shifts in a message. Once spoofing is detected, a variety of steps may be taken, including determining the duration of the next generation message, entering a low power state for the duration, communicating on alternate channels for the duration, modifying legacy backoff procedures, and others.
    • 向后兼容性可能需要使用不同于传统节点解释这些相同字段的方式在系统中由新节点或电台解释的字段或其他指示符。 在某些情况下,这些指示符可以用于“欺骗”传统节点以某些方式表现,以允许执行下一代协议而不受这些传统节点的干扰。 虽然这种做法可能会增加通信效率,但是欺骗可能导致传统节点的低效运行。 传统节点可以检测欺骗,包括检测传输消息的传统部分中的字段设置,或检测消息中的相移。 一旦检测到欺骗,可以采取各种步骤,包括确定下一代消息的持续时间,持续持续时间内进入低功率状态,在持续时间内在备用信道上进行通信,修改遗留回退过程等。