会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Automated configuration of RF WLANs via selected sensors
    • 通过选择的传感器自动配置RF WLAN
    • US07567822B2
    • 2009-07-28
    • US11247123
    • 2005-10-11
    • Brian Donald HartTimothy S. OlsonJames AmosDavid McClead TheoboldBretton Lee Douglas
    • Brian Donald HartTimothy S. OlsonJames AmosDavid McClead TheoboldBretton Lee Douglas
    • H04M1/00H04W24/00H04W4/00
    • H04W16/18H04B17/318H04B17/3913H04W16/10H04W64/003H04W88/08
    • In a wireless LAN (WLAN), methods, apparatuses and systems directed to facilitating configuration of a wireless network is provided. According to one implementation of the present invention, sensors are used to collect data associated with locations and other properties of access points of the wireless network. The collected data can then be used to assist in automatically configuring one or more aspects of the wireless network. In some implementations, the collected data can be used to dynamically re-configure the wireless network in real time. According to another implementation of the present invention, location computation mechanisms are used to collect data associated with the location of one or more wireless clients, and the data is used to dynamically adjust one or more radio frequency (RF) coverage maps in real time. The revised RF coverage maps can then be used to re-configure one or more operational parameters of the wireless network. Implementations of the present invention provide many advantages, such as automating the configuration of the wireless network in real time and facilitating network management decisions.
    • 在无线LAN(WLAN)中,提供了有助于无线网络的配置的方法,装置和系统。 根据本发明的一个实施方式,传感器用于收集与无线网络的接入点的位置和其他属性相关联的数据。 收集的数据然后可用于帮助自动配置无线网络的一个或多个方面。 在一些实现中,所收集的数据可以用于实时动态地重新配置无线网络。 根据本发明的另一实施方式,使用位置计算机制来收集与一个或多个无线客户端的位置相关联的数据,并且该数据被用于实时动态地调整一个或多个射频(RF)覆盖图。 然后可以使用经修订的RF覆盖图来重新配置无线网络的一个或多个操作参数。 本发明的实现提供了许多优点,例如实时地自动化无线网络的配置并且促进网络管理决策。
    • 6. 发明授权
    • Method, apparatus, and software product for detecting rogue access points in a wireless network
    • 用于检测无线网络中的流氓接入点的方法,装置和软件产品
    • US07916705B2
    • 2011-03-29
    • US11843088
    • 2007-08-22
    • Timothy S. OlsonDaryl A. KaiserPejman D. Roshan
    • Timothy S. OlsonDaryl A. KaiserPejman D. Roshan
    • H04W4/00H04M1/66
    • H04L63/1433H04W12/12
    • A method, an apparatus, and a software program to implement a method to detect a rogue access point of a wireless network. The method includes maintaining an AP database that includes information about managed access point (APs) and friendly APs, including the MAC address of each managed AP. The method further includes sending a scan request to one or more managed APs, including one or more of a request for the receiving managed AP to scan for beacons and probe responses and a request for the receiving managed AP to request its clients to scan for beacons and probe responses. The method further includes receiving reports from at least one of the receiving managed APs, a report including information on any beacon or probe response received that was sent by an AP. For each beacon or probe response on which information is received, the method analyzes the information received in the report about the AP that sent the beacon or probe response, the analyzing including ascertaining if the MAC address of the AP that sent the beacon or probe response matches a MAC address of an AP in the AP database to ascertain whether or not the AP is a potential rogue AP or a managed or friendly AP.
    • 一种用于实现检测无线网络的恶意接入点的方法的方法,装置和软件程序。 该方法包括维护AP数据库,该AP数据库包括有关受管接入点(AP)和友好AP的信息,包括每个被管理AP的MAC地址。 该方法还包括向一个或多个受管理的AP发送扫描请求,包括对接收被管理的AP扫描信标和探测响应的请求中的一个或多个,以及对接收被管理的AP请求其客户端扫描信标的请求 并探测反应。 所述方法还包括从所述接收管理AP中的至少一个接收报告,报告包括由AP发送的所接收的任何信标或探测响应的信息。 对于接收到哪个信息的每个信标或探测响应,该方法分析报告中收到的关于发送信标或探测响应的AP的信息,该分析包括确定发送信标或探测响应的AP的MAC地址 匹配AP数据库中的AP的MAC地址,以确定AP是否是潜在的流氓AP或被管理或友好的AP。
    • 7. 发明授权
    • Method, apparatus, and software product for detecting rogue access points in a wireless network
    • 用于检测无线网络中的流氓接入点的方法,装置和软件产品
    • US07286515B2
    • 2007-10-23
    • US10766174
    • 2004-01-28
    • Timothy S. OlsonDaryl A. KaiserPejman D. Roshan
    • Timothy S. OlsonDaryl A. KaiserPejman D. Roshan
    • H04Q7/24H04L9/00H04M1/66
    • H04L63/1433H04W12/12
    • A method, an apparatus, and a software program to implement a method to detect a rogue access point of a wireless network. The method includes maintaining an AP database that includes information about managed access point (APs) and friendly APs, including the MAC address of each managed AP. The method further includes sending a scan request to one or more managed APs, including one or more of a request for the receiving managed AP to scan for beacons and probe responses and a request for the receiving managed AP to request its clients to scan for beacons and probe responses. The method further includes receiving reports from at least one of the receiving managed APs, a report including information on any beacon or probe response received that was sent by an AP. For each beacon or probe response on which information is received, the method analyzes the information received in the report about the AP that sent the beacon or probe response, the analyzing including ascertaining if the MAC address of the AP that sent the beacon or probe response matches a MAC address of an AP in the AP database to ascertain whether or not the AP is a potential rogue AP or a managed or friendly AP.
    • 一种用于实现检测无线网络的恶意接入点的方法的方法,装置和软件程序。 该方法包括维护AP数据库,该AP数据库包括有关受管接入点(AP)和友好AP的信息,包括每个被管理AP的MAC地址。 该方法还包括向一个或多个被管理的AP发送扫描请求,包括对接收被管理的AP扫描信标和探测响应的请求中的一个或多个,以及对接收被管理的AP请求其客户端扫描信标的请求 并探测反应。 所述方法还包括从所述接收管理AP中的至少一个接收报告,报告包括由AP发送的所接收的任何信标或探测响应的信息。 对于接收到哪个信息的每个信标或探测响应,该方法分析报告中收到的关于发送信标或探测响应的AP的信息,该分析包括确定发送信标或探测响应的AP的MAC地址 匹配AP数据库中的AP的MAC地址,以确定AP是否是潜在的流氓AP或被管理或友好的AP。
    • 9. 发明授权
    • Dynamic call anchoring
    • 动态呼叫锚定
    • US08270346B2
    • 2012-09-18
    • US12106558
    • 2008-04-21
    • Timothy S. Olson
    • Timothy S. Olson
    • H04W4/02
    • H04L12/66H04W76/12H04W88/06
    • A system for dynamically anchoring a call initiated by a mobile unit can include call anchor logic programmed with anchoring criteria to determine if a new outbound call being initiated from the mobile unit should be anchored at an anchor point located outside of a service provider network for the mobile unit based on application of the anchoring criteria to input data. The call anchor logic provides an anchor control signal to cause the outbound call to be one of (i) anchored at the anchor point and (ii) connected to a called party without anchoring at the anchor point. Memory that stores the input data, the memory being accessible by the call anchor logic.
    • 用于动态锚定由移动单元发起的呼叫的系统可以包括以锚定准则编程的呼叫锚定逻辑,以确定是否应当将来自移动单元的新的呼出呼叫锚定在位于服务提供商网络外部的锚点处,以便为 移动单元根据应用锚定标准输入数据。 呼叫锚定逻辑提供锚控制信号,以使出站呼叫成为(i)锚定在锚点处的一个,(ii)连接到被叫方而不锚定在锚点处。 存储输入数据的存储器,存储器可由调用锚逻辑访问。