会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • IDENTITY-BASED NETWORKING
    • 基于身份的网络
    • US20090257437A1
    • 2009-10-15
    • US12489295
    • 2009-06-22
    • Manish Tiwari
    • Manish Tiwari
    • H04L12/56
    • H04L12/4641
    • A technique for identity based networking is disclosed. A system according to the technique can include a WAN, a first VLAN, a second VLAN, and a network database. The first VLAN and second VLAN can be coupled to the WAN. The network database can include VLAN information. In operation, a client that is authorized on the second VLAN can attempt to connect to the first VLAN. A switch in the WAN can perform a lookup in the network database and determine that the client is authorized on the second VLAN. Based on this information, the client can be connected to the second VLAN using VLAN tunneling.
    • 公开了一种基于身份的联网技术。 根据该技术的系统可以包括WAN,第一VLAN,第二VLAN和网络数据库。 第一个VLAN和第二个VLAN可以连接到WAN。 网络数据库可以包括VLAN信息。 在运行中,在第二个VLAN上授权的客户端可以尝试连接到第一个VLAN。 WAN中的交换机可以在网络数据库中执行查找,并确定客户端在第二个VLAN上被授权。 基于此信息,客户端可以使用VLAN隧道连接到第二个VLAN。
    • 3. 发明授权
    • System and network for wireless network monitoring
    • 用于无线网络监控的系统和网络
    • US08514827B2
    • 2013-08-20
    • US13396124
    • 2012-02-14
    • Sudheer Poorna Chandra MattaManish Tiwari
    • Sudheer Poorna Chandra MattaManish Tiwari
    • H04W4/00
    • H04W48/12H04W24/10
    • A technique for wireless network monitoring involves scanning channels using clients instead of access points. An example of a method according to the technique may include, for example, receiving from a wireless access point a command to perform a channel scanning function, listening on a channel associated with the channel scanning function, and sending RF data found on the channel to the wireless access point. Another example of a method according to the technique may include, for example, scanning a first channel, switching from the first channel to a second channel, sending data on the second channel to an access point, switching from the second channel to the first channel, and resuming scanning on the first channel. A system according to the technique may include one or more scanning clients, proxy clients, multi-channel clients, or other clients that are capable of scanning channels in lieu of an access point.
    • 无线网络监控的技术涉及使用客户端而不是接入点扫描信道。 根据该技术的方法的示例可以包括例如从无线接入点接收执行频道扫描功能的命令,在与频道扫描功能相关联的频道上收听,以及发送在频道上发现的RF数据到 无线接入点。 根据该技术的方法的另一示例可以包括例如扫描第一信道,从第一信道切换到第二信道,将第二信道上的数据发送到接入点,从第二信道切换到第一信道 并且在第一通道上恢复扫描。 根据该技术的系统可以包括一个或多个扫描客户端,代理客户端,多信道客户端或能够扫描通道以代替接入点的其他客户端。
    • 4. 发明申请
    • SYSTEM AND NETWORK FOR WIRELESS NETWORK MONITORING
    • 用于无线网络监控的系统和网络
    • US20120140705A1
    • 2012-06-07
    • US13396124
    • 2012-02-14
    • Sudheer Poorna Chandra MattaManish Tiwari
    • Sudheer Poorna Chandra MattaManish Tiwari
    • H04W72/04H04B7/14
    • H04W48/12H04W24/10
    • A technique for wireless network monitoring involves scanning channels using clients instead of access points. An example of a method according to the technique may include, for example, receiving from a wireless access point a command to perform a channel scanning function, listening on a channel associated with the channel scanning function, and sending RF data found on the channel to the wireless access point. Another example of a method according to the technique may include, for example, scanning a first channel, switching from the first channel to a second channel, sending data on the second channel to an access point, switching from the second channel to the first channel, and resuming scanning on the first channel. A system according to the technique may include one or more scanning clients, proxy clients, multi-channel clients, or other clients that are capable of scanning channels in lieu of an access point.
    • 无线网络监控的技术涉及使用客户端而不是接入点扫描信道。 根据该技术的方法的示例可以包括例如从无线接入点接收执行频道扫描功能的命令,在与频道扫描功能相关联的频道上收听,以及发送在频道上发现的RF数据到 无线接入点。 根据该技术的方法的另一示例可以包括例如扫描第一信道,从第一信道切换到第二信道,将第二信道上的数据发送到接入点,从第二信道切换到第一信道 并且在第一通道上恢复扫描。 根据该技术的系统可以包括一个或多个扫描客户端,代理客户端,多信道客户端或能够扫描通道以代替接入点的其他客户端。
    • 5. 发明授权
    • System and network for wireless network monitoring
    • 用于无线网络监控的系统和网络
    • US08116275B2
    • 2012-02-14
    • US12785362
    • 2010-05-21
    • Sudheer Poorna Chandra MattaManish Tiwari
    • Sudheer Poorna Chandra MattaManish Tiwari
    • H04W4/00
    • H04W48/12H04W24/10
    • A technique for wireless network monitoring involves scanning channels using clients instead of access points. An example of a method according to the technique may include, for example, receiving from a wireless access point a command to perform a channel scanning function, listening on a channel associated with the channel scanning function, and sending RF data found on the channel to the wireless access point. Another example of a method according to the technique may include, for example, scanning a first channel, switching from the first channel to a second channel, sending data on the second channel to an access point, switching from the second channel to the first channel, and resuming scanning on the first channel. A system according to the technique may include one or more scanning clients, proxy clients, multi-channel clients, or other clients that are capable of scanning channels in lieu of an access point.
    • 无线网络监控的技术涉及使用客户端而不是接入点扫描信道。 根据该技术的方法的示例可以包括例如从无线接入点接收执行频道扫描功能的命令,在与频道扫描功能相关联的频道上收听,以及发送在频道上发现的RF数据到 无线接入点。 根据该技术的方法的另一示例可以包括例如扫描第一信道,从第一信道切换到第二信道,将第二信道上的数据发送到接入点,从第二信道切换到第一信道 并且在第一通道上恢复扫描。 根据该技术的系统可以包括一个或多个扫描客户端,代理客户端,多信道客户端或能够扫描通道以代替接入点的其他客户端。
    • 7. 发明授权
    • System and method for network integrity
    • 网络完整性的系统和方法
    • US08638762B2
    • 2014-01-28
    • US11351104
    • 2006-02-08
    • Manish Tiwari
    • Manish Tiwari
    • H04W4/00
    • H04W12/12H04L63/101H04L63/1416
    • A technique for maintaining network integrity is disclosed. A system according to the technique may include a wired network, a switch, and a wireless access point. The switch can be coupled to the wired network and the wireless access point can be coupled to the switch. The system may further include a forwarding database that stores a mac address for a plurality of devices seen by the switch on the wired network. A method according to the technique may involve detecting identifying information of a device by a wireless access point. The identifying information can be compared with the mac addresses in a forwarding database. If the device is unknown, the unknown device can be classified as rogue and countermeasures can be taken against the rogue device.
    • 公开了一种维护网络完整性的技术。 根据该技术的系统可以包括有线网络,交换机和无线接入点。 交换机可以耦合到有线网络,并且无线接入点可以耦合到交换机。 系统还可以包括转发数据库,​​其存储由有线网络上的交换机看到的多个设备的mac地址。 根据该技术的方法可以涉及通过无线接入点检测设备的识别信息。 识别信息可以与转发数据库中的mac地址进行比较。 如果设备未知,则可以将未知设备分类为流氓,并且可以针对流氓设备采取对策。
    • 9. 发明申请
    • SYSTEM AND NETWORK FOR WIRELESS NETWORK MONITORING
    • 用于无线网络监控的系统和网络
    • US20110128858A1
    • 2011-06-02
    • US12785362
    • 2010-05-21
    • Sudheer Poorna Chandra MattaManish Tiwari
    • Sudheer Poorna Chandra MattaManish Tiwari
    • H04L12/26H04W72/04
    • H04W48/12H04W24/10
    • A technique for wireless network monitoring involves scanning channels using clients instead of access points. An example of a method according to the technique may include, for example, receiving from a wireless access point a command to perform a channel scanning function, listening on a channel associated with the channel scanning function, and sending RF data found on the channel to the wireless access point. Another example of a method according to the technique may include, for example, scanning a first channel, switching from the first channel to a second channel, sending data on the second channel to an access point, switching from the second channel to the first channel, and resuming scanning on the first channel. A system according to the technique may include one or more scanning clients, proxy clients, multi-channel clients, or other clients that are capable of scanning channels in lieu of an access point.
    • 无线网络监控的技术涉及使用客户端而不是接入点扫描信道。 根据该技术的方法的示例可以包括例如从无线接入点接收执行频道扫描功能的命令,在与频道扫描功能相关联的频道上收听,以及发送在频道上发现的RF数据到 无线接入点。 根据该技术的方法的另一示例可以包括例如扫描第一信道,从第一信道切换到第二信道,将第二信道上的数据发送到接入点,从第二信道切换到第一信道 并且在第一通道上恢复扫描。 根据该技术的系统可以包括一个或多个扫描客户端,代理客户端,多信道客户端或能够扫描通道以代替接入点的其他客户端。
    • 10. 发明申请
    • System and method for network integrity
    • 网络完整性的系统和方法
    • US20070183375A1
    • 2007-08-09
    • US11351104
    • 2006-02-08
    • Manish Tiwari
    • Manish Tiwari
    • H04Q7/24
    • H04W12/12H04L63/101H04L63/1416
    • A technique for maintaining network integrity is disclosed. A system according to the technique may include a wired network, a switch, and a wireless access point. The switch can be coupled to the wired network and the wireless access point can be coupled to the switch. The system may further include a forwarding database that stores a mac address for a plurality of devices seen by the switch on the wired network. A method according to the technique may involve detecting identifying information of a device by a wireless access point. The identifying information can be compared with the mac addresses in a forwarding database. If the device is unknown, the unknown device can be classified as rogue and countermeasures can be taken against the rogue device.
    • 公开了一种维护网络完整性的技术。 根据该技术的系统可以包括有线网络,交换机和无线接入点。 交换机可以耦合到有线网络,并且无线接入点可以耦合到交换机。 系统还可以包括转发数据库,​​其存储由有线网络上的交换机看到的多个设备的mac地址。 根据该技术的方法可以涉及通过无线接入点检测设备的识别信息。 识别信息可以与转发数据库中的mac地址进行比较。 如果设备未知,则可以将未知设备分类为流氓,并且可以针对流氓设备采取对策。