会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 8. 发明授权
    • Dynamic call anchoring
    • 动态呼叫锚定
    • US08270346B2
    • 2012-09-18
    • US12106558
    • 2008-04-21
    • Timothy S. Olson
    • Timothy S. Olson
    • H04W4/02
    • H04L12/66H04W76/12H04W88/06
    • A system for dynamically anchoring a call initiated by a mobile unit can include call anchor logic programmed with anchoring criteria to determine if a new outbound call being initiated from the mobile unit should be anchored at an anchor point located outside of a service provider network for the mobile unit based on application of the anchoring criteria to input data. The call anchor logic provides an anchor control signal to cause the outbound call to be one of (i) anchored at the anchor point and (ii) connected to a called party without anchoring at the anchor point. Memory that stores the input data, the memory being accessible by the call anchor logic.
    • 用于动态锚定由移动单元发起的呼叫的系统可以包括以锚定准则编程的呼叫锚定逻辑,以确定是否应当将来自移动单元的新的呼出呼叫锚定在位于服务提供商网络外部的锚点处,以便为 移动单元根据应用锚定标准输入数据。 呼叫锚定逻辑提供锚控制信号,以使出站呼叫成为(i)锚定在锚点处的一个,(ii)连接到被叫方而不锚定在锚点处。 存储输入数据的存储器,存储器可由调用锚逻辑访问。
    • 9. 发明授权
    • Method, apparatus, and software product for detecting rogue access points in a wireless network
    • 用于检测无线网络中的流氓接入点的方法,装置和软件产品
    • US07916705B2
    • 2011-03-29
    • US11843088
    • 2007-08-22
    • Timothy S. OlsonDaryl A. KaiserPejman D. Roshan
    • Timothy S. OlsonDaryl A. KaiserPejman D. Roshan
    • H04W4/00H04M1/66
    • H04L63/1433H04W12/12
    • A method, an apparatus, and a software program to implement a method to detect a rogue access point of a wireless network. The method includes maintaining an AP database that includes information about managed access point (APs) and friendly APs, including the MAC address of each managed AP. The method further includes sending a scan request to one or more managed APs, including one or more of a request for the receiving managed AP to scan for beacons and probe responses and a request for the receiving managed AP to request its clients to scan for beacons and probe responses. The method further includes receiving reports from at least one of the receiving managed APs, a report including information on any beacon or probe response received that was sent by an AP. For each beacon or probe response on which information is received, the method analyzes the information received in the report about the AP that sent the beacon or probe response, the analyzing including ascertaining if the MAC address of the AP that sent the beacon or probe response matches a MAC address of an AP in the AP database to ascertain whether or not the AP is a potential rogue AP or a managed or friendly AP.
    • 一种用于实现检测无线网络的恶意接入点的方法的方法,装置和软件程序。 该方法包括维护AP数据库,该AP数据库包括有关受管接入点(AP)和友好AP的信息,包括每个被管理AP的MAC地址。 该方法还包括向一个或多个受管理的AP发送扫描请求,包括对接收被管理的AP扫描信标和探测响应的请求中的一个或多个,以及对接收被管理的AP请求其客户端扫描信标的请求 并探测反应。 所述方法还包括从所述接收管理AP中的至少一个接收报告,报告包括由AP发送的所接收的任何信标或探测响应的信息。 对于接收到哪个信息的每个信标或探测响应,该方法分析报告中收到的关于发送信标或探测响应的AP的信息,该分析包括确定发送信标或探测响应的AP的MAC地址 匹配AP数据库中的AP的MAC地址,以确定AP是否是潜在的流氓AP或被管理或友好的AP。
    • 10. 发明授权
    • Method, apparatus, and software product for detecting rogue access points in a wireless network
    • 用于检测无线网络中的流氓接入点的方法,装置和软件产品
    • US07286515B2
    • 2007-10-23
    • US10766174
    • 2004-01-28
    • Timothy S. OlsonDaryl A. KaiserPejman D. Roshan
    • Timothy S. OlsonDaryl A. KaiserPejman D. Roshan
    • H04Q7/24H04L9/00H04M1/66
    • H04L63/1433H04W12/12
    • A method, an apparatus, and a software program to implement a method to detect a rogue access point of a wireless network. The method includes maintaining an AP database that includes information about managed access point (APs) and friendly APs, including the MAC address of each managed AP. The method further includes sending a scan request to one or more managed APs, including one or more of a request for the receiving managed AP to scan for beacons and probe responses and a request for the receiving managed AP to request its clients to scan for beacons and probe responses. The method further includes receiving reports from at least one of the receiving managed APs, a report including information on any beacon or probe response received that was sent by an AP. For each beacon or probe response on which information is received, the method analyzes the information received in the report about the AP that sent the beacon or probe response, the analyzing including ascertaining if the MAC address of the AP that sent the beacon or probe response matches a MAC address of an AP in the AP database to ascertain whether or not the AP is a potential rogue AP or a managed or friendly AP.
    • 一种用于实现检测无线网络的恶意接入点的方法的方法,装置和软件程序。 该方法包括维护AP数据库,该AP数据库包括有关受管接入点(AP)和友好AP的信息,包括每个被管理AP的MAC地址。 该方法还包括向一个或多个被管理的AP发送扫描请求,包括对接收被管理的AP扫描信标和探测响应的请求中的一个或多个,以及对接收被管理的AP请求其客户端扫描信标的请求 并探测反应。 所述方法还包括从所述接收管理AP中的至少一个接收报告,报告包括由AP发送的所接收的任何信标或探测响应的信息。 对于接收到哪个信息的每个信标或探测响应,该方法分析报告中收到的关于发送信标或探测响应的AP的信息,该分析包括确定发送信标或探测响应的AP的MAC地址 匹配AP数据库中的AP的MAC地址,以确定AP是否是潜在的流氓AP或被管理或友好的AP。