会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Dynamic call anchoring
    • 动态呼叫锚定
    • US08270346B2
    • 2012-09-18
    • US12106558
    • 2008-04-21
    • Timothy S. Olson
    • Timothy S. Olson
    • H04W4/02
    • H04L12/66H04W76/12H04W88/06
    • A system for dynamically anchoring a call initiated by a mobile unit can include call anchor logic programmed with anchoring criteria to determine if a new outbound call being initiated from the mobile unit should be anchored at an anchor point located outside of a service provider network for the mobile unit based on application of the anchoring criteria to input data. The call anchor logic provides an anchor control signal to cause the outbound call to be one of (i) anchored at the anchor point and (ii) connected to a called party without anchoring at the anchor point. Memory that stores the input data, the memory being accessible by the call anchor logic.
    • 用于动态锚定由移动单元发起的呼叫的系统可以包括以锚定准则编程的呼叫锚定逻辑,以确定是否应当将来自移动单元的新的呼出呼叫锚定在位于服务提供商网络外部的锚点处,以便为 移动单元根据应用锚定标准输入数据。 呼叫锚定逻辑提供锚控制信号,以使出站呼叫成为(i)锚定在锚点处的一个,(ii)连接到被叫方而不锚定在锚点处。 存储输入数据的存储器,存储器可由调用锚逻辑访问。
    • 2. 发明授权
    • Method, apparatus, and software product for detecting rogue access points in a wireless network
    • 用于检测无线网络中的流氓接入点的方法,装置和软件产品
    • US07916705B2
    • 2011-03-29
    • US11843088
    • 2007-08-22
    • Timothy S. OlsonDaryl A. KaiserPejman D. Roshan
    • Timothy S. OlsonDaryl A. KaiserPejman D. Roshan
    • H04W4/00H04M1/66
    • H04L63/1433H04W12/12
    • A method, an apparatus, and a software program to implement a method to detect a rogue access point of a wireless network. The method includes maintaining an AP database that includes information about managed access point (APs) and friendly APs, including the MAC address of each managed AP. The method further includes sending a scan request to one or more managed APs, including one or more of a request for the receiving managed AP to scan for beacons and probe responses and a request for the receiving managed AP to request its clients to scan for beacons and probe responses. The method further includes receiving reports from at least one of the receiving managed APs, a report including information on any beacon or probe response received that was sent by an AP. For each beacon or probe response on which information is received, the method analyzes the information received in the report about the AP that sent the beacon or probe response, the analyzing including ascertaining if the MAC address of the AP that sent the beacon or probe response matches a MAC address of an AP in the AP database to ascertain whether or not the AP is a potential rogue AP or a managed or friendly AP.
    • 一种用于实现检测无线网络的恶意接入点的方法的方法,装置和软件程序。 该方法包括维护AP数据库,该AP数据库包括有关受管接入点(AP)和友好AP的信息,包括每个被管理AP的MAC地址。 该方法还包括向一个或多个受管理的AP发送扫描请求,包括对接收被管理的AP扫描信标和探测响应的请求中的一个或多个,以及对接收被管理的AP请求其客户端扫描信标的请求 并探测反应。 所述方法还包括从所述接收管理AP中的至少一个接收报告,报告包括由AP发送的所接收的任何信标或探测响应的信息。 对于接收到哪个信息的每个信标或探测响应,该方法分析报告中收到的关于发送信标或探测响应的AP的信息,该分析包括确定发送信标或探测响应的AP的MAC地址 匹配AP数据库中的AP的MAC地址,以确定AP是否是潜在的流氓AP或被管理或友好的AP。
    • 3. 发明授权
    • Method, apparatus, and software product for detecting rogue access points in a wireless network
    • 用于检测无线网络中的流氓接入点的方法,装置和软件产品
    • US07286515B2
    • 2007-10-23
    • US10766174
    • 2004-01-28
    • Timothy S. OlsonDaryl A. KaiserPejman D. Roshan
    • Timothy S. OlsonDaryl A. KaiserPejman D. Roshan
    • H04Q7/24H04L9/00H04M1/66
    • H04L63/1433H04W12/12
    • A method, an apparatus, and a software program to implement a method to detect a rogue access point of a wireless network. The method includes maintaining an AP database that includes information about managed access point (APs) and friendly APs, including the MAC address of each managed AP. The method further includes sending a scan request to one or more managed APs, including one or more of a request for the receiving managed AP to scan for beacons and probe responses and a request for the receiving managed AP to request its clients to scan for beacons and probe responses. The method further includes receiving reports from at least one of the receiving managed APs, a report including information on any beacon or probe response received that was sent by an AP. For each beacon or probe response on which information is received, the method analyzes the information received in the report about the AP that sent the beacon or probe response, the analyzing including ascertaining if the MAC address of the AP that sent the beacon or probe response matches a MAC address of an AP in the AP database to ascertain whether or not the AP is a potential rogue AP or a managed or friendly AP.
    • 一种用于实现检测无线网络的恶意接入点的方法的方法,装置和软件程序。 该方法包括维护AP数据库,该AP数据库包括有关受管接入点(AP)和友好AP的信息,包括每个被管理AP的MAC地址。 该方法还包括向一个或多个被管理的AP发送扫描请求,包括对接收被管理的AP扫描信标和探测响应的请求中的一个或多个,以及对接收被管理的AP请求其客户端扫描信标的请求 并探测反应。 所述方法还包括从所述接收管理AP中的至少一个接收报告,报告包括由AP发送的所接收的任何信标或探测响应的信息。 对于接收到哪个信息的每个信标或探测响应,该方法分析报告中收到的关于发送信标或探测响应的AP的信息,该分析包括确定发送信标或探测响应的AP的MAC地址 匹配AP数据库中的AP的MAC地址,以确定AP是否是潜在的流氓AP或被管理或友好的AP。
    • 4. 发明授权
    • Dynamic call anchoring
    • 动态呼叫锚定
    • US08619681B2
    • 2013-12-31
    • US13585407
    • 2012-08-14
    • Timothy S. Olson
    • Timothy S. Olson
    • H04W4/00
    • H04L12/66H04W76/12H04W88/06
    • A non-transitory computer-readable medium can include includes instructions to perform dynamic call anchoring. The instructions can include call anchor logic programmed to determine if an outbound call leg being initiated from a mobile unit should be anchored at an anchor point based on evaluating anchoring criteria to input data. The call anchor logic can providing an anchor control signal to cause the outbound call leg to be one of (i) anchored at the anchor point or (ii) connected to a called party without anchoring at the anchor point. The anchor point can correspond to a node in an associated private network where the outbound call leg and another call leg are connected together that is outside of a service provider network for the mobile unit.
    • 非暂时计算机可读介质可以包括执行动态呼叫锚定的指令。 所述指令可以包括被编程为基于评估锚定标准以输入数据来确定从移动单元发起的出站呼叫支路是否应锚定在锚点处的呼叫锚定逻辑。 呼叫锚逻辑可以提供锚定控制信号,以使出站呼叫分支是(i)锚定在锚点处的(ii)连接到被叫方而不锚定在锚点处之一。 锚定点可以对应于相关联的专用网络中的一个节点,其中出站呼叫支路和另一个呼叫支路连接在一起,用于移动单元的服务提供商网络之外。
    • 8. 发明申请
    • CLIENT-CONTROLLED HANDOVER BETWEEN RADIO TECHNOLOGIES
    • 无线电技术之间的客户控制切换
    • US20100009674A1
    • 2010-01-14
    • US12171037
    • 2008-07-10
    • Bhawani SapkotaTimothy S. Olson
    • Bhawani SapkotaTimothy S. Olson
    • H04Q7/22
    • H04W36/0022H04L65/1006H04L65/1093H04L65/1096H04W36/14H04W36/36
    • In one embodiment a mobile client includes a first voice interface configured to communicate voice media via a first radio technology. A second voice interface is configured to communicate voice media via a second radio technology, which is different from the first radio technology. A data interface can communicate data via at least one of the first radio technology and the second radio technology. Call control is programmed to control the data interface to perform signaling from the mobile client for establishing parameters for a voice media session between the mobile client and a third party via a selected one of the first voice interface and the second voice interface The call control controls the signaling from the mobile client depending on which of the first voice interface and the second voice interface the call control determines to utilize for the voice media session.
    • 在一个实施例中,移动客户端包括被配置为经由第一无线电技术来传送语音媒体的第一语音接口。 第二语音接口被配置为经由与第一无线电技术不同的第二无线电技术来传送语音媒体。 数据接口可以通过第一无线电技术和第二无线电技术中的至少一个传送数据。 呼叫控制被编程为控制数据接口来执行来自移动客户端的信令,以通过所选择的第一语音接口和第二语音接口之一为移动客户端和第三方之间的语音媒体会话建立参数。呼叫控制控制 取决于呼叫控制确定用于语音媒体会话的第一语音接口和第二语音接口中的哪一个来自移动客户端的信令。
    • 9. 发明授权
    • Automated configuration of RF WLANs via selected sensors
    • 通过选择的传感器自动配置RF WLAN
    • US07567822B2
    • 2009-07-28
    • US11247123
    • 2005-10-11
    • Brian Donald HartTimothy S. OlsonJames AmosDavid McClead TheoboldBretton Lee Douglas
    • Brian Donald HartTimothy S. OlsonJames AmosDavid McClead TheoboldBretton Lee Douglas
    • H04M1/00H04W24/00H04W4/00
    • H04W16/18H04B17/318H04B17/3913H04W16/10H04W64/003H04W88/08
    • In a wireless LAN (WLAN), methods, apparatuses and systems directed to facilitating configuration of a wireless network is provided. According to one implementation of the present invention, sensors are used to collect data associated with locations and other properties of access points of the wireless network. The collected data can then be used to assist in automatically configuring one or more aspects of the wireless network. In some implementations, the collected data can be used to dynamically re-configure the wireless network in real time. According to another implementation of the present invention, location computation mechanisms are used to collect data associated with the location of one or more wireless clients, and the data is used to dynamically adjust one or more radio frequency (RF) coverage maps in real time. The revised RF coverage maps can then be used to re-configure one or more operational parameters of the wireless network. Implementations of the present invention provide many advantages, such as automating the configuration of the wireless network in real time and facilitating network management decisions.
    • 在无线LAN(WLAN)中,提供了有助于无线网络的配置的方法,装置和系统。 根据本发明的一个实施方式,传感器用于收集与无线网络的接入点的位置和其他属性相关联的数据。 收集的数据然后可用于帮助自动配置无线网络的一个或多个方面。 在一些实现中,所收集的数据可以用于实时动态地重新配置无线网络。 根据本发明的另一实施方式,使用位置计算机制来收集与一个或多个无线客户端的位置相关联的数据,并且该数据被用于实时动态地调整一个或多个射频(RF)覆盖图。 然后可以使用经修订的RF覆盖图来重新配置无线网络的一个或多个操作参数。 本发明的实现提供了许多优点,例如实时地自动化无线网络的配置并且促进网络管理决策。