会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • PLAN-ASSISTED WIRELESS ACCESS POINT CONFIGURATION
    • 计划无线接入点配置
    • US20150085745A1
    • 2015-03-26
    • US14033337
    • 2013-09-20
    • Avaya Inc.
    • Vivek L. AtreyaShashi H. AnkaiahSeemant Choudhary
    • H04W16/18H04W24/02
    • H04W16/18H04W24/02H04W24/04H04W72/0453
    • Implementations relate to configuring wireless access points in a wireless network. In some implementations, a method includes selecting, from a plurality of wireless access points in a communication network, a configuring subset of wireless access points and a different compensating subset of wireless access points. New settings are applied to the compensating subset of wireless access points to change a physical coverage of wireless communication provided by the compensating subset, thus at least partially compensating for disabled wireless communication of the configuring subset. The method disables wireless communication provided by the configuring subset, and configures the disabled configuring subset of wireless access points.
    • 实现涉及在无线网络中配置无线接入点。 在一些实现中,一种方法包括从通信网络中的多个无线接入点中选择无线接入点的配置子集和无线接入点的不同补偿子集。 新设置被应用于无线接入点的补偿子集,以改变由补偿子集提供的无线通信的物理覆盖,从而至少部分地补偿配置子集的禁用的无线通信。 该方法禁用由配置子集提供的无线通信,并配置禁用的无线接入点配置子集。
    • 2. 发明申请
    • Rogue AP Detection
    • 流氓AP检测
    • US20140334317A1
    • 2014-11-13
    • US13891184
    • 2013-05-09
    • AVAYA INC.
    • Vivek L. AtreyaRuth TsaiSeemant ChoudharyShashi Hosakere Ankaiah
    • H04L29/06H04W12/08
    • H04W12/08H04L63/14H04L63/1416H04L63/1441H04W12/12H04W48/18H04W84/12H04W88/08
    • Methods, systems and computer readable media for rogue access point detection are disclosed. In some implementations, the method can include initiating, at one or more processors of a wireless controller, a rogue access point detection process for a wireless network, and transmitting, from the one or more processors, a signature frame to a mobility agent in a wireless switch. The method can also include receiving, at an authorized access point, the signature frame transmitted via a wireless signal from a rogue access point. The method can further include reporting reception of the signature frame to the wireless controller, and generating, at the one or more processors, a signal to shut down a port associated with the rogue access point.
    • 公开了用于流氓接入点检测的方法,系统和计算机可读介质。 在一些实现中,该方法可以包括在无线控制器的一个或多个处理器处发起用于无线网络的流氓接入点检测过程,并且从一个或多个处理器将签名帧发送到移动代理 无线开关 该方法还可以包括在授权接入点处接收经由无线接入点的无线信号发送的签名帧。 该方法还可以包括向无线控制器报告签名帧的接收,以及在一个或多个处理器处生成用于关闭与流氓接入点相关联的端口的信号。