Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

75results about "In Zigbee networks" patented technology

System and method for variable beacon timing with wireless devices

Systems and methods for supporting variable beacon timing for a first wireless device and a second wireless device are provided. An exemplary system may include a number of wireless devices configured to wirelessly communicate with one another. The system includes a beacon-transmitting wireless device and a listening wireless device. The beacon-transmitting wireless device is configured to transmit, during a first operating mode, wireless beacons separated in time by relatively long time intervals. The beacon-transmitting device is also configured to transmit, during a second operating mode, wireless beacons separated in time by relatively short time intervals. The listening wireless device is configured to listen, during the first operating mode, for wireless beacons transmitted by the beacon-transmitting wireless device, and is configured to listen, during the second operating mode, for wireless beacons transmitted by the beacon-transmitting wireless device. The system may have more than two different operating modes, which may be desirable if the number of wireless devices in the system exceeds two.
Owner:MEDTRONIC MIMIMED INC

Wake-up radio system

Systems and methods may include a master device. The master device may include a wake-up transmitter to send a wake-up message to a slave device to wake-up the slave device. The master device may also include a short-range transmitter to communicate with the slave device once the slave device has been woken up. The master device may be a mobile phone that communicates with the slave device (e.g., Bluetooth accessory devices) over a Bluetooth network.
Owner:SONY CORP

Techniques to support multiple radio-access technologies

Techniques to permit scheduling of mixed radio access technologies. In some cases, a first radio access technology mode of a base station is scheduled during a first time region and a second radio access technology mode of a base station is scheduled during a sleep mode of the first radio access technology mode. In some cases, a first radio access technology mode of a base station is scheduled during a first time region and a second radio access technology mode of a base station is scheduled during an unused portion of the first time region. In some cases, a femto-base station is scheduled to snoop for local mobile stations during a sleep mode. Inactive regions of mobile stations are scheduled during a portion of sleep modes of the radio access technology modes.
Owner:APPLE INC

System and Method for an Energy Efficient Network Adaptor with Security Provisions

In accordance with an embodiment, a network device includes a network controller and at least one network interface coupled to the network controller that includes at least one media access control (MAC) device configured to be coupled to at least one physical layer interface (PHY). The network controller may be configured to determine a network path comprising the at least one network interface that has a lowest power consumption and minimum security attributes of available media types coupled to the at least one PHY.
Owner:STMICROELECTRONICS SRL

Low power zigbee device and low power wake-up method

Provided is a low-power ZigBee device provided with a sleeping mode and an active mode including a power supplying unit for supplying a power; a Medium Access Control (MAC) processing unit for receiving a wake-up packet and for controlling a modem unit and an Radio Frequency (RF) unit; and a Central Processing Unit (CPU) for receiving and processing a data packet, wherein the MAC processing unit makes the power supplying unit apply a power to the CPU based on a result of checking an identification (ID) of the wake-up packet.
Owner:SOLUM CO LTD

Mobile terminal and method of controlling external device using the same

A mobile terminal including a short-range communication module configured to provide short-range wireless communication; a touch screen; and a controller configured to deactivate the touch screen and enter the mobile terminal into a lock state, detect the mobile terminal is tilted more than a predetermined slope, receive a first touch input on the deactivated touch screen, and control the short-range communication module to transmit a first IR signal to an external device for controlling the external device when the first touch input matches a predetermined password for unlocking the mobile terminal into an unlocked state.
Owner:LG ELECTRONICS INC

Secure pki communications for "machine-to-machine" modules, including key derivation by modules and authenticating public keys

Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module can include a sensor and / or actuator. The module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The module can internally derive pairs of private / public keys using cryptographic algorithms and a set of parameters. A server can use a shared secret key to authenticate the submission of derived public keys with an associated module identity. For the very first submission of a public key derived the module, the shared secret key can comprise a pre-shared secret key which can be loaded into the module using a pre-shared secret key code.
Owner:NETWORK 1 TECH +1

Method of power management for a handheld mobile computing and communiation device

A power management method for a handheld mobile computing and communication device for a normal and an emergency occasion is disclosed. The device, for example, is useful for a trapped person under a mound of debris created by a fallen building during an earthquake or a terrorist attack. The invention is based upon a conventional mobile communication device with a second communication unit and a sensory unit. The second communication unit is based upon a short-range and ad hoc communication network. The invention is characterized by that a power management unit is used to monitor the remaining power of a battery system for the mobile device. If the power is below a preset threshold, the main function of the mobile device as a mobile phone is switched off and the reserved power is used to supply power for the second communication unit, which consumes much less power, in particularly, in a mode as a receiver only. An authorized signal, delivered by a nearby mobile rescue station and received by the second communication unit, will trigger the power management unit to provide additional power to activate the sensory unit. The sensory unit such as an accelerometer and / or a gyroscope may detect a signal if the person touches and / or moves the device after receiving a triggering signal. Yet additional power is further supplied to send collected data through the second communication unit to the rescue station.
Owner:PAN YANG

Wireless active monitor system for containers and carts

Wireless active monitor system for containers / carts that hold item(s). Includes a container mount, and sensor for example to weigh the item(s), and a wireless transmitter / transceiver to transmit sensor data from the sensor to a database for remote access. The sensor may be protected via shock pads to prevent damage to the sensor if the container is dropped. The system may be implemented with a printed circuit board having a central processing unit and memory that holds program code to execute on the central processing unit, for example to transmit sensor data via the wireless transmitter. May utilize a unique identifier associated with each container, and / or vehicle utilized to interface with the container. Enables rapid determination of the physical characteristics associated with items in the container without requiring physical contact with the container. For example, allows the weight of garbage containers to be determined remotely.
Owner:LERNER IAN

Communication system and IoT system

A communication system and an IoT system are provided. The IoT system is applicable to a wireless network system including an access point. The IoT system includes a WiFi module and a GPIO device. The WiFi module is configured to connect to the access point. The GPIO device is configured to provide a plurality of wake-up signals to the WiFi module through a GPIO pin. A predetermined time period between any two of wake-up signals is greater than an interval between two delivery traffic indication messages from the access point. The WiFi module includes a timer and a power management unit, the power management unit drains power to transfer the WiFi module from a sleep mode to a normal mode after the timer receives the wake-up signal.
Owner:DIALOG SEMICON KOREA INC

ZigBee, Thread And BLE Co-Existence With 2.4 GHz WIFI

A system and method of minimizing interference and retries in an environment where two or more network protocols utilize the same frequency spectrum is disclosed. A lower-power network controller is co-located with a WIFI controller. The lower-power network controller parses incoming packets as they are received and generates a request signal once it is determined that the incoming packet is destined for this device. This maximizes the likelihood that no WIFI traffic will occur while the incoming packet is being received.
Owner:SILICON LAB INC

Cooperative network for mobile internet access

A method and system for connecting mobile users to the Internet using cooperative interconnection. A node consists of a network element that has two connections methodologies—typically a node will have a radio link and a wired link to the Internet. To obtain a connection, a member of the service located themselves in proximity to a network node which is commonly provided by another member and the cooperative tunneling agent requests a secure link. All members of the service agree to give connection to the Internet upon request from another member.
Owner:TRUPHONE

User terminal for controlling display device and control method thereof

A user terminal for controlling a display device and a control method thereof are provided. The user terminal includes a communicator configured to communicate with the display device, a main controller configured to control the user terminal, and a sub-controller configured to control the user terminal while the user terminal is in a sleep mode, wherein the sub-controller is configured to change a mode of the user terminal from the sleep mode to a standby mode in response to the communicator receiving environmental change detection information or user detection information from the display device while the user terminal is in the sleep mode.
Owner:SAMSUNG ELECTRONICS CO LTD

Soft-wired radio (SWR) web machine

A domain-specific hardwired symbolic communications machine is described that processes information via the hardwired mapping of symbols from one or more domains onto other such domains, computing and communicating with improved security and reduced power consumption because it has no CPU, no Random Access Memory (RAM), no instruction registers, no Instruction Set Architecture (ISA), no operating system (OS) and no applications programming. The machine provides web services by recognizing valid requests based on the processing of symbols and the validating of those symbols according to various domains. In some embodiments the requests may conform or be related to, for example, Long Term Evolution (LTE), Hypertext Transfer Protocol (HTTP), or fourth generation (4G) wireless technology. Further, in some embodiments, the machine has no unconstrained RAM into which malware may insert itself and needs no anti-virus software.
Owner:HACKPROOF TECH

Wireless communication methods

Various wireless communication methods are provided for controlling two or more wireless devices. In one embodiment, various processes optimize the wireless communication, especially when multiple devices are present in a system or a network. In another embodiment, various controlling devices are accommodated in a network of devices at different points in time. The speed at which the new controlling device comes into a range of the networked devices is improved with existing signatures of different wireless protocols or devices present in the network. In another embodiment, a change in the signal strength of a wireless device can be used to detect an object or person, such as an intruder.
Owner:ILUMI SOLUTIONS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products