Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

1540 results about "IEEE 802" patented technology

IEEE 802 is a family of IEEE standards dealing with local area networks and metropolitan area networks. The IEEE 802 standards are restricted to networks carrying variable-size packets, unlike cell relay networks, for example, where data is transmitted in short, uniformly sized units called cells. Isochronous networks, where data is transmitted as a steady stream of octets, or groups of octets, at regular time intervals, are also beyond the scope of the IEEE 802 standards.

Wireless mesh point portable data terminal

A portable data terminal (PDT) adapted to participate in a wireless mesh network including a plurality of peer PDTs can comprise: a PDT module including an encoded information reading (EIR) device, and a mesh point (MP) module communicatively coupled to the PDT module. The MP module can include a microcontroller and at least one wireless communication interface and can be configured to perform IEEE 802.11-conformant wireless station services including authentication, de-authentication, privacy, and MAC service data unit delivery, and IEEE 802.11-conformant wireless distribution system services including association, disassociation, distribution, integration, and re-association. The MP module can be further configured, responsive to receiving a MAC frame addressed to a recipient inside the wireless mesh network, to deliver the MAC frame using the distribution service. The MP module can be further configured, responsive to receiving a MAC frame addressed to a recipient outside of the wireless mesh network, to deliver the MAC frame using the integration service. The MP module can be further configured to route an incoming MAC frame according to its destination address and the frame control field. The MP module can be further configured to cause the PDT module to exit said sleeping state responsive to receiving a mobile management software (MMS) wake-up command.
Owner:HAND HELD PRODS

Apparatus for and method of coordinating transmission and reception opportunities in a communications device incorporating multiple radios

A novel and useful apparatus for and method of coordinating the allocation of transmission and reception availability and / or unavailability periods for use in a communications device incorporating collocated multiple radios. The mechanism provide both centralized and distributed coordination to enable the coordination (e.g., to achieve coexistence) of multiple radio access communication devices (RACDs) collocated in a single device such as a mobile station. A distributed activity coordinator modifies the activity pattern of multiple RACDs. The activity pattern comprises a set of radio access specific modes of operation, (e.g., IEEE 802.16 Normal, Sleep, Scan or Idle modes, 3GPP GSM / EDGE operation mode (PTM, IDLE, Connected, DTM modes), etc.) and a compatible set of wake-up events, such as reception and transmission availability periods. To prevent interference and possible loss of data, a radio access is prevented from transmitting or receiving data packets while another radio access is transmitting or receiving. In the event two or more RATs desire to be active at the same time, the mechanism negotiates an availability pattern between the MS and a corresponding BS to achieve coordination between the RATs.
Owner:COMSYS COMM & SIGNAL PROC

RFID device, system and method of operation including a hybrid backscatter-based RFID tag protocol compatible with RFID, bluetooth and/or IEEE 802.11x infrastructure

An RFID system includes a hybrid backscatter-based RFID tag protocol-compatible with existing 802.11x / Bluetooth Standards as well as RFID standards. The tag is linked to a multi-protocol Interrogator via a generated RF Continuous Wave (CW) field. The tag includes an antenna coupled to an RFID and a Bluetooth / 802.11x transceiver section. A Protocol Processor services RFID and transceiver sections and is coupled to the antenna via a backscatter switch. The Interrogator can switch the tag to an RFID backscatter radiation mode where the processor switches the antenna impedance to reflect the CW signal. For transceiver operation the processor switches antenna impedance in synchronization with a frame organized bit stream. For reception, the RFID section utilizes demodulation techniques, typically Amplitude Shift Keying (ASK), and provides a wake up mode within a predetermined distance of the Interrogator. The transceiver may operate in a backscatter or regular mode as directed by an Access Point.
Owner:GOOGLE TECH HLDG LLC

Method and apparatus for providing guaranteed quality/class of service within and across networks using existing reservation protocols and frame formats

A method and apparatus provide reserved bandwidth and QOS/COS virtual circuit connections in a network using both conventional and novel reservation protocols and frame formats. An apparatus according to the invention includes an enterprise control point that communicates with switches via a reserved signaling channel. The switches have been upgraded or replaced to include enhanced functionality. The enhanced switches detect packets that include requests for reserved connections according to existing reservation protocols such as RSVP and IEEE 802.1P/Q. Such detected packets are forwarded to the enterprise control point for processing via a reserved signaling channel. The enterprise control point identifies a path within the network that can satisfy the requested QOS/COS and reserves the requested resources all along the path from beginning to end. A method according to the invention includes detecting packets that include requests for reserved connections according to existing reservation protocols such as RSVP and IEEE 802.1P/Q, forwarding detected packets to an enterprise control point for processing via a reserved signaling channel, identifying a path within the network that can satisfy the requested QOS/COS and reserving the requested resources all along the path from beginning to end.
Owner:WARPSPEED COMM

System and method for securing mesh access points in a wireless mesh network, including rapid roaming

An authentication method in a mesh AP including using standard IEEE 802.11i mechanisms between the mesh AP and an authenticator for authenticating the mesh AP to become a child mesh AP with a secure layer-2 link to a first parent mesh AP that has a secure tunnel to a Controller, including, after a layer-2 link between the child mesh AP and the first parent mesh AP is secured, undergoing a join exchange for form a secure tunnel between the child mesh AP and the Controller. Further, a fast roaming method for re-establishing a secure layer-2 link with a new parent mesh AP including, while the mesh AP is a child mesh AP to the first parent mesh AP and has a secure layer-2 link to the first parent mesh AP, caching key information and wireless mesh network identity information, and using the cached information to establish a secure layer-2 link with a new parent mesh AP without having to undergo a 4-way authentication. Further, while the mesh AP is a child mesh AP to the first parent mesh AP, has a secure layer-2 link to the first parent mesh AP, and has a secure tunnel to the Controller, caching session information on the secure tunnel, and using the cached information to re-establish the secure tunnel with the Controller, the secure tunnel now via the new mesh AP.
Owner:CISCO TECH INC

Methods and systems for a wireless routing architecture and protocol

The present invention provides a method for generating routing paths in a multi-hop network. The multi-hop network includes a base station, at least one relay station, and at least one non-relay mobile station. The routing paths are paths between the base station and the at least one non-relay mobile station via the at least one relay station. The base station broadcasts a path discovery message (PDM) including a path list with a starting point of the path list being the base station. Each of the relay stations receives the PDM and updates the PDM by adding their own respective node identifier to the path list and broadcasting the updated PDM. The PDMs eventually reach the non-relay mobile station. The non-relay mobile stations reply to the base station by sending the base station the updated path list between the base station and the non-relay mobile station. In some embodiments the base station or the at least one non-relay mobile station acting as a source node sends a dynamic service (DSx) message including an end-to-end path list to an end of path destination. The relay stations use the path list to forward the message between the source node and the end of path destination. In some implementations the multi-hop network operates in a manner that is consistent with any one of: IEEE 802.16, IEEE 802.16d, and IEEE 802.16e.
Owner:APPLE INC

Method and system to daisy-chain access to video resources

A method and system to control at least one video resource daisy-chain access system. A first embodiment is a method to operate a video resource daisy-chain access system. The method includes requesting from a coordinator access instructions to receive a broadcast stream from a broadcast source; connecting to the broadcast source, or one of the re-broadcasting clients already receiving the broadcast stream, as instructed by the coordinator; optionally registering with the coordinator as a potential re-broadcasting source for new clients; optionally accepting connection requests from new clients for re-broadcasting of the received broadcast stream; and playing back on the client the received broadcast stream. A second embodiment is a video resource daisy-chain access system. The system includes a coordinator; a broadcasting source having a communication link with the coordinator; a first client having a communication link with the coordinator and a communication link with the broadcasting source; and a second client having a communication link with the coordinator and a communication link with the first client. These embodiments can be applied in several wired and wireless communication applications, even combinations of wired and wireless technologies including, but not limited to, IEEE 802.16 wireless applications, and equivalent technologies.
Owner:CLYP ENGINES PTE LTD

Broadband network with enterprise wireless communication method for residential and business environment

The present invention sets forth a network-centric service distribution architecture and method that integrates a wireless access system/service in the residence, SOHO, business or public environment through the use of a local broadband network, such as a Residential-Business Broadband Network (RBN), to the service provider's broadband transport network and to a service provider's broadband packet network that facilitates end-to-end packet telecommunication services. Access functions for connecting said service provider's broadband packet network to the RBN via said service provider's broadband transport network are provided. Call and service termination functions to a plurality of local RBN devices are also provided. Signals from a plurality of wireless devices are accepted and forwarded to an IEEE 802.11b interface for a wireless modem and/or to an Ethernet interface for a Voice over Internet Protocol (VOIP)/Ethernet Processor, where the forwarded signals comprise intranet telephony and data. Voice signals are also accepted from a plurality of tip/ring interfaces and forwarded to a broadband transport interface for back haul of data and voice packets. A service provider can deploy services in an integrated voice, data and multimedia environment cost-effectively based on one broadband packet network.
Owner:AMERICAN TELEPHONE & TELEGRAPH CO

System and method for communicating with a vehicle

A system for communicating with a vehicle includes a control module equipped with a remote keyless entry (RKE) receiver and configured to control vehicle functions in response to a RKE signal. The system includes a fob equipped with a RKE transmitter and a short range transceiver, such as BLUETOOTH™, IEEE 802.11, or near field communication (NFC). The fob transmits a RKE signal in response to receiving a message from a consumer device, such as a cellular phone, smart phone, tablet computer, or personal computer equipped with a short range transceiver, enabling the user to control the vehicle from the consumer device. The system may be configured to transmit vehicle status information to the consumer device. The control module may include a third short range transceiver that communicates with the consumer device when the distance is between the vehicle and the consumer device is less than the distance threshold.
Owner:SAMSUNG ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products