Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

103 results about "Wireless metropolitan area network" patented technology

Wireless metropolitan area network. A wireless metropolitan area network (WMAN) is a form of wireless networking that has an intended coverage area — a range — of approximately the size of a city. A WMAN spans a larger area than a wireless local area network (WLAN) but smaller than a wireless wide area network (WWAN).

Method and apparatus for transporting ethernet data packets via radio frames in a wireless metropolitan area network

Method and apparatus for transporting Ethernet data packets via radio frames in a wireless metropolitan area network. A terminal includes a data packet receiver for receiving data packets for communication over a wireless link wherein not every data packet has a same length; a data packet formatting apparatus for formatting the data packets according to radio frames wherein the radio frames each have a same length and wherein the data packets are formatted into the radio frames such that boundaries for the data packets are not necessarily aligned with boundaries for the radio frames; and a wireless transceiver for communicating the radio frames over the wireless link. The packets can be Fast Ethernet packets. The terminal does not convert the Ethernet data packets into a telephony communication protocol or into an asynchronous transfer mode (ATM) protocol prior to communication of the radio frames over the wireless link. The terminal can include a data packet synchronizer for synchronizing the data packets to a clock signal associated with the radio frames. The data packets can be time-division multiplexed into the radio frames. According to another aspect, a method of transporting Ethernet data packets via radio frames includes steps of receiving Ethernet data packets wherein each data packet includes a preamble and a start-of-frame delimiter, stripping off the preamble and start-of-frame delimiter, formatting the packet data according to radio frames, including appending a synch field to the packet data, and appending a length field to the packet data.
Owner:SAMSUNG ELECTRONICS CO LTD

Safety access method of wireless metropolitan area network

The invention relates to a secure access method for the wireless metropolitan area network which comprises an identification-authentication step and a session-key consultation step. The identification-authentication step comprises: a base station (BS) sends an activating message for access identification to a subscriber station (SS); the SS sends a request message for access identification to the BS; if the SS which sends the request message for access identification has been sent with the activating message for access identification, the BS sends a request message for certificate identification to an authentication server (AS) and then the AS sends a response message for certificate authentication to the BS which then verifies the legitimacy of the SS according to the response message for certificate authentication; if the SS is legal, an access identification response message is sent to the SS which then verifies the legitimacy of the BS according to the access identification response message; if the BS is legal, following steps are continued. The BS of the proposal of the invention only handles the request message for access identification of the SS to which an 'activating message for access identification' has been sent, thus effectively avoiding DOS attacks or DDOS attacks, realizing the identification and authentication of the SS and the BS and increasing the security.
Owner:GCI SCI & TECH

Method and apparatus for baseband transmission between a top floor unit and an outdoor unit in a terminal for a wireless metropolitan area network

A method and apparatus for baseband transmission between a top floor unit and an outdoor unit in a terminal for a wireless metropolitan area network. A terminal for a wireless link in a metropolitan area network includes an extender device (e.g. a top floor unit) for receiving data packets from a computer network coupled to the extender device and for forwarding the data packets, and a broadcast device (e.g. an outdoor unit) coupled to the extender device for receiving the data packets from the extender device according to baseband transmission and having a wireless transceiver for communicating the data packets over the wireless link. The terminal can include a cable coupled between the extender device and the broadcast device wherein the cable comprises a twisted pair of conductors for providing the data packets from the extender device to the broadcast device. The twisted pair of conductors can be a Category 5 twisted pair of conductors. Thee broadcast device can include a microwave antenna coupled to the wireless transceiver; and a housing coupled to the microwave antenna for enclosing the wireless transceiver.
Owner:SPARKMOTION

Safety access method of wireless metropolitan area network

The invention relates to a method for safe accessing of a wireless metropolitan area network, which comprises an authenticating step and a session key negotiating step. The authenticating step comprises that: a subscriber station SS sends a request message for access authentication to a base station BS; the BS sends a request message for certificate authentication to an authentication server AS; the AS verifies the request message for certificate authentication and sends a response message for certificate authentication to the BS; the BS verifies the validity of the identity of the SS according to the response message for certificate authentication; if the SS is valid, the BS sends the response message for access authentication to the SS; the SS verifies the validity of the BS according to the response message for access authentication; if the BS is valid, the SS uses the encryption certificate key of the SS to decrypt the material of authentication key. The SS signing certificate in the proposal is used for stating the identity and the SS encrypting certificate is used for encrypting and decrypting the material of authentication key so as to reduce the risk that the key is decrypted; through verifying the certificates of the BS and the SS by the AS, authentication for the subscriber station SS and the base station BS is realized and security level is improved.
Owner:GCI SCI & TECH

Authentication accessing method of wireless multi-hop network

The invention relates to an authentication access method of a wireless multi-hop network. The invention is applicable to the safety application protocol of the WAPI framework method (TePA, the access control method which is based on the triple peer-to-peer identification) during the application on the specific network which includes a wireless LAN, a wireless MAN and a wireless PAN. A terminal equipment and a coordinator have the port control ability, the terminal equipment selects the authentication and key management suit and sends the connection request to command the coordinator after the broadcast beacon frame of the coordinator, the coordinator carries out the authentication together with the terminal equipment according to the selected authentication and key management suit by the terminal equipment, the connection response command is sent to the terminal equipment after the finish of the authentication; the terminal equipment and the coordinator carries out the control to the ports according to the authentication result, so as to realize the authentication access of the wireless multi-hop network. The invention solves the technical problem of the safety hidden trouble of the prior authentication method of the wireless multi-hop network.
Owner:CHINA IWNCOMM

Apparatus and method for downlink packet scheduling in base station of a portable internet system

In a base station of an IEEE 802.16 Wireless MAN-based portable Internet system, a forward packet scheduling method and apparatus is provided. The portable Internet system portable Internet service includes a user terminal AT for providing a portable Internet service, a base station AP for supporting an inter-user terminal wireless access and network connection, and a packet access router PAR for performing a mobility control and packet routing function of each user terminal AT. The forward packet scheduler includes a packet-based subsidiary scheduling part for considering a real-time service and a user-based scheduling part for ensuring fairness and increasing system efficiency (throughput). After finishing the 2-step scheduling, the generated frame data are transmitted though a physical layer to a wireless user terminal. Therefore, with such a structure, the forward packet scheduling method may guarantee a maximum of system efficiency and fairness according to each user's QoS requirements, and may also guarantee a delay performance for a real-time service.
Owner:SAMSUNG ELECTRONICS CO LTD +4

Method for managing wireless multi-hop network key

A method for managing wireless multi-hop network key is applicable to a security application protocol when a WAPI frame method (TePA, an access control method based on the ternary peer-to-peer identification) is applied in a concrete network containing a Wireless Local Area Network, a Wireless Metropolitan Area Network AN and a Wireless Personal Area Network. The key management method of the present invention includes the steps of key generation, key distribution, key storage, key modification and key revocation. The present invention solves the technical problems that the prior pre-share-key based key management method is not suitable for larger networks and the PKI-based key management method is not suitable for wireless multi-hop networks; the public-key system and the ternary structure are adopted, thereby the security and the performance of the wireless multi-hop networks are improved.
Owner:CHINA IWNCOMM

Wireless multi-hop network key management method based on ID

The invention discloses an ID-based wireless multi-hop network key management method which is applicable to a safety application protocol when a WAPI frame method (TePA, an access control method based on the ternary peer-to-peer identification) is applied in a concrete network containing a WLAN, a WMAN and a WPAN. The key management method of the invention comprises the steps of key generation, key distribution, key storage, key modification and key revocation. The invention solves the technical problems that the prior pre-share-key based key management method is not suitable for larger networks and the PKI-based key management method is not suitable for wireless multi-hop networks; the public-key system and the ternary structure are adopted, thereby improving the security and the performance of the wireless multi-hop networks.
Owner:CHINA IWNCOMM

Network access authentication and authorization method and an authorization key updating method

A network access authentication and authorization method includes the steps of: constructing an access and authorization request packet; constructing a certificate authentication request packet, constructing a certificate authentication response packet; constructing an access and authorization response packet; constructing an access and authorization acknowledgement packet. And an authorization key updating method includes the steps of: constructing an access and authorization request packet; constructing an access and authorization response packet; constructing an access and authorization acknowledgement packet. The invention resolves the security problem that a mobile terminal accesses a base station in the wideband wireless multimedia network, and realizes both bi-directional identity authentication of a mobile terminal and a base station and unidirectional identity authentication from a base station to a mobile terminal. The authorization key negotiation calculation is simple, and the key management is simply realized by using message acknowledgement manner. The invention is applied to the wired network and the wireless network, such as the wireless local area network, the wireless metropolitan area network, and the broadband wireless multimedia network etc.
Owner:CHINA IWNCOMM

Multicast key management method for wireless city region network

The invention relates to a multicast key management method of wireless metropolitan area network. The method comprises the following steps: (1) distribution of multicast private keys: (1.1) transmitting a multicast private key request grouping from a requester entities to a responder entities, (1.2) transmitting a multicast private key response grouping from the responder entities to the requester entities, and (1.3) transmitting a multicast private key confirm grouping from the requester entities to the responder entities; and (2) distribution or updating of encrypted keys of the multicast private keys; (2.1) broadcasting the encrypted keys broadcasting grouping of the multicast private keys by the responder entities to all of the requester entities, and (2.2) deciphering the encrypted keys of the multicast private keys from the encrypted keys broadcasting grouping of the multicast private keys by the requester entities. The multicast key management method solves the problems of the poor key safety and low updating efficiency of the multicast keys of the multicast key management of the wireless metropolitan area network.
Owner:CHINA IWNCOMM

Combined narrowband interference detection, elimination and channel estimation method based on continuous cyclic shift training sequence in OFDM system

ActiveCN105897643AThe impact of reducing the estimated qualityAccurate detectionMulti-frequency code systemsSequence designEstimation methods
The present invention relates to a combined narrowband interference detection, elimination and channel estimation method based on a continuous cyclic shift training sequence in an OFDM system. On the condition of using two OFDM symbol training sequences to carry out the channel estimation, the method utilizes a signal detection and estimation technology and a training sequence design technology to realize the asynchronous narrowband interference detection, estimation and elimination, is applied to a the OFDM systems existing the narrowband interference, such as a wireless local area network IEEE802.11a, a wireless metropolitan area network WiMAX IEEE 802.16e, etc., realizes the accurate estimation and elimination of an asynchronous narrowband signal while realizing the interference robustness detection, and enables the training sequence auxiliary channel estimation performance on an interference condition to be improved effectively.
Owner:NAT UNIV OF DEFENSE TECH

Curb-side parking fee management system and method based on wireless metropolitan area network and POS terminal

The invention discloses a curb-side parking fee management system and a method based on a wireless metropolitan area network and a POS terminal. The system at least consists of a parking fee management platform, a handheld automatic charging POS machine and a communication network, and a parking fee management service unified platform comprises a clearing platform, a charging platform, a management supervising platform and a service inducing platform. The method comprises the following steps of downloading the fee rate of a parking lot, collecting the parking information, uploading the parkinginformation to the parking fee management platform in real time by the communication network, charging the corresponding fee from a parker, and uploading the charging information to the parking fee management platform in real time through the wireless metropolitan area network. The invention integrates, innovates and utilizes the WIFI, handheld POS machine and IT information technology to comprehensively monitor personnel, data and finance, and creates an all-round service platform which integrates four functions of the parking management, the fee clearing, the information supervision and theinduction service.
Owner:杭州市人民政府城市管理办公室 +1

Electric transmission line real-time video condition monitoring system based on wireless communication

The invention discloses an electric transmission line real-time video condition monitoring system based on wireless communication. The system comprises a plurality of front end monitoring devices, a communication module and a power supply module, the front end monitoring devices are installed on electric transmission line poles and towers, the communication module and the power supply module are connected with the front end monitoring devices, the front end monitoring devices transmit image video information collected through an optical ground wire (OPGW) optical fiber and a wireless metropolitan area network 802.16 protocol to a communication base station, the communication base station transmits the information to a system server, the server checks and browses a current real-time monitoring state through a client, and transmission line states are checked through rotation and focal distances of a pan-tilt remote control camera, so that electric transmission line video states are real-timely monitored. The system uses the OPGW optical fiber for transmission so that the network bandwidth is large and safety is high; and a wireless metropolitan area network technology is used for performing wireless extension so that the system can be used in mountain areas, and the system has the advantages of being high in safety, comprehensiveness, real-time performance and adaptive capacity.
Owner:BAOJI POWER SUPPLY BUREAU +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products