Patent application number | Description | Published |
20080244665 | System and method of providing video content - A method of providing video content is disclosed that includes identifying a current user of a set-top box device, where a plurality of users that includes the current user is associated with the set-top box device. The method also includes identifying a first channel associated with the set-top box device, where the set-top box device is tuned to the first channel. Further, the method includes predicting that the current user will select at least one next channel based on historical data associated with the current user. The method also includes streaming video content of the at least one next channel to the set-top box device via a video distribution network while the set-top box device is tuned to the first channel. | 10-02-2008 |
20090025082 | Method and apparatus for detecting computer-related attacks - Disclosed is a method and apparatus for detecting prefix hijacking attacks. A source node is separated from a destination network at a first time via an original path. The destination network is associated with a prefix. At a second time, a packet is transmitted from the source node to the destination network to determine a current path between the source node and the destination network. A packet is also transmitted from the source node to a reference node to determine a reference node path. The reference node is located along the original path and is associated with a prefix different than the prefix associated with the destination network. The current path and the reference node path are then compared, and a prefix hijacking attack is detected when the reference node path is not a sub-path of the current path. | 01-22-2009 |
20090073921 | Data forwarding in hybrid mesh networks - A system and method are disclosed for forwarding data in hybrid wireless mesh networks. The method includes configuring a number of mesh network nodes as Potential Relay Nodes (PRNs) in an overlay network associated with a hybrid wireless mesh network, streaming data packets from a source node to a destination node using a native data forwarding algorithm of the hybrid wireless mesh network, dynamically identifying Relay Nodes (RNs) among PRNs in the overlay network, creating secondary paths for sending data packets towards selected RNs in the overlay network, and relaying data packets from RNs to the destination node using the overlay network. | 03-19-2009 |
20090147768 | Synchronizing wireless local area network access points - In a wireless local area network, a first and second access point in which the RF coverage areas overlap are synchronized by positioning a monitor station within the overlap area. The monitor station receives beacon frames from both access points and records the arrival times. A manager in communication with both access points and the monitor station calculates a retardation interval and issues a control command to the second access point to retard transmission of its beacon frame. The retardation interval is calculated such that the contention-free period of the second access point does not overlap the contention-free period of the first access point. The manager may also issue control commands to the first and second access points to adjust their contention-free periods. | 06-11-2009 |
20090167522 | Method and apparatus for monitoring a material medium - A material medium, such as an optical fiber or electrical cable, is commonly used to carry services, such as telecommunications or energy service. The current invention identifies the following problems which may be encountered when monitoring a material medium. They are: (1) requiring a time and labor intensive investigation to find a fault, (2) needing a significant change in a current material medium infrastructure to support a monitoring effort, or (3) reducing available bandwidth in a material medium due to a monitoring device intruding into the material medium to send data. These problems are solved, in accordance with a feature of the current invention, by monitoring a material medium with at least one diagnostic sensor, and using an electromagnetic (EM) signal, such as radio frequency (RF), signal to wirelessly transmit the sensor data. The diagnostic sensor may measure the operational health of the material medium, or may measure local environmental conditions around the material medium. Using an EM signal, such as RF, to wirelessly transmit sensor data allows for a fast, low labor monitoring approach. Additionally, it avoids a need to either; (1) transfer the data by intruding into the monitored material medium, or (2) set up an independent material medium system to transfer the data. | 07-02-2009 |
20090222660 | Method and device for end-user verification of an electronic transaction - The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication. | 09-03-2009 |
20090279427 | Control of Quality of Service in Overlapping Basic Service Sets in Wireless Local Area Networks - Access priority for wireless devices located in an area in which radiofrequency (RF) coverage areas of a first wireless access point and a second wireless access point overlap is controlled by coordinating operation of the first wireless access point and the second wireless access point. The wireless devices access a common RF channel via a collision sense multiple access/collision avoidance mechanism. The probability of accessing the RF channel may be varied by adjusting the length of interframe spacings and the length of contention windows. The length of the interframe spacings and the length of the contention windows associated with the first access point and associated with the second access point are configured such that the probability of wireless devices associated with the first wireless access point accessing the RF channel is greater than the probability of wireless devices associated with the second wireless access point accessing the RF channel. | 11-12-2009 |
20090279596 | Method for encoding frame data - In applications where data is transmitted in frames of symbols and the transmission medium is such that the probability of correct reception of symbols is, on the average, not uniform for different symbols in a frame, transmission of test frames enables creation of information about the different probabilities of correct reception, and that information is employed by the transmitter to control the manner in which symbols are transmitted so as to ameliorate the effects of the different probabilities of correct reception. | 11-12-2009 |
20100074273 | Method for QoS delivery in contention-based multi hop network - An arrangement and a method that, for a given pair of nodes that wish to intercommunicate with a high QoS measure, converts a portion of the contention-based network into a contention-less subnetwork by sending a reservation message and a confirmation message between the given pair of nodes. All nodes that are on the paths used for communicating between the pair of nodes are protected from interference by causing all nodes that potentially can interfere to enter a non-transmitting state. | 03-25-2010 |
20100111063 | Signal strength guided intra-cell upstream data forwarding - Intra-cell upstream data forwarding is utilized in a wireless network such as a wireless local area network. A network forwarding path is determined based on the signal strength of an access point signal received at client stations within the network, referred to as the OASS. In particular embodiments, a station that is either originating or forwarding a frame inserts its own OASS into the frame before transmitting it and a client station that receives a frame forwards it only if its own OASS exceeds the frame-enclosed OASS, illustratively by at least a predetermined amount. | 05-06-2010 |
20100132037 | SYSTEM AND METHOD TO LOCATE A PREFIX HIJACKER WITHIN A ONE-HOP NEIGHBORHOOD - Method, system and computer-readable medium to locate a prefix hijacker of a destination prefix within a one-hop neighborhood on a network. The method includes generating one-hop neighborhoods from autonomous system (AS)-level paths of plural monitors to a destination prefix. The method also includes determining a suspect set of AS identifiers resulting from a union of the one-hop neighborhoods. The method further includes calculating a count and a distance associated with each AS identifier of the suspect set. The count indicates how often the AS identifier appeared in the one-hop neighborhoods. The distance indicates a total distance from the AS identifier to AS identifiers associated with the plural monitors. Yet further, the method includes generating a one-hop suspect set of AS identifiers from the suspect set that have highest counts and highest distances. | 05-27-2010 |
20100132039 | SYSTEM AND METHOD TO SELECT MONITORS THAT DETECT PREFIX HIJACKING EVENTS - Method, system and computer-readable medium to select monitors that increase the likelihood of detecting prefix hijacking events of a destination prefix are disclosed. The method includes assigning each of the candidate prefix hijack monitors to a respective cluster of a plurality of clusters. Each of the candidate prefix hijack monitors is associated with an autonomous system (AS) that indicates an AS path of autonomous systems (ASes) from the AS to a destination prefix associated with a destination AS. The method further includes iteratively merging a pair of clusters with a highest similarity score amongst cluster pairs of the plurality of clusters into a single cluster until a processed number of clusters is less than or equal to a predetermined number of clusters. The method also includes ranking each candidate prefix hijack monitor of each of the processed number of clusters according to a route type from an AS associated with the candidate prefix hijack monitor and an AS distance from the AS associated with the candidate prefix hijack monitor to the destination AS. Yet further, the method includes determining a highest ranked candidate prefix hijack monitor of each of the processed number of clusters. | 05-27-2010 |
20100150116 | Method and Apparatus for Adjusting EDCA Channel Access Parameters - A contention based communications channel access method emulates scheduled access by dynamically updating Enhanced Distribution Channel Access (EDCA) parameters for groups of member stations in a Wireless Local Area Network (WLAN). | 06-17-2010 |
20100153537 | METHOD AND APPARATUS FOR PROVIDING DETECTION OF INTERNET PROTOCOL ADDRESS HIJACKING - A method and apparatus for detecting an address hijacking in a network are disclosed. For example, the method sends one or more traceroute packets to a target prefix, wherein the target prefix comprises one or more destination Internet Protocol (IP) addresses, and records traceroute data received for the one or more traceroute packets sent to the target prefix. The method then determines one or more hop count distance measurements for the target prefix, and determines if there are one or more changes in the one or more hop count distance measurements for the target prefix. | 06-17-2010 |
20100157961 | Method and Apparatus for Scheduling Communication Traffic Flows - In one or more embodiments of the disclosed technology, an Access Point (AP) schedules communication traffic flows or service tasks between an Access Point (AP) and one or more member stations in a Wireless Local Area Network (WLAN). The communication traffic flows or service tasks may include both control and management flows and data traffic flows. The communication traffic flows or service tasks may include traffic flows or streams of different types, each of which may have different service intervals. The order of service tasks can be changed from cycle to cycle, randomly, by rotation, or based on historical delay records. | 06-24-2010 |
20110063996 | QOS IN MULTI-HOP WIRELESS NETWORKS THROUGH PATH CHANNEL ACCESS THROTTLING - A path configuration message is sent to nodes in a multi-hop network along a path between a source node and destination nodes. The path configuration message includes path information and one or more special channel access parameters associated with the path information. The path configuration message temporarily changes the channel access priority for packets matching the path information in the special message. The nodes along the path therefore have higher channel access priority relative to other nearby nodes and other traffic flows. At the end of the a length of a time determined by a time to live parameter in the special message, the nodes resume using default channel access parameters in place of the special channel access parameters for packets matching the path information. | 03-17-2011 |
20110085494 | DATA ROUTING IN HYBRID WIRELESS COMMUNICATION NETWORKS - System(s), device(s), and method(s) are provided to route data in a mesh network of devices that can communicate wirelessly through a plurality of technologies. One or more of such devices receive broadcast message(s) from a destination device intended to receive the data, and generate a first radio link quality metric (RLQM) value based on the broadcast message(s). A source device originates and delivers a quantum of data with an embedded first RLQM value. A set of intermediate devices relays the quantum of data if a forwarding criterion is fulfilled; the forwarding criterion is based in part on the first RLQM value and a second RLQM value generated by an intermediate device in the set of intermediate devices based on the broadcast message(s). The intermediate device exploits an optical interface to transmit the quantum of data. The destination device broadcasts an acknowledgement signal in response to receiving intended data. | 04-14-2011 |
20110092779 | Wearable Health Monitoring System - Devices, systems and methods are disclosed which relate to remotely monitoring the health of an individual. The individual wears a health monitoring device, with an attached strap, capable of sensing characteristics of the individual. These characteristics may include voice level and tone, movements, blood pressure, temperature, etc. The device allows individuals to constantly monitor their health without having to physically visit a doctor or other health care professional. Wireless communication, for instance with an Internet Protocol Television (IPTV) set-top box, allows measurements to be made and evaluated by a ‘computerized’ healthcare service provider. For a more accurate evaluation, measurements are sent over the INTERNET to a service. The device communicates with services in order to diagnose the individual based upon the characteristics. | 04-21-2011 |
20110138466 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROTECTING AGAINST IP PREFIX HIJACKING - A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each of the at least one potential hijack AS. | 06-09-2011 |
20110148647 | Manhole Security Device and Methods Thereof - A security device for detecting the position of a manhole cover includes a pinger device, such as an acoustic pinger, that transmits a signal in the direction of the expected position of the manhole cover. The device takes energy samples to determine if the signal has been reflected back by the manhole cover. If the device determines the signal has not been reflected, it determines that the manhole cover has been moved from the expected position. In response, the device captures an image of an area around the expected position of the manhole cover. In addition, the device can notify a remote security station via a network that the manhole cover has been moved. | 06-23-2011 |
20110153801 | Prefix Hijacking Detection Device and Methods Thereof - A method of placing prefix hijacking detection modules in a communications network includes selecting a set of candidate locations. For each candidate location, a detection coverage ratio with respect to a target Autonomous System is calculated. Based on the relative size of the coverage ratios, proposed locations for the prefix hijacking detection modules are determined. | 06-23-2011 |
20110200026 | Apparatus, method, and medium for self-organizing multi-hop wireless access networks - A wireless computer network includes a backbone network including backbone network nodes authenticated to each other and in communication with each other. The wireless computer network also includes a master authenticator node and a proxy authenticator node among the backbone network nodes. When an unauthenticated new node requests authentication to the backbone network and the unauthenticated new node is in communication with at least one of the backbone network nodes, the at least one of the backbone network nodes becoming the proxy authenticator node for the unauthenticated new node and communicates with the master authenticator node to authenticate the unauthenticated new node to the backbone network. | 08-18-2011 |
20110261799 | Signal strength guided intra-cell upstream data forwarding - Intra-cell upstream data forwarding is utilized in a wireless network such as a wireless local area network. A network forwarding path is determined based on the signal strength of an access point signal received at client stations within the network, referred to as the OASS. In particular embodiments, a station that is either originating or forwarding a frame inserts its own OASS into the frame before transmitting it and a client station that receives a frame forwards it only if its own OASS exceeds the frame-enclosed OASS, illustratively by at least a predetermined amount. | 10-27-2011 |
20110313774 | Methods, Systems, and Products for Measuring Health - Methods, systems, and products measure health data related to a user. A spoken phrase is received and time-stamped. The user is identified from the spoken phrase. A window of time is determined from a semantic content of the spoken phrase. A sensor measurement is received and time-stamped. A difference in time between the time-stamped spoken phrase and the time-stamped sensor measurement is determined and compared to the window of time. When the difference in time is within the window of time, then the sensor measurement is associated with the user. | 12-22-2011 |
20120030229 | Methods, Systems, and Products for Measuring Health - Methods, systems, and products measure health data related to a user. A time-stamped device identifier is received that uniquely identifies a communications device. A time-stamped sensor measurement is separately-received. A difference in time between the time-stamped device identifier and the time-stamped sensor measurement is determined. When the difference in time is within a window of time, then the sensor measurement is associated with the device identifier. | 02-02-2012 |
20120044924 | Synchronizing Wireless Local Area Network Access Points - In a wireless local area network, a first and second access point in which the RF coverage areas overlap are synchronized by positioning a monitor station within the overlap area. The monitor station receives beacon frames from both access points and records the arrival times. A manager in communication with both access points and the monitor station calculates a retardation interval and issues a control command to the second access point to retard transmission of its beacon frame. The retardation interval is calculated such that the contention-free period of the second access point does not overlap the contention-free period of the first access point. The manager may also issue control commands to the first and second access points to adjust their contention-free periods. | 02-23-2012 |
20120089367 | Method and Apparatus for Monitoring a Material Medium - A material medium, such as an optical fiber or electrical cable, is used to carry services. The material medium is monitored with at least one diagnostic sensor. The diagnostic sensor may measure the operational health of the material medium, or may measure local environmental conditions around the material medium. | 04-12-2012 |
20120147798 | METHOD AND APPARATUS FOR INITIALIZING AN RFID TAG VIA AN OPTICAL DISPLAY - A method and apparatus for initializing a radio frequency identification tag are disclosed. For example, the method receives an optical signal having a unique identifier and an encryption key from a display by a radio frequency identification repeater associated with the radio frequency identification tag, wherein the radio frequency identification repeater comprises an optical reader. The method then transmits a communication comprising radio frequency identification information associated with the radio frequency identification tag and the unique identifier via the radio frequency identification repeater to a wireless access point, wherein the communication is encrypted using the encryption key. | 06-14-2012 |
20120157106 | OPTIMIZATION OF CELLULAR NETWORK ARCHITECTURE BASED ON DEVICE TYPE-SPECIFIC TRAFFIC DYNAMICS - A method, a computer readable medium and an apparatus for optimizing a cellular network architecture are disclosed. For example, the method obtains network traffic data for a plurality of different endpoint device types, wherein the network traffic data comprises network traffic data for each of the plurality of different endpoint device types, and predicts a future traffic pattern for one of the plurality of different endpoint device types based on the network traffic data. The method then adjusts a parameter of the cellular network architecture in response to the future traffic pattern predicted for the one of the plurality of different endpoint device types. | 06-21-2012 |
20120218123 | SET-TOP BOX FOR MONITORING TELEHEALTH SENSORS - The subject disclosure provides a system and method for a set-top box for monitoring telehealth and biometric sensors. A subject patient is associated with telehealth and biometric sensors which measure the subject patient's vital signs and other health related attributes. In one aspect, the system includes a set-top box for continuously gathering biometric and telehealth sensor data. The set-top box includes a sensor interface for interfacing with the sensors and supports wireless and wired connections to the sensors. The system additionally may include a system management station for providing feedback to the subject patient. | 08-30-2012 |
20120283992 | CONTROL PLANE FOR SENSOR COMMUNICATION - The disclosed subject matter relates to an architecture that can employ a control plane for managing communications with respect to a set of sensors. By utilizing a control plane, a distinction between control messages and data messages can be provided in a standardized way and the set of sensors can benefit from additional functionality and configurability. For example, the control plane can be employed to modify parameters associated with the set of sensors, which can be effectuated in real time and in situ as opposed to at the time of fabrication or deployment. Moreover, such modifications can relate to both the sensing portions of a particular sensor as well as the communication portions of a particular sensor. | 11-08-2012 |
20130064236 | Control of Quality of Service in Overlapping Basic Service Sets in Wireless Local Area Networks - Access priority for wireless devices located in an area in which radiofrequency (RF) coverage areas of a first wireless access point and a second wireless access point overlap is controlled by coordinating operation of the first wireless access point and the second wireless access point. The wireless devices access a common RF channel via a collision sense multiple access/collision avoidance mechanism. The probability of accessing the RF channel may be varied by adjusting the length of interframe spacings and the length of contention windows. The length of the interframe spacings and the length of the contention windows associated with the first access point and associated with the second access point are configured such that the probability of wireless devices associated with the first wireless access point accessing the RF channel is greater than the probability of wireless devices associated with the second wireless access point accessing the RF channel. | 03-14-2013 |
20130074175 | Methods, Systems, and Computer Program Products for Protecting Against IP Prefix Hijacking - A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each, of the at least one potential hijack AS. | 03-21-2013 |
20130093884 | Manhole Security Device and Methods Thereof - A security device for detecting the position of a manhole cover includes a pinger device, such as an acoustic pinger, that transmits a signal in the direction of the expected position of the manhole cover. The device takes energy samples to determine if the signal has been reflected back by the manhole cover. If the device determines the signal has not been reflected, it determines that the manhole cover has been moved from the expected position. In response, the device captures an image of an area around the expected position of the manhole cover. In addition, the device can notify a remote security station via a network that the manhole cover has been moved. | 04-18-2013 |
20130097317 | METHOD AND APPARATUS FOR REMOTE TRUST MANAGEMENT FOR MACHINE TO MACHINE COMMUNICATIONS IN A NETWORK - A method, non-transitory computer readable medium and apparatus for providing remote trust management for machine to machine communications in a network are disclosed. For example, the method receives a request from a sensor to join a wireless network, determines a trust score of the sensor by a server at the network, and allows the sensor to join the wireless network if the trust score is greater than a predetermined threshold. | 04-18-2013 |
20130097703 | SYSTEM AND METHOD TO LOCATE A PREFIX HIJACKER WITHIN A ONE-HOP NEIGHBORHOOD - Method, system and computer-readable device to locate a prefix hijacker of a destination prefix within a one-hop neighborhood. The method includes generating one-hop neighborhoods from autonomous system-level paths associated with a plurality of monitors to a destination prefix. The method also includes determining a suspect set of autonomous system identifiers resulting from a union of the one-hop neighborhoods. The method further includes calculating a count and a distance associated with each autonomous system identifier in the suspect set of autonomous system identifiers. The count represents how often an autonomous system identifier appears in the one-hop neighborhoods. The distance represents a total number of autonomous system identifiers from the autonomous system identifier to autonomous system identifiers associated with the plurality of monitors. Yet further, the method includes generating a one-hop suspect set including autonomous system identifiers in the suspect set that have a greatest sum of the count and the distance. | 04-18-2013 |
20130127618 | METHOD AND APPARATUS FOR MACHINE TO MACHINE NETWORK SECURITY MONITORING IN A COMMUNICATIONS NETWORK - A method, non-transitory computer readable medium and apparatus for providing network security monitoring in a communications network are disclosed. For example, the method receives communications traffic associated with a sensor network from a sensor that is a member of the sensor network, analyzes the communications traffic to determine if an attack is occurring on the sensor network, and generates an alarm if the attack is occurring on the sensor network. | 05-23-2013 |
20130138786 | FACILITATING VIRTUAL PERSONAL AREA NETWORKS - A system that incorporates teachings of the present disclosure may include, for example, a coordinator device having a memory, and a controller. The memory can have computer instructions, which when executed by the controller, causes the controller to facilitate establishing a first virtual personal area network with a first sensor by executing computer instructions associated with a first application profile, and facilitate establishing a second virtual personal area network with a second sensor by executing computer instructions associated a second application profile. The first application profile can be defined by a first protocol specification, while the second application profile can be defined by a second protocol specification. The first protocol specification can also be operationally distinct from the second protocol specification. Other embodiments are disclosed. | 05-30-2013 |
20130142108 | DATA FORWARDING IN HYBRID MESH NETWORKS - A system and method are disclosed for forwarding data in hybrid wireless mesh networks. The method includes configuring a number of mesh network nodes as Potential Relay Nodes (PRNs) in an overlay network associated with a hybrid wireless mesh network, streaming data packets from a source node to a destination node using a native data forwarding algorithm of the hybrid wireless mesh network, dynamically identifying Relay Nodes (RNs) among PRNs in the overlay network, creating secondary paths for sending data packets towards selected RNs in the overlay network, and relaying data packets from RNs to the destination node using the overlay network. | 06-06-2013 |
20130226585 | Methods, Systems, and Products for Measuring Health - Methods, systems, and products measure health data related to a user. A spoken phrase is received and time-stamped. The user is identified from the spoken phrase. A window of time is determined from a semantic content of the spoken phrase. A sensor measurement is received and time-stamped. A difference in time between the time-stamped spoken phrase and the time-stamped sensor measurement is determined and compared to the window of time. When the difference in time is within the window of time, then the sensor measurement is associated with the user. | 08-29-2013 |
20130235799 | SIGNAL STRENGTH GUIDED INTRA-CELL UPSTREAM DATA FORWARDING - Intra-cell upstream data forwarding is utilized in a wireless network such as a wireless local area network. A network forwarding path is determined based on the signal strength of an access point signal received at client stations within the network, referred to as the OASS. In particular embodiments, a station that is either originating or forwarding a frame inserts its own OASS into the frame before transmitting it and a client station that receives a frame forwards it only if its own OASS exceeds the frame-enclosed OASS, illustratively by at least a predetermined amount. | 09-12-2013 |
20130254887 | Prefix Hijacking Detection Device and Methods Thereof - A method of placing prefix hijacking detection modules in a communications network includes selecting a set of candidate locations. For each candidate location, a detection coverage ratio with respect to a target Autonomous System is calculated. Based on the relative size of the coverage ratios, proposed locations for the prefix hijacking detection modules are determined. | 09-26-2013 |
20130259018 | Devices, Systems, and/or Methods for Managing Wireless Networks - A method includes receiving a beacon message at a wireless network device. The beacon message is followed by a beacon time interval. The method further includes receiving a thin beacon message during the beacon time interval. The thin beacon message is followed by a thin beacon time interval that is shorter than the beacon time interval. The thin beacon time interval includes a contention-free period, a contention period, or a combination thereof. | 10-03-2013 |
20130272166 | MULTI-HOP WIRELESS NETWORKS - A path configuration message is sent to nodes in a multi-hop network along a path between a source node and destination nodes. The path configuration message includes path information and one or more special channel access parameters associated with the path information. The path configuration message temporarily changes the channel access priority for packets matching the path information in the special message. The nodes along the path therefore have higher channel access priority relative to other nearby nodes and other traffic flows. At the end of the a length of a time determined by a time to live parameter in the special message, the nodes resume using default channel access parameters in place of the special channel access parameters for packets matching the path information. | 10-17-2013 |
20130294438 | Synchronizing Wireless Local Area Network Access Points - In a wireless local area network, a first and second access point in which the RF coverage areas overlap are synchronized by positioning a monitor station within the overlap area. The monitor station receives beacon frames from both access points and records the arrival times. A manager in communication with both access points and the monitor station calculates a retardation interval and issues a control command to the second access point to retard transmission of its beacon frame. The retardation interval is calculated such that the contention-free period of the second access point does not overlap the contention-free period of the first access point. The manager may also issue control commands to the first and second access points to adjust their contention-free periods. | 11-07-2013 |
20140058745 | Methods, Systems, and Products for Measuring Health - Methods, systems, and products measure health data related to a user. Often times a weight scale, blood pressure monitor, or other medical measurement device is shared among a group of users. A time-stamped physiological measurement is compared to a time-stamped message from a mobile device. If the timestamps are contemporaneous, then the physiological measurement is bound to the mobile device. | 02-27-2014 |
20140163898 | Methods, Systems, and Products for Measuring Health - Methods, systems, and products measure health data related to a user. A time-stamped device identifier is received that uniquely identifies a communications device. A time-stamped sensor measurement is separately received. A difference in time between the time-stamped device identifier and the time-stamped sensor measurement is determined. When the difference in time is within a window of time, then the sensor measurement is associated with the device identifier. | 06-12-2014 |
20150029906 | SYSTEM AND METHOD FOR REDUCING INTER-CELLSITE INTERFERENCE IN FULL-DUPLEX COMMUNICATIONS - Disclosed herein are systems, methods, and computer-readable storage devices for reducing inter-cellsite interference during full-duplex communication. A system receives a channel amplitude and a phase estimate between a first station and a second station, the first station and the second station creating inter-cellsite interference on a channel during full-duplex communications. The system calculates a level of the inter-cellsite interference between the first station and the second station based on the channel amplitude and the phase estimate and generates a cancellation signal based on the inter-cellsite interference. The system then communicates the cancellation signal to the first station for transmission with additional data during additional full-duplex communications. | 01-29-2015 |