Patent application number | Description | Published |
20080227682 | Acidic Hard Surface Cleaning Compositions - The present invention is directed to an acidic hard surface treatment composition which provides a cleaning benefit comprising: an acidic constituent which comprises water soluble organic acid; at least one anionic surfactant constituent; at least one nonionic surfactant constituent; at least one organic solvent constituent; at least one inorganic chloride salt; optionally one or more further constituents and the balance, water. | 09-18-2008 |
20090036345 | Light-Duty Dishwashing Detergent Compositions - Disclosed are light duty liquid detergent compositions which are particularly useful in the manual cleaning of dishes and tableware, as well as being useful in the cleaning of other surfaces particularly hard surfaces. The compositions exhibit excellent and rapid dispersability into larger volumes of water and provide excellent cleaning performance. | 02-05-2009 |
20100263693 | Hard Surface Treatment Compositions - An improved hard surface treatment compositions which comprises (preferably consists essentially of; yet more preferably consists of) the following constituents: a detersive anionic surfactant; a detersive nonionic surfactant; an alkylene glycol ether solvent; a phenyl containing glycol ether solvent; an organic acid, preferably an organic acid selected from citric acid, lactic acid and mixtures thereof; optionally but preferably a film forming polymer based on quaternized copolymers of vinylpyrrolidone and dimethylaminoethyl methacrylate, optionally one or more further constituents which may improve aesthetic or functional features of the compositions, and, water. | 10-21-2010 |
Patent application number | Description | Published |
20090070859 | Method and Apparatuses for Secure, Anonymous Wireless Lan (WLAN) Acess - A method and system for providing secure, anonymous access to a wireless local area network, including configuring an access point to drop packets except packets exhibiting an URL access protocol like HTTP and HTTPS, intercepting a URL access request by an access point from a mobile device via a web browser, re-directing the URL access request to a web server by the access point generating a security key by one of the access points and the web server, communicating the generated security key to the said web server securely by the access point or vice versa and setting the security key by the access point is described. A mobile device including means for forwarding a request for secure access to a wireless local area network via a URL access request, means for receiving a mobile code or a signal for displaying a security key and means for setting the security key is also described. | 03-12-2009 |
20090175250 | Method for mobile terminal access to wireless lan based on access point services and service parameters - A wireless LAN provides access to a mobile terminal (MT) utilizing beacon frames to broadcast access point (AP) service specific information. The MT listens to the beacon frames and compares the broadcast service(s) and service parameters to a predetermined service profile stored in the MT. When the services offered by an AP matches the services designated in the stored service profile, the MT associates with that particular AP. | 07-09-2009 |
20090282238 | Secure handoff in a wireless local area network - A system and method including computing keying information by a server for authentication of devices accessing a wireless local area network and forwarding the keying information by the server to access points included in a security domain of the wireless local area network, wherein one of the access points is associated with a mobile device are described. | 11-12-2009 |
20090303902 | Multicast mesh routing protocol - A method for a node to select a route to join a multicast group in a wireless mesh network, including establishing the route between the node and the multicast group using media access control addresses is described. A method for determining a multicast group leader of the multicast group of a wireless mesh network using media access control addresses is also described. | 12-10-2009 |
Patent application number | Description | Published |
20100131751 | SUPPORT OF PHYSICAL LAYER SECURITY IN WIRELESS LOCAL AREA NETWORKS - A method and an apparatus for performing physical layer security operation are disclosed. A physical layer performs measurements continuously, and reports the measurements to a medium access control (MAC) layer. The MAC layer processes the measurements, and sends a security alert to a security manager upon detection of an abnormal condition based on the measurements. The security manager implements a counter-measure upon receipt of the security alert. The measurements include channel impulse response (CIR), physical medium power measurement, automatic gain control (AGC) value and status, automatic frequency control (AFC) gain and status, analog-to-digital converter (ADC) gain, Doppler spread estimate, and/or short preamble matched filter output. The security manager may switch a channel, switch a channel hopping policy, change a back-off protocol, or change a beamforming vector upon reception of the security alert. | 05-27-2010 |
20120294443 | Establishing Secure Links Between Wireless Devices in Proximity Using Ambient Wireless Signals - Wireless devices in proximity are securely paired with one another autonomously by generating a common cryptographic key directly from a time-varying wireless environment shared among the wireless devices. The shared key can be used by the wireless devices to authenticate each wireless device's physical proximity and then to facilitate confidential communication between the wireless devices. The algorithm used to create the shared key is secure against a computationally unbounded adversary and its computational complexity is linear in the size of the shared key. | 11-22-2012 |
20120311107 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS TO REDUCE LATENCY - Methods and apparatus to configure virtual private mobile networks for latency are disclosed. A disclosed example method includes provisioning logically a virtual private mobile network within a wireless network to reduce latency of a communication associated with a latency sensitive application, determining a mobile device is communicatively coupling to the wireless network via the latency sensitive application, and coupling the mobile device to the virtual private mobile network to reduce latency of the communication associated with the latency sensitive application. | 12-06-2012 |
20120331545 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS FOR SECURITY - Methods and apparatus to configure virtual private mobile networks for security are disclosed. A disclosed example method includes identifying, in a wireless network, a communication from a user equipment that matches a security event profile, transmitting, from the wireless network, an instruction to enable the user equipment to be communicatively coupled to a virtual private mobile network, the virtual private mobile network being provisioned for security within the wireless network, and enabling the user equipment to transmit a second communication through the virtual private mobile network securely isolated from other portions of the wireless network. | 12-27-2012 |
20130054763 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS WITH VIRTUAL PRIVATE NETWORKS - Methods and apparatus to configure virtual private mobile networks with virtual private networks are disclosed. A disclosed example method includes logically provisioning, for a client, the virtual private mobile network to process wireless network communications associated with the client that correspond to a specified address space of the client, provisioning at least a portion of a server within a cloud computing data center to host resources for the client, and configuring at least a portion of an edge router of the cloud computing data center to transmit the wireless network communications between the portion of the server and the virtual private mobile network. | 02-28-2013 |
20140173682 | AUTHENTICATION FOR SECURE WIRELESS COMMUNICATION - A method and apparatus for use in authentication for secure wireless communication is provided. A received signal is physically authenticated and higher layer processed. Physical authentication includes performing hypothesis testing using a channel impulse response (CIR) measurement of the received signal and predetermined referenced data. Higher layer processing includes validating the signal using a one-way hash chain value in the signal. Once a signal is authenticated, secure wireless communication is performed. | 06-19-2014 |