Bilstad
Arnold Bilstad, Redwood City, CA US
Patent application number | Description | Published |
---|---|---|
20100246551 | Performance optimization for wireless networks with mixed modulation types - In one embodiment, different physical layer standards are segregated into different frequency channels. In one implementation, 802.11b traffic and 802.11g traffic are segregated into different frequency channels. A network management tool allows the user to specify channels to either, e.g., 802.11b-only, 802.11g-only, 802.11b preferred and 802.11g discouraged, or 802.11g preferred and 802.11b discouraged. Access points are given the capability of preventing or discouraging client traffic of either given type. | 09-30-2010 |
Arnold C. Bilstad, Deerfield, IL US
Patent application number | Description | Published |
---|---|---|
20080265561 | STERILE CONNECTOR SYSTEMS - A system for forming a fluid connection includes a first connector and a second connector. Both connectors include a tubular body having a membrane mounted on a distal end thereof. A support member facilitates the coupling of the connectors together so that the membranes are abutted together. Radiant energy is applied to the abutted membranes so as to first sterilize the membranes and then melt the membranes so that a passage is formed therethrough. | 10-30-2008 |
20100133807 | STERILE CONNECTOR SYSTEMS - A system for forming a fluid connection includes a first connector ( | 06-03-2010 |
Arnold Mark Bilstad, Redwood City, CA US
Patent application number | Description | Published |
---|---|---|
20080253314 | WLAN diagnostics using traffic stream metrics - Methods, apparatuses and systems directed to facilitating WLAN diagnostics and management using traffic stream metrics. In a data collection stage, according to one implementation of the present invention, localized uplink measurements are taken at a wireless client associated with a wireless access point. During periodic intervals (e.g., every 5 seconds), the wireless client, in one implementation, transmits uplink measurement information to the wireless access point. The wireless access point may also take downlink measurements, which may also include one or more of the following metrics: observed latency, queuing delay, packet loss rate, and packet count information. The wireless access point, in one implementation, may aggregate and report the uplink and downlink metric information to a network management system. In a diagnostic stage, according to one implementation, a wireless network management module performs diagnostics of the WLAN based on the uplink and/or downlink metrics received from the wireless access-point. | 10-16-2008 |
20090059785 | Policy-based resource management - In one embodiment, a network device receives a request from a client in association with a connection, where the request indicates an amount of one or more resources that is requested to support the connection. The network device determines whether the amount of the resources is available. The network device may then allocate a level of the resources to the connection according to whether the amount of the resources is available. | 03-05-2009 |
Lars Sigve Bilstad, Stabekk NO
Patent application number | Description | Published |
---|---|---|
20090137232 | METHOD AND A SYSTEM FOR PROVIDING INFORMATION FROM A CUSTOMER'S BANK ACCOUNT TO HIS MOBILE PHONE - A method and system for providing information to telecommunications devices, comprising access to a receiver device ( | 05-28-2009 |
20100029249 | EFFICIENT AUTHENTICATION OF A USER FOR CONDUCT OF A TRANSACTION INITIATED VIA MOBILE TELEPHONE - A method and system for authenticating a user for conduct of a transaction initiated by the user via a data-enabled telephone is presented. Efficient use is made of keystrokes on the data-enabled telephone. The data-enabled telephone is capable of initiating telephone calls over a telephone network and of engaging in two-way data communication with a data server in a network and the server enables conduct of the transaction. Caller identification information is received at the server. The information is associated with a telephone call request initiated by the user via the data-enabled telephone to a service number. The caller identification provides basis for authentication of the user and the caller identification information received at the service number is used to address a message to the user. Included in such a message is a logon key for use by the user in accomplishing the transaction. Thus the user can use the logon key to enter into data communication with the server for conduct of the transaction. | 02-04-2010 |
20130080332 | EFFICIENT AUTHENTICATION OF A USER FOR CONDUCT OF A TRANSACTION INITIATED VIA MOBILE TELEPHONE - A method and system for authenticating a user for conduct of a transaction initiated by the user via a data-enabled telephone is presented. Efficient use is made of keystrokes on the data-enabled telephone. The data-enabled telephone is capable of initiating telephone calls over a telephone network and of engaging in two-way data communication with a data server in a network and the server enables conduct of the transaction. Caller identification information is received at the server. The information is associated with a telephone call request initiated by the user via the data-enabled telephone to a service number. The caller identification provides basis for authentication of the user and the caller identification information received at the service number is used to address a message to the user. Included in such a message is a logon key for use by the user in accomplishing the transaction. Thus the user can use the logon key to enter into data communication with the server for conduct of the transaction. | 03-28-2013 |
20150039508 | EFFICIENT AUTHENTICATION OF A USER FOR CONDUCT OF A TRANSACTION INITIATED VIA MOBILE TELEPHONE - A method and system for authenticating a user for conduct of a transaction initiated by the user via a data-enabled telephone is presented. Efficient use is made of keystrokes on the data-enabled telephone. The data-enabled telephone is capable of initiating telephone calls over a telephone network and of engaging in two-way data communication with a data server in a network and the server enables conduct of the transaction. Caller identification information is received at the server. The information is associated with a telephone call request initiated by the user via the data-enabled telephone to a service number. The caller identification provides basis for authentication of the user and the caller identification information received at the service number is used to address a message to the user. Included in such a message is a logon key for use by the user in accomplishing the transaction. Thus the user can use the logon key to enter into data communication with the server for conduct of the transaction. | 02-05-2015 |