Patent application number | Description | Published |
20090080388 | Wireless Local Area Network and access point for a Wireless Local Area Network - Embodiments related to Wireless Local Area Networks and access points for a Wireless Local Area Network are described and depicted. | 03-26-2009 |
20090196306 | CONTENTION ACCESS TO A COMMUNICATION MEDIUM IN A COMMUNICATIONS NETWORK - A method of providing contention access to a communication medium in a communications network includes transmitting priority information with each of a plurality of network nodes prior to a shared-contention transmission opportunity. The priority information for each node indicates a priority level of a frame that the node intends to transmit on the communication medium during the shared-contention transmission opportunity. At least one of the nodes is assigned to a contention window of a plurality of contention windows within the transmission opportunity based on the transmitted priority information. | 08-06-2009 |
20090296924 | KEY MANAGEMENT FOR COMMUNICATION NETWORKS - One embodiment of the present invention relates to a method for key management in a communications network. In this method, a public key authentication scheme is carried out between a security controller and a plurality of nodes to establish a plurality of node-to-security-controller (NSC) keys. The NSC keys are respectively associated with the plurality of nodes and are used for secure communication between the security controller and the respective nodes. Other methods and devices are also disclosed. | 12-03-2009 |
20100017595 | Security In Networks - Embodiments related to security in networks are described and depicted. | 01-21-2010 |
20100017871 | Security In Networks - Embodiments related to security in networks are described and depicted. | 01-21-2010 |
20100042841 | Updating and Distributing Encryption Keys - System and method for providing secure communications is provided. Initially, an exchange protocol, such as a password-authenticated key exchange protocol, is used to create a shared secret. From the shared secret, two keys are created: a utilized key and a stored key. The utilized key is used to encrypt messages between nodes. When it is time to replace the utilized key to maintain security, the stored key is utilized to encrypt messages for generating/distributing a new shared secret. The new shared secret is then used to generate a new utilized key and a new stored key. This process may be repeated any number of times to maintain security. | 02-18-2010 |
20100074263 | Configurable Media Access Controller - Embodiments related to configurable Media Access Controllers (MACs) are described and depicted. | 03-25-2010 |
20100120476 | Base Station, Method of Operating a Base Station and Wireless Communication System - A base station for wireless communication comprises a receiver and a processor. The receiver has a first operating state and a second operating state with different power consumption levels. In the first operating state, the receiver is configured to receive a signal. The processor is coupled to the receiver to switch the receiver between the first and second operating states. | 05-13-2010 |
20130142186 | WIRELESS NETWORK AND ACCESS POINT FOR A WIRELESS NETWORK - Embodiments related to Wireless Networks and access points for a Wireless Network are described and depicted. | 06-06-2013 |