Patent application number | Description | Published |
20080240026 | DISTRIBUTED CHANNEL ALLOCATION METHOD AND WIRELESS MESH NETWORK THEREWITH - A distributed channel allocation method and a wireless mesh network with the same are provided herein. By the distributed channel allocation, interference situations are avoided in a wireless network communication, and the allocated bandwidth can then be fully utilized. Besides, unnecessary depletion of an allocated bandwidth due to the interference can be avoided. By this method, a time division technique is applied for dividing a transmission time of each wireless NIC, and different non-overlapping channels can be assigned to different timeslots. Different from other researches that require a symmetrical number of the NICs between a receiving node and a transmitting node, in this method, a unique wireless NIC may communicate with the wireless NICs. The method provides the feature that the number of the NICs on a certain node can be adjusted to meet a communication requirement, by which the efficiency of a network flow is also significantly improved. | 10-02-2008 |
20090054036 | GROUP AUTHENTICATION METHOD - A group authentication method adaptable to a communication system is disclosed. The communication system includes a user group, a serving network, and a home network. The user group includes at least one mobile station. The home network pre-distributes a group authentication key to itself and all the mobile stations in the same user group and generates a mobile station authentication key for each mobile station. The home network generates a group list for recording related information of the user group. The home network has a database for recording the group list. The serving network has a database for recording the group list and a group authentication data received from the home network. The group authentication method includes following steps. The serving network performs an identification action to a mobile station. The communication system performs a full authentication action or a local authentication action according to the result of the identification action. | 02-26-2009 |
20100110963 | SYSTEM AND METHOD FOR MULTICAST/ BROADCAST SERVICE ZONE BOUNDARY DETECTION - A wireless communication method for providing zone boundary detection performed by a controller managing communications within a multicast/broadcast service (MBS) zone. The method includes assigning to a boundary paging group a first base station communicating within the MBS zone and near a boundary of the MBS zone. The method further includes transmitting, through a second base station which covers a mobile station, to the mobile station information indicating that the boundary paging group corresponds to locations near the boundary of the MBS zone. | 05-06-2010 |
20100260071 | ROUTING METHOD AND ROUTING PATH RECOVERY MECHANISM IN WIRELESS SENSOR NETWORK ENVIRONMENT - The present invention discloses an asymmetric routing method and routing path recovery mechanism. The wireless sensor network environment includes at least a management unit, at least a gateway, and mobile nodes. When joining, each mobile node obtains an unique ID code and, additionally, a depth as the gradient to the management unit. Accordingly, a mobile node sends an uplink packet via a nearby node with lower depth to the management unit; while the management unit transmits a downlink packet to a mobile node by utilizing the source route method. When the parent node of a mobile node is damaged or moves to another position or said mobile node with its sub-tree descendants changes their position together, the uplink routing path is recovered via selecting a nearby node of the sub-tree as relay node and the downlink routing path is recovered via sending a control message to the management unit. | 10-14-2010 |
20110047382 | FAST AUTHENTICATION BETWEEN HETEROGENEOUS WIRELESS NETWORKS - A method for preparing for handover of an apparatus from a first wireless network to a second, different wireless network, a master session key (MSK) having been generated during establishment of a connectivity of the apparatus to the first wireless network includes detecting signals of the second wireless network. In response thereto, establishing a connectivity of the apparatus to the second wireless network, using a pairwise master key (PMK) derived from the MSK generated during establishment of the connectivity to the first wireless network, one or more encryption keys being derivable from the PMK to support secure communication over the second wireless network. | 02-24-2011 |
20110051644 | POWER-EFFICIENT BACKBONE-ORIENTED WIRELESS SENSOR NETWORK, METHOD FOR CONSTRUCTING THE SAME AND METHOD FOR REPAIRING THE SAME - The present invention discloses a power-efficient backbone-oriented wireless sensor network, a method for constructing the same and a method for repairing the same, wherein energy-rich nodes are used to form backbones linking to a server, and wherein regular nodes having limited energy storage link to the backbones. When one energy-rich node malfunctions, the energy-rich node, which is posterior to the malfunctioning energy-rich node, searches for and links to a linkable neighboring energy-rich node on the backbone. If there is none linkable neighboring energy-rich node, the regular nodes are used to form a temporary tunnel until the malfunctioning energy-rich node has been repaired. The present invention can relieve the influence of hot spots, increase the robustness of the wireless sensor network, and prolong the service life of the wireless sensor network. | 03-03-2011 |
20120131430 | MULTIMEDIA BOOKMARK METHOD AND SYSTEM THEREOF - The present invention discloses a multimedia bookmark method and a system thereof. The method of the present invention comprises steps: providing a plurality of digital annotations for an information object; creating a bookmark containing an ordered set organized according to a time relativity, a file relativity or a user-defined attribute of the digital annotations; and presenting the bookmark and the information object corresponding to the bookmark. Thereby, the present invention provides complete, meaningful and multi-aspect bookmarks, enabling users to easily understand and conveniently use the annotations. | 05-24-2012 |
20120331295 | METHOD FOR KEY GENERATION, MEMBER AUTHENTICATION, AND COMMUNICATION SECURITY IN DYNAMIC GROUP - The present invention provides a method for keys generation, member authentication and communication security in a dynamic group, which comprises steps: assigning each member an identification vector containing common group identification vector elements and an individual identification vector element, and generating an authentication vector and an access control vector for each member according to the identification vector; using the identification vector elements to generate public key elements and establish an authentication public key and an access control public key; and using a polynomial and the identification vector to generate a private key. The present invention uses these public keys and private keys, which are generated from the identification vectors, to implement serverless member authentication and data access control, whereby is protected privacy of members and promoted security of communication. | 12-27-2012 |
20130117437 | METHOD FOR ESTABLISING TCP CONNECTING ACCORDING TO NAT BEHAVIORS - The present invention is to provide a method for establishing TCP connection according to NAT (Network Address Translation) behaviors, which is applied to a network system having a NBA (NAT Behavior Aware Server) located in the Internet and connected to two NATs in two private networks respectively. The method enables two network devices in the respective private networks to send testing messages to the NBA via the respective NATs. In response, the NBA sends reply messages to each network device to test the behaviors of the NATs respectively. Afterward, each network device generates a test result message according to each behavior of the corresponding NAT and sends the same to the NBA. Based on the test result messages, the NBA selects an optimal traversal technique from candidate traversal techniques, thereby allowing the network devices to respectively and directly traverse the NATs and establish a direct TCP connection therebetween. | 05-09-2013 |
20130132809 | STRUCTURE AND METHOD FOR WIDGET PERSONALIZATION AND WIDGET INTERACTION - The present invention provides a structure and method for widget personalization and widget interaction, wherein user preference keys and user preference values are generated according to user profiles and binding configurations of a plurality of widgets, and wherein the keys and values of a widget are added to URL of the widget, whereby a personalized widget is attained after the widget is reloaded. The setting data of a widget, including a plurality of element values, are stored in a document object model (DOM). When relativities exist between widgets, the related element values are transferred from one widget to other widgets through a transfer module to replace the element values in DOM of the other widgets and update the other widgets. | 05-23-2013 |
20140052939 | INTEGRATED STORAGE PLATFORM SYSTEM AND METHOD THEREOF - The present invention discloses an integrated storage platform system and a method thereof. The system comprises at least one adaption module respectively connecting with at least one storage space and each performing a plurality of adaption settings corresponding to one storage space; a storage administration module connecting with the adaption modules and processing the files of the storage spaces; and an access interface connecting the storage administration module, operated by a user to access the storage space through the storage administration module and the adaption module, and presenting access results to the user. The present invention establishes different adaption modules to enable the user to link to and access different types of storage spaces. | 02-20-2014 |
20140310356 | METHOD FOR EXCHANGING NETWORK MESSAGES IN DISTRIBUTED MANNER - The present invention is to provide a method for enabling a tracker/coordinator in a P2P system to receive server address queries from network devices through Internet; provide address of a protocol server to the network devices according to the server address queries, so as for the network devices to conduct NAT behavior tests on NAT routers connected therewith through the protocol server; assigning a first network device with the router incapable of forwarding messages to a second network device with the router capable of forwarding messages according to the test results; providing a mapped address of a port of the second network device to a third network device, when receiving a port query from the third network device and determining that the port query corresponds to the first network device, so as for the third network device to directly connect with the first network device through the second network device. | 10-16-2014 |
20140310397 | NETWORK SYSTEM CAPABLE OF IMPLEMENTING STUN WITH THE ASSISTANCE OF TWO NETWORK DEVICES AND METHOD THEREOF - The present invention is to provide a network system, which comprises a coordinator server located in a public network; first and second NATs (Network Address Translators) located in first and second private networks and configured as a full-cone NAT, respectively; first and second network devices located in the first and second private networks and connected to the public network through the first and second NATs, respectively, wherein each of the first and second network devices has registered two mapped addresses with the coordinator server, respectively; a third NAT located in a third private network; and a third network device located in the third private network and connected to the public network through the third NAT, wherein the third network device can obtain the mapped addresses from the coordinator server and, based on the mapped addresses, conduct NAT behavior tests on the third NAT through the first and second network devices. | 10-16-2014 |
20140362822 | SYSTEM ARCHITECTURE AND METHOD FOR SERVICE CONTINUITY IN HETEROGENEOUS WIRELESS NETWORK - The present invention provides a system architecture and a method for service continuity in heterogeneous wireless networks, which comprises a handover decision module and a session continuity module. The handover decision module is responsible for maintaining link layer association and network layer reachability in according to the underlying network conditions to fulfill the service requirement of applications. When acting as a sender, the session continuity module will select transmission path(s), reestablish the transport connection(s) and tag packets with session IDs and sequence numbers. When acting as a receiver, the session continuity module will identify and reorder packets using session IDs and sequence numbers, regardless of the IP addresses and ports of the packets. To sum up, the present invention can provide service continuity and multipath transmission for network devices. | 12-11-2014 |