Buried data stream in a wireless home network
A technology of data flow and main data flow, applied in the field of hidden communication channels, can solve the problem that the advertisement flow is not very safe, not very good, and cannot guarantee the successful transmission of advertisements to users, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] Preferred wireless data protocol and data burial capacity
[0034]The present invention requires the use of wireless protocols and data burial techniques, which are described in detail below. These basic techniques exist in the prior art and do not form part of the present invention. Therefore, the details of these techniques will not be described here. However, the way in which these techniques are combined and the use where these techniques are placed form part of the present invention, which is described in more detail below.
[0035] The wireless protocol used in the present invention is preferably a high-bandwidth protocol capable of supporting multiple channels, and the bandwidth is at least 20 Mbps bandwidth required by HDTV channels. Although several developers have proposed specifications for such wireless protocols, the preferred protocol for use in the present invention is the G2 (or "Gigatoo") protocol developed by Sarnoff Corporation (Princeton, NJ). The...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 