Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

57 results about "CA protocol" patented technology

The CAN bus protocol is defined by the ISO 11898-1 standard and can be summarized like this: The physical layer uses differential transmission on a twisted pair wire. A non-destructive bit-wise arbitration is used to control access to the bus.

Apparatus and accompanying methods for providing, through a centralized server site, an integrated virtual office environment, remotely accessible via a network-connected web browser, with remote network monitoring and management capabilities

InactiveUS6920502B2Readily and easily accommodateExpanding processing and storage capacityMultiple digital computer combinationsProgram controlCA protocolNetwork connection
Apparatus and accompanying methods for use therein for implementing an integrated, virtual office user environment, through an office server(s), through which a remotely stationed user can access typical office network-based applications, including e-mail, file sharing and hosted thin-client programs, through a remotely located network, e.g., WAN, connected web browser. Specifically, a front end, namely a service enablement platform (SEP), to one or more office servers on a LAN is connected to both the WAN and LAN and acts both as a bridge between the user and his(her) office applications and as a protocol translator to enable bi-directional, web-based, real-time communication to occur between the browser and each such application. During initial operation, the SEP, operating under a default profile, establishes, over an analog connection to the WAN, a management session with the site to obtain customer WAN access information, then tears down the analog connection and establishes a broadband WAN connection through which the SEP re-establishes its prior session and obtains a client certificate and its customized profile. The SEP then re-initializes itself to that particular profile.
Owner:AEP NETWORKS

Apparatus and accompanying methods for providing, through a centralized server site, an integrated virtual office environment, remotely accessible via a network-connected web browser, with remote network monitoring and management capabilities

Apparatus and accompanying methods for use therein for implementing an integrated, virtual office user environment, through an office server(s), through which a remotely stationed user can access typical office network-based applications, including e-mail, file sharing and hosted thin-client programs, through a remotely located network, e.g., WAN, connected web browser. Specifically, a front end, namely a service enablement platform (SEP), to one or more office servers on a LAN is connected to both the WAN and LAN and acts both as a bridge between the user and his(her) office applications and as a protocol translator to enable bi-directional, web-based, real-time communication to occur between the browser and each such application. During initial operation, the SEP, operating under a default profile, establishes, over an analog connection to the WAN, a management session with the site to obtain customer WAN access information, then tears down the analog connection and establishes a broadband WAN connection through which the SEP re-establishes its prior session and obtains a client certificate and its customized profile. The SEP then re-initializes itself to that particular profile.
Owner:AEP NETWORKS

Outdoor wireless communication system based on LoRa ad-hoc network

The invention provides an outdoor wireless communication system based on a LoRa ad-hoc network, which is used for solving technical problems of poor mobile network signals in severe environment, short transmission distance and absence of an interactive interface for information sharing of the existing outdoor wireless communication system. The outdoor wireless communication system based on the LoRa ad-hoc network comprises a central processing unit, a positioning module, a Bluetooth module, a peripheral interface, a power supply module, a LoRa communication module and a mobile phone APP terminal; the central processing unit is respectively connected with the positioning module, the Bluetooth module, the peripheral interface, the power supply module and the LoRa communication module; the LoRa communication module constructs a wireless Mesh network with the LoRa communication modules of other systems, and performs reliable data communication through a CSMA/CA protocol and an AODV routing algorithm; and the mobile phone APP terminal and the Bluetooth module perform data exchange through the Bluetooth. The outdoor wireless communication system based on the LoRa ad-hoc network performs communication without the mobile network, has long transmission distance, has the interactive interface for information sharing, and can be applied to the fields, such as the Internet of Vehicles and the Internet of Things.
Owner:XIDIAN UNIV

Long distance CSMA/CA protocol with QoS assurance

The invention discloses a long distance CSMA / CA (Carrier Sense Multiple Access with Collision Avoidance) protocol with QoS (Quality of Service) assurance, a node in a communication channel executes the following steps: (1) entering a backoff stage after sending of the previous data packet is finished in a sending queue; (2) according to priority conditions of the data packets in the existing sending queue, extracting the data packet with the highest priority and arranging the extracted data packet at the head of the sending queue; (3) calculating a channel busy-to-idle ratio and a priority threshold corresponding to the data packet of the head of the sending queue; (4) after the backoff stage is ended, detecting the busy-to-idle ratio of the current channel, and comparing the priority threshold corresponding to the data packet of the head of the sending queue with the busy-to-idle ratio of the current channel, if the busy-to-idle ratio of the current channel is less than the priority threshold corresponding to the data packet, enabling the data packet to be accessed to the channel and sending the data packet, and returning back to the step (1). According to the long distance CSMA / CA protocol with QoS assurance provided by the invention, performance requirement of the data packet with high priority is satisfied through delay of access of the data packet with low priority, and hereby, a collision probability is reduced and a throughput is improved.
Owner:CHINESE AERONAUTICAL RADIO ELECTRONICS RES INST +1

Congestion control in a communication network based on the csma/ca protocol

The present invention relates to a congestion control method for a communication system supporting layered radio channel structure for communication between at least a first communication device and a second communication device, the layered structure comprising at least a physical layer and a medium access layer. The communication system is arranged to offer a first type of service with a first priority order and a second type of service with a second priority order, in the communication system messages comprising a preamble and a payload can be transmitted between devices, each message being separated by at least a period corresponding to a minimum allowable period between two messages. In the method the first communication device first (a) generates (301) a physical layer message pertaining to the first type of service; (b) senses (303) the radio channel idle for at least a period corresponding to the minimum allowable period between two messages; and (c) transmits (305) the physical layer message comprising a special preamble indicative of the type of service the message pertains, wherein the content of the preamble is arranged to be detected by the second communication device within a communication range irrespective of the decoding state of the payload of the transmitted message.
Owner:KONINKLIJKE PHILIPS ELECTRONICS NV

Generation of signals with unpredictable transmission properties for wireless M2M networks

A method and apparatus for generation of signals with unpredictable transmission properties allowing physically secure, unscheduled and interference-resistant communication over machine-to-machine (M2M) networks is claimed. A physical dwell structure comprising time slots and frequency channels is established, and a combination of unpredictable physical dwells, spread spectrum modulation formats employing unpredictable spreading vectors, and additional physical properties allowing unpredictable selection of intended receivers is described. These unpredictable transmission properties enable receivers employing blind detection and signal separation techniques to detect and extract transmissions intended for the receive, and excise transmissions not intended for the receiver, as part of the despreading procedure, and even if those transmissions are received at a much higher power level than the intended transmissions. The resultant system eliminates the ability for an adversary to predict and override M2M transmissions; allows reception of ad-hoc transmissions in dense environments without scheduling, CSMA / CA protocols, or feedback paths enabling scheduling, and allows macrodiverse reception of transmissions at networks of connected receivers, thereby providing additional efficiency and security improvements by exploiting the route diversity of the network.
Owner:AGEE BRIAN G

Protocol message forwarding method and communication equipment

ActiveCN102316022AGuaranteed uptimeOvercome issues affecting normal protocol packetsData switching networksCA protocolCommunication device
The invention discloses a protocol message forwarding method. The method is characterized in that: dividing interfaces of communication equipment into a trustworthy protocol interface and an unknown protocol interface, wherein the trustworthy protocol interface is the interface which establishes protocol interaction; when the communication equipment enables a protocol, distributing queues with n different priorities for the protocol, wherein the queues are used to push different types of messages of the protocol and the n is a natural number which is great than or equal to two; taking the interface which sends the different types of messages of the protocol as the preset trustworthy protocol interface; determining whether the preset trustworthy protocol interface is the trustworthy protocol interface; if the preset trustworthy protocol interface is not the trustworthy protocol interface, taking the preset trustworthy protocol interface as the trustworthy protocol interface and pushing the different types of messages of the protocol respectively from the n different priority queues. The invention also discloses the communication equipment used in the protocol message forwarding. By using the method and the equipment of the invention, abnormal operation of the communication equipment caused by forging the protocol messages can be avoided.
Owner:NEW H3C TECH CO LTD

Ethereum covert communication method based on whisper protocol

The invention discloses an Ethereum covert communication method based on a whisper protocol. The method comprises the steps: coverting and interacting a subject-key pair; encrypting and encoding the message T to be transmitted to obtain T '; randomly generating a statement as an effective carrier payload of a message body in a whisper protocol; carrying out character matching on the T' and a carrier, and recording index information of matched characters; encrypting the index information, and expanding the index information to enable the total length of the message to be a multiple of 256 bytesand serve as an expanded part padding of a message body in a whipper protocol; setting structure information of the whisper letter, setting a theme of the letter as an interactive theme, and encrypting the interactive theme; broadcasting letters to achieve information transmission; enabling the receiver to screen letters through the theme, and decrypt the letters by using the corresponding secretkeys to obtain payload and padding; and decrypting the padding to obtain decrypted information, namely an index, and performing information restoration in combination with the effective carrier. Themethod provided by the invention is high in security, has good anti-interference performance, tamper resistance and detection resistance, and avoids unnecessary consumption when a receiver screens data packets in combination with a theme mechanism of the whisper.
Owner:YANGZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products