Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

6147 results about "Station" patented technology

In IEEE 802.11 (Wi-Fi) terminology, a station (abbreviated as STA) is a device that has the capability to use the 802.11 protocol. For example, a station may be a laptop, a desktop PC, PDA, access point or Wi-Fi phone. An STA may be fixed, mobile or portable. Generally in wireless networking terminology, a station, wireless client and node are often used interchangeably, with no strict distinction existing between these terms. A station may also be referred to as a transmitter or receiver based on its transmission characteristics. IEEE 802.11-2007 formally defines station as: Any device that contains an IEEE 802.11-conformant media access control (MAC) and physical layer (PHY) interface to the wireless medium (WM).

Media delivery using quality of service differentiation within a media stream

A WLAN system adapted to apply QoS differentiation to a media stream to be transmitted from a transmitting station (STA) to a receiving STA of that system. The transmitting STA processes the media stream to generate a base sub-stream and one or more enhancement sub-streams for subsequent transmission over a wireless communication channel and assigns different priorities to different sub-streams. Depending on the channel conditions, the transmitting STA may select to discard, without transmission, portions of data from enhancement sub-streams. The selection process is based on the assigned priority and operates to preserve as much of relatively high-priority data as possible. The receiving STA then processes the received data to generate a reconstructed media stream, which provides signal quality equal to or better than the signal quality supported by the base sub-stream. Advantageously, a WLAN system of the invention is adapted to change signal quality dynamically and incrementally in a manner commensurate with current channel conditions without the need for communication between the higher and lower network layers. In addition, it provides gradual and graceful degradation of signal quality when channel conditions deteriorate as opposed to abrupt degradation inherent in analogous prior art systems.
Owner:AVAGO TECH INT SALES PTE LTD

Network manager for cable television system headends

A novel network manager for use with a cable television system headend capable of monitoring and managing headend components and set top terminals in a television delivery system is described. The invention relates to methods and apparatus that manage and coordinate the reception of various programming and control signals at a headend. The invention manages and coordinates the storage of such signals for intelligent selection and distribution to set top terminals. The invention makes use of a receiver or set of receivers, a work station, a program control information processing component, a network management CPU, databases, control software and an instruction memory. The invention uses these components to manage and monitor certain headend components, such as signal reception equipment, an authorization component, a file server, MPEG decoders, a digital buffer with frame repeat and channel modulators. The invention is particularly useful in processing and responding to upstream information and subscriber communications received from set top terminals. In so doing, the invention accommodates various system services, including (1) near video on demand (NVOD), (2) virtual video on demand (VVOD), (3) video on demand (VOD), (4) interactive program services, (5) program suggestion features, (6) advertisement targeting, (7) generation of standard and custom menus, and (8) data spooling and text overlaying.
Owner:COMCAST IP HLDG I

Method and apparatus for displaying health status of network devices

A method and apparatus for concurrently displaying from a single window on a network management station the health status of all network devices and objects of a computer network. The network devices may be categorized according to state or device type, as determined by the network manager. The method and apparatus provides a network manager with the ability to determine the current state of network devices and objects within an enterprise network and invoke further actions such as configuration, performance, fault, and security management tasks. The network manager can drag and drop icons from one network management system application window to another network management system application window to obtain fault information about network devices and objects, thus allowing multiple network management system applications to run concurrently on the same network management station. The network manager is further able to add new network devices and objects by dragging site, folder or device icons from one network management system application window to a second network management system application window for displaying the health status of the new devices. The dragged-in devices are added to the appropriate status panes within the second window according to the method of the present invention.
Owner:NORTEL NETWORKS LTD

System and method for predicting network performance and position location using multiple table lookups

This invention provides a system and method for the design, prediction, and control of wireless communication networks by combining RF channel data from multiple lookup tables, each of which correlates an RF channel characteristic to some higher order network performance metric. Network performance predictions, and resulting network control instructions, are produced from look-up tables of measured or predicted data relating one or more RF channel characteristics to one or more network performance metrics. These lookup tables are uniquely constructed by site-specific location, technology, wireless standard, or equipment types.
Owner:WIRELESS VALLEY COMM

Identifying works for initiating a work-based action, such as an action on the internet

A system is described for linking traditional media works, such as print and broadcast media for example, to a more interactive media conduit, such as the Internet. The system avoids the need to modify the media work in anyway. Instead, it employs a passive recognition system that uniquely identifies the specific work, such as a particular television or radio broadcast or printed commercial. The identification may be based in intra-work and / or extra-work information. Several different embodiments / environments are described. The best embodiment may depend, at least in part, on costs of hardware and communication. These costs can change over time. In one embodiment, all of the databases and computation are performed at the user's premises. In another embodiment, all of the databases and computation occur at remote sites that user premise equipment can query using uniquely identifying extra-work information, such as the time, place and station on which the work was broadcast. This second embodiment is most suitable for content that is published, e.g. magazines, newspapers, etc., or broadcasted, e.g. cable, satellite and terrestrial television and radio. Alternative embodiments, in which various operations are performed at both the user's premises and remote locations are also possible.
Owner:NETWORK 1 TECH

Remotely authenticated operation method

The objective of this invention is to provide continuous remote authenticated operations for ensuring proper content processing and management in remote untrusted computing environment. The method is based on using a program that was hidden within the content protection program at the remote untrusted computing environment, e.g., an end station. The hidden program can be updated dynamically and it includes an inseparable and interlocked functionality for generating a pseudo random sequence of security signals. Only the media server that sends the content knows how the pseudo-random sequence of security signals were generated; therefore, the media server is able to check the validity of the security signals, and thereby, verify the authenticity of the programs used to process content at the remote untrusted computing environment. If the verification operation fails, the media server will stop the transmission of content to the remote untrusted computing environment.
Owner:ATTESTWAVE LLC

Who said that? teleconference speaker identification apparatus and method

The invention relates to an apparatus and method for identifying teleconference participants. More particularly, the invention relates to a conference system that includes an initialization means for initializing a call between participants located in at least two remote stations and an identification means for identifying one of the participants in one remote station responsive to a request from another of the participants in another remote station. The initialization means comprises table means for creating a table associating each of the participants to a position in a particular remote station and including a recorded voice segment of each of the participants. The identification means uses the table to identify the participant last to speak by looking up the position of the last speaker on the table and playing back the recorded voice segment of the participant associated with that position.
Owner:CISCO TECH INC

System and method for notifying an offline global computer network user of an online interaction

A system and method for notifying an offline global computer network user of an online interaction in which the offline user could participate. The system and method specify notification criteria of the offline user, monitor activities occurring on the global computer network, compare the activities to the notification criteria, and, if the activities satisfy the notification criteria, forward an offline communication to the offline user, which notifies the offline user of the online interaction. Examples of the online interactions include chat rooms, game sites, instant messaging services, auctions, and calls made over the global computer network. Examples of the offline communication include calls to a wireline telephone, calls to a wireless telephone, messages to a caller identification device, messages to a wireless access protocol device, messages to a one-way pager, and messages to an interactive pager.
Owner:BELLSOUTH INTPROP COR

Implementation of serverless applications over wireless networks

InactiveUS20060030339A1Facilitates display of and selectionFacilitates associationPosition fixationRadio/inductive link selection arrangementsHandsetTelephony
The location of a wireless handset is determined from a station such as another wireless handset in order, for example, to keep track of the current location of a child, friend or asset.
Owner:CELLITITUDE

System and method for installing an auditable secure network

A system and method for generating and remotely installing a private secure and auditable network is provided. Node identification, link, and application information is input into a template. A generator generates components using the information in the template and the components are remotely installed using an installation server. The components include agent modules which are each installed at predetermined target site and establish communication with the installation server to facilitate the download of other components, including application software and configuration files. Each node can only be installed once and is specific to a predetermined target site. For each link, a unique pair of keys is generated in a form which is not human readable, each key corresponds to a different direction of communication over the link. Data transmitted between nodes is encrypted using public-private key pairs. At least one monitor node manages the security of the network, strobes keys, and may take nodes out of the network in the event of a security violation. In such a case, one or more nodes, or the entire network, may be regenerated and installed anew. Throughout the generation and installation a plurality of verifications, authorizations, and password entries may be required by independent groups to arrive at the network. Preferably, the installation is audited by several groups, and the overall operation may be audited by a second monitor node to detect the presence of an interposed “pirate” node.
Owner:ANGEL SECURE NETWORKS

Method and system for optimally serving stations on wireless LANs using a controlled contention/resource reservation protocol of the IEEE 802.11e standard

A method for optimally serving Stations (STA) on Wireless Local Area Network (LAN) using a Controlled Contention / Resource Reservation protocol of the IEEE 802.11e standard. The Wireless LAN includes multiple STAs, mobile or Stationary, airlinked to an access point as a Basic Service Set (BSS). A Hybrid Coordinator (HC) is co-located with the access point for allocating the bandwidth for the BSS using a Controlled Contention / Resource Reservation protocol defined in the IEEE Standard 802.11(e). The HC transmits Contention Control (CC) frames and initiates Controlled Contention Intervals (CCI) having a selected number of slotted intervals. HC receives Resource Reservations (RR) detailing bandwidth needs from STA contenders during a specified time interval called the Controlled Contention Interval (CCI.). Several parameters are installed in each CC for contention control purpose. The several parameters are controlled to optimize efficient use of the wireless medium and reduce access delays for RR frames contending for the wireless medium.
Owner:AMERICAN TELEPHONE & TELEGRAPH CO

Personnel location and monitoring system and method for enclosed facilities

A wireless time-of-flight distance measurement device a motion detector is used at each of a plurality of stations in a wireless network in an enclosed facility to accurately locate a badge-wearing person near the station. The location, badge number and time of detection are transmitted through the network and stored in a computer memory. In a healthcare facility, hand washing detectors are located at some of the stations and caused to energize a hand wash status indicator light on the badge when the wearer has washed his or her hands. The light remains “on” for only a certain length of time, but will be extinguished sooner by a monitor device near each patient when the healthcare worker leaves the vicinity of the patient. These events also are transmitted and stored so that a timed record of each worker's hand washing and visits to patients is created.
Owner:XHALE

Improving access to congested networks

For a station in a data communication network having a predefined limit of congestion for handling data immediately undergoing transmission through the station, a system for improving service given to network users requesting new access services to support new transmissions through the same station while the predefined congestion limit is exceeded. This system contains: a first element for determining when the predefined limit is exceeded by existing data transmissions through the station; and a second element, responsive to requests for new access services that are received while the predefined limit is being exceeded for: concurrently processing the request for new service and reducing the quality of service (QoS) to selected users. The reductions in QoS generally have the effects of reducing the speed / priority of handling of data being transmitted to or from the selected users, and of freeing up of sufficient bandwidth to accommodate the requested new access services. The system includes a third element for restoring / upgrading QoS, to users whose QoS has been reduced, when bandwidth usage subsides to a level allowing for such restoration. This latter level is sufficiently less than the congestion limit to provide a hysteresis effect that delays actions by the third element sufficiently to prevent successive actions of said second and third elements from producing unstable fluctuations in the operation of the station. Arrangements are disclosed for applying the invention in a cable television network environment and in private network environments serving a single business enterprise such as a banking institution.
Owner:IBM CORP

System and method for efficiently accessing affiliated network addresses from a wireless device

A system and method for a wireless device to efficiently access affiliated addresses across linked topical communities, such as an Internet WebRing, through a wireless gateway. The invention includes a processing unit running on a wireless device controlled by an affiliated address control program. The processing unit includes a processing unit with a subject processor, a program store for holding an apparatus control program, a network address sub-processor, an address array referrer, an input mechanism, a display device for selecting retrieved affiliated addresses, and a high speed memory for holding site address selectors and associated content buffer. The wireless device communicates with a network via conventional wireless communication means which provides a path for updating the content buffer and array referrer, as well as transference of other types of sensory data. Means for predicting search failures is also integrated into the apparatus control program of the processing unit. Data received from the wireless gateway is statistically preprocessed then supplied to a processor called a network address sub-processor. The system then incorporates sorted affiliated addresses into the system on the wireless device to make possible a real-time detector system for a wireless device accessing content through a wireless gateway. The system may be offered as a service benefit for wireless device subscription or as a per occurrence chargeable item for a wireless subscriber. The system relieves the standard “hit-or-miss” method for affiliated address selection and site address storage and retrieval.
Owner:MOBULAR TECH

Wireless location routing applications and architecture therefor

A system for wirelessly locating mobile station / units (MS) and using resulting location determinations for providing a product or service is disclosed. The system is useful for routing an MS user to a plurality of desired locations, alerting an MS user to a nearby desired product or service based on satisfaction of user criteria, and providing enhanced security and 911 response. In one embodiment, the system responds to MS location requests via, e.g., Internet communication between a distributed network of location processing sites. A plurality of locating technologies including those based on: (1) TDOA; (2) pattern recognition; (3) timing advance; (5) GPS and network assisted GPS, (6) angle of arrival, (7) super resolution enhancements, and (8) supplemental information from low cost base stations can be activated, in various combinations, by system embodiments. MS location difficulties resulting from poor location accuracy / reliability and / or poor coverage are alleviated via such technologies in combination with automatically adapting and calibrating system performance according to environmental and geographical changes so that the system becomes progressively more comprehensive and accurate. Further, the system can be modularly configured for use in location signaling environments ranging from urban, dense urban, suburban, rural, mountain to low traffic or isolated roadways. Accordingly, the system is useful for 911 emergency calls, tracking, routing, people and animal location including applications for confinement to and exclusion from certain areas.
Owner:MOBILE MAVEN

System and method for deriving IPv6 scope identifiers and for mapping the identifiers into IPv6 addresses

A system and method for use at an intermediate network device employs Virtual Local Area Network (VLAN) designations as Internet Protocol version 6 (IPv6) link identifiers, and maps VLAN designations to IPv6 site identifiers (IDs). The system also generates a compacted look-up address based on the destination address specified within a received network message, such as an IPv6 packet. For a network message having a link-local unicast destination address, the VLAN ID associated with the port on which the message was received is encoded within the corresponding look-up address. For a network message having a site-local unicast address, the VLAN ID associated with the port on which the message was received is used to derive a site ID which is then encoded within the corresponding look-up address. For a network message having a multicast destination address, if the address's scope value is between hexadecimal “2” and “4” inclusive, the VLAN ID associated with the port on which the message was received is encoded within the corresponding look-up address. If the scope value is between hexadecimal “5” and “D”, inclusive, the VLAN ID associated with the port on which the message was received is used to derive a site ID which is then encoded within the corresponding look-up address. The look-up addresses are applied to a forwarding information base (FIB) to derive the outbound interface(s) from which the message is to be forwarded.
Owner:CISCO TECH INC

Automatic teleconferencing control system

An automatic teleconferencing control system uses a trigger definition database to define trigger criteria and corresponding conference control commands for corresponding trigger functions. Trigger criteria may relate to configuration profiles set for each participant or to conference level policy decisions. Participant attribute changes and media flows among participant stations on a conference are analyzed in accordance with the trigger criteria, and when trigger criteria are identified a corresponding conference control command is issued.
Owner:GOOGLE TECH HLDG LLC

Mesh network and piconet work system and method

A method of distributed control of a wireless mesh network without knowledge of global topology. The method includes: a station joining the network with any current member by propagating the join-request, or two meshes merging using the steps of: one mesh joining the other as a whole and then re-synchronizing its timing. The method further includes: first, each station periodically transmits a beacon; second, in response to a beacon being no longer detected, a station transmitting a bitmap of stations that it can still receive; third, each station responds by adding stations that it can receive with all of the bitmaps received from other members, and retransmitting the updated bitmap; fourth, after time for all stations to respond, all stations base current membership on the bitmap. The method further includes: determining sharable time slots that will not interfere with neighbors or other slot sharers, using and then releasing those slots.
Owner:ASTER WIRELESS

Methods for optimizing time variant communication channels

Methods and apparatus for optimizing wireless communications channels by employing multi-channel modulation techniques in wireless communication systems is disclosed. The wireless communications channel may comprise tones, and data may be allocated differently among the different tones according to the channel characterization measurements. In one embodiment, a method may include: transmitting data over a wireless channel using a first station (e.g., an access point), receiving the data using a second station, performing calculations on the received data, and allocating subsequent data transmissions among the tones according to the calculations. Other embodiments may utilize superfluous data transmissions-for example, data coming from the access point that is intended for other stations-in order to calculate channel characterization. Preferably, any portion of the transmitted data (e.g., preamble, header, data, etc.) may be used to calculate channel characterization.
Owner:TEXAS INSTR INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products