Patent application number | Description | Published |
20080212535 | Controlling and enhancing handoff between wireless access points - A process of maintaining access information between wireless hotspots is disclosed. A logon request from a wireless portable device is received by a first access point of a first wireless hotspot and use of the first access point by the wireless portable device is authenticated to establish an access session. Then, information related to the access session is passed to a shared register accessible by a plurality of wireless hotspots and the access session is monitored to determine whether a disconnect by the wireless portable device occurs. Additionally, when the wireless portable device moves from a coverage area of the first wireless hotspot to one coverage area of one of the plurality of wireless hotspots, the information related to the access session may be used to facilitate access to the one of the plurality of wireless hotspots by the wireless portable device. | 09-04-2008 |
20080305839 | SELECTIVE POWER MANAGEMENT FOR A HAND HELD HOST - A hand held radio host includes circuitry for selectively providing power to radiating transceiver elements and non-radiating application elements according to a plurality of power modes of operation to achieve desired effects and in a way that saves power and extends battery life. In one embodiment of the invention, the hand held host operates in one of three modes. In a full power mode, any selected application element as well as all transceiver elements are powered on at the same time. Thus, for example, a cell phone module, a wireless personal access network module, a wireless local area network module and one of a pager/short message service message module may all be powered on at the same time to receive corresponding messages, calls, data sessions, etc. At the same time that all of the transceiver elements are powered on, any selected application element receives power. Thus, application elements such as address books, calendar functions, games, word processors, and similar other application elements may receive power when selected. | 12-11-2008 |
20090077207 | MULTI-MODE CONTROLLER - Techniques for controlling and managing network access are used to enable a wireless communication device to selectively communicate with several wireless networks. A portable communication device constructed according to the invention can communicate with different networks as the device is moved through the areas of coverage supported by the different networks. As a result, the device can take advantage of services provided by a particular network when the device is within the area of coverage provided by that network. Thus, the device can selectively switch to networks that provide, for example, high speed Internet access, different quality of service, low cost service and/or different services (e.g., voice, data, multimedia, etc.). A multi-mode controller in the device may be used to alternately poll different networks to determine whether the device is within the area of coverage of a network and to selectively establish communications with those networks. | 03-19-2009 |
20090141695 | METHOD OF CREATING INCENTIVES FOR USING WIRELESS HOTSPOT LOCATIONS - A system and method of distributing incentives for wireless hotspots is provided. The method includes providing an access point to a wireless hotspot for wireless devices to wirelessly connect to a larger network in a publicly accessible location, evaluating use statistics of the access point of the wireless hotspot by portable devices, and providing an inducement to a user of the wireless hotspot based on the evaluated use statistics. The system includes a first provider for providing an access point to a wireless hotspot for wireless devices to wirelessly connect to a larger network in a publicly accessible location, an evaluator for evaluating use statistics of the access point of the wireless hotspot by portables devices, and a second provider for providing an inducement to a user of the wireless hotspot based on the evaluated use statistics | 06-04-2009 |
20090296604 | OPTIMIZING NETWORK CONFIGURATION FROM ESTABLISHED USAGE PATTERNS OF ACCESS POINTS - A wireless network configuration device can include a first communication port configured to access a plurality of nodes positioned in a geographic area, a first storage unit configured to store statistical information from the plurality of nodes with respect to communication between the plurality of nodes and the at least one wireless devices. In addition, the wireless network configuration device can include a processor configured to determine an optimized configuration with respect to the plurality of nodes based on the statistical information, and a second communication port configured to provide data with respect to the optimized configuration to the plurality of nodes, wherein the plurality of nodes are adjusted based on the data. | 12-03-2009 |
20090327845 | System and Method For Mitigating Burst Noise In A Communications System - A system, method and computer program product is provided for mitigating the effects of burst noise on packets transmitted in a communications system. A transmitting device applies an outer code, which may include, for example, a block code, an exclusive OR (XOR) code, or a repetition code, to one or more packets prior to adaptation of the packets for transmission over the physical (PHY) layer of the communications system, wherein the PHY layer adaptation may include FEC encoding of individual packets. The outer coded packets are then separately transmitted over a channel of the communications system. A receiving device receives the outer coded packets, performs PHY level demodulation and optional FEC decoding of the packets, and then applies outer code decoding to the outer coded packets in order to restore packets that were erased during transmission due to burst noise or other impairments on the channel. | 12-31-2009 |
20100063820 | CORRELATING VIDEO IMAGES OF LIP MOVEMENTS WITH AUDIO SIGNALS TO IMPROVE SPEECH RECOGNITION - A speech recognition device can include an audio signal receiver configured to receive audio signals from a speech source, a video signal receiver configured to receive video signals from the speech source, and a processing unit configured to process the audio signals and the video signals. In addition, the speech recognition device can include a conversion unit configured to convert the audio signals and the video signals to recognizable speech, and an implementation unit configured to implement a task based on the recognizable speech. | 03-11-2010 |
20110099072 | METHOD OF CREATING INCENTIVES FOR ESTABLISHING HOTSPOT LOCATIONS - A process of creating incentives for wireless hotspots by a service provider is disclosed. An access point is provided to a wireless hotspot for wireless devices to wirelessly connect to a larger network in a publicly accessible location. Use of the access point for a portable device is authenticated by requesting submission of an account identifier to the service provider and billing data for a user of the portable device for use of the access point is generated. Use statistics are evaluated of the access point of the wireless hotspot by portables devices and an inducement is provided to the publicly accessible location based on the evaluated use statistics. | 04-28-2011 |
20110161831 | VIEW SHARING BETWEEN IN-RANGE DEVICES - A system and method for sharing a view between systems in a dynamic wireless communication network. Various aspects of the present invention may comprise a first system communicating information of a view to a display resource of the first system. The first system may establish a two-way wireless communication link between the first system and a second system in the dynamic wireless communication network. The second system may, for example, communicate a request to the first system for the first system to share a view with the second system. The first system may, for example, receive such a request and respond to such a request by communicating information of a view to the second system. The second system may then communicate information of the view to a display resource of the second system. Various aspects may comprise the first and second systems communicating view modification information between the systems. | 06-30-2011 |
20110276655 | Software Applications Incorporating Functionalities Based in Data-Type and Access - A process of sending and receiving data by a wireless device through a wireless network is disclosed. Access criteria are set for at least one of the wireless device and applications running on the wireless device. At least one query is formulated by one of the applications running on the wireless device and the query is sent over the wireless network. Data is received in response to the query, wherein the data received is based on the access criteria and the access criteria relate to an access of the wireless device to the wireless network. | 11-10-2011 |
20120009899 | NETWORK OR ACCESS POINT HANDOFF BASED UPON HISTORICAL PATHWAY - A device for handing off a wireless connection can include a receiver configured to receive a communication signal from a wireless device within a first wireless cell, a first processor configured to determine communication information regarding the first wireless cell, and a storage unit configured to store directional information regarding the first wireless cell. In addition, the device can have a transmitter configured to transmit the directional information to a wireless device located within the first wireless cell, and a second processor configured to provide wireless connection to the wireless device through the receiver and the transmitter. The second processor can Handoff the wireless connection to a second wireless cell. | 01-12-2012 |
20120077459 | CONTROLLING AND ENHANCING HANDOFF BETWEEN WIRELESS ACCESS POINTS - A wireless device includes at least one processor operable to transmit authentication information to one of a plurality network devices associated with a first wireless hotspot; and establish an access session with the one of the plurality of access devices. Information related to the access session is saved in memory accessible by a plurality of wireless access providers. When the wireless device moves from a coverage area of the first wireless hotspot to a coverage area of the one of the plurality of wireless access providers, the saved information facilitates access to the one of the plurality of wireless access providers by the wireless device. The plurality of network devices includes a plurality of access points. The access session is established upon authentication of the wireless device. The wireless device is authenticated based on the authentication information. The memory comprises a shared memory register. | 03-29-2012 |
20120210130 | User Authentication System - Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials. | 08-16-2012 |
20130010962 | Proximity Authentication System - An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of a computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device, Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component, Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip. The cryptographic processing component may cryptographically encrypt/sign the credential received from the token. | 01-10-2013 |
20130124741 | View Sharing Between In-Range Devices - A first system may receive a view from a second system. The first system may establish a direct wireless communication link with the second system that does not connect through any intermediate system between the first system and the second system. Through the direct wireless communication link, the first system sends a view sharing request to the second system. The view sharing request may specify a view that is displayed by the second system and not the first system. The first system may receive view information corresponding to the view and display the view according to the received view information. | 05-16-2013 |
20130155324 | Multiple Device Access Windowing Display - A system and method for receiving and filtering a video signal to change spatial characteristic information of a display window included the video signal. | 06-20-2013 |
20130246499 | Processor Sharing Between In-Range Devices - A system and method for processor sharing between in-range devices. Various aspects of the present invention may comprise establishing a wireless communication link between a first system and a second system, for example, utilizing respective communication modules. A processing capability of the second system that is available for use with the first system may be identified, for example, by respective processing capability identification modules. An indication of the identified processing capability may be output, for example, by respective output modules of at least one of the first and second systems. A request for utilizing the identified processing capability of the second system with the first system may be received, for example, by respective interface modules of at least one of the first and second systems. The requested processing capability of the second system may be utilized with the first system, for example, by respective processing modules of the systems. | 09-19-2013 |
20140181611 | System and Method for Mitigating Burst Noise in a Communications System - A system, method and computer program product is provided for mitigating the effects of burst noise on packets transmitted in a communications system. A transmitting device applies an outer code, which may include, for example, a block code, an exclusive OR (XOR) code, or a repetition code, to one or more packets prior to adaptation of the packets for transmission over the physical (PHY) layer of the communications system, wherein the PHY layer adaptation may include FEC encoding of individual packets. The outer coded packets are then separately transmitted over a channel of the communications system. A receiving device receives the outer coded packets, performs PHY level demodulation and optional FEC decoding of the packets, and then applies outer code decoding to the outer coded packets in order to restore packets that were erased during transmission due to burst noise or other impairments on the channel. | 06-26-2014 |
20140245007 | User Authentication System - Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials. | 08-28-2014 |
20150058620 | Proximity Authentication System - An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of a computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device. Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component. Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip. The cryptographic processing component may cryptographically encrypt/sign the credential received from the token. | 02-26-2015 |