Wireless Network Architecture
    34.
    发明申请
    Wireless Network Architecture 审中-公开
    无线网络架构

    公开(公告)号:US20070248039A1

    公开(公告)日:2007-10-25

    申请号:US11682912

    申请日:2007-03-07

    IPC分类号: H04Q7/00

    摘要: The performance and ease of management of wireless communications environments is improved by a mechanism that enables access points (APs) to perform automatic channel selection. A wireless network can therefore include multiple APs, each of which will automatically choose a channel such that channel usage is optimized. Furthermore, APs can perform automatic power adjustment so that multiple APs can operate on the same channel while minimizing interference with each other. Wireless stations are load balanced across APs so that user bandwidth is optimized. A movement detection scheme provides seamless roaming of stations between APs.

    摘要翻译: 通过使接入点(AP)执行自动信道选择的机制,可以提高无线通信环境的性能和易用性。 因此,无线网络可以包括多个AP,每个AP将自动选择一个信道,使得信道使用被优化。 此外,AP可以执行自动功率调整,使得多个AP可以在相同的信道上操作,同时最小化彼此的干扰。 无线站在AP之间进行负载平衡,从而优化用户带宽。 移动检测方案提供AP之间的站点的无缝漫游。

    Identity verification
    40.
    发明授权

    公开(公告)号:US10068072B1

    公开(公告)日:2018-09-04

    申请号:US12778430

    申请日:2010-05-12

    IPC分类号: G06F21/30 H04L9/32

    摘要: An identity verification system enables the identity of an individual to be verified to others using the internet. An initial identification ceremony is recorded in which the user performs instructions that cannot be known in advance, such as reading text that cannot be anticipated. The initial ceremony can be replayed and authenticated by individuals who already personally know the user. Alternatively, the identity of the user in the initial ceremony can be authenticated using other existing techniques such as KBA. A secondary instruction ceremony is subsequently performed when identity verification is required in order to authorize a directive or transaction. In the secondary instruction ceremony the user performs unforeseeable instructions such as reading text that cannot be anticipated and reading aloud an indication of the transaction. The combination of (a) a visual check that the two samples were recorded by the same person and (b) in the second sample the user performs the requested instruction text gives a high degree of confidence that the person authorized the indicated directive or transaction.