$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Encrypting method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication network 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0837423 (1997-04-17)
발명자 / 주소
  • Heer Daniel N.
  • Rance Robert J.
출원인 / 주소
  • Lucent Technologies Inc.
대리인 / 주소
    Gibbons, Del Deo, Dolan, Griffinger & Vecchione
인용정보 피인용 횟수 : 177  인용 특허 : 3

초록

The specification relates to the encryption of data transmitted over a broadband multiple access bi-directional hybrid fiber/coax (HFC) network. The method supports downstream broadcast encryption from headend to cable modem, and also provides for encryption of transmissions from cable modems back t

대표청구항

[ What is claimed is:][ PDUs;][ PDU encryption keystream sample values to at least one table, said at least one table configured as a pseudo-shift register;][ PDU encryption keystream sample values from said at least one table after an appropriate temporal delay, said appropriate temporal delay chos

이 특허에 인용된 특허 (3)

  1. Mayginnes Kevin B. (Fort Worth) Oberlies Bruce D. (Fort Worth TX), Decryption device with variable clock.
  2. Weiss Kenneth P. (15 Dwight St. Boston MA 02109), Method and apparatus for synchronizing generation of separate, free running, time dependent equipment.
  3. Audebert Yves,FRX, System for controlling access to a function having clock synchronization.

이 특허를 인용한 특허 (177)

  1. Allen, Jr.,George Coleman; Partridge,Steven R.; Sigarto,Samuel; Sigarto,Tina; Bi,Haifeng; Stephenson,Richard Wayne, ATM-based distributed network switching system.
  2. Hetzler, Steven Robert; Smith, Daniel Felix, Anamorphic codes.
  3. Crocker, Daniel W.; Ng, Daniel Yu Kwong, Apparatus and method for manipulating packet ordering over parallel links of a crossbar based switch fabric.
  4. Kwon, O Hyung; Chae, Jong Seok, Apparatus and method for protecting ATM header from the burst error.
  5. Zeng, Shengyou; Frazier, Jason; Littlefield, Joshua B.; Salowey, Joseph A., Authentication for devices located in cable networks.
  6. Cunetto, Philip; Doherty, James M.; Lu, Chien-Chun; Schroeder, Timothy Paul, Authentication for use of high speed network resources.
  7. Cunetto,Philip; Doherty,James M.; Lu,Chien Chun; Schroeder,Timothy Paul, Authentication for use of high speed network resources.
  8. Varma, Subir, Automatic retransmission and error recovery for packet oriented point-to-multipoint communication.
  9. Varma, Subir, Automatic retransmission and error recovery for packet oriented point-to-multipoint communication.
  10. Varma, Subir, Automatic retransmission and error recovery for packet oriented point-to-multipoint communication.
  11. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  12. Costello, Edward J.; Wegener, Albert W.; Linden, Thomas M.; Swerdlow, Serge, Broadcast program capture and playback enhancement signal structure, receiver, and method.
  13. Chen, Wenge; Chou, Peter; Liu, Kuo-Hul; Sinwald, Michael P.; Soon, Shih Chung, Client server SVC-based DSL service.
  14. Goto, Fumihide, Communication apparatus, control method, and storage medium.
  15. He, Chengdong, Communication method and device.
  16. Pearson,Siani Lynne; Chan,David, Computer platforms and their methods of operation.
  17. Ramachandran, Arun C.; Ramachandran, Puvichakravarthy; Velusamy, Lakshmanan, Computing the eth root of a number using a variant of the RSA algorithm (for even e's).
  18. Cunetto,Philip; Doherty,James M.; Lu,Chien Chun; Schroeder,Timothy Paul, Controller based call control for ATM SVC signaling.
  19. Rezaiifar, Ramin; Bender, Paul E.; Quick, Jr., Roy Franklin, Cryptosync design for a wireless communication system.
  20. Dzung, Dacfey, Data encryption on the physical layer of a data transmission system.
  21. Basil,Robert P.; Terry, legal representative,Dorothy; Mitchell,Gordon Thomas; Ree,Bradley Richard; Terry, deceased,John B., Data scrambling system for a shared transmission media.
  22. Nishimura,Takuya; Iitsuka,Hiroyuki; Yamada,Masazumi, Data transfer method.
  23. Bar-Sade, Idan; Pasternak, Eliezer; Park, John; Zhang, Bin, Digital microwave radio link with a variety of ports.
  24. Bar-Sade, Idan; Pasternak, Eliezer; Zhang, Bin; Levin, Gregg, Digital microwave radio link with adaptive data rate.
  25. Bar-Sade, Idan; Pasternak, Eliezer; Zhang, Bin, Digital microwave radio system and method with encryption.
  26. Manabe, Koji, Digital video and audio data encryption, decryption and system authentication.
  27. Colando, Christian J.; Tan, Albert W.; Howard, Dane M.; Tessiore, Lorenzo; Lang, Eric Glenn, Display of wireless data.
  28. Allen, Jr.,George Coleman; Partridge,Steven R.; Sigarto,Samuel; Sigarto,Tina; Bi,Haifeng; Stephenson,Richard Wayne, Distributed virtual tandem switch.
  29. David L. Weigand, Dynamic recovery of a TDMA signal during an undetected marker sequence.
  30. Zeng, Shengyou, Early authentication in cable modem initialization.
  31. Kim,Jung Im; Ko,Young Jo, Encoding/decoding apparatus using low density parity check code.
  32. Yonge, III, Lawrence W.; Katar, Srinivas, Encrypting data in a communication network.
  33. Chen, Wenge; Chou, Peter; Liu, Kuo-Hui; Sinwald, Michael P.; Soon, Shih Chung, Extended virtual user-to-network interface with ATM network.
  34. Chen,Wenge; Chou,Peter; Liu,Kuo Hui; Sinwald,Michael P.; Soon,Shih Chung, Extended virtual user-to-network interface with ATM network.
  35. Bi,Haifeng; Allen, Jr.,George Coleman; Beamon,Randy; Chen,Weijing; Doerner,Janice Elaine; Esfandiari,Mehran; Gibbons,Gary Jonathan; Kaschube,Paul August; Nance,Bruce Allen; Pinch,John; Sigarto,Tina; , Fault tolerant virtual tandem switch.
  36. England, Paul; Peinado, Marcus, Generating, migrating or exporting bound keys.
  37. Holtzman, Michael; Barzilai, Ron; Elhamias, Reuven; Cohen, Niv, Hardware driver integrity check of memory card controller firmware.
  38. Felsher, David Paul, Information record infrastructure, system and method.
  39. Proudler, Graeme John, Information security system.
  40. Majidi-Ahy, Reza; Hakim, Joseph; Varma, Subir, Integrated self-optimizing multi-parameter and multi-variable point to multipoint communication system.
  41. Vialen, Jukka; Niemi, Valtteri, Integrity check in a communication system.
  42. Vialen, Jukka; Niemi, Valtteri, Integrity check in a communication system.
  43. Haney, Richard D., Inter-autonomous networking involving multiple service providers.
  44. Gorman, Bryan; Rush, David A.; Wiese, Robert, Interface using an ISH and a service manager.
  45. Yonge, III, Lawrence W., Managing spectra of modulated signals in a communication network.
  46. Yonge, III, Lawrence W., Managing spectra of modulated signals in a communication network.
  47. Gonzalez, Carlos J.; Ferchau, Joerg; Jogand-Coulomb, Fabrice, Mass storage device with automated credentials loading.
  48. Gonzalez, Carlos J.; Ferchau, Joerg; Jogand-Coulomb, Fabrice, Mass storage device with automated credentials loading.
  49. Yonge, III, Lawrence W.; Katar, Srinivas; Kostoff, II, Stanley J.; Earnshaw, William E.; Blanchard, Bart W.; Gargrave, Timothy R., Medium access control layer that encapsulates data from a plurality of received data units into a plurality of independently transmittable blocks.
  50. Yonge, III, Lawrence W.; Katar, Srinivas; Kostoff, II, Stanley J.; Earnshaw, William E.; Blanchard, Bart W.; Gargrave, Timothy R., Medium access control layer that encapsulates data from a plurality of received data units into a plurality of independently transmittable blocks.
  51. Yonge, III, Lawrence Winston; Katar, Srinivas; Kostoff, II, Stanley Joseph; Earnshaw, William Edward; Blanchard, Bart W.; Gargrave, Timothy R., Medium access control layer that encapsulates data from a plurality of received data units into a plurality of independently transmittable blocks.
  52. Amalfitano, Carlo; Proctor, Jr., James A., Method and apparatus for a spectrally compliant cellular communication system.
  53. Patwardhan, Ravindra; Ulupinar, Fatih; Agashe, Parag Arun; Prakash, Rajat, Method and apparatus for generating a cryptosync.
  54. Lee, Adam Y.; Youn, Paul, Method and apparatus for generating random data-encryption keys.
  55. Rose, Gregory G., Method and apparatus for securely transmitting distributed RAND for use in mobile station authentication.
  56. Rose, Gregory G., Method and apparatus for securely transmitting distributed RAND for use in mobile station authentication.
  57. Holtzman, Michael; Jogand-Coulomb, Fabrice, Method and apparatus for upgrading a memory card that has security mechanisms for preventing copying of secure content and applications.
  58. Roelofsen,Gerrit; Van Bruchem,Dirk Jan Jacobus; Muller,Frank; Rombaut,Willem, Method and device for cryptographically processing data.
  59. He, Chengdong, Method and device for negotiating security capability when terminal moves.
  60. Harvey, Elaine; Walnock, Matthew, Method and system for detecting characteristics of a wireless network.
  61. Harvey, Elaine; Walnock, Matthew, Method and system for detecting characteristics of a wireless network.
  62. Harvey, Elaine; Walnock, Matthew, Method and system for detecting characteristics of a wireless network.
  63. Harvey, Elaine; Walnock, Matthew, Method and system for detecting characteristics of a wireless network.
  64. Rosengard,Phillip I.; Krunz,Marwan M., Method and system for encapsulating cells.
  65. Denney,Lisa; Grand,Gerald; Lu,Yushan, Method and system for flexible channel association.
  66. Sandberg, Melanie J.; Schaffer, Scott J., Method and system for generating ciphertext and message authentication codes utilizing shared hardware.
  67. Sandberg, Melanie J.; Schaffer, Scott J., Method and system for generating ciphertext and message authentication codes utilizing shared hardware.
  68. Sandberg, Melanie J.; Schaffer, Scott J., Method and system for generating ciphertext and message authentication codes utilizing shared hardware.
  69. Harvey, Elaine; Walnock, Matthew, Method and system for locating a wireless access device in a wireless network.
  70. Ammon, Ken; O'Ferrell, Chris; Mitzen, Wayne; Frasnelli, Dan; Wimble, Lawrence; Yang, Yin; McHale, Tom; Doten, Rick, Method and system for wireless intrusion detection.
  71. Pietilainen, Antti; Pohjola, Olli-Pekka, Method and system in a communication network for allocating and changing link-level addresses.
  72. Tan, Pek Yew; Lim, Wei Lih; Ohmi, Shinichiro; Harada, Yasuo, Method for ensuring medium access in a wireless network.
  73. Geile, Michael J.; Herrmann, James J.; Wadman, Mark S.; Anderson, Brian D., Method for multiple use subchannels.
  74. He, Chengdong, Method for negotiating security capability when terminal moves.
  75. Mallela, Padma P.; Maxwell, Robert Lee; Nix, David J.; Veintimilla, Gregory J.; Yip, Adrian M., Method for synchronous encryption over a communication medium.
  76. Holtzman, Michael; Barzilai, Ron; Elhamias, Reuven; Cohen, Niv, Method of hardware driver integrity check of memory card controller firmware.
  77. Jin, Weon-il; Kim, Dae-youb; Kim, Hwan-joon; Park, Sung-joon; Cheon, Jung-hee; Kim, Myung-hwan; Jho, Nam-su; Yoo, Eun-sun, Method of managing user key for broadcast encryption.
  78. Jin, Weon-il; Kim, Dae-youb; Kim, Hwan-joon; Park, Sung-joon; Cheon, Jung-hee; Kim, Myung-hwan; Jho, Nam-su; Yoo, Eun-sun, Method of managing user key for broadcast encryption.
  79. Medvinsky,Alexander, Method of preventing unauthorized distribution and use of electronic keys using a key seed.
  80. He, Chengdong, Method, system and apparatus for negotiating security capabilities during movement of UE.
  81. He, Chengdong, Method, system and device for negotiating security capability when terminal moves.
  82. Zhang, Muxiang, Methods and apparatus for content scrambling in a communications system.
  83. LaPat,Ronald H.; Nichols,Randall K.; Lekkas,Panos C.; Giorgio,Edward J., Methods and systems for securing information communicated between communication devices.
  84. Geile, Michael J.; Roberts, Harold A., Methods and systems for selecting modulation in an orthogonal frequency division multiplexing system.
  85. Gonzalez, Carlos J.; Ferchau, Joerg; Jogand-Coulomb, Fabrice, Methods used in a mass storage device with automated credentials loading.
  86. Holtzman, Micky; Cohen, Baruch Boris; Barzilai, Ron; Bar-El, Hagai; Deitcher, David, Methods used in a secure memory card with life cycle phases.
  87. Proudler, Graeme John; Burton, William; Kuhlmann, Dirk; Plaquin, David, Methods, devices and data structures for trusted data.
  88. Hoffberg, Steven M., Multifactorial optimization system and method.
  89. Schneider, Marco; Cunetto, Philip, Multiservice use of network connection capability.
  90. Schneider,Marco; Cunetto,Philip, Multiservice use of network connection capability.
  91. Schneider, Marco; Cunetto, Philip, Multiservice use of network connection capability under user-to-network interface signaling.
  92. Schneider,Marco; Cunetto,Philip, Multiservice use of network connection capability under user-to-network interface signaling.
  93. Morais,Dinarte R.; Chen,Ling T.; VanAntwerp,Mark D.; Multerer,Boyd C., Network architecture for secure communications between two console-based gaming systems.
  94. Chen, Wenge; Chou, Peter; Liu, Kuo Hui; Sinwald, Michael P.; Soon, Shih Chung, Peer to peer SVC-based DSL service.
  95. Chen, Wenge; Chou, Peter; Liu, Kuo-Hui; Sinwald, Michael P.; Soon, Shih Chung, Peer to peer SVC-based DSL service.
  96. Haney, Richard D., Private tunnel usage to create wide area network backbone over the internet.
  97. Patel, Sarvar, Processing method for message integrity with tolerance for non-sequential arrival of message data.
  98. Hyams,Kenneth Michael; Biskner,Robert James; Desai,Ronak; Salagame,Satish, Programmable FSM engine using a new CAS application language.
  99. Kung, Fen-Chung; Russell, Jesse Eugene; Walker, Hopeton; Wang, Spencer, Protected IP telephony calls using encryption.
  100. Little, Herb A., Public key encryption with digital signature scheme.
  101. Little, Herb A., Public key encryption with digital signature scheme.
  102. Little, Herb A., Public key encryption with digital signature scheme.
  103. Little, Herbert Anthony, Public key encryption with digital signature scheme.
  104. Yi, Seung June, Radio communication system and method having a radio link control layer.
  105. Yi, Seung June, Radio communication system and method having a radio link control layer.
  106. Yi, Seung June, Radio communication system and method having a radio link control layer.
  107. Geile, Michael J.; Brede, Jeffrey, Ranging and round trip delay timing adjustment in a multi-point to point bidirectional communication system.
  108. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  109. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  110. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  111. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  112. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  113. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  114. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  115. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  116. Bi, Haifeng; Stafford, Matthew Wayne; Sigarto, Tina M, Secure ATM-based distributed virtual tandem switching system and method.
  117. Bi, Haifeng; Stafford, Matthew Wayne; Sigarto, Tina M., Secure ATM-based distributed virtual tandem switching system and method.
  118. Bi,Haifeng; Stafford,Matthew Wayne; Sigarto,Tina M., Secure ATM-based distributed virtual tandem switching system and method.
  119. Debry Roger K., Secure configuration of a digital certificate for a printer or other network device.
  120. Debry, Roger K., Secure configuration of a digital certificate for a printer or other network device.
  121. Holtzman, Micky; Cohen, Baruch Boris; Barzilai, Ron, Secure memory card with life cycle phases.
  122. Holtzman, Micky; Cohen, Baruch Boris; Barzilai, Ron; Bar-El, Hagai; Deitcher, David, Secure memory card with life cycle phases.
  123. Harvey, Elaine; Walnock, Matthew, Spoofing detection.
  124. Geile, Michael J.; Brede, Jeffrey, Synchronization techniques in multipoint-to-point communication using orthogonal frequency division multiplexing.
  125. Geile, Michael J., Synchronized multipoint-to-point communication using orthogonal frequency division.
  126. Geile, Michael J.; Anderson, Brian D.; Brede, Jeffrey; Kirscht, Robert J.; Fort, Michael J.; Elpers, Mark D., Synchronized multipoint-to-point communication using orthogonal frequency division.
  127. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  128. England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  129. Lotspiech, Jeffrey B., System and method for cryptographically authenticating data items.
  130. Lotspiech, Jeffrey Bruce, System and method for cryptographically authenticating data items.
  131. Hoffberg, Steven M., System and method for determining contingent relevance.
  132. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  133. Serbest, Yetik; Bi, Haifeng; Sigarto, Samuel, System and method for measurement-based adaptive caching of virtual connections.
  134. Serbest, Yetik; Bi, Haifeng; Sigarto, Samuel, System and method for measurement-based adaptive caching of virtual connections.
  135. Serbest,Yetik; Bi,Haifeng; Sigarto,Samuel, System and method for measurement-based adaptive caching of virtual connections.
  136. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  137. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  138. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  139. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  140. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  141. Maggenti, Mark A.; Crockett, Douglas M.; Rosen, Eric C.; Kalantri, Sacchindra K. G., System for collecting billable information in a group communication network.
  142. Geile, Michael J.; Brede, Jeffrey, System for multi-frame alignment.
  143. Geile, Michael J.; Herrmann, James J.; Anderson, Brian D.; Wadman, Mark S., System for multiple use subchannels.
  144. Geile, Michael J.; Herrmann, James J.; Wadman, Mark S.; Anderson, Brian D., System for multiple use subchannels.
  145. Liebert, Thomas A.; Michelson, Steven M., System providing dynamic quality of service signaling messages in a cable telephony network.
  146. Liebert, Thomas A.; Michelson, Steven M., System providing dynamic quality of service signaling messages in a cable telephony network.
  147. Liebert,Thomas A.; Michelson,Steven M., System providing dynamic quality of service signaling messages in a cable telephony network.
  148. Hutchings, George T.; Sprunk, Eric; Vince, Lawrence D.; DiColli, Richard; DePietro, Mark, System to deliver encrypted access control information to support interoperability between digital information processing/control equipment.
  149. Lee, Elizabeth L.; Schlesinger, Phillip R., System, apparatus, and method for performing cryptographic validity services.
  150. Dapper, Mark J.; Geile, Michael J.; Hill, Terrance J.; Roberts, Harold A.; Anderson, Brian D.; Brede, Jeffrey; Wadman, Mark S.; Kirscht, Robert J.; Herrmann, James J.; Fort, Michael J.; Buska, Steven P.; Solum, Jeff; Enfield, Debra Lee; Berg, Darrell; Smigelski, Thomas; Tucker, Thomas C.; Hall, Joe; Logajan, John M.; Boualouang, Somvay; Lou, Heng; Elpers, Mark D.; Downs, Matt; Ferris, Tammy; Opoczynski, Adam; Russell, David S.; Nelson, Calvin G.; Samant, Niranjan R.; Chiappetta, Joseph F.; Sarnikowski, Scott, Systems and method for orthogonal frequency division multiplexing.
  151. Dapper, Mark J.; Geile, Michael J.; Hill, Terrance J.; Roberts, Harold A.; Anderson, Brian D.; Brede, Jeffrey; Wadman, Mark S.; Kirscht, Robert J.; Herrmann, James J.; Fort, Michael J.; Buska, Steven P; Solum, Jeff; Enfield, Debra Lea; Berg, Darrell; Smigelski, Thomas; Tucker, Thomas C; Hall, Joe; Logajan, John M.; Boualouang, Somvay; Lou, Heng; Elpers, Mark; Downs, Matt; Ferris, Tammy; Opoczynski, Adam; Russell, David S; Nelson, Calvin G; Samant, Niranjan R; Chiapetta, Joseph F; Sarnikowski, Scott, Systems and method for orthogonal frequency divisional multiplexing.
  152. Dapper, Mark J.; Geile, Michael J.; Hill, Terrance J.; Roberts, Harold A.; Anderson, Brian D.; Brede, Jeffrey; Wadman, Mark S.; Kirscht, Robert J.; Herrmann, James J.; Fort, Michael J.; Buska, Steven P; Solum, Jeff; Enfield, Debra Lea; Berg, Darrell; Smigelski, Thomas; Tucker, Thomas C; Hall, Joe; Logajan, John M.; Boualouang, Somvay; Lou, Heng; Elpers, Mark; Downs, Matt; Ferris, Tammy; Opoczynski, Adam; Russell, David S; Nelson, Calvin G; Samant, Niranjan R; Chiappetta, Joseph F; Sarnikowski, Scott, Systems and method for orthogonal frequency divisional multiplexing.
  153. Dapper, Mark J.; Geile, Michael J.; Hill, Terrance J.; Roberts, Harold A.; Anderson, Brian D.; Brede, Jeffrey; Wadman, Mark S.; Kirscht, Robert J.; Herrmann, James J.; Fort, Michael J.; Buska, Steven P; Solum, Jeff; Enfield, Debra Lea; Berg, Darrell; Smigelski, Thomas; Tucker, Thomas C; Hall, Joe; Logajan, John M.; Boualouang, Somvay; Lou, Heng; Elpers, Mark; Downs, Matt; Ferris, Tammy; Opoczynski, Adam; Russell, David S; Nelson, Calvin G; Samant, Niranjan R; Chiappetta, Joseph F; Sarnikowski, Scott, Systems and method for orthogonal frequency divisional multiplexing.
  154. Dapper, Mark J.; Geile, Michael J.; Hill, Terrance J.; Roberts, Harold A.; Anderson, Brian D.; Brede, Jeffrey; Wadman, Mark S.; Kirscht, Robert J.; Herrmann, James J.; Fort, Michael J.; Buska, Steven P; Solum, Jeff; Enfield, Debra Lea; Berg, Darrell; Smigelski, Thomas; Tucker, Thomas C; Hall, Joe; Logajan, John M.; Boualouang, Somvay; Lou, Heng; Elpers, Mark; Downs, Matt; Ferris, Tammy; Opoczynski, Adam; Russell, David S; Nelson, Calvin G; Samant, Niranjan R; Chiappetta, Joseph F; Sarnikowski, Scott, Systems and method for orthogonal frequency divisional multiplexing.
  155. Geile, Michael J., Systems and method for orthogonal frequency divisional multiplexing.
  156. Geile, Michael J.; Roberts, Harold A.; Anderson, Brian D.; Brede, Jeffrey; Fort, Michael J.; Ferris, Tammy, Systems and method for orthogonal frequency divisional multiplexing.
  157. Geile, Michael J.; Roberts, Harold A.; Anderson, Brian D.; Brede, Jeffrey; Fort, Michael J.; Ferris, Tammy, Systems and method for orthogonal frequency divisional multiplexing.
  158. Geile, Michael J.; Roberts, Harold A.; Brede, Jeffrey, Systems and method for orthogonal frequency divisional multiplexing.
  159. Beser, Nurettin Burcak, Systems and methods for connecting large numbers of cable modems.
  160. Dapper, Mark J.; Geile, Michael J.; Hill, Terrance J.; Roberts, Harold A.; Anderson, Brian D.; Brede, Jeffrey; Wadman, Mark S.; Kirscht, Robert J.; Herrmann, James J.; Fort, Michael J.; Buska, Steven P.; Solum, Jeff; Enfield, Debra Lea; Berg, Darrell; Smigelski, Thomas; Tucker, Thomas C.; Hall, Joe; Logajan, John M.; Boualouang, Somvay; Lou, Heng; Elpers, Mark D.; Downs, Matt; Ferris, Tammy; Opoczynski, Adam; Russell, David S.; Nelson, Calvin G.; Samant, Niranjan R.; Chiappetta, Joseph F.; Sarnikowski, Scott, Systems and methods for orthogonal frequency division multiplexing.
  161. Dapper, Mark J.; Geile, Michael J.; Hill, Terrance J.; Roberts, Harold A.; Anderson, Brian D.; Brede, Jeffrey; Wadman, Mark S.; Kirscht, Robert J.; Herrmann, James J.; Fort, Michael J.; Buska, Steven P.; Solum, Jeff; Enfield, Debra Lee; Berg, Darrell; Smigelski, Thomas; Tucker, Thomas C.; Hall, Joe; Logajan, John M.; Boualouang, Somvay; Lou, Heng; Elpers, Mark D.; Downs, Matt; Ferris, Tammy; Opoczynski, Adam; Russell, David S.; Nelson, Calvin G.; Samant, Niranjan R.; Chiappetta, Joseph F.; Sarnikowski, Scott, Systems and methods for orthogonal frequency divisional multiplexing.
  162. Denney, Lisa V.; Grand, Gerald; Lu, Yushan, Systems for flexible wireless channel association.
  163. Geile, Michael J., Systems for synchronous multipoint-to-point orthogonal frequency division multiplexing communication.
  164. Zhang, Xiaoxia; Yerramalli, Srinivas; Luo, Tao, Techniques for multimedia broadcast multicast service transmissions in unlicensed spectrum.
  165. Meandzija,Branislav N.; Dogan,Mithat Can; Goldburg,Marc C.; Uhlik,Christopher R., Terminal authentication in a wireless network.
  166. Geile, Michael J.; Brede, Jeffrey; Roberts, Harold A., Tone allocation in multipoint-to-point communication using orthogonal frequency division multiplexing.
  167. Pearson, Siani Lynne; Chen, Liqun, Trusted computing platform for restricting use of data.
  168. Haney, Richard D., VPN usage to create wide area network backbone over the internet.
  169. Haney, Richard D., VPN usage to create wide area network backbone over the internet.
  170. Acharya, Arup; Beigi, Mandis; Jennings, III, Raymond Byars; Sailer, Reiner; Verma, Dinesh Chandra, Validation of network communication tunnels.
  171. Allen, Keith Joseph; Chen, Weijing; Salguero, Anna, Virtual private network over asynchronous transfer mode.
  172. Allen,Keith Joseph; Chen,Weijing; Salguero,Anna, Virtual private network over asynchronous transfer mode.
  173. Allen, Jr.,George C.; Bi,Haifeng; Partridge,Steven R.; Sigarto,Samuel; Stephenson,Richard W., Virtual tandem switch.
  174. Haney, Richard D., Wide area network with high quality of service.
  175. McConnell,Von K.; Saxena,Rakesh C., Wireless access gateway to packet switched network.
  176. Powell, Jeffrey M.; Chrystal, Daniel M.; Saliaris, David G., Wireless battery monitoring system and method.
  177. Harvey, Elaine; Walnock, Matthew, Wireless intrusion detection system and method.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로