Patents by Inventor Dana Chee
Dana Chee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160323313Abstract: There is set forth herein in on embodiment a method wherein configurations are changed. In one embodiment, configurations are changed in such a way that end-to-end requirements continue to be satisfied, the change is at minimum cost, and that at least one variable from a critical set of variables is changed.Type: ApplicationFiled: May 30, 2014Publication date: November 3, 2016Applicant: TT GOVERNMENT SOLUTIONS, INC.Inventors: Sanjai NARAIN, Dana CHEE
-
Patent number: 9094412Abstract: A self-organizing IP multimedia subsystem exhibiting node splitting and node merging functions wherein any node within the self organizing IP multimedia subsystem may assume any role thereby providing node balancing and fault tolerance to an overall network.Type: GrantFiled: April 30, 2010Date of Patent: July 28, 2015Assignee: Telecordia Technologies, Inc.Inventors: Ashutosh Dutta, Dana Chee, Christian Makaya, Subir Das, Fuchun Joseph Lin, Ming Lai, Tsunehiko Chiba, Satoshi Komorita, Hidetoshi Yokota
-
Patent number: 9025771Abstract: A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. Methods for mitigating delay during SA re-association and mitigating the IPSec tunnel overhead for signaling and media at the Mobile Node are given. In one embodiment, SA keys can be transferred from the old P-CSCF to new P-CSCF, enabling the establishment of SAs before Mobile Node physically moves to the new subnet in a network. Proactive handover is used. In another embodiment, SA keys are transferred from S-CSCF to new P-CSCF. In this case, the SA keys are transferred to the new P-CSCF by S-CSCF through a context transfer mechanism well in advance so that SAs may be established before Mobile Node physically moves to new subnet. In another embodiment, methods for mitigating IPSec tunnel overhead are presented.Type: GrantFiled: September 11, 2007Date of Patent: May 5, 2015Assignee: Telcordia Technologies, Inc.Inventors: Ashutosh Dutta, Abhrajit Ghosh, Subir Das, Fuchun Joesph Lin, Kyriakos Manousakis, Dana Chee, Tsunehiko Chiba, Hidetoshi Yokota, Akira Idoue
-
Patent number: 8971291Abstract: A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. One proactive method includes proactive authentication. Another proactive method includes proactive security association, such as transferring SA keys from old proxy to new proxy, or transferring keys through serving signal entities. Reactive methods include transferring SA keys from old proxy to new proxy, using either push or pull technology. Other reactive methods include transferring keys through serving signal entities using either push or pull technology.Type: GrantFiled: December 12, 2011Date of Patent: March 3, 2015Assignees: Telcordia Technologies, Inc., KDDI CorporationInventors: Ashutosh Dutta, Abhrajit Ghosh, Subir Das, Dana Chee, Kyriakos Manousakis, Funchun Joseph Lin, Shih-wei Li, Tsunehiko Chiba, Hidetoshi Yokota, Akira Idoue
-
Patent number: 8670407Abstract: A system and method for route optimization in PMIP having a first mobile node having a local mobility anchor and anchored at an access router and a second mobile node anchored at an access router is presented. The method includes establishing a binding cache at one access router comprising a mapping of mobile node addresses to access router addresses, populating the binding cache, and updating the mapping of the mobile node addresses in response to a handoff of a mobile node from one access router to another access router, so that a packet is transmitted from the first mobile node to the second mobile node using the mapping in the binding cache. The second access router address is obtained by either transmitting the packet from the first mobile node to the local mobility anchor, or querying neighboring access routers, or broadcasting access router addresses from the local mobility anchor.Type: GrantFiled: January 30, 2008Date of Patent: March 11, 2014Assignees: Telcordia Technologies, Inc., KDDI CorporationInventors: Ashutosh Dutta, Funchun Joe Lin, Subir Das, Dana Chee, Hidetoshi Yokota, Tsunehiko Chiba
-
Patent number: 8625551Abstract: A system and method for mobility support of a mobile node having a home network in a heterogeneous roaming environment is presented. The method comprises the steps of authenticating the mobile node in a visited network and obtaining an address for the mobile node in the visited network, establishing a security connection between a functional component in the visited network and an agent in the home network, creating a home address for the mobile node, and using the home address to generate a SIP signaling address, a SIP media address, and a non-SIP media address, such that SIP non-media is transmitted using the security connection to the SIP signaling address, SIP media is transmitted using the security connection to the SIP media address, and non-SIP media is transmitted using the security connection to the non-SIP media address.Type: GrantFiled: December 21, 2007Date of Patent: January 7, 2014Assignees: Telcordia Technologies, Inc., KDDI CorporationInventors: Ashutosh Dutta, Subir Das, Fuchun Joe Lin, Dana Chee, Tsumehiko Chiba, Hidetoshi Yokota, Akira Idoue
-
Publication number: 20120239727Abstract: An overlay service network and method for delivering a multimedia service. The overlay service network comprises a user interface for subscribers to request an available service as a requested service, a register server for registering and storing a database of available services, a plurality of service nodes for executing at least one available service and a controller for receiving a request for an available service, searching the register server for the requested service, selecting one or more of the plurality of service nodes to execute the requested service and establishing a chaining sequence between a node requesting the service, the one or more selected execution nodes and a destination node to execute the requested service.Type: ApplicationFiled: March 16, 2011Publication date: September 20, 2012Applicants: KDDI CORPORATION, TELCORDIA TECHNOLOGIES, INC.Inventors: Ashutosh Dutta, Christian Makaya, Dana Chee, Fuchun Joseph Lin, Satoshi Komorita, Tsunehiko Chiba, Hidetoshi Yokota, Benjamin Falchuk, Manabu Ito
-
Publication number: 20120221700Abstract: A virtualized telecom system and a method for managing service continuity and mobility in a virtualized telecom system. The system comprises a plurality of execution nodes each configured to execute a network function by registering; and a manager node for registering each of the plurality of execution nodes, assigning a node identifier (Node ID) to each of the plurality of execution nodes, periodically polling each of the plurality of execution nodes for a status, and issuing control instructions to each of the plurality of execution nodes based upon the status of a respective execution node. Each of the plurality of execution node responds to the polling by transmitting its status to the manager node. The status includes runtime information and pre-configuration information.Type: ApplicationFiled: August 26, 2011Publication date: August 30, 2012Applicants: KDDI CORPORATION, TELCORDIA TECHNOLOGIES, INC.Inventors: Ashutosh Dutta, Christian Makaya, Dana Chee, Subir Das, Benjamin Falchuk, Surendran Alathurai, Fuchun Joseph Lin, Satoshi Komorita, Tsunehiko Chiba, Hidetoshi Yokota, Manabu Ito
-
Publication number: 20120082136Abstract: A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. One proactive method includes proactive authentication. Another proactive method includes proactive security association, such as transferring SA keys from old proxy to new proxy, or transferring keys through serving signal entities. Reactive methods include transferring SA keys from old proxy to new proxy, using either push or pull technology. Other reactive methods include transferring keys through serving signal entities using either push or pull technology.Type: ApplicationFiled: December 12, 2011Publication date: April 5, 2012Applicants: KDDI CORPORATION, TELCORDIA TECHNOLOGIES, INC.Inventors: Ashutosh Dutta, Abhrajit Ghosh, Subir Das, Dana Chee, Kyriakos Manousakis, Funchun Joseph Lin, Shih-wei Li, Tsunehiko Chiba, Hidetoshi Yokota, Akira Idoue
-
Publication number: 20120042084Abstract: A method and system for setting up and maintaining an IMS session. The method comprising transmitting an invite message from a registered user equipment, forwarding the invite message to a selected SIP proxy (P-CSCF), forwarding the invite message to a specified SIP server (S-CSCF) and relaying said invite message to a destination. The invite message contains a header and a payload. The header includes an identifier for the load balancing node. The load balancing node is assigned to the user equipment. There are at least two load balancing node, a primary and a secondary load balancing node. The identifier for the load balancing node does not change even if there is a failure of one of a primary load balancing node, the P-CSCFs or S-CSCFs. During registration, the routing information for the load balancing node is added into both via and record-route headers in a SIP registration request.Type: ApplicationFiled: February 9, 2011Publication date: February 16, 2012Applicants: KDDI CORPORATION, TELCORDIA TECHNOLOGIES, INC.Inventors: Ashutosh Dutta, Christian Makaya, Dana Chee, Subir Das, Fuchun Joseph Lin, Satoshi Kemorita, Tsunehiko Chiba, Hidetoshi Yokota
-
Patent number: 8098627Abstract: A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. One proactive method includes proactive authentication. Another proactive method includes proactive security association, such as transferring SA keys from old proxy to new proxy, or transferring keys through serving signal entities. Reactive methods include transferring SA keys from old proxy to new proxy, using either push or pull technology. Other reactive methods include transferring keys through serving signal entities using either push or pull technology.Type: GrantFiled: September 11, 2007Date of Patent: January 17, 2012Assignees: Telcordia Technologies, Inc., KDDI CorporationInventors: Ashutosh Dutta, Abhrajit Ghosh, Subir Das, Dana Chee, Kyriakos Manousakis, Funchun Joseph Lin, Shih-wei Li, Tsunehiko Chiba, Hidetoshi Yokota, Akira Idoue
-
Publication number: 20110110223Abstract: A self-organizing IP multimedia subsystem exhibiting node splitting and node merging functions wherein any node within the self organizing IP multimedia subsystem may assume any role thereby providing node balancing and fault tolerance to an overall network.Type: ApplicationFiled: April 30, 2010Publication date: May 12, 2011Applicants: Telcordia Technologies, Inc., KDDI CorporationInventors: Ashutosh Dutta, Dana Chee, Christian Makaya, Subir Das, Fuchun Joseph Lin, Ming Lai, Tsunehiko Chiba, Satoshi Komorita, Hidetoshi Yokota
-
Publication number: 20080285518Abstract: A system and method for route optimization in PMIP having a first mobile node having a local mobility anchor and anchored at an access router and a second mobile node anchored at an access router is presented. The method includes establishing a binding cache at one access router comprising a mapping of mobile node addresses to access router addresses, populating the binding cache, and updating the mapping of the mobile node addresses in response to a handoff of a mobile node from one access router to another access router, so that a packet is transmitted from the first mobile node to the second mobile node using the mapping in the binding cache. The second access router address is obtained by either transmitting the packet from the first mobile node to the local mobility anchor, or querying neighboring access routers, or broadcasting access router addresses from the local mobility anchor.Type: ApplicationFiled: January 30, 2008Publication date: November 20, 2008Inventors: Ashutosh Dutta, Funchun Joe Lin, Subir Das, Dana Chee, Hidetoshi Yokota
-
Publication number: 20080176560Abstract: A system and method for mobility support of a mobile node having a home network in a heterogeneous roaming environment is presented. The method comprises the steps of authenticating the mobile node in a visited network and obtaining an address for the mobile node in the visited network, establishing a security connection between a functional component in the visited network and an agent in the home network, creating a home address for the mobile node, and using the home address to generate a SIP signaling address, a SIP media address, and a non-SIP media address, such that SIP non-media is transmitted using the security connection to the SIP signaling address, SIP media is transmitted using the security connection to the SIP media address, and non-SIP media is transmitted using the security connection to the non-SIP media address.Type: ApplicationFiled: December 21, 2007Publication date: July 24, 2008Inventors: Ashutosh Dutta, Subir Das, Fuchun Joe Lin, Dana Chee, Tsumehiko Chiba, Hidetoshi Yokota, Akira Idoue
-
Publication number: 20080069050Abstract: A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. One proactive method includes proactive authentication. Another proactive method includes proactive security association, such as transferring SA keys from old proxy to new proxy, or transferring keys through serving signal entities. Reactive methods include transferring SA keys from old proxy to new proxy, using either push or pull technology. Other reactive methods include transferring keys through serving signal entities using either push or pull technology.Type: ApplicationFiled: September 11, 2007Publication date: March 20, 2008Inventors: Ashutosh Dutta, Adhrajit Ghosh, Subir Das, Dana Chee, Kyriakos Manousakis, Funchun Lin, Shih-wei Li, Tsunehiko Chiba, Hidetoshi Yokota, Akira Idoue
-
Publication number: 20080072310Abstract: A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. Methods for mitigating delay during SA re-association and mitigating the IPSec tunnel overhead for signaling and media at the Mobile Node are given. In one embodiment, SA keys can be transferred from the old P-CSCF to new P-CSCF, enabling the establishment of SAs before Mobile Node physically moves to the new subnet in a network. Proactive handover is used. In another embodiment, SA keys are transferred from S-CSCF to new P-CSCF. In this case, the SA keys are transferred to the new P-CSCF by S-CSCF through a context transfer mechanism well in advance so that SAs may be established before Mobile Node physically moves to new subnet. In another embodiment, methods for mitigating IPSec tunnel overhead are presented.Type: ApplicationFiled: September 11, 2007Publication date: March 20, 2008Inventors: Ashutosh Dutta, Abhrajit Ghosh, Subir Das, Joesph Lin, Kyriakos Manousakis, Dana Chee, Tsunehiko Chiba, Hidetoshi Yokota, Akira Idoue