Patents by Inventor John Waclawsky

John Waclawsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10419953
    Abstract: A central management system polls a lighting node in a mesh lighting network, sending a command message for the node to measure a link quality indication (LQI) of the received command message. The node returns a status message, including in its payload the measured LQI. The management system computes from the node's status messages, a statistical characterization of the link quality of the node and compares it with a threshold quality value. If the comparison indicates sufficient degradation in link quality, the management system automatically transmits a disconnect command to the node. In response, the node disconnects and enters a discovery mode to find a better quality link to rejoin the network. In example embodiments, the lighting node may also report its illumination and operational status in the payload of the status message, along with the LQI, enabling the management system to determine whether illumination by the node is failing.
    Type: Grant
    Filed: December 5, 2017
    Date of Patent: September 17, 2019
    Assignee: Echelon Corporation
    Inventors: Mark Keating, Jwalant Dholakia, Jonathan Lloyd, Glen Riley, John Waclawsky
  • Publication number: 20190174329
    Abstract: A central management system polls a lighting node in a mesh lighting network, sending a command message for the node to measure a link quality indication (LQI) of the received command message. The node returns a status message, including in its payload the measured LQI. The management system computes from the node's status messages, a statistical characterization of the link quality of the node and compares it with a threshold quality value. If the comparison indicates sufficient degradation in link quality, the management system automatically transmits a disconnect command to the node. In response, the node disconnects and enters a discovery mode to find a better quality link to rejoin the network. In example embodiments, the lighting node may also report its illumination and operational status in the payload of the status message, along with the LQI, enabling the management system to determine whether illumination by the node is failing.
    Type: Application
    Filed: December 5, 2017
    Publication date: June 6, 2019
    Applicant: Echelon Corporation
    Inventors: Mark KEATING, Jonathan DHOLAKIA, Jonathan LLOYD, Glen RILEY, John WACLAWSKY
  • Patent number: 10027781
    Abstract: Embodiments of the present invention disclose a TCP link configuration method, apparatus, and device. The method includes: acquiring data information in a data packet transmitted on a target TCP link or transmission information generated in a process of transmitting the data packet; determining, according to the data information or the transmission information, a target network type of a network on which the target TCP link is located; searching a pre-established configuration library for a target TCP configuration file corresponding to the target network type; and configuring the target TCP link by using the searched target TCP configuration file. According to the method, the configured target TCP link is better adapted to a network on which the target TCP link is located; use of network bandwidth can be maximized; and TCP transmission efficiency can be improved.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: July 17, 2018
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Xianjun He, John Waclawsky, Zechao Meng
  • Publication number: 20160112545
    Abstract: Embodiments of the present invention disclose a TCP link configuration method, apparatus, and device. The method includes: acquiring data information in a data packet transmitted on a target TCP link or transmission information generated in a process of transmitting the data packet; determining, according to the data information or the transmission information, a target network type of a network on which the target TCP link is located; searching a pre-established configuration library for a target TCP configuration file corresponding to the target network type; and configuring the target TCP link by using the searched target TCP configuration file. According to the method, the configured target TCP link is better adapted to a network on which the target TCP link is located; use of network bandwidth can be maximized; and TCP transmission efficiency can be improved.
    Type: Application
    Filed: December 30, 2015
    Publication date: April 21, 2016
    Inventors: Xianjun He, John Waclawsky, Zechao Meng
  • Publication number: 20140355623
    Abstract: Destination endpoints can use in-band signaling to adjust TCP parameters, to adjust entries in history and profile tables, to initialize a transition to an in-band communication mode, or to communicate short flows and/or alerts to a mobile device. A destination endpoint achieves in-band singling by embedding sequence number patterns in acknowledgement (ACK) messages, or by transmitting ACK messages (duplicates or otherwise) in accordance with an ACK sequence pattern. The sequence number or ACK sequence pattern can be pre-associated with any in-band communication message, such as a request to adjust TCP parameters, the reporting of a network or triggering condition, a request to adjust entries in a history or profile table, an indication to transition from a normal communication mode to an in-band communication mode, etc.
    Type: Application
    Filed: June 3, 2013
    Publication date: December 4, 2014
    Inventors: John Waclawsky, Xianjun He
  • Publication number: 20140334296
    Abstract: Selectively ignoring congestion conditions may allow for more efficient transmission control protocol (TCP) communication in instance where reducing the transmission rate for a flow will not meaningfully mitigate congestion in the network or is otherwise undesirable. By way of example, congestion conditions may be ignored when a specific type of traffic flow is being communicated (e.g., short flows, high priority flows, etc.), when a traffic flow is being communicated at a low transmission rate, when a traffic flow is destined for certain type of network (e.g., a wireless network, etc.), or during any other situation in which reducing the transmission rate is undesirable. In some networks, a transmission rate is maintained until a certain number of duplicate ACKs are received (e.g., three duplicate ACKs, etc.) in order to ensure that congestion is indeed present before reducing quality of service (QoS).
    Type: Application
    Filed: May 13, 2013
    Publication date: November 13, 2014
    Applicant: FutureWei Technologies, Inc.
    Inventors: John Waclawsky, Yufeng Xia, Zechao Meng
  • Publication number: 20140281018
    Abstract: Transport control protocol (TCP) parameters can be dynamically selected to increase communication network performance. The TCP parameters may be selected before usage or at start-up such that a TCP connection is dynamically configured/re-configured prior to transporting the traffic flow over the network. The TCP connection parameters may be selected in accordance with a traffic characteristic, a network characteristic, a history of traffic activity, expected loads, desired throughput and latency or some other selection criteria. TCP parameters may also be selected after beginning to transport traffic flows over the network. More specifically, transportation of a traffic flow over the network may begin immediately using default TCP parameters, with the TCP parameters being updated or selected only upon the occurrence of a congestion or triggering condition. Further, multiple clients may share a set of persistent time-shared TCP connections.
    Type: Application
    Filed: March 13, 2013
    Publication date: September 18, 2014
    Inventors: John Waclawsky, Xianjun He, Zechao Meng
  • Patent number: 8769669
    Abstract: A user device comprising a processor configured to enable a mnemonic based digital signature scheme for user authentication that is based on a combination of one or more secrets and one or more actions implemented on the user device and associated with the secrets, and a device input system coupled to the processor and configured to detect the actions implemented on the user device. Also disclosed is an apparatus comprising a processor configured to implement a mnemonic based digital signature for authenticating a user, a device input system configured to enable the mnemonic based digital signature, and a memory unit configured to store input data that is used to recognize the mnemonic based digital signature, wherein the mnemonic based digital signature comprises a secret, an action associated with the secret and implemented using the device input system, and a cue associated with the action.
    Type: Grant
    Filed: February 3, 2012
    Date of Patent: July 1, 2014
    Assignee: Futurewei Technologies, Inc.
    Inventors: Zhengyi Le, Xinwen Zhang, John Waclawsky, Jiwei Wei
  • Publication number: 20140100835
    Abstract: An apparatus for modeling user behavior comprising at least one sensor for sensing a parameter, a memory, a processor coupled to the sensor and the memory, wherein the memory contains instructions that when executed by the processor cause the apparatus to collect a first data from the sensor, fuse the sensor data with a time element to obtain a context-feature, determine a first state based on the context-feature, record the first state in a state repository, wherein the state repository is configured to store a plurality of states such that the repository enables time-based pattern identification, and wherein each state corresponds to a user activity, incorporate information stored in the state repository into a behavior model, and predict an expected behavior based on the behavior model.
    Type: Application
    Filed: October 4, 2013
    Publication date: April 10, 2014
    Applicant: Futurewei Technologies, Inc.
    Inventors: Ishita Majumdar, John Waclawsky, George Vanecek, Chris Bedford, Tim Tran, Gayathri Namasivayam
  • Publication number: 20140082369
    Abstract: A method and a system for shape based encrypted object usage control using a querying device includes receiving location coordinates information and requesting an access to the encrypted object based on the received location coordinates information. The granting or denying access to the object is based on a determination of whether the received location coordinates information lies within at least one spatial access boundary. The at least one spatial access boundary is defined by an arbitrary physical object shape with at least two dimensional (2D) physical measurements in direct reference to designated location coordinates information. The received location coordinates information and the designated location coordinates information each includes longitude, latitude and optionally elevation values which provide the ability to identifying a specific location in a 3D space.
    Type: Application
    Filed: September 20, 2012
    Publication date: March 20, 2014
    Applicant: Futurwei Technologies Inc.
    Inventors: John Waclawsky, Zhengyi Le
  • Publication number: 20130205387
    Abstract: A user device comprising a processor configured to enable a mnemonic based digital signature scheme for user authentication that is based on a combination of one or more secrets and one or more actions implemented on the user device and associated with the secrets, and a device input system coupled to the processor and configured to detect the actions implemented on the user device. Also disclosed is an apparatus comprising a processor configured to implement a mnemonic based digital signature for authenticating a user, a device input system configured to enable the mnemonic based digital signature, and a memory unit configured to store input data that is used to recognize the mnemonic based digital signature, wherein the mnemonic based digital signature comprises a secret, an action associated with the secret and implemented using the device input system, and a cue associated with the action.
    Type: Application
    Filed: February 3, 2012
    Publication date: August 8, 2013
    Applicant: Futurewei Technologies, Inc.
    Inventors: Zhengyi Le, Xinwen Zhang, John Waclawsky, Jiwei Wei
  • Publication number: 20120054055
    Abstract: A system comprising a network infrastructure configured to instantiate and implement an application mall supporting a plurality of users, wherein the application mall provides customers access to online stores that provide digital goods, wherein relationships between the plurality of users are flexible and are dynamically defined by at least some of the plurality of users.
    Type: Application
    Filed: August 18, 2011
    Publication date: March 1, 2012
    Applicant: FUTUREWEI TECHNOLOGIES, INC.
    Inventors: Nino Vidovic, Guangbin Fan, George Vanecek, JR., John Waclawsky
  • Publication number: 20100049815
    Abstract: Methods, apparatus, and computer-readable media are presented regarding alert processing. An alert may be received or generated with respect to one or more portals, such as social-networking websites, enterprise servers, and other data sources. Requests associated with one or more portals may be received at an MTproxy. The request may come from an MTclient and may include state information about alerts. At the MTproxy, a user monitor thread is generated in response to the request. The user monitor thread may be associated with a user of the MTproxy. One or more alertlets associated with the user monitor thread may be generated. Each alertlet may be associated with a feature, or specific type of information, and a portal. At the alertlet, information concerning the portal may be determined. A mashup may be generated and sent based on the information.
    Type: Application
    Filed: August 20, 2009
    Publication date: February 25, 2010
    Applicant: MOBILE TRIBE LLC
    Inventors: George Vanecek, John Waclawsky, Nino Vidovic
  • Publication number: 20090319648
    Abstract: Methods and apparatus are provided to provide served ads to one or more clients based on dynamic-community information, ad-related information, service features, service activity, country of origin, and device-related information. Dynamic communities are formed based on a trigger, which may be a command, a request for information, a change in context, or an event notification. After receiving the trigger, a served ad may be piggybacked onto a response to the trigger. The served ad may include graphical, audio, textual, and/or other information. Additionally, served ads may be sent in response to ad requests. A served ad may be selected based on ad-screening rules and/or conflict resolution between advertisers competing to provide the selected ad.
    Type: Application
    Filed: June 23, 2009
    Publication date: December 24, 2009
    Applicant: MOBILE TRIBE LLC
    Inventors: Partha Dutta, John Waclawsky, Nino Vidovic
  • Publication number: 20090313325
    Abstract: Methods and apparatus are provided that access and present information associated with dynamic communities in an efficient and highly scalable manner. Dynamic communities are formed based on a trigger, which may be a command, a request for information, or an event notification. An apparatus may receive notification of the trigger and form a dynamic community from one or more data sources, such as social-networking websites and enterprise data sources. Sub-triggers may be generated based on the trigger and the dynamic community. The sub-triggers may be sent from the apparatus. A result may then be generated based on received responses to the sub-triggers.
    Type: Application
    Filed: June 16, 2009
    Publication date: December 17, 2009
    Applicant: MOBILE TRIBE LLC
    Inventors: George Vanecek, John Waclawsky, Nino Vidovic
  • Publication number: 20070230399
    Abstract: Facilitating mobile node mobility includes facilitating at a current access location a communication session for a mobile node. Context information for the communication session is managed, where the context information comprises information for supporting the communication session. A predictive set comprising one or more predicted next access locations is established for the communication session. The context information is transferred to the predicted next access locations prior to the communication session moving to an actual next access location.
    Type: Application
    Filed: March 29, 2006
    Publication date: October 4, 2007
    Inventors: Anand Oswal, John Waclawsky
  • Publication number: 20070160017
    Abstract: An exemplary embodiment providing for one or more improvements includes a method for use in a mobile station operating in a multi-protocol wireless network environment that supports a first wireless communication protocol and a second wireless communication protocol wherein the network environment allows the mobile station to seamlessly roam utilizing the first and second wireless communication protocols. The method includes establishing a first link layer connection using the first wireless communication protocol; and establishing a second link layer connection using the second wireless communication protocol wherein a single mobile identifier, corresponding to the mobile station, is used in the first and second connections.
    Type: Application
    Filed: January 9, 2006
    Publication date: July 12, 2007
    Applicant: Cisco Technology, Inc.
    Inventors: Robert Meier, Keith Dettloff, John Waclawsky
  • Publication number: 20070140163
    Abstract: A system and method wherein mobile nodes scan both 802.16 and 802.11 radio channels for neighbor access points. A mobile node reports both WiMax and WiFi neighbor access points to its parent access point. A parent access point advertises both WiMax and WiFi neighbor access points to child mobile nodes to facilitate faster roaming and load balancing. A parent WiMax AP can direct a mobile node to roam to a neighbor WiFi access point that has a lighter load or offers enhanced services. As an option, a location tracking protocol is used to determine the location of a mobile node and the mobile node's parent AP advertises neighbor APs that offer services in the mobile node's location.
    Type: Application
    Filed: December 21, 2005
    Publication date: June 21, 2007
    Inventors: Robert Meier, Keith Dettloff, John Waclawsky
  • Publication number: 20070124585
    Abstract: A network system for authorizing an endpoint node for a communication service includes an operator network and an organization network. The operator network operates to perform a device authorization operation to authorize the endpoint node for a communication session. The organization network operates to facilitate a service authorization operation to authorize the endpoint node for the communication service of the communication session.
    Type: Application
    Filed: November 29, 2005
    Publication date: May 31, 2007
    Inventors: Arthur Feather, John Waclawsky, Viren Malaviya, Anand Oswal
  • Publication number: 20070049284
    Abstract: Supporting communication sessions at a mobile node includes determining at a mobile node an address for one or more interior network elements of a network system. A interior network element is distinct from an edge network element of the network system, and is operable to establish a communication session. An address for an interior network element is inserted into packets. The packets are sent from the mobile node to the interior network element to communicate directly with the interior network element. The communication session is established using the interior network element.
    Type: Application
    Filed: August 23, 2005
    Publication date: March 1, 2007
    Inventors: Anand Oswal, Viren Malaviya, John Waclawsky, David Lindert, Jayaraman Iyer