Patents by Inventor Phil T. Nguyen

Phil T. Nguyen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9185641
    Abstract: The disclosure relates to using discoverable peer-to-peer (P2P) services to remotely “onboard” headless devices over a Wi-Fi network. In particular, an onboardee device may enter an onboarding mode in which the onboardee device becomes a Wi-Fi access point (AP) and an onboarder device connected to a private Wi-Fi network may discover the onboardee device and establish a secured session to engage with the P2P services running thereon. The first time that the onboarder device and the onboardee device engage with one another, the secured session may be established based on a key exchange that uses a well-known secret (e.g., a default passphrase), which may be immediately changed to a shared secret. The onboarder device may then transfer an onboarding configuration to the onboardee device, which may be instructed to validate the onboarding configuration and connect to the Wi-Fi network prior to entering the connected mode.
    Type: Grant
    Filed: May 16, 2014
    Date of Patent: November 10, 2015
    Assignee: Qualcomm Innovation Center, Inc.
    Inventors: Eyal David Ilsar, Doron Zehavi, Phil T. Nguyen, Ashutosh Aggarwal
  • Publication number: 20150023183
    Abstract: The disclosure relates to using discoverable peer-to-peer (P2P) services to remotely “onboard” headless devices over a Wi-Fi network. In particular, an onboardee device may enter an onboarding mode in which the onboardee device becomes a Wi-Fi access point (AP) and an onboarder device connected to a private Wi-Fi network may discover the onboardee device and establish a secured session to engage with the P2P services running thereon. The first time that the onboarder device and the onboardee device engage with one another, the secured session may be established based on a key exchange that uses a well-known secret (e.g., a default passphrase), which may be immediately changed to a shared secret. The onboarder device may then transfer an onboarding configuration to the onboardee device, which may be instructed to validate the onboarding configuration and connect to the Wi-Fi network prior to entering the connected mode.
    Type: Application
    Filed: May 16, 2014
    Publication date: January 22, 2015
    Applicant: Qualcomm Innovation Center, Inc.
    Inventors: Eyal David Ilsar, Doron Zehavi, Phil T. Nguyen, Ashutosh Aggarwal
  • Publication number: 20150026317
    Abstract: The disclosure relates to wireless communications. An aspect determines whether or not an attempt to connect to a local wireless network using a given network configuration failed, determines whether or not a previous attempt to connect to the local wireless network using the given network configuration was successful, and if the attempt to connect failed and the previous attempt was successful, switches between a state of retrying to connect to the local wireless network and a state of waiting to receive a new network configuration.
    Type: Application
    Filed: July 16, 2014
    Publication date: January 22, 2015
    Inventors: Eyal David Ilsar, Phil T. Nguyen, Ashutosh Aggarwal, Doron Zehavi, Zvi Rubanenko
  • Publication number: 20150026779
    Abstract: The disclosure relates to performing a remote Wi-Fi network configuration when a network security protocol is unknown. In particular, Wi-Fi network configurations typically require a name, a security protocol, and authentication credentials. However, users attempting to configure a Wi-Fi network may not know the security protocol or be unable to recall the security protocol when presented with a dialog requesting such details. As such, assuming a finite set of security protocols, the algorithm disclosed herein may assume an OPEN (e.g., unsecured) configuration on the destination Wi-Fi network if no credentials were supplied or alternatively a WPS configuration if credentials consisting of exactly eight digits were supplied. Otherwise, the algorithm may iterate through each security protocol supported on the device supports (e.g., according to popularity, complexity, etc.) until a successful network association occurs or all supported security protocols are exhausted.
    Type: Application
    Filed: July 16, 2014
    Publication date: January 22, 2015
    Inventors: Eyal David Ilsar, Zachary Oliff, Phil T. Nguyen, Ashutosh Aggarwal
  • Publication number: 20150023336
    Abstract: The disclosure relates to wireless communications. An aspect receives, by an onboarder device, a list of local wireless network scan results from an onboardee device, selects a local wireless network on the list of local wireless network scan results, and sends an indication of the selected local wireless network to the onboardee device, wherein the onboardee device attempts to connect to the selected local wireless network. An aspect scans, by an onboardee device, for available local wireless networks, creates a list of local wireless network scan results based on the scanning, sends, by the first device, the list of local wireless network scan results to an onboarder device, wherein the onboarder device selects a local wireless network on the list of local wireless network scan results, and receives an indication of the selected local wireless network from the onboarder device.
    Type: Application
    Filed: July 16, 2014
    Publication date: January 22, 2015
    Inventors: Eyal David Ilsar, Ashutosh Aggarwal, Phil T. Nguyen, Zachary Oliff