Patents by Inventor Shamim Rahman
Shamim Rahman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20070291792Abstract: A method and device for performing media independent handover (MIH) in a wireless communication system. The method includes, and the apparatus is configured to, generate a higher layer handover message, send the higher layer handover message encapsulated in a lower level formatted communication, set a higher layer timing device for a timeout period in connection with the sending of the encapsulated higher layer handover message, and resend the higher layer handover message encapsulated in a lower level formatted communication unless a higher layer acknowledgement is received before expiration of the timeout period.Type: ApplicationFiled: May 17, 2007Publication date: December 20, 2007Applicant: INTERDIGITAL TECHNOLOGY CORPORATIONInventors: Mahmoud Watfa, Shamim Rahman, Ulises Olvera-Hernandez
-
Publication number: 20070192585Abstract: In a wireless communication system comprising at least one wireless transmit/receive unit (WTRU) and a trusted entity, a method and apparatus for processing data during an event, includes storing data in a memory of the WTRU. The stored data is classified in the memory of the WTRU. The WTRU detects an event and transmits a notification signal to the trusted entity in response to the event detected. The trusted entity transmits a readiness signal to the WTRU. The WTRU transmits data classified for transfer to the trusted entity, and the trusted entity stores the data classified for transfer in a memory of the trusted entity.Type: ApplicationFiled: December 23, 2005Publication date: August 16, 2007Applicant: InterDigital Technology CorporationInventors: Alain Briancon, Shamim Rahman, Maged Zaki, Guy Cote
-
Publication number: 20070174443Abstract: Method and apparatus for attaching an IMS enabled wireless transmit/receive unit (WTRU) to a long term evolution (LTE) wireless network. With one attach request, the WTRU registers and authenticates itself to the network, obtains an IP address allocation, and SIP registration.Type: ApplicationFiled: November 9, 2006Publication date: July 26, 2007Applicant: INTERDIGITAL TECHNOLOGY CORPORATIONInventors: Kamel Shaheen, Peter Wang, Narayan Menon, Ulises Olvera-Hernandez, Maged Zaki, Shamim Rahman
-
Publication number: 20070173283Abstract: A multiple radio access technology (RAT) apparatus with mobility middleware provides a user with access to various RAT networks, such as a frequency division duplex (FDD) network and a wireless local area network (WLAN). In one embodiment, the apparatus is a dual mode FDD/WLAN converged wireless communication handset which includes a terminal equipment (TE) module having mobility middleware, an applications and protocols processor and a terminal interface (TI). The dual mode FDD/WLAN converged wireless communication handset further includes a user services identity module (USIM), a mobile termination (MT) module and a protocol stack which interface with the mobility middleware via a plurality of links.Type: ApplicationFiled: December 12, 2006Publication date: July 26, 2007Applicant: INTERDIGITAL TECHNOLOGY CORPORATIONInventors: Catherine Livet, Debashish Purkayastha, Shamim Rahman, Guang Lu, Alan Carlton, Narayan Menon
-
Publication number: 20070115893Abstract: A method and system for managing radio resources in a time-slotted wireless communication system is based on the quality of service (QoS) information of a user. A plurality of time slots of a radio resource are sorted into a plurality of different categories, such as high QoS time slots, high capacity time slots, and balanced time slots. Each category is associated with a different level of QoS. QoS information with respect to a user is obtained in response to a radio resource request received from the user. The user is associated with a particular category of time slots based on the QoS information of the user.Type: ApplicationFiled: January 17, 2007Publication date: May 24, 2007Applicant: InterDigital Technology CorporationInventors: Catherine Livet, Guang Lu, Shamim Rahman, Maged Zaki
-
Publication number: 20070104166Abstract: A method for operating a wireless mobile device moving through different types of networks includes storing within the wireless mobile device a type of network associated with a respective access node as the wireless mobile device moves through the different types of networks. A type of connectivity available for each access node is stored within the wireless mobile device, as well as location of each access node. The wireless mobile device is operated with a current access node corresponding to one type of network based on a current location of the wireless mobile device. Handoff is initiated by the wireless mobile device from the current access node to another access node corresponding to a different type of network based on movement of the wireless mobile device.Type: ApplicationFiled: October 27, 2006Publication date: May 10, 2007Applicant: InterDigital Technology CorporationInventors: Shamim Rahman, Guy Cote, Maged Zaki
-
Publication number: 20070104123Abstract: In a wireless local area network (WLAN) mesh network of clusters, each cluster having a master node with a plurality of associated slave nodes, a method an apparatus for coordinating channel access between the clusters. A structure of clusters is established as a hierarchal mastership, wherein a high level master node serves a plurality of subservient master nodes. The hierarchal mastership is controlled by the high level master node using an HCF controlled channel access (HCCA) mechanism. Alternatively, the structure of clusters is configured as a peer-to-peer mastership that controls channel access by a distributed mechanism, such as EDCA.Type: ApplicationFiled: November 8, 2006Publication date: May 10, 2007Applicant: INTERDIGITAL TECHNOLOGY CORPORATIONInventors: John Tomici, Catherine Livet, Shamim Rahman, Juan Zuniga
-
Publication number: 20070097904Abstract: A wireless communications network includes access points and wireless nodes. Each access point and each wireless node has a respective authentication token and address associated therewith. The access points and wireless nodes communicate using packets, where each packet includes an authentication token, an origination address and a destination address. During the communications, the access points read and store the respective authentication tokens and origination addresses in the packets wirelessly transmitted from the wireless nodes for defining an allowed wireless node list. Likewise, each wireless node reads and stores the respective authentication tokens and origination addresses wirelessly transmitted from the access points for defining an allowed access point list. The wireless nodes and access points do not associate with an attacker if both an authentication token and an address associated with the attacker are not on the respective allowed access point and wireless node lists.Type: ApplicationFiled: October 26, 2006Publication date: May 3, 2007Applicant: InterDigital Technology CorporationInventors: Rajat Mukherjee, Shamim Rahman
-
Publication number: 20070070943Abstract: A method and apparatus for communicating slot allocations of nodes in a wireless mesh network that has data exchanges between the nodes occurring during slots. Each node maintains internal tracking of its slot allocation. A node may request a slot allocation of another node, and each node is enabled to report its slot allocation to other nodes. An information element (IE) and management type messages are introduced for tracking and reporting slot allocations among mesh network nodes.Type: ApplicationFiled: June 30, 2006Publication date: March 29, 2007Applicant: InterDigital Technology CorporationInventors: Catherine Livet, Juan Zuniga, John Tomici, Shamim Rahman
-
Publication number: 20070036353Abstract: The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user's arm movements inflected to the user device.Type: ApplicationFiled: May 31, 2006Publication date: February 15, 2007Applicant: InterDigital Technology CorporationInventors: Alexander Reznik, Debashish Purkayastha, Steven Goldberg, Robert Olesen, Marian Rudolf, Inhyok Cha, Alan Carlton, Yogendra Shah, Shamim Rahman, Rajat Mukherjee, Robert DiFazio, Gregory Sternberg, Leonid Kazakevich, Kazimierz Siwiak, Guodong Zhang, Tanbir Haque, Louis Guccione, Prabhakar Chitrapu, Akinlolu Kumoluyi, Alain Briancon
-
Publication number: 20070032219Abstract: Several methods are provided for communicating emergency call capability information between a station and an access point (AP) in a wireless local area network. The methods include advertising by the AP of its emergency call capabilities and announcing by the station of its emergency call capabilities. The AP can advertise its emergency call capabilities in a beacon frame, a probe response frame, a reassociation response frame, or a reauthentication response frame. The station can announce its emergency call capabilities in an association request frame, a reassociation request frame, an authentication request frame, or a reauthentication request frame.Type: ApplicationFiled: March 3, 2006Publication date: February 8, 2007Applicant: InterDigital Technology CorporationInventors: Marian Rudolf, Juan Zuniga, Shamim Rahman, Joseph Kwak
-
Publication number: 20060277450Abstract: A method for determining whether a data transmission rate in a wireless communication system is appropriate for current system conditions begins by calculating a frame error rate (FER) for a given period of time and obtaining a current data rate. If the current data rate is greater than a minimum data rate and the FER is a high value, then the system switches to a lower data rate. If the current data rate is greater than a minimum data rate and the FER is less than a high value, then the system maintains the current data rate. If the current data rate is less than a maximum data rate and the FER is a low value, then the system determines whether a higher data rate can be used.Type: ApplicationFiled: July 28, 2006Publication date: December 7, 2006Applicant: InterDigital Technology CorporationInventors: Maged Zaki, Shamim Rahman, Teresa Hunkeler, Guang Lu
-
Publication number: 20060248385Abstract: In a wireless communication system comprising a plurality of mesh points (MPs), a method for determining a level of involvement of MPs within the system includes a first MP transmitting a network status request signal to a second MP. The second MP responds to the first MP with network status information. The first MP receives the network status information from the second MP, and determines a level of involvement in the wireless system based on the network status information.Type: ApplicationFiled: March 29, 2006Publication date: November 2, 2006Applicant: InterDigital Technology CorporationInventors: Shamim Rahman, Juan Zuniga, Marian Rudolf
-
Publication number: 20060227726Abstract: In a wireless local area network including an access controller (AC) and an access points (AP), the AC transmits a functionality inquiry to the AP. Upon receiving the inquiry, the AP transmits a query response including the functional capabilities of the AP. The AC then generates a map of the functional capabilities present in the network based on the inquiry response. Conflicting or redundant functional capabilities are identified and are disabled, enabled, or reconfigured by instructions from the AC. The AC may selectively enable and/or disable functional capabilities at nodes in the network to provide a more balanced load on the network, and to provide for load sharing by allocating functionalities between and among network nodes having common functional capabilities to satisfy a variety of situations encountered in the network.Type: ApplicationFiled: December 29, 2005Publication date: October 12, 2006Applicant: InterDigital Technology CorporationInventors: Juan Zuniga, Marian Rudolf, Shamim Rahman
-
Publication number: 20060166664Abstract: Radio resource management (RRM) components and methods for a wireless telecommunications system utilize Finite State Machines (FSMs), preferably dividing RMM functions on the basis of Real Time (RT) and Non Real Time (NRT) communications and also UpLink (UL) and DownLink (DL) functions.Type: ApplicationFiled: March 23, 2006Publication date: July 27, 2006Applicant: InterDigital Technology CorporationInventors: Catherine Livet, Shamim Rahman
-
Publication number: 20060133404Abstract: A method and apparatus for managing radio resources in one or more wireless communication networks. At least one radio resource manager (RRM) is provided within a network node, or as an independent entity. The RRM monitors performance on wireless communication links of the network(s) and interacts with nodes associated with those links to change the configuration on a particular wireless communication link if its performance (i.e., quality) falls below an established threshold. Information regarding current resource usage of the network is sent to the RRM by the nodes. Each of the nodes may send a quality report to the RRM including wireless communication link quality measurements and performance statistics. Alternatively, the RRM may perform the wireless communication link quality measurements. The RRM facilitates the broadcasting of information regarding current resource usage of one network to other networks to avoid collisions and interference.Type: ApplicationFiled: October 21, 2005Publication date: June 22, 2006Applicant: InterDigital Technology CorporationInventors: Juan Zuniga, Marian Rudolf, Shamim Rahman
-
Publication number: 20060079268Abstract: A method for congestion control in the uplink of a wireless communication system having a wireless transmit/receive unit (WTRU) and a radio network controller (RNC) begins by receiving an interference report for each user. The average noise rise for each user calculated and congestion relieving measures are implemented based upon the average noise rise and the WTRU battery level. A method for congestion control in the downlink of a wireless communication system having a WTRU and a RNC begins by receiving a transmission power report for each user. The transmission power for each user is calculated, and congestion relieving measures are implemented based upon the average transmission power and the WTRU battery level.Type: ApplicationFiled: November 16, 2005Publication date: April 13, 2006Applicant: InterDigital Technology CorporationInventors: Catherine Livet, Guang Lu, Shamim Rahman, Maged Zaki
-
Publication number: 20060056448Abstract: This invention relates to wireless local area networks (WLANs), and the interoperability of networks of different types or conforming to different standards, and to methods and apparatus to allow a multimode wireless transmit/receive unit (WTRU), which is able to operate in more than one type of network, to handover from one network type to another without adversely affecting service, utilizing a mechanism and information flows implemented in a new protocol stack.Type: ApplicationFiled: December 21, 2004Publication date: March 16, 2006Applicant: InterDigital Technology CorporationInventors: Maged Zaki, Juan Zuniga, Marian Rudolf, Shamim Rahman, Kamel Shaheen, Alan Carlton
-
Publication number: 20060046730Abstract: A plurality of virtual wireless networks are defined. Each of the plurality of virtual wireless networks has a different set of requirements. A node is capable of producing a plurality of antenna beams or patterns. Each virtual wireless network is associated with a unique group of the antenna beams or patterns. Users of each of the virtual wireless networks communicate using the antenna beams or patterns associated with that virtual wireless network.Type: ApplicationFiled: October 29, 2004Publication date: March 2, 2006Applicant: InterDigital Technology CorporationInventors: Alain Briancon, Shamim Rahman, Maged Zaki
-
Publication number: 20060039298Abstract: A method for creating sub-networks in a wireless mesh network begins by determining whether a trigger condition for creating a sub-network exists. Nodes in the mesh network are selected to create the sub-network if the trigger condition exists. The sub-network is then created with the selected nodes. A node for use in a wireless mesh network includes a state device for maintaining a state of the node, the state of the node relating to activity occurring at the node; an attachment list communicating with the state device; a trigger device communicating with the state device; and an attachment device communicating with the attachment list and the trigger device.Type: ApplicationFiled: June 29, 2005Publication date: February 23, 2006Applicant: InterDigital Technology CorporationInventors: Juan Zuniga, Marian Rudolf, Shamim Rahman