Patents by Inventor Ted Kuo

Ted Kuo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070249324
    Abstract: Systems and methods for authentication using paired dynamic secrets in secured wireless networks are provided. Each authenticated user is assigned a random secret generated so as to be unique to the user. The secret is associated with a wireless interface belonging to the user, so that no other wireless interface may use the same secret to access the network. The secret may be updated either periodically or at the request of a network administrator, and reauthentication of the wireless network may be required.
    Type: Application
    Filed: April 18, 2007
    Publication date: October 25, 2007
    Inventors: Tyan-Shu Jou, Ming Sheu, Bo-Chieh Yang, Tian-Yuan Lin, Ted Kuo
  • Publication number: 20070130456
    Abstract: Initiating a virtual presence at a physical access point in response to a request for a service from a wireless access device is provided. A particular wireless service may be provided to a subscriber on an on-demand basis according to location and/or type of service requested. The service may be terminated when demand for the service comes to an end whereby a common wireless service infrastructure may be shared amongst service providers thus eliminating the need for radio channel coordination and otherwise enhancing service quality for those service providers.
    Type: Application
    Filed: December 1, 2006
    Publication date: June 7, 2007
    Inventors: Ted Kuo, Ming-Jye Sheu, Tian-Yuan Lin, Tyan-Shu Jou
  • Publication number: 20050050004
    Abstract: The present invention provides a method of distributing a new group key by a designated group key server, comprising: receiving a group key by a wireless device from each of a newly discovered neighbor. The next step is to receive a list of devices that the newly discovered neighbor connects to. Then, the device determines whether or not the received group key is the same with a new group key and a key index from a neighbor Ni and to associate each the group key with the list of device received from the same neighbor. The device compares all the group keys from the each neighbor and merging an associated lists of device into a single list if the group keys are the same. Subsequently, the device selects the group key with the largest associated list of device be a new selected group key.
    Type: Application
    Filed: September 22, 2004
    Publication date: March 3, 2005
    Inventors: Ming-Jye Sheu, Ted Kuo, Tyan-Shu Jou
  • Publication number: 20050041662
    Abstract: The routing method for wireless transport service comprises a step of receiving a unicast frame from an associated client; determining whether a destination of the unicast frame is locally associated. A wireless node delivers the unicast frame to a final destination if positive, otherwise, determining whether an associated transport device of a destination can be determined. The WITnet header is added and the associated transport device of the destination is put in an auxiliary address field if positive, otherwise, the next step is performed to add the WITnet header and put an address of a default edge device in the auxiliary address field. The next step is setting a tunnel frame flag, and then delivering the unicast frame to a next-hop toward the auxiliary address.
    Type: Application
    Filed: August 13, 2004
    Publication date: February 24, 2005
    Inventors: Ted Kuo, Ming-Jye Sheu, Tyan-Shu Jou
  • Publication number: 20050036623
    Abstract: A method of providing encryption service in a wireless transport network comprises the step of designating a first wireless device as a global encryption key server to create and maintain the global encryption key for a wireless transport network encryption. Nest step is to distribute the global encryption key from the first wireless device to a second wireless device in the wireless transport network. The existing global encryption key in the second wireless device is replaced by the global encryption key. Further step is to transit an expiring global encryption key to a new global encryption key in the wireless transport network without traffic loss and security.
    Type: Application
    Filed: August 13, 2004
    Publication date: February 17, 2005
    Inventors: Ming-Jye Sheu, Ted Kuo, Tyan-Shu Jou