Patents Assigned to Telcordia, Inc.
-
Patent number: 8792454Abstract: Systems and methods are described for secure and seamless roaming between internal and external networks. Double and triple tunnels may be used to connect a mobile node to a correspondent host. A mobile node may include the ability to connect to two networks simultaneously to enable seamless roaming between networks.Type: GrantFiled: July 20, 2012Date of Patent: July 29, 2014Assignees: Toshiba America Resesarch, Inc., Telcordia Inc.Inventors: Kenichi Taniuchi, Tao Zhang, Prathima Agrawal, Ashutosh Dutta, Sunil Madhani, Shinichi Baba, Kensaku Fujimoto, Yasuhiro Katsube, Toshikazu Kodama, Yoshihiro Ohba
-
Patent number: 8385937Abstract: A system and method for equalizing traffic between antenna beams is described. Aspects of the system and method may vary the beam widths to attempt to equalize traffic based on non-real-time communications and/or non-real-time communications.Type: GrantFiled: July 7, 2004Date of Patent: February 26, 2013Assignees: Toshiba America Research Inc., Telcordia Inc.Inventors: Faramak Vakil, David Famolari, Kamesh Medepalli, Prathima Agrawal, Toshikazu Kodama, Shuichi Obayashi, Ryoko Matsuo
-
Publication number: 20120287904Abstract: Systems and methods are described for secure and seamless roaming between internal and external networks. Double and triple tunnels may be used to connect a mobile node to a correspondent host. A mobile node may include the ability to connect to two networks simultaneously to enable seamless roaming between networks.Type: ApplicationFiled: July 20, 2012Publication date: November 15, 2012Applicants: TELCORDIA INC., TOSHIBA AMERICA RESEARCH, INC.Inventors: Kenichi TANIUCHI, Tao ZHANG, Prathima AGRAWAL, Ashutosh DUTTA, Sunil MADHANI, Shinichi BABA, Kensaku FUJIMOTO, Yasuhiro KATSUBE, Toshikazu KODAMA, Yoshihiro OHBA
-
Patent number: 8243687Abstract: Systems and methods are described for secure and seamless roaming between internal and external networks. Double and triple tunnels may be used to connect a mobile node to a correspondent host. A mobile node may include the ability to connect to two networks simultaneously to enable seamless roaming between networks.Type: GrantFiled: June 21, 2011Date of Patent: August 14, 2012Assignees: Toshiba America Research, Inc., Telcordia, Inc.Inventors: Kenichi Taniuchi, Tao Zhang, Prathima Agrawal, Ashutosh Dutta, Sunil Madhani, Shinichi Baba, Kensaku Fujimoto, Yasuhiro Katsube, Toshikazu Kodama, Yoshihiro Ohba
-
Publication number: 20070041344Abstract: A mobile device receives wireless network information from a MIIS (Media Independent Information Server), and builds its own database of existing networks with their associated characteristics, appropriately mapped with GPS (Global Positioning Satellite) coordinates or other appropriate form of geographical location identifying information. Consequently, the mobile device becomes “smart” over time through the learning process of first attempting to utilize its own developed database and, only if such database information falls short, making a remote query to a MIIS to get required information for session continuity and performing handovers. The mobile device may store the information received from the MIIS in its own local database together with a time-stamp. Each time the mobile device needs to get updated or new information, it sends a request to the MIIS along with the time-stamp appended to the request.Type: ApplicationFiled: August 16, 2005Publication date: February 22, 2007Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORDIA INC.Inventors: Raziq Yaqub, Sunil Madhani
-
Publication number: 20070041350Abstract: Data packets are transmitted from a first access network to a first interface of a multiple interface device (MID), and identical data packets are transmitted concurrently from a second access network to a second interface of the MID. Some of the data packets that are transmitted to the MID from the first access network are not received by the first interface. The MID inspects identifiers of data packets from the first and second interfaces in order to send to the application a stream including all of the data packets. For example, the MID sends to the application the data packets from the first interface, buffers the data packets from the second interface, and sends data packets from the buffer to the application upon detecting that data packets in the buffer were transmitted to the first interface but not received by the first interface.Type: ApplicationFiled: August 22, 2005Publication date: February 22, 2007Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORDIA INC.Inventor: David FAMOLARI
-
Publication number: 20070043828Abstract: In some embodiments, a ghost messaging system is disclosed that includes: a server configured to store user information, location information of client devices and ghost messages composed by users of client devices; a plurality of access points configured to transmit location information related to client devices to the server; and at least one client device configured to compose ghost messages, including indications of location relevance.Type: ApplicationFiled: August 16, 2005Publication date: February 22, 2007Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORDIA INC.Inventors: David Famolari, Michael Long
-
Publication number: 20070036116Abstract: Traffic flows of data packets from respective packet queues in wireless stations to a shared transmission medium of a wireless network are scheduled in accordance with Hybrid Controlled Channel Access (HCCA) and Enhanced Distributed Channel Access (EDCA). HCCA is applied by eliminating from consideration for HCCA access flows for which the sum of a desired minimum age of an oldest data packet in the respective packet queue and the time of creation of the oldest data packet is greater than the present time. For flows that are not eliminated from consideration, HCCA access is granted to the flow having a smallest sum of the desired maximum age of the oldest data packet and the time of creation of the oldest data packet. When all traffic flows are eliminated from consideration for HCCA access, EDCA is applied so that traffic flows compete for access to the medium.Type: ApplicationFiled: August 12, 2005Publication date: February 15, 2007Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORDIA INC.Inventors: Martin Eiger, Moncef Elaoud, Raquel Morera
-
Publication number: 20070030826Abstract: A Multi-Interface Mobility Management (MIMM) client is provided on a mobile Multi-Interface Device (MID) to support seamless network connectivity and switching of the MID. The MIMM client communicates with a MIMM Server. The MIMM Server collects information from MIMM Clients and provides information to the MIMM Clients pertaining to the network(s) to which the mobile MID has access, such as information concerning the availability of a network, the quality of network connectivity, etc. The MIMM Client is responsible for determining whether and when a handoff or roaming operation should be initiated by the mobile MID, and which network interface the mobile MID should use after the handoff/roam operation has been completed. The MIMM Client also is responsible for performing mobility-related functions that are required prior and subsequent to the handoff/roam operation. The MIMM Client uses the information received from the MIMM Server in order to make these determinations.Type: ApplicationFiled: August 3, 2005Publication date: February 8, 2007Applicants: Toshiba America Research, Inc., Telcordia Inc.Inventors: Tao Zhang, Kim Byungsusk, Toshikazu Kodama, Shinichi Baba, Miriam Tauil
-
Publication number: 20070019609Abstract: Unique temporary MAC addresses are calculated by mobile devices connected to wireless networks, using access point advertising information in combination with the permanent MAC address of the mobile device. The mobile devices use a hash function to construct a bit sequence from which a temporary MAC address can be extracted. The MAC address is unique over the entire region in which the mobile device can operate, without necessity of any coordination or negotiation between various access points of the region.Type: ApplicationFiled: July 11, 2005Publication date: January 25, 2007Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORDIA INC.Inventor: Farooq ANJUM
-
Publication number: 20070014259Abstract: The present invention relates to the use of buffering packets for the mobile node at an access router or network node near the edge of the network that the mobile is moving away from or towards. The buffered packets are then forwarded to the mobile node once the handoff process is completed. This invention also relates to the use of buffering packets originating from the mobile node during the handoff process. The buffered packets are then forwarded to their intended destinations once the handoff process is completed. The buffering system is used in conjunction with existing mobility protocols, access protocols, or as an independent network or link layer mechanism.Type: ApplicationFiled: August 31, 2005Publication date: January 18, 2007Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORDIA INC.Inventors: Victor Fajardo, Yoshihiro Ohba, Kenichi Taniuchi, Ashutosh Dutta
-
Publication number: 20060227717Abstract: In some embodiments, a system and method for substantially real-time comparison of quality of interfaces by mobile devices over heterogeneous networks is disclosed. The method can be performed using a dynamic and rapid comparison by distributed hosts, using a minimal number of injected network packets, using minimal path quality metrics, which path quality metrics are independent of how a Qol is measured, and in a manner suitable for both wireline and wireless networks.Type: ApplicationFiled: August 23, 2005Publication date: October 12, 2006Applicants: Toshiba America Research, Inc., Telcordia Inc.Inventors: Erick van den Berg, Sunil Madhani, Tao Zhang
-
Publication number: 20060221949Abstract: A multi-hop wireless network system is disclosed that includes a plurality of routing nodes configured to route packets transmitted from a source node to a destination node. In the preferred embodiments, the plurality of routing nodes are configured to perform capture and analysis by only a last routing node before the destination node. Among other things, the system and method provides a efficient method for performing intrusion detection or other processing in a multi-hop wireless network.Type: ApplicationFiled: March 31, 2005Publication date: October 5, 2006Applicants: Toshiba America Research, Inc., Telcordia Inc.Inventor: Farooq Anjum
-
Publication number: 20060221900Abstract: In some embodiments, a silent proactive handoff is performed wherein a mobile device that is using a current network to transport its application traffic uses its silent periods to connect to at least one target network temporarily and uses this temporary connectivity to perform actions needed for handoff into the target network. Among other things, with such a silent proactive handoff approach, e.g., if handoff actions to a target network fail during silent periods, there can still be essentially no impact on the applications.Type: ApplicationFiled: April 1, 2005Publication date: October 5, 2006Applicants: Toshiba America Research, Inc., Telcordia Inc.Inventors: Tao Zhang, Raziq Yaqub
-
Publication number: 20060221901Abstract: In some embodiments, a method is disclosed involving a mobile device discovery and use of target wireless networks which are at least partly within a coverage area of another wireless network which provides location information which includes: acquiring data from a plurality of said target wireless networks; acquiring location information from said another wireless network; mapping said data from said plurality of said target wireless networks with said location information; and selecting one of said plurality of target wireless networks based on said mapped data.Type: ApplicationFiled: April 1, 2005Publication date: October 5, 2006Applicants: Toshiba America Research, Inc., Telcordia Inc.Inventors: Raziq Yaqub, Tao Zhang
-
Publication number: 20060221920Abstract: A system and method that addresses the issue of inducing and exploiting multi-user diversity in, e.g., a WLAN system in a fully distributed and opportunistic manner. In some embodiments, the system includes: an access point having a variable beamformer configured to fluctuate signal strength as perceived by stations within a range of the access point; and a plurality of stations having modified distributed-MAC protocol such as to be channel-aware and opportunistic.Type: ApplicationFiled: April 5, 2005Publication date: October 5, 2006Applicants: Toshiba America Research, Inc., Telcordia Inc.Inventors: Praveen Gopalakrishnan, David Famolari, Shuichi Obayashi, Raziq Yaqub
-
Publication number: 20060098588Abstract: Systems and methods for mobile peer-to-peer information sharing are disclosed. With the preferred systems and methods, mobile users and devices collect information about networks that they visit, and carry that information as they move to new networks. Mobile users and/or devices then share such information directly with each other.Type: ApplicationFiled: July 28, 2005Publication date: May 11, 2006Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORDIA INC.Inventors: Tao Zhang, Eric Van Den Berg, Sunil Madhani
-
Publication number: 20050273853Abstract: In some illustrative embodiments, a novel system and method is provided that includes a quarantining architecture for quarantining of clients, including: a) an unauthenticated network; b) a quarantine network; and c) a safe network.Type: ApplicationFiled: May 2, 2005Publication date: December 8, 2005Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORDIA INC.Inventors: Yashihiro OBA, Ashutosh DUTTA, Subir DAS