Patents by Inventor Farooq Anjum

Farooq Anjum has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9046595
    Abstract: A system and method for locating a wireless client using trusted wireless detectors is described. Sniffers may sense signal strength information and transmit the information to a database. The database may store signal strength-based location information. Information from the database may then be used to determine the location of a wireless client based on new signal strength information from one or more sniffers.
    Type: Grant
    Filed: September 1, 2006
    Date of Patent: June 2, 2015
    Assignees: Toshiba America Research, Inc., Telcordia Technologies, Inc.
    Inventors: Farooq Anjum, Byungsuk Kim, Santosh Pandey
  • Patent number: 8306026
    Abstract: A system and method of managing multicast key distribution that includes associating a multicast address with each internal node of the key tree, wherein the key tree is created based on the last hop topology.
    Type: Grant
    Filed: September 18, 2006
    Date of Patent: November 6, 2012
    Assignees: Toshiba America Research, Inc., Telcordia Technologies, Inc.
    Inventors: Farooq Anjum, Abhrajit Ghosh
  • Patent number: 8107400
    Abstract: A system and method that uses wireless-capable desktop computers in a vicinity such as to enable one to securely determine the location of an untrusted user with office level granularity.
    Type: Grant
    Filed: July 14, 2008
    Date of Patent: January 31, 2012
    Assignees: Toshiba America Research, Inc., Telcordia Technologies, Inc.
    Inventors: Patrick Traynor, Byungsuk Kim, Farooq Anjum
  • Patent number: 7978647
    Abstract: The invention is addressing the problem of efficient formation and maintenance of piconets with assistance from the master of an already existing piconet. The master of an existing piconet initiates the formation of a new helper piconet by at least two of its slaves. One of the slaves of the existing piconet becomes the master of the newly formed helper piconet and the other slave becomes a slave of the helper piconet. This process can be used to expand the number of Bluetooth devices that can use an Internet access point. It can also be used to permit two slave devices to communicate directly with one another so as not to unnecessarily use bandwidth available through the master. Finally, the method and system could be used to provide a method of efficient hand-off from one piconet to another.
    Type: Grant
    Filed: October 11, 2007
    Date of Patent: July 12, 2011
    Assignee: TTI Inventions C LLC
    Inventors: Farooq Anjum, Ravi Jain, Maria Adamou
  • Patent number: 7975300
    Abstract: The present invention, among other things, obviates the effects of an attack on a wireless network through appropriate isolation and recovery. An aspect of the present invention can include a system and method of isolating a victim of malicious behavior in a wireless access network, and in particular WLAN networks. By having software on the victim's device, the system provides the capability of recovering the victim from the effects of the intruder, and prevents the victim from being affected by subsequent attacks by the intruder. The preferred embodiments include two key components: a local monitor and a global monitor.
    Type: Grant
    Filed: August 15, 2005
    Date of Patent: July 5, 2011
    Assignees: Toshiba America Research, Inc., Telcordia Technologies, Inc.
    Inventors: Byungsuk Kim, Farooq Anjum, Subir Das, Praveen Gopalakrishnan, Latha Kant
  • Patent number: 7933237
    Abstract: A method and apparatus for controlling ingress to a communications network to control quality of service is described. A request to admit a new communications flow is received. A polynomial and its coefficients representing a state of the network is determined and applied to the network state plus the new communications flow to determine whether admission of the new communications flow would cause the network to operate in a stable or unstable state. In response to determining that the network would operate in the unstable state, a communications flow for the ingress device is downgraded in its quality of service. By another approach, it is determined whether the new communications flow exceeds an allocated quota of bandwidth. Admission or rejection of the communications flow can be determined.
    Type: Grant
    Filed: December 26, 2006
    Date of Patent: April 26, 2011
    Assignee: Telcordia Licensing Company, LLC
    Inventors: Farooq Anjum, Latha Kant, Alexander Poylisher, Ritu Chadha
  • Publication number: 20100034138
    Abstract: Our invention is a method and system for a method of providing Quality of Service (QoS) over networks that do not provide any information and only serve to carry packets. Specifically, as Traffic traverses between various user networks via an opaque network, gateways at the edge of the user networks keep a record of the packets traversing into the opaque networks and packets traversing out of the opaque network. These gateways also know about the traffic classes that each of these packets belong to. The gateways at the ingress points (the user network where the packets originate) and the gateways at the egress points (the user network where the packets terminate) coordinate amongst themselves to exchange information about the number and latency of packets exchanged between the two. This information is used by the gateway at the ingress to estimate the state of the opaque network using dynamic throughput graphs.
    Type: Application
    Filed: December 26, 2006
    Publication date: February 11, 2010
    Inventors: Farooq Anjum, Latha Kant, Alexander Poylisher, Ritu Chandha
  • Patent number: 7576694
    Abstract: A secure localization method for wireless networks utilizes access point variable transmission power capability to transmit encoded localization signals at different power levels to a wireless device in the network. Based on the particular combination of encoded signals collected by the wireless device and reported back to a network controller, the location of the wireless device may be determined in conjunction with information contained in a location database.
    Type: Grant
    Filed: April 20, 2006
    Date of Patent: August 18, 2009
    Assignees: Toshiba America Research, Inc., Telcordia Technologies, Inc.
    Inventors: Farooq Anjum, Byungsuk Kim, Santosh Ghanshyam Pandey
  • Patent number: 7508788
    Abstract: A system for key management in sensor networks which takes the location of sensor nodes into consideration while deciding the keys to be deployed on each node. This system reduces the number of keys that have to be stored on each sensor node and also provides for the containment of node compromise. Thus compromise of a node in a location affects the communications only around that location. The location dependent key management system does not require any knowledge about the deployment of sensor nodes. The system starts off with the loading of a single key on each sensor node prior to deployment. Subsequent to deployment a plurality of beacons is transmitted a plurality of different transmission ranges from each anchor node, said beacons containing at least one nonce. Each sensor node receives beacons depending upon its location in the network.
    Type: Grant
    Filed: March 7, 2007
    Date of Patent: March 24, 2009
    Assignees: Toshiba America Research, Inc, Telcordia Technologies, Inc
    Inventor: Farooq Anjum
  • Patent number: 7496065
    Abstract: The invention is addressing the problem of efficient formation and maintenance of piconets with assistance from the master of an already existing piconet. The master of an existing piconet initiates the formation of a new helper piconet by at least two of its slaves. One of the slaves of the existing piconet becomes the master of the newly formed helper piconet and the other slave becomes a slave of the helper piconet. This process can be used to expand the number of Bluetooth devices that can use an Internet access point. It can also be used to permit two slave devices to communicate directly with one another so as not to unnecessarily use bandwidth available through the master. Finally, the method and system could be used to provide a method of efficient hand-off from one piconet to another.
    Type: Grant
    Filed: November 19, 2002
    Date of Patent: February 24, 2009
    Assignee: Telcordia Technologies, Inc.
    Inventors: Farooq Anjum, Ravi Jain, Maria Adamou
  • Publication number: 20090022127
    Abstract: A system and method that uses wireless-capable desktop computers in a vicinity such as to enable one to securely determine the location of an untrusted user with office level granularity.
    Type: Application
    Filed: July 14, 2008
    Publication date: January 22, 2009
    Applicants: TOSHIBA AMERICA RESEARCH. INC., TELCORDIA TECHNOLOGIES, INC.
    Inventors: Patrick Traynor, Byungsuk Kim, Farooq Anjum
  • Publication number: 20080037495
    Abstract: The invention is addressing the problem of efficient formation and maintenance of piconets with assistance from the master of an already existing piconet. The master of an existing piconet initiates the formation of a new helper piconet by at least two of its slaves. One of the slaves of the existing piconet becomes the master of the newly formed helper piconet and the other slave becomes a slave of the helper piconet. This process can be used to expand the number of Bluetooth devices that can use an Internet access point. It can also be used to permit two slave devices to communicate directly with one another so as not to unnecessarily use bandwidth available through the master. Finally, the method and system could be used to provide a method of efficient hand-off from one piconet to another.
    Type: Application
    Filed: October 11, 2007
    Publication date: February 14, 2008
    Inventors: Farooq Anjum, Ravi Jain, Maria Adamou
  • Publication number: 20070291682
    Abstract: A system for key management in sensor networks which takes the location of sensor nodes into consideration while deciding the keys to be deployed on each node. This system reduces the number of keys that have to be stored on each sensor node and also provides for the containment of node compromise. Thus compromise of a node in a location affects the communications only around that location. The location dependent key management system does not require any knowledge about the deployment of sensor nodes. The system starts off with the loading of a single key on each sensor node prior to deployment. Subsequent to deployment a plurality of beacons is transmitted a plurality of different transmission ranges from each anchor node, said beacons containing at least one nonce. Each sensor node receives beacons depending upon its location in the network.
    Type: Application
    Filed: March 7, 2007
    Publication date: December 20, 2007
    Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORDIA TECHNOLOGIES, INC.
    Inventor: Farooq ANJUM
  • Publication number: 20070247367
    Abstract: A secure localization method for wireless networks utilizes access point variable transmission power capability to transmit encoded localization signals at different power levels to a wireless device in the network. Based on the particular combination of encoded signals collected by the wireless device and reported back to a network controller, the location of the wireless device may be determined in conjunction with information contained in a location database.
    Type: Application
    Filed: April 20, 2006
    Publication date: October 25, 2007
    Inventors: Farooq Anjum, Byungsuk Kim, Santosh Pandey
  • Publication number: 20070140245
    Abstract: A system and method of managing multicast key distribution that includes associating a multicast address with each internal node of the key tree, wherein the key tree is created based on the last hop topology.
    Type: Application
    Filed: September 18, 2006
    Publication date: June 21, 2007
    Applicants: Telcordia Technologies, Inc., Toshiba America Research, Inc.
    Inventors: Farooq Anjum, Abhrajit Ghosh
  • Publication number: 20070087761
    Abstract: A system and method for locating a wireless client using trusted wireless detectors is described. Sniffers may sense signal strength information and transmit the information to a database. The database may store signal strength-based location information. Information from the database may then be used to determine the location of a wireless client based on new signal strength information from one or more sniffers.
    Type: Application
    Filed: September 1, 2006
    Publication date: April 19, 2007
    Applicants: Toshiba America Research, Inc., Telcordia Technologies, Inc.
    Inventors: Farooq Anjum, Byungsuk Kim, Santosh Pandey
  • Publication number: 20070019609
    Abstract: Unique temporary MAC addresses are calculated by mobile devices connected to wireless networks, using access point advertising information in combination with the permanent MAC address of the mobile device. The mobile devices use a hash function to construct a bit sequence from which a temporary MAC address can be extracted. The MAC address is unique over the entire region in which the mobile device can operate, without necessity of any coordination or negotiation between various access points of the region.
    Type: Application
    Filed: July 11, 2005
    Publication date: January 25, 2007
    Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORDIA INC.
    Inventor: Farooq ANJUM
  • Publication number: 20060236391
    Abstract: The present invention, among other things, obviates the effects of an attack on a wireless network through appropriate isolation and recovery. An aspect of the present invention can include a system and method of isolating a victim of malicious behavior in a wireless access network, and in particular WLAN networks. By having software on the victim's device, the system provides the capability of recovering the victim from the effects of the intruder, and prevents the victim from being affected by subsequent attacks by the intruder. The preferred embodiments include two key components: a local monitor and a global monitor.
    Type: Application
    Filed: August 15, 2005
    Publication date: October 19, 2006
    Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORIA TECHNOLOGIES INC.
    Inventors: Byungsuk Kim, Farooq Anjum, Subir Das, Praveen Gopalakrishnan, Latha Kant
  • Publication number: 20060221949
    Abstract: A multi-hop wireless network system is disclosed that includes a plurality of routing nodes configured to route packets transmitted from a source node to a destination node. In the preferred embodiments, the plurality of routing nodes are configured to perform capture and analysis by only a last routing node before the destination node. Among other things, the system and method provides a efficient method for performing intrusion detection or other processing in a multi-hop wireless network.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 5, 2006
    Applicants: Toshiba America Research, Inc., Telcordia Inc.
    Inventor: Farooq Anjum
  • Patent number: 6967957
    Abstract: A service architecture for the rapid development of next generation telephony services that overcomes the limitations of the current closed PSTN architecture and service model. In this architecture services are provided by multiple cooperating distributed service providers. This architecture is built upon an object-oriented call model which is defined as a small set of extensions to the standard Java Telephony API call model. This new object-oriented call model hides the detail of the underlying call-state management protocols and hardware from applications.
    Type: Grant
    Filed: February 14, 2001
    Date of Patent: November 22, 2005
    Assignee: Telcordia Technologies, Inc.
    Inventors: Farooq Anjum, Francesco Caruso, Ravi Jain, Paolo Missier, Adalberto Zordan