Patents by Inventor Farooq Anjum
Farooq Anjum has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9046595Abstract: A system and method for locating a wireless client using trusted wireless detectors is described. Sniffers may sense signal strength information and transmit the information to a database. The database may store signal strength-based location information. Information from the database may then be used to determine the location of a wireless client based on new signal strength information from one or more sniffers.Type: GrantFiled: September 1, 2006Date of Patent: June 2, 2015Assignees: Toshiba America Research, Inc., Telcordia Technologies, Inc.Inventors: Farooq Anjum, Byungsuk Kim, Santosh Pandey
-
Patent number: 8306026Abstract: A system and method of managing multicast key distribution that includes associating a multicast address with each internal node of the key tree, wherein the key tree is created based on the last hop topology.Type: GrantFiled: September 18, 2006Date of Patent: November 6, 2012Assignees: Toshiba America Research, Inc., Telcordia Technologies, Inc.Inventors: Farooq Anjum, Abhrajit Ghosh
-
Patent number: 8107400Abstract: A system and method that uses wireless-capable desktop computers in a vicinity such as to enable one to securely determine the location of an untrusted user with office level granularity.Type: GrantFiled: July 14, 2008Date of Patent: January 31, 2012Assignees: Toshiba America Research, Inc., Telcordia Technologies, Inc.Inventors: Patrick Traynor, Byungsuk Kim, Farooq Anjum
-
Patent number: 7978647Abstract: The invention is addressing the problem of efficient formation and maintenance of piconets with assistance from the master of an already existing piconet. The master of an existing piconet initiates the formation of a new helper piconet by at least two of its slaves. One of the slaves of the existing piconet becomes the master of the newly formed helper piconet and the other slave becomes a slave of the helper piconet. This process can be used to expand the number of Bluetooth devices that can use an Internet access point. It can also be used to permit two slave devices to communicate directly with one another so as not to unnecessarily use bandwidth available through the master. Finally, the method and system could be used to provide a method of efficient hand-off from one piconet to another.Type: GrantFiled: October 11, 2007Date of Patent: July 12, 2011Assignee: TTI Inventions C LLCInventors: Farooq Anjum, Ravi Jain, Maria Adamou
-
Patent number: 7975300Abstract: The present invention, among other things, obviates the effects of an attack on a wireless network through appropriate isolation and recovery. An aspect of the present invention can include a system and method of isolating a victim of malicious behavior in a wireless access network, and in particular WLAN networks. By having software on the victim's device, the system provides the capability of recovering the victim from the effects of the intruder, and prevents the victim from being affected by subsequent attacks by the intruder. The preferred embodiments include two key components: a local monitor and a global monitor.Type: GrantFiled: August 15, 2005Date of Patent: July 5, 2011Assignees: Toshiba America Research, Inc., Telcordia Technologies, Inc.Inventors: Byungsuk Kim, Farooq Anjum, Subir Das, Praveen Gopalakrishnan, Latha Kant
-
Patent number: 7933237Abstract: A method and apparatus for controlling ingress to a communications network to control quality of service is described. A request to admit a new communications flow is received. A polynomial and its coefficients representing a state of the network is determined and applied to the network state plus the new communications flow to determine whether admission of the new communications flow would cause the network to operate in a stable or unstable state. In response to determining that the network would operate in the unstable state, a communications flow for the ingress device is downgraded in its quality of service. By another approach, it is determined whether the new communications flow exceeds an allocated quota of bandwidth. Admission or rejection of the communications flow can be determined.Type: GrantFiled: December 26, 2006Date of Patent: April 26, 2011Assignee: Telcordia Licensing Company, LLCInventors: Farooq Anjum, Latha Kant, Alexander Poylisher, Ritu Chadha
-
Publication number: 20100034138Abstract: Our invention is a method and system for a method of providing Quality of Service (QoS) over networks that do not provide any information and only serve to carry packets. Specifically, as Traffic traverses between various user networks via an opaque network, gateways at the edge of the user networks keep a record of the packets traversing into the opaque networks and packets traversing out of the opaque network. These gateways also know about the traffic classes that each of these packets belong to. The gateways at the ingress points (the user network where the packets originate) and the gateways at the egress points (the user network where the packets terminate) coordinate amongst themselves to exchange information about the number and latency of packets exchanged between the two. This information is used by the gateway at the ingress to estimate the state of the opaque network using dynamic throughput graphs.Type: ApplicationFiled: December 26, 2006Publication date: February 11, 2010Inventors: Farooq Anjum, Latha Kant, Alexander Poylisher, Ritu Chandha
-
Patent number: 7576694Abstract: A secure localization method for wireless networks utilizes access point variable transmission power capability to transmit encoded localization signals at different power levels to a wireless device in the network. Based on the particular combination of encoded signals collected by the wireless device and reported back to a network controller, the location of the wireless device may be determined in conjunction with information contained in a location database.Type: GrantFiled: April 20, 2006Date of Patent: August 18, 2009Assignees: Toshiba America Research, Inc., Telcordia Technologies, Inc.Inventors: Farooq Anjum, Byungsuk Kim, Santosh Ghanshyam Pandey
-
Patent number: 7508788Abstract: A system for key management in sensor networks which takes the location of sensor nodes into consideration while deciding the keys to be deployed on each node. This system reduces the number of keys that have to be stored on each sensor node and also provides for the containment of node compromise. Thus compromise of a node in a location affects the communications only around that location. The location dependent key management system does not require any knowledge about the deployment of sensor nodes. The system starts off with the loading of a single key on each sensor node prior to deployment. Subsequent to deployment a plurality of beacons is transmitted a plurality of different transmission ranges from each anchor node, said beacons containing at least one nonce. Each sensor node receives beacons depending upon its location in the network.Type: GrantFiled: March 7, 2007Date of Patent: March 24, 2009Assignees: Toshiba America Research, Inc, Telcordia Technologies, IncInventor: Farooq Anjum
-
Patent number: 7496065Abstract: The invention is addressing the problem of efficient formation and maintenance of piconets with assistance from the master of an already existing piconet. The master of an existing piconet initiates the formation of a new helper piconet by at least two of its slaves. One of the slaves of the existing piconet becomes the master of the newly formed helper piconet and the other slave becomes a slave of the helper piconet. This process can be used to expand the number of Bluetooth devices that can use an Internet access point. It can also be used to permit two slave devices to communicate directly with one another so as not to unnecessarily use bandwidth available through the master. Finally, the method and system could be used to provide a method of efficient hand-off from one piconet to another.Type: GrantFiled: November 19, 2002Date of Patent: February 24, 2009Assignee: Telcordia Technologies, Inc.Inventors: Farooq Anjum, Ravi Jain, Maria Adamou
-
Publication number: 20090022127Abstract: A system and method that uses wireless-capable desktop computers in a vicinity such as to enable one to securely determine the location of an untrusted user with office level granularity.Type: ApplicationFiled: July 14, 2008Publication date: January 22, 2009Applicants: TOSHIBA AMERICA RESEARCH. INC., TELCORDIA TECHNOLOGIES, INC.Inventors: Patrick Traynor, Byungsuk Kim, Farooq Anjum
-
Publication number: 20080037495Abstract: The invention is addressing the problem of efficient formation and maintenance of piconets with assistance from the master of an already existing piconet. The master of an existing piconet initiates the formation of a new helper piconet by at least two of its slaves. One of the slaves of the existing piconet becomes the master of the newly formed helper piconet and the other slave becomes a slave of the helper piconet. This process can be used to expand the number of Bluetooth devices that can use an Internet access point. It can also be used to permit two slave devices to communicate directly with one another so as not to unnecessarily use bandwidth available through the master. Finally, the method and system could be used to provide a method of efficient hand-off from one piconet to another.Type: ApplicationFiled: October 11, 2007Publication date: February 14, 2008Inventors: Farooq Anjum, Ravi Jain, Maria Adamou
-
Publication number: 20070291682Abstract: A system for key management in sensor networks which takes the location of sensor nodes into consideration while deciding the keys to be deployed on each node. This system reduces the number of keys that have to be stored on each sensor node and also provides for the containment of node compromise. Thus compromise of a node in a location affects the communications only around that location. The location dependent key management system does not require any knowledge about the deployment of sensor nodes. The system starts off with the loading of a single key on each sensor node prior to deployment. Subsequent to deployment a plurality of beacons is transmitted a plurality of different transmission ranges from each anchor node, said beacons containing at least one nonce. Each sensor node receives beacons depending upon its location in the network.Type: ApplicationFiled: March 7, 2007Publication date: December 20, 2007Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORDIA TECHNOLOGIES, INC.Inventor: Farooq ANJUM
-
Publication number: 20070247367Abstract: A secure localization method for wireless networks utilizes access point variable transmission power capability to transmit encoded localization signals at different power levels to a wireless device in the network. Based on the particular combination of encoded signals collected by the wireless device and reported back to a network controller, the location of the wireless device may be determined in conjunction with information contained in a location database.Type: ApplicationFiled: April 20, 2006Publication date: October 25, 2007Inventors: Farooq Anjum, Byungsuk Kim, Santosh Pandey
-
Publication number: 20070140245Abstract: A system and method of managing multicast key distribution that includes associating a multicast address with each internal node of the key tree, wherein the key tree is created based on the last hop topology.Type: ApplicationFiled: September 18, 2006Publication date: June 21, 2007Applicants: Telcordia Technologies, Inc., Toshiba America Research, Inc.Inventors: Farooq Anjum, Abhrajit Ghosh
-
Publication number: 20070087761Abstract: A system and method for locating a wireless client using trusted wireless detectors is described. Sniffers may sense signal strength information and transmit the information to a database. The database may store signal strength-based location information. Information from the database may then be used to determine the location of a wireless client based on new signal strength information from one or more sniffers.Type: ApplicationFiled: September 1, 2006Publication date: April 19, 2007Applicants: Toshiba America Research, Inc., Telcordia Technologies, Inc.Inventors: Farooq Anjum, Byungsuk Kim, Santosh Pandey
-
Publication number: 20070019609Abstract: Unique temporary MAC addresses are calculated by mobile devices connected to wireless networks, using access point advertising information in combination with the permanent MAC address of the mobile device. The mobile devices use a hash function to construct a bit sequence from which a temporary MAC address can be extracted. The MAC address is unique over the entire region in which the mobile device can operate, without necessity of any coordination or negotiation between various access points of the region.Type: ApplicationFiled: July 11, 2005Publication date: January 25, 2007Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORDIA INC.Inventor: Farooq ANJUM
-
Publication number: 20060236391Abstract: The present invention, among other things, obviates the effects of an attack on a wireless network through appropriate isolation and recovery. An aspect of the present invention can include a system and method of isolating a victim of malicious behavior in a wireless access network, and in particular WLAN networks. By having software on the victim's device, the system provides the capability of recovering the victim from the effects of the intruder, and prevents the victim from being affected by subsequent attacks by the intruder. The preferred embodiments include two key components: a local monitor and a global monitor.Type: ApplicationFiled: August 15, 2005Publication date: October 19, 2006Applicants: TOSHIBA AMERICA RESEARCH, INC., TELCORIA TECHNOLOGIES INC.Inventors: Byungsuk Kim, Farooq Anjum, Subir Das, Praveen Gopalakrishnan, Latha Kant
-
Publication number: 20060221949Abstract: A multi-hop wireless network system is disclosed that includes a plurality of routing nodes configured to route packets transmitted from a source node to a destination node. In the preferred embodiments, the plurality of routing nodes are configured to perform capture and analysis by only a last routing node before the destination node. Among other things, the system and method provides a efficient method for performing intrusion detection or other processing in a multi-hop wireless network.Type: ApplicationFiled: March 31, 2005Publication date: October 5, 2006Applicants: Toshiba America Research, Inc., Telcordia Inc.Inventor: Farooq Anjum
-
Patent number: 6967957Abstract: A service architecture for the rapid development of next generation telephony services that overcomes the limitations of the current closed PSTN architecture and service model. In this architecture services are provided by multiple cooperating distributed service providers. This architecture is built upon an object-oriented call model which is defined as a small set of extensions to the standard Java Telephony API call model. This new object-oriented call model hides the detail of the underlying call-state management protocols and hardware from applications.Type: GrantFiled: February 14, 2001Date of Patent: November 22, 2005Assignee: Telcordia Technologies, Inc.Inventors: Farooq Anjum, Francesco Caruso, Ravi Jain, Paolo Missier, Adalberto Zordan