Patents by Inventor Heyun Zheng

Heyun Zheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7782835
    Abstract: The present invention provides a system and method for multihop packet forwarding within a multihop wireless communication network. The method uses a data frame format including at least the four address fields to forward packets in a multihop wireless network. The method includes generating a route request packet at a routable device in response to receiving a packet destined for an unknown destination. The route request packet includes an originating device field including an address of an originating device, wherein the originating device generated the packet originally; and a source field, wherein the source field includes an address of the first routable device which generated the route request packet.
    Type: Grant
    Filed: January 12, 2007
    Date of Patent: August 24, 2010
    Assignee: Motorola, Inc.
    Inventors: Hrishikesh Gossain, Pankaj Aggarwal, Charles R. Barker, Jr., Keith J. Goldberg, William V. Hasty, Avinash Joshi, Shyamal Ramachandran, Surong Zeng, Heyun Zheng, Sebnem Zorlu Ozer
  • Patent number: 7710986
    Abstract: A multicast architecture and method of operation for multi-hop wireless mesh networks is provided. The multicast architecture is above the network infrastructure to identify a group of clients. These clients share the same application and communicate to each other by using a common multicast address.
    Type: Grant
    Filed: January 5, 2005
    Date of Patent: May 4, 2010
    Assignee: MeshNetworks, Inc.
    Inventors: Surong Zeng, Heyun Zheng
  • Patent number: 7706776
    Abstract: A system and method for enhancing media access control (MAC) address privacy in a multi-hop wireless network, comprising providing at least one node which generates a temporary MAC address for itself for use in the network by at least one other node, and which ensures that the temporary MAC address is unique among other nodes in the network prior to using the temporary MAC address.
    Type: Grant
    Filed: December 6, 2004
    Date of Patent: April 27, 2010
    Assignee: MeshNetworks, Inc.
    Inventor: Heyun Zheng
  • Publication number: 20100027478
    Abstract: Disclosed are methods including a new optimization criterion, Maximum Mesh Coverage (MMC) for a channel selection process during the formation of ad hoc networks. By using MMC, the intelligent access point (IAP) will select a channel to connect as many mesh nodes as possible in addition to meeting the interference minimization requirement. During mesh formation, the channel interference information for a node is first scanned by the node and then broadcast in its available channels. An iteration procedure for meshing network formation allows the IAP to gradually obtain the global channel interference information and broadcast the same so that a maximum number of n-hop nodes communicate on the same frequency channel. If a channel change is required to accommodate the channel interference status of candidate nodes, a channel change message will be broadcast to better achieve the large coverage advantage of a multi-hop configuration.
    Type: Application
    Filed: July 31, 2008
    Publication date: February 4, 2010
    Applicant: Motorola, Inc.
    Inventors: Yuechun Chu, Heyun Zheng
  • Publication number: 20100023752
    Abstract: A method for transmitting groupcast data in a wireless mesh communication network as provided improves security of groupcast data. The method comprises processing, at a supplicant node, authentication handshake data received from an authenticator node, wherein the supplicant node is a next-hop neighbor of the authenticator node away from a root node. The supplicant node then stores a group transient key (GTK) received from the authenticator node. Next, the supplicant node processes authentication handshake data received from a third node, wherein the third node is a next-hop neighbor of the supplicant node away from the root node. The GTK is then transmitted from the supplicant node to the third node. Encrypted groupcast data are then generated at the supplicant node by using the GTK to encrypt groupcast data received from the authenticator node. Finally, the encrypted groupcast data are transmitted from the supplicant node to the third node.
    Type: Application
    Filed: December 27, 2007
    Publication date: January 28, 2010
    Applicant: MOTOROLA, INC.
    Inventors: Charles R. Barker, Michael F. Korus, Ohad Shatil, Heyun Zheng
  • Publication number: 20090210710
    Abstract: A system and method of security authentication and key management scheme in a multi-hop wireless network is provided herein with a hop-by-hop security model. The scheme adapts the 802.11r key hierarchy into the meshed AP network. In this approach, a top key holder (R0KH) derives and holds the top Pairwise Master Key (PMK_0) for each supplicant wireless device after the authentication process. All authenticator AP take the level one key holder (R1KH) role and receive the next level Pairwise Master Key (PMK_1) from R0KH. The link level data protection key is derived from PMK_1 via the 802.11i 4-way handshaking.
    Type: Application
    Filed: January 14, 2009
    Publication date: August 20, 2009
    Applicant: MOTOROLA, INC.
    Inventors: Heyun Zheng, Charles R. Baker, Amit Gandhi, Keith J. Goldberg, Samer S. Hanna, Surong Zeng
  • Patent number: 7499547
    Abstract: A system and method of security authentication and key management scheme in a multi-hop wireless network is provided herein with a hop-by-hop security model. The scheme adapts the 802.11r key hierarchy into the meshed AP network. In this approach, a top key holder (R0KH) derives and holds the top Pairwise Master Key (PMK—0) for each supplicant wireless device after the authentication process. All authenticator AP take the level one key holder (R1KH) role and receive the next level Pairwise Master Key (PMK—1) from R0KH. The link level data protection key is derived from PMK—1 via the 802.11i 4-way handshaking.
    Type: Grant
    Filed: September 7, 2006
    Date of Patent: March 3, 2009
    Assignee: Motorola, Inc.
    Inventors: Heyun Zheng, Charles R. Barker, Jr., Amit Gandhi, Keith J. Goldberg, Samer S. Hanna, Surong Zeng
  • Publication number: 20090031398
    Abstract: Techniques are provided for determining respective roles of a first meshed node (MN) and a second MN during an authentication process. The first MN and the second MN determine whether at least one of the first MN and the second MN have a secure connection to an authentication server. When the first MN and the second MN each have a secure connection to the authentication server, the first MN and the second MN determine whether a first authentication message forwarding cost (AMFC) associated with the first MN is the same as a second AMFC associated with the second MN. When the first AMFC associated with the first MN is the different than the second AMFC associated with the second MN, the MN having the lower AMFC to an IAP (coupled to the authentication server) assumes the authenticator role, and the other MN having the higher AMFC assumes the supplicant role.
    Type: Application
    Filed: July 23, 2007
    Publication date: January 29, 2009
    Applicant: MOTOROLA, INC.
    Inventors: Heyun Zheng, Surong Zeng
  • Patent number: 7483409
    Abstract: A wireless router assisted security handoff method (300) includes an efficient layer 2security handoff for an infrastructure-based mobile multi-hop wireless network. The handoff is assisted with a wireless router (311) which is the first hop from the mobile station (301) to the new access point (307). The security context from the old access point (303) is first delivered to the mobile station (301) in a secure manner. The first handoff message (309) from mobile station (301) to the new access point (307) has three roles namely, re-association request, security context delivery and new session key generation handshaking. The first hop wireless router (311) vouches the freshness of the message contents and tunnels the message securely to the new access point (307). The second message (315) from the new access point (307) to the mobile station (301) completes the handoff process.
    Type: Grant
    Filed: December 30, 2005
    Date of Patent: January 27, 2009
    Assignee: Motorola, Inc.
    Inventor: Heyun Zheng
  • Publication number: 20080205385
    Abstract: Unified groupcast data frame formats are provided for improving the efficiency of groupcast communications in multihop wireless mesh networks, and significantly reducing bandwidth consumption. The unified groupcast data frame formats modify existing BSS data frame formats by inserting a mesh end-to-end sequence number into a field that is normally reserved for a sequence control field. In some implementations, a time-to-live (TTL) value can also be inserted into a QoS control field.
    Type: Application
    Filed: February 26, 2007
    Publication date: August 28, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Surong Zeng, Keith J. Goldberg, Hrishikesh Gossain, William V. Hasty, Heyun Zheng, Sebnem Zorlu Ozer
  • Patent number: 7403492
    Abstract: A system and method for supporting multicast in highly dynamic wireless multi-hop networks, such as ad-hoc networks, with good scalability. The system and method provide a multicast routing algorithm to work in wireless ad-hoc networks without any fixed infrastructure nodes present. In doing so, the system and method provide a technique to build a multicast source specific tree on demand, while using a core source node to limit routing overhead. The system and method further provide a repair process to reduce the latency of discovery of topology change, employ a node sequence number mechanism to differentiate between upstream nodes and downstream nodes on the multicast tree in the repair process, and provide an active joining process to reduce the latency of discovery of membership change.
    Type: Grant
    Filed: May 5, 2005
    Date of Patent: July 22, 2008
    Assignee: MeshNetworks, Inc.
    Inventors: Surong Zeng, Heyun Zheng
  • Publication number: 20080065888
    Abstract: A system and method of security authentication and key management scheme in a multi-hop wireless network is provided herein with a hop-by-hop security model. The scheme adapts the 802.11r key hierarchy into the meshed AP network. In this approach, a top key holder (R0KH) derives and holds the top Pairwise Master Key (PMK_0) for each supplicant wireless device after the authentication process. All authenticator AP take the level one key holder (R1KH) role and receive the next level Pairwise Master Key (PMK_1) from R0KH. The link level data protection key is derived from PMK_1 via the 802.11i 4-way handshaking.
    Type: Application
    Filed: September 7, 2006
    Publication date: March 13, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Heyun Zheng, Charles R. Barker, Amit Gandhi, Keith J. Goldberg, Samer S. Hanna, Surong Zeng
  • Publication number: 20070263559
    Abstract: A multi-hop wireless network includes an originator node, a proxy node, and at least one other node. The originator node generates a data packet and transmits the data packet to the proxy node. The proxy node receives and forwards to the at least one other node the data packet including an originator node address and a proxy node sequence number for an end-to-end groupcast sequence number.
    Type: Application
    Filed: May 12, 2006
    Publication date: November 15, 2007
    Applicant: MOTOROLA, INC.
    Inventors: Hrishikesh Gossain, William Hasty, Surong Zeng, Heyun Zheng
  • Publication number: 20070165592
    Abstract: The present invention provides a system and method for multihop packet forwarding within a multihop wireless communication network. The method uses a data frame format including at least the four address fields to forward packets in a multihop wireless network. The method includes generating a route request packet at a routable device in response to receiving a packet destined for an unknown destination. The route request packet includes an originating device field including an address of an originating device, wherein the originating device generated the packet originally; and a source field, wherein the source field includes an address of the first routable device which generated the route request packet.
    Type: Application
    Filed: January 12, 2007
    Publication date: July 19, 2007
    Applicant: MOTOROLA, INC.
    Inventors: Hrishikesh Gossain, Pankaj Aggarwal, Charles Barker, Keith Goldberg, William Hasty, Avinash Joshi, Shyamal Ramachandran, Surong Zeng, Heyun Zheng, Sebnem Ozer
  • Publication number: 20070153739
    Abstract: A wireless router assisted security handoff method (300) includes an efficient layer 2security handoff for an infrastructure-based mobile multi-hop wireless network. The handoff is assisted with a wireless router (311) which is the first hop from the mobile station (301) to the new access point (307). The security context from the old access point (303) is first delivered to the mobile station (301) in a secure manner. The first handoff message (309) from mobile station (301) to the new access point (307) has three roles namely, re-association request, security context delivery and new session key generation handshaking. The first hop wireless router (311) vouches the freshness of the message contents and tunnels the message securely to the new access point (307). The second message (315) from the new access point (307) to the mobile station (301) completes the handoff process.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 5, 2007
    Inventor: Heyun Zheng
  • Publication number: 20070147620
    Abstract: A method for managing secure routing keys (200) for on-demand routing protocols used in a wireless mesh network includes sending an secure routing key from a key distribution node to an access node (201). A temporary communications route which is time and usage limited is initiated (203) between a wireless device and an internet access point when the wireless device initially joins the network. A secure routing key is sent (205) from the internet access point connected with the key distribution center to the wireless device. Thereafter, the secure routing operation can be started to establish secure routes among all wireless devices which have obtained the same secure routing key in the same manner. Thus, the invention defines a simple and efficient key management technique using initial key establishment and re-keying through dynamically updated key vectors.
    Type: Application
    Filed: December 28, 2005
    Publication date: June 28, 2007
    Inventors: Heyun Zheng, Charles Barker, Surong Zeng
  • Publication number: 20070133592
    Abstract: A method for tree based spatial TDMA scheduling in a multi-hop wireless network (100). A time slot is requested (101) for non-use by a requesting node to all neighboring nodes. Similarly, the requested time slot is next requested (103) for non-use from the requesting node to its parent nodes. If available, a time slot assignment is then requested (109) from the requesting node to its parent node where the time slot assignment is requested (111) from the parent node to the grandparent node of the requesting node. Finally, all neighboring nodes are then informed (117, 119, 121) if both the grandparent node and parent node grant the time slot request to the requesting node. The invention works to reduce packet collisions by providing link-slot formulation in combination with link direction to compensate for spatial reuse loss in a local optimization setting.
    Type: Application
    Filed: December 13, 2005
    Publication date: June 14, 2007
    Inventors: Heyun Zheng, Surong Zeng
  • Publication number: 20070123170
    Abstract: A communication network (600) includes a first communication device (102-1) and at least one other communication device (102-3), wherein the first communication device (102-1) and the at least one other communication device (102-3) are proximately located. The communication network further includes a transaction detector (625) coupled between the first communication device (102-1) and the at least one other communication device (102-3) for detecting one or more transactions intended for each of the proximately located communication devices. The communication network (600) further includes a bandwidth allocator (610) adapted to impede communication activity for a predetermined time for the at least one other proximately located communication devices (102-3), and activate communication activity for the predetermined time for the first communication device (102-1) in response to the transaction detector (625) detecting a transaction intended for the first communication device (102-1).
    Type: Application
    Filed: November 30, 2005
    Publication date: May 31, 2007
    Inventors: Sebnem Ozer, Robert Greenway, Samer Hanna, William Hasty, Shyamal Ramachandran, Guenael Strutt, Surong Zeng, Heyun Zheng, Maximo Zorrilla
  • Publication number: 20070047477
    Abstract: A system and method for providing an authentication protocol for authenticating nodes (102) for access to a network (100), such as to a server of a wireless ad-hoc peer-to-peer network (100). The wireless communication network (100), such as a mobile wireless distribution system (WDS), employs an extensible authentication protocol over LAN (EAPOL) proxy to authenticate nodes for access to the network via mobile or fixed access points (106).
    Type: Application
    Filed: August 23, 2005
    Publication date: March 1, 2007
    Applicant: MeshNetworks, Inc.
    Inventor: Heyun Zheng
  • Publication number: 20060250999
    Abstract: A system and method for supporting multicast in highly dynamic wireless multi-hop networks, such as ad-hoc networks, with good scalability. The system and method provide a multicast routing algorithm to work in wireless ad-hoc networks without any fixed infrastructure nodes present. In doing so, the system and method provide a technique to build a multicast source specific tree on demand, while using a core source node to limit routing overhead. The system and method further provide a repair process to reduce the latency of discovery of topology change, employ a node sequence number mechanism to differentiate between upstream nodes and downstream nodes on the multicast tree in the repair process, and provide an active joining process to reduce the latency of discovery of membership change.
    Type: Application
    Filed: May 5, 2005
    Publication date: November 9, 2006
    Applicant: Motorola, Inc.
    Inventors: Surong Zeng, Heyun Zheng