Patents by Inventor Heyun Zheng
Heyun Zheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7782835Abstract: The present invention provides a system and method for multihop packet forwarding within a multihop wireless communication network. The method uses a data frame format including at least the four address fields to forward packets in a multihop wireless network. The method includes generating a route request packet at a routable device in response to receiving a packet destined for an unknown destination. The route request packet includes an originating device field including an address of an originating device, wherein the originating device generated the packet originally; and a source field, wherein the source field includes an address of the first routable device which generated the route request packet.Type: GrantFiled: January 12, 2007Date of Patent: August 24, 2010Assignee: Motorola, Inc.Inventors: Hrishikesh Gossain, Pankaj Aggarwal, Charles R. Barker, Jr., Keith J. Goldberg, William V. Hasty, Avinash Joshi, Shyamal Ramachandran, Surong Zeng, Heyun Zheng, Sebnem Zorlu Ozer
-
Patent number: 7710986Abstract: A multicast architecture and method of operation for multi-hop wireless mesh networks is provided. The multicast architecture is above the network infrastructure to identify a group of clients. These clients share the same application and communicate to each other by using a common multicast address.Type: GrantFiled: January 5, 2005Date of Patent: May 4, 2010Assignee: MeshNetworks, Inc.Inventors: Surong Zeng, Heyun Zheng
-
Patent number: 7706776Abstract: A system and method for enhancing media access control (MAC) address privacy in a multi-hop wireless network, comprising providing at least one node which generates a temporary MAC address for itself for use in the network by at least one other node, and which ensures that the temporary MAC address is unique among other nodes in the network prior to using the temporary MAC address.Type: GrantFiled: December 6, 2004Date of Patent: April 27, 2010Assignee: MeshNetworks, Inc.Inventor: Heyun Zheng
-
Publication number: 20100027478Abstract: Disclosed are methods including a new optimization criterion, Maximum Mesh Coverage (MMC) for a channel selection process during the formation of ad hoc networks. By using MMC, the intelligent access point (IAP) will select a channel to connect as many mesh nodes as possible in addition to meeting the interference minimization requirement. During mesh formation, the channel interference information for a node is first scanned by the node and then broadcast in its available channels. An iteration procedure for meshing network formation allows the IAP to gradually obtain the global channel interference information and broadcast the same so that a maximum number of n-hop nodes communicate on the same frequency channel. If a channel change is required to accommodate the channel interference status of candidate nodes, a channel change message will be broadcast to better achieve the large coverage advantage of a multi-hop configuration.Type: ApplicationFiled: July 31, 2008Publication date: February 4, 2010Applicant: Motorola, Inc.Inventors: Yuechun Chu, Heyun Zheng
-
Publication number: 20100023752Abstract: A method for transmitting groupcast data in a wireless mesh communication network as provided improves security of groupcast data. The method comprises processing, at a supplicant node, authentication handshake data received from an authenticator node, wherein the supplicant node is a next-hop neighbor of the authenticator node away from a root node. The supplicant node then stores a group transient key (GTK) received from the authenticator node. Next, the supplicant node processes authentication handshake data received from a third node, wherein the third node is a next-hop neighbor of the supplicant node away from the root node. The GTK is then transmitted from the supplicant node to the third node. Encrypted groupcast data are then generated at the supplicant node by using the GTK to encrypt groupcast data received from the authenticator node. Finally, the encrypted groupcast data are transmitted from the supplicant node to the third node.Type: ApplicationFiled: December 27, 2007Publication date: January 28, 2010Applicant: MOTOROLA, INC.Inventors: Charles R. Barker, Michael F. Korus, Ohad Shatil, Heyun Zheng
-
SECURITY AUTHENTICATION AND KEY MANAGEMENT WITHIN AN INFRASTRUCTURE-BASED WIRELESS MULTI-HOP NETWORK
Publication number: 20090210710Abstract: A system and method of security authentication and key management scheme in a multi-hop wireless network is provided herein with a hop-by-hop security model. The scheme adapts the 802.11r key hierarchy into the meshed AP network. In this approach, a top key holder (R0KH) derives and holds the top Pairwise Master Key (PMK_0) for each supplicant wireless device after the authentication process. All authenticator AP take the level one key holder (R1KH) role and receive the next level Pairwise Master Key (PMK_1) from R0KH. The link level data protection key is derived from PMK_1 via the 802.11i 4-way handshaking.Type: ApplicationFiled: January 14, 2009Publication date: August 20, 2009Applicant: MOTOROLA, INC.Inventors: Heyun Zheng, Charles R. Baker, Amit Gandhi, Keith J. Goldberg, Samer S. Hanna, Surong Zeng -
Security authentication and key management within an infrastructure based wireless multi-hop network
Patent number: 7499547Abstract: A system and method of security authentication and key management scheme in a multi-hop wireless network is provided herein with a hop-by-hop security model. The scheme adapts the 802.11r key hierarchy into the meshed AP network. In this approach, a top key holder (R0KH) derives and holds the top Pairwise Master Key (PMK—0) for each supplicant wireless device after the authentication process. All authenticator AP take the level one key holder (R1KH) role and receive the next level Pairwise Master Key (PMK—1) from R0KH. The link level data protection key is derived from PMK—1 via the 802.11i 4-way handshaking.Type: GrantFiled: September 7, 2006Date of Patent: March 3, 2009Assignee: Motorola, Inc.Inventors: Heyun Zheng, Charles R. Barker, Jr., Amit Gandhi, Keith J. Goldberg, Samer S. Hanna, Surong Zeng -
Publication number: 20090031398Abstract: Techniques are provided for determining respective roles of a first meshed node (MN) and a second MN during an authentication process. The first MN and the second MN determine whether at least one of the first MN and the second MN have a secure connection to an authentication server. When the first MN and the second MN each have a secure connection to the authentication server, the first MN and the second MN determine whether a first authentication message forwarding cost (AMFC) associated with the first MN is the same as a second AMFC associated with the second MN. When the first AMFC associated with the first MN is the different than the second AMFC associated with the second MN, the MN having the lower AMFC to an IAP (coupled to the authentication server) assumes the authenticator role, and the other MN having the higher AMFC assumes the supplicant role.Type: ApplicationFiled: July 23, 2007Publication date: January 29, 2009Applicant: MOTOROLA, INC.Inventors: Heyun Zheng, Surong Zeng
-
Patent number: 7483409Abstract: A wireless router assisted security handoff method (300) includes an efficient layer 2security handoff for an infrastructure-based mobile multi-hop wireless network. The handoff is assisted with a wireless router (311) which is the first hop from the mobile station (301) to the new access point (307). The security context from the old access point (303) is first delivered to the mobile station (301) in a secure manner. The first handoff message (309) from mobile station (301) to the new access point (307) has three roles namely, re-association request, security context delivery and new session key generation handshaking. The first hop wireless router (311) vouches the freshness of the message contents and tunnels the message securely to the new access point (307). The second message (315) from the new access point (307) to the mobile station (301) completes the handoff process.Type: GrantFiled: December 30, 2005Date of Patent: January 27, 2009Assignee: Motorola, Inc.Inventor: Heyun Zheng
-
Publication number: 20080205385Abstract: Unified groupcast data frame formats are provided for improving the efficiency of groupcast communications in multihop wireless mesh networks, and significantly reducing bandwidth consumption. The unified groupcast data frame formats modify existing BSS data frame formats by inserting a mesh end-to-end sequence number into a field that is normally reserved for a sequence control field. In some implementations, a time-to-live (TTL) value can also be inserted into a QoS control field.Type: ApplicationFiled: February 26, 2007Publication date: August 28, 2008Applicant: MOTOROLA, INC.Inventors: Surong Zeng, Keith J. Goldberg, Hrishikesh Gossain, William V. Hasty, Heyun Zheng, Sebnem Zorlu Ozer
-
Patent number: 7403492Abstract: A system and method for supporting multicast in highly dynamic wireless multi-hop networks, such as ad-hoc networks, with good scalability. The system and method provide a multicast routing algorithm to work in wireless ad-hoc networks without any fixed infrastructure nodes present. In doing so, the system and method provide a technique to build a multicast source specific tree on demand, while using a core source node to limit routing overhead. The system and method further provide a repair process to reduce the latency of discovery of topology change, employ a node sequence number mechanism to differentiate between upstream nodes and downstream nodes on the multicast tree in the repair process, and provide an active joining process to reduce the latency of discovery of membership change.Type: GrantFiled: May 5, 2005Date of Patent: July 22, 2008Assignee: MeshNetworks, Inc.Inventors: Surong Zeng, Heyun Zheng
-
SECURITY AUTHENTICATION AND KEY MANAGEMENT WITHIN AN INFRASTRUCTURE BASED WIRELESS MULTI-HOP NETWORK
Publication number: 20080065888Abstract: A system and method of security authentication and key management scheme in a multi-hop wireless network is provided herein with a hop-by-hop security model. The scheme adapts the 802.11r key hierarchy into the meshed AP network. In this approach, a top key holder (R0KH) derives and holds the top Pairwise Master Key (PMK_0) for each supplicant wireless device after the authentication process. All authenticator AP take the level one key holder (R1KH) role and receive the next level Pairwise Master Key (PMK_1) from R0KH. The link level data protection key is derived from PMK_1 via the 802.11i 4-way handshaking.Type: ApplicationFiled: September 7, 2006Publication date: March 13, 2008Applicant: MOTOROLA, INC.Inventors: Heyun Zheng, Charles R. Barker, Amit Gandhi, Keith J. Goldberg, Samer S. Hanna, Surong Zeng -
Publication number: 20070263559Abstract: A multi-hop wireless network includes an originator node, a proxy node, and at least one other node. The originator node generates a data packet and transmits the data packet to the proxy node. The proxy node receives and forwards to the at least one other node the data packet including an originator node address and a proxy node sequence number for an end-to-end groupcast sequence number.Type: ApplicationFiled: May 12, 2006Publication date: November 15, 2007Applicant: MOTOROLA, INC.Inventors: Hrishikesh Gossain, William Hasty, Surong Zeng, Heyun Zheng
-
Publication number: 20070165592Abstract: The present invention provides a system and method for multihop packet forwarding within a multihop wireless communication network. The method uses a data frame format including at least the four address fields to forward packets in a multihop wireless network. The method includes generating a route request packet at a routable device in response to receiving a packet destined for an unknown destination. The route request packet includes an originating device field including an address of an originating device, wherein the originating device generated the packet originally; and a source field, wherein the source field includes an address of the first routable device which generated the route request packet.Type: ApplicationFiled: January 12, 2007Publication date: July 19, 2007Applicant: MOTOROLA, INC.Inventors: Hrishikesh Gossain, Pankaj Aggarwal, Charles Barker, Keith Goldberg, William Hasty, Avinash Joshi, Shyamal Ramachandran, Surong Zeng, Heyun Zheng, Sebnem Ozer
-
Publication number: 20070153739Abstract: A wireless router assisted security handoff method (300) includes an efficient layer 2security handoff for an infrastructure-based mobile multi-hop wireless network. The handoff is assisted with a wireless router (311) which is the first hop from the mobile station (301) to the new access point (307). The security context from the old access point (303) is first delivered to the mobile station (301) in a secure manner. The first handoff message (309) from mobile station (301) to the new access point (307) has three roles namely, re-association request, security context delivery and new session key generation handshaking. The first hop wireless router (311) vouches the freshness of the message contents and tunnels the message securely to the new access point (307). The second message (315) from the new access point (307) to the mobile station (301) completes the handoff process.Type: ApplicationFiled: December 30, 2005Publication date: July 5, 2007Inventor: Heyun Zheng
-
Publication number: 20070147620Abstract: A method for managing secure routing keys (200) for on-demand routing protocols used in a wireless mesh network includes sending an secure routing key from a key distribution node to an access node (201). A temporary communications route which is time and usage limited is initiated (203) between a wireless device and an internet access point when the wireless device initially joins the network. A secure routing key is sent (205) from the internet access point connected with the key distribution center to the wireless device. Thereafter, the secure routing operation can be started to establish secure routes among all wireless devices which have obtained the same secure routing key in the same manner. Thus, the invention defines a simple and efficient key management technique using initial key establishment and re-keying through dynamically updated key vectors.Type: ApplicationFiled: December 28, 2005Publication date: June 28, 2007Inventors: Heyun Zheng, Charles Barker, Surong Zeng
-
Publication number: 20070133592Abstract: A method for tree based spatial TDMA scheduling in a multi-hop wireless network (100). A time slot is requested (101) for non-use by a requesting node to all neighboring nodes. Similarly, the requested time slot is next requested (103) for non-use from the requesting node to its parent nodes. If available, a time slot assignment is then requested (109) from the requesting node to its parent node where the time slot assignment is requested (111) from the parent node to the grandparent node of the requesting node. Finally, all neighboring nodes are then informed (117, 119, 121) if both the grandparent node and parent node grant the time slot request to the requesting node. The invention works to reduce packet collisions by providing link-slot formulation in combination with link direction to compensate for spatial reuse loss in a local optimization setting.Type: ApplicationFiled: December 13, 2005Publication date: June 14, 2007Inventors: Heyun Zheng, Surong Zeng
-
Publication number: 20070123170Abstract: A communication network (600) includes a first communication device (102-1) and at least one other communication device (102-3), wherein the first communication device (102-1) and the at least one other communication device (102-3) are proximately located. The communication network further includes a transaction detector (625) coupled between the first communication device (102-1) and the at least one other communication device (102-3) for detecting one or more transactions intended for each of the proximately located communication devices. The communication network (600) further includes a bandwidth allocator (610) adapted to impede communication activity for a predetermined time for the at least one other proximately located communication devices (102-3), and activate communication activity for the predetermined time for the first communication device (102-1) in response to the transaction detector (625) detecting a transaction intended for the first communication device (102-1).Type: ApplicationFiled: November 30, 2005Publication date: May 31, 2007Inventors: Sebnem Ozer, Robert Greenway, Samer Hanna, William Hasty, Shyamal Ramachandran, Guenael Strutt, Surong Zeng, Heyun Zheng, Maximo Zorrilla
-
Publication number: 20070047477Abstract: A system and method for providing an authentication protocol for authenticating nodes (102) for access to a network (100), such as to a server of a wireless ad-hoc peer-to-peer network (100). The wireless communication network (100), such as a mobile wireless distribution system (WDS), employs an extensible authentication protocol over LAN (EAPOL) proxy to authenticate nodes for access to the network via mobile or fixed access points (106).Type: ApplicationFiled: August 23, 2005Publication date: March 1, 2007Applicant: MeshNetworks, Inc.Inventor: Heyun Zheng
-
Publication number: 20060250999Abstract: A system and method for supporting multicast in highly dynamic wireless multi-hop networks, such as ad-hoc networks, with good scalability. The system and method provide a multicast routing algorithm to work in wireless ad-hoc networks without any fixed infrastructure nodes present. In doing so, the system and method provide a technique to build a multicast source specific tree on demand, while using a core source node to limit routing overhead. The system and method further provide a repair process to reduce the latency of discovery of topology change, employ a node sequence number mechanism to differentiate between upstream nodes and downstream nodes on the multicast tree in the repair process, and provide an active joining process to reduce the latency of discovery of membership change.Type: ApplicationFiled: May 5, 2005Publication date: November 9, 2006Applicant: Motorola, Inc.Inventors: Surong Zeng, Heyun Zheng