Patents by Inventor Jonathan Agre
Jonathan Agre has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20080186899Abstract: The embodiments generate a new type of amble sequence for a wireless communication network with mixed nodes, by generating a first amble sequence invisible to a first node based upon an existing amble sequence for the first node and generating a second amble sequence having a low to zero cross-correlation with the first amble sequence, based upon the first amble sequence. The first and second amble sequences can be broadcast in alternating communication link frames.Type: ApplicationFiled: July 31, 2007Publication date: August 7, 2008Applicant: Fujitsu LimitedInventors: Chenxi Zhu, Wei-Peng Chen, Jonathan Agre
-
Publication number: 20080171551Abstract: One or more stations are sorted based on respective load levels, and a reuse pattern is generated, based on the sorted load levels and mapped interference levels, including one or more reuse sets of stations capable of sharing a transmission resource. The stations within each reuse set are listed in order based on their respective load levels, and an additional station is added to a reuse set, as long as the cumulative transmission level within the reuse set is below a threshold interference level and the additional station is not already listed in another reuse set. A network schedule is updated based on the reuse pattern to increase bandwidth efficiency in the network.Type: ApplicationFiled: July 13, 2007Publication date: July 17, 2008Applicant: Fujitsu LimitedInventors: Chenxi Zhu, Wei-Peng Chen, Jonathan Agre, Dorin Viorel, Jagan Seshadri
-
Publication number: 20080108359Abstract: Interference levels occurring at one or more stations are mapped, and a reuse pattern is generated, based on the mapped interference levels, including one or more reuse sets of stations capable of sharing a transmission resource. The stations within each reuse set are listed in increasing order based on their respective interference levels, and an additional station is added to a reuse set, as long as the cumulative interference level within the reuse set is below a threshold interference level and the additional station is not already listed in another reuse set. A network schedule is updated based on the reuse pattern to increase bandwidth efficiency in the network.Type: ApplicationFiled: July 13, 2007Publication date: May 8, 2008Applicant: Fujitsu LimitedInventors: Chenxi ZHU, Dorin Viorel, Jagan Seshadri, Jonathan Agre, Wei-Peng Chen
-
Publication number: 20080107035Abstract: Interference levels occurring at one or more stations in a wireless network, where each of said one or more stations is a base station or a relay station. The measured interference levels are mapped by building a first matrix including noise plus interference occurring at each of the one or more stations, respectively, and scheduled transmissions at predetermined times by each relay station respectively are mapped by building a second matrix. The first matrix and the second matrix are multiplied in order to determine the noise plus interference impact upon each base station by each relay station so that a network schedule can be generated in order to increase bandwidth efficiency in the network.Type: ApplicationFiled: July 13, 2007Publication date: May 8, 2008Applicant: Fujitsu LimitedInventors: Chenxi ZHU, Dorin Viorel, Jagan Seshadri, Jonathan Agre, Wei-Peng Chen
-
Publication number: 20080046898Abstract: A method for implementing an external trusted platform module includes establishing a connection with a remote host device via a remote interface. The method also includes receiving and processing a request for a trusted platform module (TPM) function from the remote host device via the remote interface. The method additionally includes generating a response to the request for the TPM function based on the processing of the request for the TPM function received from the remote host device. The method further includes sending the response to the request for the TPM function to the remote host device via the remote interface.Type: ApplicationFiled: August 17, 2007Publication date: February 21, 2008Applicant: Fujitsu LimitedInventors: Jesus Molina, Jonathan Agre
-
Publication number: 20070294416Abstract: A security management approach that combines network security management with application layer or software service security to address the threat of internal network security attacks. The invention is directed to a method for enhancing network security on a computer network. Data access privileges relating to users and services are interpreted, network access rules are determined based on the interpreted privileges, and network message traffic is monitored and filtered based on the determined network access rules. The interpreting, determining, monitoring, and filtering are performed at a network layer responsible for controlling how a network device gains access to the network, such as the Media Access Control (MAC) layer.Type: ApplicationFiled: June 15, 2006Publication date: December 20, 2007Applicant: Fujitsu LimitedInventors: Jonathan Agre, Jesus Molina-Terriza, Lusheng Ji, Prabha Ramachandran
-
Publication number: 20070022058Abstract: Methods and systems provide a secure transaction server (STS); provide an authentic point of sale (POS) device, according to a first authentication parameter of the STS; provide an authentic mobile purchasing device, according to a second authentication parameter of the STS; provide a short-range communication method between the POS device and the mobile purchasing device; correlate by the STS a personal identification entry (PIE) and the authentic mobile purchasing device; transmit, by the POS device, a time dependent transformed secure POS authenticable POS purchase action to the STS; input the PIE to the mobile purchasing device to transmit a time dependent transformed secure user authenticable POS purchase action to the POS device via the short-range communication method; and approve, by the STS, the POS purchase action for the POS device and for the mobile purchasing device, according to the authentic POS device, and according to the authentic mobile purchasing device and the STS correlating of the PIE aType: ApplicationFiled: July 18, 2006Publication date: January 25, 2007Applicant: Fujitsu LimitedInventors: Yannis Labrou, Jonathan Agre
-
Publication number: 20060240780Abstract: Disclosed is a wireless station having a receiver and a network allocation vector associated with each of a plurality of directional antennas. The receivers concurrently listen for frames from remote stations. When any receiver detects a frame from a remote station, the receiver activates its associated NAV. The station has one or more transmitters that can transmit using the antennas. While transmitting a signal using an antenna, the receivers associated with any non-transmitting antennas continue to listen for signals from remote stations. The station cancels any signals from the transmitting antenna received by the non-transmitting antennas. To perform the cancellation, the station performs a self-calibration procedure. The station can self-calibrate by either silencing neighboring stations or by inserting null tones into a transmitted calibration signal.Type: ApplicationFiled: March 27, 2006Publication date: October 26, 2006Applicant: Fujistu LimitedInventors: Chenxi Zhu, Tamer Nadeem, Jonathan Agre
-
Publication number: 20060206709Abstract: A method, and an apparatus performing the method, is provided by authenticating a mobile device communicably connectable to a wireless network by an authentication parameter from a secure transaction server (STS), as a mobile device authenticator; providing an STS correlation between a personal identification entry (PIE) and the mobile device authenticator; and inputting, by a user, the PIE and a provider action, to the mobile device authenticator to transmit a transformed secure user authenticable authorization request to the STS over the wireless network to authorize an action with a provider.Type: ApplicationFiled: March 24, 2006Publication date: September 14, 2006Applicant: Fujitsu LimitedInventors: Yannis Labrou, Jonathan Agre
-
Patent number: 7046166Abstract: A modular sensing station architecture that supports flexible power management includes one or more sensors connected to a WINS node. Each node includes power supply, data acquisition, programmable microprocessor and wireless transceiver modules that communicate data and instructions over a bus. The bus suitably includes a signal bus for communicating instructions and low bandwidth data and a high-capacity data bus for transferring high bandwidth data and executing high power tasks. The dual bus approach provides constant communications among the modules and low-capacity data transfer with the option to activate the high-power circuits or tasks only as needed.Type: GrantFiled: April 29, 2003Date of Patent: May 16, 2006Assignee: Rockwell Scientific Licensing, LLCInventors: Maxim Pedyash, Victor Panov, Nikolai Romanov, Dustin McIntire, Gary Gould, Loren Clare, Jonathan Agre, Allen Twarowski, James Duncan
-
Publication number: 20050203966Abstract: A computer-based system securely transmitting and authenticating a transaction input by a user while retaining the anonymity of the user with respect to content of the transaction, including a device encoding the content of the transaction input by the user with a key known only to another device, encoding other portions of the transaction with another key known only to a secure transaction server, and sending the encoded content of the transaction and the encoded other portions of the transaction to the secure transaction server to authenticate an identity of the user of the device, wherein the secure transaction server decodes the other portions of the transaction and sends the encoded content of the transaction to the another device to be finally decoded.Type: ApplicationFiled: January 25, 2005Publication date: September 15, 2005Applicant: Fujitsu LimitedInventors: Yannis Labrou, Lusheng Ji, Jonathan Agre, Jesus Terriza
-
Publication number: 20050187873Abstract: A mobile phone system and method of initializing, at a secure transaction server (STS), a mobile payment software with a software authentication parameter, as an authentic mobile payment software; providing an STS correlation between a personal identification entry (PIE) and the authentic mobile payment software; installing, in a mobile phone, the authentic mobile payment software; and inputting, by a user, the PIE to the installed authentic mobile payment software to generate according to the PIE and the software authentication parameter a transformed secure authenticable mobile phone cashless monetary transaction over the mobile phone network, as a mobile phone wireless wallet of the user of the mobile phone. The mobile phone authenticable cashless monetary transaction is performed according to an agreement view(s) protocol.Type: ApplicationFiled: January 31, 2005Publication date: August 25, 2005Applicant: FUJITSU LIMITEDInventors: Yannis Labrou, Lusheng Ji, Jonathan Agre, Jesus Terriza, Wei-lun Chen
-
Publication number: 20050152305Abstract: A wireless computer network includes a backbone network including backbone network nodes authenticated to each other and in communication with each other. The wireless computer network also includes a master authenticator node and a proxy authenticator node among the backbone network nodes. When an unauthenticated new node requests authentication to the backbone network and the unauthenticated new node is in communication with at least one of the backbone network nodes, the at least one of the backbone network nodes becoming the proxy authenticator node for the unauthenticated new node and communicates with the master authenticator node to authenticate the unauthenticated new node to the backbone network.Type: ApplicationFiled: August 31, 2004Publication date: July 14, 2005Applicant: FUJITSU LIMITEDInventors: Lusheng Ji, Brian Feldman, Jonathan Agre
-
Publication number: 20050136845Abstract: A system and method uses wireless communication devices as beacons to determine the relative location of another target wireless communication device. The beacons transmit identifying information that the target device can use to determine the identity of the beacon. The target device can measure the received intensity of the beacon transmissions and determine an associated beacon that best satisfies a specified criteria (e.g., largest signal strength) using a procedure of the present invention that discriminates between multiple beacons.Type: ApplicationFiled: August 31, 2004Publication date: June 23, 2005Applicant: FUJITSU LIMITEDInventors: Ryusuke Masuoka, Sasikanth Avancha, Sohil Thakkar, Jonathan Agre
-
Publication number: 20050138410Abstract: Pervasive security is provided by a combination of physical interfaces and network interfaces to a service to a user includes establishing by the user's client device network connectivity to the service, transmitting by the service an identifier to the user's client device, determining by the service whether the user enters the identifier into the service in physical proximity to the service, and invoking the service once the user has entered the identifier into the service while in physical proximity to the service. The service can provide indication that the service has been granted by sending a control page to the user's client device.Type: ApplicationFiled: September 17, 2004Publication date: June 23, 2005Applicant: FUJITSU LIMITEDInventors: Ryusuke Masuouka, Narendar Shankar, Zhexuan Song, Wei-lun Chen, Michael Grove, Yannis Labrou, Jonathan Agre
-
Publication number: 20050043999Abstract: A pay-per-connection system is coupled to a network service provider and to a client computer. The pay-per-connection system receives payment and a passcode from a user, determines duration of use based on the payment, and provides access by the client computer to the network service provider based on the payment and the passcode without advance sign-up by the user with the network service provider.Type: ApplicationFiled: June 25, 2004Publication date: February 24, 2005Applicant: Fujitsu LimitedInventors: Lusheng Ji, Yannis Labrou, Jonathan Agre
-
Publication number: 20050027543Abstract: A method for conducting a purchasing agreement for goods and services between a consumer and a merchant through a trusted a third party and using a wireless network includes generating, by the consumer, a first view of the agreement and transmitting the first view of the agreement to the third party, generating, independently by the merchant, a second view of the agreement and transmitting the second view of the agreement to the third party, and receiving, by the third party the consumer view of the agreement and the merchant view of the agreement, verifying identities of the merchant and the consumer and that the details of the independently generated views of the agreements are consistent and taking action to execute the purchasing agreement if the conditions are satisfied. The third party includes a Secure Transaction Server.Type: ApplicationFiled: July 29, 2003Publication date: February 3, 2005Applicant: FUJITSU LIMITEDInventors: Yannis Labrou, Lusheng Jl, Jonathan Agre
-
Publication number: 20040217881Abstract: A modular sensing station architecture that supports flexible power management includes one or more sensors connected to a WINS node. Each node includes power supply, data acquisition, programmable microprocessor and wireless transceiver modules that communicate data and instructions over a bus. The bus suitably includes a signal bus for communicating instructions and low bandwidth data and a high-capacity data bus for transferring high bandwidth data and executing high power tasks. The dual bus approach provides constant communications among the modules and low-capacity data transfer with the option to activate the high-power circuits or tasks only as needed.Type: ApplicationFiled: April 29, 2003Publication date: November 4, 2004Applicant: Innovative Technology Licensing, LLCInventors: Maxim Pedyash, Victor Panov, Nikolai Romanov, Dustin McIntire, Gary Gould, Loren Clare, Jonathan Agre, Allen Twarowski, James Duncan
-
Publication number: 20040103275Abstract: A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The Secure Nomadic Wireless Network, or SNOWNET, follows a hierarchical approach. Special SNOWNET nodes are deployed in the area where networking service is needed and form a backbone network. At the same time, SNOWNET nodes provide local access service to regular mobile clients. SNOWNET provides security through authentication of the nodes and clients, as well as through encryption of the data.Type: ApplicationFiled: June 18, 2003Publication date: May 27, 2004Applicant: Fujitsu LimitedInventors: Lusheng Ji, Jonathan Agre, Arunesh Mishra, Sohil Thakkar