Patents by Inventor Jonathan Agre

Jonathan Agre has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080186899
    Abstract: The embodiments generate a new type of amble sequence for a wireless communication network with mixed nodes, by generating a first amble sequence invisible to a first node based upon an existing amble sequence for the first node and generating a second amble sequence having a low to zero cross-correlation with the first amble sequence, based upon the first amble sequence. The first and second amble sequences can be broadcast in alternating communication link frames.
    Type: Application
    Filed: July 31, 2007
    Publication date: August 7, 2008
    Applicant: Fujitsu Limited
    Inventors: Chenxi Zhu, Wei-Peng Chen, Jonathan Agre
  • Publication number: 20080171551
    Abstract: One or more stations are sorted based on respective load levels, and a reuse pattern is generated, based on the sorted load levels and mapped interference levels, including one or more reuse sets of stations capable of sharing a transmission resource. The stations within each reuse set are listed in order based on their respective load levels, and an additional station is added to a reuse set, as long as the cumulative transmission level within the reuse set is below a threshold interference level and the additional station is not already listed in another reuse set. A network schedule is updated based on the reuse pattern to increase bandwidth efficiency in the network.
    Type: Application
    Filed: July 13, 2007
    Publication date: July 17, 2008
    Applicant: Fujitsu Limited
    Inventors: Chenxi Zhu, Wei-Peng Chen, Jonathan Agre, Dorin Viorel, Jagan Seshadri
  • Publication number: 20080108359
    Abstract: Interference levels occurring at one or more stations are mapped, and a reuse pattern is generated, based on the mapped interference levels, including one or more reuse sets of stations capable of sharing a transmission resource. The stations within each reuse set are listed in increasing order based on their respective interference levels, and an additional station is added to a reuse set, as long as the cumulative interference level within the reuse set is below a threshold interference level and the additional station is not already listed in another reuse set. A network schedule is updated based on the reuse pattern to increase bandwidth efficiency in the network.
    Type: Application
    Filed: July 13, 2007
    Publication date: May 8, 2008
    Applicant: Fujitsu Limited
    Inventors: Chenxi ZHU, Dorin Viorel, Jagan Seshadri, Jonathan Agre, Wei-Peng Chen
  • Publication number: 20080107035
    Abstract: Interference levels occurring at one or more stations in a wireless network, where each of said one or more stations is a base station or a relay station. The measured interference levels are mapped by building a first matrix including noise plus interference occurring at each of the one or more stations, respectively, and scheduled transmissions at predetermined times by each relay station respectively are mapped by building a second matrix. The first matrix and the second matrix are multiplied in order to determine the noise plus interference impact upon each base station by each relay station so that a network schedule can be generated in order to increase bandwidth efficiency in the network.
    Type: Application
    Filed: July 13, 2007
    Publication date: May 8, 2008
    Applicant: Fujitsu Limited
    Inventors: Chenxi ZHU, Dorin Viorel, Jagan Seshadri, Jonathan Agre, Wei-Peng Chen
  • Publication number: 20080046898
    Abstract: A method for implementing an external trusted platform module includes establishing a connection with a remote host device via a remote interface. The method also includes receiving and processing a request for a trusted platform module (TPM) function from the remote host device via the remote interface. The method additionally includes generating a response to the request for the TPM function based on the processing of the request for the TPM function received from the remote host device. The method further includes sending the response to the request for the TPM function to the remote host device via the remote interface.
    Type: Application
    Filed: August 17, 2007
    Publication date: February 21, 2008
    Applicant: Fujitsu Limited
    Inventors: Jesus Molina, Jonathan Agre
  • Publication number: 20070294416
    Abstract: A security management approach that combines network security management with application layer or software service security to address the threat of internal network security attacks. The invention is directed to a method for enhancing network security on a computer network. Data access privileges relating to users and services are interpreted, network access rules are determined based on the interpreted privileges, and network message traffic is monitored and filtered based on the determined network access rules. The interpreting, determining, monitoring, and filtering are performed at a network layer responsible for controlling how a network device gains access to the network, such as the Media Access Control (MAC) layer.
    Type: Application
    Filed: June 15, 2006
    Publication date: December 20, 2007
    Applicant: Fujitsu Limited
    Inventors: Jonathan Agre, Jesus Molina-Terriza, Lusheng Ji, Prabha Ramachandran
  • Publication number: 20070022058
    Abstract: Methods and systems provide a secure transaction server (STS); provide an authentic point of sale (POS) device, according to a first authentication parameter of the STS; provide an authentic mobile purchasing device, according to a second authentication parameter of the STS; provide a short-range communication method between the POS device and the mobile purchasing device; correlate by the STS a personal identification entry (PIE) and the authentic mobile purchasing device; transmit, by the POS device, a time dependent transformed secure POS authenticable POS purchase action to the STS; input the PIE to the mobile purchasing device to transmit a time dependent transformed secure user authenticable POS purchase action to the POS device via the short-range communication method; and approve, by the STS, the POS purchase action for the POS device and for the mobile purchasing device, according to the authentic POS device, and according to the authentic mobile purchasing device and the STS correlating of the PIE a
    Type: Application
    Filed: July 18, 2006
    Publication date: January 25, 2007
    Applicant: Fujitsu Limited
    Inventors: Yannis Labrou, Jonathan Agre
  • Publication number: 20060240780
    Abstract: Disclosed is a wireless station having a receiver and a network allocation vector associated with each of a plurality of directional antennas. The receivers concurrently listen for frames from remote stations. When any receiver detects a frame from a remote station, the receiver activates its associated NAV. The station has one or more transmitters that can transmit using the antennas. While transmitting a signal using an antenna, the receivers associated with any non-transmitting antennas continue to listen for signals from remote stations. The station cancels any signals from the transmitting antenna received by the non-transmitting antennas. To perform the cancellation, the station performs a self-calibration procedure. The station can self-calibrate by either silencing neighboring stations or by inserting null tones into a transmitted calibration signal.
    Type: Application
    Filed: March 27, 2006
    Publication date: October 26, 2006
    Applicant: Fujistu Limited
    Inventors: Chenxi Zhu, Tamer Nadeem, Jonathan Agre
  • Publication number: 20060206709
    Abstract: A method, and an apparatus performing the method, is provided by authenticating a mobile device communicably connectable to a wireless network by an authentication parameter from a secure transaction server (STS), as a mobile device authenticator; providing an STS correlation between a personal identification entry (PIE) and the mobile device authenticator; and inputting, by a user, the PIE and a provider action, to the mobile device authenticator to transmit a transformed secure user authenticable authorization request to the STS over the wireless network to authorize an action with a provider.
    Type: Application
    Filed: March 24, 2006
    Publication date: September 14, 2006
    Applicant: Fujitsu Limited
    Inventors: Yannis Labrou, Jonathan Agre
  • Patent number: 7046166
    Abstract: A modular sensing station architecture that supports flexible power management includes one or more sensors connected to a WINS node. Each node includes power supply, data acquisition, programmable microprocessor and wireless transceiver modules that communicate data and instructions over a bus. The bus suitably includes a signal bus for communicating instructions and low bandwidth data and a high-capacity data bus for transferring high bandwidth data and executing high power tasks. The dual bus approach provides constant communications among the modules and low-capacity data transfer with the option to activate the high-power circuits or tasks only as needed.
    Type: Grant
    Filed: April 29, 2003
    Date of Patent: May 16, 2006
    Assignee: Rockwell Scientific Licensing, LLC
    Inventors: Maxim Pedyash, Victor Panov, Nikolai Romanov, Dustin McIntire, Gary Gould, Loren Clare, Jonathan Agre, Allen Twarowski, James Duncan
  • Publication number: 20050203966
    Abstract: A computer-based system securely transmitting and authenticating a transaction input by a user while retaining the anonymity of the user with respect to content of the transaction, including a device encoding the content of the transaction input by the user with a key known only to another device, encoding other portions of the transaction with another key known only to a secure transaction server, and sending the encoded content of the transaction and the encoded other portions of the transaction to the secure transaction server to authenticate an identity of the user of the device, wherein the secure transaction server decodes the other portions of the transaction and sends the encoded content of the transaction to the another device to be finally decoded.
    Type: Application
    Filed: January 25, 2005
    Publication date: September 15, 2005
    Applicant: Fujitsu Limited
    Inventors: Yannis Labrou, Lusheng Ji, Jonathan Agre, Jesus Terriza
  • Publication number: 20050187873
    Abstract: A mobile phone system and method of initializing, at a secure transaction server (STS), a mobile payment software with a software authentication parameter, as an authentic mobile payment software; providing an STS correlation between a personal identification entry (PIE) and the authentic mobile payment software; installing, in a mobile phone, the authentic mobile payment software; and inputting, by a user, the PIE to the installed authentic mobile payment software to generate according to the PIE and the software authentication parameter a transformed secure authenticable mobile phone cashless monetary transaction over the mobile phone network, as a mobile phone wireless wallet of the user of the mobile phone. The mobile phone authenticable cashless monetary transaction is performed according to an agreement view(s) protocol.
    Type: Application
    Filed: January 31, 2005
    Publication date: August 25, 2005
    Applicant: FUJITSU LIMITED
    Inventors: Yannis Labrou, Lusheng Ji, Jonathan Agre, Jesus Terriza, Wei-lun Chen
  • Publication number: 20050152305
    Abstract: A wireless computer network includes a backbone network including backbone network nodes authenticated to each other and in communication with each other. The wireless computer network also includes a master authenticator node and a proxy authenticator node among the backbone network nodes. When an unauthenticated new node requests authentication to the backbone network and the unauthenticated new node is in communication with at least one of the backbone network nodes, the at least one of the backbone network nodes becoming the proxy authenticator node for the unauthenticated new node and communicates with the master authenticator node to authenticate the unauthenticated new node to the backbone network.
    Type: Application
    Filed: August 31, 2004
    Publication date: July 14, 2005
    Applicant: FUJITSU LIMITED
    Inventors: Lusheng Ji, Brian Feldman, Jonathan Agre
  • Publication number: 20050136845
    Abstract: A system and method uses wireless communication devices as beacons to determine the relative location of another target wireless communication device. The beacons transmit identifying information that the target device can use to determine the identity of the beacon. The target device can measure the received intensity of the beacon transmissions and determine an associated beacon that best satisfies a specified criteria (e.g., largest signal strength) using a procedure of the present invention that discriminates between multiple beacons.
    Type: Application
    Filed: August 31, 2004
    Publication date: June 23, 2005
    Applicant: FUJITSU LIMITED
    Inventors: Ryusuke Masuoka, Sasikanth Avancha, Sohil Thakkar, Jonathan Agre
  • Publication number: 20050138410
    Abstract: Pervasive security is provided by a combination of physical interfaces and network interfaces to a service to a user includes establishing by the user's client device network connectivity to the service, transmitting by the service an identifier to the user's client device, determining by the service whether the user enters the identifier into the service in physical proximity to the service, and invoking the service once the user has entered the identifier into the service while in physical proximity to the service. The service can provide indication that the service has been granted by sending a control page to the user's client device.
    Type: Application
    Filed: September 17, 2004
    Publication date: June 23, 2005
    Applicant: FUJITSU LIMITED
    Inventors: Ryusuke Masuouka, Narendar Shankar, Zhexuan Song, Wei-lun Chen, Michael Grove, Yannis Labrou, Jonathan Agre
  • Publication number: 20050043999
    Abstract: A pay-per-connection system is coupled to a network service provider and to a client computer. The pay-per-connection system receives payment and a passcode from a user, determines duration of use based on the payment, and provides access by the client computer to the network service provider based on the payment and the passcode without advance sign-up by the user with the network service provider.
    Type: Application
    Filed: June 25, 2004
    Publication date: February 24, 2005
    Applicant: Fujitsu Limited
    Inventors: Lusheng Ji, Yannis Labrou, Jonathan Agre
  • Publication number: 20050027543
    Abstract: A method for conducting a purchasing agreement for goods and services between a consumer and a merchant through a trusted a third party and using a wireless network includes generating, by the consumer, a first view of the agreement and transmitting the first view of the agreement to the third party, generating, independently by the merchant, a second view of the agreement and transmitting the second view of the agreement to the third party, and receiving, by the third party the consumer view of the agreement and the merchant view of the agreement, verifying identities of the merchant and the consumer and that the details of the independently generated views of the agreements are consistent and taking action to execute the purchasing agreement if the conditions are satisfied. The third party includes a Secure Transaction Server.
    Type: Application
    Filed: July 29, 2003
    Publication date: February 3, 2005
    Applicant: FUJITSU LIMITED
    Inventors: Yannis Labrou, Lusheng Jl, Jonathan Agre
  • Publication number: 20040217881
    Abstract: A modular sensing station architecture that supports flexible power management includes one or more sensors connected to a WINS node. Each node includes power supply, data acquisition, programmable microprocessor and wireless transceiver modules that communicate data and instructions over a bus. The bus suitably includes a signal bus for communicating instructions and low bandwidth data and a high-capacity data bus for transferring high bandwidth data and executing high power tasks. The dual bus approach provides constant communications among the modules and low-capacity data transfer with the option to activate the high-power circuits or tasks only as needed.
    Type: Application
    Filed: April 29, 2003
    Publication date: November 4, 2004
    Applicant: Innovative Technology Licensing, LLC
    Inventors: Maxim Pedyash, Victor Panov, Nikolai Romanov, Dustin McIntire, Gary Gould, Loren Clare, Jonathan Agre, Allen Twarowski, James Duncan
  • Publication number: 20040103275
    Abstract: A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The Secure Nomadic Wireless Network, or SNOWNET, follows a hierarchical approach. Special SNOWNET nodes are deployed in the area where networking service is needed and form a backbone network. At the same time, SNOWNET nodes provide local access service to regular mobile clients. SNOWNET provides security through authentication of the nodes and clients, as well as through encryption of the data.
    Type: Application
    Filed: June 18, 2003
    Publication date: May 27, 2004
    Applicant: Fujitsu Limited
    Inventors: Lusheng Ji, Jonathan Agre, Arunesh Mishra, Sohil Thakkar