Patents by Inventor Jui-Tang Wang
Jui-Tang Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9826525Abstract: The present disclosure proposes a method for device to device communication and apparatuses using the same. More particularly, the present disclosure proposes a method and apparatuses to manage device to device (D2D) network resources based on maintain a user equipment (UE) network topology. The proposal includes a equipment (UE) requesting an authorization from the network for D2D communication in a licensed frequency spectrum, the UE would then receive through a control node or through another non-mobile UE the authorization which includes an identification (ID) information which allows the UE to engage in D2D communication in the license spectrum even when the UE is outside the range of the serving base station.Type: GrantFiled: April 16, 2013Date of Patent: November 21, 2017Assignee: Industrial Technology Research InstituteInventors: Yan-Xiu Zheng, Jui-Tang Wang
-
Patent number: 9485131Abstract: A multilayer network connection communication system includes a mobile device, a smart terminal device, a service server, a first layer network, and a second layer network. The mobile device sends at least one inquiry message through the first layer network to inquire the smart terminal device whether the smart terminal device supports at least one first application. Among the at least one first application, the smart terminal device supports at least one second application including a third application. The smart terminal device requests the mobile device through the first layer network to start up the at least one second application, where the third application is started up to respond to the at least one startup message. The smart terminal device receives a user data from the mobile device through the first layer network and transmits the user data to the service server through the second layer network.Type: GrantFiled: August 9, 2013Date of Patent: November 1, 2016Assignee: Industrial Technology Research InstituteInventors: Jui-Tang Wang, Ting-Chen Song
-
Patent number: 9313658Abstract: A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, an unsolicited security key from the base station; receiving, by the relay station, a signaling message from the mobile station; and authenticating, by the relay station, the mobile station using the security key. A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, a signaling message from the mobile station; transmitting, by the relay station, subsequent to receiving the signaling message, a security key request to the base station; receiving, by the relay station, a security key from the base station in response to the previously sent security key request; and authenticating, by the relay station, the mobile station using the received security key.Type: GrantFiled: September 3, 2008Date of Patent: April 12, 2016Assignee: Industrial Technology Research InstituteInventors: Jui-Tang Wang, Tzu-Ming Lin
-
Patent number: 9232391Abstract: An authentication system for device-to-device (D2D) communication and an authentication method thereof are provided. The authentication system further includes first user equipment (UE) and an authentication server. The authentication server is located within a communication range of the first UE. When the first UE sends a connection request to the authentication server, the authentication server performs a routine authentication procedure on the first UE and provides key generation information to the first UE. The authentication server generates a server key according to the key generation information and a key derivation procedure. The first UE generates an equipment key according to the key generation information and the key derivation procedure to obtain authentication for D2D communication, such that the first user equipment and a second UE obtaining the authentication for D2D communication directly perform the D2D communication without performing the D2D communication through the authentication server.Type: GrantFiled: May 7, 2013Date of Patent: January 5, 2016Assignee: Industrial Technology Research InstituteInventors: Jui-Tang Wang, Tzu-Ming Lin
-
Patent number: 9215589Abstract: A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, an unsolicited security key from the base station; receiving, by the relay station, a signaling message from the mobile station; and authenticating, by the relay station, the mobile station using the security key. A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, a signaling message from the mobile station; transmitting, by the relay station, subsequent to receiving the signaling message, a security key request to the base station; receiving, by the relay station, a security key from the base station in response to the previously sent security key request; and authenticating, by the relay station, the mobile station using the received security key.Type: GrantFiled: April 5, 2012Date of Patent: December 15, 2015Assignee: Industrial Technology Research InstituteInventors: Jui-Tang Wang, Tzu-Ming Lin
-
Publication number: 20140047008Abstract: A multilayer network connection communication system includes a mobile device, a smart terminal device, a service server, a first layer network, and a second layer network. The mobile device sends at least one inquiry message through the first layer network to inquire the smart terminal device whether the smart terminal device supports at least one first application. Among the at least one first application, the smart terminal device supports at least one second application including a third application. The smart terminal device requests the mobile device through the first layer network to start up the at least one second application, where the third application is started up to respond to the at least one startup message. The smart terminal device receives a user data from the mobile device through the first layer network and transmits the user data to the service server through the second layer network.Type: ApplicationFiled: August 9, 2013Publication date: February 13, 2014Applicant: Industrial Technology Research InstituteInventors: Jui-Tang Wang, Ting-Chen Song
-
Publication number: 20130286963Abstract: The present disclosure proposes a method for device to device communication and apparatuses using the same. More particularly, the present disclosure proposes a method and apparatuses to manage device to device (D2D) network resources based on maintain a user equipment (UE) network topology. The proposal includes a equipment (UE) requesting an authorization from the network for D2D communication in a licensed frequency spectrum, the UE would then receive through a control node or through another non-mobile UE the authorization which includes an identification (ID) information which allows the UE to engage in D2D communication in the license spectrum even when the UE is outside the range of the serving base station.Type: ApplicationFiled: April 16, 2013Publication date: October 31, 2013Applicant: Industrial Technology Research InstituteInventors: Yan-Xiu Zheng, Jui-Tang Wang
-
Patent number: 8509148Abstract: A method for application layer gateway (ALG) assisted local IP access (LIPA) at a base station by network address translation (NAT) allows IP capable UEs connected via HeNB or other kinds of Femto cell base station to use LIPA to establish multimedia session with other IP capable entities in the same IP network by NAT. The method relays a LIPA request to IMS, determines whether the terminating entity residing in the same IP network or not, and determines if the originating and terminating entities are allowed to use LIPA, and modifies the transport address information accordingly to facilitate signaling and packet routing. The method also provides the capability to apply different charging policies for LIPA and non-LIPA usages.Type: GrantFiled: December 29, 2010Date of Patent: August 13, 2013Assignee: Industrial Technology Research InstituteInventors: Stephan Gleixner, Jen-Shun Yang, Jui-Tang Wang, Shubhranshu Singh, Kuei-Li Huang
-
Patent number: 8427992Abstract: The present invention discloses a power-efficient backbone-oriented wireless sensor network, a method for constructing the same and a method for repairing the same, wherein energy-rich nodes are used to form backbones linking to a server, and wherein regular nodes having limited energy storage link to the backbones. When one energy-rich node malfunctions, the energy-rich node, which is posterior to the malfunctioning energy-rich node, searches for and links to a linkable neighboring energy-rich node on the backbone. If there is none linkable neighboring energy-rich node, the regular nodes are used to form a temporary tunnel until the malfunctioning energy-rich node has been repaired. The present invention can relieve the influence of hot spots, increase the robustness of the wireless sensor network, and prolong the service life of the wireless sensor network.Type: GrantFiled: July 28, 2010Date of Patent: April 23, 2013Assignee: National Chiao Tung UniversityInventors: Kuei-Li Huang, Chao-Nan Wu, Jui-Tang Wang, Chien-Chao Tseng
-
Patent number: 8391198Abstract: A reliable synchronization apparatus and method within a multicast and broadcast service (MBS) zone having m sync executers (SEs) belonging to n retransmission zones is provided. Each retransmission zone has a selected leader SE and other member SEs. The apparatus comprises a sync controller and the n selected leader SEs. When the Sync controller multicasts a sync ruler to all SEs in a retransmission zone, the leader SE that loses the Sync ruler sends a NACK message to request the sync controller to retransmit the sync ruler. An election is triggered for updating leader information and announcing election to all SEs. The member SE that loses the sync ruler sends a NACK message to request its leader or the Sync controller to retransmit the sync ruler.Type: GrantFiled: March 5, 2010Date of Patent: March 5, 2013Assignee: Industrial Technology Research InstituteInventors: Wei-Han Kuo, Chia-Lung Liu, Jui-Tang Wang, Jen-Shun Yang
-
Patent number: 8385549Abstract: A method for preparing for handover of an apparatus from a first wireless network to a second, different wireless network, a master session key (MSK) having been generated during establishment of a connectivity of the apparatus to the first wireless network includes detecting signals of the second wireless network. In response thereto, establishing a connectivity of the apparatus to the second wireless network, using a pairwise master key (PMK) derived from the MSK generated during establishment of the connectivity to the first wireless network, one or more encryption keys being derivable from the PMK to support secure communication over the second wireless network.Type: GrantFiled: July 19, 2010Date of Patent: February 26, 2013Assignee: Industrial Technology Research InstituteInventors: Jui-Tang Wang, Chi-Chung Chen, Kuei-Li Huang, Chien-Chao Tseng, Cheng-Yuan Ho
-
Patent number: 8289912Abstract: A wireless communication method for providing zone boundary detection performed by a controller managing communications within a multicast/broadcast service (MBS) zone. The method includes assigning to a boundary paging group a first base station communicating within the MBS zone and near a boundary of the MBS zone. The method further includes transmitting, through a second base station which covers a mobile station, to the mobile station information indicating that the boundary paging group corresponds to locations near the boundary of the MBS zone.Type: GrantFiled: September 30, 2009Date of Patent: October 16, 2012Assignee: Industrial Technology Research InstituteInventors: Kuei-Li Huang, Jen-Shun Yang, Jui-Tang Wang, Chien-Chao Tseng
-
Publication number: 20120189124Abstract: A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, an unsolicited security key from the base station; receiving, by the relay station, a signaling message from the mobile station; and authenticating, by the relay station, the mobile station using the security key. A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, a signaling message from the mobile station; transmitting, by the relay station, subsequent to receiving the signaling message, a security key request to the base station; receiving, by the relay station, a security key from the base station in response to the previously sent security key request; and authenticating, by the relay station, the mobile station using the received security key.Type: ApplicationFiled: April 5, 2012Publication date: July 26, 2012Inventors: Jui-Tang Wang, Tzu-Ming Lin
-
Publication number: 20120170512Abstract: A method for application layer gateway (ALG) assisted local IP access (LIPA) at a base station by network address translation (NAT) allows IP capable UEs connected via HeNB or other kinds of Femto cell base station to use LIPA to establish multimedia session with other IP capable entities in the same IP network by NAT. The method relays a LIPA request to IMS, determines whether the terminating entity residing in the same IP network or not, and determines if the originating and terminating entities are allowed to use LIPA, and modifies the transport address information accordingly to facilitate signaling and packet routing. The method also provides the capability to apply different charging policies for LIPA and non-LIPA usages.Type: ApplicationFiled: December 29, 2010Publication date: July 5, 2012Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Stephan Gleixner, Jen-Shun Yang, Jui-Tang Wang, Shubhranshu Singh, Kuei-Li Huang
-
Publication number: 20120044865Abstract: Apparatus for coupling one or more machine-to-machine (M2M) devices to a wireless network, including: a first network interface controller (NIC) module configured to communicate with the M2M devices; an M2M controller unit coupled to the first NIC module, the M2M controller unit including a database and a controller, the controller being configured to store information regarding the M2M devices in the database and to retrieve information regarding the M2M devices from the database; and a second NIC module coupled to the M2M controller unit, the second NIC module including an M2M enable unit configured to send the information retrieved by the controller to the wireless network.Type: ApplicationFiled: July 15, 2011Publication date: February 23, 2012Inventors: Shubhranshu Singh, Jen-Shun Yang, Kuei-Li Huang, Jui-Tang Wang, Gleixner Stephen
-
Publication number: 20110320802Abstract: An authentication method, and a key distribution method, and an authentication and key distribution method are provided. The authentication method is adapted for a machine type communication involved with a wireless communication system, and includes the following steps. At least a user equipment (UE) transmits an application request including at least a first security material to a network application function (NAF), where the at least a first security material is not a key directly obtained through a bootstrapping procedure of a generic bootstrapping architecture. The NAF generates a second security material, which is not the key, either. The NAF replies the UE an application answer with the at least a second security material. In addition, the NAF authenticates the UE by the second security material, or the UE authenticates the NAF by the second security material.Type: ApplicationFiled: June 23, 2011Publication date: December 29, 2011Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Jui-Tang Wang, Kuei-Li Huang, Shubhranshu Singh, Gleixner Stephan, Jen-Shun Yang
-
Patent number: 8060741Abstract: A method for operating a wireless communication system including a mobile relay station group, a base station group, and an authentication server, includes: configuring, by the authentication server, group information into the mobile relay station group and the base station group; requesting, by the base station group, group authentication data for the mobile relay station group from the authentication server; and performing authentication between a member of the mobile relay station group and a member of the base station group and generating an authentication key individually by the member of the mobile relay station group and the member of the base station group. Also disclosed is a system for carrying out the method.Type: GrantFiled: August 13, 2007Date of Patent: November 15, 2011Assignees: Industrial Technology Research Institute, Telcordia Applied Research Center Taiwan CompanyInventors: Jui-Tang Wang, Yuan-Ying Hsu, Jen-Shun Yang, Chien-Chao Tseng
-
Patent number: 8040823Abstract: A method and system for network data transmitting in a communication system includes transmitting a data from at least one transmission node to at least one receiving node of a transmission-receiving group among the plurality of communication nodes by utilizing a node ID, the node ID of communication node in the group is being assigned by a N-carry operation of a determined number N.Type: GrantFiled: December 13, 2007Date of Patent: October 18, 2011Assignees: Industrial Technology Research Institute, Telcordia Applied Research Center Taiwan CompanyInventors: Tzu-Ming Lin, Yuan-Ying Hsu, Jen-Shun Yang, Jui-Tang Wang
-
Patent number: 8005460Abstract: A group authentication method adaptable to a communication system is disclosed. The communication system includes a user group, a serving network, and a home network. The user group includes at least one mobile station. The home network pre-distributes a group authentication key to itself and all the mobile stations in the same user group and generates a mobile station authentication key for each mobile station. The home network generates a group list for recording related information of the user group. The home network has a database for recording the group list. The serving network has a database for recording the group list and a group authentication data received from the home network. The group authentication method includes following steps. The serving network performs an identification action to a mobile station. The communication system performs a full authentication action or a local authentication action according to the result of the identification action.Type: GrantFiled: February 5, 2008Date of Patent: August 23, 2011Assignees: Industrial Technology Research Institute, National Chiao Tung UniversityInventors: Yu-Wen Chen, Jui-Tang Wang, Chien-Chao Tseng
-
Patent number: 7983207Abstract: The present invention discloses an asymmetric routing method and routing path recovery mechanism. The wireless sensor network environment includes at least a management unit, at least a gateway, and mobile nodes. When joining, each mobile node obtains an unique ID code and, additionally, a depth as the gradient to the management unit. Accordingly, a mobile node sends an uplink packet via a nearby node with lower depth to the management unit; while the management unit transmits a downlink packet to a mobile node by utilizing the source route method. When the parent node of a mobile node is damaged or moves to another position or said mobile node with its sub-tree descendants changes their position together, the uplink routing path is recovered via selecting a nearby node of the sub-tree as relay node and the downlink routing path is recovered via sending a control message to the management unit.Type: GrantFiled: June 16, 2009Date of Patent: July 19, 2011Assignee: National Chiao Tung UniversityInventors: Jun-Yu Lai, Kuei-Li Huang, Jui-Tang Wang, Chien-Chao Tseng, Chao-Nan Wu