Patents by Inventor Jui-Tang Wang

Jui-Tang Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9826525
    Abstract: The present disclosure proposes a method for device to device communication and apparatuses using the same. More particularly, the present disclosure proposes a method and apparatuses to manage device to device (D2D) network resources based on maintain a user equipment (UE) network topology. The proposal includes a equipment (UE) requesting an authorization from the network for D2D communication in a licensed frequency spectrum, the UE would then receive through a control node or through another non-mobile UE the authorization which includes an identification (ID) information which allows the UE to engage in D2D communication in the license spectrum even when the UE is outside the range of the serving base station.
    Type: Grant
    Filed: April 16, 2013
    Date of Patent: November 21, 2017
    Assignee: Industrial Technology Research Institute
    Inventors: Yan-Xiu Zheng, Jui-Tang Wang
  • Patent number: 9485131
    Abstract: A multilayer network connection communication system includes a mobile device, a smart terminal device, a service server, a first layer network, and a second layer network. The mobile device sends at least one inquiry message through the first layer network to inquire the smart terminal device whether the smart terminal device supports at least one first application. Among the at least one first application, the smart terminal device supports at least one second application including a third application. The smart terminal device requests the mobile device through the first layer network to start up the at least one second application, where the third application is started up to respond to the at least one startup message. The smart terminal device receives a user data from the mobile device through the first layer network and transmits the user data to the service server through the second layer network.
    Type: Grant
    Filed: August 9, 2013
    Date of Patent: November 1, 2016
    Assignee: Industrial Technology Research Institute
    Inventors: Jui-Tang Wang, Ting-Chen Song
  • Patent number: 9313658
    Abstract: A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, an unsolicited security key from the base station; receiving, by the relay station, a signaling message from the mobile station; and authenticating, by the relay station, the mobile station using the security key. A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, a signaling message from the mobile station; transmitting, by the relay station, subsequent to receiving the signaling message, a security key request to the base station; receiving, by the relay station, a security key from the base station in response to the previously sent security key request; and authenticating, by the relay station, the mobile station using the received security key.
    Type: Grant
    Filed: September 3, 2008
    Date of Patent: April 12, 2016
    Assignee: Industrial Technology Research Institute
    Inventors: Jui-Tang Wang, Tzu-Ming Lin
  • Patent number: 9232391
    Abstract: An authentication system for device-to-device (D2D) communication and an authentication method thereof are provided. The authentication system further includes first user equipment (UE) and an authentication server. The authentication server is located within a communication range of the first UE. When the first UE sends a connection request to the authentication server, the authentication server performs a routine authentication procedure on the first UE and provides key generation information to the first UE. The authentication server generates a server key according to the key generation information and a key derivation procedure. The first UE generates an equipment key according to the key generation information and the key derivation procedure to obtain authentication for D2D communication, such that the first user equipment and a second UE obtaining the authentication for D2D communication directly perform the D2D communication without performing the D2D communication through the authentication server.
    Type: Grant
    Filed: May 7, 2013
    Date of Patent: January 5, 2016
    Assignee: Industrial Technology Research Institute
    Inventors: Jui-Tang Wang, Tzu-Ming Lin
  • Patent number: 9215589
    Abstract: A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, an unsolicited security key from the base station; receiving, by the relay station, a signaling message from the mobile station; and authenticating, by the relay station, the mobile station using the security key. A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, a signaling message from the mobile station; transmitting, by the relay station, subsequent to receiving the signaling message, a security key request to the base station; receiving, by the relay station, a security key from the base station in response to the previously sent security key request; and authenticating, by the relay station, the mobile station using the received security key.
    Type: Grant
    Filed: April 5, 2012
    Date of Patent: December 15, 2015
    Assignee: Industrial Technology Research Institute
    Inventors: Jui-Tang Wang, Tzu-Ming Lin
  • Publication number: 20140047008
    Abstract: A multilayer network connection communication system includes a mobile device, a smart terminal device, a service server, a first layer network, and a second layer network. The mobile device sends at least one inquiry message through the first layer network to inquire the smart terminal device whether the smart terminal device supports at least one first application. Among the at least one first application, the smart terminal device supports at least one second application including a third application. The smart terminal device requests the mobile device through the first layer network to start up the at least one second application, where the third application is started up to respond to the at least one startup message. The smart terminal device receives a user data from the mobile device through the first layer network and transmits the user data to the service server through the second layer network.
    Type: Application
    Filed: August 9, 2013
    Publication date: February 13, 2014
    Applicant: Industrial Technology Research Institute
    Inventors: Jui-Tang Wang, Ting-Chen Song
  • Publication number: 20130286963
    Abstract: The present disclosure proposes a method for device to device communication and apparatuses using the same. More particularly, the present disclosure proposes a method and apparatuses to manage device to device (D2D) network resources based on maintain a user equipment (UE) network topology. The proposal includes a equipment (UE) requesting an authorization from the network for D2D communication in a licensed frequency spectrum, the UE would then receive through a control node or through another non-mobile UE the authorization which includes an identification (ID) information which allows the UE to engage in D2D communication in the license spectrum even when the UE is outside the range of the serving base station.
    Type: Application
    Filed: April 16, 2013
    Publication date: October 31, 2013
    Applicant: Industrial Technology Research Institute
    Inventors: Yan-Xiu Zheng, Jui-Tang Wang
  • Patent number: 8509148
    Abstract: A method for application layer gateway (ALG) assisted local IP access (LIPA) at a base station by network address translation (NAT) allows IP capable UEs connected via HeNB or other kinds of Femto cell base station to use LIPA to establish multimedia session with other IP capable entities in the same IP network by NAT. The method relays a LIPA request to IMS, determines whether the terminating entity residing in the same IP network or not, and determines if the originating and terminating entities are allowed to use LIPA, and modifies the transport address information accordingly to facilitate signaling and packet routing. The method also provides the capability to apply different charging policies for LIPA and non-LIPA usages.
    Type: Grant
    Filed: December 29, 2010
    Date of Patent: August 13, 2013
    Assignee: Industrial Technology Research Institute
    Inventors: Stephan Gleixner, Jen-Shun Yang, Jui-Tang Wang, Shubhranshu Singh, Kuei-Li Huang
  • Patent number: 8427992
    Abstract: The present invention discloses a power-efficient backbone-oriented wireless sensor network, a method for constructing the same and a method for repairing the same, wherein energy-rich nodes are used to form backbones linking to a server, and wherein regular nodes having limited energy storage link to the backbones. When one energy-rich node malfunctions, the energy-rich node, which is posterior to the malfunctioning energy-rich node, searches for and links to a linkable neighboring energy-rich node on the backbone. If there is none linkable neighboring energy-rich node, the regular nodes are used to form a temporary tunnel until the malfunctioning energy-rich node has been repaired. The present invention can relieve the influence of hot spots, increase the robustness of the wireless sensor network, and prolong the service life of the wireless sensor network.
    Type: Grant
    Filed: July 28, 2010
    Date of Patent: April 23, 2013
    Assignee: National Chiao Tung University
    Inventors: Kuei-Li Huang, Chao-Nan Wu, Jui-Tang Wang, Chien-Chao Tseng
  • Patent number: 8391198
    Abstract: A reliable synchronization apparatus and method within a multicast and broadcast service (MBS) zone having m sync executers (SEs) belonging to n retransmission zones is provided. Each retransmission zone has a selected leader SE and other member SEs. The apparatus comprises a sync controller and the n selected leader SEs. When the Sync controller multicasts a sync ruler to all SEs in a retransmission zone, the leader SE that loses the Sync ruler sends a NACK message to request the sync controller to retransmit the sync ruler. An election is triggered for updating leader information and announcing election to all SEs. The member SE that loses the sync ruler sends a NACK message to request its leader or the Sync controller to retransmit the sync ruler.
    Type: Grant
    Filed: March 5, 2010
    Date of Patent: March 5, 2013
    Assignee: Industrial Technology Research Institute
    Inventors: Wei-Han Kuo, Chia-Lung Liu, Jui-Tang Wang, Jen-Shun Yang
  • Patent number: 8385549
    Abstract: A method for preparing for handover of an apparatus from a first wireless network to a second, different wireless network, a master session key (MSK) having been generated during establishment of a connectivity of the apparatus to the first wireless network includes detecting signals of the second wireless network. In response thereto, establishing a connectivity of the apparatus to the second wireless network, using a pairwise master key (PMK) derived from the MSK generated during establishment of the connectivity to the first wireless network, one or more encryption keys being derivable from the PMK to support secure communication over the second wireless network.
    Type: Grant
    Filed: July 19, 2010
    Date of Patent: February 26, 2013
    Assignee: Industrial Technology Research Institute
    Inventors: Jui-Tang Wang, Chi-Chung Chen, Kuei-Li Huang, Chien-Chao Tseng, Cheng-Yuan Ho
  • Patent number: 8289912
    Abstract: A wireless communication method for providing zone boundary detection performed by a controller managing communications within a multicast/broadcast service (MBS) zone. The method includes assigning to a boundary paging group a first base station communicating within the MBS zone and near a boundary of the MBS zone. The method further includes transmitting, through a second base station which covers a mobile station, to the mobile station information indicating that the boundary paging group corresponds to locations near the boundary of the MBS zone.
    Type: Grant
    Filed: September 30, 2009
    Date of Patent: October 16, 2012
    Assignee: Industrial Technology Research Institute
    Inventors: Kuei-Li Huang, Jen-Shun Yang, Jui-Tang Wang, Chien-Chao Tseng
  • Publication number: 20120189124
    Abstract: A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, an unsolicited security key from the base station; receiving, by the relay station, a signaling message from the mobile station; and authenticating, by the relay station, the mobile station using the security key. A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, a signaling message from the mobile station; transmitting, by the relay station, subsequent to receiving the signaling message, a security key request to the base station; receiving, by the relay station, a security key from the base station in response to the previously sent security key request; and authenticating, by the relay station, the mobile station using the received security key.
    Type: Application
    Filed: April 5, 2012
    Publication date: July 26, 2012
    Inventors: Jui-Tang Wang, Tzu-Ming Lin
  • Publication number: 20120170512
    Abstract: A method for application layer gateway (ALG) assisted local IP access (LIPA) at a base station by network address translation (NAT) allows IP capable UEs connected via HeNB or other kinds of Femto cell base station to use LIPA to establish multimedia session with other IP capable entities in the same IP network by NAT. The method relays a LIPA request to IMS, determines whether the terminating entity residing in the same IP network or not, and determines if the originating and terminating entities are allowed to use LIPA, and modifies the transport address information accordingly to facilitate signaling and packet routing. The method also provides the capability to apply different charging policies for LIPA and non-LIPA usages.
    Type: Application
    Filed: December 29, 2010
    Publication date: July 5, 2012
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Stephan Gleixner, Jen-Shun Yang, Jui-Tang Wang, Shubhranshu Singh, Kuei-Li Huang
  • Publication number: 20120044865
    Abstract: Apparatus for coupling one or more machine-to-machine (M2M) devices to a wireless network, including: a first network interface controller (NIC) module configured to communicate with the M2M devices; an M2M controller unit coupled to the first NIC module, the M2M controller unit including a database and a controller, the controller being configured to store information regarding the M2M devices in the database and to retrieve information regarding the M2M devices from the database; and a second NIC module coupled to the M2M controller unit, the second NIC module including an M2M enable unit configured to send the information retrieved by the controller to the wireless network.
    Type: Application
    Filed: July 15, 2011
    Publication date: February 23, 2012
    Inventors: Shubhranshu Singh, Jen-Shun Yang, Kuei-Li Huang, Jui-Tang Wang, Gleixner Stephen
  • Publication number: 20110320802
    Abstract: An authentication method, and a key distribution method, and an authentication and key distribution method are provided. The authentication method is adapted for a machine type communication involved with a wireless communication system, and includes the following steps. At least a user equipment (UE) transmits an application request including at least a first security material to a network application function (NAF), where the at least a first security material is not a key directly obtained through a bootstrapping procedure of a generic bootstrapping architecture. The NAF generates a second security material, which is not the key, either. The NAF replies the UE an application answer with the at least a second security material. In addition, the NAF authenticates the UE by the second security material, or the UE authenticates the NAF by the second security material.
    Type: Application
    Filed: June 23, 2011
    Publication date: December 29, 2011
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Jui-Tang Wang, Kuei-Li Huang, Shubhranshu Singh, Gleixner Stephan, Jen-Shun Yang
  • Patent number: 8060741
    Abstract: A method for operating a wireless communication system including a mobile relay station group, a base station group, and an authentication server, includes: configuring, by the authentication server, group information into the mobile relay station group and the base station group; requesting, by the base station group, group authentication data for the mobile relay station group from the authentication server; and performing authentication between a member of the mobile relay station group and a member of the base station group and generating an authentication key individually by the member of the mobile relay station group and the member of the base station group. Also disclosed is a system for carrying out the method.
    Type: Grant
    Filed: August 13, 2007
    Date of Patent: November 15, 2011
    Assignees: Industrial Technology Research Institute, Telcordia Applied Research Center Taiwan Company
    Inventors: Jui-Tang Wang, Yuan-Ying Hsu, Jen-Shun Yang, Chien-Chao Tseng
  • Patent number: 8040823
    Abstract: A method and system for network data transmitting in a communication system includes transmitting a data from at least one transmission node to at least one receiving node of a transmission-receiving group among the plurality of communication nodes by utilizing a node ID, the node ID of communication node in the group is being assigned by a N-carry operation of a determined number N.
    Type: Grant
    Filed: December 13, 2007
    Date of Patent: October 18, 2011
    Assignees: Industrial Technology Research Institute, Telcordia Applied Research Center Taiwan Company
    Inventors: Tzu-Ming Lin, Yuan-Ying Hsu, Jen-Shun Yang, Jui-Tang Wang
  • Patent number: 8005460
    Abstract: A group authentication method adaptable to a communication system is disclosed. The communication system includes a user group, a serving network, and a home network. The user group includes at least one mobile station. The home network pre-distributes a group authentication key to itself and all the mobile stations in the same user group and generates a mobile station authentication key for each mobile station. The home network generates a group list for recording related information of the user group. The home network has a database for recording the group list. The serving network has a database for recording the group list and a group authentication data received from the home network. The group authentication method includes following steps. The serving network performs an identification action to a mobile station. The communication system performs a full authentication action or a local authentication action according to the result of the identification action.
    Type: Grant
    Filed: February 5, 2008
    Date of Patent: August 23, 2011
    Assignees: Industrial Technology Research Institute, National Chiao Tung University
    Inventors: Yu-Wen Chen, Jui-Tang Wang, Chien-Chao Tseng
  • Patent number: 7983207
    Abstract: The present invention discloses an asymmetric routing method and routing path recovery mechanism. The wireless sensor network environment includes at least a management unit, at least a gateway, and mobile nodes. When joining, each mobile node obtains an unique ID code and, additionally, a depth as the gradient to the management unit. Accordingly, a mobile node sends an uplink packet via a nearby node with lower depth to the management unit; while the management unit transmits a downlink packet to a mobile node by utilizing the source route method. When the parent node of a mobile node is damaged or moves to another position or said mobile node with its sub-tree descendants changes their position together, the uplink routing path is recovered via selecting a nearby node of the sub-tree as relay node and the downlink routing path is recovered via sending a control message to the management unit.
    Type: Grant
    Filed: June 16, 2009
    Date of Patent: July 19, 2011
    Assignee: National Chiao Tung University
    Inventors: Jun-Yu Lai, Kuei-Li Huang, Jui-Tang Wang, Chien-Chao Tseng, Chao-Nan Wu