Patents by Inventor Jui-Tang Wang

Jui-Tang Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110116434
    Abstract: A reliable synchronization apparatus and method within a multicast and broadcast service (MBS) zone having m sync executers (SEs) belonging to n retransmission zones is provided. Each retransmission zone has a selected leader SE and other member SEs. The apparatus comprises a sync controller and the n selected leader SEs. When the Sync controller multicasts a sync ruler to all SEs in a retransmission zone, the leader SE that loses the Sync ruler sends a NACK message to request the sync controller to retransmit the sync ruler. An election is triggered for updating leader information and announcing election to all SEs. The member SE that loses the sync ruler sends a NACK message to request its leader or the Sync controller to retransmit the sync ruler.
    Type: Application
    Filed: March 5, 2010
    Publication date: May 19, 2011
    Inventors: Wei-Han Kuo, Chia-Lung Liu, Jui-Tang Wang, Jen-Shun Yang
  • Publication number: 20110051644
    Abstract: The present invention discloses a power-efficient backbone-oriented wireless sensor network, a method for constructing the same and a method for repairing the same, wherein energy-rich nodes are used to form backbones linking to a server, and wherein regular nodes having limited energy storage link to the backbones. When one energy-rich node malfunctions, the energy-rich node, which is posterior to the malfunctioning energy-rich node, searches for and links to a linkable neighboring energy-rich node on the backbone. If there is none linkable neighboring energy-rich node, the regular nodes are used to form a temporary tunnel until the malfunctioning energy-rich node has been repaired. The present invention can relieve the influence of hot spots, increase the robustness of the wireless sensor network, and prolong the service life of the wireless sensor network.
    Type: Application
    Filed: July 28, 2010
    Publication date: March 3, 2011
    Applicant: NATIONAL CHIAO TUNG UNIVERSITY
    Inventors: Kuei-Li Huang, Chao-Nan Wu, Jui-Tang Wang, Chien-Chao Tseng
  • Publication number: 20110047382
    Abstract: A method for preparing for handover of an apparatus from a first wireless network to a second, different wireless network, a master session key (MSK) having been generated during establishment of a connectivity of the apparatus to the first wireless network includes detecting signals of the second wireless network. In response thereto, establishing a connectivity of the apparatus to the second wireless network, using a pairwise master key (PMK) derived from the MSK generated during establishment of the connectivity to the first wireless network, one or more encryption keys being derivable from the PMK to support secure communication over the second wireless network.
    Type: Application
    Filed: July 19, 2010
    Publication date: February 24, 2011
    Applicant: Industrial Technology Research Institute
    Inventors: Jui-Tang WANG, Chi-Chung Chen, Kuei-Li Huang, Chien-Chao Tseng, Cheng-Yuan Ho
  • Publication number: 20100260071
    Abstract: The present invention discloses an asymmetric routing method and routing path recovery mechanism. The wireless sensor network environment includes at least a management unit, at least a gateway, and mobile nodes. When joining, each mobile node obtains an unique ID code and, additionally, a depth as the gradient to the management unit. Accordingly, a mobile node sends an uplink packet via a nearby node with lower depth to the management unit; while the management unit transmits a downlink packet to a mobile node by utilizing the source route method. When the parent node of a mobile node is damaged or moves to another position or said mobile node with its sub-tree descendants changes their position together, the uplink routing path is recovered via selecting a nearby node of the sub-tree as relay node and the downlink routing path is recovered via sending a control message to the management unit.
    Type: Application
    Filed: June 16, 2009
    Publication date: October 14, 2010
    Inventors: Jun-Yu LAI, Kuei-Li Huang, Jui-Tang Wang, Chien-Chao Tseng, Chao-Nan Wu
  • Publication number: 20100110963
    Abstract: A wireless communication method for providing zone boundary detection performed by a controller managing communications within a multicast/broadcast service (MBS) zone. The method includes assigning to a boundary paging group a first base station communicating within the MBS zone and near a boundary of the MBS zone. The method further includes transmitting, through a second base station which covers a mobile station, to the mobile station information indicating that the boundary paging group corresponds to locations near the boundary of the MBS zone.
    Type: Application
    Filed: September 30, 2009
    Publication date: May 6, 2010
    Inventors: Kuei-Li HUANG, Jen-Shun Yang, Jui-Tang Wang, Chien-Chao Tseng
  • Patent number: 7624267
    Abstract: The invention relates to a SIM-based authentication method capable of supporting inter-AP fast handover, which can decrease the number of authentication procedures without negatively influencing the security of the wireless LAN by establishing an encrypted channel for each mobile node and using method 1: an aggressive key pre-distribution and method 2: probe request triggering passive key pre-query technique, thereby reducing the time of inter-AP handover for the mobile node. Furthermore, a re-authentication procedure is started to update the key after the key is used for a long time so as to ensure that the key is safe, thereby effectively achieving a fast and safe wireless LAN environment.
    Type: Grant
    Filed: July 6, 2004
    Date of Patent: November 24, 2009
    Assignee: Industrial Technology Research Institute
    Inventors: Yu-Ren Huang, Jen-Shun Yang, Chien-Chao Tseng, Jui-Tang Wang
  • Publication number: 20090271626
    Abstract: A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes authenticating the mobile station over the communication network; generating, by the base station, security material, wherein the security material comprises at least one of a traffic encryption key (TEK) and a message authentication code key (MACK); transmitting, by the base station, the security material to the mobile station; and transmitting, by the base station, the security material to the relay station.
    Type: Application
    Filed: September 3, 2008
    Publication date: October 29, 2009
    Inventor: Jui-Tang WANG
  • Publication number: 20090068986
    Abstract: A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, an unsolicited security key from the base station; receiving, by the relay station, a signaling message from the mobile station; and authenticating, by the relay station, the mobile station using the security key. A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, a signaling message from the mobile station; transmitting, by the relay station, subsequent to receiving the signaling message, a security key request to the base station; receiving, by the relay station, a security key from the base station in response to the previously sent security key request; and authenticating, by the relay station, the mobile station using the received security key.
    Type: Application
    Filed: September 3, 2008
    Publication date: March 12, 2009
    Inventors: Jui-Tang WANG, Tzu-Ming Lin
  • Publication number: 20090054036
    Abstract: A group authentication method adaptable to a communication system is disclosed. The communication system includes a user group, a serving network, and a home network. The user group includes at least one mobile station. The home network pre-distributes a group authentication key to itself and all the mobile stations in the same user group and generates a mobile station authentication key for each mobile station. The home network generates a group list for recording related information of the user group. The home network has a database for recording the group list. The serving network has a database for recording the group list and a group authentication data received from the home network. The group authentication method includes following steps. The serving network performs an identification action to a mobile station. The communication system performs a full authentication action or a local authentication action according to the result of the identification action.
    Type: Application
    Filed: February 5, 2008
    Publication date: February 26, 2009
    Applicants: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE, NATIONAL CHIAO TUNG UNIVERSITY
    Inventors: Yu-Wen Chen, Jui-Tang Wang, Chien-Chao Tseng
  • Publication number: 20090028069
    Abstract: A method and system for network data transmitting in a communication system includes transmitting a data from at least one transmission node to at least one receiving node of a transmission-receiving group among the plurality of communication nodes by utilizing a node ID, the node ID of communication node in the group is being assigned by a N-carry operation of a determined number N.
    Type: Application
    Filed: December 13, 2007
    Publication date: January 29, 2009
    Inventors: Tzu-Ming Lin, Yuan-Ying Hsu, Jen-Shun Yang, Jui-Tang Wang
  • Publication number: 20080162927
    Abstract: A method for operating a wireless communication system including a mobile relay station group, a base station group, and an authentication server, includes: configuring, by the authentication server, group information into the mobile relay station group and the base station group; requesting, by the base station group, group authentication data for the mobile relay station group from the authentication server; and performing authentication between a member of the mobile relay station group and a member of the base station group and generating an authentication key individually by the member of the mobile relay station group and the member of the base station group. Also disclosed is a system for carrying out the method.
    Type: Application
    Filed: August 13, 2007
    Publication date: July 3, 2008
    Inventors: Jui-Tang Wang, Yuan-Ying Hsu, Jen-Shun Yang, Chien-Chao Tseng
  • Patent number: 7283523
    Abstract: A method and system for applying a multi-protocol label switching (MPLS) network to support QoS in general packet radio service (GPRS) is disclosed. An E-LSP tunnel with reserved bandwidth is pre-configured between Gateway GPRS Support Node (GGSN) and each Service GPRS Support Node (SGSN), and between any two SGSNs. Before an Mobile Station (MS) wishes to transmit or receive packets, it need to ask its designated SSGN for establishing an on-demand L-LSP from the SGSN to the Corresponding Node (CN). This L-LSP is required to tunnel through the pre-configured E-LSP that was mentioned above and here we apply the label stack technique from MPLS. Therefore, the packets of the on-demand L-LSP can be tunneled through the pre-configured E-LSP to the SGSN in which the MS is located, and then the SGSN is able to recognize and locate the mobile station according to the corresponding label in on-demand L-LSP.
    Type: Grant
    Filed: June 24, 2003
    Date of Patent: October 16, 2007
    Assignee: Industrial Technology Research Institute
    Inventors: Chien-Hsin Wang, Jen-Shun Yang, Chien-Chao Tseng, Jen-Chi Liu, Jui-Tang Wang
  • Publication number: 20050177723
    Abstract: The invention relates to a SIM-based authentication method capable of supporting inter-AP fast handover, which can decrease the number of authentication procedures without negatively influencing the security of the wireless LAN by establishing an encrypted channel for each mobile node and using method 1: an aggressive key pre-distribution and method 2: probe request triggering passive key pre-query technique, thereby reducing the time of inter-AP handover for the mobile node. Furthermore, a re-authentication procedure is started to update the key after the key is used for a long time so as to ensure that the key is safe, thereby effectively achieving a fast and safe wireless LAN environment.
    Type: Application
    Filed: July 6, 2004
    Publication date: August 11, 2005
    Applicant: Industrial Technology Research Institute
    Inventors: Yu-Ren Huang, Jen-Shun Yang, Chien-Chao Tseng, Jui-Tang Wang
  • Publication number: 20040246972
    Abstract: A method and system for applying a multi-protocol label switching (MPLS) network to support QoS in general packet radio service (GPRS) is disclosed. An E-LSP tunnel with reserved bandwidth is pre-configured between Gateway GPRS Support Node (GGSN) and each Service GPRS Support Node (SGSN), and between any two SGSNs. Before an Mobile Station (MS) wishes to transmit or receive packets, it need to ask its designated SSGN for establishing an on-demand L-LSP from the SGSN to the Corresponding Node (CN). This L-LSP is required to tunnel through the pre-configured E-LSP that was mentioned above and here we apply the label stack technique from MPLS. Therefore, the packets of the on-demand L-LSP can be tunneled through the pre-configured E-LSP to the SGSN in which the MS is located, and then the SGSN is able to recognize and locate the mobile station according to the corresponding label in on-demand L-LSP.
    Type: Application
    Filed: June 24, 2003
    Publication date: December 9, 2004
    Applicant: Industrial Technology Research Institute
    Inventors: Chien-Hsin Wang, Jen-Shun Yang, Chien-Chao Tseng, Jen-Chi Liu, Jui-Tang Wang