Patents by Inventor Kuei-Li Huang

Kuei-Li Huang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8385549
    Abstract: A method for preparing for handover of an apparatus from a first wireless network to a second, different wireless network, a master session key (MSK) having been generated during establishment of a connectivity of the apparatus to the first wireless network includes detecting signals of the second wireless network. In response thereto, establishing a connectivity of the apparatus to the second wireless network, using a pairwise master key (PMK) derived from the MSK generated during establishment of the connectivity to the first wireless network, one or more encryption keys being derivable from the PMK to support secure communication over the second wireless network.
    Type: Grant
    Filed: July 19, 2010
    Date of Patent: February 26, 2013
    Assignee: Industrial Technology Research Institute
    Inventors: Jui-Tang Wang, Chi-Chung Chen, Kuei-Li Huang, Chien-Chao Tseng, Cheng-Yuan Ho
  • Patent number: 8289912
    Abstract: A wireless communication method for providing zone boundary detection performed by a controller managing communications within a multicast/broadcast service (MBS) zone. The method includes assigning to a boundary paging group a first base station communicating within the MBS zone and near a boundary of the MBS zone. The method further includes transmitting, through a second base station which covers a mobile station, to the mobile station information indicating that the boundary paging group corresponds to locations near the boundary of the MBS zone.
    Type: Grant
    Filed: September 30, 2009
    Date of Patent: October 16, 2012
    Assignee: Industrial Technology Research Institute
    Inventors: Kuei-Li Huang, Jen-Shun Yang, Jui-Tang Wang, Chien-Chao Tseng
  • Publication number: 20120170512
    Abstract: A method for application layer gateway (ALG) assisted local IP access (LIPA) at a base station by network address translation (NAT) allows IP capable UEs connected via HeNB or other kinds of Femto cell base station to use LIPA to establish multimedia session with other IP capable entities in the same IP network by NAT. The method relays a LIPA request to IMS, determines whether the terminating entity residing in the same IP network or not, and determines if the originating and terminating entities are allowed to use LIPA, and modifies the transport address information accordingly to facilitate signaling and packet routing. The method also provides the capability to apply different charging policies for LIPA and non-LIPA usages.
    Type: Application
    Filed: December 29, 2010
    Publication date: July 5, 2012
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Stephan Gleixner, Jen-Shun Yang, Jui-Tang Wang, Shubhranshu Singh, Kuei-Li Huang
  • Publication number: 20120044865
    Abstract: Apparatus for coupling one or more machine-to-machine (M2M) devices to a wireless network, including: a first network interface controller (NIC) module configured to communicate with the M2M devices; an M2M controller unit coupled to the first NIC module, the M2M controller unit including a database and a controller, the controller being configured to store information regarding the M2M devices in the database and to retrieve information regarding the M2M devices from the database; and a second NIC module coupled to the M2M controller unit, the second NIC module including an M2M enable unit configured to send the information retrieved by the controller to the wireless network.
    Type: Application
    Filed: July 15, 2011
    Publication date: February 23, 2012
    Inventors: Shubhranshu Singh, Jen-Shun Yang, Kuei-Li Huang, Jui-Tang Wang, Gleixner Stephen
  • Publication number: 20110320802
    Abstract: An authentication method, and a key distribution method, and an authentication and key distribution method are provided. The authentication method is adapted for a machine type communication involved with a wireless communication system, and includes the following steps. At least a user equipment (UE) transmits an application request including at least a first security material to a network application function (NAF), where the at least a first security material is not a key directly obtained through a bootstrapping procedure of a generic bootstrapping architecture. The NAF generates a second security material, which is not the key, either. The NAF replies the UE an application answer with the at least a second security material. In addition, the NAF authenticates the UE by the second security material, or the UE authenticates the NAF by the second security material.
    Type: Application
    Filed: June 23, 2011
    Publication date: December 29, 2011
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Jui-Tang Wang, Kuei-Li Huang, Shubhranshu Singh, Gleixner Stephan, Jen-Shun Yang
  • Patent number: 7983207
    Abstract: The present invention discloses an asymmetric routing method and routing path recovery mechanism. The wireless sensor network environment includes at least a management unit, at least a gateway, and mobile nodes. When joining, each mobile node obtains an unique ID code and, additionally, a depth as the gradient to the management unit. Accordingly, a mobile node sends an uplink packet via a nearby node with lower depth to the management unit; while the management unit transmits a downlink packet to a mobile node by utilizing the source route method. When the parent node of a mobile node is damaged or moves to another position or said mobile node with its sub-tree descendants changes their position together, the uplink routing path is recovered via selecting a nearby node of the sub-tree as relay node and the downlink routing path is recovered via sending a control message to the management unit.
    Type: Grant
    Filed: June 16, 2009
    Date of Patent: July 19, 2011
    Assignee: National Chiao Tung University
    Inventors: Jun-Yu Lai, Kuei-Li Huang, Jui-Tang Wang, Chien-Chao Tseng, Chao-Nan Wu
  • Publication number: 20110051644
    Abstract: The present invention discloses a power-efficient backbone-oriented wireless sensor network, a method for constructing the same and a method for repairing the same, wherein energy-rich nodes are used to form backbones linking to a server, and wherein regular nodes having limited energy storage link to the backbones. When one energy-rich node malfunctions, the energy-rich node, which is posterior to the malfunctioning energy-rich node, searches for and links to a linkable neighboring energy-rich node on the backbone. If there is none linkable neighboring energy-rich node, the regular nodes are used to form a temporary tunnel until the malfunctioning energy-rich node has been repaired. The present invention can relieve the influence of hot spots, increase the robustness of the wireless sensor network, and prolong the service life of the wireless sensor network.
    Type: Application
    Filed: July 28, 2010
    Publication date: March 3, 2011
    Applicant: NATIONAL CHIAO TUNG UNIVERSITY
    Inventors: Kuei-Li Huang, Chao-Nan Wu, Jui-Tang Wang, Chien-Chao Tseng
  • Publication number: 20110047382
    Abstract: A method for preparing for handover of an apparatus from a first wireless network to a second, different wireless network, a master session key (MSK) having been generated during establishment of a connectivity of the apparatus to the first wireless network includes detecting signals of the second wireless network. In response thereto, establishing a connectivity of the apparatus to the second wireless network, using a pairwise master key (PMK) derived from the MSK generated during establishment of the connectivity to the first wireless network, one or more encryption keys being derivable from the PMK to support secure communication over the second wireless network.
    Type: Application
    Filed: July 19, 2010
    Publication date: February 24, 2011
    Applicant: Industrial Technology Research Institute
    Inventors: Jui-Tang WANG, Chi-Chung Chen, Kuei-Li Huang, Chien-Chao Tseng, Cheng-Yuan Ho
  • Publication number: 20100260071
    Abstract: The present invention discloses an asymmetric routing method and routing path recovery mechanism. The wireless sensor network environment includes at least a management unit, at least a gateway, and mobile nodes. When joining, each mobile node obtains an unique ID code and, additionally, a depth as the gradient to the management unit. Accordingly, a mobile node sends an uplink packet via a nearby node with lower depth to the management unit; while the management unit transmits a downlink packet to a mobile node by utilizing the source route method. When the parent node of a mobile node is damaged or moves to another position or said mobile node with its sub-tree descendants changes their position together, the uplink routing path is recovered via selecting a nearby node of the sub-tree as relay node and the downlink routing path is recovered via sending a control message to the management unit.
    Type: Application
    Filed: June 16, 2009
    Publication date: October 14, 2010
    Inventors: Jun-Yu LAI, Kuei-Li Huang, Jui-Tang Wang, Chien-Chao Tseng, Chao-Nan Wu
  • Publication number: 20100110963
    Abstract: A wireless communication method for providing zone boundary detection performed by a controller managing communications within a multicast/broadcast service (MBS) zone. The method includes assigning to a boundary paging group a first base station communicating within the MBS zone and near a boundary of the MBS zone. The method further includes transmitting, through a second base station which covers a mobile station, to the mobile station information indicating that the boundary paging group corresponds to locations near the boundary of the MBS zone.
    Type: Application
    Filed: September 30, 2009
    Publication date: May 6, 2010
    Inventors: Kuei-Li HUANG, Jen-Shun Yang, Jui-Tang Wang, Chien-Chao Tseng