Patents by Inventor Peerapol Tinnakornsrisuphap

Peerapol Tinnakornsrisuphap has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110249636
    Abstract: An apparatus and method for establishing a connection including reserving a common connection for use by more than one access terminal (AT); associating the common connection with a network identifier corresponding to the AT; deleting a network identifier-related context while maintaining the network identifier; and transmitting a message, based on a call to the AT, via the common connection and based on the network identifier, wherein a specific connection for carrying the call is based on a response to the message. In one example, the apparatus and method include conducting a registration session with a wireless communications network; obtaining a network identifier corresponding to the AT based on the registration session; deleting a network identifier-related context for the AT while maintaining the network identifier; receiving a message indicating a call destined for the AT; and establishing, based on the message, a specific connection for carrying the call.
    Type: Application
    Filed: April 5, 2011
    Publication date: October 13, 2011
    Applicant: QUALCOMM Incorporated
    Inventors: George Cherian, Peerapol Tinnakornsrisuphap, Jun Wang, Anand Palanigounder
  • Publication number: 20110243053
    Abstract: Femto nodes provide Local IP Access (LIPA) which allows terminals to communicate with local area networks that the femtocells reside in using cellular air-interfaces (such as cdma2000, UMTS or LTE). Femto nodes also enable Remote IP Access (RIPA) service, which allows the terminals to access the local area network from the Internet as if they were present in the local area networks. Further, to avoid degradation of standby time of the terminals or the capacity of the femto node, or both, apparatus and methods are described herein in which a femto node consolidates received Broadcast/Multicast IP packets from a local area network prior to delivering the packets to terminals over a cellular air-interface. In other aspects, a femto node may deliver the received Broadcast/Multicast IP packets via a cellular one-to-many transmission, either with or without consolidation.
    Type: Application
    Filed: September 27, 2010
    Publication date: October 6, 2011
    Applicant: QUALCOMM INCORPORATED
    Inventors: Peerapol Tinnakornsrisuphap, Peter Hans Rauber
  • Publication number: 20110235563
    Abstract: Femto nodes provide Local IP Access (LIPA) which allows terminals to communicate with local area networks that the femtocells reside in using cellular air-interfaces (such as cdma2000, UMTS or LTE). Femto nodes also enable Remote IP Access (RIPA) service, which allows the terminals to access the local area network from the Internet as if they were present in the local area networks. Further, to avoid degradation of standby time of the terminals or the capacity of the femto node, or both, apparatus and methods are described herein in which a femto node consolidates received Broadcast/Multicast IP packets from a local area network prior to delivering the packets to terminals over a cellular air-interface. In other aspects, a femto node may deliver the received Broadcast/Multicast IP packets via a cellular one-to-many transmission, either with or without consolidation.
    Type: Application
    Filed: September 27, 2010
    Publication date: September 29, 2011
    Applicant: QUALCOMM INCORPORATED
    Inventors: Peerapol Tinnakornsrisuphap, Peter Hans Rauber
  • Publication number: 20110223902
    Abstract: Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
    Type: Application
    Filed: September 14, 2010
    Publication date: September 15, 2011
    Applicant: QUALCOMM INCORPORATED
    Inventors: John Wallace Nasielski, Peerapol Tinnakornsrisuphap, Chandrasekhar Therazhandur Sundarraman, Jun Wang, Masakazu Shirota
  • Publication number: 20110223912
    Abstract: Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
    Type: Application
    Filed: September 14, 2010
    Publication date: September 15, 2011
    Applicant: QUALCOMM INCORPORATED
    Inventors: John Wallace Nasielski, Peerapol Tinnakornsrisuphap, Chandrasekhar Therazhandur Sundarraman, Jun Wang, Masakazu Shirota
  • Publication number: 20110223886
    Abstract: Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
    Type: Application
    Filed: September 14, 2010
    Publication date: September 15, 2011
    Applicant: QUALCOMM INCORPORATED
    Inventors: John Wallace Nasielski, Peerapol Tinnakornsrisuphap, Chandrasekhar Therazhandur Sundarraman, Jun Wang, Masakazu Shirota
  • Publication number: 20110194530
    Abstract: A heterogeneous communication system enables femto Access Points (APs) to advertise handoff related information on a first Radio Access Technology (RAT), such as for receipt by a multi mode mobile device (e.g., a mobile device capable of operation on a plurality of RATs), wherein the handoff related information permits the multi mode mobile device to identify the femto access point on a second RAT. The multi mode mobile device can be connected to a macro node (e.g., a macro base station, an evolved Base Node, etc.) using the first RAT via a Wireless Wide Area Network (WWAN) air-interface (e.g., 1×, HRPD, eHRPD), while independently reading/decoding overhead messages on the second RAT for connection thereto (e.g., connection to the femto access point on the second RAT.) The second RAT can be another WWAN, a Wireless Local Access Network (WLAN) or a Personal Access Network.
    Type: Application
    Filed: August 11, 2010
    Publication date: August 11, 2011
    Applicant: QUALCOMM INCORPORATED
    Inventors: Peerapol Tinnakornsrisuphap, Sanjiv Nanda, Srinivasan Balasubramanian, Chandrasekhar Therazhandur Sundarraman, Peter Hans Rauber
  • Publication number: 20110189995
    Abstract: An access point is identified based on a plurality of pilot signatures. Here, in addition to transmitting a pilot signal that is encoded (e.g., spread/scrambled) using a particular pilot signature, an access point transmits a message that includes at least one indication of at least one other pilot signature. For example, an access point may use one PN offset to generate a pilot signal and transmit a message that identifies at least one other PN offset. An access terminal that receives the pilot signal and the message may then generate a pilot report that identifies all of these pilot signatures. Upon receiving a handover message including this pilot-related information, a target network entity with knowledge of the pilot signatures assigned to that access point may then accurately identify the access point as a target for handover of the access terminal.
    Type: Application
    Filed: August 4, 2010
    Publication date: August 4, 2011
    Applicant: QUALCOMM, INCORPORATED
    Inventors: Peerapol Tinnakornsrisuphap, Chirag Sureshbhai Patel, Mehmet Yavuz, Peter Hans Rauber, Ravindra Manohar Patwardhan
  • Publication number: 20110189986
    Abstract: An access point is identified based on a plurality of pilot signatures. Here, in addition to transmitting a pilot signal that is encoded (e.g., spread/scrambled) using a particular pilot signature, an access point transmits a message that includes at least one indication of at least one other pilot signature. For example, an access point may use one PN offset to generate a pilot signal and transmit a message that identifies at least one other PN offset. An access terminal that receives the pilot signal and the message may then generate a pilot report that identifies all of these pilot signatures. Upon receiving a handover message including this pilot-related information, a target network entity with knowledge of the pilot signatures assigned to that access point may then accurately identify the access point as a target for handover of the access terminal.
    Type: Application
    Filed: August 4, 2010
    Publication date: August 4, 2011
    Applicant: QUALCOMM, INCORPORATED
    Inventors: Peerapol Tinnakornsrisuphap, Chirag Sureshbhai Patel, Mehmet Yavuz, Peter Hans Rauber, Ravindra Manohar Patwardhan
  • Patent number: 7990925
    Abstract: Seamless communication handoff is achieved by establishing a protocol tunnel to route leftover packets between network access nodes during the handoff. For example, in a mobile IP-based system, a mobile node may perform a handoff from a first access node that is associated with a first routing node to a second access node that is associated with a second routing node. To prevent the loss of any packets that may be in route for delivery to or from the first routing node during the handoff, the mobile node establishes a protocol tunnel with the first access node via the second access node. On the forward-link, packets being delivered from the first routing node are routed over the protocol tunnel to the second access node and then to the mobile node. On the reverse-link, packets being sent to the first routing node are routed over the protocol tunnel from the mobile node to the second access node and then to the first routing node.
    Type: Grant
    Filed: May 29, 2008
    Date of Patent: August 2, 2011
    Assignee: QUALCOMM Incorporated
    Inventors: Peerapol Tinnakornsrisuphap, Fatih Ulupinar, Jun Wang, Parag Arun Agashe
  • Publication number: 20110134837
    Abstract: Access by a mobile station to a femto access point (FAP) of a wireless communication system is controlled by an enforcement point in response to mobile station authorization data provided from a storage point that is remote from the FAP. The authorization data is provided in response to FAP authentication data. The authentication data may include a FAP identifier and a message authenticator that the FAP generates by hashing shared secret information. The storage point may provide the authorization data in response to determining that the message authenticator is a hash of the shared secret information.
    Type: Application
    Filed: June 7, 2010
    Publication date: June 9, 2011
    Applicant: QUALCOMM Incorporated
    Inventors: Jun Wang, Anand Palanigounder, Peerapol Tinnakornsrisuphap, George Cherian, Chandrasekhar Therazhandur Sundarraman, Yinian Mao, Peter Hans Rauber
  • Publication number: 20110105118
    Abstract: Described herein is methodologies for efficient utilization of backhaul resources of a network for delivering paging data to an access terminal (AT) without sacrificing delay performance. A location that buffers data for an AT can be adaptively changed based on factors such as the location of the AT, applications utilized by the AT, and a recent activity level of the AT. To facilitate this determination, an AT can be configured with one or more registration boundaries. An AT can be configured with a small registration radius such that if the AT does not move outside of the small registration radius, data can be delivered directly to a data attachment point for the AT. If the AT moves outside of the small registration radius, the registration radius can be switched to a large registration radius and the access gateway can instead locally buffer data for the AT.
    Type: Application
    Filed: January 5, 2011
    Publication date: May 5, 2011
    Applicant: QUALCOMM Incorporated
    Inventors: Peerapol Tinnakornsrisuphap, Fatih Ulupinar, Parag Arun Agashe
  • Publication number: 20100322196
    Abstract: A method and apparatus providing broadcast content over a unicast channel. The method and apparatus may be configured to determine whether content received using a broadcast type format is to be transmitted using a unicast type format, and to map the content to a unicast reservation upon a determination that the content is to be transmitted using the unicast type format.
    Type: Application
    Filed: January 5, 2010
    Publication date: December 23, 2010
    Inventors: George Cherian, Jiming Guo, Peerapol Tinnakornsrisuphap, Rashid A. Attar, Bongyong Song, Mingxi Fan, Ravindra M. Patwardhan
  • Publication number: 20100293275
    Abstract: Systems and methodologies are described herein that facilitate congestion control in a wireless communication system. As described herein, an access network and associated terminals can utilize a token bucket access control mechanism, through which respective terminals can be allotted access tokens and/or other units for access to the access network. For example, upon requesting access to a given network, a user of the network can determine whether sufficient access tokens have been accumulated, based on which the request can be selectively allowed or denied. As further described herein, multiple token bucket mechanisms can be utilized, which can correspond to respective packet flows or the like. Additionally, token bucket access control can be implemented as described herein in cooperation with conventional access persistence functionality. Further aspects described herein facilitate the adjustment of token bucket parameters for network access control based on network loading.
    Type: Application
    Filed: February 10, 2010
    Publication date: November 18, 2010
    Applicant: QUALCOMM, Incorporated
    Inventors: Ramin Rezaiifar, Peerapol Tinnakornsrisuphap
  • Publication number: 20100284304
    Abstract: Systems and methods for establishing secure communications between two network elements through a trusted intermediary when no direct communication path is available. Separate secure communication links are established between the network elements and the trusted intermediary to facilitate secure end to end communication.
    Type: Application
    Filed: May 5, 2010
    Publication date: November 11, 2010
    Applicant: QUALCOMM Incorporated
    Inventors: Yinian Mao, Peerapol Tinnakornsrisuphap, Anand Palanigounder, Jun Wang
  • Publication number: 20100285793
    Abstract: Systems and methods for storing information in a user zone list are described herein. According to the systems and methods herein, the user zone list includes multiple user zone files and the user zone files include information regarding a communication interface type.
    Type: Application
    Filed: May 7, 2010
    Publication date: November 11, 2010
    Applicant: QUALCOMM Incorporated
    Inventors: Young C. Yoon, Srinivasan Balasubramanian, Peerapol Tinnakornsrisuphap, Aleksandar M. Gogic
  • Publication number: 20100279689
    Abstract: Devices and methods are provided for facilitating handing over to a hybrid femto access point that implements multiple radio access technologies (RATs), including a first RAT and a second RAT. In one embodiment, the method involves detecting a pilot from the hybrid femto access point, wherein the pilot is associated with the first RAT. The method involves registering with the hybrid femto access point on a first channel associated with the first RAT based upon the detected pilot. A system selection database is analyzed to identify a second channel associated with the second RAT, and a selection to handover to the identified second channel is effectuated.
    Type: Application
    Filed: April 28, 2010
    Publication date: November 4, 2010
    Applicant: QUALCOMM Incorporated
    Inventors: Peerapol Tinnakornsrisuphap, Young C. Yoon, Ravindra M. Patwardhan, Srinivasan Balasubramanian
  • Publication number: 20100208701
    Abstract: Systems and methods for identifying an address of a femto node during handoff of an access terminal from a femto node to a macro node. In one embodiment, the femto node assigns a unique identifier to the access terminal. The access terminal passes the unique identifier to the macro node. The macro node partitions the unique identifier to determine the address of the femto node. In another embodiment, the femto node registers its address with a domain name system. The macro node queries the domain name system to obtain the address of the femto node. In another embodiment, the macro node sends the unique identifier to a proxy. The proxy partitions the unique identifier to determine the address of the femto node.
    Type: Application
    Filed: February 10, 2010
    Publication date: August 19, 2010
    Applicant: QUALCOMM Incorporated
    Inventors: Peerapol Tinnakornsrisuphap, Jen Mei Chen
  • Publication number: 20100208703
    Abstract: Systems and methods for identifying an address of a femto node during handoff of an access terminal from a femto node to a macro node. In one embodiment, the femto node assigns a unique identifier to the access terminal. The access terminal passes the unique identifier to the macro node. The macro node partitions the unique identifier to determine the address of the femto node. In another embodiment, the femto node registers its address with a domain name system. The macro node queries the domain name system to obtain the address of the femto node. In another embodiment, the macro node sends the unique identifier to a proxy. The proxy partitions the unique identifier to determine the address of the femto node.
    Type: Application
    Filed: February 10, 2010
    Publication date: August 19, 2010
    Applicant: QUALCOMM Incorporated
    Inventors: Peerapol Tinnakornsrisuphap, Jen Mei Chen
  • Publication number: 20100208702
    Abstract: Systems and methods for identifying an address of a femto node during handoff of an access terminal from a femto node to a macro node. In one embodiment, the femto node assigns a unique identifier to the access terminal. The access terminal passes the unique identifier to the macro node. The macro node partitions the unique identifier to determine the address of the femto node. In another embodiment, the femto node registers its address with a domain name system. The macro node queries the domain name system to obtain the address of the femto node. In another embodiment, the macro node sends the unique identifier to a proxy. The proxy partitions the unique identifier to determine the address of the femto node.
    Type: Application
    Filed: February 10, 2010
    Publication date: August 19, 2010
    Applicant: QUALCOMM Incorporated
    Inventors: Peerapol Tinnakornsrisuphap, Jen Mei Chen