Patents by Inventor Randy Kuang

Randy Kuang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100239092
    Abstract: Alice generates a sequence of key bits forming an initial cryptographic key. Alice then uses the sequence of key bits and a sequence of cipher bits to control respective control parameters of a quantum encoding process applied to a sequence of quantum pulses, where the sequence of cipher bits used is known to Bob. Alice then releases the encoded pulses towards Bob over a quantum channel. Bob uses the previously agreed-upon sequence of cipher bits to control a control parameter, such as the quantum basis, of a quantum detection process applied to the pulses received from Alice, thus producing a detection outcome for each received pulse. Bob then derives a final cryptographic key from the detection outcomes. Because the cipher bits used to select the quantum bases used by both Alice and Bob are known by both parties, the method allows the final cryptographic key to be distributed with full basis alignment compared to 50% for BB84, thus allowing efficient quantum key distribution over multiple hops.
    Type: Application
    Filed: May 31, 2010
    Publication date: September 23, 2010
    Inventor: Randy Kuang
  • Patent number: 7787628
    Abstract: A method of distributing a quantum key from a sender to a recipient. The recipient generates a pulse having multiple photons; splits the pulse into first and second sub-pulses; phase modulates the first sub-pulse with a secret key; and transmits both the phase-modulated first sub-pulse and the second sub-pulse to the sender. The sender receives the phase-modulated first sub-pulse and the second sub-pulse from the recipient; encodes a quantum key bit into one of the sub-pulses received from the recipient; and transmits both the phase-modulated first sub-pulse and the second sub-pulse back to the recipient. Then, the recipient receives the phase-modulated first sub-pulse and the second sub-pulse from the sender; phase modulates the second sub-pulse with the secret key; combines the phase-modulated first sub-pulse and the phase-modulated second sub-pulse to produce a composite pulse; and processes the composite pulse in an attempt to detect the quantum key bit.
    Type: Grant
    Filed: July 7, 2006
    Date of Patent: August 31, 2010
    Assignee: Nortel Networks Limited
    Inventors: Randy Kuang, Guo Qiang Wang, John Stankus
  • Publication number: 20100199086
    Abstract: A two-level authentication system is described supporting two-factor authentication that offers efficient protection for secure on-line web transactions. It includes a global unique identity (UID) provided either by an institute-issued/personal trusted device, or based on client computing platform hardware attributes, and generated using institution authorized private software, institution-authorized authentication proxy software, and an institution-generated credential code which is pre-stored in the token and only accessible by the institute-authorized authentication proxy software. The institution-authorized authentication proxy software uses the user's PIN and the trusted device's UID as input and verifies the user and device identities through institution-generated credential code which was pre-stored in the trusted device.
    Type: Application
    Filed: December 16, 2009
    Publication date: August 5, 2010
    Applicant: InBay Technologies, Inc.
    Inventors: Randy Kuang, Stanislus K. Xavier
  • Patent number: 7760883
    Abstract: Apparatus for distributing a quantum key between nodes Alice and Allie, comprising a coupler that splits generated photon pulses into first and second pulses P1 and P2; and an interface that transmits the P1's and P2's into a network. The P1's are received after modulation by Alice with respective phases selected from two encoding bases and further selected from within the selected encoding basis as a function of a bit value of a respective bit in a key bit string maintained by Alice. The P2's are received after similar modulation by Allie. A detector processes the P1's and P2's upon receipt to produce a sequence of detection outcomes indicative of phase mismatch between the P1's and corresponding P2's.
    Type: Grant
    Filed: July 7, 2006
    Date of Patent: July 20, 2010
    Assignee: Nortel Networks Limited
    Inventor: Randy Kuang
  • Patent number: 7747019
    Abstract: Alice generates a sequence of key bits forming an initial cryptographic key. Alice then uses the sequence of key bits and a sequence of cipher bits to control respective control parameters of a quantum encoding process applied to a sequence of quantum pulses, where the sequence of cipher bits used is known to Bob. Alice then releases the encoded pulses towards Bob over a quantum channel. Bob uses the previously agreed-upon sequence of cipher bits to control a control parameter, such as the quantum basis, of a quantum detection process applied to the pulses received from Alice, thus producing a detection outcome for each received pulse. Bob then derives a final cryptographic key from the detection outcomes. Because the cipher bits used to select the quantum bases used by both Alice and Bob are known by both parties, the method allows the final cryptographic key to be distributed with full basis alignment compared to 50% for BB84, thus allowing efficient quantum key distribution over multiple hops.
    Type: Grant
    Filed: December 12, 2005
    Date of Patent: June 29, 2010
    Assignee: Nortel Networks Limited
    Inventor: Randy Kuang
  • Patent number: 7272315
    Abstract: A technique for transferring information in a passive optical network is disclosed. The technique may be realized as a method for transferring information in a passive optical network having a plurality of network nodes. The method comprises transmitting a downstream signal during a control/management time slot of a periodic frame having N control/management time slots and M data time slots, wherein the downstream signal includes an identifier of a service node in the network, wherein each of the N control/management time slots corresponds to a respective one of N possible service nodes in the network. The method also comprises responding to the downstream signal with an upstream signal during the control/management time slot of the periodic frame. The method further comprises allocating at least one of the M data time slots of the periodic frame to the service node based at least in part upon the upstream signal.
    Type: Grant
    Filed: February 12, 2003
    Date of Patent: September 18, 2007
    Assignee: Nortel Networks Limited
    Inventors: How Kee Au, Randy Kuang, Guo Qiang Wang
  • Publication number: 20070211726
    Abstract: This invention provides a method, system and apparatus for providing service flow identifier (“SFID”) mobility in a wireless network, which includes generating a structured service flow identifier, the structured service flow identifier having a service flow identifier field and a service flow granularity field, and establishing a level of service flow identifier mobility for the mobile station based on the structured service flow identifier. The structured service flow identifier can further include a multicast field.
    Type: Application
    Filed: March 13, 2007
    Publication date: September 13, 2007
    Inventors: Randy Kuang, Wenhui Yuan
  • Publication number: 20070195764
    Abstract: A robust header compression (ROHC) controller provides for service flow processing of a ROHC channel in a WiMAX wireless communication system. The ROHC controller controls the negotiations of the MS ROHC capabilities during its registration and the negotiations of the ROHC channel parameters during ROHC enabled service flow setup; the MS ROHC capabilities including ROHC compression and decompression capabilities and ROHC channel and feedback strategies; the channel parameter negotiation covers the ROHC profile set and feedback channel information in addition to the 16e/12D standard. The ROHC controller receives a service flow request for a ROHC enabled service flow, wherein the request includes a QoS profile.
    Type: Application
    Filed: February 22, 2007
    Publication date: August 23, 2007
    Applicant: NORTEL NETWORKS LIMITED
    Inventors: Qingchao Liu, Wenhui Yuan, Randy Kuang
  • Publication number: 20070076883
    Abstract: Apparatus for distributing a quantum key between nodes Alice and Allie, comprising a coupler that splits generated photon pulses into first and second pulses P1 and P2; and an interface that transmits the P1's and P2's into a network. The P1's are received after modulation by Alice with respective phases selected from two encoding bases and further selected from within the selected encoding basis as a function of a bit value of a respective bit in a key bit string maintained by Alice. The P2's are received after similar modulation by Allie. A detector processes the P1's and P2's upon receipt to produce a sequence of detection outcomes indicative of phase mismatch between the P1's and corresponding P2's.
    Type: Application
    Filed: July 7, 2006
    Publication date: April 5, 2007
    Inventor: Randy Kuang
  • Publication number: 20070076878
    Abstract: A QKD node in an optical ring network enables distribution of quantum keys between node pairs having neither photon sources nor photon detectors. The QKD node transmits corresponding pulses P1 and P2 into the ring network in opposing directions. A first node (Alice) of the pair randomly modulates pulse P1 and a second node (Allie) of the pair randomly modulates pulse P2, each with phases selected from two encoding bases: B1(0, ?) and B2(?/2, 3+/2). Node Allie then publicly signals to node Alice and the QKD node to indicate which bases were used for encoding QKD bits in sequence, for example, B1, B2, B2, B1, etc. Node Alice compares the encoding types used by node Allie and publicly signals to nodes Allie and Bob to indicate which encoding types match. The QKD node then deletes all mismatched measurements, and nodes Allie and Alice also delete the corresponding bits. The QKD node then publicly signal to nodes Allie and Alice to indicate the XOR bit string.
    Type: Application
    Filed: September 30, 2005
    Publication date: April 5, 2007
    Inventor: Randy Kuang
  • Publication number: 20070076887
    Abstract: A laser pulse representing a bit of a quantum key is split into two pulses. In addition to known round trip phase encoding schema, a secret phase key is modulated into one of the two pulses: P1 and P2. The secret phase key is used to identify whether the returning pulses originated from the sender, i.e., whether the key distribution has been attacked by an eavesdropper. A secret key phase modulator randomly modulates pulse P1. An attenuator then reduces the average photon number of the modulated pulse P1 to a selected level greater than one to increase the likelihood of efficient, successful transmission while reducing the possibility of eavesdropping, e.g., ?=10. Both pulses P1 and P2 are sent to the intended recipient and reflected to the sender. Pulse P2 is modulated upon return to the sender using the same secret phase key previously modulated into pulse P1.
    Type: Application
    Filed: September 30, 2005
    Publication date: April 5, 2007
    Inventors: Randy Kuang, Guo Wang, John Stankus
  • Publication number: 20070076888
    Abstract: A method of distributing a quantum key from a sender to a recipient. The recipient generates a pulse having multiple photons; splits the pulse into first and second sub-pulses; phase modulates the first sub-pulse with a secret key; and transmits both the phase-modulated first sub-pulse and the second sub-pulse to the sender. The sender receives the phase-modulated first sub-pulse and the second sub-pulse from the recipient; encodes a quantum key bit into one of the sub-pulses received from the recipient; and transmits both the phase-modulated first sub-pulse and the second sub-pulse back to the recipient. Then, the recipient receives the phase-modulated first sub-pulse and the second sub-pulse from the sender; phase modulates the second sub-pulse with the secret key; combines the phase-modulated first sub-pulse and the phase-modulated second sub-pulse to produce a composite pulse; and processes the composite pulse in an attempt to detect the quantum key bit.
    Type: Application
    Filed: July 7, 2006
    Publication date: April 5, 2007
    Inventors: Randy Kuang, Guo Wang, John Stankus
  • Publication number: 20070071245
    Abstract: Alice generates a sequence of key bits forming an initial cryptographic key. Alice then uses the sequence of key bits and a sequence of cipher bits to control respective control parameters of a quantum encoding process applied to a sequence of quantum pulses, where the sequence of cipher bits used is known to Bob. Alice then releases the encoded pulses towards Bob over a quantum channel. Bob uses the previously agreed-upon sequence of cipher bits to control a control parameter, such as the quantum basis, of a quantum detection process applied to the pulses received from Alice, thus producing a detection outcome for each received pulse. Bob then derives a final cryptographic key from the detection outcomes. Because the cipher bits used to select the quantum bases used by both Alice and Bob are known by both parties, the method allows the final cryptographic key to be distributed with full basis alignment compared to 50% for BB84, thus allowing efficient quantum key distribution over multiple hops.
    Type: Application
    Filed: December 12, 2005
    Publication date: March 29, 2007
    Inventor: Randy Kuang
  • Patent number: 7173937
    Abstract: A technique for address registration and resolution is disclosed. In one embodiment, the technique is realized by an address registration and resolution service that is applicable to in-band in-fiber, out-of-band in-fiber and out-of-band out-of-fiber O-UNI signaling configurations. Through this address registration and resolution scheme, an optical service subscriber or optical access service provider can register various client-layer addresses (i.e., establish an association between the client addresses and the optical network points of attachment for the network intelligence.) An intelligent optical routing protocol will propagate this information all over the network and use this information to locate a corresponding optical client device and the optical network point of attachment. The optical network signaling can then perform the network internal signaling for on-demand optical service provisioning.
    Type: Grant
    Filed: March 27, 2002
    Date of Patent: February 6, 2007
    Assignee: Nortel Networks Limited
    Inventors: Wenfeng Chen, Borong Zhou, Guo Qiang Wang, Randy Kuang
  • Publication number: 20060256966
    Abstract: A transmitter classifies quantum pulses into supervisory pulses and message pulses, and assigns each message pulse to a message bit. Each message pulse is then encoded using a coding base randomly selected from a set of coding bases, and with a polarity relative to the coding base that depends on the value of the corresponding message bit. Supervisory pulses are encoded using a coding base different from the coding bases in the aforementioned set. The encoded pulses are sent to a recipient over a quantum channel. The transmitter also informs the recipient of the positions of the supervisory pulses. The recipient detects the pulses relative to a locally selected coding base, producing a zero-click, a one-click or a two-click.
    Type: Application
    Filed: September 27, 2005
    Publication date: November 16, 2006
    Inventors: Randy Kuang, Guo Wang
  • Patent number: 6917763
    Abstract: A technique for verifying fiber connectivity via an optical supervisory channel in a photonic network is disclosed. In one embodiment, the technique is realized by sending a first message from the first node to the second node, wherein the first message includes an address of an intended port of the second node; receiving a second message at the first node from the second node in response to the first message, wherein the second message contains an address of a receiving port of the second node; and comparing the intended port of the second node and the receiving port of the second node for verifying fiber connectivity between the first node and the second node.
    Type: Grant
    Filed: March 5, 2002
    Date of Patent: July 12, 2005
    Assignee: Nortel Networks Limited
    Inventors: How Kee Au, Randy Kuang, Guo Qiang Wang