Patents by Inventor Stephen P. Emeott

Stephen P. Emeott has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7492753
    Abstract: A mobile terminal (302, 304) wakes up from a low power state and initiates a frame exchange in a wireless local area network that supports voice traffic by transmitting a polling frame (602). If the mobile terminal had voice data to send, it is included in the polling frame. In response to receiving the polling frame, the access point transmits a delay frame (604) to acknowledge receipt of the polling frame. If the access point has data for the polling mobile terminal, it transmits a non-delay frame (606) including the voice data, otherwise it transmits a null frame (702). The mobile terminal acknowledges the data from the access point (608), and goes back to sleep until the beginning of the next service interval.
    Type: Grant
    Filed: February 26, 2004
    Date of Patent: February 17, 2009
    Assignee: Motorola, Inc.
    Inventors: Nattavut Smavatkul, Ye Chen, Stephen P. Emeott, Floyd D. Simpson, Huai Y. Wang
  • Patent number: 7468966
    Abstract: In the present invention, the subscriber unit (200) obtains a set of access point identifiers and measurement opportunity information for each access point identifier. A first measurement is performed on a first access point identified from the set of access point identifiers. A current timer value is determined after completing the step of performing, and a second access point identified from the set of access point identifiers in which to perform a second measurement is selected. Selecting the second access point is based on at least the measurement opportunity information for the second access point in relation to the current timer value.
    Type: Grant
    Filed: December 30, 2004
    Date of Patent: December 23, 2008
    Assignee: Motorola, Inc.
    Inventors: Michael H. Baker, Stephen P. Emeott, Aparna Pandey, Floyd Simpson, Brian K. Smith, Timothy J. Wilson
  • Publication number: 20080298249
    Abstract: A method for selection of the association access point for a station in an infrastructure mesh network based on received signal strength and one or more “association bias” weights received from neighboring access points. Each weight corresponds to a packet length category. In one embodiment, stations measure received signal strength for received signals and decode the association bias information field(s) and corresponding packet length category thresholds that are received in management frames such as beacons. Stations use this information to select an access point for association that will minimize the overall mesh resource utilization for the traffic (i.e. packet lengths) being transmitted. The method includes three elements: network assistance, access point actions, and station actions.
    Type: Application
    Filed: June 29, 2007
    Publication date: December 4, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Michael H. Baker, Ye Chen, Stephen P. Emeott, Isam R. Makhlouf
  • Patent number: 7461253
    Abstract: A method and apparatus for providing a key for secure communications is provided herein. During operation a node wishing to join a network, will authenticate with an authentication server and then derive a pairwise key (e.g., a Pair-wise Transient Key (PTK)) used for encryption of unicast traffic. The node will also create its own group transient key (GTK) for use in encrypting multicast or broadcast traffic. Once the GTK is generated, it will be provided to an authenticator as part of an association request message.
    Type: Grant
    Filed: November 20, 2006
    Date of Patent: December 2, 2008
    Assignee: Motorola, Inc.
    Inventors: Anthony J. Braskich, Stephen P. Emeott
  • Publication number: 20080226071
    Abstract: A method for security authentication within a wireless network is disclosed. A method within an adhoc mesh network for two devices to quickly determine roles (i.e. which is the authenticator and which is the supplicant) while establishing a security association is provided for. The invention further provides for the inclusion of cached key information in the role negotiation process and the application of role negotiation to a shortened three-way handshake.
    Type: Application
    Filed: February 26, 2008
    Publication date: September 18, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Anthony J. Braskich, Charles R. Barker, Stephen P. Emeott, Guenael T. Strutt
  • Publication number: 20080146155
    Abstract: A method (10, 40, 50 or 55) or system (200) of detecting and avoiding periodic intermittent interference (PII) can include monitoring (12) for PII on a current channel which can include monitoring (14) by tracking retransmission statistics of isochronous traffic or by tracking channel probe request failures corresponding to temporal characteristics of microwave oven interference where PII is detected if the retransmission statistics exceed a predetermined threshold or if the probe failure requests exceed another predetermined threshold. The method can further include selecting (16) a channel or an adjacent channel with a highest level of PII when PII is detected on the current channel which can optionally include selecting (18) a preset channel known for PII interference or adaptively selecting by directly measuring energy levels on a plurality of channels. The method can switch (20) to a preferred channel when PII is no longer detected on the current channel.
    Type: Application
    Filed: December 15, 2006
    Publication date: June 19, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Isam R. Makhlouf, Stephen P. Emeott
  • Publication number: 20080144550
    Abstract: The invention can establish a default retransmission algorithm and an interference retransmission algorithm. The default retransmission algorithm can be a Distributed Coordination Function (DCF) based algorithm implemented in a MAC layer in conformance with an IEEE 802.11 based standard. The minimum cumulative back-off time for the default transmission algorithm can be less a minimum cumulative back-off time for the interference retransmission algorithm. The minimum cumulative back-off time for the interference retransmission algorithm can be greater than an on-cycle of the PII and less than a sum of the one and off-cycles of the PII (e.g., between ˜8.3 ms and ˜16.7 ms for microwave oven generated PII). A determination can be made whether periodic intermittent interference is present. If so, the default retransmission algorithm can be automatically utilized for wireless data conveyances. When PII is present, the interference retransmission algorithm can be automatically utilized.
    Type: Application
    Filed: December 15, 2006
    Publication date: June 19, 2008
    Applicant: MOTOROLA, INC.
    Inventors: ISAM R. MAKHLOUF, STEPHEN P. EMEOTT
  • Publication number: 20080146172
    Abstract: A method (10, 40 or 70) or system (200) of detecting periodic intermittent interference (PII) can include indirect detection by tracking (14) retransmission statistics of isochronous traffic or alternatively tracking channel probe request failures corresponding to temporal characteristics of microwave oven interference. Such tracking can be done in a number of ways including tracking (16) retransmission statistics by tracking MAC layer statistics or by tracking retransmission statistics for Voice over WLAN or by tracking a number of retransmission attempts required per transmission opportunity. In another alternative, the method can track (18) success and failures of probe requests for data traffic. The tracking schemes can use correlation. The method can further introduce (28) hysteresis in the detection of the PII to prevent rapid entering and exiting from a current detection mode. The method can further operate (29) in a direct PII detection mode if the indirect detection mode indicates PII.
    Type: Application
    Filed: December 15, 2006
    Publication date: June 19, 2008
    Applicant: MOTOROLA, INC.
    Inventors: ISAM R. MAKHLOUF, STEPHEN P. EMEOTT
  • Publication number: 20080146156
    Abstract: A method (10 or 40) or system (200) of predictive sensing of periodic intermittent interference (PII) can include the measuring (12) of energy on a channel for an indication of PII, determining (14) if a channel is currently in a PII on-cycle, and adjusting (16) a clear channel assessment threshold to a new threshold for improved sensitivity of the PII on-cycle. If a current energy level on the channel is below the new threshold and if a previous on-energy characteristic suggests that the current energy level will remain below the new threshold for a predetermined minimum period of time, then a clear channel indication can be provided (20). A busy channel indication is provided (45) when either the current energy level is above the new threshold or the previous on-energy characteristic suggests the current energy level will not remain below the threshold for predetermined minimum period of time.
    Type: Application
    Filed: December 15, 2006
    Publication date: June 19, 2008
    Applicant: MOTOROLA, INC.
    Inventors: ISAM R. MAKHLOUF, STEPHEN P. EMEOTT
  • Publication number: 20080112347
    Abstract: A method and apparatus is provided for power conservation in a node operating in a multihop network. The method includes determining whether a broadcast frame in a beacon interval intended for the node has been previously received by the node and remaining awake for reception of the broadcast frame in the beacon interval if the broadcast frame intended for the node has not been previously received by the node.
    Type: Application
    Filed: November 13, 2006
    Publication date: May 15, 2008
    Applicant: Motorola, Inc.
    Inventors: Hrishikesh Gossain, Stephen P. Emeott, Keith J. Goldberg
  • Publication number: 20080062984
    Abstract: The disclosure relates to techniques and technologies for efficiently transporting management information between mesh nodes across multiple hops or “mesh links” in a multi-hop mesh network. These techniques and technologies are general purpose and provide an extensible mechanism for transporting management traffic across a mesh network. These techniques and technologies can be applied in a number of applications relating, for example, to security, routing, radio measurements, mesh node management, etc.
    Type: Application
    Filed: September 7, 2006
    Publication date: March 13, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Stephen P. Emeott, Charles R. Barker, Anthony J. Braskich
  • Publication number: 20080065884
    Abstract: A method and apparatus for establishing security associations between nodes of an ad hoc wireless network includes two authentication steps: an initial first contact step (authentication, authorization, and accounting (AAA)-based authentication), and a “light-weight” step that reuses key material generated during first contact. A mesh authenticator within the network provides two roles. The first role is to implement an 802.1X port access entity (PAE), derive transient keys used for encryption with a supplicant mesh point via a four-way handshake and take care of back end communications with a key distributor. The second role is as a key distributor that implements a AAA-client and derives keys used to authenticate a mesh point during first contact or fast security association. The key distributor and the on-line authentication server can communicate to one another without these messages being transported over mesh links.
    Type: Application
    Filed: September 7, 2006
    Publication date: March 13, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Stephen P. Emeott, Anthony J. Braskich
  • Publication number: 20080063204
    Abstract: A method and system for secure processing of authentication key material in an ad hoc wireless network enables secure distribution of the authentication key material between a mesh authenticator (110) and a mesh key distributor (115), which may be separated by multiple wireless links. The method includes deriving a pairwise transient key for key distribution (PTK-KD) using a mesh key holder security information element (MKHSIE). A mesh authenticator pairwise master key (PMK-MA) is then requested using a first mesh encrypted key information element (MEKIE) that includes data origin information. Using the pairwise transient key for key distribution (PTK-KD), a second mesh encrypted key information element (MEKIE) is then decrypted to obtain the mesh authenticator pairwise master key (PMK-MA).
    Type: Application
    Filed: September 7, 2006
    Publication date: March 13, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Anthony J. Braskich, Stephen P. Emeott
  • Publication number: 20080063205
    Abstract: The disclosure relates to techniques and technologies for establishing a secure link between a mesh authenticator and a mesh key distributor for transporting security association messages. The secure link can allow the mesh key distributor to communicate results of an authentication process to the mesh authenticator.
    Type: Application
    Filed: September 7, 2006
    Publication date: March 13, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Anthony J. Braskich, Stephen P. Emeott
  • Publication number: 20080057956
    Abstract: A system and method for achieving wireless local area network (WLAN) communications between an access point and a mobile device are disclosed. In at least some embodiments, the system involves an access point that includes a first transceiver capable of sending and receiving first wireless communication signals in accordance with a WLAN protocol, and a first transmitter capable of sending second wireless communication signals that are cellular/WAN communication signals on a first channel. The second wireless communication signals can be received by a mobile, dual-mode (or multi-mode) wireless communication device such as a cellular telephone and, upon such receipt, WLAN communications can be established and conducted between the access point (or another access point) and the mobile device.
    Type: Application
    Filed: September 5, 2006
    Publication date: March 6, 2008
    Applicant: MOTOROLA, INC.
    Inventors: GREGORY R. BLACK, THOMAS V. D'AMICO, STEPHEN P. EMEOTT, BRIAN D. STORM
  • Publication number: 20070297375
    Abstract: A system and method for data transmission in an ad hoc wireless communication network is useful for improving network efficiency. The method includes determining whether both high priority data and low priority data are queued for transmission from a sending node to a receiving node (step 620). When both high priority data and low priority data are queued for transmission, the high priority data and the low priority data are aggregated in an aggregated data frame (step 625). Finally, the aggregated data frame is transmitted to the receiving node (step 630).
    Type: Application
    Filed: June 27, 2006
    Publication date: December 27, 2007
    Applicant: MOTOROLA, INC.
    Inventors: Jeffrey D. Bonta, Stephen P. Emeott
  • Patent number: 7236477
    Abstract: A wireless local area network system (100) supporting mobile radio telephony reduces the time to complete an authenticated handover from one access point (104) to another (108) by a mobile station (102) by performing some of the steps normally performed upon leaving one access point while still associated with that access point. More particularly, the mobile station causes a cryptographic key (204) to be preestablished (212) for use when handing over to a new access point. The cryptographic key is derived at the mobile station, and is also derived in the WLAN infrastructure and stored until the mobile station initiates a handover.
    Type: Grant
    Filed: October 7, 2005
    Date of Patent: June 26, 2007
    Assignee: Motorola, Inc.
    Inventors: Stephen P. Emeott, Anthony J. Braskich
  • Patent number: 7194261
    Abstract: An access point (11) for a wireless local area network (10) transmits a beacon message during a service interval period (21). This beacon message identifies, in a preferred embodiment, those subscriber units to whom the access point will shortly be transmitting data. Subscriber units that are not identified in the beacon message and that do not have data themselves to transmit to the access point can implement a power conservation mode of operation until the next beacon message. Subscriber units that have data, such as voice information, to transmit can utilize the beacon message contents to at least estimate a likely time by when the access point will have concluded making its transmissions to the subscriber units. That estimated time can then be used to facilitate scheduling a time at which a given subscriber unit will contend for an opportunity to transmit its data to the access point.
    Type: Grant
    Filed: August 21, 2003
    Date of Patent: March 20, 2007
    Assignee: Motorola, Inc.
    Inventors: Stephen P. Emeott, Ye Chen, Nattavut Smavatkul
  • Patent number: 6973052
    Abstract: A mobile station establishes a schedule by which data is exchanged with an access point. The schedule allows the mobile station to use a low power mode at times outside of the scheduled service periods. However, the mobile station may occasionally need to retrieve additional data from the access point, or transmit additional data to the access point, and so initiates an unscheduled service period to do so.
    Type: Grant
    Filed: December 19, 2003
    Date of Patent: December 6, 2005
    Assignee: Motorola, Inc.
    Inventors: Huai Y. Wang, Ye Chen, Stephen P. Emeott, Floyd D. Simpson, Timothy J. Wilson
  • Patent number: 6917598
    Abstract: A mobile station (106) establishes a real time communication link via an access point (102) for carrying voice or other time-sensitive data. A WLAN subsystem (204) of the mobile station is normally kept in a low power state. Upon initiating a communication link the mobile station signals to the access point that unscheduled power save delivery mode will be used (614), and the access point reserves resources to assure the necessary quality of service. The mobile station initiates a frame transaction by first powering up the WLAN subsystem (712), acquiring the WLAN channel (407), and transmitting a polling frame. Upon successful receipt of the polling frame the access point prepares to reply with an aggregate response. The aggregate response commences by transmitting all data in an aggregate buffer, including both reserved and unreserved data buffers. Upon successful receipt of the aggregate response, the mobile station places the WLAN subsystem back into a low power state.
    Type: Grant
    Filed: December 19, 2003
    Date of Patent: July 12, 2005
    Assignee: Motorola, Inc.
    Inventors: Stephen P. Emeott, Ye Chen, Floyd D. Simpson, Huai Y. Wang, Timothy J. Wilson, Nattavut Smavatkul