Patents by Inventor Wai Tsang

Wai Tsang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070014399
    Abstract: A key management overlay system includes a first key management system that produces a first cryptographic key, a second key management system that produces a second cryptographic key, and a math module that implements a math model that generates a third cryptographic key based at least in part on the first and second cryptographic keys. A key management overlay process includes generating a first cryptographic key according to a first key management system, generating a second cryptographic key according to a second key management system, and generating a third cryptographic key based at least in part on the first and second cryptographic keys.
    Type: Application
    Filed: July 15, 2005
    Publication date: January 18, 2007
    Inventors: Edward Scheidt, C. Wack, Wai Tsang
  • Publication number: 20060282681
    Abstract: A method of providing object security includes selecting an object to secure, selecting at least one criterion for authorization to access the object, generating an authorization profile based on the at least one criterion, generating an encryption key, binding the authorization profile to at least one of the object and the key, and encrypting the object with the encryption key.
    Type: Application
    Filed: May 26, 2006
    Publication date: December 14, 2006
    Inventors: Edward Scheidt, C. Jay Wack, Wai Tsang, Roger Butler
  • Publication number: 20050235148
    Abstract: A method of authenticating a user to use a system includes using a provider token to generate a random value. The token generates a derived key based at least in part on a token-provided salt value and a user-provided password. The provider generates a token unlock key based at least in part on the derived key and sends it to the token. First and second challenge data instances are generated by the provider and the token, respectively, and the process is terminated if the challenge data instances are determined not to match. If the challenge data instances are determined to match, then an encrypted data transfer system is established between the token and the provider, and the token unlocks locked private data stored on the token. The user is authenticated for secured use of the system based at least in part on the unlocked private data.
    Type: Application
    Filed: January 30, 2003
    Publication date: October 20, 2005
    Inventors: Edward Scheidt, Ersin Domanque, Roger Butler, Wai Tsang
  • Publication number: 20030035442
    Abstract: A method and system are disclosed for enabling full-service communications between a full-service cable modem termination system (fsCMTS) and a plurality of full-service cable modems (fsCM's) for a conventional two-way hybrid fiber-coax (HFC) cable television network. Full-service communications include data, voice and video. Video includes broadcast quality MPEG-2 transport packet streams and Internet protocol media streams. A multi-channel full-service media-access-control (fsMAC) coordinates the access to the shared upstream and downstream channels. At lease two downstream channels and at least two upstream channels are provided. Several MAC management messages are defined to enable multi-channel full-service MAC domain to be defined and to enable packet-by-packet true seamless channel change. Multiple upstream channels can be used in various ways to best optimize the use of the spectrum for meeting the quality-of-services needed by different services.
    Type: Application
    Filed: April 15, 2002
    Publication date: February 20, 2003
    Inventor: John Wai Tsang Eng