Patents by Inventor Whay Chiou Lee

Whay Chiou Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8826006
    Abstract: A method and device are useful for enabling a trust relationship using an unexpired public key infrastructure (PKI) certificate, where a current status of the PKI certificate is unavailable. The method includes determining at a relying party that a certificate status update for the PKI certificate is unavailable (step 905). Next, in response to the certificate status update being unavailable, a tolerable certificate status age (TCSA) for the PKI certificate is determined at the relying party based on one or more attributes associated with a certificate holder of the PKI certificate (step 910). Using the PKI certificate, a trust relationship is enabled between the relying party and the certificate holder after determining the TCSA and before an expiration of the TCSA (step 915).
    Type: Grant
    Filed: October 31, 2008
    Date of Patent: September 2, 2014
    Assignee: Motorola Solutions, Inc.
    Inventors: Liang Guo, Whay Chiou Lee, Anthony R. Metke
  • Patent number: 8539225
    Abstract: A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification authority (DCA) node device authorizations received from of a plurality of certification authorities (CAs) of different organizations, where the authorizations authorize the DCA node device to serve as a DCA representing the CAs (step 1105). The DCA node device then processes context information received from the ad hoc wireless network (step 1110). Next, the DCA node device determines, based on the context information, that a second node device should be enabled as a new trust bridge (step 1115). The DCA node device then performs a trust bridge deployment to enable the second node device to serve as the new trust bridge (step 1120).
    Type: Grant
    Filed: April 30, 2008
    Date of Patent: September 17, 2013
    Assignee: Motorola Solutions, Inc.
    Inventors: Liang Guo, Qi Bao, Donald E. Eastlake, III, Whay Chiou Lee, Anthony R. Metke
  • Patent number: 8423761
    Abstract: A method and device are useful for enabling a trust relationship using an expired public key infrastructure (PKI) certificate. The method includes determining at a relying party a maximum permissible grace period during which the PKI certificate can be conditionally granted a valid status (step 905). Next, at the relying party an uncertainty interval is determined, during which the relying party is unable to detect a revocation of the PKI certificate (step 910). A certificate grace period is then determined at the relying party from a function of the maximum permissible grace period, the uncertainty interval and at least one attribute defined in the PKI certificate (step 915). Using the PKI certificate, a trust relationship is then enabled between the relying party and a certificate holder of the PKI certificate, after determining the grace period and before an expiration of the grace period (step 920).
    Type: Grant
    Filed: October 31, 2008
    Date of Patent: April 16, 2013
    Assignee: Motorola Solutions, Inc.
    Inventors: Liang Guo, Whay Chiou Lee, Anthony R. Metke
  • Patent number: 8069216
    Abstract: A method and apparatus for alerting nodes of a malicious node in a mobile ad-hoc communication system is provided herein. Particularly, a method and apparatus for distributing an alert message to nodes surrounding a recently discovered malicious node is provided. This alert technique further leverages mobility to distribute the alert message to a large majority of nodes in the ad hoc wireless network within a reasonable amount of time.
    Type: Grant
    Filed: December 8, 2006
    Date of Patent: November 29, 2011
    Assignee: Motorola Solutions, Inc.
    Inventors: Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee
  • Patent number: 7970430
    Abstract: In certain embodiments, a method for managing operational parameters of a cognitive radio device to minimize non-compliance with a regulatory policy involves sensing a change in an operational condition that will affect compliance with a current operational policy; estimating a time at which the current operational policy will become invalid; selecting a method for determining how to update the current operational policy; and updating the current operational policy of the cognitive radio device. Other embodiments may incorporate more, fewer or other elements.
    Type: Grant
    Filed: December 21, 2006
    Date of Patent: June 28, 2011
    Assignee: Motorola Solutions, Inc.
    Inventors: Charles A. Backof, Jr., Steven D. Bromley, John D. Bruner, Lawrence M. Ecklund, Steven F. Gillig, John K. Grosspietsch, Whay Chiou Lee, Scott E. Preece
  • Patent number: 7860002
    Abstract: A method for priority-based admission control in a network, comprises receiving an admission request for transmitting an information flow to a network through a communication channel and determining an admissible region within a range of a channel data rate of a communication channel for an information flow in response to a priority of the information flow, where the priority of the information flow is one of a plurality of priorities of information flow. The admissible region is one of a plurality of admissible regions within the channel data rate range that correspond to different ones of the plurality of priorities of information flow, respectively, and each of the plurality of admissible regions within the channel data rate range is useable for transmitting information flow with a respective one of the plurality of priorities.
    Type: Grant
    Filed: July 15, 2008
    Date of Patent: December 28, 2010
    Assignee: Motorola, Inc.
    Inventors: Whay Chiou Lee, John R. Barr, Stephen P. Emeott, Ravishankar Ramamirtham, S. David Silk
  • Publication number: 20100250922
    Abstract: A method and system enable robust and scalable propagation of trust between a first organization and a second organization, both operating in an ad hoc wireless communication network. The method includes establishing at a first member node of the first organization pair-wise trust with a first member node of the second organization using a predetermined inter-organizational trust establishment device (step 505). Next, the first member node of the first organization generates a credential for the second organization using the pair-wise trust (step 510). The credential is then distributed from the first member node of the first organization to a second member node of the first organization (step 515). The second member node of the first organization then establishes pair-wise trust with a second member node of the second organization using the credential received from the first member node of the first organization (step 520).
    Type: Application
    Filed: March 31, 2009
    Publication date: September 30, 2010
    Applicant: Motorola, Inc.
    Inventors: Qi Bao, Donald E. Eastlake, III, Liang Guo, Whay Chiou Lee
  • Patent number: 7797263
    Abstract: In certain embodiments of a cognitive radio, a method of establishing operational policies, involves determining that a new policy decision should be made; requesting a policy decision from an authority having more computing power than the cognitive radio; receiving the policy decision from the authority; and implementing the policy decision in the cognitive radio. Other embodiments may incorporate more, fewer or other elements.
    Type: Grant
    Filed: December 21, 2006
    Date of Patent: September 14, 2010
    Assignee: Motorola, Inc.
    Inventors: Charles A. Backof, Jr., Steven D. Bromley, John D. Bruner, Lawrence M. Ecklund, Steven F. Gillig, John K. Grosspietsch, Whay Chiou Lee, Scott E. Preece
  • Patent number: 7788387
    Abstract: A system (100) and method (300) for mesh/ad hoc participation is provided. The method can include providing (310) an incentive to a user operating a device in an ad hoc network and determining (320) network resources associated with providing the incentive. The method can establish a credit system for devices within the ad hoc network, evaluate a supply and demand for the network resources, and allocate credits to the devices for forwarding packets in the ad hoc network. The method can determine a delivery capacity for the devices and negotiate an optimal packet route through the devices in the ad hoc network based on the supply and demand.
    Type: Grant
    Filed: August 11, 2006
    Date of Patent: August 31, 2010
    Assignee: Motorola, Inc.
    Inventors: Surender Kumar, Mark A. Birchler, Randy L. Ekl, Thomas C. Hill, Michael D. Kotzin, Whay Chiou Lee, Peggy K. Matson, Peter J. Stanforth
  • Publication number: 20100115267
    Abstract: A method and device are useful for enabling a trust relationship using an expired public key infrastructure (PKI) certificate. The method includes determining at a relying party a maximum permissible grace period during which the PKI certificate can be conditionally granted a valid status (step 905). Next, at the relying party an uncertainty interval is determined, during which the relying party is unable to detect a revocation of the PKI certificate (step 910). A certificate grace period is then determined at the relying party from a function of the maximum permissible grace period, the uncertainty interval and at least one attribute defined in the PKI certificate (step 915). Using the PKI certificate, a trust relationship is then enabled between the relying party and a certificate holder of the PKI certificate, after determining the grace period and before an expiration of the grace period (step 920).
    Type: Application
    Filed: October 31, 2008
    Publication date: May 6, 2010
    Applicant: MOTOROLA, INC.
    Inventors: Liang Guo, Whay Chiou Lee, Anthony R. Metke
  • Publication number: 20100115266
    Abstract: A method and device are useful for enabling a trust relationship using an unexpired public key infrastructure (PKI) certificate, where a current status of the PKI certificate is unavailable. The method includes determining at a relying party that a certificate status update for the PKI certificate is unavailable (step 905). Next, in response to the certificate status update being unavailable, a tolerable certificate status age (TCSA) for the PKI certificate is determined at the relying party based on one or more attributes associated with a certificate holder of the PKI certificate (step 910). Using the PKI certificate, a trust relationship is enabled between the relying party and the certificate holder after determining the TCSA and before an expiration of the TCSA (step 915).
    Type: Application
    Filed: October 31, 2008
    Publication date: May 6, 2010
    Applicant: MOTOROLA, INC.
    Inventors: Liang GUO, Whay Chiou Lee, Anthony R. Metke
  • Publication number: 20100014422
    Abstract: A method for priority-based admission control in a network, comprises receiving an admission request for transmitting an information flow to a network through a communication channel and determining an admissible region within a range of a channel data rate of a communication channel for an information flow in response to a priority of the information flow, where the priority of the information flow is one of a plurality of priorities of information flow. The admissible region is one of a plurality of admissible regions within the channel data rate range that correspond to different ones of the plurality of priorities of information flow, respectively, and each of the plurality of admissible regions within the channel data rate range is useable for transmitting information flow with a respective one of the plurality of priorities.
    Type: Application
    Filed: July 15, 2008
    Publication date: January 21, 2010
    Applicant: MOTOROLA, INC.
    Inventors: Whay Chiou Lee, John R. Barr, Stephen P. Emeott, Ravishankar Ramamirtham, S. David Silk
  • Publication number: 20090276841
    Abstract: A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification authority (DCA) node device authorizations received from of a plurality of certification authorities (CAs) of different organizations, where the authorizations authorize the DCA node device to serve as a DCA representing the CAs (step 1105). The DCA node device then processes context information received from the ad hoc wireless network (step 1110). Next, the DCA node device determines, based on the context information, that a second node device should be enabled as a new trust bridge (step 1115). The DCA node device then performs a trust bridge deployment to enable the second node device to serve as the new trust bridge (step 1120).
    Type: Application
    Filed: April 30, 2008
    Publication date: November 5, 2009
    Applicant: MOTOROLA, INC.
    Inventors: Liang Guo, Qi Bao, Donald E. Eastlake, III, Whay Chiou Lee, Anthony R. Metke
  • Patent number: 7593376
    Abstract: A method and apparatus for electing broadcast relay nodes (520B, H, M) in an ad hoc network (500). Each node (520A-520O) generates an attribute message including associated parameters. Each node (520A-520O) generates a weighted value (WV) based on the parameters. The WV can be included in the attribute message for that node, can provide a metric for ranking that node to be nominated to be a broadcast relay node, can alternatively provide a probability measure for that node to probabilistically elect itself as a broadcast relay node. The broadcast manager node (520C) receives the attribute messages and elects at least one nominated node as a broadcast relay node (520B, H, M) based on the attribute messages. Each node (520A-520O) can also initiate election of an intermediate broadcast relay node if that node fails to receive a test message within a predetermined time.
    Type: Grant
    Filed: December 7, 2005
    Date of Patent: September 22, 2009
    Assignee: Motorola, Inc.
    Inventors: Thomas V. D'Amico, Jeffrey D. Bonta, Randy L. Ekl, Avinash Joshi, Michael D. Kotzin, Surender Kumar, Whay Chiou Lee, Peggy K. Matson
  • Publication number: 20080154826
    Abstract: In certain embodiments of a cognitive radio, a method of establishing operational policies, involves determining that a new policy decision should be made; requesting a policy decision from an authority having more computing power than the cognitive radio; receiving the policy decision from the authority; and implementing the policy decision in the cognitive radio. Other embodiments may incorporate more, fewer or other elements.
    Type: Application
    Filed: December 21, 2006
    Publication date: June 26, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Charles A. Backof, Steven D. Bromley, John D. Bruner, Lawrence M. Ecklund, Steven F. Gillig, John K. Grosspietsch, Whay Chiou Lee, Scott E. Preece
  • Publication number: 20080155249
    Abstract: In certain embodiments, a method for managing operational parameters of a cognitive radio device to minimize non-compliance with a regulatory policy involves sensing a change in an operational condition that will affect compliance with a current operational policy; estimating a time at which the current operational policy will become invalid; selecting a method for determining how to update the current operational policy; and updating the current operational policy of the cognitive radio device. Other embodiments may incorporate more, fewer or other elements.
    Type: Application
    Filed: December 21, 2006
    Publication date: June 26, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Charles A. Backof, Steven D. Bromley, John D. Bruner, Lawrence M. Ecklund, Steven F. Gillig, John K. Grosspietsch, Whay Chiou Lee, Scott E. Preece
  • Patent number: 7391785
    Abstract: A scalable method for efficient dynamic allocation of buffer resources in a store-and-forward device, such that high utilization can be maintained with small average buffer occupancy by providing asymmetric congestion control with opportune random detection. Also provided is tolerance of transient onset of congestion and fairness toward bursty traffic with ready reaction to declines in congestion.
    Type: Grant
    Filed: September 2, 2002
    Date of Patent: June 24, 2008
    Assignee: Motorola, Inc.
    Inventors: Chih-Jen Chang, Whay Chiou Lee
  • Publication number: 20080140795
    Abstract: A method and apparatus for alerting nodes of a malicious node in a mobile ad-hoc communication system is provided herein. Particularly, a method and apparatus for distributing an alert message to nodes surrounding a recently discovered malicious node is provided. This alert technique further leverages mobility to distribute the alert message to a large majority of nodes in the ad hoc wireless network within a reasonable amount of time.
    Type: Application
    Filed: December 8, 2006
    Publication date: June 12, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee
  • Publication number: 20080130675
    Abstract: A device (10) and method (20) for integrating data traffic, such as isochronous (ISO) data packets and best-effort (BE) data packets, into a data transmission time frame. The method (20) includes defining a BE transmission interval (BETI) within the data transmission time frame, assigning all or a portion of the BE data packet in the BETI, or fragmenting the BE data packet if the BE data packet is larger than the BETI. The method dynamically fragments the BE data packet into a first fragment, equal in size to the BETI, that is assigned to the BETI, and a second fragment, which is queued. The method assigns BE data packets and fragments in this manner until they have been assigned to the BETI. The device (10) includes a scheduler for assigning BE data packet in the BETI and a fragmenter for fragmenting the BE data packet when larger than the BETI.
    Type: Application
    Filed: December 1, 2006
    Publication date: June 5, 2008
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Ying-Leh Lin, Liang Guo, Whay Chiou Lee
  • Publication number: 20080120264
    Abstract: A method and apparatus for efficient management of hierarchically administered spectrum resources in a communications network are disclosed.
    Type: Application
    Filed: November 20, 2006
    Publication date: May 22, 2008
    Applicant: Motorola, Inc.
    Inventors: Whay Chiou Lee, Charbel Khawand, Kevin L. Kloker, Stephen N. Levine