Patents by Inventor Whay Chiou Lee
Whay Chiou Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8826006Abstract: A method and device are useful for enabling a trust relationship using an unexpired public key infrastructure (PKI) certificate, where a current status of the PKI certificate is unavailable. The method includes determining at a relying party that a certificate status update for the PKI certificate is unavailable (step 905). Next, in response to the certificate status update being unavailable, a tolerable certificate status age (TCSA) for the PKI certificate is determined at the relying party based on one or more attributes associated with a certificate holder of the PKI certificate (step 910). Using the PKI certificate, a trust relationship is enabled between the relying party and the certificate holder after determining the TCSA and before an expiration of the TCSA (step 915).Type: GrantFiled: October 31, 2008Date of Patent: September 2, 2014Assignee: Motorola Solutions, Inc.Inventors: Liang Guo, Whay Chiou Lee, Anthony R. Metke
-
Patent number: 8539225Abstract: A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification authority (DCA) node device authorizations received from of a plurality of certification authorities (CAs) of different organizations, where the authorizations authorize the DCA node device to serve as a DCA representing the CAs (step 1105). The DCA node device then processes context information received from the ad hoc wireless network (step 1110). Next, the DCA node device determines, based on the context information, that a second node device should be enabled as a new trust bridge (step 1115). The DCA node device then performs a trust bridge deployment to enable the second node device to serve as the new trust bridge (step 1120).Type: GrantFiled: April 30, 2008Date of Patent: September 17, 2013Assignee: Motorola Solutions, Inc.Inventors: Liang Guo, Qi Bao, Donald E. Eastlake, III, Whay Chiou Lee, Anthony R. Metke
-
Patent number: 8423761Abstract: A method and device are useful for enabling a trust relationship using an expired public key infrastructure (PKI) certificate. The method includes determining at a relying party a maximum permissible grace period during which the PKI certificate can be conditionally granted a valid status (step 905). Next, at the relying party an uncertainty interval is determined, during which the relying party is unable to detect a revocation of the PKI certificate (step 910). A certificate grace period is then determined at the relying party from a function of the maximum permissible grace period, the uncertainty interval and at least one attribute defined in the PKI certificate (step 915). Using the PKI certificate, a trust relationship is then enabled between the relying party and a certificate holder of the PKI certificate, after determining the grace period and before an expiration of the grace period (step 920).Type: GrantFiled: October 31, 2008Date of Patent: April 16, 2013Assignee: Motorola Solutions, Inc.Inventors: Liang Guo, Whay Chiou Lee, Anthony R. Metke
-
Patent number: 8069216Abstract: A method and apparatus for alerting nodes of a malicious node in a mobile ad-hoc communication system is provided herein. Particularly, a method and apparatus for distributing an alert message to nodes surrounding a recently discovered malicious node is provided. This alert technique further leverages mobility to distribute the alert message to a large majority of nodes in the ad hoc wireless network within a reasonable amount of time.Type: GrantFiled: December 8, 2006Date of Patent: November 29, 2011Assignee: Motorola Solutions, Inc.Inventors: Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee
-
Patent number: 7970430Abstract: In certain embodiments, a method for managing operational parameters of a cognitive radio device to minimize non-compliance with a regulatory policy involves sensing a change in an operational condition that will affect compliance with a current operational policy; estimating a time at which the current operational policy will become invalid; selecting a method for determining how to update the current operational policy; and updating the current operational policy of the cognitive radio device. Other embodiments may incorporate more, fewer or other elements.Type: GrantFiled: December 21, 2006Date of Patent: June 28, 2011Assignee: Motorola Solutions, Inc.Inventors: Charles A. Backof, Jr., Steven D. Bromley, John D. Bruner, Lawrence M. Ecklund, Steven F. Gillig, John K. Grosspietsch, Whay Chiou Lee, Scott E. Preece
-
Patent number: 7860002Abstract: A method for priority-based admission control in a network, comprises receiving an admission request for transmitting an information flow to a network through a communication channel and determining an admissible region within a range of a channel data rate of a communication channel for an information flow in response to a priority of the information flow, where the priority of the information flow is one of a plurality of priorities of information flow. The admissible region is one of a plurality of admissible regions within the channel data rate range that correspond to different ones of the plurality of priorities of information flow, respectively, and each of the plurality of admissible regions within the channel data rate range is useable for transmitting information flow with a respective one of the plurality of priorities.Type: GrantFiled: July 15, 2008Date of Patent: December 28, 2010Assignee: Motorola, Inc.Inventors: Whay Chiou Lee, John R. Barr, Stephen P. Emeott, Ravishankar Ramamirtham, S. David Silk
-
Publication number: 20100250922Abstract: A method and system enable robust and scalable propagation of trust between a first organization and a second organization, both operating in an ad hoc wireless communication network. The method includes establishing at a first member node of the first organization pair-wise trust with a first member node of the second organization using a predetermined inter-organizational trust establishment device (step 505). Next, the first member node of the first organization generates a credential for the second organization using the pair-wise trust (step 510). The credential is then distributed from the first member node of the first organization to a second member node of the first organization (step 515). The second member node of the first organization then establishes pair-wise trust with a second member node of the second organization using the credential received from the first member node of the first organization (step 520).Type: ApplicationFiled: March 31, 2009Publication date: September 30, 2010Applicant: Motorola, Inc.Inventors: Qi Bao, Donald E. Eastlake, III, Liang Guo, Whay Chiou Lee
-
Patent number: 7797263Abstract: In certain embodiments of a cognitive radio, a method of establishing operational policies, involves determining that a new policy decision should be made; requesting a policy decision from an authority having more computing power than the cognitive radio; receiving the policy decision from the authority; and implementing the policy decision in the cognitive radio. Other embodiments may incorporate more, fewer or other elements.Type: GrantFiled: December 21, 2006Date of Patent: September 14, 2010Assignee: Motorola, Inc.Inventors: Charles A. Backof, Jr., Steven D. Bromley, John D. Bruner, Lawrence M. Ecklund, Steven F. Gillig, John K. Grosspietsch, Whay Chiou Lee, Scott E. Preece
-
Patent number: 7788387Abstract: A system (100) and method (300) for mesh/ad hoc participation is provided. The method can include providing (310) an incentive to a user operating a device in an ad hoc network and determining (320) network resources associated with providing the incentive. The method can establish a credit system for devices within the ad hoc network, evaluate a supply and demand for the network resources, and allocate credits to the devices for forwarding packets in the ad hoc network. The method can determine a delivery capacity for the devices and negotiate an optimal packet route through the devices in the ad hoc network based on the supply and demand.Type: GrantFiled: August 11, 2006Date of Patent: August 31, 2010Assignee: Motorola, Inc.Inventors: Surender Kumar, Mark A. Birchler, Randy L. Ekl, Thomas C. Hill, Michael D. Kotzin, Whay Chiou Lee, Peggy K. Matson, Peter J. Stanforth
-
Publication number: 20100115267Abstract: A method and device are useful for enabling a trust relationship using an expired public key infrastructure (PKI) certificate. The method includes determining at a relying party a maximum permissible grace period during which the PKI certificate can be conditionally granted a valid status (step 905). Next, at the relying party an uncertainty interval is determined, during which the relying party is unable to detect a revocation of the PKI certificate (step 910). A certificate grace period is then determined at the relying party from a function of the maximum permissible grace period, the uncertainty interval and at least one attribute defined in the PKI certificate (step 915). Using the PKI certificate, a trust relationship is then enabled between the relying party and a certificate holder of the PKI certificate, after determining the grace period and before an expiration of the grace period (step 920).Type: ApplicationFiled: October 31, 2008Publication date: May 6, 2010Applicant: MOTOROLA, INC.Inventors: Liang Guo, Whay Chiou Lee, Anthony R. Metke
-
Publication number: 20100115266Abstract: A method and device are useful for enabling a trust relationship using an unexpired public key infrastructure (PKI) certificate, where a current status of the PKI certificate is unavailable. The method includes determining at a relying party that a certificate status update for the PKI certificate is unavailable (step 905). Next, in response to the certificate status update being unavailable, a tolerable certificate status age (TCSA) for the PKI certificate is determined at the relying party based on one or more attributes associated with a certificate holder of the PKI certificate (step 910). Using the PKI certificate, a trust relationship is enabled between the relying party and the certificate holder after determining the TCSA and before an expiration of the TCSA (step 915).Type: ApplicationFiled: October 31, 2008Publication date: May 6, 2010Applicant: MOTOROLA, INC.Inventors: Liang GUO, Whay Chiou Lee, Anthony R. Metke
-
Publication number: 20100014422Abstract: A method for priority-based admission control in a network, comprises receiving an admission request for transmitting an information flow to a network through a communication channel and determining an admissible region within a range of a channel data rate of a communication channel for an information flow in response to a priority of the information flow, where the priority of the information flow is one of a plurality of priorities of information flow. The admissible region is one of a plurality of admissible regions within the channel data rate range that correspond to different ones of the plurality of priorities of information flow, respectively, and each of the plurality of admissible regions within the channel data rate range is useable for transmitting information flow with a respective one of the plurality of priorities.Type: ApplicationFiled: July 15, 2008Publication date: January 21, 2010Applicant: MOTOROLA, INC.Inventors: Whay Chiou Lee, John R. Barr, Stephen P. Emeott, Ravishankar Ramamirtham, S. David Silk
-
Publication number: 20090276841Abstract: A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification authority (DCA) node device authorizations received from of a plurality of certification authorities (CAs) of different organizations, where the authorizations authorize the DCA node device to serve as a DCA representing the CAs (step 1105). The DCA node device then processes context information received from the ad hoc wireless network (step 1110). Next, the DCA node device determines, based on the context information, that a second node device should be enabled as a new trust bridge (step 1115). The DCA node device then performs a trust bridge deployment to enable the second node device to serve as the new trust bridge (step 1120).Type: ApplicationFiled: April 30, 2008Publication date: November 5, 2009Applicant: MOTOROLA, INC.Inventors: Liang Guo, Qi Bao, Donald E. Eastlake, III, Whay Chiou Lee, Anthony R. Metke
-
Patent number: 7593376Abstract: A method and apparatus for electing broadcast relay nodes (520B, H, M) in an ad hoc network (500). Each node (520A-520O) generates an attribute message including associated parameters. Each node (520A-520O) generates a weighted value (WV) based on the parameters. The WV can be included in the attribute message for that node, can provide a metric for ranking that node to be nominated to be a broadcast relay node, can alternatively provide a probability measure for that node to probabilistically elect itself as a broadcast relay node. The broadcast manager node (520C) receives the attribute messages and elects at least one nominated node as a broadcast relay node (520B, H, M) based on the attribute messages. Each node (520A-520O) can also initiate election of an intermediate broadcast relay node if that node fails to receive a test message within a predetermined time.Type: GrantFiled: December 7, 2005Date of Patent: September 22, 2009Assignee: Motorola, Inc.Inventors: Thomas V. D'Amico, Jeffrey D. Bonta, Randy L. Ekl, Avinash Joshi, Michael D. Kotzin, Surender Kumar, Whay Chiou Lee, Peggy K. Matson
-
Publication number: 20080154826Abstract: In certain embodiments of a cognitive radio, a method of establishing operational policies, involves determining that a new policy decision should be made; requesting a policy decision from an authority having more computing power than the cognitive radio; receiving the policy decision from the authority; and implementing the policy decision in the cognitive radio. Other embodiments may incorporate more, fewer or other elements.Type: ApplicationFiled: December 21, 2006Publication date: June 26, 2008Applicant: MOTOROLA, INC.Inventors: Charles A. Backof, Steven D. Bromley, John D. Bruner, Lawrence M. Ecklund, Steven F. Gillig, John K. Grosspietsch, Whay Chiou Lee, Scott E. Preece
-
Publication number: 20080155249Abstract: In certain embodiments, a method for managing operational parameters of a cognitive radio device to minimize non-compliance with a regulatory policy involves sensing a change in an operational condition that will affect compliance with a current operational policy; estimating a time at which the current operational policy will become invalid; selecting a method for determining how to update the current operational policy; and updating the current operational policy of the cognitive radio device. Other embodiments may incorporate more, fewer or other elements.Type: ApplicationFiled: December 21, 2006Publication date: June 26, 2008Applicant: MOTOROLA, INC.Inventors: Charles A. Backof, Steven D. Bromley, John D. Bruner, Lawrence M. Ecklund, Steven F. Gillig, John K. Grosspietsch, Whay Chiou Lee, Scott E. Preece
-
Patent number: 7391785Abstract: A scalable method for efficient dynamic allocation of buffer resources in a store-and-forward device, such that high utilization can be maintained with small average buffer occupancy by providing asymmetric congestion control with opportune random detection. Also provided is tolerance of transient onset of congestion and fairness toward bursty traffic with ready reaction to declines in congestion.Type: GrantFiled: September 2, 2002Date of Patent: June 24, 2008Assignee: Motorola, Inc.Inventors: Chih-Jen Chang, Whay Chiou Lee
-
Publication number: 20080140795Abstract: A method and apparatus for alerting nodes of a malicious node in a mobile ad-hoc communication system is provided herein. Particularly, a method and apparatus for distributing an alert message to nodes surrounding a recently discovered malicious node is provided. This alert technique further leverages mobility to distribute the alert message to a large majority of nodes in the ad hoc wireless network within a reasonable amount of time.Type: ApplicationFiled: December 8, 2006Publication date: June 12, 2008Applicant: MOTOROLA, INC.Inventors: Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee
-
Publication number: 20080130675Abstract: A device (10) and method (20) for integrating data traffic, such as isochronous (ISO) data packets and best-effort (BE) data packets, into a data transmission time frame. The method (20) includes defining a BE transmission interval (BETI) within the data transmission time frame, assigning all or a portion of the BE data packet in the BETI, or fragmenting the BE data packet if the BE data packet is larger than the BETI. The method dynamically fragments the BE data packet into a first fragment, equal in size to the BETI, that is assigned to the BETI, and a second fragment, which is queued. The method assigns BE data packets and fragments in this manner until they have been assigned to the BETI. The device (10) includes a scheduler for assigning BE data packet in the BETI and a fragmenter for fragmenting the BE data packet when larger than the BETI.Type: ApplicationFiled: December 1, 2006Publication date: June 5, 2008Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Ying-Leh Lin, Liang Guo, Whay Chiou Lee
-
Publication number: 20080120264Abstract: A method and apparatus for efficient management of hierarchically administered spectrum resources in a communications network are disclosed.Type: ApplicationFiled: November 20, 2006Publication date: May 22, 2008Applicant: Motorola, Inc.Inventors: Whay Chiou Lee, Charbel Khawand, Kevin L. Kloker, Stephen N. Levine