Patents by Inventor Wilson Chuen Yew Yeung

Wilson Chuen Yew Yeung has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10609562
    Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
    Type: Grant
    Filed: April 10, 2018
    Date of Patent: March 31, 2020
    Assignee: ITRON NETWORKED SOLUTIONS, INC.
    Inventors: Raj Vaswani, Wilson Chuen Yew Yeung, Cristina Seibert, Nelson Bruce Bolyard, Benjamin N. Damm, Michael C. Stjohns
  • Patent number: 10455420
    Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
    Type: Grant
    Filed: May 2, 2016
    Date of Patent: October 22, 2019
    Assignee: ITRON NETWORKED SOLUTIONS, INC.
    Inventors: Raj Vaswani, Wilson Chuen Yew Yeung, Cristina Seibert, Nelson Bruce Bolyard, Benjamin N. Damm, Michael C. StJohns
  • Publication number: 20180234850
    Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
    Type: Application
    Filed: April 10, 2018
    Publication date: August 16, 2018
    Applicant: Itron Networked Solutions, Inc.
    Inventors: Raj VASWANI, Wilson Chuen Yew YEUNG, Cristina SEIBERT, Nelson Bruce BOYLARD, Benjamin N. DAMM, Michael C. STJOHNS
  • Patent number: 9961550
    Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
    Type: Grant
    Filed: November 4, 2010
    Date of Patent: May 1, 2018
    Assignee: ITRON NETWORKED SOLUTIONS, INC.
    Inventors: Raj Vaswani, Wilson Chuen Yew Yeung, Cristina Seibert, Nelson Bruce Bolyard, Benjamin N. Damm, Michael C. StJohns
  • Publication number: 20160249220
    Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
    Type: Application
    Filed: May 2, 2016
    Publication date: August 25, 2016
    Applicant: Silver Spring Networks, Inc.
    Inventors: Raj VASWANI, Wilson Chuen Yew YEUNG, Cristina SEIBERT, Nelson Bruce BOLYARD, Benjamin N. DAMM, Michael C. STJOHNS
  • Patent number: 8605609
    Abstract: A method is provided for simulation of multiple network nodes in an internetwork. A range of a plurality of network addresses are assigned to a simulation node. The simulation node monitors network communications to listen for packets. Upon receipt of a packet having a destination address within the assigned range, a command is forwarded to an end-use application, such as firmware. The end-use application processes the command and returns a result. A response packet having the result is transmitted to the back office server with the destination address of the received packet as the source of the response packet.
    Type: Grant
    Filed: March 11, 2010
    Date of Patent: December 10, 2013
    Assignee: Silver Spring Networks, Inc.
    Inventors: Brian Matsuo, Wilson Chuen Yew Yeung, Daniel McKernan
  • Patent number: 8406133
    Abstract: Systems and methods of optimizing packet flow in a network are disclosed. An internetwork includes plural networks, each network having plural non-router nodes and at least one router node. The non-router nodes of a first network can be configured to perform congestion control. The non-router node establishes a packet rate value for a packet queue associated with a second network of the internetwork. A total number of packets not greater than the packet rate value are removed from the packet queue. The removed packets are sent to a node in the second network.
    Type: Grant
    Filed: February 24, 2009
    Date of Patent: March 26, 2013
    Assignee: Silver Spring Networks, Inc.
    Inventors: Wilson Chuen Yew Yeung, Brian Matsuo, Sterling Hughes
  • Publication number: 20120116602
    Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
    Type: Application
    Filed: November 4, 2010
    Publication date: May 10, 2012
    Applicant: Silver Spring Networks, Inc.
    Inventors: Raj VASWANI, Wilson Chuen Yew Yeung, Cristina Seibert, Nelson Bruce Bolyard, Benjamin N. Damm, Michael C. StJohns
  • Publication number: 20110222407
    Abstract: A method is provided for simulation of multiple network nodes in an internetwork. A range of a plurality of network addresses are assigned to a simulation node. The simulation node monitors network communications to listen for packets. Upon receipt of a packet having a destination address within the assigned range, a command is forwarded to an end-use application, such as firmware. The end-use application processes the command and returns a result. A response packet having the result is transmitted to the back office server with the destination address of the received packet as the source of the response packet.
    Type: Application
    Filed: March 11, 2010
    Publication date: September 15, 2011
    Applicant: SILVER SPRING NETWORKS, INC.
    Inventors: Brian Matsuo, Wilson Chuen Yew Yeung, Daniel McKernan
  • Patent number: 7961613
    Abstract: Systems and methods of optimizing packet flow in a network are disclosed. An internetwork includes plural networks, each network having plural non-router nodes and at least one router node. The non-router node of a first network can be configured to perform congestion control. The non-router node sends a request packet to a node in a second network. The value of a packet-in-flight counter associated with the network is adjusted when the request packet is sent to the second network node and when a response packet is received from the second network node. The non-router node determines whether another request packet can be sent to another network in the internetwork based on a value of the packet-in-flight counter.
    Type: Grant
    Filed: February 5, 2009
    Date of Patent: June 14, 2011
    Assignee: Silver Spring Networks, Inc.
    Inventors: Wilson Chuen Yew Yeung, Brian Matsuo
  • Publication number: 20100214922
    Abstract: Systems and methods of optimizing packet flow in a network are disclosed. An internetwork includes plural networks, each network having plural non-router nodes and at least one router node. The non-router nodes of a first network can be configured to perform congestion control. The non-router node establishes a packet rate value for a packet queue associated with a second network of the internetwork. A total number of packets not greater than the packet rate value are removed from the packet queue. The removed packets are sent to a node in the second network.
    Type: Application
    Filed: February 24, 2009
    Publication date: August 26, 2010
    Applicant: Silver Spring Networks, Inc.
    Inventors: Wilson Chuen Yew Yeung, Brian Matsuo, Sterling Hughes
  • Publication number: 20100195495
    Abstract: Systems and methods of optimizing packet flow in a network are disclosed. An internetwork includes plural networks, each network having plural non-router nodes and at least one router node. The non-router node of a first network can be configured to perform congestion control. The non-router node sends a request packet to a node in a second network. The value of a packet-in-flight counter associated with the network is adjusted when the request packet is sent to the second network node and when a response packet is received from the second network node. The non-router node determines whether another request packet can be sent to another network in the internetwork based on a value of the packet-in-flight counter.
    Type: Application
    Filed: February 5, 2009
    Publication date: August 5, 2010
    Applicant: Silver Spring Networks
    Inventors: Wilson Chuen Yew Yeung, Brian Matsuo