Patents by Inventor Wilson Chuen Yew Yeung
Wilson Chuen Yew Yeung has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10609562Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.Type: GrantFiled: April 10, 2018Date of Patent: March 31, 2020Assignee: ITRON NETWORKED SOLUTIONS, INC.Inventors: Raj Vaswani, Wilson Chuen Yew Yeung, Cristina Seibert, Nelson Bruce Bolyard, Benjamin N. Damm, Michael C. Stjohns
-
Patent number: 10455420Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.Type: GrantFiled: May 2, 2016Date of Patent: October 22, 2019Assignee: ITRON NETWORKED SOLUTIONS, INC.Inventors: Raj Vaswani, Wilson Chuen Yew Yeung, Cristina Seibert, Nelson Bruce Bolyard, Benjamin N. Damm, Michael C. StJohns
-
Publication number: 20180234850Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.Type: ApplicationFiled: April 10, 2018Publication date: August 16, 2018Applicant: Itron Networked Solutions, Inc.Inventors: Raj VASWANI, Wilson Chuen Yew YEUNG, Cristina SEIBERT, Nelson Bruce BOYLARD, Benjamin N. DAMM, Michael C. STJOHNS
-
Patent number: 9961550Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.Type: GrantFiled: November 4, 2010Date of Patent: May 1, 2018Assignee: ITRON NETWORKED SOLUTIONS, INC.Inventors: Raj Vaswani, Wilson Chuen Yew Yeung, Cristina Seibert, Nelson Bruce Bolyard, Benjamin N. Damm, Michael C. StJohns
-
Publication number: 20160249220Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.Type: ApplicationFiled: May 2, 2016Publication date: August 25, 2016Applicant: Silver Spring Networks, Inc.Inventors: Raj VASWANI, Wilson Chuen Yew YEUNG, Cristina SEIBERT, Nelson Bruce BOLYARD, Benjamin N. DAMM, Michael C. STJOHNS
-
Patent number: 8605609Abstract: A method is provided for simulation of multiple network nodes in an internetwork. A range of a plurality of network addresses are assigned to a simulation node. The simulation node monitors network communications to listen for packets. Upon receipt of a packet having a destination address within the assigned range, a command is forwarded to an end-use application, such as firmware. The end-use application processes the command and returns a result. A response packet having the result is transmitted to the back office server with the destination address of the received packet as the source of the response packet.Type: GrantFiled: March 11, 2010Date of Patent: December 10, 2013Assignee: Silver Spring Networks, Inc.Inventors: Brian Matsuo, Wilson Chuen Yew Yeung, Daniel McKernan
-
Patent number: 8406133Abstract: Systems and methods of optimizing packet flow in a network are disclosed. An internetwork includes plural networks, each network having plural non-router nodes and at least one router node. The non-router nodes of a first network can be configured to perform congestion control. The non-router node establishes a packet rate value for a packet queue associated with a second network of the internetwork. A total number of packets not greater than the packet rate value are removed from the packet queue. The removed packets are sent to a node in the second network.Type: GrantFiled: February 24, 2009Date of Patent: March 26, 2013Assignee: Silver Spring Networks, Inc.Inventors: Wilson Chuen Yew Yeung, Brian Matsuo, Sterling Hughes
-
Publication number: 20120116602Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.Type: ApplicationFiled: November 4, 2010Publication date: May 10, 2012Applicant: Silver Spring Networks, Inc.Inventors: Raj VASWANI, Wilson Chuen Yew Yeung, Cristina Seibert, Nelson Bruce Bolyard, Benjamin N. Damm, Michael C. StJohns
-
Publication number: 20110222407Abstract: A method is provided for simulation of multiple network nodes in an internetwork. A range of a plurality of network addresses are assigned to a simulation node. The simulation node monitors network communications to listen for packets. Upon receipt of a packet having a destination address within the assigned range, a command is forwarded to an end-use application, such as firmware. The end-use application processes the command and returns a result. A response packet having the result is transmitted to the back office server with the destination address of the received packet as the source of the response packet.Type: ApplicationFiled: March 11, 2010Publication date: September 15, 2011Applicant: SILVER SPRING NETWORKS, INC.Inventors: Brian Matsuo, Wilson Chuen Yew Yeung, Daniel McKernan
-
Patent number: 7961613Abstract: Systems and methods of optimizing packet flow in a network are disclosed. An internetwork includes plural networks, each network having plural non-router nodes and at least one router node. The non-router node of a first network can be configured to perform congestion control. The non-router node sends a request packet to a node in a second network. The value of a packet-in-flight counter associated with the network is adjusted when the request packet is sent to the second network node and when a response packet is received from the second network node. The non-router node determines whether another request packet can be sent to another network in the internetwork based on a value of the packet-in-flight counter.Type: GrantFiled: February 5, 2009Date of Patent: June 14, 2011Assignee: Silver Spring Networks, Inc.Inventors: Wilson Chuen Yew Yeung, Brian Matsuo
-
Publication number: 20100214922Abstract: Systems and methods of optimizing packet flow in a network are disclosed. An internetwork includes plural networks, each network having plural non-router nodes and at least one router node. The non-router nodes of a first network can be configured to perform congestion control. The non-router node establishes a packet rate value for a packet queue associated with a second network of the internetwork. A total number of packets not greater than the packet rate value are removed from the packet queue. The removed packets are sent to a node in the second network.Type: ApplicationFiled: February 24, 2009Publication date: August 26, 2010Applicant: Silver Spring Networks, Inc.Inventors: Wilson Chuen Yew Yeung, Brian Matsuo, Sterling Hughes
-
Publication number: 20100195495Abstract: Systems and methods of optimizing packet flow in a network are disclosed. An internetwork includes plural networks, each network having plural non-router nodes and at least one router node. The non-router node of a first network can be configured to perform congestion control. The non-router node sends a request packet to a node in a second network. The value of a packet-in-flight counter associated with the network is adjusted when the request packet is sent to the second network node and when a response packet is received from the second network node. The non-router node determines whether another request packet can be sent to another network in the internetwork based on a value of the packet-in-flight counter.Type: ApplicationFiled: February 5, 2009Publication date: August 5, 2010Applicant: Silver Spring NetworksInventors: Wilson Chuen Yew Yeung, Brian Matsuo