Patents by Inventor Xiaowei Zhang

Xiaowei Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9750066
    Abstract: A method for providing device connectivity to a radio access network, wherein at least two devices are connectable or connected to the radio access network and wherein the at least two devices are members of a group of devices within a wireless local network, the members of the group of devices having the capability to establish a direct connection with other members of the group of devices, includes providing connection information used for a connection between a first device of the at least two devices and the radio access network to a second device of the at least two devices. The connection information enables the second device to connect to the radio access network.
    Type: Grant
    Filed: April 10, 2014
    Date of Patent: August 29, 2017
    Assignee: NEC CORPORATION
    Inventors: Mohammad Istiak Hossain, Andreas Kunz, Konstantinos Samdanis, Xiaowei Zhang
  • Publication number: 20170245181
    Abstract: Upon requesting an MME (40) to handover a UE (10) to a Target MeNB (20_2), a Source MeNB (20_1) sends, to the Target MeNB (20_2) through the MME (40), information on one or more SeNBs that are candidates available for dual connectivity under control of the Target MeNB (20_2). The Target MeNB (20_2) configures a Target SeNB (30_2) that is selected based on the information to provide the dual connectivity. Alternatively, the Source MeNB (20_1) sends, to the Target MeNB (20_2), information on a Source SeNB (30_1) that has been used by the Source MeNB (20_1) for the dual connectivity. In this case, the Target MeNB (20_2) skips RRC configuration for the Source SeNB (30_1) upon the control.
    Type: Application
    Filed: September 16, 2015
    Publication date: August 24, 2017
    Applicant: NEC Corporation
    Inventors: Xiaowei ZHANG, Andreas KUNZ, Anand Raghawa PRASAD
  • Publication number: 20170239836
    Abstract: The present invention relates to furniture panels, and more particularly, to a method for preparing functional engineered wood. It includes the following steps: make veneer blanks by rotary cutting or splicing, and cut the veneer blanks into desired dimensions to obtain veneers A. Soak the veneers A in a ternary mixed solution of a biomass nanocellulose solubilizer, a fire retardant and an acid dye for toughening, fire retardation and dyeing to obtain veneers B. Add a formaldehyde decomposing powder into a modified MUF adhesive, mix them up, coat the veneers B with the mixture to obtain veneers C. Assemble and cold-press the veneers C to obtain flitches D, and saw the flitches D into desired patterns and dimensions to obtain finished products.
    Type: Application
    Filed: February 24, 2016
    Publication date: August 24, 2017
    Inventors: Xianxu Zhan, Yan Zhuo, Yong Yang, Guoqing Peng, Jinxiang Shen, Xiaowei Zhang, Yuanqiang Liu, Xuqin Xie, Mingjuan Cheng
  • Publication number: 20170201937
    Abstract: In order for more effectively supporting a Dedicated Core Network, there is provided a network system including a first node (30) that establishes secure connection with a UE (10) initially attempting to attach to a network, through a radio base station (20), and a second node (40) to which the UE (10) is redirected from the first node (30) through the radio base station (20). Upon the redirection, the first node (30) sends information on the first node (30) itself to the second node (40) through the radio base station (20). The second node (40) uses the information to retrieve security context necessary for establishing the connection with the UE (10) from the first node (30).
    Type: Application
    Filed: May 26, 2015
    Publication date: July 13, 2017
    Applicant: NEC Corporation
    Inventors: Xiaowei ZHANG, Toshiyuki TAMURA, Anand Raghawa PRASAD
  • Publication number: 20170195305
    Abstract: Upon receiving a triggering message from a MTC server (20), a network (10) verifies if the MTC server (20) is authorized to trigger a target MTC device (30) and also if the MTC device (30) is authorized to respond the triggering message, by comparing an MTC device ID and MTC server ID (and optionally information on subscription) which are include in the triggering message with authorized ones. Upon succeeding in the verification, the network (10) checks a trigger type included in the triggering message to verify if the triggering message is authorized to be sent to the MTC device (30). Upon succeeding in the check, the network (10) forwards the triggering message to the MTC device (30). The network (10) also validates a response from the MTC device (30), by checking whether the MTC device (30) is allowed to communicate with the addressed MTC server (20).
    Type: Application
    Filed: December 9, 2016
    Publication date: July 6, 2017
    Inventors: Xiaowei ZHANG, Anand Raghawa PRASAD
  • Patent number: 9699491
    Abstract: A method of setting controls on a digital communication device operated by an end user participant in a digital content event provided from a digital communication network includes operating a tracking control in the digital communication network to track activity of the digital communication device in a context of the digital content event; operating a timer in conjunction with the activity to form a time-stamped set of ranking controls; attenuating the time-stamped set of ranking controls according to an elapsed time; applying the time-stamped set of ranking controls and content inputs from a digital content manager to operate a ranking control and digital filter to generate a control interface for the digital communication device, the control interface comprising a plurality of individually operable controls; and configuring the digital communication device with the control interface.
    Type: Grant
    Filed: October 12, 2015
    Date of Patent: July 4, 2017
    Assignee: ThinkAnalytics
    Inventors: Peter Docherty, Ewen Cattanach, Xiaowei Zhang, David Scott, Shahad Ahmed, Alan Ryman, Asim Ullah, Darren Callaghan, Gordon McIntyre
  • Publication number: 20170158901
    Abstract: A cellulose acetate lacquer composition comprises a film forming composition and a diluent. The film forming compositions comprise cellulose acetate, a plasticizer, a secondary film former, and at least one organic solvent. The lacquer compositions may be used in a method of providing a finish or protective cover on at least a portion of a substrate. The method comprises applying the lacquer composition to an inner or exterior surface of the substrate.
    Type: Application
    Filed: December 6, 2016
    Publication date: June 8, 2017
    Inventors: Wendy BISSET, Xiaowei Zhang, Michael Combs
  • Publication number: 20170158881
    Abstract: A cellulose acetate wood filler composition comprises a binder composition and a filler. The binder compositions comprise cellulose acetate, a plasticizer, and at least one organic solvent. The binder compositions may be substantially free, e.g., free of tackifiers. The wood filler compositions may be used in a method of filling a cavity in a substrate. The method comprises applying the wood filler composition to an inner surface of the substrate.
    Type: Application
    Filed: December 6, 2016
    Publication date: June 8, 2017
    Inventors: Wendy BISSET, Xiaowei ZHANG, Michael COMBS
  • Publication number: 20170156055
    Abstract: Upon transmitting privacy information to an MTC server (20) via a network (30, 40), an MTC device (10) includes in a message a field to indicate whether the message contains the privacy information, such that the network (30, 40) can perform authorization for the MTC device (10) and server (20). When the MTC device (10) needs to keep connection with the network (30, 40), the MTC device (10) switches off the functionality of provisioning the privacy information, such that the MTC device (10) still can communicate with the network (30, 40). Upon the transmission of privacy information in an emergency case, the MTC device (10) further includes in the message a content to indicate that the MTC device (10) is an emergency device, such that the network (30, 40) verifies whether the MTC device (10) can be used or activated in the emergency case. Optionally, a USIM for emergency-use is deployed in the MTC device (10).
    Type: Application
    Filed: December 8, 2016
    Publication date: June 1, 2017
    Inventors: Xiaowei ZHANG, Anand Raghawa PRASAD
  • Patent number: 9609597
    Abstract: The method is used in the AP, including: the AP suspending a high-speed bus directly when the terminal enters a standby state; the AP resuming the high-speed bus and inquiring a network connection state of the BP when the terminal is wakened; and if connection, the AP continuing to use a wireless data link, otherwise, the BP re-establishing a wireless data link. The method is used in the BP, including: the BP entering a standby state directly when the BP detects that a high-speed bus is suspended; the BP entering a wakening state after detecting that the high-speed bus is resumed, inquiring and feeding back a network connection state of the BP to the AP after receiving an instruction of inquiring the networking state of the AP; re-establishing a wireless data link or maintaining a wireless data link of a current networking after receiving a networking instruction of the AP.
    Type: Grant
    Filed: June 11, 2012
    Date of Patent: March 28, 2017
    Assignee: ZTE Corporation
    Inventors: Xiaowei Zhang, Gang Tao, Hongli Wang
  • Publication number: 20170085570
    Abstract: A network node (21), which is placed within a core network, receives a message from a transmission source (30) placed outside the core network. The message includes an indicator indicating whether or not the message is addressed to a group of one or more MTC devices attached to the core network. The network node (21) determines to authorize the transmission source (30), when the indicator indicates that the message is addressed to the group. Further, the message includes an ID for identifying whether or not the message is addressed to the group. The MTC device determines to discard the message, when the ID does not coincide with an ID allocated for the MTC device itself. Furthermore, the MTC device communicates with the transmission source (30) by use of a pair of group keys shared therewith.
    Type: Application
    Filed: December 6, 2016
    Publication date: March 23, 2017
    Applicant: NEC Corporation
    Inventors: Xiaowei ZHANG, Anand Raghawa PRASAD
  • Publication number: 20170078832
    Abstract: A network node (21), which is placed within a core network, stores a list of network elements (24) capable of forwarding a trigger message to a MTC device (10). The network node (21) receives the trigger message from a transmission source (30, 40) placed outside the core network, and then selects, based on the list, one of the network elements to forward the trigger message to the MTC device (10). The MTC device (10) validates the received trigger message, and then transmits, when the trigger message is not validated, to the network node (21) a reject message indicating that the trigger message is not accepted by the MTC device (10). Upon receiving the reject message, the network node (21) forwards the trigger message through a different one of the network elements, or forwards the reject message to transmission source (30, 40) to send the trigger message through user plane.
    Type: Application
    Filed: November 23, 2016
    Publication date: March 16, 2017
    Applicant: NEC Corporation
    Inventors: Xiaowei ZHANG, Anand Raghawa PRASAD
  • Publication number: 20170078940
    Abstract: An SeNB informs an MeNB that it can configure bearers for the given UE. At this time, the MeNB manages the DRB status, and then sends a key S-KeNB to the SeNB. The MeNB also sends a KSI for the S-KeNB to both of the UE and the SeNB. After this procedure, the MeNB informs an EPC (MME and S-GW) about the new bearer configured at the SeNB, such that the S-GW 50 can start offloading the bearer(s) to the SeNB 30. Prior to the offloading, the EPC network entity (MME or S-GW) performs verification that: 1) whether the request is coming from authenticated source (MeNB); and 2) whether the SeNB is a valid eNB to which the traffic can be offload.
    Type: Application
    Filed: March 5, 2015
    Publication date: March 16, 2017
    Applicant: NEC CORPORATION
    Inventors: Xiaowei ZHANG, Anand Raghawa PRASAD
  • Publication number: 20170026482
    Abstract: In order for efficiently managing communications between a UE (10) and multiple SCSs (20_1-20_n), the UE (10) includes, in one message, multiple pieces of data to be transmitted to the SCSs (20_1-20_n), and sends the message to an MTC-IWF (30). The MTC-IWF (30) receives the message from the UE (10), and distributes the date to the SCSs (20_1-20_n). Each of the SCSs sends (20_1-20_n), to the MTC-IWF (30), data to be transmitted to the UE (10) and an indicator that indicates for the SCSs (20_1-20_n) the time tolerance until the data is transmitted to the UE (10). The MTC-IWF (30) receives the data and the indicators from the SCSs (20_1-20_n), and determines when to forward the data to the UE (10) based on the indicators.
    Type: Application
    Filed: September 4, 2014
    Publication date: January 26, 2017
    Applicant: NEC Corporation
    Inventors: Xiaowei ZHANG, Anand Raghawa PRASAD
  • Publication number: 20170019821
    Abstract: A UE (10) provides information on potential S?eNB(s). The information is forwarded from an MeNB (20_1) to an M?eNB (20_2) such that the M?eNB (20_2) can determine, before the handover happens, whether the M?eNB (20_2) will configure a new SeNB (S?eNB) and which S?eNB the M?eNB (20_2) will configure. In one of options, the MeNB (20_1) derives a key S?-KeNB for communication protection between the UE (10) and the S?eNB (30_1), and send the S?-KeNB to the M?eNB (20_2). In another option, the M?eNB (20_2) derives the S?-KeNB from a key KeNB* received from the MeNB (20_1). The M?eNB (20_2) sends the S?-KeNB to the S?eNB (30_1). Moreover, there are also provided several variations to perform SeNB Release, SeNB Addition, Bearer Modification and the like, in which the order and/or timing thereof can be different during the handover procedure.
    Type: Application
    Filed: March 3, 2015
    Publication date: January 19, 2017
    Applicant: NEC CORPORATION
    Inventors: Xiaowei ZHANG, Anand Raghawa PRASAD
  • Patent number: 9549320
    Abstract: Upon receiving a triggering message from a MTC server (20), a network (10) verifies if the MTC server (20) is authorized to trigger a target MTC device (30) and also if the MTC device (30) is authorized to respond the triggering message, by comparing an MTC device ID and MTC server ID (and optionally information on subscription) which are include in the triggering message with authorized ones. Upon succeeding in the verification, the network (10) checks a trigger type included in the triggering message to verify if the triggering message is authorized to be sent to the MTC device (30). Upon succeeding in the check, the network (10) forwards the triggering message to the MTC device (30). The network (10) also validates a response from the MTC device (30), by checking whether the MTC device (30) is allowed to communicate with the addressed MTC server (20).
    Type: Grant
    Filed: October 29, 2012
    Date of Patent: January 17, 2017
    Assignee: NEC Corporation
    Inventors: Xiaowei Zhang, Anand Raghawa Prasad
  • Publication number: 20160381543
    Abstract: A method of performing a secure discovery of devices in ProSe communication by a requesting device (21) and the receiving device (22), including requesting a ProSe service request to a ProSe server (24) from the requesting device, performing verification on the requesting and receiving devices by the ProSe server, performing a discovery procedure by the ProSe server to obtain location information of the receiving device, and sending a ProSe service result to the requesting device. The performing discovery procedure includes sending the ProSe service request to a receiving device, performing source verification to see if the request is from an authorized ProSe server and checking discovery criteria to see whether the discovery criteria should have the requested service by the receiving device, and sending a accept message to the ProSe server, if the performing source verification and the checking discovery criteria are successful.
    Type: Application
    Filed: June 13, 2014
    Publication date: December 29, 2016
    Applicant: NEC Corporation
    Inventors: Xiaowei ZHANG, Anand Raghawa PRASAD
  • Publication number: 20160330617
    Abstract: In order for supporting separate ciphering at an MeNB (20) and an SeNB (30), the MeNB (20) derives separate first and second keys (KUPenc-M, KUPenc-S) from a third key (KeNB). The first key (KUPenc-M) is used for confidentially protecting first traffic transmitted over U-Plane between the MeNB (20) and a UE (10). The first key (KUPenc-M) may be the same as current KUPenc or a new key. The second key (KUPenc-S) is used for confidentially protecting second traffic transmitted over the U-Plane between the UE (10) and the SeNB (30). The MeNB (20) sends the second key (KUPenc-S) to the SeNB (30). The UE (10) negotiates with the MeNB (20), and derives the second key (KUPenc-S) based on a result of the negotiation.
    Type: Application
    Filed: November 20, 2014
    Publication date: November 10, 2016
    Inventors: Xiaowei ZHANG, Anand PRASAD
  • Publication number: 20160315938
    Abstract: There is provided a solution as to how the authentication and thus the authorization of the webRTC IMS Client can be achieved in the IMS of the mobile network operator. The WIC (20) is using an ID to register with IMS, which may be an IMPU, an IMPI, gGRUU etc. The WIC (20) may be preconfigured by the WWSF (30) with the eP-CSCF (40) address and authentication information, but if not, then this information should be retrieved via the WWSF (30) or from the IMS directly or via other device management procedures e.g. OMA DM. It is further assumed that the subscriber has already a valid webRTC account/membership and this can be validated, authenticated and authorized by the WWSF (30).
    Type: Application
    Filed: December 18, 2014
    Publication date: October 27, 2016
    Inventors: Andreas KUNZ, Xiaowei ZHANG, Anand Raghawa PRASAD
  • Publication number: 20160277418
    Abstract: In order for effectively managing security of ProSe (Proximity based Services) communication, a server forming a communication system monitors locations of a plurality of UEs that are grouped to conduct direct communication with each other. The server manages security of the direct communication based on the locations.
    Type: Application
    Filed: August 27, 2014
    Publication date: September 22, 2016
    Inventors: Xiaowei ZHANG, Anand Raghawa PRASAD