Patents by Inventor Zhenhua TAN
Zhenhua TAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8756658Abstract: A requester node requesting a service in a peer-to-peer network transmits a request to a service provider node. The request may include a communication history of the requester node identifying other nodes with which the requester node has previously communicated. The service provider node authenticates the requester node based on the communication history. The service provider node may ask other nodes with which the requester node has communicated for evaluation of the requester node. The other nodes may calculate a trust metric of the requester node and provide this metric to the service provider node. The service provider node may use this trust metric in combination with a similarity calculation of the requester node and the service provider node to make a determination whether the requester node is to be authenticated. The service provider node may evaluate the requester node and store the evaluation in its communication history.Type: GrantFiled: June 11, 2010Date of Patent: June 17, 2014Assignee: Northeastern University Technology Transfer CenterInventor: Zhenhua Tan
-
Patent number: 8589684Abstract: A communication device, method and network are provided. The communication method comprises generating a first registration packet including first bio data, sending the first registration packet to a network, generating a content packet having second bio data and content data and sending the content packet to the network. The other communication method comprises receiving a first registration packet including first bio data, storing the first bio data together with a device identification, receiving a content packet including second bio data, extracting the second bio data from the content packet, comparing the first bio data with the second bio data and authorizing communication when the first bio data matches the second bio data.Type: GrantFiled: March 18, 2010Date of Patent: November 19, 2013Assignee: Northeastern University Technology Transfer CenterInventor: Zhenhua Tan
-
Patent number: 8521714Abstract: Technologies are generally described for a peer to peer search routing algorithm and system. In one example, a node in a peer to peer network includes a processor. In some examples, the processor may be configured to receive information regarding a topology of the peer to peer network and generate a first search routing algorithm for the peer to peer network based on the topology. In some examples, the processor may be configured to generate a second search routing algorithm for the peer to peer network based on a search characteristic and the topology. In some examples, the second search routing algorithm is distinct from the first search routing algorithm. In some examples, the processor may be configured to receive a request to search the peer to peer network. In some examples, the processor may be configured to search the peer to peer network using the second search routing algorithm.Type: GrantFiled: August 25, 2010Date of Patent: August 27, 2013Assignee: Northeastern University Technology Transfer CenterInventor: Zhenhua Tan
-
Publication number: 20120130985Abstract: Technologies are generally described for a peer to peer search routing algorithm and system. In one example, a node in a peer to peer network includes a processor. In some examples, the processor may be configured to receive information regarding a topology of the peer to peer network and generate a first search routing algorithm for the peer to peer network based on the topology. In some examples, the processor may be configured to generate a second search routing algorithm for the peer to peer network based on a search characteristic and the topology. In some examples, the second search routing algorithm is distinct from the first search routing algorithm. In some examples, the processor may be configured to receive a request to search the peer to peer network. In some examples, the processor may be configured to search the peer to peer network using the second search routing algorithm.Type: ApplicationFiled: August 25, 2010Publication date: May 24, 2012Applicant: NORTHEASTERN UNIVERSITY TECHNOLOGY TRANSFER CENTERInventor: Zhenhua Tan
-
Publication number: 20110277014Abstract: A requester node requesting a service in a peer-to-peer network transmits a request to a service provider node. The request may include a communication history of the requester node identifying other nodes with which the requester node has previously communicated. The service provider node authenticates the requester node based on the communication history. The service provider node may ask other nodes with which the requester node has communicated for evaluation of the requester node. The other nodes may calculate a trust metric of the requester node and provide this metric to the service provider node. The service provider node may use this trust metric in combination with a similarity calculation of the requester node and the service provider node to make a determination whether the requester node is to be authenticated. The service provider node may evaluate the requester node and store the evaluation in its communication history.Type: ApplicationFiled: June 11, 2010Publication date: November 10, 2011Applicant: NORTHEASTERN UNIVERSITY TECHNOLOGY TRANSFER CENTERInventor: Zhenhua TAN
-
Publication number: 20100241856Abstract: A communication device, method and network are provided. The communication method comprises generating a first registration packet including first bio data, sending the first registration packet to a network, generating a content packet having second bio data and content data and sending the content packet to the network. The other communication method comprises receiving a first registration packet including first bio data, storing the first bio data together with a device identification, receiving a content packet including second bio data, extracting the second bio data from the content packet, comparing the first bio data with the second bio data and authorizing communication when the first bio data matches the second bio data.Type: ApplicationFiled: March 18, 2010Publication date: September 23, 2010Applicant: NORTHEASTERN UNIVERSITY TECHNOLOGY TRANSFER CENTERInventor: Zhenhua TAN