TOSHIBA AMERICA RESEARCH, INC. Patent applications |
Patent application number | Title | Published |
20140380470 | SECURE AND SEAMLESS WAN-LAN ROAMING - Systems and methods are described for secure and seamless roaming between internal and external networks. Double and triple tunnels may be used to connect a mobile node to a correspondent host. A mobile node may include the ability to connect to two networks simultaneously to enable seamless roaming between networks. | 12-25-2014 |
20120287904 | SECURE AND SEAMLESS WAN-LAN ROAMING - Systems and methods are described for secure and seamless roaming between internal and external networks. Double and triple tunnels may be used to connect a mobile node to a correspondent host. A mobile node may include the ability to connect to two networks simultaneously to enable seamless roaming between networks. | 11-15-2012 |
20120165009 | PRIORITIZED QUERY - A solution framework is employed that includes defining of a mechanism to run multiple queries in a single message exchange, along with a priority on a per-query basis. In some embodiments, a system for facilitating handover of a mobile device across heterogeneous access networks by ensuring response to queries transmitted by the mobile device includes: a) a mobile device having a plurality of wireless network interfaces for communicating over a plurality of heterogeneous access networks, having a media independent handover (MIH) entity to facilitate handovers between the heterogeneous networks, and configured to transmit queries related to handover operation between the heterogeneous access networks to MIH entities within said heterogeneous access networks; and b) said media independent handover entity of said mobile device being configured to transmit multiple queries in a single message exchange to an MIH entity in an access network with prioritization among said multiple queries. | 06-28-2012 |
20120096520 | Key Cashing, QoS and Multicast Extensions to Media-Independent Pre-Authentication - This present application relates to, among other things, Key Caching, QoS and Multicast extensions and improvements to the Media-independent Pre-Authentication (MPA) framework, a new handover optimization mechanism that has a potential to address issues on existing mobility management protocols and mobility optimization mechanisms. MPA is a mobile assisted, secure handover optimization scheme that works over any link-layer and with any mobility management protocol. | 04-19-2012 |
20110243147 | ROUTER DESIGN FOR 3D NETWORK-ON-CHIP - A network-on-chip router which includes an input buffer, an input controller connected to said input buffer, an arbiter connected to said input controller, a crossbar connected to said arbiter and said input buffer, and an output buffer connected to said crossbar. The network-on-chip router minimizes propagation time of data through the router by ensuring that the propagation delay of data through an input buffer is less than the combined propagation delay of data through an input controller and arbiter. | 10-06-2011 |
20110085463 | REAL-TIME COMPARISON OF QUALITY OF INTERFACES - In some embodiments, a system and method for substantially real-time comparison of quality of interfaces by mobile devices over heterogeneous networks is disclosed. The method can be performed using a dynamic and rapid comparison by distributed hosts, using a minimal number of injected network packets, using minimal path quality metrics, which path quality metrics are independent of how a Qol is measured, and in a manner suitable for both wireline and wireless networks. | 04-14-2011 |
20110083168 | Framework of Media-Independent Pre-Authentication - This application describes, among other things, a framework of Media-independent Pre-Authentication (MPA), a new handover optimization mechanism that has a potential to address issues on existing mobility management protocols and mobility optimization mechanisms. MPA is a mobile-assisted, secure handover optimization scheme that works over any link-layer and with any mobility management protocol. This application also shows, among other things, an initial implementation of MPA in our testbed and some performance results to show how existing protocols could be leveraged to realize the functionalities of MPA. | 04-07-2011 |
20110063905 | MULTI-VALUED ROM USING CARBON-NANOTUBE AND NANOWIRE FET - A multivalued memory device which includes a first multivalued memory transistor and a second multivalued memory transistor, wherein each transistor has a channel made from at least one carbon nanotube or nanowire, wherein data is stored by varying the number of carbon nanotubes or nanowires used in the channel, wherein the channel is the at least one carbon nanotube or nanowire which allows current to flow through it. | 03-17-2011 |
20100244892 | ROM IMPLEMENTATION FOR ROM BASED LOGIC DESIGN - A logic device implementing configurations for ROM based logic uses arrays of memory cells to provide outputs based on inputs received at the logic device. The logic device stores values in the memory cells that are accessed when an input is received. The memory cells are transistors that provide values of ‘1’ or ‘0.’ Various configurations reduce the number of transistors while implementing the memory block by utilizing a single bitline or a dynamic precharge implementation. | 09-30-2010 |
20100211430 | MONITORING OF VEHICLE CONDITIONS UTILIZING CELLULAR BROADCASTS - This document describes, among other things, a systems and methods for monitoring vehicle conditions via cellular networks. | 08-19-2010 |
20100208613 | EFFICIENT AND LOSS TOLERANT METHOD AND MECHANISM FOR MEASURING AVAILABLE BANDWIDTH - A single burst method is used to determine the available bandwidth in a network environment. A sending node transmits test packets to a receiving node. The size of the test packets is dynamically determining based on network parameters within the network environment. The sending node then receives test receipt packets that have the same sequence numbers as the corresponding test packets. Packet clusters are formed from the test receipt packets. The available bandwidth is determined based on the packet clusters along with values set by the single burst method or inputted by a user. | 08-19-2010 |
20100189078 | SEAMLESS MOBILITY FOR A MULTIPLE INTERFACE DEVICE IN A CO-LOCATED WIRELESS ENVIRONMENT - Data packets are transmitted from a first access network to a first interface of a multiple interface device (MID), and identical data packets are transmitted concurrently from a second access network to a second interface of the MID. Some of the data packets that are transmitted to the MID from the first access network are not received by the first interface. The MID inspects identifiers of data packets from the first and second interfaces in order to send to the application a stream including all of the data packets. For example, the MID sends to the application the data packets from the first interface, buffers the data packets from the second interface, and sends data packets from the buffer to the application upon detecting that data packets in the buffer were transmitted to the first interface but not received by the first interface. | 07-29-2010 |
20100142465 | CHANNEL PARTITIONING FOR WIRELESS LOCAL AREA NETWORKS - The present application discloses, inter alia, a system for improving the aggregate throughput of a wireless local area network which includes: at least one access point that is equipped with at least one transceiver configured to simultaneously transmit and receive at multiple frequencies using multiple channels; and the access point being configured to acquire channel conditions of users and to pool sets of users on the channels based on the channel conditions. | 06-10-2010 |
20100115083 | NETWORK SELECTION MECHANISM - A terminal device includes multiple interfaces having links to various networks. When a trigger event occurs, the terminal device selects a target link to a network to transition from its current link. A candidate link selection function determines candidate links that are filtered to remove links not meeting connectivity criteria. A target link selection function is then executed to select a target link from the filtered candidate links. Thus, the target link selection function is not run for every possible link, but only those meeting the criteria. | 05-06-2010 |
20100110921 | PRE-EVALUATION OF MULTIPLE NETWORK ACCESS POINTS - The present application describes, inter alia, novel techniques to perform pre-evaluations of multiple Wi-Fi Access Points (AP) and Access Networks (AN). A pre-evaluation determines whether or not an AP is connected to the Internet and measures the path performance that the AN, via that particular AP, can offer between the mobile device and a pre-specified Internet host. In addition, the invention also discloses methods to determine whether the AN requires a user to actively authenticate themselves through a redirect log-on page. | 05-06-2010 |
20100097956 | MULTI-INTERFACE MANAGEMENT CONFIGURATION METHOD AND GRAPHICAL USER INTERFACE FOR CONNECTION MANAGER - A terminal device includes interfaces that establish links to networks. The networks can be wired, wireless, and the like. The terminal device includes a connection manager that manages the network connections based on configured parameters. Based on the configuration parameters it may compare network performance of different links in the device and it may switch or connect to a link having the best connectivity. Parameters are set to configure the connection manager and how it operates. The parameters can be set via a graphical user interface by the user or alternatively by the operator administrator. | 04-22-2010 |
20100097837 | MEMORY BASED COMPUTATION SYSTEMS AND METHODS OF USING THE SAME - A high performance memory based computation system comprises an array of memory cells. Each memory cell stores a logic data corresponding to a chosen combination of inputs based on a specific logic function. For improved performance, the memory cell array can be divided into sub-blocks; and the sub-blocks can be serially disposed or juxtaposed. The performance of the memory based computation system can further be improved by removing the repeated memory cell rows, column, and/or sub-arrays. | 04-22-2010 |
20100090841 | ENVIRONMENTAL MONITORING USING MOBILE DEVICES AND NETWORK INFORMATION SERVER - Sensors mounted on vehicles (e.g., buses, taxis, police cars) and public personnel (e.g., policemen) are used to monitor various conditions and situations such as air quality, potential biological and chemical attacks, and road and traffic conditions. The invention improves upon the typical approach that deploys fixed sensors at every geographical position of interest. The total number of required sensors and the size and the complexity of the network infrastructure required to connect the sensors are reduced and simplified. A method for estimating the number of mobile sensors required to cover a region of interest also is disclosed. A relatively small number of mobile sensors may be sufficient to cover a large area at a lower cost and less complexity than a fixed sensor network. | 04-15-2010 |
20090302394 | CMOS INTEGRATED CIRCUITS WITH BONDED LAYERS CONTAINING FUNCTIONAL ELECTRONIC DEVICES - A complementary metal oxide semiconductor (CMOS) circuit having integrated functional devices such as nanowires, carbon nanotubes, magnetic memory cells, phase change memory cells, ferroelectric memory cells or the like. The functional devices are integrated with the CMOS circuit. The functional devices are bonded (e.g. by direct bonding, anodic bonding, or diffusion bonding) to a top surface of the CMOS circuit. The functional devices are fabricated and processed on a carrier wafer, and an attachment layer (e.g. SiO2) is deposited over the functional devices. Then, the CMOS circuit and attachment layer are bonded. The carrier wafer is removed (e.g. by etching). The functional devices remain attached to the CMOS circuit via the attachment layer. Apertures are etched through the attachment layer to provide a path for electrical connections between the CMOS circuit and the functional devices. | 12-10-2009 |
20090285142 | REDUCING POWER CONSUMPTION OF WI-FI ENABLED MOBILE DEVICES - A system and method for maximizing the standby time of mobile communication devices that have WiFi or other high energy-consuming network interfaces, by predicting in real time actionable silent periods (ASPs) of the interface and shutting the interface down during these ASPs. Standby times are significantly increased, resulting in longer periods of operation before battery charging is required, while keeping minimal the probabilities of missing incoming data packets when the interface is turned off. | 11-19-2009 |
20090271614 | MOBILITY ARCHITECTURE USING PRE-AUTHENTICATION, PRE-CONFIGURATION AND/OR VIRTUAL SOFT-HANDOFF - In some illustrative embodiments, a novel system and method is provided that can, for example, extend concepts of pre-authentication (such as, e.g., IEEE 802.11i pre-authentication) so as to operate across networks or subnetworks (such as, e.g., IP subnets). In preferred embodiments, a novel architecture includes one or both of two new mechanisms that substantially improve, e.g., higher-layer handoff performance. A first mechanism is referred to as “pre-configuration,” which allows a mobile to pre-configure higher-layer information effective in candidate IP subnets to handoff. A second mechanism is referred to as “virtual soft-handoff,” which allows a mobile to send or receive packets through the candidate IP subnets even before it is actually perform a handoff to any of the candidate IP subnets. | 10-29-2009 |
20090258641 | MULTI-INTERFACE PARSABLE MOBILE DEVICES (PMD) FOR ENERGY CONSERVATION AND SERVICES ENHANCEMENT - A split-able mobile device includes a parsed mobile device (PMD) and a pre-associated peer partner (PPP) that enables communication with networks when the PMD is in the vicinity of the PPP. The PMD locates the PPP and enters into peer mode. In peer mode, the PMD shares a function or operation with the PPP to reduce power costs or to alleviate overhead constraints. The PPP accesses a separate power source than the PMD and can provide greater service to a user without compromising performance of the PMD. If the PPP cannot be located, then the PMD enters a solo mode. | 10-15-2009 |
20090186602 | APPROACH TO SECURE LOCALIZATION IN WIRELESS NETWORKS - Embodiments of the present invention disclose a secure localization infrastructure using transmitters that can transmit messages at multiple distinct power levels throughout a community of reference points. Transmitters send messages at different power levels in a manner that every location in the system corresponds to a unique set of messages. Received messages are reported back to the localization infrastructure, which then determines location by comparing the messages reported. | 07-23-2009 |
20090022127 | SECURE LOCALIZATION FOR 802.11 NETWORKS WITH FINE GRANULARITY - A system and method that uses wireless-capable desktop computers in a vicinity such as to enable one to securely determine the location of an untrusted user with office level granularity. | 01-22-2009 |
20090019505 | STREAMING VIDEO OVER MULTIPLE NETWORK INTERFACES - The preferred embodiments provide a system and/or method that exploits the presence of multiple interfaces to provide high quality video streaming (or real time streaming). The proposed solution includes three specific strategies 1) receiver buffer management, 2) selective re-transmission of packets and 3) dynamic load balancing across interfaces to achieve high quality video streaming across multiple interfaces. | 01-15-2009 |
20090016286 | ARCHITECTURE FOR MULTIPLE MIH USERS - Currently, the I.E.E.E. 802.21 specification allows multiple MIH (Media-Independent Handover) Users in a single MIH Function. However, the specification is not clear about how multiple MIH Users are supported by a single MIHF (MIH Function) under a constraint in which if there is only one MIH User is allowed to change the state of a particular link during a particular period of time. This document proposes a detailed architecture which allows for the co-existence of multiple MIH Users by introducing a link ownership scheme in the MIHF (MIH Function). The proposed link ownership scheme also supports the scenario in which the state of a link of a mobile node is changed by a network node by modifying the MIH_Register primitives in the I.E.E.E. 802.21 specification to signal the set of allocated links to a remote MIH User on the network node. The modification of MIH_Register primitive also has the added benefit of allowing the network node to subscribe to events on a specific set of links present in the mobile node as opposed to not knowing any of the links at all. | 01-15-2009 |
20080310366 | MIH Pre-Authentication - A system and method for performing MIH pre-authentication, which includes providing support for both direct and/or indirect pre-authentication and providing support for both network-initiated and mobile-initiated pre-authentication. | 12-18-2008 |
20080275643 | OPTIMUM ROUTE PLANNING FOR SERVICE VEHICLES - Transportation costs are minimized with a novel system for optimizing a route for a service vehicle, for example, a package delivery van. Based upon static and dynamic information, a computer on board the service vehicle determines an optimum route for the vehicle to travel between multiple locations. The computer on board the service vehicle communicates wirelessly to receive any pertinent dynamic information which has changed (e.g., traffic congestion, the presence of a customer at a deliver location, or a modification of location). The computer then recalculates the optimum route for the vehicle and guides the driver of the vehicle in accordance with the newly determined optimum route. The on board computer continues to check for any updates, and recalculates the optimum route throughout the day. Thus, the optimum route may be selected based upon the latest available information white avoiding heavy signal traffic on the wireless network. | 11-06-2008 |
20080248780 | SYSTEMS AND METHODS FOR CURRENCY QUERYING - A system and method is disclosed that includes a currency conversion mechanism for a mobile device prior to authenticating with and accessing a network in a foreign jurisdiction such that the mobile does not require knowledge of exchange rate between the currencies used in visited and home jurisdictions. | 10-09-2008 |
20080212783 | KERBERIZED HANDOVER KEYING IMPROVEMENTS - A media-independent handover key management architecture is disclosed that uses Kerberos for secure key distribution among a server, an authenticator, and a mobile node. In the preferred embodiments, signaling for key distribution is based on re-keying and is decoupled from re-authentication that requires EAP (Extensible Authentication Protocol) and AAA (Authentication, Authorization and Accounting) signaling similar to initial network access authentication. In this framework, the mobile node is able to obtain master session keys required for dynamically establishing the security associations with a set of authenticators without communicating with them before handover. By separating re-key operation from re-authentication, the proposed architecture is more optimized for a proactive mode of operation. It can also be optimized for reactive mode of operation by reversing the key distribution roles between the mobile node and the target access node. | 09-04-2008 |