Patents by Inventor Ajay Malik

Ajay Malik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090005064
    Abstract: Methods and systems are provided for determining the location of a first wireless device (e.g., a mobile unit) within a wireless network comprising a plurality of second wireless devices (e.g., access points). The method includes identifying an overlap area corresponding to the intersection of RF ranges for the one or more second wireless devices then computing a set of signal strength values, each associated with a measure of RF signal strength (e.g., RSSI) received by the plurality of second wireless devices from the first wireless device. A decision metric is evaluated for a plurality of locations within the overlap area based on the set of signal strength values. The location of the first wireless device is determined by selecting, from the plurality of locations, a location having the optimum value of the decision metric within the overlap area. The decision metric may utilize a minimum mean square error (MMSE) calculation.
    Type: Application
    Filed: June 28, 2007
    Publication date: January 1, 2009
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventors: Ajay MALIK, Vinh-Phuong LE, Mahender VANGATI
  • Publication number: 20090005063
    Abstract: Methods and systems are provided for determining the location of a first wireless device (e.g., a mobile unit) within a wireless network comprising a second wireless device (e.g., an access point). The method includes determining a signal strength contour associated with RF communication between the access point and the mobile unit, and adding a correction factor to the signal strength contour to produce a corrected signal strength contour, wherein the correction factor includes the sums of the differences between the transmit power and the antenna gain associated with the mobile unit and the access point. In an alternate scheme involving stored fingerprint data, a correction factor is introduced based on the differences between antenna gains and transmit power associated with the mobile unit under consideration and the mobile unit used for generating the fingerprint data. The systems and methods disclosed herein are applicable, for example, to networks operating in accordance with 802.
    Type: Application
    Filed: June 28, 2007
    Publication date: January 1, 2009
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventors: Ajay MALIK, Vinh-Phuong LE, Mahender VANGATI
  • Publication number: 20080288623
    Abstract: A method is used for deployment of a wireless infrastructure. The method comprises deploying a plurality of access ports in a facility based on a layout that depends on a type of the facility. The method comprises receiving at least one parameter from at least one of the plurality of access points. The method comprises dynamically determining settings of the plurality of access points based on the at least one parameter.
    Type: Application
    Filed: October 22, 2007
    Publication date: November 20, 2008
    Inventor: Ajay MALIK
  • Publication number: 20080288432
    Abstract: A method is used to fix wireless network problems. The method comprises receiving at least one parameter relating to a wireless network. The method comprises comparing the at least one parameter with a database of problem identities. Each problem identity has a set of criteria. The at least one parameter relates to the set of criteria. The method comprises determining at least one problem with the wireless network based on the comparison of the at least one parameter with the problem identities.
    Type: Application
    Filed: October 22, 2007
    Publication date: November 20, 2008
    Inventors: Ajay MALIK, Mahender Vangati
  • Publication number: 20080289007
    Abstract: A method grants privileges based on location. The method comprises determining a location of a mobile unit disposed within a coverage area of a network. The coverage area is separated into a plurality of zones. The method comprises determining a first zone in which the mobile unit is disposed. The method comprises granting access to a first privilege to the mobile unit, the first privilege being based on the first zone.
    Type: Application
    Filed: October 22, 2007
    Publication date: November 20, 2008
    Inventor: Ajay MALIK
  • Publication number: 20080266102
    Abstract: An RF port device includes a digital module within a housing, wherein the digital module is configured to communicate with a network over a data connection (e.g., a GigE Ethernet connection), from which it may receive power. The digital module and housing are configured to removeably couple to two or more RF submodules—e.g., RFID reader submodules, 802.11 a/b/g access port submodules, 802.11n access port submodules, Wi-MAX submodules, Ultra Wide Band submodules, and Bluetooth submodules.
    Type: Application
    Filed: April 30, 2007
    Publication date: October 30, 2008
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventor: Ajay Malik
  • Publication number: 20080180246
    Abstract: An RFID system provides opportunistic locationing of RFID tags and associated assets in environments where multiple tags are read from multiple readers. A radio frequency identification (RFID) system includes one or more location triggers and a first RFID reader coupled to the network having a first antenna associated therewith. The first reader is configured to read a first set of tag IDs from a first set of RFID tags within a first range of the first antenna. A second RFID reader is coupled to the network and has a second antenna associated therewith. The second RFID reader is configured to read a second set of tag IDs from a second set of RFID tags within a second range of the second antenna. An RF switch is coupled to the network and is configured to receive the first set of tag IDs and the second set of tag IDs from the first RFID reader and the second RFID reader.
    Type: Application
    Filed: January 31, 2007
    Publication date: July 31, 2008
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventor: Ajay Malik
  • Publication number: 20080136635
    Abstract: Apparatus, systems, and methods for enabling a radio frequency identification (RFID) passive tag to be visible as an RFID active tag over an extended period of time are disclosed. An RFID reader transmits a substantially continuous radio frequency (RF) charging signal. In response to receiving the RF charging signal, one or more RFID passive tags each transmit a substantially continuous identifier signal. The RFID reader is configured to receive the identifier signal(s) and to determine a location and/or asset associated with each RFID passive tag.
    Type: Application
    Filed: December 8, 2006
    Publication date: June 12, 2008
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventor: Ajay MALIK
  • Publication number: 20080136592
    Abstract: An RFID-based reminder system as described herein leverages RFID technology to manage deadline-driven items of correspondence such as bills, event invitations, meeting notices, voting ballots, jury duty notices, and the like. RFID tags are affixed to (or embedded into) items of correspondence, and the tags are programmed with relevant data such as a response deadline, the action to be taken, and the name of the originating company or entity. Upon receipt, the recipient can interrogate the correspondence using an RFID reader, and the received RFID tag data is processed by one or more software applications running on a computing device of the recipient. The computing device can then automatically generate event reminders that notify the user of approaching response deadlines for the items of correspondence.
    Type: Application
    Filed: December 7, 2006
    Publication date: June 12, 2008
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventors: Ajay MALIK, Puneet BATTA
  • Publication number: 20080136621
    Abstract: An access port has an RF tag associated therewith (e.g., physically incorporated into the access port), wherein the RF tag includes configuration information. A mobile unit having an RF tag reader associated therewith sends a probe request and reads the configuration information from the RF tag. The RF tag may include, for example, information traditionally incorporated into an IEEE 802.11 probe response or beacon. The tag may include, for example, non-real-time configuration information, such as capabilities of the access port, data rates, and the like.
    Type: Application
    Filed: December 7, 2006
    Publication date: June 12, 2008
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventors: Ajay MALIK, Puneet BATTA
  • Publication number: 20080079577
    Abstract: An RFID system provides opportunistic locationing of RFID tags and associated assets in environments where multiple tags are read from multiple readers. A radio frequency identification (RFID) system includes a first RFID reader coupled to the network and having a first antenna associated therewith. The first reader is configured to read a first set of tag IDs from a first set of RFID tags within a first range of the first antenna. A second RFID reader is coupled to the network and has a second antenna associated therewith. The second RFID reader is configured to read a second set of tag IDs from a second set of RFID tags within a second range of the second antenna. An RF switch is coupled to the network and is configured to receive the first set of tag IDs and the second set of tag IDs from the first RFID reader and the second RFID reader.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 3, 2008
    Inventor: Ajay Malik
  • Publication number: 20080080438
    Abstract: Wireless switch are monitored or configured on a cluster basis rather than being limited to configuration on an individual switches. A switch cluster is made up of two or more wireless switches that share a cluster number or other identifier. A command is received from a user interface module at a first node in the cluster, and an instruction related to the command is transmitted from the first node to the other nodes in the cluster. After receiving responses from at least some of the other nodes in the cluster as to the effect of the instruction, the first node provides an updated response to the administrator. The administrator is therefore able to configure or monitor each of the nodes in the cluster from a single administrative node.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 3, 2008
    Inventors: Kamatchi Soundaram Gopalakrishnan, Ajay Malik
  • Publication number: 20080080550
    Abstract: An RF switch as described herein can communicate with different types of data transmitting devices such as RF readers, RFID tags, and other RF devices. The RF switch employs “plug-and-play” reader interface adapter modules, which can be pre-installed in the RF switch or downloaded to the RF switch as needed. Each interface adapter module represents or includes a different data protocol (or suite of protocols) that is compatible with a particular class, category, type, or group of data transmitting device. The use of these interface adapter modules enables the RF switch to be deployed in a protocol-agnostic form that is scalable and upgradeable in the field.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 3, 2008
    Inventor: Ajay Malik
  • Publication number: 20080081632
    Abstract: A system for assessing the state of an RF network includes a plurality of wireless devices coupled to the network and having one or more associated antennae, the wireless devices configured to process data received from a plurality of RF elements within range of the antennae. An RF switch is coupled to the network and configured to receive the data and transmit the data over the network. A first memory within the RF switch is configured to store a system state comprising a plurality of performance indicators, wherein each of the performance indicators is associated with an operational characteristic of one or more of the plurality of wireless devices. A second memory within the RF switch is configured to store a plurality of labeled data entries, the labeled data entries each including the system state and a user-entered identifier, wherein the user-entered identifier includes information related to the time at which the system state was selected.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 3, 2008
    Inventor: Ajay Malik
  • Publication number: 20080080435
    Abstract: A system for monitoring the state of an RF network generally includes a plurality of wireless devices coupled to the network and having one or more associated antennae, the wireless devices configured to process data received from a plurality of RF elements within range of the antenna. An RF switch is coupled to the network and configured to receive and transmit the data over the network, the RF switch having a memory configured to store a plurality of performance indicators, wherein each of the performance indicators is associated with an operational characteristic of one or more of the plurality of wireless devices. A display is coupled to the network for displaying a visual representation of the plurality of performance indicators.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 3, 2008
    Inventors: Ajay Malik, Sujai Hajela
  • Publication number: 20080068130
    Abstract: A handheld device (e.g., an RFID reader, mobile computer, or the like) is configured to periodically scan its environment for the presence of RFID tags, determine whether any of the RFID tags within range include a valid security code, then disable operation (e.g., by preventing access to stored data) when it is determined that there are no RFID tags with a valid security code within the operational range. The RFID tags may be placed strategically at secure locations within the environment, such as within other network devices (access ports, switches, etc.).
    Type: Application
    Filed: August 31, 2006
    Publication date: March 20, 2008
    Inventors: Puneet Batta, Ajay Malik
  • Publication number: 20080068136
    Abstract: An RFID reader is designed to autoconfigure itself during initial operation by reading configuration information from an RFID tag within its operational range, selecting a configuration file based on the configuration information, and configuring itself based on the configuration file. The configuration file may be stored on the reader itself, or requested and received over a network. The RFID tag may be password protected to add further security.
    Type: Application
    Filed: August 31, 2006
    Publication date: March 20, 2008
    Inventors: Ajay Malik, Puneet Batta
  • Publication number: 20080002702
    Abstract: System flexibility and ease-of-design is greatly enhanced by using a multicore abstraction layer (MCAL) to interface between a multicore hardware platform, a device operating system and the packet transfer functions of the system. Systems and techniques are described for processing a data packet received at a network interface of a network infrastructure device (such as a wireless switch) or other computing system, particularly using multi-core processors. A classification handler initially classifies the data packet. A plurality of protocol handlers each associated with a data protocol processes the data packet if the classification of the data packet matches the data protocol associated with the protocol handler, and one of several application handlers each associated with a user applications processes the data packet if the classification of the data packet matches the user application associated with the application handler.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 3, 2008
    Inventors: Zeljko Bajic, Ajay Malik
  • Publication number: 20080002681
    Abstract: System flexibility and ease-of-design is greatly enhanced in a network wireless/RFID switching device by using a multicore abstraction layer (MCAL) to interface between a multicore hardware platform, a device operating system and the packet transfer functions of the system. Such an architecture may be particularly useful in constructing switches capable of switching wireless networking (e.g. IEEE 802.11, 802.16), RFID or other network protocols, particularly using multi-core processors. A classification handler initially classifies the data packet. A plurality of protocol handlers each associated with a data protocol processes the data packet if the classification of the data packet matches the data protocol associated with the protocol handler, and one of several application handlers each associated with a user applications processes the data packet if the classification of the data packet matches the user application associated with the application handler.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 3, 2008
    Inventors: Zeljko Bajic, Ajay Malik
  • Publication number: 20070266137
    Abstract: A method for automated testing of a device (e.g., a router, switch, mobile terminal, barcode reader, or the like) includes creating a metafile, establishing a network connection to the device, parsing the metafile to determine a device command and an expected result, apply a terminology substitution process to the device command based on a terminology block associated with the device, thereby creating a modified device command; issuing the modified device command to the command line interface of the device via the network connection; receiving a response from the command line interface of the device via the network connection; comparing the response to the expected result, then logging, to a test summary file, a test result based on the comparing step. The metafile language has a relatively simple vocabulary and syntax, and is thus easy to learn and implement.
    Type: Application
    Filed: August 31, 2006
    Publication date: November 15, 2007
    Inventor: Ajay Malik