Patents by Inventor Arzad KHERANI

Arzad KHERANI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9374769
    Abstract: Embodiments provide an enhanced approach for Higher Priority Public Land Mobile Network (HPPLMN) search. In one embodiment, information acquired during a search (for each detected cell per frequency channel) is saved in a database and persisted in the database based on a validity time. An idle mode-to-connected mode transition by the UE, rather than aborting the search, only suspends the search for it to be resumed at a later time upon a connected mode-to-idle mode transition by the UE. Saved search data that is valid at the time of the transition is maintained and the frequency channel(s) associated with it is not re-searched in the current search. In an embodiment, the search is resumed based on weights that are associated with frequency channels, where a weight indicates a priority for visiting the frequency channel.
    Type: Grant
    Filed: December 5, 2012
    Date of Patent: June 21, 2016
    Assignee: Broadcom Corporation
    Inventors: Arzad Kherani, Anand Devidas Kashikar
  • Patent number: 9369880
    Abstract: Example embodiments generally relate to adapting a transmission via first wireless technology to avoid interference with a reception via a second wireless technology. For example, a user equipment (e.g. cell phone) can include radios operating according to first and second wireless radio technologies, which can include Long Term Evolution (LTE) and a technology using the industrial, scientific and medical (ISM) frequency band. When a priority request is asserted by a radio operating in the ISM frequency band, the LTE radio may abort a scheduled transmission when certain “transmission abort criteria” are satisfied.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: June 14, 2016
    Assignee: Broadcom Corporation
    Inventors: Amit Choudhary, Arzad Kherani
  • Patent number: 9106640
    Abstract: A method for securing communications in a vehicle-to-vehicle (V2V) system including an on-board computer of a broadcasting vehicle predicting a value for a vehicle parameter, generating a heavyweight signature corresponding to the predicted value, and obtaining an actual value for the vehicle parameter. The method also includes the computer comparing the predicted value to the actual value to determine if the predicted value bears a first relationship to the actual value. If the computer determines that the predicted value bears the relationship to the actual value, the on-board computer generates a lightweight authenticating signature to correspond to the predicted value and broadcasts a data message having the predicted value with the corresponding heavyweight authenticating signature and the corresponding lightweight authenticating signature.
    Type: Grant
    Filed: June 13, 2014
    Date of Patent: August 11, 2015
    Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: Arzad A. Kherani, Debojyoti Bhattacharya, Skanda N. Muthaiah
  • Publication number: 20150181437
    Abstract: Example embodiments generally relate to adapting a reception via first wireless technology to reduce or avoid interference with a transmission via a second wireless technology. For example, a user equipment (e.g. cell phone) can include radios operating according to first and second wireless radio technologies, which can include Long Term Evolution (LTE) and a technology using the industrial, scientific and medical (ISM) frequency band. In this example, the LTE radio may adapt, delay, or avoid the reception of certain scheduled system information from the network to reduce or avoid interference with transmission from the ISM radio.
    Type: Application
    Filed: December 23, 2013
    Publication date: June 25, 2015
    Applicant: Broadcom Corporation
    Inventors: Amit CHOUDHARY, Arzad KHERANI
  • Publication number: 20150092540
    Abstract: Embodiments of the disclosure generally relate to a system and method for traffic offload from a first access technology to a second access technology. For example, packets originally destined for transmission over a bearer channel associated with Long Term Evaluation (LTE) can be offloaded to a Wi-FI bearer channel in a seamless manner when available, or a non-seamless manner.
    Type: Application
    Filed: September 30, 2013
    Publication date: April 2, 2015
    Applicant: Broadcom Corporation
    Inventors: Amit CHOUDHARY, Arzad Kherani
  • Publication number: 20150092675
    Abstract: Example embodiments generally relate to adapting a transmission via first wireless technology to avoid interference with a reception via a second wireless technology. For example, a user equipment (e.g. cell phone) can include radios operating according to first and second wireless radio technologies, which can include Long Term Evolution (LTE) and a technology using the industrial, scientific and medical (ISM) frequency band. When a priority request is asserted by a radio operating in the ISM frequency band, the LTE radio may abort a scheduled transmission when certain “transmission abort criteria” are satisfied.
    Type: Application
    Filed: September 30, 2013
    Publication date: April 2, 2015
    Applicant: Broadcom Corporation
    Inventors: Amit CHOUDHARY, Arzad Kherani
  • Publication number: 20150085759
    Abstract: Techniques are described for selecting bearers for uplink data packet transmissions. For instance, bearers may be selected using communication device-side techniques. In one example, a bearer may be selected based on a determination that other bearer(s) are not configured to support uplink data packet transmissions. In another example, a bearer may be selected irrespective of traffic flow template rules set forth by network(s) to which a communication device is connected. In yet another example, a single, default bearer that is linked to a network access point may be selected for transmission of uplink data packets that are associated with traffic flow template rules corresponding to non-default bearers. In still another example, a bearer may be selected based on its quality-of-service class identifier (QCI) value if the QCI value indicates that the bearer is configured to support uplink data packet transmissions.
    Type: Application
    Filed: September 26, 2013
    Publication date: March 26, 2015
    Applicant: Broadcom Corporation
    Inventors: Rambabu Gajula, Arzad Kherani
  • Publication number: 20140298437
    Abstract: A method for securing communications in a vehicle-to-vehicle (V2V) system including an on-board computer of a broadcasting vehicle predicting a value for a vehicle parameter, generating a heavyweight signature corresponding to the predicted value, and obtaining an actual value for the vehicle parameter. The method also includes the computer comparing the predicted value to the actual value to determine if the predicted value bears a first relationship to the actual value. If the computer determines that the predicted value bears the relationship to the actual value, the on-board computer generates a lightweight authenticating signature to correspond to the predicted value and broadcasts a data message having the predicted value with the corresponding heavyweight authenticating signature and the corresponding lightweight authenticating signature.
    Type: Application
    Filed: June 13, 2014
    Publication date: October 2, 2014
    Inventors: Arzad A. Kherani, Debojyoti Bhattacharya, Skanda N. Muthaiah
  • Publication number: 20140219112
    Abstract: Techniques are described herein for prioritizing higher priority data packets by reserving sequence numbers for assignment to higher priority data packets received after lower priority data packets are assigned sequence numbers. Higher priority data packets may also be prioritized by estimating an amount of data that can be sent in a single uplink allocation, limiting the amount of data packet data sent during a designated uplink allocation to the estimated amount of data, and encrypting high priority data packet(s) received previous to the designated uplink allocation. Higher priority data packets may also be prioritized by encrypting and placing high priority data packet(s) received in a queue, and subsequently re-encrypting any unsent lower priority data packets that were encrypted in the queue before the high priority data packet(s) were received.
    Type: Application
    Filed: March 11, 2013
    Publication date: August 7, 2014
    Applicant: BROADCOM CORPORATION
    Inventors: Arzad Kherani, Rishi Ranjan
  • Patent number: 8756430
    Abstract: A method for securing communications in a vehicle-to-vehicle (V2V) system including an on-board computer of a broadcasting vehicle predicting a value for a vehicle parameter, generating a heavyweight signature corresponding to the predicted value, and obtaining an actual value for the vehicle parameter. The method also includes the computer comparing the predicted value to the actual value to determine if the predicted value bears a first relationship to the actual value. If the computer determines that the predicted value bears the relationship to the actual value, the on-board computer generates a lightweight authenticating signature to correspond to the predicted value and broadcasts a data message having the predicted value with the corresponding heavyweight authenticating signature and the corresponding lightweight authenticating signature.
    Type: Grant
    Filed: April 14, 2011
    Date of Patent: June 17, 2014
    Assignee: GM Global Technology Operations LLC
    Inventors: Arzad A. Kherani, Debojyoti Bhattacharya, Skanda N. Muthaiah
  • Publication number: 20140157009
    Abstract: Embodiments provide methods and systems for enabling opportunistic wakeup of a device from a sleep mode. Specifically, embodiments recognize that often incoming packets into a module in a low power mode are not time-critical and can be deferred for processing by the module after a scheduled wakeup time of the module. As such, embodiments provide methods and systems for identifying an incoming packet into a module and determining whether or not to cause the module to exit the low power mode based on characteristics of the incoming packet. Embodiments may be applied to a modem in a wired or wireless device but are not limited as such, and extend to any device which may benefit from the opportunistic wakeup embodiments described herein.
    Type: Application
    Filed: December 5, 2012
    Publication date: June 5, 2014
    Applicant: Broadcom Corporation
    Inventor: Arzad KHERANI
  • Publication number: 20140155061
    Abstract: Embodiments provide an enhanced approach for Higher Priority Public Land Mobile Network (HPPLMN) search. In one embodiment, information acquired during a search (for each detected cell per frequency channel) is saved in a database and persisted in the database based on a validity time. An idle mode-to-connected mode transition by the UE, rather than aborting the search, only suspends the search for it to be resumed at a later time upon a connected mode-to-idle mode transition by the UE. Saved search data that is valid at the time of the transition is maintained and the frequency channel(s) associated with it is not re-searched in the current search. In an embodiment, the search is resumed based on weights that are associated with frequency channels, where a weight indicates a priority for visiting the frequency channel.
    Type: Application
    Filed: December 5, 2012
    Publication date: June 5, 2014
    Applicant: Broadcom Corporation
    Inventors: Arzad KHERANI, Anand Devidas Kashikar
  • Patent number: 8627073
    Abstract: A method for improving the reliability and performance of Vehicle-to-Vehicle (V2V) networks where digital certificates are necessary for message authentication and some messages may be lost in transmission. The method uses Forward Error Correcting (FEC) codes to encode a digital certificate into multiple segments, and attaches one or more segment to each message transmitted. Nodes receiving the messages can reconstruct the certificate as long as they successfully receive a minimum number of the transmitted messages, where the minimum number is less than the total number of messages transmitted. This allows message authentication to continue uninterrupted, even in a network environment where some messages are lost in transmission. Two different types of FEC codes are described, and adaptive schemes are included to optimize message throughput based on such network conditions as node density.
    Type: Grant
    Filed: March 24, 2010
    Date of Patent: January 7, 2014
    Assignee: GM Global Technology Operations LLC
    Inventors: Arzad A. Kherani, Skanda N. Muthaiah, Debojyoti Bhattacharya
  • Patent number: 8549284
    Abstract: A method and system is provide for performing a certificate validity check between a vehicle receiving a message and an entity transmitting the message in a vehicle-to-entity communication system. The message includes a digital certificate. A determination is made whether the digital certificate is expired. A determination is made whether the digital certificate is listed in a local certificate revocation list stored in a memory of the vehicle in response to a determination that the digital certificate is not expired, otherwise, disregarding the message. An elapsed time is determined since a last freshness check in response the digital certificate not listed in the local certificate revocation list. The elapsed time is compared to a threshold requirement. The digital message is accepted for additional processing in response to the freshness check meeting the threshold requirement, otherwise, the message is disregarded.
    Type: Grant
    Filed: May 9, 2012
    Date of Patent: October 1, 2013
    Assignee: GM Global Technology Operations LLC
    Inventor: Arzad A. Kherani
  • Patent number: 8499155
    Abstract: A method for improving the reliability and performance of Vehicle-to-Vehicle (V2V) networks where digital certificates are necessary for message authentication and some messages may be lost in transmission. The method uses a variable inter-certificate refresh period to optimize communications throughput based on network conditions such as node density and bandwidth saturation. In some network conditions, the inter-certificate refresh period may be increased, such that more certificate digests are sent between full digital certificates, to decrease average message size. In other network conditions, the inter-certificate refresh period may be decreased, to allow for more frequent message authentication by receiving nodes. Empirical data and an adaptive controller are used to select the refresh period which will provide the best performance based on network conditions.
    Type: Grant
    Filed: March 24, 2010
    Date of Patent: July 30, 2013
    Assignee: GM Global Technology Operations LLC
    Inventors: Arzad A. Kherani, Skanda N. Muthaiah, Debojyoti Bhattacharya
  • Patent number: 8386790
    Abstract: A method is provided of authenticating a digitally signed message. A chain of messages is generated. A Winternitz pair of keys is generated for each respective message. A sequence number is assigned to each of the messages. Each of the sequence numbers cooperatively identify an order of Winternitz verifiers assigned to each of the messages. A signature to a first message in the chain of messages is signed using a digital signature algorithm private key. Signatures to each of the following messages in the chain of messages are signed using both Winternitz private keys and digital signature algorithm private keys. The signed messages are broadcast from a sender to a receiver. The first signed broadcast message is authenticated at the receiver by verifying the digital signature algorithm signature. At least some of the following signed broadcast messages are authenticated at the receiver by verifying only the Winternitz signature.
    Type: Grant
    Filed: February 25, 2010
    Date of Patent: February 26, 2013
    Assignee: GM Global Technology Operations LLC
    Inventors: Debojyoti Bhattacharya, Arzad A. Kherani
  • Publication number: 20120265995
    Abstract: A method for securing communications in a vehicle-to-vehicle (V2V) system including an on-board computer of a broadcasting vehicle predicting a value for a vehicle parameter, generating a heavyweight signature corresponding to the predicted value, and obtaining an actual value for the vehicle parameter. The method also includes the computer comparing the predicted value to the actual value to determine if the predicted value bears a first relationship to the actual value. If the computer determines that the predicted value bears the relationship to the actual value, the on-board computer generates a lightweight authenticating signature to correspond to the predicted value and broadcasts a data message having the predicted value with the corresponding heavyweight authenticating signature and the corresponding lightweight authenticating signature.
    Type: Application
    Filed: April 14, 2011
    Publication date: October 18, 2012
    Applicant: GM CLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: Arzad A. Kherani, Debojyoti Bhattacharya, Skanda N. Muthaiah
  • Publication number: 20110238986
    Abstract: A method for improving the reliability and performance of Vehicle-to-Vehicle (V2V) networks where digital certificates are necessary for message authentication and some messages may be lost in transmission. The method uses a variable inter-certificate refresh period to optimize communications throughput based on network conditions such as node density and bandwidth saturation. In some network conditions, the inter-certificate refresh period may be increased, such that more certificate digests are sent between full digital certificates, to decrease average message size. In other network conditions, the inter-certificate refresh period may be decreased, to allow for more frequent message authentication by receiving nodes. Empirical data and an adaptive controller are used to select the refresh period which will provide the best performance based on network conditions.
    Type: Application
    Filed: March 24, 2010
    Publication date: September 29, 2011
    Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INC.
    Inventors: Arzad A. Kherani, Skanda N. Muthaiah, Debojyoti Bhattacharya
  • Publication number: 20110238987
    Abstract: A method for improving the reliability and performance of Vehicle-to-Vehicle (V2V) networks where digital certificates are necessary for message authentication and some messages may be lost in transmission. The method uses Forward Error Correcting (FEC) codes to encode a digital certificate into multiple segments, and attaches one or more segment to each message transmitted. Nodes receiving the messages can reconstruct the certificate as long as they successfully receive a minimum number of the transmitted messages, where the minimum number is less than the total number of messages transmitted. This allows message authentication to continue uninterrupted, even in a network environment where some messages are lost in transmission. Two different types of FEC codes are described, and adaptive schemes are included to optimize message throughput based on such network conditions as node density.
    Type: Application
    Filed: March 24, 2010
    Publication date: September 29, 2011
    Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INC.
    Inventors: Arzad A. Kherani, Skanda N. Muthaiah, Debojyoti Bhattacharya
  • Publication number: 20110208971
    Abstract: A method is provided of authenticating a digitally signed message. A chain of messages is generated. A Winternitz pair of keys is generated for each respective message. A sequence number is assigned to each of the messages. Each of the sequence numbers cooperatively identify an order of Winternitz verifiers assigned to each of the messages. A signature to a first message in the chain of messages is signed using a digital signature algorithm private key. Signatures to each of the following messages in the chain of messages are signed using both Winternitz private keys and digital signature algorithm private keys. The signed messages are broadcast from a sender to a receiver. The first signed broadcast message is authenticated at the receiver by verifying the digital signature algorithm signature. At least some of the following signed broadcast messages are authenticated at the receiver by verifying only the Winternitz signature.
    Type: Application
    Filed: February 25, 2010
    Publication date: August 25, 2011
    Applicant: GM GLOBAL TECHNOLOGY OPEARTIONS, INC.
    Inventors: Debojyoti Bhattacharya, Arzad A. Kherani