Patents by Inventor Sourabh JANA

Sourabh JANA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11696134
    Abstract: A method for secure path discovery in a mesh network at a destination device is disclosed. The method includes receiving a path discovery request from an originator device and selecting a path selection in response to the path discovery request. The method also includes transmitting the path selection to the originator device and receiving a random seed from a provisioner device. The method also includes generating an authentication code based on the random seed, transmitting an authentication code message to an originator device and receiving communications from the originator device only if the originator device receives a verification response message from the provisioner device which confirms that the destination device has been verified.
    Type: Grant
    Filed: June 30, 2020
    Date of Patent: July 4, 2023
    Assignee: QUALCOMM INCORPORATED
    Inventors: Chirag Manojkumar Kharvar, Skanda Kumar Kaipu Narahari, Sourabh Jana
  • Patent number: 11216051
    Abstract: This disclosure provides systems, methods and apparatus for smart sockets in a communication network. A smart socket can be implemented to monitor one or more power quality characteristics of a power supply providing energy to the smart home environment. Smart sockets implemented to monitor power quality characteristics can sense when power fluctuations are present in the power supply, and shut down connected devices to prevent damage. A plurality of coordinating smart sockets can be implemented to optimize power utilization when the smart home environment is operating on backup power, during low electricity tariff periods, or when operating on a renewable energy source. The plurality of coordinating smart sockets can be implemented to autonomously schedule tasks based on a context of operation of other devices in the smart home environment. The plurality of coordinating smart sockets can be implemented to achieve configurable energy targets for the smart home environment.
    Type: Grant
    Filed: July 24, 2019
    Date of Patent: January 4, 2022
    Assignee: QUALCOMM Incorporated
    Inventors: Skanda Kumar Kaipu Narahari, Chirag Manojkumar Kharvar, Dishant Srivastava, Sourabh Jana, Jagdeep Kumar Hans
  • Patent number: 11166156
    Abstract: Disclosed are techniques for establishing an encrypted connection between a first node and a second node in a wireless mesh network. In an aspect, the first node receives, from a provisioner node in the wireless mesh network, a first value encrypted with a device-specific encryption key known only to the first node and the provisioner node, wherein the second node receives, from the provisioner node, the first value encrypted with a second device-specific encryption key, generates a friendship-specific encryption key based on the first value, an identifier of the first node, and an identifier of the second node, wherein the second node generates the friendship-specific encryption key, sends, to the second node, a first message encrypted with the friendship-specific encryption key, and receives, from the second node, a second message encrypted with the friendship-specific encryption key.
    Type: Grant
    Filed: September 7, 2018
    Date of Patent: November 2, 2021
    Assignee: QUALCOMM INCORPORATED
    Inventors: Sourabh Jana, Chirag Manojkumar Kharvar, Ravi Shekhar
  • Patent number: 11122060
    Abstract: Disclosed are techniques for detecting a security threat in a wireless mesh network. In an aspect, a monitoring device in the wireless mesh network detects a first message transmitted by a source node in the wireless mesh network to a destination node in the wireless mesh network via at least one relay node in the wireless mesh network, collects information from the first message as it is transmitted in the wireless mesh network, determines that the first message has been corrupted based on analysis of the information from the first message, and detects the security threat in the wireless mesh network based on the first message being corrupted.
    Type: Grant
    Filed: November 28, 2018
    Date of Patent: September 14, 2021
    Assignee: QUALCOMM INCORPORATED
    Inventors: Sourabh Jana, Chirag Manojkumar Kharvar, Ravi Shekhar, Ravi Kiran Bamidi
  • Patent number: 11005674
    Abstract: Methods, systems, and devices for controlling mesh network devices are described. The method includes receiving, by an automation device, a first message from a control device, adding, by the automation device, the identifier of the first user device to a priority list of the automation device based on receiving the first message, and controlling, by the automation device, access to operations of the automation device based on the identifier in the priority list after adding the identifier of the first user device. In some cases, the first message includes an identifier of a first user device and an add command.
    Type: Grant
    Filed: October 29, 2018
    Date of Patent: May 11, 2021
    Assignee: QUALCOMM Incorporated
    Inventors: Chirag Manojkumar Kharvar, Jagdeep Kumar Hans, Sourabh Jana
  • Patent number: 10917829
    Abstract: Methods, systems, and devices for wireless communications in a mesh network are described. During a path establishment procedure, a source device may broadcast a path request message, which may be forwarded (e.g., broadcast) by intermediate devices downstream through the mesh network to a destination device. Devices, starting with the destination device and continued upstream through intermediate devices along a path to be established, may feedback path response messages to establish a path between the destination device and the source device. Path response messages transmitted upstream through the mesh network may each include a handover address of a backup intermediate device. Therefore, upon reception of a path response message, an intermediate device selected for path establishment to a destination device may identify a handover address of a backup intermediate device. The intermediate device may perform a handover procedure with the backup intermediate device if a handover condition has been satisfied.
    Type: Grant
    Filed: March 22, 2019
    Date of Patent: February 9, 2021
    Assignee: QUALCOMM Incorporated
    Inventors: Chirag Manojkumar Kharvar, Skanda Kumar Kaipu Narahari, Sourabh Jana
  • Publication number: 20210037387
    Abstract: A method for secure path discovery in a mesh network at a destination device is disclosed. The method includes receiving a path discovery request from an originator device and selecting a path selection in response to the path discovery request. The method also includes transmitting the path selection to the originator device and receiving a random seed from a provisioner device. The method also includes generating an authentication code based on the random seed, transmitting an authentication code message to an originator device and receiving communications from the originator device only if the originator device receives a verification response message from the provisioner device which confirms that the destination device has been verified.
    Type: Application
    Filed: June 30, 2020
    Publication date: February 4, 2021
    Inventors: Chirag Manojkumar KHARVAR, Skanda Kumar KAIPU NARAHARI, Sourabh JANA
  • Patent number: 10880807
    Abstract: A device in a mesh network may select a relay path for use based on the power resources available to the devices forming the relay path. For example, if there are multiple relay paths available for selection, the device may choose a relay path that has the lowest quantity of devices that are operating on battery power. The device may determine the quantity of battery-powered devices associated with a path based on power information included in one or more messages received from one of the devices forming the path. After selecting the relay path, the device may transmit a response message to an intermediary device forming the relay path. The intermediary device may, in some examples, be a device that transmitted a message including the power information.
    Type: Grant
    Filed: March 6, 2019
    Date of Patent: December 29, 2020
    Assignee: QUALCOMM Incorporated
    Inventors: Chirag Manojkumar Kharvar, Sourabh Jana, Skanda Kumar Kaipu Narahari
  • Publication number: 20200341529
    Abstract: This disclosure provides systems, methods and apparatus for smart sockets in a communication network. A smart socket can be implemented to monitor one or more power quality characteristics of a power supply providing energy to the smart home environment. Smart sockets implemented to monitor power quality characteristics can sense when power fluctuations are present in the power supply, and shut down connected devices to prevent damage. A plurality of coordinating smart sockets can be implemented to optimize power utilization when the smart home environment is operating on backup power, during low electricity tariff periods, or when operating on a renewable energy source. The plurality of coordinating smart sockets can be implemented to autonomously schedule tasks based on a context of operation of other devices in the smart home environment. The plurality of coordinating smart sockets can be implemented to achieve configurable energy targets for the smart home environment.
    Type: Application
    Filed: July 24, 2019
    Publication date: October 29, 2020
    Inventors: Skanda Kumar KAIPU NARAHARI, Chirag Manojkumar KHARVAR, Dishant SRIVASTAVA, Sourabh JANA, Jagdeep Kumar HANS
  • Publication number: 20200305062
    Abstract: Methods, systems, and devices for wireless communications in a mesh network are described. During a path establishment procedure, a source device may broadcast a path request message, which may be forwarded (e.g., broadcast) by intermediate devices downstream through the mesh network to a destination device. Devices, starting with the destination device and continued upstream through intermediate devices along a path to be established, may feedback path response messages to establish a path between the destination device and the source device. Path response messages transmitted upstream through the mesh network may each include a handover address of a backup intermediate device. Therefore, upon reception of a path response message, an intermediate device selected for path establishment to a destination device may identify a handover address of a backup intermediate device. The intermediate device may perform a handover procedure with the backup intermediate device if a handover condition has been satisfied.
    Type: Application
    Filed: March 22, 2019
    Publication date: September 24, 2020
    Inventors: Chirag Manojkumar Kharvar, Skanda Kumar Kaipu Narahari, Sourabh Jana
  • Publication number: 20200288373
    Abstract: A device in a mesh network may select a relay path for use based on the power resources available to the devices forming the relay path. For example, if there are multiple relay paths available for selection, the device may choose a relay path that has the lowest quantity of devices that are operating on battery power. The device may determine the quantity of battery-powered devices associated with a path based on power information included in one or more messages received from one of the devices forming the path. After selecting the relay path, the device may transmit a response message to an intermediary device forming the relay path. The intermediary device may, in some examples, be a device that transmitted a message including the power information.
    Type: Application
    Filed: March 6, 2019
    Publication date: September 10, 2020
    Inventors: Chirag Manojkumar Kharvar, Sourabh Jana, Skanda Kumar Kaipu Narahari
  • Publication number: 20200169572
    Abstract: Disclosed are techniques for detecting a security threat in a wireless mesh network. In an aspect, a monitoring device in the wireless mesh network detects a first message transmitted by a source node in the wireless mesh network to a destination node in the wireless mesh network via at least one relay node in the wireless mesh network, collects information from the first message as it is transmitted in the wireless mesh network, determines that the first message has been corrupted based on analysis of the information from the first message, and detects the security threat in the wireless mesh network based on the first message being corrupted.
    Type: Application
    Filed: November 28, 2018
    Publication date: May 28, 2020
    Inventors: Sourabh JANA, Chirag Manojkumar KHARVAR, Ravi SHEKHAR, Ravi Kiran BAMIDI
  • Publication number: 20200146088
    Abstract: Systems and methods for initialization vector (IV) index recovery for a Bluetooth special interest group (SIG) mesh network include a receiving device in a first node of the mesh network, wherein the receiving device retrieves, from a secure network beacon (SNB), a retrieved IV index. If the retrieved IV index is greater than a current IV index of the receiving device by at least a value of two, the receiving device enters a recovery mode for recovering a correct IV index. In the recovery mode, the receiving device may receive the correct IV index from a Bluetooth device, if available, over a secure link, or from a trusted device in a second node of the mesh network. The mesh network may also include a monitoring device to provide the correct IV index to the receiving device.
    Type: Application
    Filed: November 7, 2018
    Publication date: May 7, 2020
    Inventors: Chirag Manojkumar KHARVAR, Sourabh JANA, Ravi Kiran BAMIDI
  • Publication number: 20200136851
    Abstract: Methods, systems, and devices for controlling mesh network devices are described. The method includes receiving, by an automation device, a first message from a control device, adding, by the automation device, the identifier of the first user device to a priority list of the automation device based on receiving the first message, and controlling, by the automation device, access to operations of the automation device based on the identifier in the priority list after adding the identifier of the first user device. In some cases, the first message includes an identifier of a first user device and an add command.
    Type: Application
    Filed: October 29, 2018
    Publication date: April 30, 2020
    Inventors: Chirag Manojkumar Kharvar, Jagdeep Kumar Hans, Sourabh Jana
  • Publication number: 20200099657
    Abstract: Methods, systems, and devices for secure recovery from full replay protection lists are described. The method includes receiving, at a second device from a first device in a wireless mesh network, a first message indicating that a replay protection list (RPL) of the first device has reached a defined capacity, determining whether the first device is configured with a fixed RPL or a dynamic RPL based on the first message or a provisioning message received before the first message, sending, from the second device, a second message indicating at least one of an increase of a capacity of the RPL or a set of source addresses to be included in or removed from the RPL based on determining whether the first device is configured with the fixed RPL or dynamic RPL, and receiving, from the first device, an indication that the RPL has been updated based on the second message.
    Type: Application
    Filed: September 20, 2018
    Publication date: March 26, 2020
    Inventors: Chirag Manojkumar Kharvar, Sourabh Jana, Jagdeep Kumar Hans
  • Publication number: 20200084620
    Abstract: Disclosed are techniques for establishing an encrypted connection between a first node and a second node in a wireless mesh network. In an aspect, the first node receives, from a provisioner node in the wireless mesh network, a first value encrypted with a device-specific encryption key known only to the first node and the provisioner node, wherein the second node receives, from the provisioner node, the first value encrypted with a second device-specific encryption key, generates a friendship-specific encryption key based on the first value, an identifier of the first node, and an identifier of the second node, wherein the second node generates the friendship-specific encryption key, sends, to the second node, a first message encrypted with the friendship-specific encryption key, and receives, from the second node, a second message encrypted with the friendship-specific encryption key.
    Type: Application
    Filed: September 7, 2018
    Publication date: March 12, 2020
    Inventors: Sourabh JANA, Chirag Manojkumar KHARVAR, Ravi SHEKHAR
  • Publication number: 20190068489
    Abstract: The disclosure generally relates to using directionality to reduce flooding in a wireless mesh network. In an aspect, a node of the wireless mesh network receives a message for a destination node in the wireless mesh network, determines whether or not the message came from a direction of the destination node, drops the message based on determining that the message came from the direction of the destination node, and forwards the message based on determining that the message did not come from the direction of the destination node.
    Type: Application
    Filed: August 31, 2017
    Publication date: February 28, 2019
    Inventors: Ravi SHEKHAR, Sourabh JANA, Srivathsa SRIDHARA
  • Publication number: 20180343200
    Abstract: The disclosure generally relates to congestion control, message analysis, and other improvements in a wireless mesh network. For example, according to various aspects, one or more devices in the wireless mesh network may be configured as monitoring nodes and a graph representing a message flow path in at least a portion of the wireless mesh network may be generated based at least in part on information related to one or more messages observed at the monitoring nodes. The graph can then be used to identify a path used to relay a message from at least one destination node to at least one source node (e.g., via one or more intermediate nodes). As such, a time-to-live (TTL) value to be used in messages communicated between the source node and the destination node can be appropriately configured based on a hop count between the source node and the destination node.
    Type: Application
    Filed: May 26, 2017
    Publication date: November 29, 2018
    Inventors: Sourabh JANA, Ravi SHEKHAR