Patents by Inventor Amit A. BAPAT

Amit A. BAPAT has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240172305
    Abstract: An apparatus for wireless communication, the apparatus configured to configured to receive a RRC reconfiguration request associated with CA; perform a first set of RRC reconfiguration operations associated with a first set of physical layer parameters in response to the RRC reconfiguration request; transmit, based on completing performing the first set of RRC reconfiguration operations, an RRC reconfiguration complete indication; and perform, after transmitting the RRC reconfiguration complete indication, a second set of RRC reconfiguration operations associated with a second set of parameters other than the first set of physical layer parameters. In certain aspects, the apparatus may be configured to schedule, in response to the RRC reconfiguration request, at least one gap in uplink transmission and downlink reception via a PCC to coincide with one or more time periods based on a known configuration for communication with a network node associated with the carrier aggregation.
    Type: Application
    Filed: November 23, 2022
    Publication date: May 23, 2024
    Inventors: Kiran PATIL, Amit MANDIL, Dileep BAPAT, Ajay Vignesh JAYAPRAKASH, Varun NUGGEHALLI ASHOK, Jeongho SEO, Gurmeet Singh KUMAR, Sushmita Suresh RAO
  • Publication number: 20230093731
    Abstract: Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a system of the service provider receives a request to generate a data encryption policy (DEP) for data stored by the system of the service provider for a customer, the request including a reference to a customer key and an availability key. The customer key and the availability key are root keys for encrypting a data encryption key. The data encryption key is used to encrypt the data stored by the service provider for the customer. Further, destructive changes to the availability key require receiving an approval from an account of the service provider. The system of the service provider validates the DEP. The system of the service provider stores the DEP based on the validation.
    Type: Application
    Filed: November 28, 2022
    Publication date: March 23, 2023
    Inventors: Anuj DHAWAN, Brijesh Bhupendra DESAI, Kameshwar JAYARAMAN, Ayla KOL, Amit A. BAPAT, Qi CAO, Steven Jay LIEBERMAN, Ganesh PANDEY, Parul MANEK
  • Patent number: 11520918
    Abstract: Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a of the service provider receives a request to generate a data encryption policy (DEP) for data stored by the of the service provider for a customer, the request including a reference to a customer key and an availability key. The customer key and the availability key are root keys for encrypting a data encryption key. The data encryption key is used to encrypt the data stored by the service provider for the customer. Further, destructive changes to the availability key require receiving an approval from an account of the service provider. The of the service provider validates the DEP. The of the service provider stores the DEP based on the validation.
    Type: Grant
    Filed: February 3, 2021
    Date of Patent: December 6, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Anuj Dhawan, Brijesh Bhupendra Desai, Kameshwar Jayaraman, Ayla Kol, Amit A. Bapat, Qi Cao, Steven Jay Lieberman, Ganesh Pandey, Parul Manek
  • Publication number: 20220245268
    Abstract: Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a system of the service provider receives a request to generate a data encryption policy (DEP) for data stored by the system of the service provider for a customer, the request including a reference to a customer key and an availability key. The customer key and the availability key are root keys for encrypting a data encryption key. The data encryption key is used to encrypt the data stored by the service provider for the customer. Further, destructive changes to the availability key require receiving an approval from an account of the service provider. The system of the service provider validates the DEP. The system of the service provider stores the DEP based on the validation.
    Type: Application
    Filed: February 3, 2021
    Publication date: August 4, 2022
    Inventors: Anuj Dhawan, Brijesh Bhupendra DESAI, Kameshwar JAYARAMAN, Ayla KOL, Amit A. BAPAT, Qi CAO, Steven Jay LIEBERMAN, Ganesh PANDEY, Parul MANEK