Patents by Inventor Anjur Sundaresan Krishnakumar

Anjur Sundaresan Krishnakumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110144985
    Abstract: A method is presented that uses steganographic codeword(s) carried in a speech payload in such a way that (i) the steganographic codeword(s) survive compression and/or transcoding as the payload travels from a transmitter to a receiver across at least one diverse network, and (ii) the embedded steganographic codeword(s) do not degrade the perceived voice quality of the received signal below an acceptable level. The steganographic codewords are combined with a speech payload by summing the amplitude of a steganographic codeword to the amplitude of the speech payload at a relatively low steganographic-to-speech bit rate. Advantageously, the illustrative embodiment of the present invention enables (i) steganographic codewords to be decoded by a compliant receiver and applied accordingly, and (ii) legacy or non-compliant receivers to play the received speech payload with resultant voice quality that is acceptable to listeners even though the steganographic codeword(s) remain in the received speech payload.
    Type: Application
    Filed: February 18, 2010
    Publication date: June 16, 2011
    Applicant: AVAYA INC.
    Inventors: Anjur Sundaresan Krishnakumar, Lawrence O'Gorman
  • Publication number: 20110078383
    Abstract: An apparatus and method for improving performance in high-availability systems are disclosed. In accordance with the illustrative embodiment, pages of memory of a primary system that are to be shadowed are initially copied to a backup system's memory, as well as to a cache in the primary system. A duplication manager process maintains the cache in an intelligent manner that significantly reduces the overhead required to keep the backup system in sync with the primary system, as well as the cache size needed to achieve a given level of performance. Advantageously, the duplication manager is executed on a different processor core than the application process executing transactions, further improving performance.
    Type: Application
    Filed: September 30, 2009
    Publication date: March 31, 2011
    Applicant: AVAYA INC.
    Inventors: Jon Louis Bentley, Frank John Boyle, III, Anjur Sundaresan Krishnakumar, Parameshwaran Krishnan, John H. Meiners, Navjot Singh, Shalini Yajnik
  • Publication number: 20110035749
    Abstract: A method for scheduling the execution of tasks on a processor is disclosed. The purpose of the method is in part to serve the special needs of soft real-time tasks, which are time-sensitive. A parameter ? is an estimate of the amount of time required to execute the task. Another parameter ? is the maximum amount of time that the task is to spend in a queue before being executed. In the illustrative embodiment, the preferred wait time ?i for a newly-arrived task Ti is expected to be met though the insertion of the newly-arrived task Ti into a position k in a queue such that position k respects the task's preferred wait time ?i in light of the expected execution times of the other tasks already in the queue.
    Type: Application
    Filed: January 13, 2010
    Publication date: February 10, 2011
    Applicant: AVAYA INC.
    Inventors: Anjur Sundaresan Krishnakumar, Parameshwaran Krishnan, Min Lee, Navjot Singh, Shalini Yajnik
  • Publication number: 20110035751
    Abstract: The present disclosure is based on a multi-core or multi-processor virtualized environment that comprises both time-sensitive and non-time-sensitive tasks. The present disclosure describes techniques that use a plurality of criteria to choose a processing resource that is to execute tasks. The present disclosure further describes techniques to re-schedule queued tasks from one processing resource to another processing resource, based on a number of criteria. Through load balancing techniques, the present invention both (i) favors the processing of soft real-time tasks arising from media servers and applications, and (ii) prevents “starvation” of the non-real-time general computing applications that co-exist with the media applications in a virtualized environment. These techniques, in the aggregate, favor the processing of soft real-time tasks while also reserving resources for non-real-time tasks.
    Type: Application
    Filed: April 27, 2010
    Publication date: February 10, 2011
    Applicant: AVAYA INC.
    Inventors: Anjur Sundaresan Krishnakumar, Parameshwaran Krishnan, Min Lee, Navjot Singh, Shalini Yajnik
  • Publication number: 20110035752
    Abstract: Methods are disclosed that dynamically improve soft real-time task performance in virtualized computing environments under the management of an enhanced hypervisor comprising a credit scheduler. The enhanced hypervisor analyzes the on-going performance of the domains of interest and of the virtualized data-processing system. Based on the performance metrics disclosed herein, some of the governing parameters of the credit scheduler are adjusted. Adjustments are typically performed cyclically, wherein the performance metrics of an execution cycle are analyzed and, if need be, adjustments are applied in a later execution cycle. In alternative embodiments, some of the analysis and tuning functions are in a separate application that resides outside the hypervisor. The performance metrics disclosed herein include: a “total-time” metric; a “timeslice” metric; a number of “latency” metrics; and a “count” metric.
    Type: Application
    Filed: August 4, 2010
    Publication date: February 10, 2011
    Applicant: AVAYA INC.
    Inventors: Anjur Sundaresan Krishnakumar, Parameshwaran Krishnan, Min Lee, Navjot Singh, Shalini Yajnik
  • Patent number: 7843833
    Abstract: Methods that enable the detection and handling of lost messages during load-balancing routing protocols are disclosed. In accordance with the illustrative embodiment, when a candidate intermediate node N receives a routing-protocol message, node N performs: (1) a first procedure that is capable of detecting some lost routing-protocol messages that were previously transmitted by node N, and (2) a second procedure that is capable of detecting some lost routing-protocol messages that were previously transmitted by a neighbor of node N.
    Type: Grant
    Filed: November 9, 2007
    Date of Patent: November 30, 2010
    Assignee: Avaya Inc.
    Inventors: Anjur Sundaresan Krishnakumar, Parameshwaran Krishnan, Shalini Yajnik, Sameh Gobriel
  • Patent number: 7840698
    Abstract: A technique is disclosed for detecting hidden wireless routers that constitute security threats in telecommunications networks that comprise a wireless network portion and a wireline network portion. In accordance with the illustrative embodiment of the invention, a test station is used in the wireless portion of a network to detect the presence of a hidden wireless router. Furthermore, in some embodiments, a test server is used in the wireline portion of the network in order to detect packets that are illegitimately routed from the wireless portion to the wireline portion of the network through the hidden wireless router.
    Type: Grant
    Filed: January 14, 2004
    Date of Patent: November 23, 2010
    Assignee: Avaya Inc.
    Inventors: Lookman Fazal, Martin Kappes, Anjur Sundaresan Krishnakumar, Sachin Nandkumar Ganu, P Krishnan
  • Patent number: 7760754
    Abstract: A contention-based network which allows real-time traffic to exist as multiple independent linked-list chains or under certain conditions to be assembled into multiple linked-list chains. A time separation is enforced between the various multiple chains, which are limited to a predetermined maximum number of stations that each can have in order to allow non-real-time stations to obtain timely access to the medium. Ones of the multiple chains may also be joined into a single chain. Blackburst contention is used to enable a chain to be reconstituted robustly from non-anticipated interruptions, such as the failure of one of its stations.
    Type: Grant
    Filed: December 15, 2005
    Date of Patent: July 20, 2010
    Assignee: Alcatel-Lucent USA Inc.
    Inventors: Anjur Sundaresan Krishnakumar, Joao Luis Sobrinho
  • Publication number: 20100064345
    Abstract: A method for orchestrating peer authentication during a call (e.g., a telephone call, a conference call between three or more parties, an instant messaging [IM] chat session, etc.) is disclosed. In particular, a user is first authenticated in order to participate in a call (e.g., via entering a password, etc.), and subsequently during the call the user may be peer authenticated. In accordance with the illustrative embodiment, a user who participates in a call might be prompted to authenticate another user on the call based on particular events or user behavior during the call.
    Type: Application
    Filed: September 9, 2008
    Publication date: March 11, 2010
    Applicant: AVAYA INC.
    Inventors: Jon Louis Bentley, Michael J. Sammon, Anjur Sundaresan Krishnakumar, David Mandel Weiss
  • Patent number: 7660591
    Abstract: A method and apparatus for determining a location of a transmitter includes taking a Received Signal Strength (RSSI) measurement at a plurality of locations. Next, a known transmit power is subtracted from each of the RSSI measurements to produce a Propagation Loss Vector (PLV) for each location of the plurality of locations. A model is developed from the PLVs, the model including a plurality of grid points. A candidate Transmit Power Vector (TPV) is produced by subtracting the PLV for a candidate location from the RSSI measurement. Each of the RSSI measurements are matched against each TPV of the model. Once all the grid points have been evaluated, the grid point having a best match is selected as a location of the transmitter.
    Type: Grant
    Filed: September 9, 2005
    Date of Patent: February 9, 2010
    Assignee: Avaya Inc.
    Inventors: Anjur Sundaresan Krishnakumar, Parameshwaran Krishnan, Jay Munro Stiles
  • Publication number: 20090274040
    Abstract: A method and apparatus are disclosed for redirecting traffic associated with an application so that the traffic advantageously traverses (or “hairpins”) through an application-layer gateway. Because the present invention advantageously redirects traffic without any participation by routers, no changes to or replacement of routers in a network is required. The illustrative embodiment is disclosed in the context of Internet telephony, but is also applicable to other kinds of applications and types of communication (e.g., Internet Protocol Television [IPTV], instant messaging [IM], videoconferencing, etc.
    Type: Application
    Filed: May 5, 2008
    Publication date: November 5, 2009
    Applicant: AVAYA TECHNOLOGY LLC
    Inventors: Bengi Karacali-Akyamac, Frank John Boyle III, Mark John Karol, Anjur Sundaresan Krishnakumar, P Krishnan, Jean Meloche
  • Publication number: 20090086940
    Abstract: A technique is disclosed that enables the managing of environmental conditions within an enterprise workplace and, in doing so, provides an improvement in facilities cost management over some techniques in the prior art. A data-processing system such as a private-branch exchange monitors the workplace by using one or more telephones, or other “telecommunications endpoints” to which the exchange is connected, in the workplace area. The exchange determines whether people are present in the workplace area by monitoring which endpoints are in use. Additionally, the exchange monitors the sounds that are received by the microphones of the endpoints. Based on knowing which endpoints are in use, the exchange generates control signals for the purpose of controlling one or more environmental conditions such as temperature, lighting, and so forth. In some embodiments of the present invention, the exchange examines the audio content of the received signals and bases the control signals on the audio content analyzed.
    Type: Application
    Filed: October 2, 2007
    Publication date: April 2, 2009
    Applicant: AVAYA TECHNOLOGY LLC
    Inventors: Eric John Diethorn, Jon Louis Bentley, Anjur Sundaresan Krishnakumar, David Mandel Weiss
  • Publication number: 20090082062
    Abstract: A method is disclosed that enables access to the paired combination of a personal computer and cellular telephone, the access being provided through voice commands from a Bluetooth headset or other type of wireless headset. Through the headset, a user is able to invoke a speech-recognition engine during a call in progress that involves the cell phone with which the personal computer has been paired. The set of phrases that can be recognized by the engine, which is resident at the personal computer, are based on the current call-processing state of the call that is being handled by the paired cell phone. Some of the phrases correspond to commands to retrieve one or more entries from a database, such as one stored at the cell phone. One or more of the commands can be for controlling the cell phone or a softphone application that executes at the personal computer.
    Type: Application
    Filed: September 9, 2008
    Publication date: March 26, 2009
    Applicant: AVAYA INC.
    Inventors: Omer Boyaci, Parameshwaran Krishnan, Anjur Sundaresan Krishnakumar, Shalini Yajnik
  • Publication number: 20090037985
    Abstract: An apparatus and methods are disclosed for performing peer authentication without the assistance of a human “guard.” In accordance with the illustrative embodiments, a peer is selected from a non-empty set of candidates at authentication time based on one or more of the following dynamic properties: the current geo-location of the user to be authenticated; the current geo-locations of the candidates; the current time; the contents of one or more directories (e.g., a telephone directory, an organizational chart or directory, etc.), the contents of one or more call logs; and the candidates' schedules.
    Type: Application
    Filed: August 1, 2007
    Publication date: February 5, 2009
    Applicant: AVAYA TECHNOLOGY LLC
    Inventors: Jon Louis Bentley, Anjur Sundaresan Krishnakumar, David Mandel Weiss
  • Publication number: 20080279343
    Abstract: A telephone of the corded or portable type includes a light source. The light source may or may not have an ability to be pivoted or swiveled to illuminate a desired portion of a room. In the case of a corded telephone, the light source may be detachable from the telephone. The light source may be automatically activated to provide emergency illumination when a power failure condition exists in a building. The light source may also be manually activated to provide a convenient illumination source for the user.
    Type: Application
    Filed: May 11, 2007
    Publication date: November 13, 2008
    Inventors: Jon Bentley, Anjur Sundaresan Krishnakumar, David M. Weiss
  • Publication number: 20080198045
    Abstract: A method is disclosed that enables the transmission of a digital message along with a corresponding media information signal, such as audio or video. A telecommunications device that is processing the information signal from its user, such as a speech signal, encodes the information signal by using a model-based compression coder. One such device is a telecommunications endpoint. Then, based on an evaluation of the perceptual significance of each encoded bit, or on some other meaningful characteristic of the signal, the endpoint's processor: (i) determines which encoded bits can be overwritten; and (ii) intersperses the digital message bits throughout the encoded signal in place of the overwritten bits. The endpoint then transmits those digital message bits as part of the encoded information signal. In this way, no additional bits are appended to the packet to be transmitted, thereby addressing the issue of compatibility with existing protocols and firewalls.
    Type: Application
    Filed: February 15, 2007
    Publication date: August 21, 2008
    Applicant: AVAYA TECHNOLOGY LLC
    Inventors: Akshay Adhikari, Sachin Garg, Anjur Sundaresan Krishnakumar, Navjot Singh
  • Publication number: 20080199009
    Abstract: A method is disclosed that enables the transmission of a digital message along with a corresponding information signal, such as audio or video. The supplemental information contained in digital messages can be used for a variety of purposes, such as enabling or enhancing packet authentication. In particular, a telecommunications device that is processing an information signal from its user, such as a speech signal, encrypts the information signal by performing a bitwise exclusive-or of an encryption key stream with the information signal stream. The device, such as a telecommunications endpoint, then intersperses the bits of the digital message throughout the encrypted signal in place of those bits overwritten, in a process referred to as “watermarking.” The endpoint then transmits the interspersed digital message bits as part of a composite signal that also comprises the encrypted information bits. No additional bits are appended to the packet to be transmitted, thereby addressing compatibility issues.
    Type: Application
    Filed: February 15, 2007
    Publication date: August 21, 2008
    Applicant: AVAYA TECHNOLOGY LLC
    Inventors: Akshay Adhikari, Sachin Garg, Anjur Sundaresan Krishnakumar, Navjot Singh
  • Publication number: 20080144613
    Abstract: A method is disclosed that enables mitigating at least some of the problems caused by a packet attack. When a first Internet Protocol (IP)-capable device is subjected to a packet attack, it indicates periodically to a second IP-capable device that certain communications with the first device are to be suspended. The periodic transmitting of the indication is performed at a slower rate than the keep-alive mechanism that is normally used to detect loss of connectivity. When the second device receives the transmitted indication, it refrains from transmitting keep-alive messages to the first device for a predetermined interval. Meanwhile, the first device also refrains from transmitting keep-alive messages to the second device for a similar interval. In transmitting the suspend indication, the illustrative embodiment seeks to prevent pairs of communicating devices that are experiencing packet attacks from continuing their operation under the erroneous assumption that each device is unavailable.
    Type: Application
    Filed: December 13, 2006
    Publication date: June 19, 2008
    Applicant: AVAYA TECHNOLOGY LLC
    Inventors: Akshay Adhikari, Sachin Garg, Anjur Sundaresan Krishnakumar, Navjot Singh
  • Publication number: 20080148384
    Abstract: A method is disclosed that enables the implementation of an embedded firewall at a telecommunications endpoint. In particular, the illustrative embodiment of the present invention addresses the relationship between the application, firewall engine, and packet-classification rules database that are all resident at the endpoint. In the variations of the illustrative embodiment that are described herein, the application: (i) directly communicates with the co-resident firewall engine such as through local message passing, (ii) shares memory with the firewall engine, and (iii) makes socket calls to the operating system that are intercepted by a middleware layer that subsequently modifies the rules database, depending on the socket call. The common thread to these techniques is that the application, firewall engine, and rules database are co-resident at the endpoint, which is advantageous in the implementation of the embedded firewall.
    Type: Application
    Filed: December 13, 2006
    Publication date: June 19, 2008
    Applicant: Avaya Technology LLC
    Inventors: Akshay Adhikari, Sachin Garg, Anjur Sundaresan Krishnakumar, Navjot Singh
  • Publication number: 20080144499
    Abstract: A method is disclosed that enables the avoidance of a processor overload of a telecommunications endpoint device that is susceptible to traffic floods. An enhanced network switch sets the speed on one of its data ports as a specific function of the speeds of the devices that are connected to one or more of its other data ports. This behavior is different from that of network switches in the prior art, in which the data rate of a port in the prior art is auto-negotiated to the highest speed that can be supported by the network elements at either end of the port's connection, regardless of the other devices present. By considering the specific devices that are connected, the enhanced network switch is able to limit the amount of traffic that is directed by an upstream device, such as a router, towards a device with limited processor capability, such as a packet-based phone.
    Type: Application
    Filed: December 13, 2006
    Publication date: June 19, 2008
    Applicant: AVAYA TECHNOLOGY LLC
    Inventors: Akshay Adhikari, Sachin Garg, Anjur Sundaresan Krishnakumar, Navjot Singh