Patents by Inventor Anush G. Nadathur

Anush G. Nadathur has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170359190
    Abstract: An automated environment can include multiple controller devices capable of communicating with multiple accessory devices. The controller devices can automatically elect one of their number as a coordinator device for the environment and can automatically perform a new election if an incumbent coordinator becomes unavailable or resigns. The election processes can be transparent to any users. An elected coordinator can perform various operations to facilitate management of the automated environment, including routing of communications between controllers and accessories.
    Type: Application
    Filed: September 23, 2016
    Publication date: December 14, 2017
    Applicant: Apple Inc.
    Inventors: Anush G. Nadathur, Srinivas Rama, Matthew C. Lucas, Nathan E. Carroll, Kevin P. McLaughlin, Thomas A. Dilligan, Arun G. Mathias
  • Publication number: 20170359423
    Abstract: An integrated accessory control system can efficiently set up a new media streaming session with one or more accessories. A session identifier for the new session, as well as a destination address and security parameters can be generated. A data object comprising the generated elements can be written to a resource location. Additionally, a second data object comprising the session identifier, a streaming source address, a source identifier, and additional security parameters can be read from the resource location. A third data object comprising the session identifier, a session start command, and codec parameters can then be generated. The third data object can also be written to the resource location. Further, streamed media data conforming to the codec parameters and the security parameters may be received.
    Type: Application
    Filed: September 23, 2016
    Publication date: December 14, 2017
    Applicant: Apple Inc.
    Inventors: Anush G. Nadathur, Christopher M. Garrido, Vinay A. Ramaswamy, Karthick Santhanam, Joe S. Abuan, Kevin P. McLaughlin, Srinivas Rama, Ming Jin, Hsien-Po Shiang, Wenhui Xu
  • Publication number: 20170359555
    Abstract: An integrated accessory control system can integrate functionality (services) of multiple disparate accessories and provide a unified user interface for interacting with the system via a controller device. An integrated accessory control system can include one accessory that can detect an event or action and send a notification to the controller device and at least one other accessory, such as an IP camera, that can be operated in response to the notification. In response to the notification, a controller device can generate an integrated user interface for interacting with the accessories in the integrated accessory control system. The interface can include a live feed from the IP camera, which can provide a media stream responsive to instructions from the controller.
    Type: Application
    Filed: September 23, 2016
    Publication date: December 14, 2017
    Applicant: Apple Inc.
    Inventors: Cyrus D. Irani, Kevin P. McLaughlin, Anush G. Nadathur, Arun G. Mathias, Vinay A. Ramaswamy, Christopher D. Soli, Patrick L. Coffman, Stephen O. Lemay
  • Publication number: 20170359314
    Abstract: A data transfer process can include multiple verification features usable by a “source” device to ensure that a “destination” device is authorized to receive a requested data object. The source device and destination device can communicate via a first communication channel (which can be on a wide-area network) to exchange public keys, then use the public keys to verify their identities and establish a secure session on a second communication channel (which can be a local channel). The data object can be transferred via the secure session. Prior to sending the data object, the source device can perform secondary verification operations (in addition to the key exchange) to confirm the identity of the second device and/or the locality of the connection on the second communication channel.
    Type: Application
    Filed: September 23, 2016
    Publication date: December 14, 2017
    Applicant: Apple Inc.
    Inventors: Arun G. Mathias, Thomas A. Dilligan, Matthew C. Lucas, Anush G. Nadathur, Kevin P. McLaughlin
  • Publication number: 20170346630
    Abstract: A relay service can relay messages between controllers and electronically controllable accessory devices that may be located remotely from the controllers. Relaying of messages by the relay service can be decoupled from any knowledge of the functionality of the accessory or the content of the messages. Device identification and relaying of messages can be managed using “relay aliases” that are meaningful only to the relay service and the endpoint devices (the controller and accessory). The endpoint devices can implement end-to-end security for messages transported by the relay service.
    Type: Application
    Filed: June 9, 2017
    Publication date: November 30, 2017
    Applicant: Apple Inc.
    Inventors: Anush G. Nadathur, Gokul P. Thirumalai, Kevin P. McLaughlin, Matthew C. Lucas, Andrew Burks
  • Publication number: 20170201499
    Abstract: A controller and an accessory controllable by the controller can communicate using secure read and write procedures. The procedures can include encrypting identifiers of accessory characteristics targeted by a read or write operation as well as any data being read or written. The procedures can also include the accessory returning a cryptographically signed response verifying receipt and execution of the read or write instruction. In some instances, a write procedure can be implemented as a timed write in which a first instruction containing the write data is sent separately from a second instruction to execute the write operation; the accessory can disregard the write data if the second instruction is not received within a timeout period after receiving the first instruction.
    Type: Application
    Filed: January 6, 2017
    Publication date: July 13, 2017
    Applicant: Apple Inc.
    Inventors: Kevin P. McLaughlin, Anush G. Nadathur, Matthew C. Lucas, Srinivas Rama, Dennis Mathews
  • Patent number: 9680646
    Abstract: A relay service can relay messages between controllers and electronically controllable accessory devices that may be located remotely from the controllers. Relaying of messages by the relay service can be decoupled from any knowledge of the functionality of the accessory or the content of the messages. Device identification and relaying of messages can be managed using “relay aliases” that are meaningful only to the relay service and the endpoint devices (the controller and accessory). The endpoint devices can implement end-to-end security for messages transported by the relay service.
    Type: Grant
    Filed: March 8, 2016
    Date of Patent: June 13, 2017
    Assignee: Apple Inc.
    Inventors: Anush G. Nadathur, Gokul P. Thirumalai, Kevin P. McLaughlin, Matthew C. Lucas, Andrew Burks
  • Publication number: 20170033944
    Abstract: Execution of a trigger (or triggered action set) can be delegated by an owner device to a delegate device. The delegate device can assume responsibility for executing the trigger without further communication from the owner device. The owner device can monitor the status of the delegate device; if the delegate device enters a state in which it is presumed to be unavailable to execute the trigger, the owner device can resume the responsibility for executing the trigger.
    Type: Application
    Filed: June 12, 2016
    Publication date: February 2, 2017
    Applicant: Apple Inc.
    Inventors: Anush G. Nadathur, Kevin P. McLaughlin, Nathan E. Carroll
  • Publication number: 20160359629
    Abstract: A relay service can relay messages between controllers and electronically controllable accessory devices that may be located remotely from the controllers. Relaying of messages by the relay service can be decoupled from any knowledge of the functionality of the accessory or the content of the messages. Device identification and relaying of messages can be managed using “relay aliases” that are meaningful only to the relay service and the endpoint devices (the controller and accessory). The endpoint devices can implement end-to-end security for messages transported by the relay service.
    Type: Application
    Filed: March 8, 2016
    Publication date: December 8, 2016
    Applicant: Apple Inc.
    Inventors: Anush G. Nadathur, Gokul P. Thirumalai, Kevin P. McLaughlin, Matthew C. Lucas, Andrew Burks
  • Publication number: 20150351145
    Abstract: Controllers can be used to control the operation of various accessories. Controllers with access to a particular accessory (or group of accessories) can be organized into a controller network to facilitate control. The controller network can include various proxy devices including bridge and tunnel proxies that can relay messages to and from accessories, perform protocol translations, and/or provide communication security. Some proxy devices can include decision logic to enable coordinated control over one or more accessories by the controllers in the controller network.
    Type: Application
    Filed: May 29, 2015
    Publication date: December 3, 2015
    Applicant: Apple Inc.
    Inventors: Andrew Burks, Anush G. Nadathur, Srinivas Rama, Kevin P. McLaughlin, Joe Abuan, Dennis Mathews, Matthew C. Lucas
  • Publication number: 20150350031
    Abstract: Controllers can be used to control the operation of various accessories. A group of accessories can be organized into an accessory network that can facilitate coordinated control of multiple accessories. The accessory network can be organized according to an environment model that can include a hierarchical representation of a physical environment where accessories are present. The environment model can be synchronized across different controllers that have access to the accessories.
    Type: Application
    Filed: May 29, 2015
    Publication date: December 3, 2015
    Applicant: Apple Inc.
    Inventors: Andrew Burks, Anush G. Nadathur, Srinivas Rama, Kevin P. McLaughlin, Joe Abuan, Harlan Haskins
  • Patent number: 9148847
    Abstract: A method for implementing mobile device-initiated inter-radio access technology (I-RAT) handovers between networks includes a wireless device communicating with a first network using an internet protocol (IP) address that was received from the first network during an initial attachment procedure. The wireless device may initiate an I-RAT handover procedure to connect to a second wireless network using a configuration message that includes a handover attach type. Once the connection with the second network is established, the wireless device may receive the information from the second wireless network using the same IP address. The wireless device may force the wireless device into dormancy and prevent data transfer, and initiate another I-RAT handover procedure to upgrade and connect to the first network, by sending an attach request message that includes a handover attach type.
    Type: Grant
    Filed: September 11, 2012
    Date of Patent: September 29, 2015
    Assignee: Apple Inc.
    Inventors: Abhishek Sen, Anush G. Nadathur, Madhusudan Chaudhary, Matthew S. Klahn, Sang Ho Baek, Vikram B. Yerrabommanahalli
  • Publication number: 20130279470
    Abstract: A method for implementing mobile device-initiated inter-radio access technology (I-RAT) handovers between networks includes a wireless device communicating with a first network using an internet protocol (IP) address that was received from the first network during an initial attachment procedure. The wireless device may initiate an I-RAT handover procedure to connect to a second wireless network using a configuration message that includes a handover attach type. Once the connection with the second network is established, the wireless device may receive the information from the second wireless network using the same IP address. The wireless device may force the wireless device into dormancy and prevent data transfer, and initiate another I-RAT handover procedure to upgrade and connect to the first network, by sending an attach request message that includes a handover attach type.
    Type: Application
    Filed: September 11, 2012
    Publication date: October 24, 2013
    Inventors: Abhishek Sen, Anush G. Nadathur, Madhusudan Chaudhary, Matthew S. Klahn, Sang Ho Baek, Vikram B. Yerrabommanahalli