Patents by Inventor Ganapathy S. Sundaram

Ganapathy S. Sundaram has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9590961
    Abstract: An automated security provisioning protocol is provided for wide area network communication devices in an open device environment, such as cellular communication devices in a machine-to-machine (M2M) environment. For example, a method for performing a security provisioning protocol between a first communication device and a second communication device over at least one wide area communication network comprises the following steps from the perspective of the first communication device. The first communication device automatically uses access information not previously provisioned in the wide area communication network to gain access to the wide area communication network for an initial purpose of communicating with the second communication device.
    Type: Grant
    Filed: July 14, 2009
    Date of Patent: March 7, 2017
    Assignee: Alcatel Lucent
    Inventors: Ganapathy S. Sundaram, Harish Viswanathan
  • Patent number: 9544334
    Abstract: A method for intercepting encrypted communications exchanged between first and second computing devices in a communication network, wherein interception is performed by a third computing device in the computing network. The third computing device obtains one or more packets having a packet address associated with one of the first and second computing devices in response to at least one interception routing policy being implemented in at least one element in the communication network, such that the obtained packets may be decrypted to obtain data contained therein. The third computing device preserves the packet address of the obtained packets and forwards the obtained packets toward a packet-destination one of the first and second computing devices such that the packet-destination one of the first and second computing devices is unable to detect from the one or more packets that the one or more packets were intercepted by the third computing device.
    Type: Grant
    Filed: August 18, 2011
    Date of Patent: January 10, 2017
    Assignee: Alcatel Lucent
    Inventors: John Frederick Heck, Ganapathy S. Sundaram, Douglas William Varney
  • Patent number: 9450928
    Abstract: Automated secure registration techniques for communication devices are provided which address the problem of allowing multiple clients to gain access to one system, and thus provide a solution to the “reverse single sign-on” problem. For example, a method for registering a group of two or more communication devices in a communication network comprises the following steps. A group challenge message is sent from a network device to the group of two or more communication devices. The network device receives one or more response messages to the group challenge respectively from one or more of the group of two or more communication devices, wherein the response message from each of the responding communication devices in the group comprises a group credential corresponding to the group.
    Type: Grant
    Filed: June 10, 2010
    Date of Patent: September 20, 2016
    Assignee: GEMALTO SA
    Inventors: Ioannis Broustis, Ganapathy S. Sundaram, Harish Viswanathan
  • Patent number: 9166778
    Abstract: A method for securing at least one message transferred in a communication system from a first computing device to a second computing device in a peer-to-peer manner. At the first computing device, an identity based authenticated key exchange session is established with a third computing device operating as a peer authenticator. The identity based authenticated key exchange session has an identity based authenticated session key associated therewith. The first computing device obtains from the third computing device a random key component of the second computing device, wherein the random key component of the second computing device is encrypted by the third computing device using the identity based authenticated session key prior to sending the random key component of the second computing device to the first computing device. A peer-to-peer messaging key is computed at the first computing device using the random key component of the second computing device.
    Type: Grant
    Filed: July 13, 2012
    Date of Patent: October 20, 2015
    Assignee: Alcatel Lucent
    Inventors: Ganapathy S. Sundaram, Ioannis Broustis, Violeta Cakulev
  • Patent number: 9106410
    Abstract: A key agreement protocol between a first party and a second party comprises the following steps from the first party perspective. An encrypted first random key component is directed to the second party, the first random key component having been computed at the first party and encrypted using a public key of the second party in accordance with an identity based encryption operation. An encrypted second random key component corresponding to the second party is received. The encrypted second random key component is decrypted using a private key of the first party. A session key for use in subsequent communications between the first party and the second party is computed based at least in part on the second random key component.
    Type: Grant
    Filed: July 1, 2013
    Date of Patent: August 11, 2015
    Assignee: Alcatel Lucent
    Inventor: Ganapathy S. Sundaram
  • Patent number: 9049024
    Abstract: A method for managing a conference between two or more parties comprises an identity based authenticated key exchange between a conference management element and each of the two or more parties seeking to participate in the conference. Messages exchanged between the conference management element and the two or more parties are encrypted based on respective identities of recipients of the messages. The method comprises the conference management element receiving from each party a random group key component. The random group key component is computed by each party based on a random number used by the party during the key authentication operation and random key components computed by a subset of others of the two or more parties seeking to participate in the conference. The conference management element sends to each party the random group key components computed by the parties such that each party can compute the same group key.
    Type: Grant
    Filed: August 28, 2012
    Date of Patent: June 2, 2015
    Assignee: Alcatel Lucent
    Inventors: Ganapathy S. Sundaram, Violeta Cakulev
  • Patent number: 8908865
    Abstract: A single instance of a session key generation protocol is executed in a manner that generates a plurality of security associations between user equipment and a first network element of a communication system. In one aspect, a first one of the security associations is utilized to secure data sent between the user equipment and the first network element in an ongoing communication. In conjunction with a handoff of the ongoing communication from the first network element to a second network element of the communication system, another one of the security associations is selected, and the other selected security association is utilized to secure data sent between the user equipment and the second network element in the ongoing communication. The security associations may comprise respective sets of session keys derived from a single pairwise master key.
    Type: Grant
    Filed: May 23, 2014
    Date of Patent: December 9, 2014
    Assignee: Alcatel Lucent
    Inventors: Violeta Cakulev, Semyon B. Mizikovsky, Ganapathy S. Sundaram
  • Patent number: 8850203
    Abstract: Principles of the invention provide one or more secure key management protocols for use in communication environments such as a media plane of a multimedia communication system. For example, a method for performing an authenticated key agreement protocol, in accordance with a multimedia communication system, between a first party and a second party comprises, at the first party, the following steps. Note that encryption/decryption is performed in accordance with an identity based encryption operation. At least one private key for the first party is obtained from a key service. A first message comprising an encrypted first random key component is sent from the first party to the second party, the first random key component having been computed at the first party, and the first message having been encrypted using a public key of the second party.
    Type: Grant
    Filed: August 28, 2009
    Date of Patent: September 30, 2014
    Assignee: Alcatel Lucent
    Inventors: Ganapathy S. Sundaram, Violeta Cakulev
  • Publication number: 20140254794
    Abstract: A single instance of a session key generation protocol is executed in a manner that generates a plurality of security associations between user equipment and a first network element of a communication system. In one aspect, a first one of the security associations is utilized to secure data sent between the user equipment and the first network element in an ongoing communication. In conjunction with a handoff of the ongoing communication from the first network element to a second network element of the communication system, another one of the security associations is selected, and the other selected security association is utilized to secure data sent between the user equipment and the second network element in the ongoing communication. The security associations may comprise respective sets of session keys derived from a single pairwise master key.
    Type: Application
    Filed: May 23, 2014
    Publication date: September 11, 2014
    Applicant: Alcatel-Lucent USA Inc.
    Inventors: Violeta Cakulev, Semyon B. Mizikovsky, Ganapathy S. Sundaram
  • Patent number: 8774411
    Abstract: A single instance of a session key generation protocol is executed in a manner that generates a plurality of security associations between user equipment and a first network element of a communication system. In one aspect, a first one of the security associations is utilized to secure data sent between the user equipment and the first network element in an ongoing communication. In conjunction with a handoff of the ongoing communication from the first network element to a second network element of the communication system, another one of the security associations is selected, and the other selected security association is utilized to secure data sent between the user equipment and the second network element in the ongoing communication. The security associations may comprise respective sets of session keys derived from a single pairwise master key.
    Type: Grant
    Filed: May 29, 2009
    Date of Patent: July 8, 2014
    Assignee: Alcatel Lucent
    Inventors: Violeta Cakulev, Semyon B. Mizikovsky, Ganapathy S. Sundaram
  • Patent number: 8769288
    Abstract: Techniques are disclosed for discovering security associations formed in communication environments. For example, a method for forming a discoverable security association between a first computing device (e.g., a first client) and a second computing device (e.g., a second client) comprises the following steps. The first computing device is provided with a seed that is used by the first computing device to generate a secret that is used by the first computing device to compute a key for use in securing communications with the second computing device. The secret is re-computable based on knowledge of the seed and the key is re-computable based on knowledge of the secret such that a third computing device (e.g., an intercepting server) can use the re-computed key to intercept communications between the first computing device and the second computing device unbeknownst to the first computing device and the second computing device.
    Type: Grant
    Filed: April 29, 2011
    Date of Patent: July 1, 2014
    Assignee: Alcatel Lucent
    Inventors: Ganapathy S. Sundaram, Semyon B. Mizikovsky
  • Patent number: 8667151
    Abstract: In one embodiment, a method of the invention has the steps of: (A) establishing an access-layer security association (SA) between a mobile node (MN) and an authentication authorization accounting (AAA) server; (B) deriving a secondary key from an extended master session key (EMSK) corresponding to the access-layer SA; (C) providing the secondary key to a home agent; and (D) based on the secondary key, establishing an SA corresponding to an Open System Interconnection (OSI) layer higher than the access layer for securing communications between the home agent and a selected network node. In various embodiments, the selected network node can be (i) the MN, (ii) a proxy node configured on behalf of the MN, or (iii) a proxy node configured on behalf of the home agent.
    Type: Grant
    Filed: August 9, 2007
    Date of Patent: March 4, 2014
    Assignee: Alcatel Lucent
    Inventors: Semyon B. Mizikovsky, Ganapathy S. Sundaram, Zhibi Wang
  • Publication number: 20130297939
    Abstract: A key agreement protocol between a first party and a second party comprises the following steps from the first party perspective. An encrypted first random key component is directed to the second party, the first random key component having been computed at the first party and encrypted using a public key of the second party in accordance with an identity based encryption operation. An encrypted second random key component corresponding to the second party is received. The encrypted second random key component is decrypted using a private key of the first party. A session key for use in subsequent communications between the first party and the second party is computed based at least in part on the second random key component.
    Type: Application
    Filed: July 1, 2013
    Publication date: November 7, 2013
    Applicant: Alcatel-Lucent USA, Inc.
    Inventor: Ganapathy S. Sundaram
  • Patent number: 8510558
    Abstract: A key agreement protocol between a first party and a second party comprises the following steps from the first party perspective. An encrypted first random key component is sent to the second party, the first random key component being encrypted using a public key of the second party in accordance with an identity based encryption operation. An encrypted random key component pair is received from the second party, the random key component pair being formed from the first random key component and a second random key component computed at the second party, and encrypted at the second party using a public key of the first party in accordance with the identity based encryption operation. The second random key component, in encrypted form, is sent to the second party, the second random key component being encrypted using the public key of the second party.
    Type: Grant
    Filed: February 17, 2009
    Date of Patent: August 13, 2013
    Assignee: Alcatel Lucent
    Inventor: Ganapathy S. Sundaram
  • Publication number: 20130182848
    Abstract: A method for securing at least one message transferred in a communication system from a first computing device to a second computing device in a peer-to-peer manner. At the first computing device, an identity based authenticated key exchange session is established with a third computing device operating as a peer authenticator. The identity based authenticated key exchange session has an identity based authenticated session key associated therewith. The first computing device obtains from the third computing device a random key component of the second computing device, wherein the random key component of the second computing device is encrypted by the third computing device using the identity based authenticated session key prior to sending the random key component of the second computing device to the first computing device. A peer-to-peer messaging key is computed at the first computing device using the random key component of the second computing device.
    Type: Application
    Filed: July 13, 2012
    Publication date: July 18, 2013
    Applicant: Alcatel-Lucent USA Inc.
    Inventors: Ganapathy S. Sundaram, Ioannis Broustis, Violeta Cakulev
  • Publication number: 20130110920
    Abstract: Techniques are disclosed for establishing network-assisted secure communications in a peer-to-peer environment. For example, a method for secure communications comprises the following steps. A first computing device provides connectivity information associated therewith to a network server. The first computing device receives connectivity information respectively associated with one or more other computing devices from the network server. The first computing device, independent of the network server, establishes a security association with at least one of the one or more other computing devices. The first computing device, independent of the network server, participates in a secure peer-to-peer session with the at least one other computing device.
    Type: Application
    Filed: October 27, 2011
    Publication date: May 2, 2013
    Applicant: Alcatel-Lucent USA Inc.
    Inventors: Ioannis Broustis, Ganapathy S. Sundaram
  • Publication number: 20120322416
    Abstract: A method for managing a conference between two or more parties comprises an identity based authenticated key exchange between a conference management element and each of the two or more parties seeking to participate in the conference. Messages exchanged between the conference management element and the two or more parties are encrypted based on respective identities of recipients of the messages. The method comprises the conference management element receiving from each party a random group key component. The random group key component is computed by each party based on a random number used by the party during the key authentication operation and random key components computed by a subset of others of the two or more parties seeking to participate in the conference. The conference management element sends to each party the random group key components computed by the parties such that each party can compute the same group key.
    Type: Application
    Filed: August 28, 2012
    Publication date: December 20, 2012
    Applicant: Alcatel-Lucent USA Inc.
    Inventors: Ganapathy S. Sundaram, Violeta Cakulev
  • Publication number: 20120287922
    Abstract: Techniques are disclosed for lawfully intercepting information in communication environments with end-to-end encryption. For example, a method for intercepting encrypted communications exchanged between a first computing device and a second computing device in a communication network, wherein the interception is performed by a third computing device in the communication network, comprises the following steps. The third computing device obtains one or more packets having a packet address associated with one of the first computing device and the second computing device. The one or more packets are obtained by the third computing device, in response to at least one interception routing policy being implemented in at least one element in the communication network, such that the one or more obtained packets may be decrypted so as to obtain data contained therein. The third computing device preserves the packet address of the one or more obtained packets.
    Type: Application
    Filed: August 18, 2011
    Publication date: November 15, 2012
    Inventors: John Frederick Heck, Ganapathy S. Sundaram, Douglas William Varney
  • Patent number: 8300584
    Abstract: A method is provided for scheduling transmission resources to a mobile station served by a plurality of base stations. According to the method of the invention, feedback information respecting data received by the mobile station from each of at least two of the plurality of base stations is received by the each of the plurality of base stations. An inference is then drawn at a second of the plurality of base stations of throughput parameters respecting a transmission channel between a first of the plurality of base stations and the mobile station. Transmission resources for the mobile station are then scheduled by the second base station as a function of the inferred throughput parameters.
    Type: Grant
    Filed: May 30, 2009
    Date of Patent: October 30, 2012
    Assignee: Alcatel Lucent
    Inventors: Ashok N. Rudrapatna, Ganapathy S. Sundaram, Subramanian Vasudevan, Jialin Zou
  • Patent number: 8301883
    Abstract: A method for managing a conference between two or more parties comprises an identity based authenticated key exchange between a conference management element and each of the two or more parties seeking to participate in the conference. Messages exchanged between the conference management element and the two or more parties are encrypted based on respective identities of recipients of the messages. The method comprises the conference management element receiving from each party a random group key component. The random group key component is computed by each party based on a random number used by the party during the key authentication operation and random key components computed by a subset of others of the two or more parties seeking to participate in the conference. The conference management element sends to each party the random group key components computed by the parties such that each party can compute the same group key.
    Type: Grant
    Filed: August 28, 2009
    Date of Patent: October 30, 2012
    Assignee: Alcatel Lucent
    Inventors: Ganapathy S. Sundaram, Violeta Cakulev