Patents by Inventor Hemant Chaskar
Hemant Chaskar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20060058062Abstract: According to an embodiment of the present invention, security exposure analysis of wireless network within a selected local geographic area is provided. A computer model of the selected local geographic region comprising a layout is generated. Information regarding wireless network components is provided to the computer model. Using the computer model, signal intensity characteristics of at least one of the wireless network components are determined over at least a portion of the selected geographic region. Based at least on the signal intensity characteristics, security exposure information associated with the wireless network is determined. The security exposure information is graphically displayed on the computer screen in relation to the layout of the selected geographic region. The security exposure information includes sniffer detection and prevention coverage, access point vulnerability regions, and signal uncertainty and variability views.Type: ApplicationFiled: February 11, 2005Publication date: March 16, 2006Applicant: AirTight Networks, Inc. (FKA Wibhu Technologies, Inc.)Inventors: Pravin Bhagwat, Hemant Chaskar, Gopinath Krishnamurthy
-
Patent number: 7002943Abstract: A method for monitoring a selected region of an airspace associated with local area networks of computing devices is provided. The method includes providing one or more segments of a legacy local area network to be protected in a selected geographic region. The legacy local area network is characterized by an unsecured airspace within the selected geographic region. The method includes determining a security policy associated with the one or more segments of the legacy local area network. The security policy at least characterizes a type of wireless activity in the unsecured airspace to be permitted, denied, or ignored. Additionally, the method includes connecting one or more sniffer devices into the legacy local area network. The one or more sniffer devices are spatially disposed within the selected geographic region to cause at least a portion of the unsecured airspace to be secured according to the security policy.Type: GrantFiled: October 15, 2004Date of Patent: February 21, 2006Assignee: AirTight Networks, Inc.Inventors: Pravin Bhagwat, Hemant Chaskar, David C. King, Jai Rawat
-
Publication number: 20060034256Abstract: A system is provided that includes a network entity, such as a packet data switching node (PDSN), and a terminal capable of establishing a data-link connection with the network entity, such as after setting up a physical-layer connection with the network entity. After the data-link connection is established, the network entity and the terminal can configure a network-layer protocol such that data formatted in accordance with the network-layer protocol can thereafter be sent between the terminal and the network entity over the data-link connection. Then, during configuration of the network-layer protocol, the terminal can discover at least one service available to the terminal by receiving, from the network entity, a listing of the at least one available service. The listing of each available service includes an address of a provider of the available service and a port number and/or pathname for accessing the service at the provider.Type: ApplicationFiled: August 13, 2004Publication date: February 16, 2006Applicant: Nokia CorporationInventors: Sreenivas Addagatla, Sarvesh Asthana, Jagadish Maturi, Hemant Chaskar
-
Publication number: 20050195753Abstract: A system and method is provided for detecting wireless access devices coupled to local area network of computers. The method includes coupling a sniffer device to a local area network. The method includes transferring one or more packets to be directed to a selected device over the local area network. The selected device is preferably coupled to the local area network. The method includes intercepting the one or more packets to be directed to the selected device at the sniffer device. Moreover, the method includes deriving information from the intercepted one or more packets using the sniffer device. The method can generate one or more marker packets in a selected format using the sniffer device. The marker packets are provided based upon at least a portion of the information derived from the intercepted packets.Type: ApplicationFiled: December 29, 2004Publication date: September 8, 2005Applicant: AirTight Networks, Inc. (F/K/A Wibhu Technologies, Inc.)Inventors: Hemant Chaskar, Murthy Jonnalagadda, Sharad Mittal, Pravin Bhagwat
-
Publication number: 20050185664Abstract: Disclosed are a method and a system that operates in accordance with the method to set up a TCP session between a MS and an end point destination via a wireless network and the Internet. The method includes sending a split TCP connection request from the MS to a PEP located in the network, where the split TCP request includes information for identifying a network address of the MS and a network address of the end point destination. The method further includes, in response to receiving the split TCP connection request from the MS, establishing a split TCP connection that includes a wireless TCP (WTCP) connection between the MS and the PEP, and a TCP connection at least part way between the PEP and the end point destination. In one embodiment the end point destination is an application server that is coupled to the Internet, and the TCP connection is established between the PEP and the application server.Type: ApplicationFiled: February 25, 2004Publication date: August 25, 2005Inventors: Hemant Chaskar, Govind Krishnamurthi
-
Publication number: 20050130659Abstract: A method for ensuring continuity of a communication session when a user equipment hands over from a first communication network to a second cellular communication network is provided. The method, in one embodiment, includes the steps of performing an authentication procedure for a packet data session with the second network while still being attached to the first network and simultaneously performing a packet data session establishment procedure with the second network while still being attached to the first network.Type: ApplicationFiled: January 30, 2004Publication date: June 16, 2005Inventors: Sandro Grech, Pedro Serna, Govindarajan Krishnamurthi, Hemant Chaskar, Dirk Trossen, Leopoldo Alarcon
-
Publication number: 20050128989Abstract: A method for monitoring a selected region of an airspace associated with local area networks of computing devices is provided. The method includes providing one or more segments of a legacy local area network to be protected in a selected geographic region. The legacy local area network is characterized by an unsecured airspace within the selected geographic region. The method includes determining a security policy associated with the one or more segments of the legacy local area network. The security policy at least characterizes a type of wireless activity in the unsecured airspace to be permitted, denied, or ignored. Additionally, the method includes connecting one or more sniffer devices into the legacy local area network. The one or more sniffer devices are spatially disposed within the selected geographic region to cause at least a portion of the unsecured airspace to be secured according to the security policy.Type: ApplicationFiled: October 15, 2004Publication date: June 16, 2005Applicant: AirTight Networks, IncInventors: Pravin Bhagwat, Hemant Chaskar, David King, Jai Rawat
-
Publication number: 20050125493Abstract: Provided are improved systems, methods, and devices for IP-based location service (LCS). Using one or more IP-based protocols for LCS signaling efficiently re-uses existing, implemented, and reliable protocols and increases the robustness of the LCS signaling. Particular implementations of LCS messaging call flows make efficient use of wireless bandwidths and support IP-based LCS by organizing communications and signaling to limit required communications so that IP-based protocols may be used, rather than relying upon SS7 signaling and LCS-specific communication protocols.Type: ApplicationFiled: November 12, 2004Publication date: June 9, 2005Inventors: Hemant Chaskar, Margaret Livingston, Sreenivas Addagatla
-
Patent number: 6898205Abstract: A technique for selecting the offset between data bursts and their respective control packets in an optical burst switching arrangement includes: randomly generating a plurality of tokens; receiving a plurality of sequentially generated data bursts; and receiving a plurality of control packets, each control packet corresponding to a respective one of the plurality of data bursts. One of the plurality of control packets is first outputted and its corresponding respective data burst is then outputted at a time corresponding to the generation of the first of the plurality of tokens which occurs at a time in which no data burst is being outputted, the outputting of the data burst being offset from the output of its corresponding respective control packet by a time period. The average rate at which the plurality of data bursts are outputted may be equal to the reciprocal of the mean of the probability distribution used to generate the plurality of tokens.Type: GrantFiled: May 3, 2000Date of Patent: May 24, 2005Assignee: Nokia, Inc.Inventors: Hemant Chaskar, Sanjeev Verma, Rayaclurgam Ravikanth, Sudir Dixit
-
Publication number: 20050105491Abstract: An apparatus and method is provided for facilitating the seamless handoff of IP connections between access routers in an IP network. The mobile IP network includes two or more access routers each serving a different geographic service area. When a mobile terminal moves from the first service area to the second service area, the mobile terminal transmits to the second access router the IP address of the previous access router. The second access router uses this information to learn capabilities of the first access router (e.g., bandwidths supported, security schemes, and the like) for use in future handoff decisions, and exchanges capability information with the first access router. The assumption is made based on the exchanged information that the access routers are geographically proximate.Type: ApplicationFiled: December 22, 2004Publication date: May 19, 2005Applicant: Nokia, Inc.Inventors: Hemant Chaskar, Dirk Trossen, Govind Krishnamurthi
-
Publication number: 20050100030Abstract: An apparatus and method is provided for facilitating the seamless handoff of IP connections between access routers in an IP network. The mobile IP network includes two or more access routers each serving a different geographic service area. When a mobile terminal moves from the first service area to the second service area, the mobile terminal transmits to the second access router the IP address of the previous access router. The second access router uses this information to learn capabilities of the first access router (e.g., bandwidths supported, security schemes, and the like) for use in future handoff decisions, and exchanges capability information with the first access router. The assumption is made based on the exchanged information that the access routers are geographically proximate.Type: ApplicationFiled: December 22, 2004Publication date: May 12, 2005Applicant: Nokia, Inc.Inventors: Hemant Chaskar, Dirk Trossen, Govind Krishnamurthi
-
Publication number: 20050078652Abstract: Apparatus, and an associated method, for facilitating implementation of a location service in a radio communication system. When a location service is initiated, a network-based entity is alerted to the service initiation. The network-based entity generates a message to inquire of network-based information that facilitates the location determination of the mobile station pursuant to the location service. When the information is obtained, the information is forwarded to the mobile station. The information is used at the mobile station to facilitate the effectuation of the location service.Type: ApplicationFiled: August 20, 2004Publication date: April 14, 2005Inventors: Jean-Michel Rousseau, Hemant Chaskar
-
Publication number: 20050066044Abstract: An Internet protocol (IP) based location system that employs a global positioning system (GPS) component in connection with a position determining entity (PDE) component to determine location of target mobile station(s) via the Internet. As such the system provides an internet protocol based scheme (e.g., UDP) to initiate a location determination session within a CDMA network. The system can provide a location determining service even when the mobile station(s) are not within a home network (e.g., roaming situations). The system can also employ HTTP over TCP/IP so as to facilitate communications between the mobile station(s) and a mobile positioning center (MPC) (e.g., authentication and/or security protocols/schemes). Furthermore, the system can identify a PDE of a plurality of available PDEs that is most suitable for a given state of the mobile station and/or state of the user and/or particular location based application being employed by the mobile station.Type: ApplicationFiled: June 30, 2003Publication date: March 24, 2005Inventors: Hemant Chaskar, Jean-Michel Rousseau, Poornima Lalwaney
-
Publication number: 20040224702Abstract: A system and method are provided for access controlled delivery of location information. The system includes a mobile station, a location services client, and a location server. The mobile station is capable of receiving consent to deliver location information regarding the mobile station and, if consent is granted, automatically creating an authorization. After creating the authorization, the location services client is capable of receiving the authorization. The location services client can then transmit a request for the location information, where the request includes the authorization. The location server, in turn, can verify the authorization. After the authorization has been verified, the location server can deliver the location information to the location services client if the authorization is verified.Type: ApplicationFiled: May 9, 2003Publication date: November 11, 2004Applicant: Nokia CorporationInventor: Hemant Chaskar
-
Publication number: 20040090937Abstract: A method, system and computer program are disclosed to perform a low latency inter-technology handoff of a MN from a WLAN to a cellular network. The method includes transmitting a Bearer Context from the MN for use by the cellular network, the Bearer Context containing information required to establish access network bearers in the cellular network for an ongoing Internet session of the MN; and responding to the Bearer Context with a Router Advertisement that is forwarded to the MN. The Bearer Context may be piggybacked on another message, or it may be sent as a separate message. The Bearer Context includes information expressive of: (a) a QoS requirement of an ongoing application or applications of the MN; (b) a unique identity of the MN that is recognizable by the cellular network; (c) parameters to facilitate the creation of a Point-to-Point Protocol state in the cellular network; and (d) parameters to enable establishment of packet filters in the cellular network.Type: ApplicationFiled: June 19, 2003Publication date: May 13, 2004Applicant: NOKIA CORPORATIONInventors: Hemant Chaskar, Govind Krishnamurthi, Dirk Trossen
-
Publication number: 20040081120Abstract: A method and system is disclosed to provide a personalized, location related service to a user of a mobile terminal. The method includes: (A) generating a service specification object that comprises a user-specified location and a message to be generated when the user arrives at the location with the MT; and (B) storing the service specification object for later use. The method further entails: (C) tracking the location of the mobile terminal; and when the location of the mobile terminal matches the location in the stored service creation object, (D) generating the message for activating a user-specified action.Type: ApplicationFiled: October 29, 2002Publication date: April 29, 2004Applicant: Nokia CorporationInventor: Hemant Chaskar
-
Publication number: 20030174667Abstract: This invention provides a messaging interface between a Mobile Node (MN) and an Access Router (AR) that enables the registration of MN preferences with a current AR (AR_current) and, when appropriate, the notification of the MN of the discovery of an AR in the proximity of AR_current that matches MN-specified preference criteria. The notifying AR_current may be the one that the MN originally registered its preferences with, or it could be another AR that, due to movement by the MN, has assumed the role of AR_current. In this case the MN preference data set to be transferred from one AR to another in response to the movement of the MN. The presently preferred messaging interface has two main modes of operation. In a first mode of operation, a “Query” mode, the MN explicitly queries AR_current for information descriptive of the capabilities of nearby ARs. AR_current responds to the MN query after examining the information stored in its PNL.Type: ApplicationFiled: November 15, 2002Publication date: September 18, 2003Applicant: Nokia CorporationInventors: Govind Krishnamurthi, Dirk Trossen, Hemant Chaskar