Patents by Inventor Kiran Thakare
Kiran Thakare has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9668139Abstract: A network (20) comprises an authenticator node (22) and a server (24) such as an authentication, authorization, and accounting (AAA) server. A method comprises a terminal (30) sending authentication capabilities information (AC) across a network access interface (32) to the network (the authentication capabilities information provides an indication of authentication capabilities of the terminal). The network (20) then uses the authentication capabilities information to determine a first cryptographic value. The terminal (30) then uses the authentication capabilities information to determine a second cryptographic value. The network (20) compares the first cryptographic value and the second cryptographic value to authenticate the terminal.Type: GrantFiled: May 11, 2009Date of Patent: May 30, 2017Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Kiran Thakare, Per Ernström, Mats Näslund
-
Patent number: 8566929Abstract: In a packet-based communication between a mobile radio and a base station in a radio communication system, an authenticity of a packet based on authentication data associated with the packet is tested. Packets that fail the authenticity test are removed from the communication. A security condition is detected when a number of failed packets for the communication exceeds a security threshold, and in response thereto, action is taken to correct or reduce the security condition. The removed packets are preferably not discarded, but instead are stored used for analysis, and based on that analysis, appropriate action can be taken.Type: GrantFiled: October 21, 2008Date of Patent: October 22, 2013Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventor: Kiran Thakare
-
Patent number: 8311030Abstract: Cell scanning operations are enhanced making them more time and power efficient. A base station communicates with mobile radios in a cellular communication system. The base station transmits in a cell a known symbol sequence over a broadcast channel to permit mobiles to detect and synchronize to the base station. It transmits a time indicator indicating when the base station will transmit service information from which a mobile may determine whether the base station can provide a desired communications service. After a time period associated with the time indicator, the base station transmits the service information. A mobile radio in or near the cell scans for and detects the broadcast signal. A decoder in the mobile decodes the broadcast signal and detects a time period associated with receiving the broadcast information. Based on the time period, the decoder halts further decoding of the broadcast signal.Type: GrantFiled: August 7, 2008Date of Patent: November 13, 2012Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventor: Kiran Thakare
-
Patent number: 8155701Abstract: Frames of information are communicated between a base station (28) of a radio access network (RAN) and plural types of wireless terminals (30). Frame handlers of the base station and of certain types of wireless terminals (30-2) process differing portions of the frame according to respective differing multiple access technologies. In differing embodiments and implementations, modulation techniques of the differing multiple access technologies can be apportioned to differing portions of the frame in various manners, such as (for example) to differing subframes of a multi-sub-framed frame or to differing burst fields or sections of an uplink (UL) burst.Type: GrantFiled: October 27, 2008Date of Patent: April 10, 2012Assignee: Telefonaktiebolaget LM Ericsson (PUBL)Inventors: Kumar Balachandran, Per Ernström, Havish Koorapaty, Rajaram Ramesh, Kiran Thakare
-
Patent number: 8126462Abstract: In a wireless network, a mobile station is in a serving radio link with a serving base station. A handover is desired so that the mobile station can establish a target radio link with a target base station. When the handover process is initiated, the target base station is alerted about the impending handover by the serving base station. The target base station allocates a radio resource set and provides information on the radio resource set piggy-backed onto an alert response message to the serving base station. The serving base station relays radio resource set piggy-backed onto either a handover request or response message to the mobile station. The mobile station breaks the serving radio link with the serving base station and establishes the target radio link using the radio resource set.Type: GrantFiled: April 18, 2008Date of Patent: February 28, 2012Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventor: Kiran Thakare
-
Patent number: 8050219Abstract: In one aspect, a new radio protocol architecture is proposed. The proposed architecture is applicable to wireless networks such as a wireless metropolitan area network (WMAN). In the new architecture, there is a clear-cut separation of control, management, and data planes. New control service access points (SAP) are introduced to allow interaction between the protocol layers of the architecture. Also, data SAPs are introduced between the protocol layers. The layer separation idea extracts the functionalities of the architecture and grouped into MAC CPS-H (common part sublayer-high) and MAC CPS-L (common part sublayer-low). Further, a new concept of “control information base” (CIB) is introduced.Type: GrantFiled: November 11, 2008Date of Patent: November 1, 2011Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventor: Kiran Thakare
-
Publication number: 20100064135Abstract: A network (20) comprises an authenticator node (22) and a server (24) such as an authentication, authorization, and accounting (AAA) server. A method comprises a terminal (30) sending authentication capabilities information (AC) across a network access interface (32) to the network (the authentication capabilities information provides an indication of authentication capabilities of the terminal). The network (20) then uses the authentication capabilities information to determine a first cryptographic value. The terminal (30) then uses the authentication capabilities information to determine a second cryptographic value. The network (20) compares the first cryptographic value and the second cryptographic value to authenticate the terminal.Type: ApplicationFiled: May 11, 2009Publication date: March 11, 2010Applicant: Telefonaktiebolaget L M Ericsson (publ)Inventors: Kiran Thakare, Per ERNSTRÖM, Mats Näslund
-
Publication number: 20090227255Abstract: Cell scanning operations are enhanced making them more time and power efficient. A base station communicates with mobile radios in a cellular communication system. The base station transmits in a cell a known symbol sequence over a broadcast channel to permit mobiles to detect and synchronize to the base station. It transmits a time indicator indicating when the base station will transmit service information from which a mobile may determine whether the base station can provide a desired communications service. After a time period associated with the time indicator, the base station transmits the service information. A mobile radio in or near the cell scans for and detects the broadcast signal. A decoder in the mobile decodes the broadcast signal and detects a time period associated with receiving the broadcast information. Based on the time period, the decoder halts further decoding of the broadcast signal.Type: ApplicationFiled: August 7, 2008Publication date: September 10, 2009Applicant: Telefonaktiebolaget LM Ericsson (publ)Inventor: Kiran THAKARE
-
Publication number: 20090181643Abstract: In a packet-based communication between a mobile radio and a base station in a radio communication system, an authenticity of a packet based on authentication data associated with the packet is tested. Packets that fail the authenticity test are removed from the communication. A security condition is detected when a number of failed packets for the communication exceeds a security threshold, and in response thereto, action is taken to correct or reduce the security condition. The removed packets are preferably not discarded, but instead are stored used for analysis, and based on that analysis, appropriate action can be taken.Type: ApplicationFiled: October 21, 2008Publication date: July 16, 2009Applicant: Telefonaktiebolaget LM Ericsson ( publ)Inventor: Kiran THAKARE
-
Publication number: 20090168710Abstract: In one aspect, a new radio protocol architecture is proposed. The proposed architecture is applicable to wireless networks such as a wireless metropolitan area network (WMAN). In the new architecture, there is a clear-cut separation of control, management, and data planes. New control service access points (SAP) are introduced to allow interaction between the protocol layers of the architecture. Also, data SAPs are introduced between the protocol layers. The layer separation idea extracts the functionalities of the architecture and grouped into MAC CPS-H (common part sublayer—high) and MAC CPS-L (common part sublayer—low). Further, a new concept of “control information base” (CIB) is introduced.Type: ApplicationFiled: November 11, 2008Publication date: July 2, 2009Inventor: Kiran THAKARE
-
Publication number: 20090131110Abstract: Frames of information are communicated between a base station (28) of a radio access network (RAN) and plural types of wireless terminals (30). Frame handlers of the base station and of certain types of wireless terminals (30-2) process differing portions of the frame according to respective differing multiple access technologies. In differing embodiments and implementations, modulation techniques of the differing multiple access technologies can be apportioned to differing portions of the frame in various manners, such as (for example) to differing subframes of a multi-sub-framed frame or to differing burst fields or sections of an uplink (UL) burst.Type: ApplicationFiled: October 27, 2008Publication date: May 21, 2009Applicant: Telefonaktiebolaget LM Ericsson(publ)Inventors: Kumar BALACHANDRAN, Per Ernstrom, Havish Koorapaty, Rajaram Ramesh, Kiran Thakare
-
Publication number: 20090111470Abstract: In a wireless network, a mobile station is in a serving radio link with a serving base station. A handover is desired so that the mobile station can establish a target radio link with a target base station. When the handover process is initiated, the target base station is alerted about the impending handover by the serving base station. The target base station allocates a radio resource set and provides information on the radio resource set piggy backed onto an alert response message to the serving base station. The serving base station relays radio resource set piggybacked onto either a handover request or response message to the mobile station. The mobile station breaks the serving radio link with the serving base station and establishes the target radio link using the radio resource set.Type: ApplicationFiled: April 18, 2008Publication date: April 30, 2009Inventor: Kiran THAKARE