Patents by Inventor Lakshmi Venkataraman

Lakshmi Venkataraman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11963060
    Abstract: Techniques are disclosed relating to handover of WLAN voice calls to one or more cellular networks. In some embodiments, a device is configured to perform voice communications over one or more wireless local area networks, communicate with a first network using a first cellular radio access technology (RAT), and communicate with a second network using a second cellular RAT. The device may store, based on communications via the first network, information indicating that the first network does not support voice communications for the apparatus. The device may handover a voice call from a wireless local network directly to the second cellular RAT, based on the stored information and without handover of the voice call to the first cellular RAT, based on call conditions on the wireless local area network.
    Type: Grant
    Filed: October 4, 2022
    Date of Patent: April 16, 2024
    Assignee: Apple Inc.
    Inventors: Yifan Zhu, Vijay Venkataraman, Viswanath Nagarajan, Sang Ho Baek, Lakshmi N. Kavuri, Utkarsh Kumar, Krisztian Kiss, Shivani Suresh Babu, Srinivasan Nimmala
  • Patent number: 11937140
    Abstract: Embodiments are presented herein of apparatuses, processors, systems, and methods for performing Quality of Service handling procedures. A wireless device may establish a cellular link that provides access to a fifth generation core network. The wireless device may establish a protocol data unit session with a cellular network entity of the fifth generation core network. The wireless device may determine one or more Quality of Service flow descriptions for the protocol data unit session. The wireless device may perform one or more Quality of Service related modifications to the protocol data unit session.
    Type: Grant
    Filed: September 25, 2020
    Date of Patent: March 19, 2024
    Assignee: Apple Inc.
    Inventors: Alosious Pradeep Prabhakar, Mohammed Sadique, Vijay Venkataraman, Krisztian Kiss, Han Pu, ChunLei Lin, Rodney G. Ibrahim, Yip Pong Herbert Wong, Jordi Agud Ruiz, Srinivasan Nimmala, Lakshmi N. Kavuri, Utkarsh Kumar, Yifan Zhu, Kok Yin Chan
  • Patent number: 7096359
    Abstract: Strong authentication of packets sent between nodes of different clusters in a two-tier ad hoc network is provided by the cluster heads. Each cluster head authenticates nodes that enter the cluster. Thereafter, when a sending node requests a session from its cluster head with a receiving node in another cluster, the cluster head negotiates a session secret key (SSK) with the corresponding cluster head of the receiving node. Further, the cluster head provides authentication tags for the sending node to use with each packet. Each authentication tag is time-stamped, digitally signed by the cluster head, encrypted with the SSK, and includes indicators of message integrity, including a sequence number and TCP header field of checksum. The sending node further calculates a check result from a number of the authentication tags, encrypted with the SSK, so that the receiving node can authenticate the number of packets.
    Type: Grant
    Filed: March 1, 2001
    Date of Patent: August 22, 2006
    Assignee: University of Cincinnati
    Inventors: Dharma P. Agrawal, Lakshmi Venkataraman
  • Publication number: 20020124169
    Abstract: Strong authentication of packets sent between nodes of different clusters in a two-tier ad hoc network is provided by the cluster heads. Each cluster head authenticates nodes that enter the cluster. Thereafter, when a sending node requests a session from its cluster head with a receiving node in another cluster, the cluster head negotiates a session secret key (SSK) with the corresponding cluster head of the receiving node. Further, the cluster head provides authentication tags for the sending node to use with each packet. Each authentication tag is time-stamped, digitally signed by the cluster head, encrypted with the SSK, and includes indicators of message integrity, including a sequence number and TCP header field of checksum. The sending node further calculates a check result from a number of the authentication tags, encrypted with the SSK, so that the receiving node can authenticate the number of packets.
    Type: Application
    Filed: March 1, 2001
    Publication date: September 5, 2002
    Inventors: Dharma P. Agrawal, Lakshmi Venkataraman