Patents by Inventor Lakshminath Dondeti
Lakshminath Dondeti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180054361Abstract: Methods and apparatus for enhanced overlay state maintenance in a peer-to-peer overlay network. A first method includes inferring that a first node is leaving the overlay network, and transmitting a decrement message to decrement a size counter value. A second method includes identifying a set of nodes associated with a first node of an overlay network, obtaining a segment length associated with each node of the set of nodes, and determining a size of the overlay network by dividing the total number of nodes in the set of nodes by the sum of the segment lengths. A third method includes identifying a set of nodes associated with a first node of an overlay network, obtaining a size estimate associated with the first node and with each node of the set of nodes, and determining a size of the overlay network by averaging the size estimates.Type: ApplicationFiled: January 14, 2016Publication date: February 22, 2018Inventors: Saumitra Mohan Das, Vidhya Narayanan, Lakshminath Dondeti, Ranjith S. Jayaram
-
Patent number: 9071588Abstract: A device for use in a system with multiple receiving units, and multiple intermediate units each configured to communicate with the device and at least some of the multiple receiving units, includes a communication module configured to send information toward and receive information from the receiving units and the intermediate units, a memory, and a processor coupled to the memory and the communication module.Type: GrantFiled: October 4, 2012Date of Patent: June 30, 2015Assignee: RPX Clearinghouse LLCInventor: Lakshminath Dondeti
-
Publication number: 20140192979Abstract: Entropy obtained from a series of key generation exchanges may be combined with entropy from a strong entropy source to allow the strong entropy to be stretched to generate a larger number of keys for use on a communication network, without requiring additional information from the group members and without requiring the entropy source to be increased in size or in number. In one embodiment, nonces exchanged during an initial key exchange are used to generate additional key material that is then fed, together with a fresh random secret, to another pseudo-random function to generate an additional key stream. The methods are particularly useful for group key management where a large number of keys are required to be generated in a short time frame.Type: ApplicationFiled: October 15, 2013Publication date: July 10, 2014Applicant: Rockstar Consortium US LPInventor: Lakshminath Dondeti
-
Publication number: 20140181967Abstract: A method and apparatus is disclosed which enables detection of undesired packets received at a device in a network, where the device is a member of a group of devices in the network. A registration table stores transform identifiers for each member of a group and controls the forwarding of the transform identifiers to the members of the group as members are added and deleted. A transform identifier indicates a format or transformation of a packet transmitted by an associated member. The transform identifier can therefore be used at a receiving device to distinguish between transmissions by different members of the group, thereby enabling the receiving device to extract sequence information associated with the member from the packet. The sequence information can be compared against an expected sequence number for the member to determine whether the packet is an undesirable or rogue packet.Type: ApplicationFiled: March 3, 2014Publication date: June 26, 2014Applicant: ROCKSTAR CONSORTIUM US LPInventors: Lakshminath Dondeti, Donald Fedyk, Haixiang He
-
Patent number: 8687485Abstract: A method and apparatus is disclosed which enables detection of undesired packets received at a device in a network, where the device is a member of a group of devices in the network. A registration table stores transform identifiers for each member of a group and controls the forwarding of the transform identifiers to the members of the group as members are added and deleted. A transform identifier indicates a format or transformation of a packet transmitted by an associated member. The transform identifier can therefore be used at a receiving device to distinguish between transmissions by different members of the group, thereby enabling the receiving device to extract sequence information associated with the member from the packet. The sequence information can be compared against an expected sequence number for the member to determine whether the packet is an undesirable or rogue packet.Type: GrantFiled: June 9, 2004Date of Patent: April 1, 2014Assignee: Rockstar Consortium USLPInventors: Lakshminath Dondeti, Donald Fedyk, Haixiang He
-
Patent number: 8594323Abstract: Entropy obtained from a series of key generation exchanges may be combined with entropy from a strong entropy source to allow the strong entropy to be stretched to generate a larger number of keys for use on a communication network, without requiring additional information from the group members and without requiring the entropy source to be increased in size or in number. In one embodiment, nonces exchanged during an initial key exchange are used to generate additional key material that is then fed, together with a fresh random secret, to another pseudo-random function to generate an additional key stream. The fresh ransom secret may be generated at the GCKS from a physical entropy source or other entropy source, and may be changed at will by the GCKS to further increase the strength of the keys. The methods are particularly useful for group key management where a large number of keys are required to be generated in a short time frame.Type: GrantFiled: September 21, 2004Date of Patent: November 26, 2013Assignee: Rockstar Consortium US LPInventor: Lakshminath Dondeti
-
Publication number: 20130247158Abstract: A device for use in a system with multiple receiving units, and multiple intermediate units each configured to communicate with the device and at least some of the multiple receiving units, includes a communication module configured to send information toward and receive information from the receiving units and the intermediate units, a memory, and a processor coupled to the memory and the communication module.Type: ApplicationFiled: October 4, 2012Publication date: September 19, 2013Inventor: Lakshminath Dondeti
-
Patent number: 8300830Abstract: A device for use in a system with multiple receiving units, and multiple intermediate units each configured to communicate with the device and at least some of the multiple receiving units, includes a communication module configured to send information toward and receive information from the receiving units and the intermediate units, a memory, and a processor coupled to the memory and the communication module.Type: GrantFiled: July 15, 2010Date of Patent: October 30, 2012Assignee: Rockstar Bidco LPInventor: Lakshminath Dondeti
-
Patent number: 8189481Abstract: CE devices of the present invention are enabled to make more judicious routing decisions in CE-based VPNs. In determining a next-hop in a path from a source CE to a destination subnet, CE-to-CE costs are associated with each next-hop CE in a plurality of next-hop CEs. Each CE-to-CE cost is a cost of a path from the source CE to the associated next-hop CE. CE-to-subnet costs are associated with each of the next-hop CEs. Each CE-to-subnet cost is a cost of a path from the associated next-hop CE to the destination subnet. Total-costs are associated with each of the next-hop CEs. Each total-cost is a sum of a CE-to-CE cost associated with a next-hop CE and a CE-to-subnet cost associated with the same next-hop CE. The next-hop in the path is set to be a next-hop CE associated with an associated total-cost.Type: GrantFiled: April 7, 2006Date of Patent: May 29, 2012Assignee: Avaya, IncInventors: Ravi Ravindran, Donald Fedyk, Lakshminath Dondeti, Hong Zhang
-
Patent number: 7975140Abstract: Described are a method and system for establishing a secure communication session with third-party access at a later time. A first communication subsession is established between two original devices using a first key generated by a two-party key and security association protocol. At least one of the original devices is established as a group key server. A request from a joining device to join the secure communication session is received and a second communication subsession is established between the original devices using a second key generated by the two-party key and security association protocol. The second key is provided to the joining device to enable participation in the second communication subsession.Type: GrantFiled: January 5, 2006Date of Patent: July 5, 2011Assignee: Nortel Networks LimitedInventors: Donald Fedyk, Lakshminath Dondeti
-
Publication number: 20100290625Abstract: A device for use in a system with multiple receiving units, and multiple intermediate units each configured to communicate with the device and at least some of the multiple receiving units, includes a communication module configured to send information toward and receive information from the receiving units and the intermediate units, a memory, and a processor coupled to the memory and the communication module.Type: ApplicationFiled: July 15, 2010Publication date: November 18, 2010Applicant: Nortel Networks LimitedInventor: Lakshminath Dondeti
-
Patent number: 7783043Abstract: A device for use in a system with multiple receiving units, and multiple intermediate units each configured to communicate with the device and at least some of the multiple receiving units, includes a communication module configured to send information toward and receive information from the receiving units and the intermediate units, a memory, and a processor coupled to the memory and the communication module.Type: GrantFiled: August 5, 2002Date of Patent: August 24, 2010Assignee: Nortel Networks LimitedInventor: Lakshminath Dondeti
-
Patent number: 7590074Abstract: Routing information may be provided to VPN sites on demand to allow smaller VPN sites with smaller routing tables to communicate directly with other VPN sites. This allows the meshed VPN architecture to scale to a size larger than where each VPN site is required to store routing information for all other VPN sites. A route server is instantiated on the network, optionally in connection with a Group Controller Key Server, to manage distribution of routes on the network and to provide routes to VPN sites on demand. As routes are learned by the VPN sites they are advertised to the route server, which selectively advertises the routes to other VPN sites depending on the per-site preferences. When a VPN site needs routing information to communicate with another VPN site, the network element will check its routing table for the route, and if the route is not available, will obtain the route on-demand from the route server.Type: GrantFiled: December 2, 2004Date of Patent: September 15, 2009Assignee: Nortel Networks LimitedInventors: Lakshminath Dondeti, Donald Fedyk, Ravi Ravindran, Hong Zhang
-
Patent number: 7571463Abstract: Method and apparatus that enable secure transmission of data in a scalable private network are described. Each station that is to be part of a private network registers with a key table. A group security association associated with the private network is forwarded to each trusted ingress and egress point that communicates with each member of the private network. When a member of the private network seeks to communicate with another member, it simply forwards the communication to the trusted ingress point. The trusted ingress point uses the security association associated with the private network to transform the communication and forwards the transformed communication through other intermediate stations in the network until it reaches a trusted egress point. The trusted egress point uses the stored security association to decode the transformed communication and forwards the communication to the appropriate destination.Type: GrantFiled: September 12, 2003Date of Patent: August 4, 2009Assignee: Nortel Networks LimitedInventors: Donald Fedyk, Lakshminath Dondeti, Haixiang He
-
Patent number: 7558877Abstract: Each member of a group registers with the Security/Routing (S/R) device 30 and receives a Group Security Association (GSA) associated with the group. The member may register as part of a group by identifying the group and the other members. Alternatively, Routing Functionality auto-discovers the other members of the group. AS members are identified, Routing functionality reflects the routes of all members in the group to all other members of the group. The forwarding of the routes to the respective group members may be secured via the GSA associated with the group. Each member can forward communication directly to the group members, securing the communication using the group SA and standard tunneling techniques (such as IPsec, GRE, MPLS, etc.). Thus the S/R provides a mechanism for private networks to be built on top of an existing network without modification of any existing network components and much more scalable in operation and configuration than individual IP sec tunnels.Type: GrantFiled: September 12, 2003Date of Patent: July 7, 2009Assignee: Nortel Networks LimitedInventors: Donald Fedyk, Lakshminath Dondeti, Haixiang He
-
Patent number: 7539313Abstract: A method for managing encryption keys in a communication system having a plurality of communication devices includes establishing a set of cryptographic keys for secure communication. Each of the cryptographic keys is associated with a geographic region. A geographic region is determined for a communication device and at least one cryptographic key is distributed to the communication device based on the geographic region of the communication device. At least one cryptographic key may be used to derive further cryptographic keys associated with a set of sub-regions of the geographic region associated with the communication device.Type: GrantFiled: September 13, 2001Date of Patent: May 26, 2009Assignee: Nortel Networks LimitedInventors: Thomas P. Hardjono, Lakshminath Dondeti
-
Patent number: 7526658Abstract: Method and apparatus that enable secure transmission of data in a scalable private network are described. Each station that is to be part of a private network registers with a key table. A group security association associated with the private network is forwarded to each trusted ingress and egress point that communicates with each member of the private network. When a member of the private network seeks to communicate with another member, it simply forwards the communication to the trusted ingress point. The trusted ingress point uses the security association associated with the private network to transform the communication and forwards the transformed communication through other intermediate stations in the network until it reaches a trusted egress point. The trusted egress point uses the stored security association to decode the transformed communication and forwards the communication to the appropriate destination.Type: GrantFiled: September 12, 2003Date of Patent: April 28, 2009Assignee: Nortel Networks LimitedInventors: Haixiang He, Donald Fedyk, Lakshminath Dondeti
-
Patent number: 7519834Abstract: Method and apparatus that enable secure transmission of data in a scalable private network are described. Each station that is to be part of a private network registers with a key table. A group security association associated with the private network is forwarded to each trusted ingress and egress point that communicates with each member of the private network. When a member of the private network seeks to communicate with another member, it simply forwards the communication to the trusted ingress point. The trusted ingress point uses the security association associated with the private network to transform the communication and forwards the transformed communication through other intermediate stations in the network until it reaches a trusted egress point. The trusted egress point uses the stored security association to decode the transformed communication and forwards the communication to the appropriate destination.Type: GrantFiled: September 12, 2003Date of Patent: April 14, 2009Assignee: Nortel Networks LimitedInventors: Lakshminath Dondeti, Haixiang He, Donald Fedyk
-
Patent number: 7395423Abstract: A method for preserving security associations between at least two entities includes the steps of maintaining a security association relating to communication between the at least two entities in a table, and periodically storing the security association in non-volatile storage. With such an arrangement, in the event that data within the table become corrupted, it can be retrieved from storage. Because the key data is stored, performance losses due to re-establishing the secure group are minimized. In one embodiment, the security association is advantageously encrypted prior to storage to further secure the security associations for each member.Type: GrantFiled: August 25, 2003Date of Patent: July 1, 2008Assignee: Nortel Networks LimitedInventors: Lakshminath Dondeti, Michael Lee, Frank Horsfall
-
Publication number: 20080090513Abstract: Disclosed are apparatus and methods operable to distribute targeted content. Additionally, disclosed are corresponding apparatus and methods operable to selectively choose and cache selected ones from among the distributed targeted content, and to further choose ones from among the cached content to present on a device. In some aspects, selective caching of content may be based upon a match between predetermined content attribute information and predetermined profile information. Further, in some aspects, an indicator is operable to trigger the selective inclusion of one or more of the cached content in a presentation of other content, which may be based on a match between a desired content attribute associated with the indicator and the respective predetermined content attribute information of the cached content.Type: ApplicationFiled: December 21, 2006Publication date: April 17, 2008Applicant: QUALCOMM INCORPORATEDInventors: Bruce Collins, Gordon Walker, Jeffery Brown, Jun Wang, Chris Bennett, Charles Lo, Haipeng Jin, Lakshminath Dondeti, Randall Gellens, Mark Maggenti