Patents by Inventor Nagendra Bykampadi

Nagendra Bykampadi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12341818
    Abstract: A method of policy decision includes receiving, by a central policy server, a network policy, determining, by a cluster policy server that is separate from the central policy server, whether the network policy is relevant to a cluster corresponding to the cluster policy server, storing, by the cluster policy server, the network policy in a cluster policy database based on determining that the network policy is relevant to the cluster corresponding to the cluster policy server, obtaining, by a policy decision point (PDP) module that is separate from the cluster policy server, the network policy stored in the cluster policy database, and determining, by the PDP module, whether to implement the network policy based on a policy query received from a policy enforcement point (PEP) module.
    Type: Grant
    Filed: August 2, 2022
    Date of Patent: June 24, 2025
    Assignee: RAKUTEN SYMPHONY, INC.
    Inventors: Krishna Pramod Adharapurapu, Nagendra Bykampadi, Satish Balagopalan
  • Patent number: 12170691
    Abstract: A method, performed by at least one processor, for protecting a front-haul link from a Man-in-the-Middle (MiTM) attack in a network communication system includes receiving, through a port of an authenticator, an authentication request for port authentication from a supplicant via an Ethernet Frame, obtaining, by the authenticator from the Ethernet frame, a hop count corresponding to a number of hops in a transmission path of the Ethernet frame between the supplicant and the authenticator, comparing the hop count to a predetermined threshold to determine whether the port should be disabled, and disabling the port based on the hop count being greater than the predetermined threshold.
    Type: Grant
    Filed: July 11, 2022
    Date of Patent: December 17, 2024
    Assignee: RAKUTEN SYMPHONY, INC.
    Inventors: Raghul Ravirajh, Nagendra Bykampadi, Satish Balagopalan
  • Publication number: 20240333712
    Abstract: Systems and methods for handling and/or managing permissions data nodes across multiple NETCONF clients by generating or obtaining, by a NETCONF client, a first identifier, wherein the first identifier uniquely identifies the NETCONF client, establishing a first NETCONF session between a NETCONF server and the NETCONF client, wherein the NETCONF server comprises a first O-RU, wherein the NETCONF client comprises a first O-DU, delivering, from the NETCONF client to the NETCONF server, a first request during a NETCONF session handshake comprising the first identifier, delivering, from the NETCONF client to the NETCONF server, a first edit configuration request or payload, wherein the first edit configuration request or payload comprises the first identifier.
    Type: Application
    Filed: March 28, 2023
    Publication date: October 3, 2024
    Inventors: Krishna Pramod ADHARAPURAPU, Nagendra BYKAMPADI
  • Publication number: 20240223608
    Abstract: A method of policy decision includes receiving, by a central policy server, a network policy, determining, by a cluster policy server that is separate from the central policy server, whether the network policy is relevant to a cluster corresponding to the cluster policy server, storing, by the cluster policy server, the network policy in a cluster policy database based on determining that the network policy is relevant to the cluster corresponding to the cluster policy server, obtaining, by a policy decision point (PDP) module that is separate from the cluster policy server, the network policy stored in the cluster policy database, and determining, by the PDP module, whether to implement the network policy based on a policy query received from a policy enforcement point (PEP) module.
    Type: Application
    Filed: August 2, 2022
    Publication date: July 4, 2024
    Applicant: Altiostar Networks, Inc.
    Inventors: Krishna Pramod ADHARAPURAPU, Nagendra BYKAMPADI, Satish BALAGOPALAN
  • Publication number: 20240223605
    Abstract: A method, performed by at least one processor, for protecting a front-haul link from a Man-in-the-Middle (MiTM) attack in a network communication system includes receiving, through a port of an authenticator, an authentication request for port authentication from a supplicant via an Ethernet Frame, obtaining, by the authenticator from the Ethernet frame, a hop count corresponding to a number of hops in a transmission path of the Ethernet frame between the supplicant and the authenticator, comparing the hop count to a predetermined threshold to determine whether the port should be disabled, and disabling the port based on the hop count being greater than the predetermined threshold.
    Type: Application
    Filed: July 11, 2022
    Publication date: July 4, 2024
    Applicant: ALTIOSTAR NETWORKS, INC.
    Inventors: Raghul RAVIRAJH, Nagendra BYKAMPADI, Satish BALAGOPALAN
  • Publication number: 20240214833
    Abstract: A system for providing real-time services and functions in an Open Radio Access Network (O-RAN) architecture, includes: a first physical node comprising at least one first processor configured to execute instructions to implement an O-RAN centralized unit (O-CU); at least one second physical node comprising at least one second processor configured to execute instructions to implement: an O-RAN distributed unit (O-DU), and a real-time (RT) RAN Intelligent Controller (RIC) connected to the O-DU via an interface terminating at the RT RIC and having a latency of less than 10 ms; an O-RAN radio unit (O-RU); at least one third physical node comprising at least one third processor configured to execute instructions to implement a non-real-time (Non-RT) RIC operating at a time scale of greater than 1 second; and at least one fourth physical node including at least one fourth processor configured to execute instructions to implement a near-real-time (Near-RT) RIC operating at a time scale of 10 ms to 1 second, wherein
    Type: Application
    Filed: April 22, 2022
    Publication date: June 27, 2024
    Applicants: RAKUTEN SYMPHONY SINGAPORE PTE. LTD., RAKUTEN MOBILE, INC., Altiostar Networks, Inc
    Inventors: Antonio FORENZA, Nagendra BYKAMPADI, Awn MUHAMMAD
  • Patent number: 12015920
    Abstract: Improved techniques for secure access control in communication systems are provided. In one example, in accordance with an authorization server function, a method comprises receiving a request from a service consumer in a communication system for access to a service type and one or more resources associated with the service type. The method determines whether the service consumer is authorized to access the service type and the one or more resources associated with the service type. The method generates an access token that identifies one or more service producers for the service type and the one or more resources associated with the service type that the service consumer is authorized to access, and sends the access token to the service consumer. The service consumer can then use the access token to access the one or more services and one or more resources. In addition to such resource level access authorization, target network function group access authorization can be performed.
    Type: Grant
    Filed: June 9, 2020
    Date of Patent: June 18, 2024
    Inventors: Nagendra Bykampadi, Laurent Thiebaut, Anja Jerichow, Suresh Nair
  • Patent number: 11997477
    Abstract: Improved security management techniques between user equipment and a communication system are provided. For example, techniques are provided for preventing malicious attacks via a user equipment deregistration process. In one example, a method comprises sending a deregistration request message from the given user equipment to a communication system to which the given user equipment is registered, wherein the deregistration request message is security-protected and comprises a temporary identifier assigned to the given user equipment. By not sending the deregistration request message with a subscription concealed identifier, the given user equipment prevents a malicious actor from succeeding with a deregistration attack replaying the subscription concealed identifier.
    Type: Grant
    Filed: April 30, 2020
    Date of Patent: May 28, 2024
    Assignee: Nokia Technologies Oy
    Inventors: Suresh Nair, Nagendra Bykampadi, Anja Jerichow
  • Publication number: 20230247433
    Abstract: Techniques for detecting and isolating rogue network entities in a communication network are provided. For example, a method comprises receiving from at least one network entity in a communication network a message identifying one or more network entities suspected of malicious activity operating within the communication network, and initiating one or more remedial actions within the communication network to prevent the one or more network entities suspected of malicious activity operating within the communication network from accessing other network entities in the communication network.
    Type: Application
    Filed: June 24, 2021
    Publication date: August 3, 2023
    Inventors: Saurabh KHARE, Narasimha Rao PULIPATI, Nagendra BYKAMPADI, Suresh NAIR
  • Publication number: 20230180061
    Abstract: It is provided a method comprising: checking whether a maximum data rate for a subscriber for a network slice is received; monitoring, if the maximum data rate for the subscriber for the network slice is received, whether a hypothetical total data rate of all flows of the subscriber for the network slice would exceed the maximum data rate for the subscriber for the network slice if a grant to transmit data were provided for the subscriber for packets belonging to the network slice; inhibiting providing the grant for the subscriber if the hypothetical total data rate of all flows of the subscriber for the network slice exceeded the maximum data rate of the network slice if the grant were provided.
    Type: Application
    Filed: April 29, 2021
    Publication date: June 8, 2023
    Inventors: Rajesh Babu NATARAJAN, Gayathri TADAS, Kavitha NANJANGUD KEERTHI, Alessio CASATI, Nagendra BYKAMPADI
  • Patent number: 11650866
    Abstract: A method, apparatus, and computer program product relating to notification requests and callback requests in indirect communications are provided. In the context of a method, the method includes sending a service request for selection of a service consumer. The service request is one of a notification request or a callback request. The method further includes indicating a version of a programming interface configured to support the service request.
    Type: Grant
    Filed: February 1, 2021
    Date of Patent: May 16, 2023
    Assignee: NOKIA TECHNOLOGIES OY
    Inventors: Bruno Landais, Thomas Belling, Nagendra Bykampadi
  • Publication number: 20220248225
    Abstract: Improved techniques for secure access control in communication systems are provided. In one example, in accordance with an authorization server function, a method comprises receiving a request from a service consumer in a communication system for access to a service type and one or more resources associated with the service type. The method determines whether the service consumer is authorized to access the service type and the one or more resources associated with the service type. The method generates an access token that identifies one or more service producers for the service type and the one or more resources associated with the service type that the service consumer is authorized to access, and sends the access token to the service consumer. The service consumer can then use the access token to access the one or more services and one or more resources. In addition to such resource level access authorization, target network function group access authorization can be performed.
    Type: Application
    Filed: June 9, 2020
    Publication date: August 4, 2022
    Inventors: Nagendra BYKAMPADI, Laurent THIEBAUT, Anja JERICHOW, Suresh NAIR
  • Publication number: 20220240089
    Abstract: Improved techniques for secure access control in communication systems are provided. Secure access control in one or more examples includes authorization of network function sets. For example, in accordance with an authorization server function, a method includes receiving a request from a service consumer in a communication system for access to a service type, wherein the request comprises information including a service producer set identifier. The method determines whether the service consumer is authorized to access the service type. The method identifies service producer instances that belong to the requested service producer set identifier. The method generates an access token that comprises identifiers for identified ones of the service producer instances that belong to the requested service producer set identifier, and sends the access token to the service consumer.
    Type: Application
    Filed: June 4, 2020
    Publication date: July 28, 2022
    Inventors: Nagendra BYKAMPADI, Suresh NAIR, Anja JERICHOW
  • Publication number: 20220217530
    Abstract: Improved security management techniques between user equipment and a communication system are provided. For example, techniques are provided for preventing malicious attacks via a user equipment deregistration process. In one example, a method comprises sending a deregistration request message from the given user equipment to a communication system to which the given user equipment is registered, wherein the deregistration request message is security-protected and comprises a temporary identifier assigned to the given user equipment. By not sending the deregistration request message with a subscription concealed identifier, the given user equipment prevents a malicious actor from succeeding with a deregistration attack replaying the subscription concealed identifier.
    Type: Application
    Filed: April 30, 2020
    Publication date: July 7, 2022
    Inventors: Suresh NAIR, Nagendra BYKAMPADI, Anja JERICHOW
  • Publication number: 20210306326
    Abstract: Embodiments of the present disclosure relate to methods, apparatuses and computer readable storage media for hop-by-hop security. A proposed method comprises receiving, at a first apparatus and from a second apparatus associated with a first network function, a message directed from the first network function to a second network function, the message comprising a first signature and network function information, the network function information at least comprising identification information of the first network function; in accordance with a successful validation of the first signature, updating the message with a second signature specific to a service communication proxy implemented by the first apparatus; and transmitting the updated message to a third apparatus associated with the second network function, the updated message comprising at least the second signature and the network function information.
    Type: Application
    Filed: January 27, 2021
    Publication date: September 30, 2021
    Inventors: Nagendra Bykampadi, Bruno Landais, Silke Holtmanns, Jani Petteri Ekman
  • Publication number: 20210240554
    Abstract: It is provided a method, comprising monitoring if a received request comprises a notification indication, wherein the notification indication indicates that the request is one of a callback request and a notification request; handling the request as a service request if the request does not comprise the notification indication; handling the request as a notification or callback request if the request comprises the notification indication, wherein the handling as a service request is different from the handling as a notification or callback request.
    Type: Application
    Filed: February 1, 2021
    Publication date: August 5, 2021
    Applicant: NOKIA TECHNOLOGIES OY
    Inventors: Bruno LANDAIS, Thomas BELLING, Nagendra BYKAMPADI
  • Patent number: 8755773
    Abstract: A system and method for notifying the calling party of acknowledgment of the missed calls by the called party is disclosed. The called party and the calling party can subscribe for the notification service to enable charging for the service. When the calling party initiates a call to the called party it may result in a missed call as the called party may be out of coverage area or busy. When the called party views the record of the missed call a notification is generated on the wireless device by the application on the wireless device of the called party. The notification is then sent to the calling party. The acknowledgement notification may be sent directly to the calling party or via an application server.
    Type: Grant
    Filed: February 16, 2009
    Date of Patent: June 17, 2014
    Assignee: Alcatel Lucent
    Inventors: Mudit Goel, Satish Kanugovi, Sarang Gadgil, Nagendra Bykampadi, Shivani Arora
  • Publication number: 20120028618
    Abstract: A system and method for notifying the calling party of acknowledgment of the missed calls by the called party is disclosed. The called party and the calling party can subscribe for the notification service to enable charging for the service. When the calling party initiates a call to the called party it may result in a missed call as the called party may be out of coverage area or busy. When the called party views the record of the missed call a notification is generated on the wireless device by the application on the wireless device of the called party. The notification is then sent to the calling party. The acknowledgement notification may be sent directly to the calling party or via an application server.
    Type: Application
    Filed: February 16, 2009
    Publication date: February 2, 2012
    Inventors: Mudit Goel, Satish Kanugovi, Sarang Gadgil, Nagendra Bykampadi, Shivani Arora