Patents by Inventor Narendra Sharma
Narendra Sharma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12100248Abstract: In one or more embodiments, method, system and computer program product for providing secure access to device data and/or device operations by an application are disclosed. The method for providing secure access to one or more devices by an application includes receiving application information for the application; receiving device information for the one or more devices to which the application is requesting access; receiving rules for allowing the application to access the one or more devices, wherein the access to the one or more devices includes device data, one or more device operations or a combination thereof; and allowing the application to access the device based on the rules.Type: GrantFiled: February 13, 2021Date of Patent: September 24, 2024Assignee: Aeris Communications, Inc.Inventors: Kunal Rupani, Narendra Sharma, Eran Netanel, Yixiang Chen, Drew S. Johnson, Andrew Durrer, Michael Garner
-
Patent number: 11678181Abstract: A computer-implemented method and system for global device management architecture with regional autonomy for devices on a cellular network are disclosed. The computer implemented method for optimizing device management architecture for IoT devices includes providing device information to a server in a master node for registering a device with the master node; providing rules to assign the device to at least one node based on the device information; assigning the device to the at least one node in response to the rules; and automatically configuring the device to connect the device to the assigned node.Type: GrantFiled: February 3, 2021Date of Patent: June 13, 2023Assignee: Aeris Communications, Inc.Inventors: Eran Netanel, Narendra Sharma, Yixiang Chen, Manish Mishra
-
Publication number: 20230078765Abstract: A computer-implemented system and method for automated secure device registration and provisioning of one or more devices enabled for connectivity over cellular network are disclosed. The computer-implemented method for automated secure device registration and provisioning of one or more devices enabled for connectivity over cellular network includes receiving subscriber identity module (SIM) information for at least one SIM; enabling the SIM for restricted connectivity; authenticating the one or more devices using a pre-shared key for each of the one or more devices; obtaining device information from the device; associating at least one of the one or more devices with the at least one SIM; provisioning the authenticated one or more devices; and enabling the one or more devices for general connectivity over cellular network.Type: ApplicationFiled: September 13, 2022Publication date: March 16, 2023Inventors: Narendra Sharma, Drew S. Johnson, Karan Kapoor
-
Patent number: 11582233Abstract: A computer-implemented system and method for secure authentication of IoT devices are disclosed. The method for secure authentication of IoT devices comprises establishing a network connection with a network operator server via a control channel, establishing identity of the network operator server using a pre-shared server key from one or more of pre-shared server keys, establishing identity of the IoT device using a pre-shared client key from one or more of pre-shared client keys and cryptographically generating a session key for a network session to allow secure data exchange between the network operator server and the IoT device. The cryptographically generated session key is used for securely authenticating application running on the authenticated IoT device.Type: GrantFiled: March 3, 2021Date of Patent: February 14, 2023Assignee: AERIS COMMUNICATIONS, INC.Inventors: Narendra Sharma, Yixiang Chen
-
Publication number: 20220358382Abstract: A computer-implemented method and system for optimizing user experience are disclosed. The method includes determining power profile of a target device; determining historical behavior of at least one user in relation to the target device; considering the historical behavioral data of the at least one user in relation to the target device based on the determined power profile of the target device; and using rules to select at least one of a plurality of approaches for establishing connection with a server in relation to a result of the considering.Type: ApplicationFiled: July 25, 2022Publication date: November 10, 2022Inventors: Rony Gotesdyner, Eran Netanel, Narendra Sharma, Drew S. Johnson, George Edward L. Schaefer, JR., Vivek Agarwal
-
Publication number: 20220353297Abstract: A computer-implemented method, system, and computer program product for providing distributed policy-based security for one or more devices enabled for connectivity over a communications network are disclosed. The computer-implemented method for providing distributed policy-based security for one or more devices enabled for connectivity over a communications network includes providing a policy enforcement agent for each of one or more devices enabled for connectivity; providing policy rules to the policy enforcement agent, wherein the policy rules comprise one or more of: traffic filter policy rules, network access policy rules, power management policy rules and application management policy rules; and managing policy-based security for the one or more devices by the policy enforcement agent by applying the provided policy rules immediately or based on the provided criteria evaluated on the device.Type: ApplicationFiled: April 28, 2022Publication date: November 3, 2022Inventors: Narendra Sharma, Drew S. Johnson, Richard Johnson, Amit Khetawat
-
Publication number: 20220311768Abstract: A computer-implemented method, system, and computer program product for defining and enforcing network traffic policy for one or more devices enabled for connectivity over a communications network are disclosed. The method for defining and enforcing network traffic policy for one or more devices enabled for connectivity includes defining traffic policy rules for a service profile, wherein the service profile is service behavior definition based on communications network subscription; assigning a range of network assigned unique identifiers to the service profile; associating at least one device with at least one of the range of network assigned unique identifiers assigned to the service profile using communication network subscription identifier; and enforcing the defined traffic policy rules on the network traffic to and from the at least one device based on the network assigned unique identifier associated to the said at least one device.Type: ApplicationFiled: March 25, 2022Publication date: September 29, 2022Inventors: Ethan Hoewisch, David Hu, Dae Seong Kim, Narendra Sharma, Drew S. Johnson, Maanasa Madiraju, Anitha Govindarajan
-
Publication number: 20220311747Abstract: A computer-implemented method, system and computer program product for securing connections in systems including Machine to Machine (M2M) or Internet of Things (IoT) devices are disclosed. The computer-implemented method for providing end-to-end security to systems including M2M or IoT devices includes: receiving an initial device profile for at least one IoT device; learning a device profile based on data flow to and from the at least one IoT device; dynamically computing a device profile on a per-session basis or across sessions; comparing the dynamically computed device profile for the at least one IoT device with the initial device profile and/or the learned device profile for the at least one IoT device; and triggering an action if the dynamically computed device profile for the at least one IoT device does not match the initial device profile and/or the learned device profile for the at least one IoT device.Type: ApplicationFiled: March 28, 2022Publication date: September 29, 2022Inventors: Yevgeny Khessin, Narendra Sharma, Eran Netanel, Syed Zaeem Hosain
-
Publication number: 20220038483Abstract: The present invention relates generally to network communications, and more particularly to machine-to-machine (M2M) data communications. The present invention provides for a method, apparatus and computer program product for detecting anomalous performance event across a machine-to-machine (M2M) network and thereafter alerting users of performance issues in real-time or near real-time.Type: ApplicationFiled: October 15, 2021Publication date: February 3, 2022Inventors: Jins GEORGE, Subramanian BALAKRISHNAN, Narendra SHARMA
-
Publication number: 20210218825Abstract: A computer-implemented system and method for Over The Air delivery of firmware to devices enabled for connectivity using static and dynamic information about the devices are disclosed. The computer-implemented method for Over The Air delivery of firmware to devices enabled for connectivity using static and dynamic information about the devices comprises receiving static device information for the one or more devices; receiving dynamic device information for the one or more devices; dynamically grouping the one or more devices based on the static device information, the dynamic device information or the combination thereof; and dynamically scheduling Over The Air delivery of firmware using the grouping to the one or more devices enabled for connectivity.Type: ApplicationFiled: January 13, 2021Publication date: July 15, 2021Inventors: Narendra SHARMA, Amit KHETAWAT, David HU, Anand Vivek KHANDURI, Eran NETANEL, Yevgeny KHESSIN
-
Publication number: 20210185042Abstract: A computer-implemented system and method for secure authentication of IoT devices are disclosed. The method for secure authentication of IoT devices comprises establishing a network connection with a network operator server via a control channel, establishing identity of the network operator server using a pre-shared server key from one or more of pre-shared server keys, establishing identity of the IoT device using a pre-shared client key from one or more of pre-shared client keys and cryptographically generating a session key for a network session to allow secure data exchange between the network operator server and the IoT device. The cryptographically generated session key is used for securely authenticating application running on the authenticated IoT device.Type: ApplicationFiled: March 3, 2021Publication date: June 17, 2021Inventors: Narendra Sharma, Yixiang Chen
-
Publication number: 20210166501Abstract: In one or more embodiments, method, system and computer program product for providing secure access to device data and/or device operations by an application are disclosed. The method for providing secure access to one or more devices by an application includes receiving application information for the application; receiving device information for the one or more devices to which the application is requesting access; receiving rules for allowing the application to access the one or more devices, wherein the access to the one or more devices includes device data, one or more device operations or a combination thereof; and allowing the application to access the device based on the rules.Type: ApplicationFiled: February 13, 2021Publication date: June 3, 2021Inventors: Kunal Rupani, Narendra Sharma, Eran Netanel, Yixiang Chen, Drew S. Johnson, Andrew Durrer, Michael Garner
-
Publication number: 20210160694Abstract: A computer-implemented method and system for global device management architecture with regional autonomy for devices on a cellular network are disclosed. The computer implemented method for optimizing device management architecture for IoT devices includes providing device information to a server in a master node for registering a device with the master node; providing rules to assign the device to at least one node based on the device information; assigning the device to the at least one node in response to the rules; and automatically configuring the device to connect the device to the assigned node.Type: ApplicationFiled: February 3, 2021Publication date: May 27, 2021Inventors: Eran Netanel, Narendra Sharma, Yixiang Chen, Manish Mishra
-
Patent number: 10979416Abstract: A system and method for managing a trusted connection within a public cloud comprises transmitting a first token and a second token from a cloud service manager to a public cloud controller, initializing a public cloud manager in response to receipt of the first token and the second token, and generate a cloud certificate, and transmitting the cloud certificate and the second token from the public cloud manager to a management plane. The method further comprises establishing a trusted connection between the public cloud controller and the management plane in response to receipt of the cloud certificate and the second token by the management plane.Type: GrantFiled: May 9, 2018Date of Patent: April 13, 2021Assignee: Nicira, Inc.Inventors: Vaibhav Kulkarni, Narendra Sharma, Aditya Gokhale, Ganesan Chandrashekhar, Vivek Agarwal, Akshay Katrekar, Rompicherla Sai Pavan Kumar
-
Patent number: 10959092Abstract: A computer-implemented method and system for pairing one or more source devices with at least one target device are disclosed. The computer implemented method for pairing one or more source devices with at least one target device, the method includes receiving device identifiers for the one or more source devices and the at least one target device; generating pairing resource for at least one of the one or more source devices and the at least one target device; and using the pairing resource to allow authenticated and authorized users to perform a remote operation on the at least one target device from the at least one of the one or more source devices.Type: GrantFiled: October 15, 2019Date of Patent: March 23, 2021Assignee: AERIS COMMUNICATIONS, INC.Inventors: Narendra Sharma, Eran Netanel, Yixiang Chen
-
Patent number: 10917298Abstract: A computer-implemented method and system for global device management architecture with regional autonomy for devices on a cellular network are disclosed. The computer implemented method for optimizing device management architecture for IoT devices includes providing device information to a server in a master node for registering a device with the master node; providing rules to assign the device to at least one node based on the device information; assigning the device to the at least one node in response to the rules; and automatically configuring the device to connect the device to the assigned node.Type: GrantFiled: April 4, 2019Date of Patent: February 9, 2021Assignee: Aeris Communications, Inc.Inventors: Eran Netanel, Narendra Sharma, Yixiang Chen, Manish Mishra
-
Publication number: 20200220890Abstract: The present invention relates generally to network communications, and more particularly to machine-to-machine (M2M) data communications. The present invention provides for a method, apparatus and computer program product for detecting anomalous performance event across a machine-to-machine (M2M) network and thereafter alerting users of performance issues in real-time or near real-time.Type: ApplicationFiled: March 23, 2020Publication date: July 9, 2020Inventors: Jins GEORGE, Subramanian BALAKRISHNAN, Narendra SHARMA
-
Publication number: 20200120500Abstract: A computer-implemented method and system for pairing one or more source devices with at least one target device are disclosed. The computer implemented method for pairing one or more source devices with at least one target device, the method includes receiving device identifiers for the one or more source devices and the at least one target device; generating pairing resource for at least one of the one or more source devices and the at least one target device; and using the pairing resource to allow authenticated and authorized users to perform a remote operation on the at least one target device from the at least one of the one or more source devices.Type: ApplicationFiled: October 15, 2019Publication date: April 16, 2020Inventors: Narendra SHARMA, Eran NETANEL, Yixiang CHEN
-
Publication number: 20190312778Abstract: A computer-implemented method and system for global device management architecture with regional autonomy for devices on a cellular network are disclosed. The computer implemented method for optimizing device management architecture for IoT devices includes providing device information to a server in a master node for registering a device with the master node; providing rules to assign the device to at least one node based on the device information; assigning the device to the at least one node in response to the rules; and automatically configuring the device to connect the device to the assigned node.Type: ApplicationFiled: April 4, 2019Publication date: October 10, 2019Inventors: Eran NETANEL, Narendra SHARMA, Yixiang CHEN, Manish MISHRA
-
Publication number: 20190297072Abstract: A system and method for managing a trusted connection within a public cloud comprises transmitting a first token and a second token from a cloud service manager to a public cloud controller, initializing a public cloud manager in response to receipt of the first token and the second token, and generate a cloud certificate, and transmitting the cloud certificate and the second token from the public cloud manager to a management plane. The method further comprises establishing a trusted connection between the public cloud controller and the management plane in response to receipt of the cloud certificate and the second token by the management plane.Type: ApplicationFiled: May 9, 2018Publication date: September 26, 2019Inventors: Vaibhav Kulkarni, Narendra Sharma, Aditya Gokhale, Ganesan Chandrashekhar, Vivek Agarwal, Akshay Katrekar, Rompicherla Sai Pavan Kumar