Patents by Inventor Neeraj Surana

Neeraj Surana has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240048598
    Abstract: A method for identifying an active administration function (ADMF) in a lawful interception deployment that utilizes an ADMF set comprising a plurality of ADMFs can be implemented by a network element. The method can include exchanging lawful interception signaling with a first ADMF when the first ADMF is the active ADMF. The method can also include receiving an auditing request message from one of the plurality of ADMFs in the ADMF set and sending a ping request message to each ADMF in the ADMF set. The method can also include receiving a ping response message from a second ADMF among the plurality of ADMFs in the ADMF set and identifying the second ADMF as the active ADMF in response to receiving the ping response message. The method can also include exchanging second lawful interception signaling with the second ADMF when the second ADMF is the active ADMF.
    Type: Application
    Filed: October 23, 2023
    Publication date: February 8, 2024
    Inventors: Neeraj SURANA, Kantha Rao DAMMALAPATI
  • Patent number: 11877158
    Abstract: A system that enables hanging lawful interception (LI) resources to be cleaned up includes a triggering function set comprising a plurality of triggering functions. The system also includes a data store comprising a plurality of auditing records corresponding to the plurality of triggering functions in the triggering function set. Each auditing record comprises a claimant attribute. Each triggering function sends an update request to the data store in response to being notified about a failed triggering function within the triggering function set. Each update request comprises a request to change ownership of the auditing record corresponding to the failed triggering function. A triggering function is selected as a new owner of the auditing record corresponding to the failed triggering function based at least in part on a match between the claimant attribute in the auditing record and a claimant field in the update request sent by the triggering function.
    Type: Grant
    Filed: March 3, 2023
    Date of Patent: January 16, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Neeraj Surana, Kantha Rao Dammalapati
  • Patent number: 11870683
    Abstract: A method for improving availability of a type of network element in a mobile network includes receiving a first message from a source network element at a first network element instance that belongs to a network element anycast set. The first message is addressed to an anycast address that is assigned to the network element anycast set. The first network element instance processes the first message and accesses an anycast set data store in relation to processing the first message. The method also includes receiving a second message from the source network element at a second network element instance that also belongs to the network element anycast set. The second message is also addressed to the anycast address and can be received when the first network element instance is unavailable. The second network element instance processes the second message and accesses the anycast set data store in relation thereto.
    Type: Grant
    Filed: February 15, 2022
    Date of Patent: January 9, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Dhananjaya Reddy Eadala, Mark Gordon Libby, Srinivas Kappla, Ronald Mark Parker, Neeraj Surana, Anupama Raghavan, Bashir Ashrafi
  • Patent number: 11863614
    Abstract: A first plurality of UDP packets corresponding to a first session and a second plurality of UDP packets corresponding to a second session can be received at a core network node. The first plurality of UDP packets and the second plurality of UDP packets have the same source five tuple. A first plurality of HTTP packets comprising first session information identifying the first session can be created based on the first plurality of UDP packets. A second plurality of HTTP packets comprising second session information identifying the second session can be created based on the second plurality of UDP packets. The first plurality of HTTP packets can be routed to a first microservice instance based at least in part on the first session information. The second plurality of HTTP packets can be routed to a second microservice instance based at least in part on the second session information.
    Type: Grant
    Filed: November 18, 2021
    Date of Patent: January 2, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: K. Balaji Kannadassan, Neeraj Surana, Kantha Rao Dammalapati
  • Patent number: 11799918
    Abstract: A method for identifying an active administration function (ADMF) in a lawful interception deployment that utilizes an ADMF set comprising a plurality of ADMFs can be implemented by a network element. The method can include exchanging lawful interception signaling with a first ADMF when the first ADMF is the active ADMF. The method can also include receiving an auditing request message from one of the plurality of ADMFs in the ADMF set and sending a ping request message to each ADMF in the ADMF set. The method can also include receiving a ping response message from a second ADMF among the plurality of ADMFs in the ADMF set and identifying the second ADMF as the active ADMF in response to receiving the ping response message. The method can also include exchanging second lawful interception signaling with the second ADMF when the second ADMF is the active ADMF.
    Type: Grant
    Filed: June 16, 2021
    Date of Patent: October 24, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Neeraj Surana, Kantha Rao Dammalapati
  • Publication number: 20230315262
    Abstract: A method and system for managing presentation of multiple applications from a first participant to one or more second participants of a unified communication session are described herein, including receiving, from the first participant, a selected set of applications for display to the one or more second participants during the unified communication session and causing only one of the selected set of applications to be displayed at a time to the one or more second participants through the meeting application, including switching between causing first and second applications of the selected set of applications to be displayed to the one or more second participants based on a most recent selection or user interaction with the first and second applications.
    Type: Application
    Filed: March 30, 2022
    Publication date: October 5, 2023
    Inventor: Neeraj Surana
  • Publication number: 20230209358
    Abstract: A system that enables hanging lawful interception (LI) resources to be cleaned up includes a triggering function set comprising a plurality of triggering functions. The system also includes a data store comprising a plurality of auditing records corresponding to the plurality of triggering functions in the triggering function set. Each auditing record comprises a claimant attribute. Each triggering function sends an update request to the data store in response to being notified about a failed triggering function within the triggering function set. Each update request comprises a request to change ownership of the auditing record corresponding to the failed triggering function. A triggering function is selected as a new owner of the auditing record corresponding to the failed triggering function based at least in part on a match between the claimant attribute in the auditing record and a claimant field in the update request sent by the triggering function.
    Type: Application
    Filed: March 3, 2023
    Publication date: June 29, 2023
    Inventors: Neeraj SURANA, Kantha Rao DAMMALAPATI
  • Publication number: 20230156076
    Abstract: A first plurality of UDP packets corresponding to a first session and a second plurality of UDP packets corresponding to a second session can be received at a core network node. The first plurality of UDP packets and the second plurality of UDP packets have the same source five tuple. A first plurality of HTTP packets comprising first session information identifying the first session can be created based on the first plurality of UDP packets. A second plurality of HTTP packets comprising second session information identifying the second session can be created based on the second plurality of UDP packets. The first plurality of HTTP packets can be routed to a first microservice instance based at least in part on the first session information. The second plurality of HTTP packets can be routed to a second microservice instance based at least in part on the second session information.
    Type: Application
    Filed: November 18, 2021
    Publication date: May 18, 2023
    Inventors: K. Balaji KANNADASSAN, Neeraj SURANA, Kantha Rao DAMMALAPATI
  • Patent number: 11601818
    Abstract: A system that enables hanging lawful interception (LI) resources to be cleaned up includes a triggering function set comprising a plurality of triggering functions. The system also includes a data store comprising a plurality of auditing records corresponding to the plurality of triggering functions in the triggering function set. Each auditing record comprises a claimant attribute. Each triggering function sends an update request to the data store in response to being notified about a failed triggering function within the triggering function set. Each update request comprises a request to change ownership of the auditing record corresponding to the failed triggering function. A triggering function is selected as a new owner of the auditing record corresponding to the failed triggering function based at least in part on a match between the claimant attribute in the auditing record and a claimant field in the update request sent by the triggering function.
    Type: Grant
    Filed: June 7, 2021
    Date of Patent: March 7, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Neeraj Surana, Kantha Rao Dammalapati
  • Publication number: 20220407895
    Abstract: A method for identifying an active administration function (ADMF) in a lawful interception deployment that utilizes an ADMF set comprising a plurality of ADMFs can be implemented by a network element. The method can include exchanging lawful interception signaling with a first ADMF when the first ADMF is the active ADMF. The method can also include receiving an auditing request message from one of the plurality of ADMFs in the ADMF set and sending a ping request message to each ADMF in the ADMF set. The method can also include receiving a ping response message from a second ADMF among the plurality of ADMFs in the ADMF set and identifying the second ADMF as the active ADMF in response to receiving the ping response message. The method can also include exchanging second lawful interception signaling with the second ADMF when the second ADMF is the active ADMF.
    Type: Application
    Filed: June 16, 2021
    Publication date: December 22, 2022
    Inventors: Neeraj SURANA, Kantha Rao DAMMALAPATI
  • Publication number: 20220393969
    Abstract: A method for improving availability of a type of network element in a mobile network includes receiving a first message from a source network element at a first network element instance that belongs to a network element anycast set. The first message is addressed to an anycast address that is assigned to the network element anycast set. The first network element instance processes the first message and accesses an anycast set data store in relation to processing the first message. The method also includes receiving a second message from the source network element at a second network element instance that also belongs to the network element anycast set. The second message is also addressed to the anycast address and can be received when the first network element instance is unavailable. The second network element instance processes the second message and accesses the anycast set data store in relation thereto.
    Type: Application
    Filed: February 15, 2022
    Publication date: December 8, 2022
    Inventors: Dhananjaya Reddy EADALA, Mark Gordon LIBBY, Srinivas KAPPLA, Ronald Mark PARKER, Neeraj SURANA, Anupama RAGHAVAN, Bashir ASHRAFI
  • Publication number: 20220295290
    Abstract: A system that enables hanging lawful interception (LI) resources to be cleaned up includes a triggering function set comprising a plurality of triggering functions. The system also includes a data store comprising a plurality of auditing records corresponding to the plurality of triggering functions in the triggering function set. Each auditing record comprises a claimant attribute. Each triggering function sends an update request to the data store in response to being notified about a failed triggering function within the triggering function set. Each update request comprises a request to change ownership of the auditing record corresponding to the failed triggering function. A triggering function is selected as a new owner of the auditing record corresponding to the failed triggering function based at least in part on a match between the claimant attribute in the auditing record and a claimant field in the update request sent by the triggering function.
    Type: Application
    Filed: June 7, 2021
    Publication date: September 15, 2022
    Inventors: Neeraj SURANA, Kantha Rao DAMMALAPATI
  • Patent number: 10445225
    Abstract: A method and apparatus of a novel command coverage analyzer is disclosed. Combinations of commands, options, arguments, and values of a product are extracted, customer environment and uses are considered, and a more comprehensive and accurate quality of software process and metric is provided.
    Type: Grant
    Filed: May 17, 2016
    Date of Patent: October 15, 2019
    Assignee: Synopsys, Inc.
    Inventors: Chandramouli Gopalakrishnan, Subramanian Chebiyam, Neeraj Surana, Santosh Kulkarni, Rohit Kapur
  • Publication number: 20180107587
    Abstract: A method and apparatus of a novel command coverage analyzer is disclosed. Combinations of commands, options, arguments, and values of a product are extracted, customer environment and uses are considered, and a more comprehensive and accurate quality of software process and metric is provided.
    Type: Application
    Filed: May 17, 2016
    Publication date: April 19, 2018
    Inventors: Chandramouli Gopalakrishnan, Subramanian Chebiyam, Neeraj Surana, Santosh Kulkarni, Rohit Kapur
  • Publication number: 20170041155
    Abstract: Synchronization issues within a policy and charging control system are avoided by enabling a PCEF to notify the PCRF that it will ignore one or more credit control answers. The PCEF sends a first credit control request to the PCRF in the policy and charging control system for access to resources in a network. Before receiving a first credit control answer corresponding to the first credit control request, the PCEF sends a second credit control request to the PCRF. The second credit control request includes an indication that the first credit control answer will be ignored. The PCEF receives the first credit control answer from the PCRF, but does not process the first credit control answer. The PCEF receives a second credit control answer from the PCRF and processes the second credit control answer without processing the first credit control answer.
    Type: Application
    Filed: August 4, 2015
    Publication date: February 9, 2017
    Inventor: Neeraj Surana
  • Patent number: 9342439
    Abstract: A method and apparatus of a novel command coverage analyzer is disclosed. Combinations of commands, options, arguments, and values of a product are extracted, customer environment and uses are considered, and a more comprehensive and accurate quality of software process and metric is provided.
    Type: Grant
    Filed: June 11, 2015
    Date of Patent: May 17, 2016
    Assignee: Synopsys, Inc.
    Inventors: Chandramouli Gopalakrishnan, Subramanian Chebiyam, Neeraj Surana, Santosh Kulkarni, Rohit Kapur
  • Publication number: 20150363295
    Abstract: A method and apparatus of a novel command coverage analyzer is disclosed. Combinations of commands, options, arguments, and values of a product are extracted, customer environment and uses are considered, and a more comprehensive and accurate quality of software process and metric is provided.
    Type: Application
    Filed: June 11, 2015
    Publication date: December 17, 2015
    Inventors: Chandramouli Gopalakrishnan, Subramanian Chebiyam, Neeraj Surana, Santosh Kulkarni, Rohit Kapur