Patents by Inventor Neeraj Surana
Neeraj Surana has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240048598Abstract: A method for identifying an active administration function (ADMF) in a lawful interception deployment that utilizes an ADMF set comprising a plurality of ADMFs can be implemented by a network element. The method can include exchanging lawful interception signaling with a first ADMF when the first ADMF is the active ADMF. The method can also include receiving an auditing request message from one of the plurality of ADMFs in the ADMF set and sending a ping request message to each ADMF in the ADMF set. The method can also include receiving a ping response message from a second ADMF among the plurality of ADMFs in the ADMF set and identifying the second ADMF as the active ADMF in response to receiving the ping response message. The method can also include exchanging second lawful interception signaling with the second ADMF when the second ADMF is the active ADMF.Type: ApplicationFiled: October 23, 2023Publication date: February 8, 2024Inventors: Neeraj SURANA, Kantha Rao DAMMALAPATI
-
Patent number: 11877158Abstract: A system that enables hanging lawful interception (LI) resources to be cleaned up includes a triggering function set comprising a plurality of triggering functions. The system also includes a data store comprising a plurality of auditing records corresponding to the plurality of triggering functions in the triggering function set. Each auditing record comprises a claimant attribute. Each triggering function sends an update request to the data store in response to being notified about a failed triggering function within the triggering function set. Each update request comprises a request to change ownership of the auditing record corresponding to the failed triggering function. A triggering function is selected as a new owner of the auditing record corresponding to the failed triggering function based at least in part on a match between the claimant attribute in the auditing record and a claimant field in the update request sent by the triggering function.Type: GrantFiled: March 3, 2023Date of Patent: January 16, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Neeraj Surana, Kantha Rao Dammalapati
-
Patent number: 11870683Abstract: A method for improving availability of a type of network element in a mobile network includes receiving a first message from a source network element at a first network element instance that belongs to a network element anycast set. The first message is addressed to an anycast address that is assigned to the network element anycast set. The first network element instance processes the first message and accesses an anycast set data store in relation to processing the first message. The method also includes receiving a second message from the source network element at a second network element instance that also belongs to the network element anycast set. The second message is also addressed to the anycast address and can be received when the first network element instance is unavailable. The second network element instance processes the second message and accesses the anycast set data store in relation thereto.Type: GrantFiled: February 15, 2022Date of Patent: January 9, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Dhananjaya Reddy Eadala, Mark Gordon Libby, Srinivas Kappla, Ronald Mark Parker, Neeraj Surana, Anupama Raghavan, Bashir Ashrafi
-
Patent number: 11863614Abstract: A first plurality of UDP packets corresponding to a first session and a second plurality of UDP packets corresponding to a second session can be received at a core network node. The first plurality of UDP packets and the second plurality of UDP packets have the same source five tuple. A first plurality of HTTP packets comprising first session information identifying the first session can be created based on the first plurality of UDP packets. A second plurality of HTTP packets comprising second session information identifying the second session can be created based on the second plurality of UDP packets. The first plurality of HTTP packets can be routed to a first microservice instance based at least in part on the first session information. The second plurality of HTTP packets can be routed to a second microservice instance based at least in part on the second session information.Type: GrantFiled: November 18, 2021Date of Patent: January 2, 2024Assignee: Microsoft Technology Licensing, LLCInventors: K. Balaji Kannadassan, Neeraj Surana, Kantha Rao Dammalapati
-
Patent number: 11799918Abstract: A method for identifying an active administration function (ADMF) in a lawful interception deployment that utilizes an ADMF set comprising a plurality of ADMFs can be implemented by a network element. The method can include exchanging lawful interception signaling with a first ADMF when the first ADMF is the active ADMF. The method can also include receiving an auditing request message from one of the plurality of ADMFs in the ADMF set and sending a ping request message to each ADMF in the ADMF set. The method can also include receiving a ping response message from a second ADMF among the plurality of ADMFs in the ADMF set and identifying the second ADMF as the active ADMF in response to receiving the ping response message. The method can also include exchanging second lawful interception signaling with the second ADMF when the second ADMF is the active ADMF.Type: GrantFiled: June 16, 2021Date of Patent: October 24, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Neeraj Surana, Kantha Rao Dammalapati
-
Publication number: 20230315262Abstract: A method and system for managing presentation of multiple applications from a first participant to one or more second participants of a unified communication session are described herein, including receiving, from the first participant, a selected set of applications for display to the one or more second participants during the unified communication session and causing only one of the selected set of applications to be displayed at a time to the one or more second participants through the meeting application, including switching between causing first and second applications of the selected set of applications to be displayed to the one or more second participants based on a most recent selection or user interaction with the first and second applications.Type: ApplicationFiled: March 30, 2022Publication date: October 5, 2023Inventor: Neeraj Surana
-
Publication number: 20230209358Abstract: A system that enables hanging lawful interception (LI) resources to be cleaned up includes a triggering function set comprising a plurality of triggering functions. The system also includes a data store comprising a plurality of auditing records corresponding to the plurality of triggering functions in the triggering function set. Each auditing record comprises a claimant attribute. Each triggering function sends an update request to the data store in response to being notified about a failed triggering function within the triggering function set. Each update request comprises a request to change ownership of the auditing record corresponding to the failed triggering function. A triggering function is selected as a new owner of the auditing record corresponding to the failed triggering function based at least in part on a match between the claimant attribute in the auditing record and a claimant field in the update request sent by the triggering function.Type: ApplicationFiled: March 3, 2023Publication date: June 29, 2023Inventors: Neeraj SURANA, Kantha Rao DAMMALAPATI
-
Publication number: 20230156076Abstract: A first plurality of UDP packets corresponding to a first session and a second plurality of UDP packets corresponding to a second session can be received at a core network node. The first plurality of UDP packets and the second plurality of UDP packets have the same source five tuple. A first plurality of HTTP packets comprising first session information identifying the first session can be created based on the first plurality of UDP packets. A second plurality of HTTP packets comprising second session information identifying the second session can be created based on the second plurality of UDP packets. The first plurality of HTTP packets can be routed to a first microservice instance based at least in part on the first session information. The second plurality of HTTP packets can be routed to a second microservice instance based at least in part on the second session information.Type: ApplicationFiled: November 18, 2021Publication date: May 18, 2023Inventors: K. Balaji KANNADASSAN, Neeraj SURANA, Kantha Rao DAMMALAPATI
-
Patent number: 11601818Abstract: A system that enables hanging lawful interception (LI) resources to be cleaned up includes a triggering function set comprising a plurality of triggering functions. The system also includes a data store comprising a plurality of auditing records corresponding to the plurality of triggering functions in the triggering function set. Each auditing record comprises a claimant attribute. Each triggering function sends an update request to the data store in response to being notified about a failed triggering function within the triggering function set. Each update request comprises a request to change ownership of the auditing record corresponding to the failed triggering function. A triggering function is selected as a new owner of the auditing record corresponding to the failed triggering function based at least in part on a match between the claimant attribute in the auditing record and a claimant field in the update request sent by the triggering function.Type: GrantFiled: June 7, 2021Date of Patent: March 7, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Neeraj Surana, Kantha Rao Dammalapati
-
Publication number: 20220407895Abstract: A method for identifying an active administration function (ADMF) in a lawful interception deployment that utilizes an ADMF set comprising a plurality of ADMFs can be implemented by a network element. The method can include exchanging lawful interception signaling with a first ADMF when the first ADMF is the active ADMF. The method can also include receiving an auditing request message from one of the plurality of ADMFs in the ADMF set and sending a ping request message to each ADMF in the ADMF set. The method can also include receiving a ping response message from a second ADMF among the plurality of ADMFs in the ADMF set and identifying the second ADMF as the active ADMF in response to receiving the ping response message. The method can also include exchanging second lawful interception signaling with the second ADMF when the second ADMF is the active ADMF.Type: ApplicationFiled: June 16, 2021Publication date: December 22, 2022Inventors: Neeraj SURANA, Kantha Rao DAMMALAPATI
-
Publication number: 20220393969Abstract: A method for improving availability of a type of network element in a mobile network includes receiving a first message from a source network element at a first network element instance that belongs to a network element anycast set. The first message is addressed to an anycast address that is assigned to the network element anycast set. The first network element instance processes the first message and accesses an anycast set data store in relation to processing the first message. The method also includes receiving a second message from the source network element at a second network element instance that also belongs to the network element anycast set. The second message is also addressed to the anycast address and can be received when the first network element instance is unavailable. The second network element instance processes the second message and accesses the anycast set data store in relation thereto.Type: ApplicationFiled: February 15, 2022Publication date: December 8, 2022Inventors: Dhananjaya Reddy EADALA, Mark Gordon LIBBY, Srinivas KAPPLA, Ronald Mark PARKER, Neeraj SURANA, Anupama RAGHAVAN, Bashir ASHRAFI
-
Publication number: 20220295290Abstract: A system that enables hanging lawful interception (LI) resources to be cleaned up includes a triggering function set comprising a plurality of triggering functions. The system also includes a data store comprising a plurality of auditing records corresponding to the plurality of triggering functions in the triggering function set. Each auditing record comprises a claimant attribute. Each triggering function sends an update request to the data store in response to being notified about a failed triggering function within the triggering function set. Each update request comprises a request to change ownership of the auditing record corresponding to the failed triggering function. A triggering function is selected as a new owner of the auditing record corresponding to the failed triggering function based at least in part on a match between the claimant attribute in the auditing record and a claimant field in the update request sent by the triggering function.Type: ApplicationFiled: June 7, 2021Publication date: September 15, 2022Inventors: Neeraj SURANA, Kantha Rao DAMMALAPATI
-
Patent number: 10445225Abstract: A method and apparatus of a novel command coverage analyzer is disclosed. Combinations of commands, options, arguments, and values of a product are extracted, customer environment and uses are considered, and a more comprehensive and accurate quality of software process and metric is provided.Type: GrantFiled: May 17, 2016Date of Patent: October 15, 2019Assignee: Synopsys, Inc.Inventors: Chandramouli Gopalakrishnan, Subramanian Chebiyam, Neeraj Surana, Santosh Kulkarni, Rohit Kapur
-
Publication number: 20180107587Abstract: A method and apparatus of a novel command coverage analyzer is disclosed. Combinations of commands, options, arguments, and values of a product are extracted, customer environment and uses are considered, and a more comprehensive and accurate quality of software process and metric is provided.Type: ApplicationFiled: May 17, 2016Publication date: April 19, 2018Inventors: Chandramouli Gopalakrishnan, Subramanian Chebiyam, Neeraj Surana, Santosh Kulkarni, Rohit Kapur
-
Publication number: 20170041155Abstract: Synchronization issues within a policy and charging control system are avoided by enabling a PCEF to notify the PCRF that it will ignore one or more credit control answers. The PCEF sends a first credit control request to the PCRF in the policy and charging control system for access to resources in a network. Before receiving a first credit control answer corresponding to the first credit control request, the PCEF sends a second credit control request to the PCRF. The second credit control request includes an indication that the first credit control answer will be ignored. The PCEF receives the first credit control answer from the PCRF, but does not process the first credit control answer. The PCEF receives a second credit control answer from the PCRF and processes the second credit control answer without processing the first credit control answer.Type: ApplicationFiled: August 4, 2015Publication date: February 9, 2017Inventor: Neeraj Surana
-
Patent number: 9342439Abstract: A method and apparatus of a novel command coverage analyzer is disclosed. Combinations of commands, options, arguments, and values of a product are extracted, customer environment and uses are considered, and a more comprehensive and accurate quality of software process and metric is provided.Type: GrantFiled: June 11, 2015Date of Patent: May 17, 2016Assignee: Synopsys, Inc.Inventors: Chandramouli Gopalakrishnan, Subramanian Chebiyam, Neeraj Surana, Santosh Kulkarni, Rohit Kapur
-
Publication number: 20150363295Abstract: A method and apparatus of a novel command coverage analyzer is disclosed. Combinations of commands, options, arguments, and values of a product are extracted, customer environment and uses are considered, and a more comprehensive and accurate quality of software process and metric is provided.Type: ApplicationFiled: June 11, 2015Publication date: December 17, 2015Inventors: Chandramouli Gopalakrishnan, Subramanian Chebiyam, Neeraj Surana, Santosh Kulkarni, Rohit Kapur