Patents by Inventor Prakash Patel
Prakash Patel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250245694Abstract: Systems and methods including one or more processors and one or more non-transitory storage devices storing computing instructions configured to run on the one or more processors and perform: receiving a search query from a user and user session information; receiving input information corresponding to one or more campaigns to display to the user; determining a first bid for the one or more campaigns based on the search query and the user session information; determining a second bid for the one or more campaigns based on the input information; determining a final bid for the one or more campaigns based on the first bid and the second bid; transmitting the final bid to a ranking system to generate a listing of advertisements, the listing of advertisements including positioning information; and enabling a graphical user interface to be modified to reposition the listing of advertisements based on the positioning information. Other embodiments are disclosed herein.Type: ApplicationFiled: January 31, 2024Publication date: July 31, 2025Applicant: Walmart Apollo, LLCInventors: Biyi Fang, Anish Saha, Xinzi Sun, Dong Xu, Kritika Upreti, Mohit Prakash Patel, Jayanth Korlimarla, Jiaxuan Xu, Musen Wen, Ramakanth Putta, Naga Vijay Bhaskar Manchi, Valeriy Valeryevich Pelyushenko, Ranjit Kumar Pedapati, Rajesh Garigipati, Anant Furia, Kuang-chih Lee, Chintan Jagdish Rita, Wei Shen
-
Patent number: 12328290Abstract: Described herein are embodiments of testing MMS messaging capacity of a wireless network using commercially available client devices. An exemplary method includes receiving, at a multimedia messaging service center (MMSC) of the wireless network, a plurality of seed MMS messages from one or more client devices. Each of the plurality of seed MMS messages is targeted at one of a plurality of destination numbers, none of the plurality of destination numbers is associated with any database that the MMSC uses for routing determination, and each of the plurality of seed MMS messages gets stuck in an infinite loop and keeps generating MMS messages. The method further includes capturing at least a portion of the seed messages and the generated MMS messages; determining that the number of captured MMS messages reaches a predetermined number; and in response to such determination, terminating each of the infinite loops.Type: GrantFiled: November 13, 2023Date of Patent: June 10, 2025Assignee: DISH Wireless L.L.C.Inventors: Dawood Shahdad, Prakash Patel
-
Publication number: 20250159457Abstract: A cellular telecommunication system application server (AS), such as the short message service center (SMSC) or Multimedia Messaging Service Center (MMSC), obtains a cellular network subscriber UE location information from a Home Subscriber Server (HSS) of the cellular telecommunication system. The system determines whether the cellular network subscriber UE is roaming based on the UE location information obtained from the HSS. The system populates the location information obtained from the HSS into a call data record (CDR) of the UE and determines whether the cellular network subscriber UE is roaming based on the location information obtained from the HSS populated into the CDR. The system supports location-based services of the UE based on UE location information obtained from the HSS both while the UE is on a home cellular network and while the UE is roaming.Type: ApplicationFiled: November 14, 2023Publication date: May 15, 2025Inventors: Prakash Patel, Parthasarathi Tripathy
-
Publication number: 20250158945Abstract: Described herein are embodiments of testing MMS messaging capacity of a wireless network using commercially available client devices. An exemplary method includes receiving, at a multimedia messaging service center (MMSC) of the wireless network, a plurality of seed MMS messages from one or more client devices. Each of the plurality of seed MMS messages is targeted at one of a plurality of destination numbers, none of the plurality of destination numbers is associated with any database that the MMSC uses for routing determination, and each of the plurality of seed MMS messages gets stuck in an infinite loop and keeps generating MMS messages. The method further includes capturing at least a portion of the seed messages and the generated MMS messages; determining that the number of captured MMS messages reaches a predetermined number; and in response to such determination, terminating each of the infinite loops.Type: ApplicationFiled: November 13, 2023Publication date: May 15, 2025Inventors: Dawood Shahdad, Prakash Patel
-
Publication number: 20250113221Abstract: According to various embodiments, the systems and methods disclosed herein can utilize a blocking service to prevent malfunctioning NF instances from being discovered by consumer NF instances in discovery requests within a wireless network (e.g., a 5G network). The blocking service can be integrated into an NRF of the wireless network and can be used to add a malfunctioning NF instance to a block list. Additionally, the blocking service can prevent any malfunctioning NF instance on the block list from being returned to a consumer NF instance during a discovery request. When an NF producer instance is determined to be malfunctioning and subsequently added to the block list, the blocking service can trigger a notification to be sent to an NF consumer instance that is utilizing the affected NF producer instance. Upon receipt of this notification, the NF producer instance can cease its consumption of the malfunctioning producer NF instance.Type: ApplicationFiled: September 29, 2023Publication date: April 3, 2025Inventors: Abhishek Jayprakash Shirke, Dawood Shahdad, Prakash Patel, MythriAmulya Sabhapati
-
Publication number: 20240340758Abstract: A disclosed method may include (i) disposing a network access table gateway between a multimedia service center within a cellular service network and a telecommunications server of an external wireless network provider that has partnered with the cellular service network, (ii) receiving, at the network access table gateway, a network packet that was sent from the telecommunications server of the external wireless network provider and that is directed to a public Internet Protocol address of the network access table gateway, and (iii) routing, by referencing a network access table of the network access table gateway, the network packet to a destination within the cellular service network. Related systems and computer-readable mediums are further disclosed.Type: ApplicationFiled: April 4, 2023Publication date: October 10, 2024Inventors: Prakash Patel, Partha Tripathy, Brian Peletz, Mohammad Dawood Shahdad
-
Publication number: 20240257205Abstract: Systems and methods of generating interfaces including variant item recommendations are disclosed. A request for an interface and a set of candidate items selected from an item catalog are received. At least one of the candidate items is representative of two or more variant items. A variant score is determined for each variant item related to the at least one of the candidate items and a set of recommended items is generated by independently ranking each item in the set of candidate items and each of the two or more variant items. The set of recommended items is generated by a variant-aware ranking model configured to receive the variant score for each variant item and based on the variant score and a relevancy score for each variant item. The interface including the set of recommended items is generated and transmitted to a system that generated the request for the interface.Type: ApplicationFiled: January 31, 2023Publication date: August 1, 2024Inventors: Kritika Upreti, Yanbing Xue, Rithvik Reddy Ananth, Mohit Prakash Patel, Jayanth Korlimarla, Musen Wen
-
Patent number: 11792174Abstract: Described embodiments provide systems and methods for remapping connections to tunnels selected based on a security level of the communications. A first network device may be in communication with a second network device via a plurality of communication tunnels. The plurality of communication tunnels may include an encrypted communication tunnel and an unencrypted communication tunnel. The first network device may receive a packet, the packet including header information and a payload. The first network device may determine whether the received packet is encrypted to meet a threshold level of security. The first network device may, responsive to determining that the packet is to meet the threshold level of security, communicate an identifier of the payload and the header information to the second network device via the encrypted communication tunnel, and communicate the payload to the second network device via the unencrypted communication tunnel.Type: GrantFiled: May 17, 2021Date of Patent: October 17, 2023Inventors: Praveen Raja Dhanabalan, Surya Prakash Patel, J Mohan Rao Arisankala
-
Publication number: 20220382848Abstract: The present invention relates to a method, apparatus, and system of distinguishing a human user and a simulated user. More particularly, the present invention relates to protecting networks against simulated human users via an image recognition arrangement. Aspects and/or embodiments seek to provide a method and system for verifying that a user is human, rather than a computer, in order to protect access to resources such as public facing websites.Type: ApplicationFiled: November 11, 2020Publication date: December 1, 2022Inventors: Dinesh Kanadia, Prakash PATEL, Neil SHAH, Seyedmohammadreza SAADATBEHESHTI
-
Patent number: 11405309Abstract: Described embodiments provide systems and methods for selecting communication paths for applications sensitive to bursty packet drops. A device intermediary to a client and a server may identify an application for which packets are to be communicated between the client and the server. The device may determine a sensitivity level of the application to a network disruption affecting the packets. The device may estimate, for each path between the client and the server for communicating the one or more packets, a path quality for the path indicating a likelihood that the network disruption affects the one or more packets. The device may select path for communicating the packets based on the sensitivity level of the application and the path quality. The device may communicate the packets between the client and the server via the path.Type: GrantFiled: July 30, 2020Date of Patent: August 2, 2022Assignee: Citrix Systems, Inc.Inventors: Sachin Shelar, Praveen Raja Dhanabalan, Surya Prakash Patel
-
Publication number: 20210273927Abstract: Described embodiments provide systems and methods for remapping connections to tunnels selected based on a security level of the communications. A first network device may be in communication with a second network device via a plurality of communication tunnels. The plurality of communication tunnels may include an encrypted communication tunnel and an unencrypted communication tunnel. The first network device may receive a packet, the packet including header information and a payload. The first network device may determine whether the received packet is encrypted to meet a threshold level of security. The first network device may, responsive to determining that the packet is to meet the threshold level of security, communicate an identifier of the payload and the header information to the second network device via the encrypted communication tunnel, and communicate the payload to the second network device via the unencrypted communication tunnel.Type: ApplicationFiled: May 17, 2021Publication date: September 2, 2021Applicant: Citrix Systems, Inc.Inventors: Praveen Raja Dhanabalan, Surya Prakash Patel, J Mohan Rao Arisankala
-
Patent number: 11012429Abstract: Described embodiments provide systems and methods for remapping connections to tunnels selected based on a security level of the communications. A first network device may be in communication with a second network device via a plurality of communication tunnels. The plurality of communication tunnels may include an encrypted communication tunnel and an unencrypted communication tunnel. The first network device may receive a packet, the packet including header information and a payload. The first network device may determine whether the received packet is encrypted to meet a threshold level of security. The first network device may, responsive to determining that the packet is to meet the threshold level of security, communicate an identifier of the payload and the header information to the second network device via the encrypted communication tunnel, and communicate the payload to the second network device via the unencrypted communication tunnel.Type: GrantFiled: December 5, 2018Date of Patent: May 18, 2021Assignee: Citrix Systems, Inc.Inventors: Praveen Raja Dhanabalan, Surya Prakash Patel, J Mohan Rao Arisankala
-
Publication number: 20210011700Abstract: An update system configured to provide software updates, software patches and/or other data packets to one or more computer systems via a network is disclosed. The update system may interact with a network management system, such as an enterprise management system, to distribute data packets and gather configuration information. The update system may generate and send commands to the network management system. The network management system may carry out the commands to distribute data packets and/or gather configuration information.Type: ApplicationFiled: July 27, 2020Publication date: January 14, 2021Inventors: Harry Aderton, Richard Aderton, Prakash Patel, John Reckeweg, Gary Rietmann
-
Publication number: 20200366597Abstract: Described embodiments provide systems and methods for selecting communication paths for applications sensitive to bursty packet drops. A device intermediary to a client and a server may identify an application for which packets are to be communicated between the client and the server. The device may determine a sensitivity level of the application to a network disruption affecting the packets. The device may estimate, for each path between the client and the server for communicating the one or more packets, a path quality for the path indicating a likelihood that the network disruption affects the one or more packets. The device may select path for communicating the packets based on the sensitivity level of the application and the path quality. The device may communicate the packets between the client and the server via the path.Type: ApplicationFiled: July 30, 2020Publication date: November 19, 2020Inventors: Sachin Shelar, Praveen Raja Dhanabalan, Surya Prakash Patel
-
Patent number: 10798026Abstract: Systems and methods for bufferbloat recovery and avoidance are provided herein. A portion of the buffer can be compressed based on one or more thresholds without changing an order of packet transmission and without dropping packets. The method includes storing, by a device, a plurality of packets received by the device to a buffer. The buffer can be configured with a minimum threshold and a maximum threshold. The method includes detecting that a size of the buffer has reached at least the maximum threshold and compressing one or more packets of the plurality of packets stored between the minimum threshold and the maximum threshold while transmitting, during compression, at least a portion of one or more packets of the plurality of packets stored in the buffer below the minimum threshold.Type: GrantFiled: July 5, 2018Date of Patent: October 6, 2020Assignee: Citrix Systems, Inc.Inventors: Praveen Raja Dhanabalan, Surya Prakash Patel
-
Publication number: 20200310773Abstract: An update system configured to provide software updates, software patches and/or other data packets to one or more computer systems via a network is disclosed. The update system may interact with a network management system, such as an enterprise management system, to distribute data packets and gather configuration information. The update system may generate and send commands to the network management system. The network management system may carry out the commands to distribute data packets and/or gather configuration information.Type: ApplicationFiled: April 21, 2020Publication date: October 1, 2020Inventors: Harry Aderton, Richard Aderton, Prakash Patel, John Reckeweg, Gary Rietmann
-
Patent number: 10749795Abstract: Described embodiments provide systems and methods for selecting communication paths for applications sensitive to bursty packet drops. A device intermediary to a client and a server may identify an application for which packets are to be communicated between the client and the server. The device may determine a sensitivity level of the application to a network disruption affecting the packets. The device may estimate, for each path between the client and the server for communicating the one or more packets, a path quality for the path indicating a likelihood that the network disruption affects the one or more packets. The device may select path for communicating the packets based on the sensitivity level of the application and the path quality. The device may communicate the packets between the client and the server via the path.Type: GrantFiled: July 6, 2018Date of Patent: August 18, 2020Assignee: Citrix Systems, Inc.Inventors: Sachin Shelar, Praveen Raja Dhanabalan, Surya Prakash Patel
-
Publication number: 20200186507Abstract: Described embodiments provide systems and methods for remapping connections to tunnels selected based on a security level of the communications. A first network device may be in communication with a second network device via a plurality of communication tunnels. The plurality of communication tunnels may include an encrypted communication tunnel and an unencrypted communication tunnel. The first network device may receive a packet, the packet including header information and a payload. The first network device may determine whether the received packet is encrypted to meet a threshold level of security. The first network device may, responsive to determining that the packet is to meet the threshold level of security, communicate an identifier of the payload and the header information to the second network device via the encrypted communication tunnel, and communicate the payload to the second network device via the unencrypted communication tunnel.Type: ApplicationFiled: December 5, 2018Publication date: June 11, 2020Inventors: Praveen Raja Dhanabalan, Surya Prakash Patel, J Mohan Rao Arisankala
-
Publication number: 20200014619Abstract: Described embodiments provide systems and methods for selecting communication paths for applications sensitive to bursty packet drops. A device intermediary to a client and a server may identify an application for which packets are to be communicated between the client and the server. The device may determine a sensitivity level of the application to a network disruption affecting the packets. The device may estimate, for each path between the client and the server for communicating the one or more packets, a path quality for the path indicating a likelihood that the network disruption affects the one or more packets. The device may select path for communicating the packets based on the sensitivity level of the application and the path quality. The device may communicate the packets between the client and the server via the path.Type: ApplicationFiled: July 6, 2018Publication date: January 9, 2020Inventors: Sachin Shelar, Praveen Raja Dhanabalan, Surya Prakash Patel
-
Publication number: 20200014639Abstract: Systems and methods for bufferbloat recovery and avoidance are provided herein. A portion of the buffer can be compressed based on one or more thresholds without changing an order of packet transmission and without dropping packets. The method includes storing, by a device, a plurality of packets received by the device to a buffer. The buffer can be configured with a minimum threshold and a maximum threshold. The method includes detecting that a size of the buffer has reached at least the maximum threshold and compressing one or more packets of the plurality of packets stored between the minimum threshold and the maximum threshold while transmitting, during compression, at least a portion of one or more packets of the plurality of packets stored in the buffer below the minimum threshold.Type: ApplicationFiled: July 5, 2018Publication date: January 9, 2020Inventors: Praveen Raja Dhanabalan, Surya Prakash Patel