Patents by Inventor Puneet Batta

Puneet Batta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10440595
    Abstract: Apparatus and method for coverage hole detection in a wireless local area network (WLAN) using a mobile communication device. The method includes a first step of providing a plurality of access points distributed within the WLAN and at least one mobile communication device operable within the WLAN. A next step includes downloading triggers for respective coverage measurement conditions to the at least one associated mobile communication device from an associated access point. A next step includes detecting a coverage measurement condition by the at least one mobile communication device that activates one of the triggers, whereupon a next step includes sending a coverage measurement indicating the triggered condition from the at least one mobile communication device to an associated access point, which forwards a coverage incident report to a Central Report Manager.
    Type: Grant
    Filed: January 29, 2018
    Date of Patent: October 8, 2019
    Assignee: Symbol Technologies, LLC
    Inventors: Michael Grischy, Puneet Batta, Jacob Thomas, Sundaresan Sundaram, Sandeep Ramakrishnan, V. Sethuraman, Jeevan Kukkalli, Rajendiran Subramani
  • Patent number: 10152715
    Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.
    Type: Grant
    Filed: November 1, 2017
    Date of Patent: December 11, 2018
    Assignee: Symbol Technologies, LLC
    Inventors: Puneet Batta, Trevor Miranda, Jacob Thomas
  • Patent number: 10055581
    Abstract: A technique for locating a wireless communication attack includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect a communication attempt by a suspected criminal device to an illicit device. If the communication attempt by the suspected criminal device is detected by the analysis, a communication to the criminal device is controlled so as to delay completion of the communication to the criminal device in order to provide time to locate the criminal device.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: August 21, 2018
    Assignee: Symbol Technologies, LLC
    Inventors: Puneet Batta, Jason T Harris, Trevor Miranda, Jacob Thomas
  • Publication number: 20180167830
    Abstract: Apparatus and method for coverage hole detection in a wireless local area network (WLAN) using a mobile communication device. The method includes a first step of providing a plurality of access points distributed within the WLAN and at least one mobile communication device operable within the WLAN. A next step includes downloading triggers for respective coverage measurement conditions to the at least one associated mobile communication device from an associated access point. A next step includes detecting a coverage measurement condition by the at least one mobile communication device that activates one of the triggers, whereupon a next step includes sending a coverage measurement indicating the triggered condition from the at least one mobile communication device to an associated access point, which forwards a coverage incident report to a Central Report Manager.
    Type: Application
    Filed: January 29, 2018
    Publication date: June 14, 2018
    Inventors: Michael Grischy, Puneet Batta, Jacob Thomas, Sundaresan Sundaram, Sandeep Ramakrishnan, V. Sethuraman, Jeevan Kukkalli, Rajendiran Subramani
  • Publication number: 20180089686
    Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.
    Type: Application
    Filed: November 1, 2017
    Publication date: March 29, 2018
    Inventors: Puneet Batta, Trevor Miranda, Jacob Thomas
  • Patent number: 9913154
    Abstract: Apparatus and method for coverage hole detection in a wireless local area network (WLAN) using a mobile communication device. The method includes a first step of providing a plurality of access points distributed within the WLAN and at least one mobile communication device operable within the WLAN. A next step includes downloading triggers for respective coverage measurement conditions to the at least one associated mobile communication device from an associated access point. A next step includes detecting a coverage measurement condition by the at least one mobile communication device that activates one of the triggers, whereupon a next step includes sending a coverage measurement indicating the triggered condition from the at least one mobile communication device to an associated access point, which forwards a coverage incident report to a Central Report Manager.
    Type: Grant
    Filed: July 21, 2015
    Date of Patent: March 6, 2018
    Assignee: Symbol Technologies, LLC
    Inventors: Michael Grischy, Puneet Batta, Jacob Thomas, Sundaram Sundaresan, Sandeep Ramakrishnan, V. Sethuraman, Jeevan Kukkalli, Rajendiran Subramani
  • Patent number: 9836746
    Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.
    Type: Grant
    Filed: November 9, 2016
    Date of Patent: December 5, 2017
    Assignee: Symbol Technologies, LLC
    Inventors: Puneet Batta, Trevor Miranda, Jacob Thomas
  • Publication number: 20170061439
    Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.
    Type: Application
    Filed: November 9, 2016
    Publication date: March 2, 2017
    Inventors: Puneet Batta, Trevor Miranda, Jacob Thomas
  • Publication number: 20170026929
    Abstract: Apparatus and method for coverage hole detection in a wireless local area network (WLAN) using a mobile communication device. The method includes a first step of providing a plurality of access points distributed within the WLAN and at least one mobile communication device operable within the WLAN. A next step includes downloading triggers for respective coverage measurement conditions to the at least one associated mobile communication device from an associated access point. A next step includes detecting a coverage measurement condition by the at least one mobile communication device that activates one of the triggers, whereupon a next step includes sending a coverage measurement indicating the triggered condition from the at least one mobile communication device to an associated access point, which forwards a coverage incident report to a Central Report Manager.
    Type: Application
    Filed: July 21, 2015
    Publication date: January 26, 2017
    Inventors: Michael GRISCHY, Puneet BATTA, Jacob THOMAS, Sundaram SUNDARESAN, Sandeep RAMAKRISHNAN, V. SETHURAMAN, Jeevan KUKKALLI, Rajendiran SUBRAMANI
  • Patent number: 9525689
    Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.
    Type: Grant
    Filed: March 25, 2014
    Date of Patent: December 20, 2016
    Assignee: Symbol Technologies, LLC
    Inventors: Puneet Batta, Trevor Miranda, Jacob Thomas
  • Publication number: 20150371038
    Abstract: A technique for locating a wireless communication attack includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect a communication attempt by a suspected criminal device to an illicit device. If the communication attempt by the suspected criminal device is detected by the analysis, a communication to the criminal device is controlled so as to delay completion of the communication to the criminal device in order to provide time to locate the criminal device.
    Type: Application
    Filed: June 24, 2014
    Publication date: December 24, 2015
    Inventors: Puneet Batta, Jason T. Harris, Trevor Miranda, Jacob Thomas
  • Publication number: 20150281236
    Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.
    Type: Application
    Filed: March 25, 2014
    Publication date: October 1, 2015
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventors: PUNEET BATTA, TREVOR MIRANDA, JACOB THOMAS
  • Patent number: 8798000
    Abstract: A technique to manage wireless wide area network bandwidth constraints in a communication network includes; prioritizing client activities in a serving access point; detecting that wired domain access is inactive while wireless wide area domain access is active; and utilizing an available bandwidth of the wireless aide area domain access for the highest priority client activities. The lower priority client activities can be address in various different ways including transferring to other available wired access.
    Type: Grant
    Filed: May 14, 2010
    Date of Patent: August 5, 2014
    Assignee: Symbol Technologies, Inc.
    Inventors: Tarun Maharana, Puneet Batta
  • Publication number: 20140148155
    Abstract: One of a first access point associated with the first coverage area or the client device in the first coverage area determines that the client device is likely to roam to the second coverage area. A beamforming link is established between the client device and a second access point associated with the second coverage area. Sounding data is exchanged between one of the first access point or the client device and the second access point, wherein the sounding data is used by the second access point and the client device to calculate a steering matrix for the beamforming link between the client device and the second access point. After roaming to the second coverage area, the client device associates with the second access point and the client device and the second access point perform beamforming on the beamforming link.
    Type: Application
    Filed: November 28, 2012
    Publication date: May 29, 2014
    Applicant: Motorola Solutions, Inc.
    Inventors: Puneet Batta, Tarun Maharana
  • Patent number: 8660101
    Abstract: A method and apparatus for presence state determination at an access point of a station determines whether a station associated with the access point is responsive to the access point to indicate the station is “present” or “not present”. The access point informs a presence server when the station's presence state changes. The presence server does not therefore need to rely on presence handshaking between the presence server and the station.
    Type: Grant
    Filed: December 30, 2009
    Date of Patent: February 25, 2014
    Assignee: Motorola Solutions, Inc.
    Inventors: Soren K. Lundsgaard, Puneet Batta
  • Patent number: 8612752
    Abstract: Methods are provided for processing a packet received by a mesh-enabled access point (MAP). When a first MAP receives a packet it can determine whether the packet is destined for a mesh portal based on the destination address. If so, the first MAP can retrieve an encryption key corresponding to the mesh portal, use the encryption key to encrypt the packet and set a mesh forwarding flag in the packet to indicate that the packet is destined for a mesh portal, and is encrypted with an encryption key corresponding to the mesh portal, and then forward the packet to the next hop MAP towards the a mesh portal. The mesh forwarding flag indicates that the packet is destined for a mesh portal, is encrypted with an encryption key corresponding to the mesh portal, and is to be forwarded to the next hop MAP without performing decryption/re-encryption processing on the packet. When a MAP receives a packet, the first MAP it determines whether a mesh forwarding flag is set in the packet.
    Type: Grant
    Filed: October 30, 2008
    Date of Patent: December 17, 2013
    Assignee: Symbol Technologies, Inc.
    Inventor: Puneet Batta
  • Patent number: 8391169
    Abstract: Apparatus and methods are provided for locating a mobile device in a sleep mode. A method comprises transmitting a beacon signal configured to initiate transmission of a response signal from a mobile device in a sleep mode. The mobile device is associated with a first wireless access device on a first communication channel. The method further comprises receiving the response signal from the mobile device on the first communication channel and determining the physical location of the mobile device based on the response signal.
    Type: Grant
    Filed: October 31, 2008
    Date of Patent: March 5, 2013
    Assignee: Symbol Technologies, Inc.
    Inventor: Puneet Batta
  • Publication number: 20130051376
    Abstract: A system for hybrid broadcast packet replication for virtual local area networks includes a switch operable to receive a packet with an associated VLAN identifier and replicate the packet. A VLAN bit mask is included in the switch to filter the target destinations for the sending the replicated packets. The mask has a first level that provides to the switch an indication of a VLAN group where a radio of an AP has an associated client device. The mask has a second level where the mask provides to the switch an indication of a WLAN where a radio of an AP has an associated client device. The mask can have a third level where the mask provides to the switch an indication of a list of VLANs in use by each WLAN. The switch can then send those replicated packets filtered through the mask on to target devices of the identified VLAN.
    Type: Application
    Filed: August 26, 2011
    Publication date: February 28, 2013
    Applicant: MOTOROLA SOLUTIONS, INC.
    Inventors: Jason D. Hatashita, Puneet Batta, Helge Szwerinski, Jacob Thomas
  • Patent number: 8352604
    Abstract: A technique for distributed propagation of data in a wireless communication network includes providing 600 a unique host identifier for each peer network entity in the wireless communication network, each host identifier having a length of B bits. A next step includes requesting 602 data from peer network entities using a request having a host identifier of the requesting network entity. A next step includes, if a peer network entity is hosting the requested data, comparing 608 the host identifiers of the requesting network entity and the peer network entity receiving the request to determine a match. A next step includes responding 610 to the request if a match is determined.
    Type: Grant
    Filed: October 28, 2010
    Date of Patent: January 8, 2013
    Assignee: Symbol Technologies, Inc.
    Inventors: Trevor Miranda, Puneet Batta
  • Publication number: 20120110183
    Abstract: A technique for distributed propagation of data in a wireless communication network includes providing 600 a unique host identifier for each peer network entity in the wireless communication network, each host identifier having a length of B bits. A next step includes requesting 602 data from peer network entities using a request having a host identifier of the requesting network entity. A next step includes, if a peer network entity is hosting the requested data, comparing 608 the host identifiers of the requesting network entity and the peer network entity receiving the request to determine a match. A next step includes responding 610 to the request if a match is determined.
    Type: Application
    Filed: October 28, 2010
    Publication date: May 3, 2012
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventors: Trevor Miranda, Puneet Batta