Patents by Inventor Radhika Roy

Radhika Roy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11961009
    Abstract: Various embodiments that pertain to artificial intelligence algorithms. A repository can retain a reusable common set of artificial intelligence algorithms. Different users can access this common set of artificial intelligence algorithms and employ individual artificial intelligence algorithms in programs as appropriately as they are developing different applications and/or products. Employment of these individual artificial intelligence algorithms can include, for example, tailoring parameters based on the desires of the individual user's desires using the same common set of algorithms or individually or as a group as appropriate.
    Type: Grant
    Filed: November 2, 2020
    Date of Patent: April 16, 2024
    Assignee: The Government of the United States, as represented by the Secretary of the Army
    Inventor: Radhika Roy
  • Patent number: 11729659
    Abstract: A cross-layer security scheme can be used for a Multi-Input Multi-Output (MIMO) antenna-based large-scale multihop mobile ad hoc network (MANET) with a set of frequency-nonselective, slow/Rayleigh fading, and uncoded channels along with interference combining both physical, link, and higher layer encryption techniques for the payload in addition to signaling. Furthermore, MIMO-aware cross-layer secure MANET physical and key-based logical hierarchical routing proving scalability can be used. Security can be provided in Multi-Hop MIMO MANETs in Physical, medium access control (MAC), and internet protocol (IP) Routing layer. The MIMO-aware MANET IP Routing can include two kinds of routing: Physical Routing such as secure ad-hoc on-demand distance vector (SAODV) in the access MANET and Secure Key-based distributed hash table (DHT) “logical” routing in the backbone MANET. Both security and performance metrics can be employed to improve (e.g., optimize) both network secrecy and throughput/bandwidth capacity.
    Type: Grant
    Filed: May 24, 2021
    Date of Patent: August 15, 2023
    Assignee: The Government of the United States, as represented by the Secretary of the Army
    Inventors: Richard Greel, Radhika Roy, Rocio Bauer
  • Publication number: 20230252308
    Abstract: Various embodiments that pertain to artificial intelligence algorithms. A repository can retain a reusable common set of artificial intelligence algorithms. Different users can access this common set of artificial intelligence algorithms and employ individual artificial intelligence algorithms in programs as appropriately as they are developing different applications and/or products. Employment of these individual artificial intelligence algorithms can include, for example, tailoring parameters based on the desires of the individual user’s desires using the same common set of algorithms or individually or as a group as appropriate.
    Type: Application
    Filed: November 2, 2020
    Publication date: August 10, 2023
    Inventor: Radhika Roy
  • Publication number: 20230049550
    Abstract: Various embodiments relate to network capabilities. Devices of a network can have different capabilities. The network can provide artificial intelligence (AI) enabled, machine learning (ML) enabled, deep learning (DL) enabled networked access to these capabilities. The capabilities can share a common AI/ML/DL-enabled open layer-based net-centric logical protocol architecture. Also, different features can be achieved through different layers. As an example, AI enabled access can be achieved through the application layer, ML enabled access and DL enabled access can be achieved through the presentation layer and the session layer, and network access is achieved through the transport layer, the network layer, the link layer, and the physical layer.
    Type: Application
    Filed: August 16, 2021
    Publication date: February 16, 2023
    Inventor: Radhika Roy
  • Patent number: 11290426
    Abstract: Various embodiments that pertain to an enterprise network that employs a block chain portion and a non-block chain portion. For a single transaction, a header of the transaction can be sent over the block chain network and the non-header of the transaction can be sent over the non-block chain network. A hash-based cuckoo filter can be used for communication of the header along the block chain network.
    Type: Grant
    Filed: June 17, 2019
    Date of Patent: March 29, 2022
    Assignee: The Government of the United States, as represented by the Secretary of the Army
    Inventor: Radhika Roy
  • Publication number: 20220067153
    Abstract: Various embodiments that pertain to augmented reality security. A user interface can disclose an augmented reality. The user interface and/or augmented reality can be subjected to security protections. In one example, a check can be made on if an unknown party is viewing the augmented reality. If this occurs, then a notification can be emitted announcing a potential security breach.
    Type: Application
    Filed: September 3, 2020
    Publication date: March 3, 2022
    Inventor: Radhika Roy
  • Publication number: 20210352060
    Abstract: Various embodiments that pertain to network functions are described. A network can be an ad hoc network that function with peer-to-peer communications. The network can be physically decentralized, yet logically centralized. Various functions can be practiced within this network environment. In one example, a provider can provide an authorization to a robot by way of a peer-to-peer communication. The robot can validate the authorization and practice what is authorized in response to the authorization being validated. This authorization can be to perform a function autonomously for a defined length of time.
    Type: Application
    Filed: May 5, 2020
    Publication date: November 11, 2021
    Inventor: Radhika Roy
  • Publication number: 20210352519
    Abstract: A cross-layer security scheme can be used for a Multi-Input Multi-Output (MIMO) antenna-based large-scale multihop mobile ad hoc network (MANET) with a set of frequency-nonselective, slow/Rayleigh fading, and uncoded channels along with interference combining both physical, link, and higher layer encryption techniques for the payload in addition to signaling. Furthermore, MIMO-aware cross-layer secure MANET physical and key-based logical hierarchical routing proving scalability can be used. Security can be provided in Multi-Hop MIMO MANETs in Physical, medium access control (MAC), and internet protocol (IP) Routing layer. The MIMO-aware MANET IP Routing can include two kinds of routing: Physical Routing such as secure ad-hoc on-demand distance vector (SAODV) in the access MANET and Secure Key-based distributed hash table (DHT) “logical” routing in the backbone MANET. Both security and performance metrics can be employed to improve (e.g., optimize) both network secrecy and throughput/bandwidth capacity.
    Type: Application
    Filed: May 24, 2021
    Publication date: November 11, 2021
    Inventors: Richard Greel, Radhika Roy, Rocio Bauer
  • Patent number: 11019525
    Abstract: A cross-layer security scheme can be used for a Multi-Input Multi-Output (MIMO) antenna-based large-scale multihop mobile ad hoc network (MANET) with a set of frequency-nonselective, slow/Rayleigh fading, and uncoded channels along with interference combining both physical, link, and higher layer encryption techniques for the payload in addition to signaling. Furthermore, MIMO-aware cross-layer secure MANET physical and key-based logical hierarchical routing proving scalability can be used. Security can be provided in Multi-Hop MIMO MANETs in Physical, medium access control (MAC), and internet protocol (IP) Routing layer. The MIMO-aware MANET IP Routing can include two kinds of routing: Physical Routing such as secure ad-hoc on-demand distance vector (SAODV) in the access MANET and Secure Key-based distributed hash table (DHT) “logical” routing in the backbone MANET. Both security and performance metrics can be employed to improve (e.g., optimize) both network secrecy and throughput/bandwidth capacity.
    Type: Grant
    Filed: October 2, 2018
    Date of Patent: May 25, 2021
    Assignee: The Government of the United States, as represented by the Secretary of the Army
    Inventors: Richard Greel, Radhika Roy, Rocio Bauer
  • Publication number: 20200396209
    Abstract: Various embodiments that pertain to an enterprise network that employs a block chain portion and a non-block chain portion. For a single transaction, a header of the transaction can be sent over the block chain network and the non-header of the transaction can be sent over the non-block chain network. A hash-based cuckoo filter can be used for communication of the header along the block chain network.
    Type: Application
    Filed: June 17, 2019
    Publication date: December 17, 2020
    Inventor: Radhika Roy
  • Publication number: 20200107216
    Abstract: A cross-layer security scheme can be used for a Multi-Input Multi-Output (MIMO) antenna-based large-scale multihop mobile ad hoc network (MANET) with a set of frequency-nonselective, slow/Rayleigh fading, and uncoded channels along with interference combining both physical, link, and higher layer encryption techniques for the payload in addition to signaling. Furthermore, MIMO-aware cross-layer secure MANET physical and key-based logical hierarchical routing proving scalability can be used. Security can be provided in Multi-Hop MIMO MANETs in Physical, medium access control (MAC), and internet protocol (IP) Routing layer. The MIMO-aware MANET IP Routing can include two kinds of routing: Physical Routing such as secure ad-hoc on-demand distance vector (SAODV) in the access MANET and Secure Key-based distributed hash table (DHT) “logical” routing in the backbone MANET. Both security and performance metrics can be employed to improve (e.g., optimize) both network secrecy and throughput/bandwidth capacity.
    Type: Application
    Filed: October 2, 2018
    Publication date: April 2, 2020
    Inventors: Richard Greel, Radhika Roy, Rocio Bauer
  • Patent number: 10430598
    Abstract: Various embodiments are described that relate to a generalized Bloom filter design methodology. The Bloom filter design methodology can be used for preventing Bloom filter-specific cyber-attacks instead of designing special-purpose Bloom filters that can be applied preventing a specific kind of attack for a given kind of communications networking environment. The resultant security functionalities that can be considered as a package for the generalized secure Bloom filter can include Identifier Modifications, Secure Indexes, Dynamic Salting, Independent Multiple Hash Functions, Random Bit Insertions, Fake Bit Injections, Secure Record Linkage, Single Bloom Filter with all Identifiers, and Encryption. The overall secure generalized Bloom filter algorithms can be devised along with numerous sub-algorithms for these functionalities for making the Bloom-filter-based communications over a network providing robust security, reliability, and availability, preventing known cyber-attacks.
    Type: Grant
    Filed: June 8, 2017
    Date of Patent: October 1, 2019
    Assignee: The Government of the United States, as represented by the Secretary of the Army
    Inventor: Radhika Roy
  • Patent number: 10320901
    Abstract: Various embodiments are described that relate to network communication. In a mobile peer-to-peer ad hoc network, nodes can use a context-aware key-based distribution hash table routing algorithm to create the route scheme. This can be done among nodes that are cluster-heads while nodes that are within a cluster can use a non-context based algorithm.
    Type: Grant
    Filed: November 23, 2015
    Date of Patent: June 11, 2019
    Assignee: The United States of America, as represented by the Secretary of the Army
    Inventor: Radhika Roy
  • Publication number: 20180357434
    Abstract: Various embodiments are described that relate to a generalized Bloom filter design methodology. The Bloom filter design methodology can be used for preventing Bloom filter-specific cyber-attacks instead of designing special-purpose Bloom filters that can be applied preventing a specific kind of attack for a given kind of communications networking environment. The resultant security functionalities that can be considered as a package for the generalized secure Bloom filter can include Identifier Modifications, Secure Indexes, Dynamic Salting, Independent Multiple Hash Functions, Random Bit Insertions, Fake Bit Injections, Secure Record Linkage, Single Bloom Filter with all Identifiers, and Encryption. The overall secure generalized Bloom filter algorithms can be devised along with numerous sub-algorithms for these functionalities for making the Bloom-filter-based communications over a network providing robust security, reliability, and availability, preventing known cyber-attacks.
    Type: Application
    Filed: June 8, 2017
    Publication date: December 13, 2018
    Inventor: Radhika Roy
  • Publication number: 20170149882
    Abstract: Various embodiments are described that relate to network communication. In a mobile peer-to-peer ad hoc network, nodes can use a context-aware key-based distribution hash table routing algorithm to create the route scheme. This can be done among nodes that are cluster-heads while nodes that are within a cluster can use a non-context based algorithm.
    Type: Application
    Filed: November 23, 2015
    Publication date: May 25, 2017
    Inventor: Radhika Roy
  • Publication number: 20080056243
    Abstract: An access architecture for real-time communications is described. The architecture includes an inter-architecture network utilizing a single protocol, a plurality of border elements in communication with the inter-architecture network and with an external network, and one or more call control elements in communication with said inter-architecture network. The external network utilizes any of a variety of known networking technologies and protocols. The inter-architecture network utilizes a single protocol such as SIP. The present architecture provides a single common infrastructure for offering real-time communications services independent of call control protocols and networking technologies.
    Type: Application
    Filed: October 29, 2007
    Publication date: March 6, 2008
    Inventors: Radhika Roy, Siroos Afshar, Marian Croak, Enrique Cuevas, Alireza Faryar, Steve Fisher, Samuel Glazer, Barbara Kittredge, Karen McGregor-Barnes, Magda Nassar, Larry Russell
  • Publication number: 20070263565
    Abstract: The present invention provides a method and system for assuring H.323 alias address portability to an H.323 user in real-time H.323 multimedia communications where the H.323 user is registered with a home gatekeeper for the home zone of the H.323 user. Alias address portability may be obtained using a central database that is known to the administrative zones and is used for alias address mapping, or alternatively, may be obtained by using a distributed database. The method may be implemented by: sending, by the H.323 user, a message with a called H.323 entity's alias address, to the home gatekeeper to originate a call to the called H.323 entity; confirming that the alias address, services, and service providers are portable; converting the alias address to a called routable alias address for the called H.323 entity and sending the alias address to the H.323 user; and placing the call to the called H.323 entity.
    Type: Application
    Filed: July 17, 2007
    Publication date: November 15, 2007
    Inventor: Radhika Roy
  • Publication number: 20060285541
    Abstract: The present invention provides a method and system for assuring H.323 alias address portability to an H.323 user in real-time H.323 multimedia communications where the H.323 user is registered with a home gatekeeper for the home zone of the H.323 user. Alias address portability may be obtained using a central database that is known to the administrative zones and is used for alias address mapping, or alternatively, may be obtained by using a distributed database. The method may be implemented by: sending, by the H.323 user, a message with a called H.323 entity's alias address, to the home gatekeeper to originate a call to the called H.323 entity; confirming that the alias address, services, and service providers are portable; converting the alias address to a called routable alias address for the called H.323 entity and sending the alias address to the H.323 user; and placing the call to the called H.323 entity.
    Type: Application
    Filed: August 24, 2006
    Publication date: December 21, 2006
    Inventor: Radhika Roy
  • Publication number: 20060133416
    Abstract: A novel method of and system for providing common value-added services for two-way point-to-point, multi-point-to-multi-point, point-to-multi-point, and/or multi-point-to-point real-time communications using various communication protocols. The present invention provides common value-added service protocols for receiving a request from a first of a multiple of communication protocol sources for a first value-added service using the first common value-added service protocol, and providing the requested first value-added service to the first communication protocol source using the first common value-added service protocol. The present invention further includes receiving a request from a second of the multiple communication protocol sources for the first value-added service using the first common value-added service protocol, and providing the requested first value-added service to the second communication protocol source using the first common value-added service protocol.
    Type: Application
    Filed: February 13, 2006
    Publication date: June 22, 2006
    Inventor: Radhika Roy
  • Publication number: 20060039324
    Abstract: The present invention provides a method and system for assuring H.323 alias address portability to an H.323 user in real-time H.323 multimedia communications where the H.323 user is registered with a home gatekeeper for the home zone of the H.323 user. Alias address portability may be obtained using a central database that is known to the administrative zones and is used for alias address mapping, or alternatively, may be obtained by using a distributed database. The method may be implemented by: sending, by the H.323 user, a message with a called H.323 entity's alias address, to the home gatekeeper to originate a call to the called H.323 entity; confirming that the alias address, services, and service providers are portable; converting the alias address to a called routable alias address for the called H.323 entity and sending the alias address to the H.323 user; and placing the call to the called H.323 entity.
    Type: Application
    Filed: October 17, 2005
    Publication date: February 23, 2006
    Inventor: Radhika Roy