Patents by Inventor Rajesh Vijayakumar

Rajesh Vijayakumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9349069
    Abstract: A line-detection system computes, using a local memory, a result of a partial conversion of image-space pixel data from image space to Hough space. The result is analyzed for edges corresponding to a line present in the partial conversion. The line is compared against other lines detected in previously computed partial results to identify a longest line in the image.
    Type: Grant
    Filed: November 21, 2011
    Date of Patent: May 24, 2016
    Assignee: Analog Devices, Inc.
    Inventors: Raghavendra Habbu, Akshayakumar Haribhatt, Rajesh Vijayakumar, Rajesh Mahapatra, Gopal Karanam
  • Patent number: 9105090
    Abstract: A system for correcting distortion effects in a distorted image includes a memory controller for reading pixels (corresponding to a subset region in a destination image) of the distorted image from a system memory to local memory. A look-up table stores an offset and interpolation weight for each pixel, and an ALU computes, using stored values only in the local memory, values of each of the pixels in the region in the destination image.
    Type: Grant
    Filed: July 13, 2011
    Date of Patent: August 11, 2015
    Assignee: Analog Devices, Inc.
    Inventors: Akshayakumar Haribhatt, Rajesh Vijayakumar
  • Patent number: 8826413
    Abstract: Methods and systems are provided for improving a firewall implemented at a WLAN infrastructure device (WID). The WID includes a stateful firewall that implements firewall rules based on an ESSID of the WID to specify whether traffic is allowed to or from the ESSID. For example, in one implementation of such a firewall rule, packets that are required to be sent out on all wired ports can be blocked from being flooded out on WLANs (e.g., the packet is allowed to pass only to the wired ports). A method and system are provided for preventing a malicious wireless client device (WCD) that is transmitting undesirable traffic from using RF resources by deauthenticating the malicious WCD to remove it from the WLAN and blacklisting it to prevent it from rejoining the WLAN for a time period. Method and systems are also provided for either “on-demand” and/or predicatively communicating state information regarding an existing firewall session.
    Type: Grant
    Filed: December 30, 2009
    Date of Patent: September 2, 2014
    Assignee: Motorla Solutions, Inc.
    Inventors: Rajesh Vijayakumar, Nicolas S. Dade, Jacob Thomas, Anurag Verma
  • Publication number: 20130128045
    Abstract: A line-detection system computes, using a local memory, a result of a partial conversion of image-space pixel data from image space to Hough space. The result is analyzed for edges corresponding to a line present in the partial conversion. The line is compared against other lines detected in previously computed partial results to identify a longest line in the image.
    Type: Application
    Filed: November 21, 2011
    Publication date: May 23, 2013
    Applicant: Analog Devices, Inc.
    Inventors: Raghavendra Habbu, Akshayakumar Haribhatt, Rajesh Vijayakumar, Rajesh Mahapatra, Gopal Karanam
  • Publication number: 20130016918
    Abstract: A system for correcting distortion effects in a distorted image includes a memory controller for reading pixels (corresponding to a subset region in a destination image) of the distorted image from a system memory to local memory. A look-up table stores an offset and interpolation weight for each pixel, and an ALU computes, using stored values only in the local memory, values of each of the pixels in the region in the destination image.
    Type: Application
    Filed: July 13, 2011
    Publication date: January 17, 2013
    Inventors: Akshayakumar Haribhatt, Rajesh Vijayakumar
  • Patent number: 8281134
    Abstract: A method is provided for both layer 2 (L2) and layer 3 (L3) security in the context, for example, of a WISP-e protocol. An AES algorithm in CBC mode is used for encryption and decryption of the control frames. The session keys (e.g., 128-bit session keys) are derived from a pre-shared secret configured on both communicating wireless termination points.
    Type: Grant
    Filed: January 29, 2009
    Date of Patent: October 2, 2012
    Assignee: Symbol Technologies, Inc.
    Inventors: Zeljko Bajic, Ram Nagarajan, Rajesh Vijayakumar
  • Publication number: 20110162060
    Abstract: Methods and systems are provided for improving a firewall implemented at a WLAN infrastructure device (WID). The WID includes a stateful firewall that implements firewall rules based on an ESSID of the WID to specify whether traffic is allowed to or from the ESSID. For example, in one implementation of such a firewall rule, packets that are required to be sent out on all wired ports can be blocked from being flooded out on WLANs (e.g., the packet is allowed to pass only to the wired ports). A method and system are provided for preventing a malicious wireless client device (WCD) that is transmitting undesirable traffic from using RF resources by deauthenticating the malicious WCD to remove it from the WLAN and blacklisting it to prevent it from rejoining the WLAN for a time period. Method and systems are also provided for either “on-demand” and/or predicatively communicating state information regarding an existing firewall session.
    Type: Application
    Filed: December 30, 2009
    Publication date: June 30, 2011
    Applicant: Motorola, Inc.
    Inventors: Rajesh Vijayakumar, Nicolas S. Dade, Jacob Thomas, Anurag Verma
  • Publication number: 20100191971
    Abstract: A method is provided for both layer 2 (L2) and layer 3 (L3) security in the context, for example, of a WISP-e protocol. An AES algorithm in CBC mode is used for encryption and decryption of the control frames. The session keys (e.g., 128-bit session keys) are derived from a pre-shared secret configured on both communicating wireless termination points.
    Type: Application
    Filed: January 29, 2009
    Publication date: July 29, 2010
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventors: Zeljko Bajic, Ram Nagarajan, Rajesh Vijayakumar
  • Publication number: 20070150947
    Abstract: Increased security may be provided on an enterprise network by causing a central security server to administer security policy on the network. Agents in hosts on the network authenticate with the central security server to obtain policy information for that particular host user. The policy information may specify whether any special routing, processing, or other features, should occur in connection with particular classes of traffic or in connection with communications with particular other hosts or classes of hosts. In operation, the agents implement the policy by interfacing with the networking layer to cause the traffic to be routed via any other host/server on the network so that appropriate services may occur with respect to that traffic. Additionally, tunnels may be established so that traffic in-between hosts or between a host and server to be encrypted, compressed, or otherwise treated as specified in the policy.
    Type: Application
    Filed: December 22, 2005
    Publication date: June 28, 2007
    Applicant: Nortel Networks Limited
    Inventors: Rajesh Vijayakumar, Vibhu Vivek, Biju Kunjukunju, Niklas Hanberger