Patents by Inventor Ramanathan Viswanathan
Ramanathan Viswanathan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20150098457Abstract: The disclosure provides a method, apparatus, and computer program product directed towards enabling internet protocol (IP) connectivity across multi-hop wireless networks. A virtual adapter is generated to facilitate creating a virtual link layer between a virtual link layer node and at least one other virtual link layer node. The virtual link layer is then interfaced with an IP layer via the virtual adapter, such that data transmitted over the virtual link layer is accessible to the IP layer via the virtual adapter.Type: ApplicationFiled: May 21, 2014Publication date: April 9, 2015Applicant: QUALCOMM IncorporatedInventors: Arungundram Chandrasekaran Mahendran, Xiaolong Huang, Ramanathan Viswanathan, Xun Luo
-
Patent number: 8995338Abstract: A method, a computer program product, and an apparatus are provided. The apparatus, which is a first node, sends a join request to a second node to route communication associated with a third node to the first node. The join request includes a first node identifier associated with the first node. The first node receives from the second node a join response comprising a second node identifier associated with the second node. The first node sends a setup request to the third node, the setup request comprising the second node identifier. The first node receives a communication with the first node identifier from the second node, the communication originating from the third node.Type: GrantFiled: May 24, 2012Date of Patent: March 31, 2015Assignee: QUALCOMM IncorporatedInventors: Ramanathan Viswanathan, Xiaolong Huang, Vijayalakshmi R. Raveendran
-
Patent number: 8761064Abstract: Proxy discovery for mobile networks having cooperative multiradio devices is provided through short range discovery and assistance from the network. In some aspects, a dedicated message is sent in response to a request from the client. The dedicated message includes a proxy list. The client uses the proxy list to discover those proxies on the list. Other aspects provide for the proxy list to be included in broadcast messages from the network. Thus, clients receive the broadcast messages and extract the proxy list for discovery purposes. Other aspects provide for the client to detect all of the wireless devices in the area and send a list to the network. The network responds with a sub-list of those proxies that are available to the client. In each such aspect, when the client discovers the available proxies, it transmits a list of the proxy ID of the discovered proxies to the network.Type: GrantFiled: April 14, 2010Date of Patent: June 24, 2014Assignee: QUALCOMM IncorporatedInventors: Samir S. Soliman, Nishith Chaubey, Olufunmilola O. Awoniyi, Ramanathan Viswanathan
-
Patent number: 8566594Abstract: Trust establishment in short range protocol pairing between client and proxy devices includes a first aspect in which application level security is used to encrypt all packets transmitted between the client and proxy. An application-based security derives a public key from the General Bootstrapping Architecture (GBA) and used that public key to generate an encryption key in an AES encryption algorithm. A second aspect provides for out of band security to be used to establish short range protocol pairing. In this second aspect, the client and proxy exchange identification information over a third party network that is out of band to the short range protocol. With this identification information exchanged out of band, the client and proxy may establish pairing in the short range protocol.Type: GrantFiled: April 14, 2010Date of Patent: October 22, 2013Assignee: QUALCOMM IncorporatedInventors: Samir S. Soliman, Nishith Chaubey, Olufunmilola O. Awoniyi, Ramanathan Viswanathan
-
Patent number: 8527017Abstract: Page monitoring in a proxy relationship is optimized through creation of a new page occasion (PO) or paging frame (PF). The new PO/PF includes pages for each client-proxy relationship. Once the new PO/PF is communicated to the proxy, the proxy monitors for the pages of each client by monitoring a single PO/PF. Depending on the embodiment implemented, the network will either continue to also transmit pages during original PO or cease such transmission. On detection of a failed link between the proxy and client, the client may begin to monitor the original pages in such networks, or will begin monitoring using the new PO/PF until the network notifies the client that the state has changed.Type: GrantFiled: April 14, 2010Date of Patent: September 3, 2013Assignee: QUALCOMM IncorporatedInventors: Samir S. Soliman, Nishith Chaubey, Olufunmilola O. Awoniyi, Ramanathan Viswanathan
-
Publication number: 20130136116Abstract: A method, a computer program product, and an apparatus are provided. The apparatus, which is a first node, sends a join request to a second node to route communication associated with a third node to the first node. The join request includes a first node identifier associated with the first node. The first node receives from the second node a join response comprising a second node identifier associated with the second node. The first node sends a setup request to the third node, the setup request comprising the second node identifier. The first node receives a communication with the first node identifier from the second node, the communication originating from the third node.Type: ApplicationFiled: May 24, 2012Publication date: May 30, 2013Applicant: QUALCOMM INCORPORATEDInventors: Ramanathan VISWANATHAN, Xiaolong HUANG, Vijayalakshmi R. RAVEENDRAN
-
Publication number: 20110256891Abstract: Page monitoring in a proxy relationship is optimized through creation of a new page occasion (PO) or paging frame (PF). The new PO/PF includes pages for each client-proxy relationship. Once the new PO/PF is communicated to the proxy, the proxy monitors for the pages of each client by monitoring a single PO/PF. Depending on the embodiment implemented, the network will either continue to also transmit pages during original PO or cease such transmission. On detection of a failed link between the proxy and client, the client may begin to monitor the original pages in such networks, or will begin monitoring using the new PO/PF until the network notifies the client that the state has changed.Type: ApplicationFiled: April 14, 2010Publication date: October 20, 2011Applicant: Qualcomm IncorporatedInventors: Samir S. Soliman, Nishith Chaubey, Olufunmilola O. Awoniyi, Ramanathan Viswanathan
-
Publication number: 20110255444Abstract: Proxy discovery for mobile networks having cooperative multiradio devices is provided through short range discovery and assistance from the network. In some aspects, a dedicated message is sent in response to a request from the client. The dedicated message includes a proxy list. The client uses the proxy list to discover those proxies on the list. Other aspects provide for the proxy list to be included in broadcast messages from the network. Thus, clients receive the broadcast messages and extract the proxy list for discovery purposes. Other aspects provide for the client to detect all of the wireless devices in the area and send a list to the network. The network responds with a sub-list of those proxies that are available to the client. In each such aspect, when the client discovers the available proxies, it transmits a list of the proxy ID of the discovered proxies to the network.Type: ApplicationFiled: April 14, 2010Publication date: October 20, 2011Applicant: QUALCOMM IncorporatedInventors: Samir S. Soliman, Nishith Chaubey, Olufunmilola O. Awoniyi, Ramanathan Viswanathan
-
Publication number: 20110255692Abstract: Trust establishment in short range protocol pairing between client and proxy devices includes a first aspect in which application level security is used to encrypt all packets transmitted between the client and proxy. An application-based security derives a public key from the General Bootstrapping Architecture (GBA) and used that public key to generate an encryption key in an AES encryption algorithm. A second aspect provides for out of band security to be used to establish short range protocol pairing. In this second aspect, the client and proxy exchange identification information over a third party network that is out of band to the short range protocol. With this identification information exchanged out of band, the client and proxy may establish pairing in the short range protocol.Type: ApplicationFiled: April 14, 2010Publication date: October 20, 2011Applicant: QUALCOMM IncorporatedInventors: Samir S. Soliman, Nishith Chaubey, Olufunmilola O. Awoniyi, Ramanathan Viswanathan