Patents by Inventor Sourabh JANA
Sourabh JANA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240356676Abstract: Various aspects of the present disclosure generally relate to wireless communication. In some aspects, an assisting wireless device may track a first retransmission metric that is based on a number of retransmitted packets that the assisting wireless device received from a source device. The assisting wireless device may receive, from a sink wireless device, an acknowledgement assistance request indicating a second retransmission metric for the sink wireless device. The assisting wireless device may transmit, to the sink wireless device, a response to the acknowledgement assistance request based on respective values of the first retransmission metric and the second retransmission metric. Numerous other aspects are described.Type: ApplicationFiled: April 24, 2023Publication date: October 24, 2024Inventors: Skanda Kumar KAIPU NARAHARI, Sourabh JANA, Nitin Raghavendra KIDIYOOR
-
Patent number: 11696134Abstract: A method for secure path discovery in a mesh network at a destination device is disclosed. The method includes receiving a path discovery request from an originator device and selecting a path selection in response to the path discovery request. The method also includes transmitting the path selection to the originator device and receiving a random seed from a provisioner device. The method also includes generating an authentication code based on the random seed, transmitting an authentication code message to an originator device and receiving communications from the originator device only if the originator device receives a verification response message from the provisioner device which confirms that the destination device has been verified.Type: GrantFiled: June 30, 2020Date of Patent: July 4, 2023Assignee: QUALCOMM INCORPORATEDInventors: Chirag Manojkumar Kharvar, Skanda Kumar Kaipu Narahari, Sourabh Jana
-
Patent number: 11216051Abstract: This disclosure provides systems, methods and apparatus for smart sockets in a communication network. A smart socket can be implemented to monitor one or more power quality characteristics of a power supply providing energy to the smart home environment. Smart sockets implemented to monitor power quality characteristics can sense when power fluctuations are present in the power supply, and shut down connected devices to prevent damage. A plurality of coordinating smart sockets can be implemented to optimize power utilization when the smart home environment is operating on backup power, during low electricity tariff periods, or when operating on a renewable energy source. The plurality of coordinating smart sockets can be implemented to autonomously schedule tasks based on a context of operation of other devices in the smart home environment. The plurality of coordinating smart sockets can be implemented to achieve configurable energy targets for the smart home environment.Type: GrantFiled: July 24, 2019Date of Patent: January 4, 2022Assignee: QUALCOMM IncorporatedInventors: Skanda Kumar Kaipu Narahari, Chirag Manojkumar Kharvar, Dishant Srivastava, Sourabh Jana, Jagdeep Kumar Hans
-
Patent number: 11166156Abstract: Disclosed are techniques for establishing an encrypted connection between a first node and a second node in a wireless mesh network. In an aspect, the first node receives, from a provisioner node in the wireless mesh network, a first value encrypted with a device-specific encryption key known only to the first node and the provisioner node, wherein the second node receives, from the provisioner node, the first value encrypted with a second device-specific encryption key, generates a friendship-specific encryption key based on the first value, an identifier of the first node, and an identifier of the second node, wherein the second node generates the friendship-specific encryption key, sends, to the second node, a first message encrypted with the friendship-specific encryption key, and receives, from the second node, a second message encrypted with the friendship-specific encryption key.Type: GrantFiled: September 7, 2018Date of Patent: November 2, 2021Assignee: QUALCOMM INCORPORATEDInventors: Sourabh Jana, Chirag Manojkumar Kharvar, Ravi Shekhar
-
Patent number: 11122060Abstract: Disclosed are techniques for detecting a security threat in a wireless mesh network. In an aspect, a monitoring device in the wireless mesh network detects a first message transmitted by a source node in the wireless mesh network to a destination node in the wireless mesh network via at least one relay node in the wireless mesh network, collects information from the first message as it is transmitted in the wireless mesh network, determines that the first message has been corrupted based on analysis of the information from the first message, and detects the security threat in the wireless mesh network based on the first message being corrupted.Type: GrantFiled: November 28, 2018Date of Patent: September 14, 2021Assignee: QUALCOMM INCORPORATEDInventors: Sourabh Jana, Chirag Manojkumar Kharvar, Ravi Shekhar, Ravi Kiran Bamidi
-
Patent number: 11005674Abstract: Methods, systems, and devices for controlling mesh network devices are described. The method includes receiving, by an automation device, a first message from a control device, adding, by the automation device, the identifier of the first user device to a priority list of the automation device based on receiving the first message, and controlling, by the automation device, access to operations of the automation device based on the identifier in the priority list after adding the identifier of the first user device. In some cases, the first message includes an identifier of a first user device and an add command.Type: GrantFiled: October 29, 2018Date of Patent: May 11, 2021Assignee: QUALCOMM IncorporatedInventors: Chirag Manojkumar Kharvar, Jagdeep Kumar Hans, Sourabh Jana
-
Patent number: 10917829Abstract: Methods, systems, and devices for wireless communications in a mesh network are described. During a path establishment procedure, a source device may broadcast a path request message, which may be forwarded (e.g., broadcast) by intermediate devices downstream through the mesh network to a destination device. Devices, starting with the destination device and continued upstream through intermediate devices along a path to be established, may feedback path response messages to establish a path between the destination device and the source device. Path response messages transmitted upstream through the mesh network may each include a handover address of a backup intermediate device. Therefore, upon reception of a path response message, an intermediate device selected for path establishment to a destination device may identify a handover address of a backup intermediate device. The intermediate device may perform a handover procedure with the backup intermediate device if a handover condition has been satisfied.Type: GrantFiled: March 22, 2019Date of Patent: February 9, 2021Assignee: QUALCOMM IncorporatedInventors: Chirag Manojkumar Kharvar, Skanda Kumar Kaipu Narahari, Sourabh Jana
-
Publication number: 20210037387Abstract: A method for secure path discovery in a mesh network at a destination device is disclosed. The method includes receiving a path discovery request from an originator device and selecting a path selection in response to the path discovery request. The method also includes transmitting the path selection to the originator device and receiving a random seed from a provisioner device. The method also includes generating an authentication code based on the random seed, transmitting an authentication code message to an originator device and receiving communications from the originator device only if the originator device receives a verification response message from the provisioner device which confirms that the destination device has been verified.Type: ApplicationFiled: June 30, 2020Publication date: February 4, 2021Inventors: Chirag Manojkumar KHARVAR, Skanda Kumar KAIPU NARAHARI, Sourabh JANA
-
Patent number: 10880807Abstract: A device in a mesh network may select a relay path for use based on the power resources available to the devices forming the relay path. For example, if there are multiple relay paths available for selection, the device may choose a relay path that has the lowest quantity of devices that are operating on battery power. The device may determine the quantity of battery-powered devices associated with a path based on power information included in one or more messages received from one of the devices forming the path. After selecting the relay path, the device may transmit a response message to an intermediary device forming the relay path. The intermediary device may, in some examples, be a device that transmitted a message including the power information.Type: GrantFiled: March 6, 2019Date of Patent: December 29, 2020Assignee: QUALCOMM IncorporatedInventors: Chirag Manojkumar Kharvar, Sourabh Jana, Skanda Kumar Kaipu Narahari
-
Publication number: 20200341529Abstract: This disclosure provides systems, methods and apparatus for smart sockets in a communication network. A smart socket can be implemented to monitor one or more power quality characteristics of a power supply providing energy to the smart home environment. Smart sockets implemented to monitor power quality characteristics can sense when power fluctuations are present in the power supply, and shut down connected devices to prevent damage. A plurality of coordinating smart sockets can be implemented to optimize power utilization when the smart home environment is operating on backup power, during low electricity tariff periods, or when operating on a renewable energy source. The plurality of coordinating smart sockets can be implemented to autonomously schedule tasks based on a context of operation of other devices in the smart home environment. The plurality of coordinating smart sockets can be implemented to achieve configurable energy targets for the smart home environment.Type: ApplicationFiled: July 24, 2019Publication date: October 29, 2020Inventors: Skanda Kumar KAIPU NARAHARI, Chirag Manojkumar KHARVAR, Dishant SRIVASTAVA, Sourabh JANA, Jagdeep Kumar HANS
-
Publication number: 20200305062Abstract: Methods, systems, and devices for wireless communications in a mesh network are described. During a path establishment procedure, a source device may broadcast a path request message, which may be forwarded (e.g., broadcast) by intermediate devices downstream through the mesh network to a destination device. Devices, starting with the destination device and continued upstream through intermediate devices along a path to be established, may feedback path response messages to establish a path between the destination device and the source device. Path response messages transmitted upstream through the mesh network may each include a handover address of a backup intermediate device. Therefore, upon reception of a path response message, an intermediate device selected for path establishment to a destination device may identify a handover address of a backup intermediate device. The intermediate device may perform a handover procedure with the backup intermediate device if a handover condition has been satisfied.Type: ApplicationFiled: March 22, 2019Publication date: September 24, 2020Inventors: Chirag Manojkumar Kharvar, Skanda Kumar Kaipu Narahari, Sourabh Jana
-
Publication number: 20200288373Abstract: A device in a mesh network may select a relay path for use based on the power resources available to the devices forming the relay path. For example, if there are multiple relay paths available for selection, the device may choose a relay path that has the lowest quantity of devices that are operating on battery power. The device may determine the quantity of battery-powered devices associated with a path based on power information included in one or more messages received from one of the devices forming the path. After selecting the relay path, the device may transmit a response message to an intermediary device forming the relay path. The intermediary device may, in some examples, be a device that transmitted a message including the power information.Type: ApplicationFiled: March 6, 2019Publication date: September 10, 2020Inventors: Chirag Manojkumar Kharvar, Sourabh Jana, Skanda Kumar Kaipu Narahari
-
Publication number: 20200169572Abstract: Disclosed are techniques for detecting a security threat in a wireless mesh network. In an aspect, a monitoring device in the wireless mesh network detects a first message transmitted by a source node in the wireless mesh network to a destination node in the wireless mesh network via at least one relay node in the wireless mesh network, collects information from the first message as it is transmitted in the wireless mesh network, determines that the first message has been corrupted based on analysis of the information from the first message, and detects the security threat in the wireless mesh network based on the first message being corrupted.Type: ApplicationFiled: November 28, 2018Publication date: May 28, 2020Inventors: Sourabh JANA, Chirag Manojkumar KHARVAR, Ravi SHEKHAR, Ravi Kiran BAMIDI
-
Publication number: 20200146088Abstract: Systems and methods for initialization vector (IV) index recovery for a Bluetooth special interest group (SIG) mesh network include a receiving device in a first node of the mesh network, wherein the receiving device retrieves, from a secure network beacon (SNB), a retrieved IV index. If the retrieved IV index is greater than a current IV index of the receiving device by at least a value of two, the receiving device enters a recovery mode for recovering a correct IV index. In the recovery mode, the receiving device may receive the correct IV index from a Bluetooth device, if available, over a secure link, or from a trusted device in a second node of the mesh network. The mesh network may also include a monitoring device to provide the correct IV index to the receiving device.Type: ApplicationFiled: November 7, 2018Publication date: May 7, 2020Inventors: Chirag Manojkumar KHARVAR, Sourabh JANA, Ravi Kiran BAMIDI
-
Publication number: 20200136851Abstract: Methods, systems, and devices for controlling mesh network devices are described. The method includes receiving, by an automation device, a first message from a control device, adding, by the automation device, the identifier of the first user device to a priority list of the automation device based on receiving the first message, and controlling, by the automation device, access to operations of the automation device based on the identifier in the priority list after adding the identifier of the first user device. In some cases, the first message includes an identifier of a first user device and an add command.Type: ApplicationFiled: October 29, 2018Publication date: April 30, 2020Inventors: Chirag Manojkumar Kharvar, Jagdeep Kumar Hans, Sourabh Jana
-
Publication number: 20200099657Abstract: Methods, systems, and devices for secure recovery from full replay protection lists are described. The method includes receiving, at a second device from a first device in a wireless mesh network, a first message indicating that a replay protection list (RPL) of the first device has reached a defined capacity, determining whether the first device is configured with a fixed RPL or a dynamic RPL based on the first message or a provisioning message received before the first message, sending, from the second device, a second message indicating at least one of an increase of a capacity of the RPL or a set of source addresses to be included in or removed from the RPL based on determining whether the first device is configured with the fixed RPL or dynamic RPL, and receiving, from the first device, an indication that the RPL has been updated based on the second message.Type: ApplicationFiled: September 20, 2018Publication date: March 26, 2020Inventors: Chirag Manojkumar Kharvar, Sourabh Jana, Jagdeep Kumar Hans
-
Publication number: 20200084620Abstract: Disclosed are techniques for establishing an encrypted connection between a first node and a second node in a wireless mesh network. In an aspect, the first node receives, from a provisioner node in the wireless mesh network, a first value encrypted with a device-specific encryption key known only to the first node and the provisioner node, wherein the second node receives, from the provisioner node, the first value encrypted with a second device-specific encryption key, generates a friendship-specific encryption key based on the first value, an identifier of the first node, and an identifier of the second node, wherein the second node generates the friendship-specific encryption key, sends, to the second node, a first message encrypted with the friendship-specific encryption key, and receives, from the second node, a second message encrypted with the friendship-specific encryption key.Type: ApplicationFiled: September 7, 2018Publication date: March 12, 2020Inventors: Sourabh JANA, Chirag Manojkumar KHARVAR, Ravi SHEKHAR
-
Publication number: 20190068489Abstract: The disclosure generally relates to using directionality to reduce flooding in a wireless mesh network. In an aspect, a node of the wireless mesh network receives a message for a destination node in the wireless mesh network, determines whether or not the message came from a direction of the destination node, drops the message based on determining that the message came from the direction of the destination node, and forwards the message based on determining that the message did not come from the direction of the destination node.Type: ApplicationFiled: August 31, 2017Publication date: February 28, 2019Inventors: Ravi SHEKHAR, Sourabh JANA, Srivathsa SRIDHARA
-
Publication number: 20180343200Abstract: The disclosure generally relates to congestion control, message analysis, and other improvements in a wireless mesh network. For example, according to various aspects, one or more devices in the wireless mesh network may be configured as monitoring nodes and a graph representing a message flow path in at least a portion of the wireless mesh network may be generated based at least in part on information related to one or more messages observed at the monitoring nodes. The graph can then be used to identify a path used to relay a message from at least one destination node to at least one source node (e.g., via one or more intermediate nodes). As such, a time-to-live (TTL) value to be used in messages communicated between the source node and the destination node can be appropriately configured based on a hop count between the source node and the destination node.Type: ApplicationFiled: May 26, 2017Publication date: November 29, 2018Inventors: Sourabh JANA, Ravi SHEKHAR