Patents by Inventor Srikrishna Kurapati

Srikrishna Kurapati has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9961197
    Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.
    Type: Grant
    Filed: January 12, 2015
    Date of Patent: May 1, 2018
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
  • Patent number: 9577895
    Abstract: The present invention provides a system, method and apparatus for troubleshooting one or more communications between a first device and a second device. A monitoring device disposed between the first device and the second device receives a message associated with the communication(s), analyzes the received message and stores the analyzed message whenever the analyzed message satisfies one or more troubleshooting criteria. The one or more troubleshooting criteria may include one or more data element criteria, one or more event-based criteria, one or more time-based criteria, one or more logical operators or a combination thereof. The method can be implemented using a computer program embodied on a computer readable medium having one or more code segments to perform the method steps.
    Type: Grant
    Filed: September 12, 2014
    Date of Patent: February 21, 2017
    Assignee: Avaya Inc.
    Inventors: Ghassan Naim, Srikrishna Kurapati
  • Patent number: 9531873
    Abstract: The present invention provides a system, method and apparatus for automatically classifying voice communications, such as voice messages and phone calls in prerecorded voicemails (one speaker) and two-way conversations, as either spam or legitimate signals in a communications system (e.g., SIP, IMS, UMA, etc.). More specifically, the present invention classifies a voice communication session by receiving one or more voice communication packets associated with the voice communication session, extracting one or more properties from the received voice communication packets and classifying the voice communication session based on the extracted properties. The present invention can also be implemented as a computer program embodied on a computer readable medium wherein each step is performed by one or more code segments.
    Type: Grant
    Filed: September 14, 2006
    Date of Patent: December 27, 2016
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Nathaniel E. Ayewah
  • Patent number: 9197746
    Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.
    Type: Grant
    Filed: February 5, 2009
    Date of Patent: November 24, 2015
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
  • Publication number: 20150124945
    Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.
    Type: Application
    Filed: January 12, 2015
    Publication date: May 7, 2015
    Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
  • Publication number: 20150006879
    Abstract: The present invention provides a system, method and apparatus for troubleshooting one or more communications between a first device and a second device. A monitoring device disposed between the first device and the second device receives a message associated with the communication(s), analyzes the received message and stores the analyzed message whenever the analyzed message satisfies one or more troubleshooting criteria. The one or more troubleshooting criteria may include one or more data element criteria, one or more event-based criteria, one or more time-based criteria, one or more logical operators or a combination thereof. The method can be implemented using a computer program embodied on a computer readable medium having one or more code segments to perform the method steps.
    Type: Application
    Filed: September 12, 2014
    Publication date: January 1, 2015
    Applicant: AVAYA INC.
    Inventors: Ghassan Naim, Srikrishna Kurapati
  • Patent number: 8862718
    Abstract: The present invention provides a system, method and apparatus for troubleshooting one or more communications between a first device and a second device. A monitoring device disposed between the first device and the second device receives a message associated with the communication(s), analyzes the received message and stores the analyzed message whenever the analyzed message satisfies one or more troubleshooting criteria. The one or more troubleshooting criteria may include one or more data element criteria, one or more event-based criteria, one or more time-based criteria, one or more logical operators or a combination thereof. The method can be implemented using a computer program embodied on a computer readable medium having one or more code segments to perform the method steps.
    Type: Grant
    Filed: July 11, 2007
    Date of Patent: October 14, 2014
    Assignee: Avaya Inc.
    Inventors: Ghassan Naim, Srikrishna Kurapati
  • Patent number: 8705720
    Abstract: The present invention provides a system, method and apparatus for authenticating an Internet Protocol (IP) phone and a user of the IP phone by determining whether the IP phone is an authorized device, and whenever the IP phone is authorized and a trigger condition occurs, determining whether the user of the IP phone is authorized. The user authorization process initiates a call to the IP phone, sends a request for a passcode to the IP phone, sends a message to disable the IP phone whenever the passcode is invalid, and terminates the call. The user authentication process uses an in-band channel and the IP phone does not run a two factor authentication client application during the authentication process.
    Type: Grant
    Filed: February 8, 2008
    Date of Patent: April 22, 2014
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Guru-Prasad Thodime-Venkata, Satyam Tyagi
  • Patent number: 8707419
    Abstract: The present invention provides a system, method and apparatus for protecting against high volume attacks. The present invention receives a packet, determines a source of the received packet, and updates a tree-based data structure based on the source of the received packet. The received packet is accepted or passed on whenever one or more statistics stored within the tree-based data structure do not exceed a threshold. The received packet is dropped whenever the one or more statistics exceed the threshold. The present invention can be implemented in hardware, software or a combination thereof. The software will implement the steps as one or more code segments of a computer program embodied on a computer readable medium.
    Type: Grant
    Filed: June 27, 2007
    Date of Patent: April 22, 2014
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Sachin Purushottam Joglekar, Krishna Sobhan Bhaskar Kokkiligadda, Mukesh Kumar Singh, Samrat Saha
  • Patent number: 8582567
    Abstract: The present invention provides a system, method and apparatus for providing network level and nodal level vulnerability protection in VoIP networks by receiving a communication, filtering the received communication using three or more stages selected from the group comprising a media protection and filtering plane, a policy based filtering plane, a signature based filtering plane, a protocol anomaly detection and filtering plane and a behavioral learning based filtering plane, and either allowing or denying the received communication based the filtering step. The stages are applicable to one or more protocols including SIP, IMS, UMA, H.248, H.323, RTP, CSTA/XML or a combination thereof. In addition, the stages can be implemented within a single device or are distributed across a network (e.g., SIP network, a UMA network, an IMS network or a combination thereof).
    Type: Grant
    Filed: August 9, 2006
    Date of Patent: November 12, 2013
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Sachin Purushottam Joglekar, Venkatesan Iyengar Prasanna, Satyam Tyagi, Guru Thodime, Pravin Khandelwal, Chandrasekhar Manchenella, Mukesh Kumar Singh, Raghavendra Venkata Thodime
  • Patent number: 8185947
    Abstract: The present invention provides a system, method and apparatus for securely exchanging security keys and monitoring links in an IP communications network. The apparatus is disposed between the local device and the remote device and receives a security key associated with the secure communication(s) for the local device. The apparatus then uses the security key to decode one or more messages transmitted between the local device and the remote device. The apparatus may initiate one or more security protocols whenever the decoded message(s) satisfy one or more criteria. Note that the present invention can be implemented as a computer program embodied on a computer readable medium wherein each step is performed by one or more code segments.
    Type: Grant
    Filed: July 11, 2007
    Date of Patent: May 22, 2012
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Sudhindra Pundaleeka Herle
  • Patent number: 8086894
    Abstract: A method for managing redundant network components is disclosed. A network component operable to perform in an active mode is monitored. The network component is coupled to a mate network component through a communication network comprising a portion of an Internet network. An operating mode of the network component is determined. The mate network component is switched to perform in an active mode if the network component is not performing in an active mode. The network component and the mate network component communicate using an Internet protocol.
    Type: Grant
    Filed: September 6, 2001
    Date of Patent: December 27, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Venu P. Gopal, Prakasha Shet, Srikrishna Kurapati
  • Patent number: 8014507
    Abstract: A method for processing subscriber calls is disclosed. A call agent receives signals associated with a first call from a first subscriber of a first point of presence. The first subscriber is associated with a first feature set. The call agent receives signals associated with a second call from a second subscriber of a second point of presence. The second subscriber is associated with a second feature set. A feature server is notified of the first call and the second call. A feature from the first feature set is provided to the first subscriber in response to the notification, and a feature from the second feature set is provided to the second subscriber in response to the notification.
    Type: Grant
    Filed: July 10, 2006
    Date of Patent: September 6, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Prasad Praturi, Srikrishna Kurapati, Pravin Kumar Khandelwal, Sankara S. Manepalli, Krishna P. Bhat, Kasturi Narayanan
  • Patent number: 7702090
    Abstract: A method for processing subscriber calls is disclosed. A call agent receives signals associated with a first call from a first subscriber of a first point of presence. The first subscriber is associated with a first feature set. The call agent receives signals associated with a second call from a second subscriber of a second point of presence. The second subscriber is associated with a second feature set. A feature server is notified of the first call and the second call. A feature from the first feature set is provided to the first subscriber in response to the notification, and a feature from the second feature set is provided to the second subscriber in response to the notification.
    Type: Grant
    Filed: July 3, 2006
    Date of Patent: April 20, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Prasad Praturi, Srikrishna Kurapati, Pravin Kumar Khandelwal, Sankara S. Manepalli, Krishna P. Bhat, Kasturi Narayanan
  • Publication number: 20090217039
    Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.
    Type: Application
    Filed: February 5, 2009
    Publication date: August 27, 2009
    Applicant: SIPERA SYSTEMS, INC.
    Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
  • Patent number: 7568125
    Abstract: In accordance with one embodiment of the invention, a method for replicating data for redundant network components is disclosed. Data associated with a call is received and stored in a shared memory database. The data is sent to a mate network component of the network component if the network component is in an active mode. Sending of the data to the mate network component is terminated if the network component enters a mode other than the active mode.
    Type: Grant
    Filed: February 10, 2006
    Date of Patent: July 28, 2009
    Assignee: Cisco Technology, Inc.
    Inventors: Srikrishna Kurapati, Venu P. Gopal, Prakasha Shet, Robert H. Abell, Timothy P. Vetter
  • Publication number: 20090168756
    Abstract: The present invention provides a system, method and apparatus for authenticating an Internet Protocol (IP) phone and a user of the IP phone by determining whether the IP phone is an authorized device, and whenever the IP phone is authorized and a trigger condition occurs, determining whether the user of the IP phone is authorized. The user authorization process initiates a call to the IP phone, sends a request for a passcode to the IP phone, sends a message to disable the IP phone whenever the passcode is invalid, and terminates the call. The user authentication process uses an in-band channel and the IP phone does not run a two factor authentication client application during the authentication process.
    Type: Application
    Filed: February 8, 2008
    Publication date: July 2, 2009
    Applicant: SIPERA SYSTEMS, INC.
    Inventors: Srikrishna Kurapati, Guru-Prasad Thodime-Venkata, Satyam Tyagi
  • Publication number: 20090144820
    Abstract: The present invention provides a system, method and apparatus for protecting against high volume attacks. The present invention receives a packet, determines a source of the received packet, and updates a tree-based data structure based on the source of the received packet. The received packet is accepted or passed on whenever one or more statistics stored within the tree-based data structure do not exceed a threshold. The received packet is dropped whenever the one or more statistics exceed the threshold. The present invention can be implemented in hardware, software or a combination thereof. The software will implement the steps as one or more code segments of a computer program embodied on a computer readable medium.
    Type: Application
    Filed: June 27, 2007
    Publication date: June 4, 2009
    Applicant: SIPERA SYSTEMS, INC.
    Inventors: Srikrishna Kurapati, Sachin Purushottam Joglekar, Krishna Sobhan Bhaskar Kokkiligadda, Mukesh Kumar Singh, Samrat Saha
  • Publication number: 20090094671
    Abstract: The present invention provides a system, method and apparatus for providing security in an IP-based end user device, such personal computer clients, hard phones, soft phones, cellular phones, dual-mode phones, handheld communication devices, wireless communications devices and any other device capable of supporting real time IP-based applications. An application layer, a TCP/IP layer and a datalink layer of the IP-based end user device are monitored. Whenever an incoming session is detected and analyzed, the incoming session is accepted whenever one or more session security parameter(s) are satisfied and the incoming session is denied whenever the session security parameter(s) are not satisfied. Whenever an incoming packet is detected and analyzed, the incoming packet is processed whenever one or more packet security parameter(s) are satisfied and the incoming packet is dropped whenever the packet security parameter(s) are not satisfied.
    Type: Application
    Filed: August 9, 2008
    Publication date: April 9, 2009
    Applicant: SIPERA SYSTEMS, INC.
    Inventors: Srikrishna Kurapati, Sudhindra Pundaleeka Herle
  • Publication number: 20080016515
    Abstract: The present invention provides a system, method and apparatus for troubleshooting one or more communications between a first device and a second device. A monitoring device disposed between the first device and the second device receives a message associated with the communication(s), analyzes the received message and stores the analyzed message whenever the analyzed message satisfies one or more troubleshooting criteria. The one or more troubleshooting criteria may include one or more data element criteria, one or more event-based criteria, one or more time-based criteria, one or more logical operators or a combination thereof. The method can be implemented using a computer program embodied on a computer readable medium having one or more code segments to perform the method steps.
    Type: Application
    Filed: July 11, 2007
    Publication date: January 17, 2008
    Applicant: SIPERA SYSTEMS, INC.
    Inventors: Ghassan Naim, Srikrishna Kurapati