Patents by Inventor Subramania Kaushik

Subramania Kaushik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250261091
    Abstract: A wireless communication system controls a wireless communication device in a visited wireless communication network. A network database stores a slice indicator for a visited wireless network slice in the visited wireless communication network. A network controller receives a request from the visited wireless communication network for the wireless communication device, and in response to receiving the request, the network controller retrieves the slice indicator for the visited wireless communication network from the network database and transfers the slice indicator to the wireless communication device over the visited wireless communication network. The wireless communication device communicates using the visited wireless network slice in the visited wireless communication network in response to receiving the slice indicator.
    Type: Application
    Filed: February 9, 2024
    Publication date: August 14, 2025
    Inventors: Subramania Kaushik, Anil Kumar Mariyani, Srujana Punyapu
  • Publication number: 20250254510
    Abstract: A wireless device is controlled in a visited wireless network. A network database stores a prioritized network list for the visited wireless network. A network controller receives a request from the visited wireless network for the wireless device, and in response, retrieves the prioritized network list for the visited wireless network from the network database. The network controller transfers the prioritized network list to the wireless device over the visited wireless network. The network controller stores the prioritized network list for the visited wireless network in a controller memory. The network controller receives another request from the visited wireless network for the wireless device, and in response, retrieves the prioritized network list for the visited wireless network from the controller memory. The network controller transfers the prioritized network list to the wireless device over the visited wireless network.
    Type: Application
    Filed: February 6, 2024
    Publication date: August 7, 2025
    Inventors: Subramania Kaushik, Anil Kumar Mariyani, Srujana Punyapu
  • Publication number: 20250240664
    Abstract: Systems, methods, and devices are provided for network slice prioritization for wireless devices during network overload conditions. Methods include receiving notification of network overload conditions and receiving notification of an attach request from a wireless device at unified data management (UDM). The UDM obtains a priority network slice for the wireless device from a unified data repository (UDR). The priority network slice for the wireless device is shared with one or more 5G core network functions, such as access and mobility function (AMF), session management function (SMF), short message service function (SMSF), and policy control function (PCF).
    Type: Application
    Filed: January 23, 2024
    Publication date: July 24, 2025
    Inventors: Anil Kumar MARIYANI, Subramania KAUSHIK, Anuj SHARMA
  • Publication number: 20250234249
    Abstract: Systems and methods are provided for dynamically managing service levels in a wireless network. Methods include receiving, by a UDM, from a UDR, existing service levels for one or more wireless devices. The methods further include receiving, by the UDM, from the UDR, UDSP rules for the one or more wireless devices. The methods further include applying the UDSP rules to the existing service levels to yield resultant service levels for the one or more wireless devices.
    Type: Application
    Filed: January 16, 2024
    Publication date: July 17, 2025
    Inventors: Anil Kumar MARIYANI, Subramania KAUSHIK, Chris JENSEN
  • Publication number: 20250234235
    Abstract: Systems, methods, and devices are provided for network slice prioritization for wireless devices during network overload conditions. Methods include receiving notification of network overload conditions and receiving notification of an attach request from a wireless device at home subscriber service (HSS). The HSS obtains a priority network slice for the wireless device from a unified data repository (UDR). The priority network slice for the wireless device is shared with one or more IMS application servers, such as interrogating call session control function (I-CSCF) serving call session control function (S-CSCF), and telephony application server (TAS).
    Type: Application
    Filed: January 16, 2024
    Publication date: July 17, 2025
    Inventors: Anil Kumar MARIYANI, Subramania KAUSHIK
  • Publication number: 20250211538
    Abstract: Embodiments of the present disclosure are directed to systems and methods for improved prioritization of messages exchanged within the core network. By providing priority markings customized based on the type of message being sent and/or the interface the message is sent on, a network may work more optimally in the event of network failure or reduced performance of the network.
    Type: Application
    Filed: December 21, 2023
    Publication date: June 26, 2025
    Inventors: Anil Kumar MARIYANI, subramania Kaushik, Chris Jensen
  • Publication number: 20250203361
    Abstract: Systems and methods are provided for authenticating wireless devices in a wireless network. Methods include maintaining, by an authentication server, one or more mapping tables, wherein the one or more mapping tables map the one or more wireless devices to data management segments. The methods further include communicating, by the authentication server, directly with the data management segments indicated in the mapping tables corresponding to the one or more wireless devices to authenticate the one or more wireless devices.
    Type: Application
    Filed: December 19, 2023
    Publication date: June 19, 2025
    Inventors: Subramania KAUSHIK, Anil Kumar MARIYANI
  • Publication number: 20250151000
    Abstract: Various embodiments comprise a wireless communication network to select Shared Data Support (SDS) rules for a user device. In some examples, the wireless communication network comprises a network controller and a network data system. The network controller receives a registration request from the user device and transfers a subscription data request to the data system. The network data system retrieves subscription data for the user device from the device's subscriber profile. The network data system determines the device type, slice ID, billing ID, region, software version, and PLMN ID for the user device. The network data system selects SDS rules based on the determined information and selects shared subscription data based on the SDS rules. The network data system transfers the subscription data and shared subscription data to the network controller. The network controller generates device context using the subscription data and shared subscription data to serve the user device.
    Type: Application
    Filed: November 6, 2023
    Publication date: May 8, 2025
    Inventors: Subramania Kaushik, Anil Kumar Mariyani
  • Publication number: 20250126156
    Abstract: A data communication system comprises wireless network slices and Internet Protocol (IP) system slices that provide a communication service. A network control system selects one of the wireless network slices and one of the IP system slices to provide the communication service to a user communication device. The selected one of the wireless network slices and the selected one of the IP system slices provide the communication service to the user communication device.
    Type: Application
    Filed: December 23, 2024
    Publication date: April 17, 2025
    Inventors: Anil Kumar Mariyani, Subramania Kaushik
  • Publication number: 20250113179
    Abstract: Systems and methods are provided for notifying third-party servers, such as law enforcement agency servers, of updates to wireless user equipment identifiers. The method includes receiving a replacement wireless user equipment identifier to replace a current wireless UE identifier. It is determined that a third-party server (law enforcement agency) information request is associated with the current wireless UE identifier (such as an IMEI or PEI). Responsive to determining there is an information request from a third-party server associated with the current wireless UE identifier, notification of the replacement wireless user equipment identifier is generated and transmitted to the third-party server.
    Type: Application
    Filed: September 28, 2023
    Publication date: April 3, 2025
    Inventors: Anil Kumar MARIYANI, Subramania KAUSHIK
  • Publication number: 20250097273
    Abstract: Solutions for providing a data traffic session with proxy-call session control function (P-CSCF) restoration include: receiving an indication, by an application server (AS), that a user equipment (UE) is registered with a first proxy node; receiving, at a subscriber information node, from a call session control function (e.g., over an N70 interface), a first message triggering proxy node restoration; based on at least receiving the first message triggering proxy node restoration, transmitting, by the subscriber information node, to a management node, a second message triggering proxy node restoration; receiving an indication, by the AS, that the UE is registered with a second proxy node different than the first proxy node; and based on at least receiving a session initiation message, establishing the data traffic session for the UE with the second proxy node.
    Type: Application
    Filed: December 4, 2024
    Publication date: March 20, 2025
    Inventors: Nassereddine SABEUR, Saqib BADAR, Shujaur MUFTI, Joel ARENDS, Subramania KAUSHIK
  • Publication number: 20250088995
    Abstract: Systems and methods are provided for tracking handover types in a wireless network. An originating radio access technology (RAT) and a destination radio access technology (RAT) are determined from the initial request from a UE to attach to the wireless network. The originating RAT and destination RAT for the initial attach request are transmitted and maintained in a subscriber profile associated with the wireless device for subscriber tracking and network analysis.
    Type: Application
    Filed: September 11, 2023
    Publication date: March 13, 2025
    Inventors: Anil Kumar MARIYANI, Subramania KAUSHIK
  • Publication number: 20250088839
    Abstract: An Internet Protocol Multimedia Subsystem (IMS) serves an IMS service to user communication devices based on individual subscriber profiles and a shared subscriber profile. The individual subscriber profiles and the shared subscriber profile are stored. The IMS serves the IMS service to the user communication devices based on the individual subscriber profiles. When an individual subscriber profile is unavailable for a user communication device, the IMS serves the IMS service to the user communication device based on the shared subscriber profile.
    Type: Application
    Filed: September 8, 2023
    Publication date: March 13, 2025
    Inventors: Anil Kumar Mariyani, Subramania Kaushik
  • Publication number: 20250080591
    Abstract: Techniques for controllable device deregistration and reregistration provide for enhanced network operator control over the timing of device deregistration and reregistration with the network. Example techniques can be applied by a home subscriber service (HSS) of an internet protocol multimedia core network subsystem (IMS). In response to a reregistration notification initiated by a network operator, the HSS can create an IMS deregistration notification comprising a reregister bit and can set the reregister bit to an enabled state. The HSS can then forward the IMS deregistration notification to downstream network equipment such as call session control functions (CSCF), which can in turn forward the IMS deregistration notification to a user equipment (UE), thereby causing the UE to re-register with the IMS.
    Type: Application
    Filed: September 6, 2023
    Publication date: March 6, 2025
    Inventors: Anil Kumar Mariyani, Subramania Kaushik, Anuj Sharma
  • Publication number: 20250071524
    Abstract: Techniques for optimizing messages in a telecommunications network are discussed herein. More particularly, an SMSF can be configured to refrain from sending deregistration and/or unsubscribe messages to a UDM in response to a handover from 5G to 4G, which can thereby reduce signaling in the network. Further, because of the suppressed messages, the network maintains SMSF session information, which indicates the delivery location for a SMS message. However, when a SMSC receives a SMS addressed to the UE, the HSS may query a UDR for SMSF session information, SMSF registration status, and/or AMF registration status. The HSS may determine a location for the SMS based on the active location of the UE, as determined by the AMF registration status. Thus, the techniques discussed herein represent network optimizations while allowing SMS messages to be correctly routed in a network.
    Type: Application
    Filed: August 25, 2023
    Publication date: February 27, 2025
    Inventors: Subramania Kaushik, Anil Kumar Mariyani
  • Publication number: 20250071714
    Abstract: Techniques for optimizing messages in a telecommunications network are discussed herein. More particularly, an SMSF can be configured to refrain from sending deregistration and/or unsubscribe messages to a UDM in response to a handover from 5G to 4G, which can thereby reduce signaling in the network. Further, because of the suppressed messages, the network maintains SMSF session information, which indicates the delivery location for a SMS message. However, when a SMSC receives a SMS addressed to the UE, the HSS may query a UDR for SMSF session information, SMSF registration status, and/or AMF registration status. The HSS may determine a location for the SMS based on the active location of the UE, as determined by the AMF registration status. Thus, the techniques discussed herein represent network optimizations while allowing SMS messages to be correctly routed in a network.
    Type: Application
    Filed: August 25, 2023
    Publication date: February 27, 2025
    Inventors: Subramania Kaushik, Anil Kumar Mariyani
  • Publication number: 20250071711
    Abstract: Techniques for authenticating user equipment (UE) in a Fifth-Generation (5G) network are discussed herein. A UE can connect with a 5G network and can send a registration request to an authentication server function (AUSF) of the network. The AUSF can request multiple authentication vectors from a unified data management (UDM) function, which can use a 5G-AKA (authentication and key management) procedure to generate authentication vectors. The AUSF can receive and store a subset of the authentication vectors at the AUSF (or another location) and can forward an authentication vector to an access and mobility management function (AMF) to subsequently authenticate the UE. Later, when the UE leaves the 5G network (e.g., because of a handover) and returns to the 5G network, the AUSF can re-authenticate the UE without additional signaling to the UDM to generate or otherwise determine additional authentication vectors, thereby saving additional signaling in the core network.
    Type: Application
    Filed: August 25, 2023
    Publication date: February 27, 2025
    Inventors: Subramania Kaushik, Anil Kumar Mariyani
  • Publication number: 20250071715
    Abstract: Technology is disclosed herein for operating a wireless network including deregistering a user device from the network. In an implementation, a first network element deregisters the user device from the wireless network. The first network element determines a cause of the deregistration from among a plurality of possible causes and generates a notification message indicating the cause of the deregistration. The first network element communicates the notification message to a second network element which purges subscriber data from a data repository of the network and updates a subscriber profile of the user device with the cause of the deregistration. In an implementation, the first network element is an Access and Mobility Management function (AMF), the second network element is a Unified Data Management function (UDM), and the data repository is a Unified Data Repository (UDR) of the network.
    Type: Application
    Filed: August 25, 2023
    Publication date: February 27, 2025
    Inventors: Subramania Kaushik, Anil Kumar Mariyani
  • Publication number: 20250056333
    Abstract: An access and mobility management function (AMF) and a unified data management node (UDM) described herein are configured to refrain from sending messages between each other in the contexts of handovers between 4G (fourth generation) and 5G (fifth generation) technologies and of initial registration on 5G. During a handover from 5G to 4G, the UDM sets a 5G registration status to not active and refrains from sending a deregistration notification to the AMF. During a handover from 4G to 5G that is not an initial registration, the AMF refrains from sending get messages and subscribe messages to the UDM but receives updates to subscriber profile information from the UDM. Further, during an initial 5G registration, the AMF refrains from sending subscribe messages to the UDM but receives updates to subscriber profile information from the UDM.
    Type: Application
    Filed: August 9, 2023
    Publication date: February 13, 2025
    Inventors: Subramania Kaushik, Anil Kumar Mariyani, Chris Jensen
  • Publication number: 20250048302
    Abstract: An access and mobility management function (AMF) configured to send a registration message with an initial registration flag set to false to a unified data management node (UDM) and refrain from sending an update message to the UDM is described herein. The AMF receives a registration request from a user equipment (UE) associated with a handover of the UE from a fourth generation (4G) network to a fifth generation (5G) network and determines that the registration request is not for an initial registration. In response to determining that the registration request is not for an initial registration, the AMF sends the registration message to the UDM with an initial registration flag set to false and refrains from sending the update message to the UDM.
    Type: Application
    Filed: August 1, 2023
    Publication date: February 6, 2025
    Inventors: Subramania Kaushik, Anil Kumar Mariyani