Patents by Inventor Suhas Mathur

Suhas Mathur has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9596599
    Abstract: A method and apparatus for use in authentication for secure wireless communication is provided. A received signal is physically authenticated and higher layer processed. Physical authentication includes performing hypothesis testing using a channel impulse response (CIR) measurement of the received signal and predetermined referenced data. Higher layer processing includes validating the signal using a one-way hash chain value in the signal. Once a signal is authenticated, secure wireless communication is performed.
    Type: Grant
    Filed: September 18, 2009
    Date of Patent: March 14, 2017
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Liang Xiao, Chunxuan Ye, Suhas Mathur, Yogendra C Shah, Alexander Reznik
  • Patent number: 9564052
    Abstract: Disclosed is a method and system that receives sensor information from each of a plurality of sensors. Each sensor in the plurality is associated with a vehicle. The sensor information includes location coordinates of each vehicle in the plurality. The sensor information associated with each vehicle in the plurality then is translated to parking statistics information. In one embodiment, the translation is based on an aggregate of sensor information corresponding to the plurality of vehicles. The system then communicates parking statistics information to the vehicle.
    Type: Grant
    Filed: August 31, 2015
    Date of Patent: February 7, 2017
    Assignee: RUTGERS, THE STATE UNIVERSITY OF NEW JERSEY
    Inventors: Marco Gruteser, Suhas Mathur
  • Publication number: 20170004217
    Abstract: A method, non-transitory computer readable medium and apparatus for deriving trustful metadata for an application are disclosed. For example, the method crawls online for the application, analyzes the application to determine a function of the application, and generates trustful meta-data for the application based upon the function of the application.
    Type: Application
    Filed: September 19, 2016
    Publication date: January 5, 2017
    Inventors: ANDREA G. FORTE, Baris Coskun, Qi Shen, Ilona Murynets, Jeffrey Bickford, Mikhail lstomin, Paul Giura, Roger Piqueras Jover, Ramesh Subbaraman, Suhas Mathur, Wei Wang
  • Publication number: 20160353345
    Abstract: Methods and apparatus to migrate a mobile device from a first virtual private mobile network to a second virtual private mobile network are disclosed. An example apparatus includes a processor and a memory including instructions that cause the processor to perform operations including determining, based on a set of latency routing rules, that a communication transmitted via the first virtual private mobile network is a latency sensitive communication. In response to determining the communication is a latency sensitive communication, the mobile device that originated the latency sensitive communication is identified. The mobile device is communicating via the first virtual private mobile network. Example operations also include migrating the mobile device from the first virtual private mobile network to the second virtual private mobile network wherein the second virtual private mobile network is configured to reduce the latency of the latency sensitive communication.
    Type: Application
    Filed: August 8, 2016
    Publication date: December 1, 2016
    Inventors: Jacobus Van der Merwe, Xu Chen, Baris Coskun, Gustavo de los Reyes, Seungjoon Lee, Suhas Mathur, Arati Baliga, Gang Xu
  • Publication number: 20160308837
    Abstract: Methods and apparatus to configure virtual private mobile networks are disclosed. Example methods include provisioning a virtual private mobile network within a wireless network, and, after provisioning the virtual private mobile network, determining whether a first communication from a user equipment matches a security event profile. When the first communication matches the profile, the example methods include transmitting, from the wireless network via a first base transceiver station, an instruction to cause the user equipment to be communicatively coupled to the virtual private mobile network. The example methods further include instructing the user equipment to transmit a second communication through a second base transceiver station that is physically separate from the first base transceiver station and through the virtual private mobile network. In the example methods, the virtual private mobile network is isolated in a wireless spectrum from other portions of the network.
    Type: Application
    Filed: June 27, 2016
    Publication date: October 20, 2016
    Inventors: Arati Baliga, Xu Chen, Baris Coskun, Gustavo de los Reyes, Seungjoon Lee, Suhas Mathur, Jacobus Van der Merwe, Gang Xu
  • Patent number: 9449104
    Abstract: A method, non-transitory computer readable medium and apparatus for deriving trustful metadata for an application are disclosed. For example, the method crawls online for the application, analyzes the application to determine a function of the application, and generates trustful meta-data for the application based upon the function of the application.
    Type: Grant
    Filed: July 2, 2012
    Date of Patent: September 20, 2016
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Andrea G. Forte, Baris Coskun, Qi Shen, Ilona Murynets, Jeffrey Bickford, Mikhail Istomin, Paul Giura, Roger Piqueras Jover, Ramesh Subbaraman, Suhas Mathur, Wei Wang
  • Patent number: 9432258
    Abstract: Methods and apparatus to configure virtual private mobile networks for latency are disclosed. A disclosed example method includes provisioning logically a virtual private mobile network within a wireless network to reduce latency of a communication associated with a latency sensitive application, determining a mobile device is communicatively coupling to the wireless network via the latency sensitive application, and coupling the mobile device to the virtual private mobile network to reduce latency of the communication associated with the latency sensitive application.
    Type: Grant
    Filed: June 6, 2011
    Date of Patent: August 30, 2016
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Jacobus Van der Merwe, Xu Chen, Baris Coskun, Gustavo de los Reyes, Seungjoon Lee, Suhas Mathur, Arati Baliga, Gang Xu
  • Patent number: 9386035
    Abstract: Methods and apparatus to configure virtual private mobile networks for security are disclosed. A disclosed example method includes identifying, in a wireless network, a communication from a user equipment that matches a security event profile, transmitting, from the wireless network, an instruction to enable the user equipment to be communicatively coupled to a virtual private mobile network, the virtual private mobile network being provisioned for security within the wireless network, and enabling the user equipment to transmit a second communication through the virtual private mobile network securely isolated from other portions of the wireless network.
    Type: Grant
    Filed: June 21, 2011
    Date of Patent: July 5, 2016
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Arati Baliga, Xu Chen, Baris Coskun, Gustavo de los Reyes, Seungjoon Lee, Suhas Mathur, Jacobus Van der Merwe, Gang Xu
  • Publication number: 20160044056
    Abstract: Anomalies are detected in a network by detecting communication between a plurality of entities and a set of users in the network, determining an overlap between subsets of the set of users that the entities comprising the plurality of entities communicated with, respectively, and determining whether the communication between the plurality of entities and the set of users is anomalous based on the overlap.
    Type: Application
    Filed: October 26, 2015
    Publication date: February 11, 2016
    Inventors: Nathaniel Boggs, Wei Wang, Baris Coskun, Suhas Mathur
  • Publication number: 20150371540
    Abstract: Disclosed is a method and system that receives sensor information from each of a plurality of sensors. Each sensor in the plurality is associated with a vehicle. The sensor information includes location coordinates of each vehicle in the plurality. The sensor information associated with each vehicle in the plurality then is translated to parking statistics information. In one embodiment, the translation is based on an aggregate of sensor information corresponding to the plurality of vehicles. The system then communicates parking statistics information to the vehicle.
    Type: Application
    Filed: August 31, 2015
    Publication date: December 24, 2015
    Inventors: Marco Gruteser, Suhas Mathur
  • Patent number: 9203856
    Abstract: Anomalies are detected in a network by detecting communication between a plurality of entities and a set of users in the network, determining an overlap between subsets of the set of users that the entities comprising the plurality of entities communicated with, respectively, and determining whether the communication between the plurality of entities and the set of users is anomalous based on the overlap.
    Type: Grant
    Filed: March 4, 2013
    Date of Patent: December 1, 2015
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Nathaniel Boggs, Wei Wang, Baris Coskun, Suhas Mathur
  • Publication number: 20150312269
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to identify candidate boundaries of Internet protocol addresses associated with a malicious Internet protocol address. An example method includes collecting, with a processor, netflow data associated with the Internet protocol addresses within a netblock having a lower boundary Internet protocol address and an upper boundary Internet protocol address, generating, with the processor, a first window of Internet protocol addresses numerically lower than the malicious Internet protocol address, generating, with the processor, a second window of Internet protocol addresses numerically higher than the malicious Internet protocol address, for respective Internet protocol addresses in the first and second windows, calculating, with the processor, occurrence counts associated with behavior features, and identifying candidate boundaries within the netblock based on divergence values caused by the behavior features.
    Type: Application
    Filed: July 7, 2015
    Publication date: October 29, 2015
    Inventors: Baris Coskun, Suhrid Balakrishnan, Suhas Mathur
  • Patent number: 9123245
    Abstract: Disclosed is a method and system that receives sensor information from each of a plurality of sensors. Each sensor in the plurality is associated with a vehicle. The sensor information includes location coordinates of each vehicle in the plurality. The sensor information associated with each vehicle in the plurality then is translated to parking statistics information. In one embodiment, the translation is based on an aggregate of sensor information corresponding to the plurality of vehicles. The system then communicates parking statistics information to the vehicle.
    Type: Grant
    Filed: July 15, 2013
    Date of Patent: September 1, 2015
    Assignee: RUTGERS, THE STATE UNIVERSITY OF NEW JERSEY
    Inventors: Marco Gruteser, Suhas Mathur
  • Patent number: 9083730
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to identify an Internet protocol address blacklist boundary. An example method includes identifying a netblock associated with a malicious Internet protocol address, the netblock having a lower boundary and an upper boundary, collecting netflow data associated with a plurality of Internet protocol addresses in the netblock, establishing a first window associated with a lower portion of Internet protocol addresses numerically lower than a candidate Internet protocol address, establishing a second window associated with an upper portion of Internet protocol addresses numerically higher than a candidate Internet protocol address, calculating a breakpoint score based on a comparison between a behavioral profile of the first window and a behavioral profile of the second window, and identifying a first sub-netblock when the breakpoint score exceeds a threshold value.
    Type: Grant
    Filed: December 6, 2013
    Date of Patent: July 14, 2015
    Assignee: AT&T Intellectual Property I., L.P.
    Inventors: Baris Coskun, Suhrid Balakrishnan, Suhas Mathur
  • Publication number: 20150163235
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to identify an Internet protocol address blacklist boundary. An example method includes identifying a netblock associated with a malicious Internet protocol address, the netblock having a lower boundary and an upper boundary, collecting netflow data associated with a plurality of Internet protocol addresses in the netblock, establishing a first window associated with a lower portion of Internet protocol addresses numerically lower than a candidate Internet protocol address, establishing a second window associated with an upper portion of Internet protocol addresses numerically higher than a candidate Internet protocol address, calculating a breakpoint score based on a comparison between a behavioral profile of the first window and a behavioral profile of the second window, and identifying a first sub-netblock when the breakpoint score exceeds a threshold value.
    Type: Application
    Filed: December 6, 2013
    Publication date: June 11, 2015
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Baris Coskun, Suhrid Balakrishnan, Suhas Mathur
  • Patent number: 8873755
    Abstract: Wireless devices in proximity are securely paired with one another autonomously by generating a common cryptographic key directly from a time-varying wireless environment shared among the wireless devices. The shared key can be used by the wireless devices to authenticate each wireless device's physical proximity and then to facilitate confidential communication between the wireless devices. The algorithm used to create the shared key is secure against a computationally unbounded adversary and its computational complexity is linear in the size of the shared key.
    Type: Grant
    Filed: May 19, 2011
    Date of Patent: October 28, 2014
    Assignees: AT&T Intellectual Propert I, L.P., Rutgers, The State University of New Jersey
    Inventors: Suhas Mathur, Wade Trappe, Alexander Varshavsky
  • Publication number: 20140250221
    Abstract: Anomalies are detected in a network by detecting communication between a plurality of entities and a set of users in the network, determining an overlap between subsets of the set of users that the entities comprising the plurality of entities communicated with, respectively, and determining whether the communication between the plurality of entities and the set of users is anomalous based on the overlap.
    Type: Application
    Filed: March 4, 2013
    Publication date: September 4, 2014
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Nathaniel Boggs, Wei Wang, Baris Coskun, Suhas Mathur
  • Publication number: 20140173682
    Abstract: A method and apparatus for use in authentication for secure wireless communication is provided. A received signal is physically authenticated and higher layer processed. Physical authentication includes performing hypothesis testing using a channel impulse response (CIR) measurement of the received signal and predetermined referenced data. Higher layer processing includes validating the signal using a one-way hash chain value in the signal. Once a signal is authenticated, secure wireless communication is performed.
    Type: Application
    Filed: September 18, 2009
    Publication date: June 19, 2014
    Applicant: INTERDIGITAL PATENT HOLDINGS, INC.
    Inventors: Liang Xiao, Chunxuan Ye, Suhas Mathur, Yogendra C Shah, Alexander Reznik
  • Publication number: 20140085112
    Abstract: Disclosed is a method and system that receives sensor information from each of a plurality of sensors. Each sensor in the plurality is associated with a vehicle. The sensor information includes location coordinates of each vehicle in the plurality. The sensor information associated with each vehicle in the plurality then is translated to parking statistics information. In one embodiment, the translation is based on an aggregate of sensor information corresponding to the plurality of vehicles. The system then communicates parking statistics information to the vehicle.
    Type: Application
    Filed: July 15, 2013
    Publication date: March 27, 2014
    Inventors: Marco Gruteser, Suhas Mathur
  • Publication number: 20140006375
    Abstract: A method, non-transitory computer readable medium and apparatus for fingerprinting applications are disclosed. For example, the method analyzes an application binary of the application, extracts an invariant feature from the application binary, generates a signature from the invariant feature, and compares the signature of the application to a second signature of a second application to determine if the application and the second application are similar.
    Type: Application
    Filed: July 2, 2012
    Publication date: January 2, 2014
    Inventors: Andrea G. Forte, Baris Coskun, Qi Shen, Ilona Murynets, Jeffrey Bickford, Mikhail Istomin, Paul Giura, Roger Piqueras Jover, Ramesh Subbaraman, Suhas Mathur, Wei Wang