Patents by Inventor Sumanta SAHA
Sumanta SAHA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11483254Abstract: There is provided allocating cloud computing resources to process a user session by a gateway in a mobile communications network, and allocating the cloud computing resources in pairs to user sessions. Rules for the pair of allocated resources are determined such that incoming control plane traffic associated with the session is forwarded to the both cloud computing resources forming the pair.Type: GrantFiled: January 9, 2014Date of Patent: October 25, 2022Assignee: NOKIA SOLUTIONS AND NETWORKS OYInventors: Sumanta Saha, Tommy Johannes Lindgren, Jani Olavi Soderlund, Niko Markus Savolainen
-
Time determination of distributed events without distribution of reference time, phase, or frequency
Patent number: 11303374Abstract: A network of computing devices includes a timing reference, a free-run node, and an aggregator. The reference calculates a first communication packet having a reference timestamp and reference data, and transmits the first packet to the free-run node. The free-run node receives the first packet from the timing reference, calculates a second packet having metadata that includes the reference timestamp, a sparse hash value calculated from the reference data, and a free-run node timestamp, and publishes the second packet to the aggregator. The aggregator receives the second packet and calculates a compensation value from the reference timestamp, the sparse hash value, and the free-run node timestamp. Computer-implemented methods include the free-run node receiving the compensation value and updating its local dock based on the compensation value. Other methods include the aggregator determining an optimal packet path through a network of computing devices based on the metadata.Type: GrantFiled: March 16, 2020Date of Patent: April 12, 2022Assignee: LUMINOUS CYBER CORPORATIONInventors: Charles F. Barry, Nick J. Possley, Brendan P. Keller, Sumanta Saha -
Publication number: 20210399959Abstract: Methods, systems, and apparatus for network monitoring and analytics are disclosed. The methods, systems, and apparatus for network monitoring and analytics perform highly probable identification of related messages using one or more sparse hash function sets. Highly probable identification of related messages enables a network monitoring and analytics system to trace the trajectory of a message traversing the network and measure the delay for the message between observation points. The sparse hash function value, or identity, enables a network monitoring and analytics system to identify the transit path, transit time, entry point, exit point, and/or other information about individual packets and to identify bottlenecks, broken paths, lost data, and other network analytics by aggregating individual message data.Type: ApplicationFiled: September 3, 2021Publication date: December 23, 2021Inventors: Charles F. BARRY, Sumanta Saha
-
Patent number: 11115297Abstract: Methods, systems, and apparatus for network monitoring and analytics are disclosed. The methods, systems, and apparatus for network monitoring and analytics perform highly probable identification of related messages using one or more sparse hash function sets. Highly probable identification of related messages enables a network monitoring and analytics system to trace the trajectory of a message traversing the network and measure the delay for the message between observation points. The sparse hash function value, or identity, enables a network monitoring and analytics system to identify the transit path, transit time, entry point, exit point, and/or other information about individual packets and to identify bottlenecks, broken paths, lost data, and other network analytics by aggregating individual message data.Type: GrantFiled: April 5, 2019Date of Patent: September 7, 2021Assignee: LUMINOUS CYBER CORP.Inventors: Charles F. Barry, Sumanta Saha
-
Patent number: 11087078Abstract: There are many administrative processes which require a user to enter handwritten data on ordinary paper forms. This data is then further processed and converted in the digitized form. In the existing methods, the turnaround time for whole process is high, lacks accuracy of the digitized data, and cost is also on the higher side. A system and method for real time digitization of hand written input data has been provided. The system comprises an input device that utilizes a pen and paper input form which is filled by a user in his hand writing. The completed form data is then transferred to a form inspector application that runs on the aggregation device. It allows for applications to be verified for completeness and send the same for real-time digitization using a form processor application. A recognition engine is then used for the digitization of the hand written input data.Type: GrantFiled: August 23, 2019Date of Patent: August 10, 2021Assignee: TATA CONSULTANCY SERVICES LIMITEDInventors: Deepak Swamy, Prashant Mohanan, Piyush Agarwalla, Aniket Roy, Sumanta Saha, Santosh Kumar Mohan, Olivia Roy, Ipsita Banerjee
-
Patent number: 10904158Abstract: A method including obtaining a plurality of data sets each describing a specific virtualized network function, acquiring and processing control information related to at least one of a communication traffic situation in a communication network for which at least one virtualized network function is implementable and a resource usage situation in a virtualization infrastructure in which at least one virtualized network function can be instantiated, and adjusting an amount and type of at least one virtualized network function instantiated in the virtualization infrastructure for usage in the communication network by, based on the processed control information, selecting at least one virtualized network function from the obtained data sets, instantiating the selected at least one virtualized network function.Type: GrantFiled: June 2, 2015Date of Patent: January 26, 2021Assignee: NOKIA SOLUTIONS AND NETWORKS OYInventors: Sumanta Saha, Wolfgang Hahn
-
Patent number: 10805826Abstract: Methods of providing quality of service support for tactile traffic are disclosed. In one embodiment, an electronic device notifies a controller that an application has been authorized to transmit tactile traffic in the communication network. The controller, responsive to the notification, causes the backhaul node to install a flow table entry in a flow table of the backhaul node, through which packets of the application is to be forwarded within a latency defined for the tactile traffic by the backhaul node. The electronic device authenticates a packet being sourced from or destined to the application that has been authorized to transmit the tactile traffic in the communication network, and forwards the packet within the latency defined for the tactile traffic.Type: GrantFiled: April 4, 2016Date of Patent: October 13, 2020Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Sumanta Saha, Kazi Wali Ullah
-
TIME DETERMINATION OF DISTRIBUTED EVENTS WITHOUT DISTRIBUTION OF REFERENCE TIME, PHASE, OR FREQUENCY
Publication number: 20200220637Abstract: A network of computing devices includes a timing reference, a free-run node, and an aggregator. The reference calculates a first communication packet having a reference timestamp and reference data, and transmits the first packet to the free-run node. The free-run node receives the first packet from the timing reference, calculates a second packet having metadata that includes the reference timestamp, a sparse hash value calculated from the reference data, and a free-run node timestamp, and publishes the second packet to the aggregator. The aggregator receives the second packet and calculates a compensation value from the reference timestamp, the sparse hash value, and the free-run node timestamp. Computer-implemented methods include the free-run node receiving the compensation value and updating its local dock based on the compensation value. Other methods include the aggregator determining an optimal packet path through a network of computing devices based on the metadata.Type: ApplicationFiled: March 16, 2020Publication date: July 9, 2020Inventors: Charles F. BARRY, Nick J. POSSLEY, Brendan P. KELLER, Sumanta SAHA -
Publication number: 20200205025Abstract: Methods of providing quality of service support for tactile traffic are disclosed. In one embodiment, an electronic device notifies a controller that an application has been authorized to transmit tactile traffic in the communication network. The controller, responsive to the notification, causes the backhaul node to install a flow table entry in a flow table of the backhaul node, through which packets of the application is to be forwarded within a latency defined for the tactile traffic by the backhaul node. The electronic device authenticates a packet being sourced from or destined to the application that has been authorized to transmit the tactile traffic in the communication network, and forwards the packet within the latency defined for the tactile traffic.Type: ApplicationFiled: April 4, 2016Publication date: June 25, 2020Inventors: Sumanta SAHA, Kazi Wali ULLAH
-
Time determination of distributed events without distribution of reference time, phase, or frequency
Patent number: 10637597Abstract: A network of computing devices includes a timing reference, a free-run node, and an aggregator. The reference calculates a first communication packet having a reference timestamp and reference data, and transmits the first packet to the free-run node. The free-run node receives the first packet from the timing reference, calculates a second packet having metadata that includes the reference timestamp, a sparse hash value calculated from the reference data, and a free-run node timestamp, and publishes the second packet to the aggregator. The aggregator receives the second packet and calculates a compensation value from the reference timestamp, the sparse hash value, and the free-run node timestamp. Computer-implemented methods include the free-run node receiving the compensation value and updating its local clock based on the compensation value. Other methods include the aggregator determining an optimal packet path through a network of computing devices based on the metadata.Type: GrantFiled: April 5, 2018Date of Patent: April 28, 2020Assignee: LUMINOUS CYBER CORPORATIONInventors: Charles F. Barry, Nick J. Possley, Brendan P. Keller, Sumanta Saha -
Publication number: 20200065362Abstract: There are many administrative processes which require a user to enter handwritten data on ordinary paper forms. This data is then further processed and converted in the digitized form. In the existing methods, the turnaround time for whole process is high, lacks accuracy of the digitized data, and cost is also on the higher side. A system and method for real time digitization of hand written input data has been provided. The system comprises an input device that utilizes a pen and paper input form which is filled by a user in his hand writing. The completed form data is then transferred to a form inspector application that runs on the aggregation device. It allows for applications to be verified for completeness and send the same for real-time digitization using a form processor application. A recognition engine is then used for the digitization of the hand written input data.Type: ApplicationFiled: August 23, 2019Publication date: February 27, 2020Applicant: Tata Consultancy Services LimitedInventors: Deepak SWAMY, Prashant MOHANAN, Piyush AGARWALLA, Aniket ROY, Sumanta SAHA, Santosh Kumar MOHAN, Olivia ROY, Ipsita BANERJEE
-
Patent number: 10382295Abstract: Methods, systems, and apparatus for network monitoring and analytics are disclosed. The methods, systems, and apparatus for network monitoring and analytics perform highly probable identification of related messages using one or more sparse hash function sets. Highly probable identification of related messages enables a network monitoring and analytics system to trace the trajectory of a message traversing the network and measure the delay for the message between observation points. The sparse hash function value, or identity, enables a network monitoring and analytics system to identify the transit path, transit time, entry point, exit point, and/or other information about individual packets and to identify bottlenecks, broken paths, lost data, and other network analytics by aggregating individual message data.Type: GrantFiled: March 17, 2016Date of Patent: August 13, 2019Assignee: LUMINOUS CYBER CORPORATIONInventors: Charles F. Barry, Sumanta Saha
-
Publication number: 20190238430Abstract: Methods, systems, and apparatus for network monitoring and analytics are disclosed. The methods, systems, and apparatus for network monitoring and analytics perform highly probable identification of related messages using one or more sparse hash function sets. Highly probable identification of related messages enables a network monitoring and analytics system to trace the trajectory of a message traversing the network and measure the delay for the message between observation points. The sparse hash function value, or identity, enables a network monitoring and analytics system to identify the transit path, transit time, entry point, exit point, and/or other information about individual packets and to identify bottlenecks, broken paths, lost data, and other network analytics by aggregating individual message data.Type: ApplicationFiled: April 5, 2019Publication date: August 1, 2019Inventors: Charles F. BARRY, Sumanta Saha
-
Patent number: 10243863Abstract: A method is disclosed for downscaling a deep packet inspection service in a network apparatus. The method comprises receiving data flow in a gateway virtual machine via a software defined networking switch, and keeping track of data flow and control flow and their state per subscriber. If needed, a new deep packet inspection virtual machine is selected for the data flow. The software defined networking switch is informed on the selection of the new deep packet inspection virtual machine. The new deep packet inspection virtual machine is instructed to re-create a flow identification for the data flow to ensure deep packet inspection service continuity.Type: GrantFiled: February 4, 2014Date of Patent: March 26, 2019Assignee: NOKIA SOLUTIONS AND NETWORKS OYInventors: Jani Olavi Söderlund, Erkki Juhani Hietala, Sumanta Saha, Niko Markus Savolainen, Tommy Johannes Lindgren
-
TIME DETERMINATION OF DISTRIBUTED EVENTS WITHOUT DISTRIBUTION OF REFERENCE TIME, PHASE, OR FREQUENCY
Publication number: 20190081720Abstract: A network of computing devices includes a timing reference, a free-run node, and an aggregator. The reference calculates a first communication packet having a reference timestamp and reference data, and transmits the first packet to the free-run node. The free-run node receives the first packet from the timing reference, calculates a second packet having metadata that includes the reference timestamp, a sparse hash value calculated from the reference data, and a free-run node timestamp, and publishes the second packet to the aggregator. The aggregator receives the second packet and calculates a compensation value from the reference timestamp, the sparse hash value, and the free-run node timestamp. Computer-implemented methods include the free-run node receiving the compensation value and updating its local clock based on the compensation value. Other methods include the aggregator determining an optimal packet path through a network of computing devices based on the metadata.Type: ApplicationFiled: April 5, 2018Publication date: March 14, 2019Inventors: Charles F. Barry, Nick J. Possley, Brendan P. Keller, Sumanta Saha -
Patent number: 10057177Abstract: A method is disclosed for service offloading in a communications system, the method comprising determining, in a network apparatus, whether a traffic flow has been properly classified by a deep packet inspection virtual machine. If the traffic flow has been properly classified by the deep packet inspection virtual machine, the method comprises instructing a software defined networking controller to stop sending further packets of said traffic flow to the deep packet inspection virtual machine.Type: GrantFiled: February 5, 2014Date of Patent: August 21, 2018Assignee: NOKIA SOLUTIONS AND NETWORKS OYInventors: Sumanta Saha, Erkki Juhani Hietala, Jani Olavi Söderlund, Niko Markus Savolainen, Tommy Johannes Lindgren
-
Publication number: 20180176264Abstract: Apparatus and method for lawful interception in accordance with an example embodiment of the present invention, a method is provided for receiving from a gateway apparatus an intercept request regarding user equipment in the communication system; creating or modifying a processing rule regarding the user equipment by including interception in the rule; transmitting to a network switch processing user equipment connections a command to clone and encrypt each signalling or data packet of the user equipment connection and to transmit the encrypted signalling and data packets to a given network apparatus.Type: ApplicationFiled: February 9, 2018Publication date: June 21, 2018Inventors: Tommy Johannes LINDGREN, Sumanta SAHA, Jani Olavi SODERLUND, Niko Markus SAVOLAINEN
-
Publication number: 20180167418Abstract: Apparatus and method for lawful interception in accordance with an example embodiment of the present invention, a method is provided for receiving from a gateway apparatus an intercept request regarding user equipment in the communication system; creating or modifying a processing rule regarding the user equipment by including interception in the rule; transmitting to a network switch processing user equipment connections a command to clone and encrypt each signalling or data packet of the user equipment connection and to transmit the encrypted signalling and data packets to a given network apparatus.Type: ApplicationFiled: February 9, 2018Publication date: June 14, 2018Inventors: Tommy Johannes LINDGREN, Sumanta SAHA, Jani Olavi SODERLUND, Niko Markus SAVOLAINEN
-
Publication number: 20170251514Abstract: The present invention addresses method, apparatus and computer program product for enabling session transfer by Tunnel Endpoint Identifier renumbering in GPRS Tunneling Protocol peer. A new Tunnel Endpoint Identifier value is allocated for the existing session, information about relocating the existing session including the new Tunnel Endpoint Identifier value for the existing session is communicated to the peer network elements of the relocated resource, tunnel endpoint change procedure towards counterpart network elements is performed, and the existing session is removed from the original resource and processing is continued in the relocated resource.Type: ApplicationFiled: October 1, 2014Publication date: August 31, 2017Applicant: NOKIA SOLUTIONS AND NETWORKS OYInventors: Jani Olavi SODERLUND, Tommy Johannes LINDGREN, Sumanta SAHA, Niko Markus SAVOLAINEN, Klaus HOFFMANN
-
Publication number: 20160344640Abstract: A method is disclosed for downscaling a deep packet inspection service in a network apparatus. The method comprises receiving data flow in a gateway virtual machine via a software defined networking switch, and keeping track of data flow and control flow and their state per subscriber. If needed, a new deep packet inspection virtual machine is selected for the data flow. The software defined networking switch is informed on the selection of the new deep packet inspection virtual machine. The new deep packet inspection virtual machine is instructed to re-create a flow identification for the data flow to ensure deep packet inspection service continuity.Type: ApplicationFiled: February 4, 2014Publication date: November 24, 2016Inventors: Jani Olavi SÖDERLUND, Erkki Juhani HIETALA, Sumanta SAHA, Niko Markus SAVOLAINEN, Tommy Johannes LINDGREN