Patents by Inventor Sumanta SAHA

Sumanta SAHA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11483254
    Abstract: There is provided allocating cloud computing resources to process a user session by a gateway in a mobile communications network, and allocating the cloud computing resources in pairs to user sessions. Rules for the pair of allocated resources are determined such that incoming control plane traffic associated with the session is forwarded to the both cloud computing resources forming the pair.
    Type: Grant
    Filed: January 9, 2014
    Date of Patent: October 25, 2022
    Assignee: NOKIA SOLUTIONS AND NETWORKS OY
    Inventors: Sumanta Saha, Tommy Johannes Lindgren, Jani Olavi Soderlund, Niko Markus Savolainen
  • Patent number: 11303374
    Abstract: A network of computing devices includes a timing reference, a free-run node, and an aggregator. The reference calculates a first communication packet having a reference timestamp and reference data, and transmits the first packet to the free-run node. The free-run node receives the first packet from the timing reference, calculates a second packet having metadata that includes the reference timestamp, a sparse hash value calculated from the reference data, and a free-run node timestamp, and publishes the second packet to the aggregator. The aggregator receives the second packet and calculates a compensation value from the reference timestamp, the sparse hash value, and the free-run node timestamp. Computer-implemented methods include the free-run node receiving the compensation value and updating its local dock based on the compensation value. Other methods include the aggregator determining an optimal packet path through a network of computing devices based on the metadata.
    Type: Grant
    Filed: March 16, 2020
    Date of Patent: April 12, 2022
    Assignee: LUMINOUS CYBER CORPORATION
    Inventors: Charles F. Barry, Nick J. Possley, Brendan P. Keller, Sumanta Saha
  • Publication number: 20210399959
    Abstract: Methods, systems, and apparatus for network monitoring and analytics are disclosed. The methods, systems, and apparatus for network monitoring and analytics perform highly probable identification of related messages using one or more sparse hash function sets. Highly probable identification of related messages enables a network monitoring and analytics system to trace the trajectory of a message traversing the network and measure the delay for the message between observation points. The sparse hash function value, or identity, enables a network monitoring and analytics system to identify the transit path, transit time, entry point, exit point, and/or other information about individual packets and to identify bottlenecks, broken paths, lost data, and other network analytics by aggregating individual message data.
    Type: Application
    Filed: September 3, 2021
    Publication date: December 23, 2021
    Inventors: Charles F. BARRY, Sumanta Saha
  • Patent number: 11115297
    Abstract: Methods, systems, and apparatus for network monitoring and analytics are disclosed. The methods, systems, and apparatus for network monitoring and analytics perform highly probable identification of related messages using one or more sparse hash function sets. Highly probable identification of related messages enables a network monitoring and analytics system to trace the trajectory of a message traversing the network and measure the delay for the message between observation points. The sparse hash function value, or identity, enables a network monitoring and analytics system to identify the transit path, transit time, entry point, exit point, and/or other information about individual packets and to identify bottlenecks, broken paths, lost data, and other network analytics by aggregating individual message data.
    Type: Grant
    Filed: April 5, 2019
    Date of Patent: September 7, 2021
    Assignee: LUMINOUS CYBER CORP.
    Inventors: Charles F. Barry, Sumanta Saha
  • Patent number: 11087078
    Abstract: There are many administrative processes which require a user to enter handwritten data on ordinary paper forms. This data is then further processed and converted in the digitized form. In the existing methods, the turnaround time for whole process is high, lacks accuracy of the digitized data, and cost is also on the higher side. A system and method for real time digitization of hand written input data has been provided. The system comprises an input device that utilizes a pen and paper input form which is filled by a user in his hand writing. The completed form data is then transferred to a form inspector application that runs on the aggregation device. It allows for applications to be verified for completeness and send the same for real-time digitization using a form processor application. A recognition engine is then used for the digitization of the hand written input data.
    Type: Grant
    Filed: August 23, 2019
    Date of Patent: August 10, 2021
    Assignee: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Deepak Swamy, Prashant Mohanan, Piyush Agarwalla, Aniket Roy, Sumanta Saha, Santosh Kumar Mohan, Olivia Roy, Ipsita Banerjee
  • Patent number: 10904158
    Abstract: A method including obtaining a plurality of data sets each describing a specific virtualized network function, acquiring and processing control information related to at least one of a communication traffic situation in a communication network for which at least one virtualized network function is implementable and a resource usage situation in a virtualization infrastructure in which at least one virtualized network function can be instantiated, and adjusting an amount and type of at least one virtualized network function instantiated in the virtualization infrastructure for usage in the communication network by, based on the processed control information, selecting at least one virtualized network function from the obtained data sets, instantiating the selected at least one virtualized network function.
    Type: Grant
    Filed: June 2, 2015
    Date of Patent: January 26, 2021
    Assignee: NOKIA SOLUTIONS AND NETWORKS OY
    Inventors: Sumanta Saha, Wolfgang Hahn
  • Patent number: 10805826
    Abstract: Methods of providing quality of service support for tactile traffic are disclosed. In one embodiment, an electronic device notifies a controller that an application has been authorized to transmit tactile traffic in the communication network. The controller, responsive to the notification, causes the backhaul node to install a flow table entry in a flow table of the backhaul node, through which packets of the application is to be forwarded within a latency defined for the tactile traffic by the backhaul node. The electronic device authenticates a packet being sourced from or destined to the application that has been authorized to transmit the tactile traffic in the communication network, and forwards the packet within the latency defined for the tactile traffic.
    Type: Grant
    Filed: April 4, 2016
    Date of Patent: October 13, 2020
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Sumanta Saha, Kazi Wali Ullah
  • Publication number: 20200220637
    Abstract: A network of computing devices includes a timing reference, a free-run node, and an aggregator. The reference calculates a first communication packet having a reference timestamp and reference data, and transmits the first packet to the free-run node. The free-run node receives the first packet from the timing reference, calculates a second packet having metadata that includes the reference timestamp, a sparse hash value calculated from the reference data, and a free-run node timestamp, and publishes the second packet to the aggregator. The aggregator receives the second packet and calculates a compensation value from the reference timestamp, the sparse hash value, and the free-run node timestamp. Computer-implemented methods include the free-run node receiving the compensation value and updating its local dock based on the compensation value. Other methods include the aggregator determining an optimal packet path through a network of computing devices based on the metadata.
    Type: Application
    Filed: March 16, 2020
    Publication date: July 9, 2020
    Inventors: Charles F. BARRY, Nick J. POSSLEY, Brendan P. KELLER, Sumanta SAHA
  • Publication number: 20200205025
    Abstract: Methods of providing quality of service support for tactile traffic are disclosed. In one embodiment, an electronic device notifies a controller that an application has been authorized to transmit tactile traffic in the communication network. The controller, responsive to the notification, causes the backhaul node to install a flow table entry in a flow table of the backhaul node, through which packets of the application is to be forwarded within a latency defined for the tactile traffic by the backhaul node. The electronic device authenticates a packet being sourced from or destined to the application that has been authorized to transmit the tactile traffic in the communication network, and forwards the packet within the latency defined for the tactile traffic.
    Type: Application
    Filed: April 4, 2016
    Publication date: June 25, 2020
    Inventors: Sumanta SAHA, Kazi Wali ULLAH
  • Patent number: 10637597
    Abstract: A network of computing devices includes a timing reference, a free-run node, and an aggregator. The reference calculates a first communication packet having a reference timestamp and reference data, and transmits the first packet to the free-run node. The free-run node receives the first packet from the timing reference, calculates a second packet having metadata that includes the reference timestamp, a sparse hash value calculated from the reference data, and a free-run node timestamp, and publishes the second packet to the aggregator. The aggregator receives the second packet and calculates a compensation value from the reference timestamp, the sparse hash value, and the free-run node timestamp. Computer-implemented methods include the free-run node receiving the compensation value and updating its local clock based on the compensation value. Other methods include the aggregator determining an optimal packet path through a network of computing devices based on the metadata.
    Type: Grant
    Filed: April 5, 2018
    Date of Patent: April 28, 2020
    Assignee: LUMINOUS CYBER CORPORATION
    Inventors: Charles F. Barry, Nick J. Possley, Brendan P. Keller, Sumanta Saha
  • Publication number: 20200065362
    Abstract: There are many administrative processes which require a user to enter handwritten data on ordinary paper forms. This data is then further processed and converted in the digitized form. In the existing methods, the turnaround time for whole process is high, lacks accuracy of the digitized data, and cost is also on the higher side. A system and method for real time digitization of hand written input data has been provided. The system comprises an input device that utilizes a pen and paper input form which is filled by a user in his hand writing. The completed form data is then transferred to a form inspector application that runs on the aggregation device. It allows for applications to be verified for completeness and send the same for real-time digitization using a form processor application. A recognition engine is then used for the digitization of the hand written input data.
    Type: Application
    Filed: August 23, 2019
    Publication date: February 27, 2020
    Applicant: Tata Consultancy Services Limited
    Inventors: Deepak SWAMY, Prashant MOHANAN, Piyush AGARWALLA, Aniket ROY, Sumanta SAHA, Santosh Kumar MOHAN, Olivia ROY, Ipsita BANERJEE
  • Patent number: 10382295
    Abstract: Methods, systems, and apparatus for network monitoring and analytics are disclosed. The methods, systems, and apparatus for network monitoring and analytics perform highly probable identification of related messages using one or more sparse hash function sets. Highly probable identification of related messages enables a network monitoring and analytics system to trace the trajectory of a message traversing the network and measure the delay for the message between observation points. The sparse hash function value, or identity, enables a network monitoring and analytics system to identify the transit path, transit time, entry point, exit point, and/or other information about individual packets and to identify bottlenecks, broken paths, lost data, and other network analytics by aggregating individual message data.
    Type: Grant
    Filed: March 17, 2016
    Date of Patent: August 13, 2019
    Assignee: LUMINOUS CYBER CORPORATION
    Inventors: Charles F. Barry, Sumanta Saha
  • Publication number: 20190238430
    Abstract: Methods, systems, and apparatus for network monitoring and analytics are disclosed. The methods, systems, and apparatus for network monitoring and analytics perform highly probable identification of related messages using one or more sparse hash function sets. Highly probable identification of related messages enables a network monitoring and analytics system to trace the trajectory of a message traversing the network and measure the delay for the message between observation points. The sparse hash function value, or identity, enables a network monitoring and analytics system to identify the transit path, transit time, entry point, exit point, and/or other information about individual packets and to identify bottlenecks, broken paths, lost data, and other network analytics by aggregating individual message data.
    Type: Application
    Filed: April 5, 2019
    Publication date: August 1, 2019
    Inventors: Charles F. BARRY, Sumanta Saha
  • Patent number: 10243863
    Abstract: A method is disclosed for downscaling a deep packet inspection service in a network apparatus. The method comprises receiving data flow in a gateway virtual machine via a software defined networking switch, and keeping track of data flow and control flow and their state per subscriber. If needed, a new deep packet inspection virtual machine is selected for the data flow. The software defined networking switch is informed on the selection of the new deep packet inspection virtual machine. The new deep packet inspection virtual machine is instructed to re-create a flow identification for the data flow to ensure deep packet inspection service continuity.
    Type: Grant
    Filed: February 4, 2014
    Date of Patent: March 26, 2019
    Assignee: NOKIA SOLUTIONS AND NETWORKS OY
    Inventors: Jani Olavi Söderlund, Erkki Juhani Hietala, Sumanta Saha, Niko Markus Savolainen, Tommy Johannes Lindgren
  • Publication number: 20190081720
    Abstract: A network of computing devices includes a timing reference, a free-run node, and an aggregator. The reference calculates a first communication packet having a reference timestamp and reference data, and transmits the first packet to the free-run node. The free-run node receives the first packet from the timing reference, calculates a second packet having metadata that includes the reference timestamp, a sparse hash value calculated from the reference data, and a free-run node timestamp, and publishes the second packet to the aggregator. The aggregator receives the second packet and calculates a compensation value from the reference timestamp, the sparse hash value, and the free-run node timestamp. Computer-implemented methods include the free-run node receiving the compensation value and updating its local clock based on the compensation value. Other methods include the aggregator determining an optimal packet path through a network of computing devices based on the metadata.
    Type: Application
    Filed: April 5, 2018
    Publication date: March 14, 2019
    Inventors: Charles F. Barry, Nick J. Possley, Brendan P. Keller, Sumanta Saha
  • Patent number: 10057177
    Abstract: A method is disclosed for service offloading in a communications system, the method comprising determining, in a network apparatus, whether a traffic flow has been properly classified by a deep packet inspection virtual machine. If the traffic flow has been properly classified by the deep packet inspection virtual machine, the method comprises instructing a software defined networking controller to stop sending further packets of said traffic flow to the deep packet inspection virtual machine.
    Type: Grant
    Filed: February 5, 2014
    Date of Patent: August 21, 2018
    Assignee: NOKIA SOLUTIONS AND NETWORKS OY
    Inventors: Sumanta Saha, Erkki Juhani Hietala, Jani Olavi Söderlund, Niko Markus Savolainen, Tommy Johannes Lindgren
  • Publication number: 20180176264
    Abstract: Apparatus and method for lawful interception in accordance with an example embodiment of the present invention, a method is provided for receiving from a gateway apparatus an intercept request regarding user equipment in the communication system; creating or modifying a processing rule regarding the user equipment by including interception in the rule; transmitting to a network switch processing user equipment connections a command to clone and encrypt each signalling or data packet of the user equipment connection and to transmit the encrypted signalling and data packets to a given network apparatus.
    Type: Application
    Filed: February 9, 2018
    Publication date: June 21, 2018
    Inventors: Tommy Johannes LINDGREN, Sumanta SAHA, Jani Olavi SODERLUND, Niko Markus SAVOLAINEN
  • Publication number: 20180167418
    Abstract: Apparatus and method for lawful interception in accordance with an example embodiment of the present invention, a method is provided for receiving from a gateway apparatus an intercept request regarding user equipment in the communication system; creating or modifying a processing rule regarding the user equipment by including interception in the rule; transmitting to a network switch processing user equipment connections a command to clone and encrypt each signalling or data packet of the user equipment connection and to transmit the encrypted signalling and data packets to a given network apparatus.
    Type: Application
    Filed: February 9, 2018
    Publication date: June 14, 2018
    Inventors: Tommy Johannes LINDGREN, Sumanta SAHA, Jani Olavi SODERLUND, Niko Markus SAVOLAINEN
  • Publication number: 20170251514
    Abstract: The present invention addresses method, apparatus and computer program product for enabling session transfer by Tunnel Endpoint Identifier renumbering in GPRS Tunneling Protocol peer. A new Tunnel Endpoint Identifier value is allocated for the existing session, information about relocating the existing session including the new Tunnel Endpoint Identifier value for the existing session is communicated to the peer network elements of the relocated resource, tunnel endpoint change procedure towards counterpart network elements is performed, and the existing session is removed from the original resource and processing is continued in the relocated resource.
    Type: Application
    Filed: October 1, 2014
    Publication date: August 31, 2017
    Applicant: NOKIA SOLUTIONS AND NETWORKS OY
    Inventors: Jani Olavi SODERLUND, Tommy Johannes LINDGREN, Sumanta SAHA, Niko Markus SAVOLAINEN, Klaus HOFFMANN
  • Publication number: 20160344637
    Abstract: A method is disclosed for service offloading in a communications system, the method comprising determining, in a network apparatus, whether a traffic flow has been properly classified by a deep packet inspection virtual machine. If the traffic flow has been properly classified by the deep packet inspection virtual machine, the method comprises instructing a software defined networking controller to stop sending further packets of said traffic flow to the deep packet inspection virtual machine.
    Type: Application
    Filed: February 5, 2014
    Publication date: November 24, 2016
    Inventors: Sumanta SAHA, Erkki Juhani HIETALA, Jani Olavi SÖDERLUND, Niko Markus SAVOLAINEN, Tommy Johannes LINDGREN