Patents by Inventor Venkata R. Vallabhu
Venkata R. Vallabhu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240356739Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.Type: ApplicationFiled: June 28, 2024Publication date: October 24, 2024Inventors: Mats Agerstam, Venkata R. Vallabhu
-
Patent number: 12028445Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.Type: GrantFiled: June 3, 2022Date of Patent: July 2, 2024Assignee: Intel CorporationInventors: Mats Agerstam, Venkata R. Vallabhu
-
Publication number: 20220303128Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.Type: ApplicationFiled: June 3, 2022Publication date: September 22, 2022Inventors: Mats Agerstam, Venkata R. Vallabhu
-
Patent number: 11387989Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.Type: GrantFiled: February 24, 2020Date of Patent: July 12, 2022Assignee: Intel CorporationInventors: Mats Gustav Agerstam, Venkata R. Vallabhu
-
Patent number: 10924990Abstract: This disclosure describes methods, apparatuses, and devices related to optimizing connectivity between devices. A device is disclosed that may determine first information received from a client device, wherein the first information comprises at least one of an authentication request, an association request, or pre-association discovery request, and wherein the first information includes an indication of a first device type. The device may further determine a first virtual access point from a group of virtual access points associated with the wireless device based at least in part on the first device type, wherein the first virtual access point has first wireless resources. The device may further associate the client device with the first virtual access point. The device may further cause to send to the client device data based at least in part on the first wireless resources.Type: GrantFiled: March 31, 2017Date of Patent: February 16, 2021Assignee: Intel IP CorporationInventors: Izoslav Tchigevsky, Venkata R. Vallabhu, Bahareh Sadeghi
-
Publication number: 20200287713Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.Type: ApplicationFiled: February 24, 2020Publication date: September 10, 2020Inventors: Mats Gustav Agerstam, Venkata R. Vallabhu
-
Patent number: 10715989Abstract: Systems and methods are described herein for connecting related applications over a peer-to-peer network wireless connection using layer 2 communications protocols to initiate the connection between the applications. The layer 2 communications protocols include discovery frames that may be used to discover various types of systems available on a wireless network. The discover frames also include application names or identifiers that may be used to discover which applications are available for connecting with other systems over the wireless network.Type: GrantFiled: April 26, 2012Date of Patent: July 14, 2020Assignee: INTEL CORPORATIONInventors: Venkata R. Vallabhu, Rita Lee, Marc Meylemans
-
Patent number: 10574445Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.Type: GrantFiled: December 21, 2016Date of Patent: February 25, 2020Assignee: Intel IP CorporationInventors: Mats Gustav Agerstam, Venkata R. Vallabhu
-
Patent number: 10098041Abstract: An apparatus for the handover of a transmission of a data application. The apparatus includes a computer device, and the computer device includes a wireless receiver and a wireless transmitter. The data application is transmitted over a first wireless network. The computer device includes a handover (SH) proxy. The VoIP handover proxy is to maintain the transmission of the data application while the transmission and state of the data application switches from being transmitted over the first wireless network to being transmitted over a second wireless network. During the switch between wireless networks, the data application is unaware of the switch, and seamless mobility is achieved by using the VoIP handover proxy.Type: GrantFiled: December 23, 2014Date of Patent: October 9, 2018Assignee: Intel CorporationInventors: Venkata R. Vallabhu, Suresh Srinivasan
-
Publication number: 20180288695Abstract: This disclosure describes methods, apparatuses, and devices related to optimizing connectivity between devices. A device is disclosed that may determine first information received from a client device, wherein the first information comprises at least one of an authentication request, an association request, or pre-association discovery request, and wherein the first information includes an indication of a first device type. The device may further determine a first virtual access point from a group of virtual access points associated with the wireless device based at least in part on the first device type, wherein the first virtual access point has first wireless resources. The device may further associate the client device with the first virtual access point. The device may further cause to send to the client device data based at least in part on the first wireless resources.Type: ApplicationFiled: March 31, 2017Publication date: October 4, 2018Inventors: Izoslav Tchigevsky, Venkata R. Vallabhu, Bahareh Sadeghi
-
Publication number: 20180176009Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.Type: ApplicationFiled: December 21, 2016Publication date: June 21, 2018Inventors: Mats Agerstam, Venkata R. Vallabhu
-
Publication number: 20180092029Abstract: This disclosure describes systems, methods, and apparatus related to an extended neighbor list and optimized AP and wireless networks discovery. A device may cause to perform a scan across one or more frequency bands. The device may determine one or more access devices based at least in part on the scan. The device may generate an extended neighbor list (ENL) associated with the one or more access devices. The device may cause to send the ENL to one or more first devices.Type: ApplicationFiled: September 28, 2016Publication date: March 29, 2018Inventors: NECATI CANPOLAT, VIVEK GUPTA, VENKATA R. VALLABHU
-
Patent number: 9510378Abstract: Systems and methods are presented for connecting related applications over a peer-to-peer wireless connection using a wireless interface module that minimizes the requirements for an application to initiate a wireless connection with another device. In some embodiments, a wireless interface module may be incorporated into mobile devices to provide a simplified instruction set requirement for an application to initiate a wireless connection.Type: GrantFiled: April 25, 2012Date of Patent: November 29, 2016Assignee: INTEL CORPORATIONInventors: Venkata R. Vallabhu, Rita Lee
-
Publication number: 20160183313Abstract: Techniques for presenting S2a connection mode options in a WLAN environment are provided. Specifically, methods are presented, that when taken alone or together, provide a device or group of devices with an efficient way of selecting the appropriate connectivity mode for use with an S2a interface. The present disclosure includes a method that provides a wireless device with network connectivity options that enable a more effective means for obtaining Trusted WLAN attachment.Type: ApplicationFiled: December 23, 2014Publication date: June 23, 2016Inventors: Venkata R. VALLABHU, Vivek GUPTA, Necati CANPOLAT
-
Publication number: 20160183144Abstract: An apparatus for the handover of a transmission of a data application. The apparatus includes a computer device, and the computer device includes a wireless receiver and a wireless transmitter. The data application is transmitted over a first wireless network. The computer device includes a handover (SH) proxy. The VoIP handover proxy is to maintain the transmission of the data application while the transmission and state of the data application switches from being transmitted over the first wireless network to being transmitted over a second wireless network. During the switch between wireless networks, the data application is unaware of the switch, and seamless mobility is achieved by using the VoIP handover proxy.Type: ApplicationFiled: December 23, 2014Publication date: June 23, 2016Applicant: INTEL CORPORATIONInventors: Venkata R. Vallabhu, Suresh Srinivasan
-
Publication number: 20150181486Abstract: Examples are disclosed for switching between wireless networks. In some examples a method for switching between wireless network may comprise creating a virtual wireless adapter, maintaining a first wireless connection with a first wireless network, initiating a second wireless connection with a second wireless network using the virtual wireless adapter, disconnecting the first wireless connection with the first wireless network, and establishing the second wireless connection with the second wireless network. Other examples are described and claimed.Type: ApplicationFiled: September 27, 2013Publication date: June 25, 2015Inventors: Venkata R Vallabhu, Necati Canpolat
-
Publication number: 20140233546Abstract: Systems and methods are presented for connecting related applications over a peer-to-peer wireless connection using a wireless interface module that minimizes the requirements for an application to initiate a wireless connection with another device.Type: ApplicationFiled: April 25, 2012Publication date: August 21, 2014Inventors: Venkata R. Vallabhu, Rita Lee
-
Publication number: 20140233547Abstract: Systems and methods are described herein for connecting related applications over a peer-to-peer network wireless connection using layer 2 communications protocols to initiate the connection between the applications. The layer 2 communications protocols include discovery frames that may be used to discover various types of systems available on a wireless network. The discover frames also include application names or identifiers that may be used to discover which applications are available for connecting with other systems over the wireless network.Type: ApplicationFiled: April 26, 2012Publication date: August 21, 2014Inventors: Venkata R. Vallabhu, Rita Lee, Marc Meylemans