Patents by Inventor Venkata R. Vallabhu

Venkata R. Vallabhu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240356739
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.
    Type: Application
    Filed: June 28, 2024
    Publication date: October 24, 2024
    Inventors: Mats Agerstam, Venkata R. Vallabhu
  • Patent number: 12028445
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.
    Type: Grant
    Filed: June 3, 2022
    Date of Patent: July 2, 2024
    Assignee: Intel Corporation
    Inventors: Mats Agerstam, Venkata R. Vallabhu
  • Publication number: 20220303128
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.
    Type: Application
    Filed: June 3, 2022
    Publication date: September 22, 2022
    Inventors: Mats Agerstam, Venkata R. Vallabhu
  • Patent number: 11387989
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.
    Type: Grant
    Filed: February 24, 2020
    Date of Patent: July 12, 2022
    Assignee: Intel Corporation
    Inventors: Mats Gustav Agerstam, Venkata R. Vallabhu
  • Patent number: 10924990
    Abstract: This disclosure describes methods, apparatuses, and devices related to optimizing connectivity between devices. A device is disclosed that may determine first information received from a client device, wherein the first information comprises at least one of an authentication request, an association request, or pre-association discovery request, and wherein the first information includes an indication of a first device type. The device may further determine a first virtual access point from a group of virtual access points associated with the wireless device based at least in part on the first device type, wherein the first virtual access point has first wireless resources. The device may further associate the client device with the first virtual access point. The device may further cause to send to the client device data based at least in part on the first wireless resources.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: February 16, 2021
    Assignee: Intel IP Corporation
    Inventors: Izoslav Tchigevsky, Venkata R. Vallabhu, Bahareh Sadeghi
  • Publication number: 20200287713
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.
    Type: Application
    Filed: February 24, 2020
    Publication date: September 10, 2020
    Inventors: Mats Gustav Agerstam, Venkata R. Vallabhu
  • Patent number: 10715989
    Abstract: Systems and methods are described herein for connecting related applications over a peer-to-peer network wireless connection using layer 2 communications protocols to initiate the connection between the applications. The layer 2 communications protocols include discovery frames that may be used to discover various types of systems available on a wireless network. The discover frames also include application names or identifiers that may be used to discover which applications are available for connecting with other systems over the wireless network.
    Type: Grant
    Filed: April 26, 2012
    Date of Patent: July 14, 2020
    Assignee: INTEL CORPORATION
    Inventors: Venkata R. Vallabhu, Rita Lee, Marc Meylemans
  • Patent number: 10574445
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.
    Type: Grant
    Filed: December 21, 2016
    Date of Patent: February 25, 2020
    Assignee: Intel IP Corporation
    Inventors: Mats Gustav Agerstam, Venkata R. Vallabhu
  • Patent number: 10098041
    Abstract: An apparatus for the handover of a transmission of a data application. The apparatus includes a computer device, and the computer device includes a wireless receiver and a wireless transmitter. The data application is transmitted over a first wireless network. The computer device includes a handover (SH) proxy. The VoIP handover proxy is to maintain the transmission of the data application while the transmission and state of the data application switches from being transmitted over the first wireless network to being transmitted over a second wireless network. During the switch between wireless networks, the data application is unaware of the switch, and seamless mobility is achieved by using the VoIP handover proxy.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: October 9, 2018
    Assignee: Intel Corporation
    Inventors: Venkata R. Vallabhu, Suresh Srinivasan
  • Publication number: 20180288695
    Abstract: This disclosure describes methods, apparatuses, and devices related to optimizing connectivity between devices. A device is disclosed that may determine first information received from a client device, wherein the first information comprises at least one of an authentication request, an association request, or pre-association discovery request, and wherein the first information includes an indication of a first device type. The device may further determine a first virtual access point from a group of virtual access points associated with the wireless device based at least in part on the first device type, wherein the first virtual access point has first wireless resources. The device may further associate the client device with the first virtual access point. The device may further cause to send to the client device data based at least in part on the first wireless resources.
    Type: Application
    Filed: March 31, 2017
    Publication date: October 4, 2018
    Inventors: Izoslav Tchigevsky, Venkata R. Vallabhu, Bahareh Sadeghi
  • Publication number: 20180176009
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.
    Type: Application
    Filed: December 21, 2016
    Publication date: June 21, 2018
    Inventors: Mats Agerstam, Venkata R. Vallabhu
  • Publication number: 20180092029
    Abstract: This disclosure describes systems, methods, and apparatus related to an extended neighbor list and optimized AP and wireless networks discovery. A device may cause to perform a scan across one or more frequency bands. The device may determine one or more access devices based at least in part on the scan. The device may generate an extended neighbor list (ENL) associated with the one or more access devices. The device may cause to send the ENL to one or more first devices.
    Type: Application
    Filed: September 28, 2016
    Publication date: March 29, 2018
    Inventors: NECATI CANPOLAT, VIVEK GUPTA, VENKATA R. VALLABHU
  • Patent number: 9510378
    Abstract: Systems and methods are presented for connecting related applications over a peer-to-peer wireless connection using a wireless interface module that minimizes the requirements for an application to initiate a wireless connection with another device. In some embodiments, a wireless interface module may be incorporated into mobile devices to provide a simplified instruction set requirement for an application to initiate a wireless connection.
    Type: Grant
    Filed: April 25, 2012
    Date of Patent: November 29, 2016
    Assignee: INTEL CORPORATION
    Inventors: Venkata R. Vallabhu, Rita Lee
  • Publication number: 20160183313
    Abstract: Techniques for presenting S2a connection mode options in a WLAN environment are provided. Specifically, methods are presented, that when taken alone or together, provide a device or group of devices with an efficient way of selecting the appropriate connectivity mode for use with an S2a interface. The present disclosure includes a method that provides a wireless device with network connectivity options that enable a more effective means for obtaining Trusted WLAN attachment.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Inventors: Venkata R. VALLABHU, Vivek GUPTA, Necati CANPOLAT
  • Publication number: 20160183144
    Abstract: An apparatus for the handover of a transmission of a data application. The apparatus includes a computer device, and the computer device includes a wireless receiver and a wireless transmitter. The data application is transmitted over a first wireless network. The computer device includes a handover (SH) proxy. The VoIP handover proxy is to maintain the transmission of the data application while the transmission and state of the data application switches from being transmitted over the first wireless network to being transmitted over a second wireless network. During the switch between wireless networks, the data application is unaware of the switch, and seamless mobility is achieved by using the VoIP handover proxy.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Applicant: INTEL CORPORATION
    Inventors: Venkata R. Vallabhu, Suresh Srinivasan
  • Publication number: 20150181486
    Abstract: Examples are disclosed for switching between wireless networks. In some examples a method for switching between wireless network may comprise creating a virtual wireless adapter, maintaining a first wireless connection with a first wireless network, initiating a second wireless connection with a second wireless network using the virtual wireless adapter, disconnecting the first wireless connection with the first wireless network, and establishing the second wireless connection with the second wireless network. Other examples are described and claimed.
    Type: Application
    Filed: September 27, 2013
    Publication date: June 25, 2015
    Inventors: Venkata R Vallabhu, Necati Canpolat
  • Publication number: 20140233546
    Abstract: Systems and methods are presented for connecting related applications over a peer-to-peer wireless connection using a wireless interface module that minimizes the requirements for an application to initiate a wireless connection with another device.
    Type: Application
    Filed: April 25, 2012
    Publication date: August 21, 2014
    Inventors: Venkata R. Vallabhu, Rita Lee
  • Publication number: 20140233547
    Abstract: Systems and methods are described herein for connecting related applications over a peer-to-peer network wireless connection using layer 2 communications protocols to initiate the connection between the applications. The layer 2 communications protocols include discovery frames that may be used to discover various types of systems available on a wireless network. The discover frames also include application names or identifiers that may be used to discover which applications are available for connecting with other systems over the wireless network.
    Type: Application
    Filed: April 26, 2012
    Publication date: August 21, 2014
    Inventors: Venkata R. Vallabhu, Rita Lee, Marc Meylemans