Patents by Inventor Venkata Subramanian Jayaraman

Venkata Subramanian Jayaraman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170093684
    Abstract: A system and method for improving integration testing in a cloud computing environment includes collecting one or more input parameters associated with each of one or more products, deployed in cloud computing environment, from one or more external resources and test management systems. The input parameters include one or more defect parameters, user requirements, test parameters or performance parameters associated with the product. The integration testing improvement system determines one or more failure issues associated with the product and analyzes the behavior of the product over a predetermined time period to identify a failure pattern associated with the product. Each of the determined failure issues is mapped with the identified failure pattern to detect one or more critical scenarios in each of the products. Later the critical scenarios are automated by executing associated test scripts thereby improving the integration testing in the cloud computing environment.
    Type: Application
    Filed: November 17, 2015
    Publication date: March 30, 2017
    Inventors: Venkata Subramanian Jayaraman, Sumithra Sundaresan
  • Publication number: 20170093614
    Abstract: A session continuity server controller, the controller comprising: a memory; and a processor coupled to the memory storing processor executable instructions which when executed by the processor causes the processor to perform operations comprising: determining one or more defects in lawful interception content transmission associated with a user session, wherein the one or more defects comprise one or more degraded network conditions and degraded LI content; executing one or more corrective measures based on the one or more defects in lawful interception content transmission; and determining stability of the lawful interception content transmission post one or more corrective measures for effective and reliable lawful interception content transmission.
    Type: Application
    Filed: November 16, 2015
    Publication date: March 30, 2017
    Inventors: Swaminathan Seetharaman, Venkata Subramanian Jayaraman
  • Publication number: 20170093927
    Abstract: This technology relates generally to lawful interception and more particularly to methods and systems for lawful interception. In one embodiment, a method for lawful interception in a communication network is disclosed. The method includes detecting in real-time, via at least one network device, adulteration in communication data based on comparison of a set of adulteration parameters derived from the communication data with associated thresholds within a set of thresholds. The method further includes analyzing, via the at least one network device, adulterated content in the communication data to determine feasibility of correcting the adulterated content based on satisfaction of predefined criteria. Moreover, the method includes correcting, selectively, the adulterated content based on satisfaction of the predefined criteria.
    Type: Application
    Filed: November 17, 2015
    Publication date: March 30, 2017
    Inventors: Swaminathan Seetharaman, Venkata Subramanian Jayaraman
  • Publication number: 20170068614
    Abstract: This disclosure relates generally to software testing, and more particularly to a system and method for optimizing testing of software production incidents. In one embodiment, the method comprises analyzing an incident ticket using a machine learning algorithm to identify one or more keywords in the incident ticket, and identifying a location of the incident ticket based on the one or more keywords, a test workspace corresponding to the incident ticket based on the location, and a plurality of specific test cases corresponding to the incident ticket based on the test workspace. The identification leads to a first scenario and a second scenario. In the first scenario, the method further comprises initiating a learning process based on intelligence gathered from a manual processing of the incident ticket. In the second scenario, the method further comprises executing the plurality of specific test cases in a test environment.
    Type: Application
    Filed: November 2, 2015
    Publication date: March 9, 2017
    Inventors: Venkata Subramanian JAYARAMAN, Rajiv Kumar AGRAWAL, Ganesh NARAYAN, Bharath Kumar HEMACHANDRAN
  • Publication number: 20170064664
    Abstract: The present disclosure relates to a method for concealing location information of a user. The method comprises receiving current location information of a mobile terminal associated with the user from a network server upon initiation of a call by telecom equipment with the mobile terminal. The mobile terminal is registered with the network server. The method further comprises retrieving privacy settings of the mobile terminal predefined in respect to the telecom equipment when the current location information of the mobile terminal is different from location information associated with the network server. The method further comprises routing the call to the network server for announcing pre-stored information in a predefined language to the telecom equipment based on the retrieved privacy settings for concealing the current location information of the user.
    Type: Application
    Filed: October 20, 2015
    Publication date: March 2, 2017
    Inventor: Venkata Subramanian JAYARAMAN
  • Patent number: 9582408
    Abstract: This disclosure relates generally to software testing, and more particularly to a system and method for optimizing testing of software production incidents. In one embodiment, the method comprises analyzing an incident ticket using a machine learning algorithm to identify one or more keywords in the incident ticket, and identifying a location of the incident ticket based on the one or more keywords, a test workspace corresponding to the incident ticket based on the location, and a plurality of specific test cases corresponding to the incident ticket based on the test workspace. The identification leads to a first scenario and a second scenario. In the first scenario, the method further comprises initiating a learning process based on intelligence gathered from a manual processing of the incident ticket. In the second scenario, the method further comprises executing the plurality of specific test cases in a test environment.
    Type: Grant
    Filed: November 2, 2015
    Date of Patent: February 28, 2017
    Assignee: WIPRO LIMITED
    Inventors: Venkata Subramanian Jayaraman, Rajiv Kumar Agrawal, Ganesh Narayan, Bharath Kumar Hemachandran
  • Publication number: 20170031658
    Abstract: The present disclosure relates to a method for enhancing quality of requirements for an application development. The method comprises retrieving expertise information of each user of groups involved in identifying requirements, domain knowledge of each user, information on number of defects associated with requirements and information of requirements for application development from sources. Then, skill score of the groups is computed using expertise information and domain knowledge of each user of corresponding groups. Solidity score of each of requirements is determined using information of requirements and predetermined threshold solidity score. Weightage score of each of requirements is computed based on information of requirements and information on number of defects. The, using skill score of groups, solidity score of each of requirements and weightage score, strength score of each of requirements is computed for enhancing quality of requirements.
    Type: Application
    Filed: November 9, 2015
    Publication date: February 2, 2017
    Inventors: Venkata Subramanian Jayaraman, Sumithra Sundaresan
  • Publication number: 20160373986
    Abstract: A lawful interception system to perform operations comprising determining an appropriate session continuity server, a content duplication element associated with a source communication network and one or more communication network properties associated with the source communication network; initiating, duplication of one or more first data packets associated with the ongoing voice and data session by the content duplication element; detecting a handover of the ongoing voice and data session from the source communication network to a destination communication network; determining the content duplication element associated with the destination communication network and one or more communication network properties associated with the destination communication network; and initiating, duplication of one or more second data packets associated with the ongoing voice and data session by the content duplication element.
    Type: Application
    Filed: August 14, 2015
    Publication date: December 22, 2016
    Inventors: SWAMINATHAN SEETHARAMAN, VENKATA SUBRAMANIAN JAYARAMAN
  • Publication number: 20160314417
    Abstract: This disclosure relates generally to software release management, and more particularly to a system and method for optimizing risk during a software release. In one embodiment, a method is provided for determining a risk associated with a release of a software product. The method comprises gathering a plurality of parameters related to the software product, determining a plurality of complexity levels based on the plurality of parameters, determining a stability of the software product based on a stability of a baseline software product, determining an overall complexity level of the release of the software product based on the plurality of complexity levels and the stability of the software product, and determining the risk associated with the release of the software product based on the overall complexity level.
    Type: Application
    Filed: June 18, 2015
    Publication date: October 27, 2016
    Inventors: Venkata Subramanian Jayaraman, Sumithra Sundaresan
  • Publication number: 20160295481
    Abstract: A method and system for providing lawful interception continuity across heterogeneous communication networks for an ongoing data session is disclosed, The method comprises: receiving one or more first data packets associated with an ongoing data session from a source communication network; detecting a handover of the ongoing data session from the source communication network to a destination communication network; receiving one or more second data packets associated with the ongoing data session from the destination communication network in response to detecting the handover of the ongoing session; maintaining continuity and sequence of the first data packets and the second data packets associated with the ongoing data session; and delivering the first data packets and the second data packets associated with the ongoing data session as the lawful interception data to a law enforcement agency.
    Type: Application
    Filed: June 23, 2015
    Publication date: October 6, 2016
    Applicant: Wipro Limited
    Inventors: Venkata Subramanian JAYARAMAN, Swaminathan SEETHARAMAN
  • Publication number: 20160269448
    Abstract: This disclosure relates generally to lawful interception of communication networks, and more particularly to system and method for improved Lawful Interception of encrypted message. The method may involve, receiving, a copy of the one or more encrypted messages; receiving, one or more message encryption key generation parameters associated with the one or more encrypted messages from the communication network; receiving, one or more composite decryption logics, from an encryption device, to decrypt the one or more encrypted messages; decrypting, the one or more encrypted messages based on the one or more message encryption key generation parameters and the one or more composite decryption logics for the lawful interception.
    Type: Application
    Filed: June 22, 2015
    Publication date: September 15, 2016
    Applicant: Wipro Limited
    Inventors: Venkata Subramanian JAYARAMAN, Swaminathan SEETHARAMAN
  • Patent number: 9374848
    Abstract: Embodiments of the present disclosure disclose a method and a device for improving lawful interception of a call is provided. The method comprises monitoring a telecommunication call of a lawful interception target subscriber. Then, the method comprises detecting a call-release trigger associated with the telecommunication call. Further, the method comprises initiating a media plane audit of the telecommunication call to determine whether the call-release trigger is a false release trigger. The media plane audit determines whether media plane resources for the telecommunication call is released in response to the call-release trigger. Additionally, the method includes performing at least one call handling action in response to determining a false release trigger.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: June 21, 2016
    Assignee: WIPRO LIMITED
    Inventors: Venkata Subramanian Jayaraman, Swaminathan Seetharaman, Kumar Ramadoss
  • Patent number: 9363366
    Abstract: This disclosure relates generally to call interception techniques, and more particularly to systems and methods for improved lawful interceptions for calls involving in-band DTMF signaling. In one embodiment, a method for implementing in-band dual-tone multi-frequency call interception is disclosed. The method may include receiving a call intercept request for a target user number at a soft switch. The method may also include initiating, by one or more processors, call monitoring of a call from a calling user to a call proxy system to capture in-band dual-tone multi-frequency signaling. Further, the method may include determining whether the dual-tone multi-frequency signaling corresponds to the target user number.
    Type: Grant
    Filed: March 28, 2015
    Date of Patent: June 7, 2016
    Assignee: WIPRO LIMITED
    Inventors: Swaminathan Seetharaman, Venkata Subramanian Jayaraman
  • Patent number: 8553588
    Abstract: A system and method for providing lawful interception (LI) data in voice call continuity for telecommunication networks are disclosed. In one embodiment, the data associated with a registered telecommunication network user (i.e., target user) coming from a first telecommunication network is intercepted by a VCC gateway. Further, the intercepted data is sent to the LEA in a format desired by the LEA. Furthermore, the VCC gateway is configured based on a successful determination of network properties associated with the second telecommunication network upon the target user moving to the second telecommunication network. The second telecommunication network is based on a technology that is different from the first telecommunication network. In addition, the data associated with the target user coming from the second telecommunication network is continuously intercepted by the VCC gateway and continuously sent to the LEA by the VCC gateway in the format desired by the LEA.
    Type: Grant
    Filed: March 31, 2011
    Date of Patent: October 8, 2013
    Assignee: Wipro Limited
    Inventor: Venkata Subramanian Jayaraman
  • Patent number: 8351579
    Abstract: A system and method for securely authenticating and lawfully intercepting data in a telecommunication network using biometrics is disclosed. In one embodiment, in a method for securely authenticating and lawfully intercepting data using biometrics, one or more persons associated with a law enforcement agency (LEA) are authenticated by a telecommunication network provider. The authentication is performed upon receiving a request for lawful interception of data from the one or more persons associated with the LEA. Then, the lawful interception request associated with a registered telecommunication network user is activated to obtain the data. The data is intercepted user upon a successful match with a requested registered telecommunication network user by the LEA. Further, intercepted data along with the biometric information associated with the registered telecommunication network user is sent to the authenticated one or more persons associated with the LEA via the telecommunication network.
    Type: Grant
    Filed: September 22, 2010
    Date of Patent: January 8, 2013
    Assignee: Wipro Limited
    Inventors: Venkata Subramanian Jayaraman, Veera Raghavan Seshadri
  • Publication number: 20120250584
    Abstract: A system and method for providing lawful interception (LI) data in voice call continuity for telecommunication networks are disclosed. In one embodiment, the data associated with a registered telecommunication network user (i.e., target user) coming from a first telecommunication network is intercepted by a VCC gateway. Further, the intercepted data is sent to the LEA in a format desired by the LEA. Furthermore, the VCC gateway is configured based on a successful determination of network properties associated with the second telecommunication network upon the target user moving to the second telecommunication network. The second telecommunication network is based on a technology that is different from the first telecommunication network. In addition, the data associated with the target user coming from the second telecommunication network is continuously intercepted by the VCC gateway and continuously sent to the LEA by the VCC gateway in the format desired by the LEA.
    Type: Application
    Filed: March 31, 2011
    Publication date: October 4, 2012
    Inventor: VENKATA SUBRAMANIAN JAYARAMAN
  • Publication number: 20120069971
    Abstract: A system and method for securely authenticating and lawfully intercepting data in a telecommunication network using biometrics is disclosed. In one embodiment, in a method for securely authenticating and lawfully intercepting data using biometrics, one or more persons associated with a law enforcement agency (LEA) are authenticated by a telecommunication network provider. The authentication is performed upon receiving a request for lawful interception of data from the one or more persons associated with the LEA. Then, the lawful interception request associated with a registered telecommunication network user is activated to obtain the data. The data is intercepted user upon a successful match with a requested registered telecommunication network user by the LEA. Further, intercepted data along with the biometric information associated with the registered telecommunication network user is sent to the authenticated one or more persons associated with the LEA via the telecommunication network.
    Type: Application
    Filed: September 22, 2010
    Publication date: March 22, 2012
    Inventors: Venkata Subramanian JAYARAMAN, Veera Raghavan SESHADRI