Rohit Kalbag

New York City Metropolitan Area Contact Info
944 followers 500+ connections

Join to view profile

About

Innovative, results-oriented leader with an entrepreneurial attitude experienced in new…

Articles by Rohit

See all articles

Activity

Join now to see all activity

Experience & Education

  • OpenVPN Inc.

View Rohit’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Publications

Patents

  • Download localized portion of large database based on cellular network topology

    Issued US 9,578,679

    A wireless mobile communication device includes a wireless communication subsystem configured to wirelessly communicate through a local data access point to cause a query to be delivered to a remote access point location database. The location database contains information about the location of local data access points within a widespread area. The query is for location information for data access points located near the wireless device. The wireless device receives nearby access point location…

    A wireless mobile communication device includes a wireless communication subsystem configured to wirelessly communicate through a local data access point to cause a query to be delivered to a remote access point location database. The location database contains information about the location of local data access points within a widespread area. The query is for location information for data access points located near the wireless device. The wireless device receives nearby access point location information from the database, and the device causes at least a portion of the access point location information to be delivered to a user. This may be done through a user interface, upon request of the user, and while the wireless communication subsystem is not connected to a local data access point.

    Other inventors
  • Method, apparatus, and computer program product for authenticating subscriber communications at a network server

    Issued US 8,964,633

    An apparatus for authenticating subscriber communications at a network server includes a determining element and an identification element in communication with the determining element. The determining element may be configured to receive an incoming message. The identification extractor may be configured to extract a device identifier and an address identifier from the incoming message. The determining element may be further configured to determine whether the device identifier and the address…

    An apparatus for authenticating subscriber communications at a network server includes a determining element and an identification element in communication with the determining element. The determining element may be configured to receive an incoming message. The identification extractor may be configured to extract a device identifier and an address identifier from the incoming message. The determining element may be further configured to determine whether the device identifier and the address identifier of the incoming message match both a registered device identifier and a registered address identifier associated with the registered device identifier, respectively.

    Other inventors
    • epgraim, robert
    • Tu, Fangqiu
  • Wireless mobile communication device with autonomous Wi-Fi control based on motion of device

    Issued US 8,964,709

    A wireless mobile communication device may include a Wi-Fi data communication system, an operational condition detection system, and a Wi-Fi activation system. The operational condition detection system may be configured to detect an operational condition of the wireless mobile communication device, other than actuation of a user-operated control. The operational condition may be when a motion sensor senses that the wireless mobile communication device has been substantially motionless. The…

    A wireless mobile communication device may include a Wi-Fi data communication system, an operational condition detection system, and a Wi-Fi activation system. The operational condition detection system may be configured to detect an operational condition of the wireless mobile communication device, other than actuation of a user-operated control. The operational condition may be when a motion sensor senses that the wireless mobile communication device has been substantially motionless. The Wi-Fi activation system may be configured to autonomously turn power on to the Wi-Fi data communication system upon detection of an operational condition of the wireless mobile communication device by the operational condition detection system, other than actuation of a user-operated control.

  • Wireless mobile communication device with autonomous Wi-Fi control based on location of device

    Issued US 8,953,569

    A wireless mobile communication device may include a Wi-Fi data communication system, an operational condition detection system, and a Wi-Fi activation system. The operational condition detection system may include a location sensor. The operational condition detection system may be configured to detect an operational condition of the wireless mobile communication device, other than actuation of a user-operated control, including when the location sensor determines that the wireless mobile…

    A wireless mobile communication device may include a Wi-Fi data communication system, an operational condition detection system, and a Wi-Fi activation system. The operational condition detection system may include a location sensor. The operational condition detection system may be configured to detect an operational condition of the wireless mobile communication device, other than actuation of a user-operated control, including when the location sensor determines that the wireless mobile communication device is near a Wi-Fi access point. The Wi-Fi activation system may be configured to autonomously turn power on to the Wi-Fi data communication system upon detection of an operational condition of the wireless mobile communication device by the operational condition detection system, other than actuation of a user-operated control, including when the location sensor senses that the wireless mobile communication device is near a Wi-Fi access point.

  • Wireless mobile communication device with autonomous Wi-Fi control based on usage of battery in device

    Issued US 8,948,145

    A wireless mobile communication device may include a Wi-Fi data communication system, an operational condition detection system, and a Wi-Fi activation system. The operational condition detection system may include a battery use detector. The operational condition detection system may be configured to detect an operational condition of the wireless mobile communication device, other than actuation of a user-operated control, including when the battery use detector detects that the wireless…

    A wireless mobile communication device may include a Wi-Fi data communication system, an operational condition detection system, and a Wi-Fi activation system. The operational condition detection system may include a battery use detector. The operational condition detection system may be configured to detect an operational condition of the wireless mobile communication device, other than actuation of a user-operated control, including when the battery use detector detects that the wireless mobile communication device is not operating on battery power or is operating while the battery is being charged. The Wi-Fi activation system may be configured to autonomously turn power on to the Wi-Fi data communication system upon detection of an operational condition of the wireless mobile communication device by the operational condition detection system, other than actuation of a user-operated control, including when the battery use detector detects that the wireless mobile communication device is not operating on battery power or is operating while the battery is being charged.

  • Techniques for providing enhanced network security

    Issued US 8,943,570

    Exemplary network infrastructures and methods employing a Security Gateway utilize client authentication for use of a secure connection between an application client and an application server of a protected network. Once a secure connection has been set up, a Security Gateway can start a timer for establishing a period within which a password and username are to be received from the application client before traffic is allowed to exit the Security Gateway. If a username and password are…

    Exemplary network infrastructures and methods employing a Security Gateway utilize client authentication for use of a secure connection between an application client and an application server of a protected network. Once a secure connection has been set up, a Security Gateway can start a timer for establishing a period within which a password and username are to be received from the application client before traffic is allowed to exit the Security Gateway. If a username and password are provided while the timer is running, the Security Gateway can contact a single sign on (SSO) server to check whether the username and password are correct. If the username and password are valid, the Security Gateway can start relaying traffic externally to the application server. If an invalid username and password are provided or the timer times out before receipt of a username and password, the secure connection can be terminated.

  • Downloading web-based email

    Issued US 8,862,688

    Web-based email methods and systems for downloading emails from an email service provider's servers to a user's local system and/or other local storage medium are provided. The user can select the emails to download and the systems and methods can retrieve the selected emails from storage. The text of the emails can be reformatted into a text file. The systems and methods can present a web page to the user from which the email text file can be downloaded. The web page can include attachments to…

    Web-based email methods and systems for downloading emails from an email service provider's servers to a user's local system and/or other local storage medium are provided. The user can select the emails to download and the systems and methods can retrieve the selected emails from storage. The text of the emails can be reformatted into a text file. The systems and methods can present a web page to the user from which the email text file can be downloaded. The web page can include attachments to the emails. The text files can be concatenated into a one or more text files and the attachments can be compressed into one or more files. Optionally, the text file(s) and the compressed file(s) can be emailed to an alternate email address. Optionally, the email text and attachments can be formatted for viewing by a local email client.

  • Autonomous actuation of Wi-Fi radio based on cellular network load

    Issued US 8,842,615

    A wireless mobile communication device may include a first and second transceiver, a network load detection system, and a second transceiver controller. The first transceiver may be configured to wirelessly communicate with a first wireless communication network, such as a wireless cellular communication network. The second transceiver may be different from the first transceiver and may be configured to wirelessly communicate with a second wireless communication network which may be different…

    A wireless mobile communication device may include a first and second transceiver, a network load detection system, and a second transceiver controller. The first transceiver may be configured to wirelessly communicate with a first wireless communication network, such as a wireless cellular communication network. The second transceiver may be different from the first transceiver and may be configured to wirelessly communicate with a second wireless communication network which may be different from the first wireless communication network, such as the Internet and at least one Wi-Fi access point. The network load detection system may be configured to detect load information indicative of an amount of load on the first wireless communication network. The second transceiver controller may be configured to autonomously power on the second transceiver when the load information indicates a heavy load on the first wireless communication network.

    Other inventors
    • Tu, Fangqiu
  • METHOD AND DEVICE FOR PROVIDING INTER-DOMAIN HANDOFF CONFIGURATION INFORMATION TO A DUAF MODE ACCESS TERMINAL

    Issued US 8,804,666 B2

    A dual mode Access Terminal (AT) is operable to communicate both in a Circuit Switched (CS) network domain and an Internet Protocol (IP) Multimedia Subsystem (IMS) network domain. Up-to-date handoff configuration information is transmitted from an IMS server to the AT during a registration of the dual mode AT with an IMS network or during establishment of a call session of AT. The handoff configuration information is used in a call handoff of an ongoing call of the AT between the CS network and…

    A dual mode Access Terminal (AT) is operable to communicate both in a Circuit Switched (CS) network domain and an Internet Protocol (IP) Multimedia Subsystem (IMS) network domain. Up-to-date handoff configuration information is transmitted from an IMS server to the AT during a registration of the dual mode AT with an IMS network or during establishment of a call session of AT. The handoff configuration information is used in a call handoff of an ongoing call of the AT between the CS network and the IMS network. In the examples, the handoff configuration information includes a handoff number for use in a handoff to the Circuit Switched (CS) network and a handoff Uniform Resource Identifier (URI) for use in a handoff to the IMS network.

    Other inventors
    • ephraim, robert
  • Method and system for routing traffic across multiple interfaces via VPN traffic selectors and local policies

    Issued US 8,638,794

    Method and system for routing traffic across multiple network interfaces with use of VPN traffic selector as part of decision making, for example, in the context of a mobile communication network. A packet data unit (PDU) is generated in association with an application that can be selectively activated on a mobile device and carries a destination Internet protocol (IP) address representing a server that supports the application. A broker associated with the mobile device retrieves information…

    Method and system for routing traffic across multiple network interfaces with use of VPN traffic selector as part of decision making, for example, in the context of a mobile communication network. A packet data unit (PDU) is generated in association with an application that can be selectively activated on a mobile device and carries a destination Internet protocol (IP) address representing a server that supports the application. A broker associated with the mobile device retrieves information relating to traffic selectors and determines whether the PDU is associated with an operator application or a non-operator application based on the destination IP address and the information relating to traffic selectors. The broker routes the PDU to one of the multiple network interfaces based on whether the PDU is from an operator application traffic and local policies. When the PDU is associated with an operator application and the mobile device is not connected to its operator network, the PDU is routed via a virtual private network (VPN) selector.

    Other inventors
  • Enabling seamless access to a Wi-Fi network

    Issued US 8,588,413

    A disclosed method for enabling a seamless authenticated access to an Aggregator's Wi-Fi network includes steps of receiving a request to establish a data session from a mobile device and at a public mobile service provider network, authenticating the mobile device in response to the request to establish the data session, and establishing the data session upon successful authentication. The method further includes steps of receiving an activation key associated with the mobile device from the…

    A disclosed method for enabling a seamless authenticated access to an Aggregator's Wi-Fi network includes steps of receiving a request to establish a data session from a mobile device and at a public mobile service provider network, authenticating the mobile device in response to the request to establish the data session, and establishing the data session upon successful authentication. The method further includes steps of receiving an activation key associated with the mobile device from the mobile device and at the public mobile service provider network and recording the activation key against an identification of the mobile device such as a Mobile Directory Number assigned to the mobile device. The activation key is used to generate a password, which is used to authenticate the mobile device request to access the Aggregator's Wi-Fi network.

    Other inventors
  • Mechanism to detect restricted access via internet hotspot

    Issued US 8,296,428

    A wireless device automatically detects the redirection of its internet access via a wireless hotspot network. An algorithm in the device provides the flexibility to detect either or both of DNS redirection and HTTP redirection, as well as to automatically accommodate such internet redirection. The algorithm allows a wireless device user to be alerted and account for internet redirection when such internet redirection is automatically detected upon entering service via a hotspot. Alternatively,…

    A wireless device automatically detects the redirection of its internet access via a wireless hotspot network. An algorithm in the device provides the flexibility to detect either or both of DNS redirection and HTTP redirection, as well as to automatically accommodate such internet redirection. The algorithm allows a wireless device user to be alerted and account for internet redirection when such internet redirection is automatically detected upon entering service via a hotspot. Alternatively, the wireless device may attempt to automatically meet the hotspot requirements and complete the internet access through the hotspot.

  • TIMED OVERRIDE OF INCOMING CALL RESTRICTIONS TO FACILITATE CALL-BACK AFTER AN EMERGENCY CALL

    Issued US 8,244,204

    A mechanism is provided to suspend or modify incoming call
    restrictions for a subscriber station for some time period when
    it is detected that an emergency call was made by that subscriber
    station, so as to disable the restriction that would
    otherwise block completion of an incoming call to that station.
    This allows a call placed by emergency personnel in
    response to the emergency call from the subscriber station
    (i.e. when the emergency personnel calls back the user that…

    A mechanism is provided to suspend or modify incoming call
    restrictions for a subscriber station for some time period when
    it is detected that an emergency call was made by that subscriber
    station, so as to disable the restriction that would
    otherwise block completion of an incoming call to that station.
    This allows a call placed by emergency personnel in
    response to the emergency call from the subscriber station
    (i.e. when the emergency personnel calls back the user that is
    involved in the emergency) to bypass any restrictions setup by
    the subscriber or by the network that would otherwise block
    the callback and allows the emergency callback to potentially
    reach the caller. This approach results in a systematic solution
    to blocking of emergency callbacks that applies to various
    kinds of restriction services yet is relatively simple to administer.

    Other inventors
    • Ben-Ren Chen
    • Robert Ephraim
  • Method and system for network assisted discovery of femto cells

    Issued US 8,538,399

    Method and system for a femto serving switch system. A request for registering a wireless device with a femto cell environment is received. The wireless device is registered based on the request with respect to the femto cell environment. Information related to the femto cell environment and one or more applications is then obtained, based on which a femto discovery notification (FDN) is generated. Such generated FDN is then delivered to the wireless device to assist the wireless device to…

    Method and system for a femto serving switch system. A request for registering a wireless device with a femto cell environment is received. The wireless device is registered based on the request with respect to the femto cell environment. Information related to the femto cell environment and one or more applications is then obtained, based on which a femto discovery notification (FDN) is generated. Such generated FDN is then delivered to the wireless device to assist the wireless device to operate in the femto cell environment.

  • Determining chargeable duration at the home agent for a prepaid MIP session

    US 7,366,136

    Duration based accounting for a packet data service, for example offered as a prepaid mobile IP (MIP) service through a public mobile wireless communication network, uses last detected user activity to determine the end of each session for accounting purposes. The accounting policy or algorithm defines user activity so as to include receipt of signaling related to the MIP session, such as signaling related to a termination by the user or the user's mobile station, in addition to packet data…

    Duration based accounting for a packet data service, for example offered as a prepaid mobile IP (MIP) service through a public mobile wireless communication network, uses last detected user activity to determine the end of each session for accounting purposes. The accounting policy or algorithm defines user activity so as to include receipt of signaling related to the MIP session, such as signaling related to a termination by the user or the user's mobile station, in addition to packet data routed for the mobile station. If a session ends due to a network termination, e.g. binding expires or the network disconnects upon prepaid quota exhaustion, then the last user activity used for accounting purposes is the last data packet communication to/from the mobile station or the last received MIP session-related signaling message. For example, if MIP signaling terminates the session, then the session duration runs until receipt of that signaling.

    Other inventors
    • Robert Ephraim
    • Ben Chen
  • MECHANISM TO DETECT RESTRICTED ACCESS VIA INTERNET HOTSPOT

    US 8,131,847 B2

    The disclosed wireless device automatically detects the redirection of its internet access via a wireless hotspot network. The exemplary device algorithm provides the flexibility to detect either or both of DNS redirection and HTTP redirection, as well as to automatically accommodate such internet redirection. The proposed algorithm allows a wireless device user to be alerted and account for internet redirection when such internet redirection is automatically detected upon entering service via…

    The disclosed wireless device automatically detects the redirection of its internet access via a wireless hotspot network. The exemplary device algorithm provides the flexibility to detect either or both of DNS redirection and HTTP redirection, as well as to automatically accommodate such internet redirection. The proposed algorithm allows a wireless device user to be alerted and account for internet redirection when such internet redirection is automatically detected upon entering service via a hotspot. Alternatively, the wireless device may attempt to automatically meet the hotspot requirements and complete the internet access through the hotspot.

  • METHOD AND DEVICE FOR PROVIDING INTER-DOMAIN HANDOFF CONFIGURATION INFORMATION TO A DUAL MODE ACCESS TERMINAL

    US 8,249,016 B1

    Handoff configuration information is provided to a dual mode
    Access Terminal (AT) operable to communicate both in a
    Circuit Switched network domain and a IP Multimedia Subsystem
    (IMS) network domain. Up-to-date handoff configuration
    information is transmitted during a registration of the
    dual mode AT with an IMS network or, alternatively during
    establishment of a call session of the dual mode AT. An IMS
    server assigns and sends the handoff configuration information
    to…

    Handoff configuration information is provided to a dual mode
    Access Terminal (AT) operable to communicate both in a
    Circuit Switched network domain and a IP Multimedia Subsystem
    (IMS) network domain. Up-to-date handoff configuration
    information is transmitted during a registration of the
    dual mode AT with an IMS network or, alternatively during
    establishment of a call session of the dual mode AT. An IMS
    server assigns and sends the handoff configuration information
    to the dual mode in a response message to a registration
    request or, alternatively in a request for a call session establishment
    and in a response message to the request for the call
    session establishment. The handoff configuration information
    is used in a call handoff of an ongoing call of the dual
    mode AT between the CS network and the IMS network. In
    the examples, the handoff configuration information includes
    a han doff number for use in a han doff to the Circuit Switched
    (CS) network and a handoff Uniform Resource Identifier
    (URI) for use in a handoffto the IMS network.

    Other inventors
    • Robert Ephraim
  • Message delivery using a voice mail system

    US 8,130,919

    Voicemail systems and methods can provide a user with means for receiving categorized messages from parties. The categories can be independent of the intended recipients of the messages, such that multiple users can receive the same message. A user can subscribe to receive categorized messages within selected categories or from selected parties. A registered party, including a merchant, an organization, a government agency and/or another party, can input messages to selected categories and can…

    Voicemail systems and methods can provide a user with means for receiving categorized messages from parties. The categories can be independent of the intended recipients of the messages, such that multiple users can receive the same message. A user can subscribe to receive categorized messages within selected categories or from selected parties. A registered party, including a merchant, an organization, a government agency and/or another party, can input messages to selected categories and can input distribution parameters for the messages. Expiration dates can be associated with the messages such that messages can be deleted once expired.

  • Message delivery using a voice mail system,

    US 7,561,679

    Voicemail systems and methods can provide a user with means for receiving categorized messages from parties. The categories can be independent of the intended recipients of the messages, such that multiple users can receive the same message. A user can subscribe to receive categorized messages within selected categories or from selected parties. A registered party, including a merchant, an organization, a government agency and/or another party, can input messages to selected categories and can…

    Voicemail systems and methods can provide a user with means for receiving categorized messages from parties. The categories can be independent of the intended recipients of the messages, such that multiple users can receive the same message. A user can subscribe to receive categorized messages within selected categories or from selected parties. A registered party, including a merchant, an organization, a government agency and/or another party, can input messages to selected categories and can input distribution parameters for the messages. Expiration dates can be associated with the messages such that messages can be deleted once expired.

  • Session classification for differentiated prepaid accounting

    US 7,545,761

    Session level classification of wireless packet data communications enables differentiated duration-based accounting. In a network offering prepaid services, for example, an applicable accounting policy is identified each time a user requests a new session. Different session classifications are possible under the identified policy. For example, if the prepaid subscriber also subscribes to a push-to-talk (PTT) service, the policy enables classification of each session as either PTT or non-PTT. A…

    Session level classification of wireless packet data communications enables differentiated duration-based accounting. In a network offering prepaid services, for example, an applicable accounting policy is identified each time a user requests a new session. Different session classifications are possible under the identified policy. For example, if the prepaid subscriber also subscribes to a push-to-talk (PTT) service, the policy enables classification of each session as either PTT or non-PTT. A different policy would apply if the prepaid subscriber did not subscribe to the PTT service. A network element serving the mobile station during the session monitors packets, until it can detect a packet enabling appropriate classification under the applicable policy. The prepaid platform bases its accounting on the session classification. For a prepaid subscriber with PTT service, for example, a non-PTT session receives normal prepaid treatment based on session duration, whereas packet transport for a PTT session may be free.

  • System for and method of using a loopback mechanism to perform network testing

    US 7,957,304

    A system for and method of actively running performance tests is presented. The system and method allow a device connected, via a VPN or IPSec tunnel, to a VoIP or other service provider network, to run network performance tests using the IP address assigned by a VPN concentrator. The device utilizes the IP address assigned by the VPN concentrator as a means for performing loopback testing. These performance tests characterize the connectivity of the network. Systems and methods then use this…

    A system for and method of actively running performance tests is presented. The system and method allow a device connected, via a VPN or IPSec tunnel, to a VoIP or other service provider network, to run network performance tests using the IP address assigned by a VPN concentrator. The device utilizes the IP address assigned by the VPN concentrator as a means for performing loopback testing. These performance tests characterize the connectivity of the network. Systems and methods then use this characterization to do call admission control, traffic shaping or prioritization.

Recommendations received

More activity by Rohit

View Rohit’s full profile

  • See who you know in common
  • Get introduced
  • Contact Rohit directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses