140 Fountain Pkwy north, Saint Petersburg, FL 33716
Industry:
Telecommunications
Work:
Alcatel-Lucent Services Business Group since Sep 1999
E-2-E LTE Services Manager-Global Accounts
Alcatel-Lucent Jul 2006 - Apr 2008
Distinguished Member of Consulting Staff
Lucent Technologies Mar 2004 - Jun 2006
Distinguished Member of Consulting Staff
Lucent 1998 - 2005
MTS
STG 1998 - 1999
Consultant
Education:
Mumbai University 1986 - 1990
Skills:
Wireless Telecommunications Lte Mobile Devices Voip Integration Pre Sales Ip 3G Gsm 4G Networking Professional Services Cdma Wimax System Deployment Sip Solution Architecture Broadband Umts Mpls Network Design 3Gpp Wifi Wcdma Cellular Communications Ethernet Mobile Technology Mobile Communications Wireless Technologies Vas Bss Rf Internet Protocol Ss7 Sdh Code Division Multiple Access Method Voice Over Ip Evdo Session Initiation Protocol Gprs Nfv Carrier Cloud Universal Mobile Telecommunications System Business Support System Sdn
Fen-Chung Kung - Bridgewater NJ Jesse Eugene Russell - Piscataway NJ Anish Sankalia - Iselin NJ Spencer C. Wang - Parsippany NJ
Assignee:
ATT Corp - New York NY
International Classification:
H04L 1228
US Classification:
370250, 370352, 370390
Abstract:
Surveillance of IP voice calls over a public communication IP link is achieved by a WatchDog program, associated with an IP Address Mapping Check Point translating IP phone numbers into IP addresses, that are connected to a head end hub connected in turn to a Hybrid Fiber Coax (HFC) link of IP phone users or to a backbone network carrying IP voice packets.
Secure Detection Of An Intercepted Targeted Ip Phone From Multiple Monitoring Locations
Fen-Chung Kung - Bridgewater NJ Jesse Eugene Russell - Piscataway NJ Anish Sankalia - Iselin NJ Spencer C. Wang - Parsippany NJ
Assignee:
ATT Corp. - New York NY
International Classification:
H04L 1228
US Classification:
370252, 370392, 370401, 379 3201, 379 35
Abstract:
Secure monitoring of a target IP telephone may be obtained simultaneously at a plurality of monitoring stations by requiring authentication to be provided by each of the monitoring stations prior to granting access permission to monitor the call. A single request generates multiple duplicate calls to a plurality of different monitoring location, each of which must be authenticated. When the monitored call arrives at each of the multiple monitoring stations a password is used to achieve authentication permission. The password is entered at each monitoring station by a touchtone keypad that generates Dual Tone Multi-frequency (DTMF) signals (e. g. , each signal is a combination of two tones at different frequencies) which is sent to an IP monitoring center, which grants surveillance permission.
Flexible Packet Technique For Monitoring Calls Spanning Different Backbone Networks
Fen-Chung Kung - Bridgewater NJ Jesse Eugene Russell - Piscataway NJ Anish Sankalia - Iselin NJ Spencer C. Wang - Parsippany NJ
Assignee:
ATT Corp. - New York NY
International Classification:
H04L 1266
US Classification:
370352, 37039564
Abstract:
A monitoring network is able to provide surveillance of IP phone calls, which span plural backbone networks, which may embody different transmission techniques. An agent connected through a monitor center to one backbone network enters a request for surveillance (i. e. wiretapping) of a particular network connected to another backbone network. A WatchDog program is associated with each backbone network. These WatchDogs all communicate with other watchdogs associated with other backbone networks. All these watchdogs interact with one another to set up the surveillance connections. The watchdog of the requesters backbone network receives the surveillance request and flows/transmits the request to a watchdog function of the terminating backbone network of the specific caller to be monitored establishing a point-to-point connection, through as many backbone networks as needed. The terminating WatchDog of the termination backbone network flows/transmits the request to a destination WatchDog associated with an IP address mapping checkpoint of the target telephone number to be surveillanced. The destination watchdog communicates with the requesting WatchDog using predefined protocols spanning the intervening backbone networks.
Multiple Routing And Automatic Network Detection Of A Monitored Call From An Intercepted Targeted Ip Phone To Multiple Monitoring Locations
Fen-Chung Kung - Bridgewater NJ Jesse Eugene Russell - Piscataway NJ Anish Sankalia - Iselin NJ Spencer C. Wang - Parsippany NJ
Assignee:
ATT Corp. - New York NY
International Classification:
H04L 1266
US Classification:
370352, 370351
Abstract:
Monitored calls are intercepted and rerouted to plural selected monitoring stations by intervention of an IP phone monitor center (IPMC) which duplicates the voice to a monitoring location and automatically identifying the types of networks to be traversed and adapting the voice message to such a network type to communication with monitoring stations connected to these networks. Surveillance is, therefor, enabled to be conducted at more than one monitoring location each of which many are widely separated from the other. In a particular embodiment an authorized surveillance agent transmits a valid request to an IP phone monitor center (IPMC) which in response intercepts voice packets to and from the targeted IP phone. The duplicated voice packets are transmitted to the designated monitoring location. The IPMC determines the type of voice signal to be transmitted to the terminal monitoring station.
Automatic Ip Directory Number Masking And Dynamic Packet Routing For Ip Phone Surveillance
Fen-Chung Kung - Bridgewater NJ Jesse Eugene Russell - Piscataway NJ Anish Sankalia - Iselin NJ Spencer C. Wang - Parsippany NJ
Assignee:
ATT Corp. - New York NY
International Classification:
H04L 1266
US Classification:
370356, 370352
Abstract:
Monitored calls are intercepted and rerouted to a changed location number of a called party while appearing to be at the same directory number by intervention of an IP Address Mapping check Point (IP-AMCP) which duplicates the voice to a monitoring location, automatically identifies the types of networks to be traversed to the new location and adapts the duplicated voice message to traverse such network types. Surveillance is enabled to be conducted at more than one monitoring location each of which many are widely separated from the other.
Ip Voice Call Surveillance Through Use Of Non-Dedicated Ip Phone With Signal Alert Provided To Indicate Content Of Incoming Call Prior To An Answer As Being A Monitored Call
Fen-Chung Kung - Bridgewater NJ Jesse Eugene Russell - Piscataway NJ Anish Sankalia - Iselin NJ Spencer C. Wang - Parsippany NJ
Assignee:
ATT Corp. - New York NY
International Classification:
H04L 1228
US Classification:
370252, 370392, 370401, 379 3201, 379 35
Abstract:
Surveillance of IP telephony may be performed through the use of conventional telephone equipment, according to principles of the invention while preventing giving indication to the monitored phone by alerting the user of the monitoring phone to such surveillance use prior to pick up by an agent for engagement of the monitoring phone in response to the alert. Such alerts may assume many forms such as ringing, visual indicators, data readouts, activating ancillary equipment, various flags, etc. This alert prior to surveillance is distinct from alerts used for normal non-surveillance calls, which the monitoring phone is capable of receiving.
Fen-Chung Kung - Bridgewater NJ Anish Sankalia - Somerville NJ Spencer Wang - Parsippany NJ
Assignee:
ATT Corp. - New York NY
International Classification:
H04J 116
US Classification:
370237, 370354, 379134, 37922102
Abstract:
A method of managing a call traffic includes determining when a load of a first call manager exceeds a predetermined load level, and ameliorating the load when the load exceeds the predetermined load level. The load is ameliorated by either notifying a network that future calls are to be directed to a second call manager, or transferring at least one pending call from the first call manager to a second call manager, or both.
Conference Server For Automatic X-Way Call Port Expansion Feature
Fen-Chung Kung - Bridgewater NJ Anish Sankalia - Iselin NJ Spencer Wang - Parsippany NJ
Assignee:
ATT Corp. - New York NY
International Classification:
H04L 1216
US Classification:
370260, 370261, 370537, 370538, 37920201, 709204
Abstract:
A broadband communication system including an Internet Protocol Telephony Network and public switched telephone network. The system may include one or more conference servers for combining IP packet streams in a conference call into a combined IP packet stream, such that the combined IP packet stream utilizes no more bandwidth than each of the original IP packet streams. This allows the traffic volume coming from, and arriving at, each party to a conference call to remain essentially the same no matter how many parties are connected to the conference call. A plurality of the conference servers may be configured to interwork with each other so as to allow for a much larger conference call.