Patents by Inventor Aditya Sinha
Aditya Sinha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230231850Abstract: A method for integrating third-party encryption managers with cloud services includes receiving, at data processing hardware, an operation request requesting a cryptographic operation on data comprising an encryption operation or a decryption operation. When the operation is an encryption operation, the method includes transmitting a data encryption key associated with the data to a remote entity. The remote entity encrypts the data encryption key with a key encryption key and transmits the encrypted data encryption key to the data processing hardware. When the operation is a decryption operation, the method includes transmitting the encrypted data encryption key to the remote entity which causes the remote entity to decrypt the encrypted data encryption key with the key encryption key and transmit the decrypted data encryption key and transmit to the data processing hardware.Type: ApplicationFiled: March 20, 2023Publication date: July 20, 2023Applicant: Google LLCInventors: ll-Sung Lee, Sidharth Durgesh Telang, Jimmy C. Chau, Timothy Matthew Dierks, Ariel Joseph Feldman, Hunter James Freyer, Gregory David Laun, Tianyuan Liu, Pedro Henrique Ribeiro Morais E Silva, Aditya Sinha, Xioalan Zhang, Netanel Keidar
-
Patent number: 11630921Abstract: Methods, systems, and apparatuses, including computer storage media and hardware security modules, for performing batch cryptography on hardware security modules. A hardware security module can receive a request to perform one or more cryptographic operations. The request can include a batch data structure storing a plurality of data elements. The hardware security module can unbatch the plurality of data elements, perform one or more cryptographic operations on the plurality of data elements to generate a plurality of outputs, generate an output batch data structure storing the plurality of outputs, and transmit the output batch data structure in response to the request. The request and the batch data structure can be formed in accordance with a batch hardware security module application program interface (API) implemented by the hardware security module.Type: GrantFiled: December 11, 2020Date of Patent: April 18, 2023Assignee: Google LLCInventors: Aditya Sinha, Vanessa Reimer
-
Patent number: 11611558Abstract: A method for integrating third-party encryption managers with cloud services includes receiving, at data processing hardware, an operation request requesting a cryptographic operation on data comprising an encryption operation or a decryption operation. When the operation is an encryption operation, the method includes transmitting a data encryption key associated with the data to a remote entity. The remote entity encrypts the data encryption key with a key encryption key and transmits the encrypted data encryption key to the data processing hardware. When the operation is a decryption operation, the method includes transmitting the encrypted data encryption key to the remote entity which causes the remote entity to decrypt the encrypted data encryption key with the key encryption key and transmit the decrypted data encryption key and transmit to the data processing hardware.Type: GrantFiled: November 13, 2019Date of Patent: March 21, 2023Assignee: Google LLCInventors: Il-Sung Lee, Sidharth Durgesh Telang, Jimmy C. Chau, Timothy Matthew Dierks, Ariel Joseph Feldman, Hunter James Freyer, Netanel Keidar, Gregory David Laun, Tianyuan Liu, Pedro Henrique Ribeiro Morais e Silva, Aditya Sinha, Xioalan Zhang
-
Publication number: 20210286901Abstract: Methods, systems, and apparatuses, including computer storage media and hardware security modules, for performing batch cryptography on hardware security modules. A hardware security module can receive a request to perform one or more cryptographic operations. The request can include a batch data structure storing a plurality of data elements. The hardware security module can unbatch the plurality of data elements, perform one or more cryptographic operations on the plurality of data elements to generate a plurality of outputs, generate an output batch data structure storing the plurality of outputs, and transmit the output batch data structure in response to the request. The request and the batch data structure can be formed in accordance with a batch hardware security module application program interface (API) implemented by the hardware security module.Type: ApplicationFiled: December 11, 2020Publication date: September 16, 2021Inventors: Aditya Sinha, Vanessa Reimer
-
Patent number: 11122343Abstract: Personalized video interjections based on a learner model and a learning objective. A method for adding interjections to a video includes analyzing the content of a plurality of videos based on a set of learning objectives, selecting a video based on a learning objective, determining types of video interjections using an analytics engine that compares a learner model and the learning objective, determining a location for the video interjections using the analytics engine, generating a video interjection for each video interjection type and inserting the video interjections into the video at the determined locations.Type: GrantFiled: November 5, 2019Date of Patent: September 14, 2021Assignees: International Business Machines Corporation, Sesame WorkshopInventors: Ravindranath Kokku, Tamer E. Abuelsaad, Prasenjit Dey, Jodi M. Cutler, Allison C. Allain, Aditya Sinha, Satyanarayana V. Nitta, Miles Ludwig, Emily Reardon, Nick Bartzokas, James Gray, Michelle Newman-Kaplan
-
Publication number: 20210144141Abstract: A method for integrating third-party encryption managers with cloud services includes receiving, at data processing hardware, an operation request requesting a cryptographic operation on data comprising an encryption operation or a decryption operation. When the operation is an encryption operation, the method includes transmitting a data encryption key associated with the data to a remote entity. The remote entity encrypts the data encryption key with a key encryption key and transmits the encrypted data encryption key to the data processing hardware. When the operation is a decryption operation, the method includes transmitting the encrypted data encryption key to the remote entity which causes the remote entity to decrypt the encrypted data encryption key with the key encryption key and transmit the decrypted data encryption key and transmit to the data processing hardware.Type: ApplicationFiled: November 13, 2019Publication date: May 13, 2021Applicant: Google LLCInventors: Il-Sung Lee, Sidharth Durgesh Telang, Jimmy C. Chau, Timothy Matthew Dierks, Ariel Joseph Feldman, Hunter James Freyer, Netanel Keidar, Gregory David Laun, Tianyuan Liu, Pedro Henrique Ribeiro Morais e Silva, Aditya Sinha, Xioalan Zhang
-
Publication number: 20200068271Abstract: Personalized video interjections based on a learner model and a learning objective. A method for adding interjections to a video includes analyzing the content of a plurality of videos based on a set of learning objectives, selecting a video based on a learning objective, determining types of video interjections using an analytics engine that compares a learner model and the learning objective, determining a location for the video interjections using the analytics engine, generating a video interjection for each video interjection type and inserting the video interjections into the video at the determined locations.Type: ApplicationFiled: November 5, 2019Publication date: February 27, 2020Inventors: Ravindranath Kokku, Tamer E. Abuelsaad, Prasenjit Dey, Jodi M. Cutler, Allison C. Allain, Aditya Sinha, Satyanarayana V. Nitta, Miles Ludwig, Emily Reardon, Nick Bartzokas, James Gray, Michelle Newman-Kaplan
-
Patent number: 10546509Abstract: Methods, systems and computer program products for evaluating contributions in collaborative environments are provided herein. A computer-implemented method includes obtaining indications of tasks of a given workload that are completed by respective ones of a plurality of client devices. The method also includes identifying first and second tasks completed by first and second client devices at first and second times, determining whether the first task provides a clue for the second task and whether the second time is within a designated time window starting after the first time, and analyzing eye-gaze information to determine whether a second user of the second client device observed a first user of the first client device performing the first task. The method further comprises modifying contribution scores for the first and second users responsive to the determinations.Type: GrantFiled: October 26, 2017Date of Patent: January 28, 2020Assignee: International Business Machines CorporationInventors: Prasenjit Dey, Vijay Ekambaram, Aditya Sinha, Mohak Sukhwani
-
Patent number: 10506303Abstract: Personalized video interjections based on a learner model and a learning objective. A method for adding interjections to a video includes analyzing the content of a plurality of videos based on a set of learning objectives, generating and storing educational content metadata on a timeline for the videos, selecting a video based on a user specific learning objective, determining types of video interjections using an analytics engine that compares a user learner model, the user learning objective and the metadata, determining a location for the video interjections using the analytics engine that compares the user learner model, the learning objective, the metadata and timeline, generating a video interjection for each video interjection type and inserting the video interjections into the video at the determined locations.Type: GrantFiled: July 19, 2018Date of Patent: December 10, 2019Assignee: International Business Machines CorporationInventors: Ravindranath Kokku, Tamer E. Abuelsaad, Prasenjit Dey, Jodi M. Cutler, Allison C. Allain, Aditya Sinha, Satyanarayana V. Nitta, Miles Ludwig, Emily Reardon, Nick Bartzokas, James Gray, Michelle Newman-Kaplan
-
Publication number: 20190130777Abstract: Methods, systems and computer program products for evaluating contributions in collaborative environments are provided herein. A computer-implemented method includes obtaining indications of tasks of a given workload that are completed by respective ones of a plurality of client devices. The method also includes identifying first and second tasks completed by first and second client devices at first and second times, determining whether the first task provides a clue for the second task and whether the second time is within a designated time window starting after the first time, and analyzing eye-gaze information to determine whether a second user of the second client device observed a first user of the first client device performing the first task. The method further comprises modifying contribution scores for the first and second users responsive to the determinations.Type: ApplicationFiled: October 26, 2017Publication date: May 2, 2019Inventors: Prasenjit Dey, Vijay Ekambaram, Aditya Sinha, Mohak Sukhwani