Patents by Inventor Ajit Gaddam

Ajit Gaddam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180352005
    Abstract: Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted, if the data item has a high sensitivity, the system can request authentication before granting access to-the data item.
    Type: Application
    Filed: July 19, 2018
    Publication date: December 6, 2018
    Inventors: Ajit Gaddam, Selim Aissi, Taeho Kgil
  • Publication number: 20180330342
    Abstract: Systems and methods related to cryptocurrency system that enables transactions to be performed using digital assets corresponding to an amount of fiat currency. The cryptocurrency system includes a digital asset service provider computer that can host a digital asset account on behalf of an intended recipient of a transfer (e.g., an unbanked user). In some embodiments, a transfer recipient may elect to receive the transfer in the form of a digital asset. The digital asset service provider computer may facilitate a fund transfer by a financial institution to hold currency with which the digital asset is backed. The digital asset may be generated and managed by the digital asset service provider computer as a blockchain ledger of transactions that cryptographically secures data that is stores. In some embodiments, a payment method identifier may be generated for the digital asset and utilized by the transfer recipient to perform subsequent transactions.
    Type: Application
    Filed: May 11, 2017
    Publication date: November 15, 2018
    Inventors: Gyan Prakash, Ajit Gaddam, Sivanarayana Gaddam
  • Patent number: 10038563
    Abstract: A method for requesting a credential associated with token in a multiple token layer environment is disclosed. A tokenization certificate serves to validate the identity of a credential requestor and provide information about the requestor's authorization for de-tokenizing a token. Also, a public key in the tokenization certificate is used to encrypt the credential for secure transmission to the requestor.
    Type: Grant
    Filed: August 9, 2017
    Date of Patent: July 31, 2018
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi
  • Patent number: 10038726
    Abstract: Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted. If the data item has a high sensitivity, the system can request authentication before granting access to the data item.
    Type: Grant
    Filed: June 12, 2014
    Date of Patent: July 31, 2018
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi, Taeho Kgil
  • Patent number: 9978094
    Abstract: A method for providing a token revocation list is disclosed. The method includes maintaining a status for each of a plurality of tokens in a token revocation database. Token validation requests are received, and the statuses of payment tokens can be determined. Response messages with the statuses of the payment tokens are then sent to token status requesters so that they may make decisions on whether or not to use them to process transactions.
    Type: Grant
    Filed: October 10, 2014
    Date of Patent: May 22, 2018
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi, Sekhar Nagasundaram
  • Publication number: 20170372417
    Abstract: Systems and methods related to a cryptocurrency system that enables transactions to be performed by transferring digital assets corresponding to amounts between appropriate entities are described. The cryptocurrency system includes a digital assets service provider computer that can host digital asset accounts associated with consumers and resource providers at which digital assets can be received. Consumers can be unbanked and use their digital asset account to perform cashless transactions. In one exemplary transaction, a consumer can receive change for the transaction as a digital asset that is assigned to their digital asset account. In another exemplary transaction, the consumer can use digital assets assigned to their digital asset account to pay for the transaction. Transfers of digital assets between accounts is managed by a ledger of transactions, which may be in the form of a block chain that cryptographically secures data that is stores.
    Type: Application
    Filed: June 28, 2016
    Publication date: December 28, 2017
    Inventors: Sivanarayana Gaddam, Gyan Prakash, Ajit Gaddam, Phillip Kumnick, Min Wang, Dean Galland
  • Patent number: 9852479
    Abstract: A method for confirming that a user interacted with a resource provider before allowing the user to submit feedback associated with the resource provider is disclosed. A social network provider can query entities that are aware of the user's interaction history before activating a feedback function. Also, non-sensitive information can be used to identify the user.
    Type: Grant
    Filed: May 19, 2017
    Date of Patent: December 26, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi, Gyan Prakash
  • Publication number: 20170357885
    Abstract: A mobile phone is disclosed. The mobile phone may receive a first request to generate an initial scannable image, and a second request to generate modified scannable image. The modified scannable image can include a static portion that corresponds to a static portion of the initial scannable image. The modified scannable image may also include another portion that has a different appearance than a corresponding portion of the initial scannable image.
    Type: Application
    Filed: August 28, 2017
    Publication date: December 14, 2017
    Inventors: Ajit Gaddam, Gyan Prakash, Selim Aissi
  • Publication number: 20170346806
    Abstract: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.
    Type: Application
    Filed: August 15, 2017
    Publication date: November 30, 2017
    Inventors: Selim Aissi, Taeho Kgil, Ajit Gaddam
  • Publication number: 20170338965
    Abstract: A method for requesting a credential associated with token in a multiple token layer environment is disclosed. A tokenization certificate serves to validate the identity of a credential requestor and provide information about the requestor's authorization for de-tokenizing a token. Also, a public key in the tokenization certificate is used to encrypt the credential for secure transmission to the requestor.
    Type: Application
    Filed: August 9, 2017
    Publication date: November 23, 2017
    Inventors: Ajit Gaddam, Selim Aissi
  • Patent number: 9779345
    Abstract: A mobile phone is disclosed. The mobile phone may receive a first request to generate an initial scannable image, and a second request to generate modified scannable image. The modified scannable image can include a static portion that corresponds to a static portion of the initial scannable image. The modified scannable image may also include another portion that has a different appearance than a corresponding portion of the initial scannable image.
    Type: Grant
    Filed: August 11, 2015
    Date of Patent: October 3, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Gyan Prakash, Selim Aissi
  • Patent number: 9780953
    Abstract: A method for requesting a credential associated with token in a multiple token layer environment is disclosed. A tokenization certificate serves to validate the identity of a credential requestor and provide information about the requestor's authorization for de-tokenizing a token. Also, a public key in the tokenization certificate is used to encrypt the credential for secure transmission to the requestor.
    Type: Grant
    Filed: July 22, 2015
    Date of Patent: October 3, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi
  • Publication number: 20170270528
    Abstract: Described herein is a platform and method for determining a confidence level associated with a transaction that utilizes dynamic data. In some embodiments, the confidence level is determined based on location data received in relation to the transaction. For example, some embodiments are directed to storing first location information collected from a mobile device provided in a request for the dynamic data, receiving second location information related to a transaction conducted using the dynamic data, and comparing the two with respect to the amount of time that has elapsed between collection of each to determine a confidence level associated with a likelihood that the transaction is authentic.
    Type: Application
    Filed: March 18, 2016
    Publication date: September 21, 2017
    Inventors: Gyan Prakash, Ajit Gaddam, Glenn Powell, Taeho Kgil, Christian Aabye
  • Patent number: 9769156
    Abstract: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.
    Type: Grant
    Filed: November 22, 2016
    Date of Patent: September 19, 2017
    Assignee: Visa International Service Association
    Inventors: Selim Aissi, Taeho Kgil, Ajit Gaddam
  • Publication number: 20170262942
    Abstract: A method for confirming that a user interacted with a resource provider before allowing the user to submit feedback associated with the resource provider is disclosed. A social network provider can query entities that are aware of the user's interaction history before activating a feedback function. Also, non-sensitive information can be used to identify the user.
    Type: Application
    Filed: May 19, 2017
    Publication date: September 14, 2017
    Inventors: Ajit Gaddam, Selim Aissi, Gyan Prakash
  • Patent number: 9691109
    Abstract: A method for confirming that a user interacted with a resource provider before allowing the user to submit feedback associated with the resource provider is disclosed. A social network provider can query entities that are aware of the user's interaction history before activating a feedback function. Also, non-sensitive information can be used to identify the user.
    Type: Grant
    Filed: September 24, 2015
    Date of Patent: June 27, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi, Gyan Prakash
  • Publication number: 20170078267
    Abstract: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.
    Type: Application
    Filed: November 22, 2016
    Publication date: March 16, 2017
    Inventors: Selim Aissi, Taeho Kgil, Ajit Gaddam
  • Publication number: 20170063975
    Abstract: Techniques for securely binding a software application to a communication device may include sending a set of device identifiers associated with the computing device to a server, receiving a server-generated dynamic device identifier that is generated based on the set of device identifiers; and storing the server-generated dynamic device identifier during initialization of the application. During runtime execution of the application, the application may receive a request to execute an application specific task.
    Type: Application
    Filed: August 31, 2015
    Publication date: March 2, 2017
    Inventors: Gyan Prakash, Selim Aissi, Rasta Mansour, Ajit Gaddam
  • Patent number: 9537847
    Abstract: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.
    Type: Grant
    Filed: June 13, 2014
    Date of Patent: January 3, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Selim Aissi, Taeho Kgil, Ajit Gaddam
  • Publication number: 20160269391
    Abstract: Embodiments of the present invention are directed at methods and systems for providing a low value token buffer using only low value tokens (i.e., tokens that cannot be used to conduct transactions) within an organization to reduce access to high value tokens (i.e., tokens that are directly tied to real credentials and can be used to conduct transactions) within the organization. Accordingly, whenever a high value token is received by the organization, the high value token is changed to a low value token while being used within the organization. The low value token may be transformed to high value token upon (or before) delivery outside the organization.
    Type: Application
    Filed: March 10, 2016
    Publication date: September 15, 2016
    Inventors: Ajit Gaddam, Selim Aissi