Patents by Inventor Vinjith Nagaraja

Vinjith Nagaraja has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240179123
    Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.
    Type: Application
    Filed: January 2, 2024
    Publication date: May 30, 2024
    Inventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, JR., Keeshini Manivannan
  • Patent number: 11991282
    Abstract: A method performed by a user device is disclosed. The method comprising generating a secret and measuring a biometric template of a user operating the user device. The method then generates a plurality of secret shares of the secret and of the biometric template. The user device then transmits the secret shares of the secret and of the biometric template to a plurality of recovery devices. After, the user device may then initiate a recovery of the secret and measure a biometric measurement of the user. Data of the biometric measurement may be transmitted to the plurality of recovery devices, where the recovery devices perform a partial computation. The user device use the plurality of partial computations to determine a match between the biometric template and the biometric measurement. If the two biometrics match, the user device can reconstruct the secret using shares of the secret from the recovery devices.
    Type: Grant
    Filed: July 30, 2021
    Date of Patent: May 21, 2024
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel, Shengfei Gu, Sikhar Patranabis, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal, Shan Jin
  • Patent number: 11936651
    Abstract: Embodiments of the invention are directed to an automated account restoration system. In some embodiments, the system determines a state of an account based on a likelihood that the account has been compromised. If the account is determined to be in a low-risk state, then upon an successful login to that account, a verification cookie may be generated which is unique to a user device used to access the account. If the account is determined to be in a high-risk state, then system may prevent access to the account except by user devices that include a valid verification cookie.
    Type: Grant
    Filed: February 20, 2019
    Date of Patent: March 19, 2024
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Vinjith Nagaraja, Dhruv Vig, Raymond Brammer, Vamshi Ramarapu, James Myers, David Capezza, Nagaveera Venkata Su Tavvala, Swapneel Mahajan, Shalini Mayor
  • Patent number: 11895088
    Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.
    Type: Grant
    Filed: September 21, 2022
    Date of Patent: February 6, 2024
    Assignee: Visa International Service Association
    Inventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, Jr., Keeshini Manivannan
  • Patent number: 11861582
    Abstract: Embodiments include apparatuses, methods, and systems for performing security protection of association between a user device and a user. A computing system receives from a service provider a notification that an identifier of a user device has been activated in the user device to be associated with a user identifier to replace an existing identifier of the user device associated with the user identifier. The computing system further receives from the user device a request for information associated with the user identifier to be sent to the user device associated with the identifier of the user device. Before sending the requested information to the user device, the computing system verifies the identifier of the user device has been activated by the user by an additional authentication of the user through a communication path between the user and the computing system. Other embodiments may also be described and claimed.
    Type: Grant
    Filed: December 9, 2020
    Date of Patent: January 2, 2024
    Assignee: Visa International Service Association
    Inventors: Vinjith Nagaraja, Dhaval Gangar
  • Publication number: 20230401331
    Abstract: Embodiments of the present disclosure are directed to methods and systems used to determine private set intersections (PSIs) and execute private database joins (PDJs). Some embodiments are characterized by binning techniques that enables PSI and PDJ methods to be performed by worker nodes in a computing cluster in parallel, thus reducing execution time. A first party computing system and a second party computing system can each tokenize their respective datasets, then assign the datasets to bins. The bins can each be padded with dummy tokens. Then the first party computing system and second party computing system can execute several Nparallel PSI on pairs of corresponding bins. The results can then be combined to produce a tokenized intersection set, which can then be detokenized to produce the set intersection.
    Type: Application
    Filed: October 6, 2021
    Publication date: December 14, 2023
    Applicant: Visa International Service Association
    Inventors: Minghua Xu, Mihai Christodorescu, Wei Sun, Peter Rindal, Ranjit Kumaresan, Vinjith Nagaraja, Karankumar Hiteshbhai Patel
  • Publication number: 20230281334
    Abstract: Provided are systems for conducting private set intersection (PSI) techniques with multiple parties using a data repository that include at least one processor to generate a data repository, receive, from a submission entity system associated with a submission entity, a private set intersection (PSI) data query that includes a match parameter for performing the PSI data query, transmit, to the submission entity system, a data classification encryption key, wherein the data classification encryption key is associated with a data field that corresponds to a match parameter data field of the match parameter, determine whether to authorize the PSI data query on the data repository, transmit, to the submission entity system, a data authorization encryption key based on determining to authorize the PSI data query on the data repository, and perform the PSI data query on the data repository. Methods and computer program products are also provided.
    Type: Application
    Filed: May 11, 2023
    Publication date: September 7, 2023
    Inventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel
  • Patent number: 11734433
    Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application. An application, that uses code libraries, and information regarding known library vulnerabilities are received, then it is determined if one or more libraries in the application are vulnerable based upon the information. For each of the one or more vulnerable libraries, a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If an application test score on the test application is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each of the one or more vulnerable libraries.
    Type: Grant
    Filed: March 30, 2022
    Date of Patent: August 22, 2023
    Assignee: Visa International Service Association
    Inventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu
  • Patent number: 11720742
    Abstract: Methods and systems for detecting webpages that share malicious content are presented. A first set of webpages that hosts a web account checker is identified. A baseline page structure score and a baseline language score are calculated based on the identified first set of webpages. Content from a second set of webpages is collected and analyzed based on the calculated baseline page structure and the calculated baseline language scores. One or more of the second set of webpages is flagged as malicious based on the analyzing of the content collected from the second set of webpages.
    Type: Grant
    Filed: September 14, 2020
    Date of Patent: August 8, 2023
    Assignee: PayPal, Inc.
    Inventors: Vinjith Nagaraja, Meethil Vijay Yadav, Bradley Wardman
  • Patent number: 11687666
    Abstract: Provided are systems for conducting private set intersection (PSI) techniques with multiple parties using a data repository that include at least one processor to generate a data repository, receive, from a submission entity system associated with a submission entity, a private set intersection (PSI) data query that includes a match parameter for performing the PSI data query, transmit, to the submission entity system, a data classification encryption key, wherein the data classification encryption key is associated with a data field that corresponds to a match parameter data field of the match parameter, determine whether to authorize the PSI data query on the data repository, transmit, to the submission entity system, a data authorization encryption key based on determining to authorize the PSI data query on the data repository, and perform the PSI data query on the data repository. Methods and computer program products are also provided.
    Type: Grant
    Filed: January 12, 2021
    Date of Patent: June 27, 2023
    Assignee: Visa International Service Association
    Inventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel
  • Publication number: 20230050481
    Abstract: A method performed by a user device is disclosed. The method comprising generating a secret and measuring a biometric template of a user operating the user device. The method then generates a plurality of secret shares of the secret and of the biometric template. The user device then transmits the secret shares of the secret and of the biometric template to a plurality of recovery devices. After, the user device may then initiate a recovery of the secret and measure a biometric measurement of the user. Data of the biometric measurement may be transmitted to the plurality of recovery devices, where the recovery devices perform a partial computation. The user device use the plurality of partial computations to determine a match between the biometric template and the biometric measurement. If the two biometrics match, the user device can reconstruct the secret using shares of the secret from the recovery devices.
    Type: Application
    Filed: July 30, 2021
    Publication date: February 16, 2023
    Inventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel, Shengfei Gu, Sikhar Patranabis, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal, Shan Jin
  • Publication number: 20230017103
    Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.
    Type: Application
    Filed: September 21, 2022
    Publication date: January 19, 2023
    Inventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, Jr., Keeshini Manivannan
  • Patent number: 11477164
    Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.
    Type: Grant
    Filed: December 12, 2019
    Date of Patent: October 18, 2022
    Assignee: Visa International Service Association
    Inventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, Jr., Keeshini Manivannan
  • Publication number: 20220222366
    Abstract: Provided are systems for conducting private set intersection (PSI) techniques with multiple parties using a data repository that include at least one processor to generate a data repository, receive, from a submission entity system associated with a submission entity, a private set intersection (PSI) data query that includes a match parameter for performing the PSI data query, transmit, to the submission entity system, a data classification encryption key, wherein the data classification encryption key is associated with a data field that corresponds to a match parameter data field of the match parameter, determine whether to authorize the PSI data query on the data repository, transmit, to the submission entity system, a data authorization encryption key based on determining to authorize the PSI data query on the data repository, and perform the PSI data query on the data repository. Methods and computer program products are also provided.
    Type: Application
    Filed: January 12, 2021
    Publication date: July 14, 2022
    Inventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel
  • Publication number: 20220222353
    Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application are disclosed. An application that uses code libraries and information regarding known library vulnerabilities is received, then it can be determined if one or more libraries in the application is vulnerable based upon the information. For each of the one or more vulnerable libraries a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If the application test is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each vulnerable library.
    Type: Application
    Filed: March 30, 2022
    Publication date: July 14, 2022
    Inventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu
  • Patent number: 11308218
    Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application. An application that uses code libraries and information regarding known library vulnerabilities are received, then it identifies one or more libraries in the application that are vulnerable based upon the information. For each of the one or more vulnerable libraries, a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If an application test score on the test application is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each of the one or more vulnerable libraries.
    Type: Grant
    Filed: December 20, 2018
    Date of Patent: April 19, 2022
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu
  • Patent number: 11271931
    Abstract: Techniques for securely generating and using a “fingerprint” for authentication. A server computer receives a first data set from a user device (including a first fuzzy hash of first user data on the user device). The server computer generates a first fingerprint value based on the first data set. The server computer detects an event corresponding to a user in association with the user device. The server computer identifies a baseline fingerprint value (generated based on a baseline fuzzy hash of user data on the user device). The server computer compares the first fingerprint value to the baseline fingerprint value to generate a similarity score. The server computer may determine that the similarity score exceeds a threshold value but does not represent an exact match, and, based on the similarity score, authenticate the user and update the baseline fingerprint value based on the first fingerprint value.
    Type: Grant
    Filed: September 19, 2019
    Date of Patent: March 8, 2022
    Assignee: Visa International Service Association
    Inventors: Vinjith Nagaraja, Nagaveera Venkata Su Tavvala, Jose Rios Trevino, Vamshi Ramarapu, Swapneel Mahajan, Joel Trunick, Shalini Mayor, James Myers, Raymond Brammer, Ireneusz Pazdzierniak, Shashi Velur, Feng Chi Wang, Vincent Hesener
  • Publication number: 20210209574
    Abstract: Embodiments include apparatuses, methods, and systems for performing security protection of association between a user device and a user. A computing system receives from a service provider a notification that an identifier of a user device has been activated in the user device to be associated with a user identifier to replace an existing identifier of the user device associated with the user identifier. The computing system further receives from the user device a request for information associated with the user identifier to be sent to the user device associated with the identifier of the user device. Before sending the requested information to the user device, the computing system verifies the identifier of the user device has been activated by the user by an additional authentication of the user through a communication path between the user and the computing system. Other embodiments may also be described and claimed.
    Type: Application
    Filed: December 9, 2020
    Publication date: July 8, 2021
    Applicant: Visa International Service Association
    Inventors: Vinjith NAGARAJA, Dhaval GANGAR
  • Publication number: 20210185008
    Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.
    Type: Application
    Filed: December 12, 2019
    Publication date: June 17, 2021
    Inventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, JR., Keeshini Manivannan
  • Publication number: 20210105298
    Abstract: Methods and systems for detecting webpages that share malicious content are presented. A first set of webpages that hosts a web account checker is identified. A baseline page structure score and a baseline language score are calculated based on the identified first set of webpages. Content from a second set of webpages is collected and analyzed based on the calculated baseline page structure and the calculated baseline language scores. One or more of the second set of webpages is flagged as malicious based on the analyzing of the content collected from the second set of webpages.
    Type: Application
    Filed: September 14, 2020
    Publication date: April 8, 2021
    Inventors: Vinjith NAGARAJA, Meethil Vijay YADAV, Bradley WARDMAN