Patents by Inventor Aditya Anand
Aditya Anand has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240009165Abstract: Malaria remains a major concern of morbidity and mortality. Despite treating infected individuals with artemisinin-based combination therapies (ACTs), cerebral and severe malaria cause enormous mortality in children and adults. The only treatment option is parenteral administration of artemisinin or quinine with supportive symptomatic therapies. However, the fatality rate remains high despite parasite clearance emphasizing the need of adjunct therapy to prevent malaria mortality. In this invention, heme synthesized in the malaria parasite is shown to be associated with parasite virulence, disease severity and cerebral pathogenesis. Parasite heme enhances the formation of hemozoin—a parasite molecule associated with cerebral and severe malaria. Griseofulvin prevents experimental cerebral malaria (ECM) by inhibiting parasite heme synthesis and hemozoin formation, without affecting parasite growth. Griseofulvin exhibits synergy with arteether—the principal component of ACTs and prevents ECM.Type: ApplicationFiled: November 15, 2021Publication date: January 11, 2024Inventors: Viswanathan Arun NAGARAJ, Govindarajan PADMANABAN, Manjunatha Chandana SHETTY, Aditya ANAND, Sourav GHOSH
-
Publication number: 20230388113Abstract: Systems and methods for dynamically encrypting requests in accordance with embodiments of the invention are disclosed. In one or more embodiments, a computer-implemented method includes obtaining an updated private key been issued for a third-party service, storing, in a caching system, a routing entry comprising a security token for the third-party service, receiving a request to access the third-party service, and redirecting the client device to the third-party service.Type: ApplicationFiled: August 10, 2023Publication date: November 30, 2023Applicant: Capital One Services, LLCInventors: Aditya Anand, Nitant Bhartia, Saji Asok, Zhi Zheng, Andrew Chen, Ghulam Sallman, Elvin Z. Lee
-
Patent number: 11764958Abstract: Systems and methods for dynamically encrypting requests in accordance with embodiments of the invention are disclosed. In one embodiment, a computer-implemented method includes obtaining a notification indicating an updated private key has been issued for a third-party service, obtaining, based on the notification, an updated public encryption key associated with the third-party service, generating a security token for the third-party service, the security token associated with a caching system, obtaining, from a secured database and based on the security token, the updated private key, storing, using the caching system, a routing entry comprising the security token and encrypted based on the updated private key, receiving, from a client device, a request to access the third-party service, authenticating the request with the third-party service using the routing entry, and redirecting the client device to the third-party service.Type: GrantFiled: April 6, 2021Date of Patent: September 19, 2023Assignee: Capital One Services, LLCInventors: Aditya Anand, Nitant Bhartia, Saji Asok, Zhi Zheng, Andrew Chen, Ghulam Sallman, Elvin Z. Lee
-
Publication number: 20220321338Abstract: Systems and methods for dynamically encrypting requests in accordance with embodiments of the invention are disclosed. In one embodiment, a computer-implemented method includes obtaining a notification indicating an updated private key has been issued for a third-party service, obtaining, based on the notification, an updated public encryption key associated with the third-party service, generating a security token for the third-party service, the security token associated with a caching system, obtaining, from a secured database and based on the security token, the updated private key, storing, using the caching system, a routing entry comprising the security token and encrypted based on the updated private key, receiving, from a client device, a request to access the third-party service, authenticating the request with the third-party service using the routing entry, and redirecting the client device to the third-party service.Type: ApplicationFiled: April 6, 2021Publication date: October 6, 2022Inventors: Aditya Anand, Nitant Bhartia, Saji Asok, Zhi Zheng, Andrew Chen, Ghulam Sallman, Elvin Z. Lee
-
Publication number: 20220108334Abstract: Systems and methods for data analytics are described. The systems and methods include receiving attribute data for at least one user, identifying a plurality of precursor events causally related to an observable target interaction with the at least one user, wherein at least one of the precursor events comprises a marketing event, predicting a probability for each of the precursor events based on the attribute data using a neural network trained with a first loss function comparing individual level training data for the observable target interaction, and performing the marketing event directed to the at least one user based at least in part on the predicted probabilities.Type: ApplicationFiled: October 1, 2020Publication date: April 7, 2022Inventors: AYUSH CHAUHAN, Aditya Anand, Sunny Dhamnani, Shaddy Garg, Shiv Kumar Saini
-
Patent number: 9330115Abstract: A computer-implemented method, system, and program product for automatically reviewing a mapping between information models. The method includes: receiving a mapping between an element in the first information model to an element in the second information model. Each element is associated with an element identifier and an element value, and the mapping signifies a relationship between the element in the first information model and the element in the second information model. The method further includes comparing the received mapping against one or more known indications of suspicious mappings to determine if the received mapping resembles one of the indications of suspicious mappings. If the received mapping is determined to be suspicious, identifying the received mapping as one that requires review.Type: GrantFiled: August 6, 2010Date of Patent: May 3, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brian Patrick Byrne, Achille Belly Fokoue-Nkoutche, Aditya Anand Kalyanpur, Kavitha Srinivas, Min Wang
-
Patent number: 9218334Abstract: Embodiments of the present teachings relate to systems and methods for generating pronounceable domain names. The method includes proving a list of character strings; filtering the list of character strings through a first filter based on a phonetic model to produce a first filtered list of character strings; filtering the list of character strings through a second filter based on a character order mode to produce a second filtered list of character strings; and generating, by a processor, a list of pronounceable domain names based on the first filtered list of character strings and the second filtered list of character strings.Type: GrantFiled: November 8, 2012Date of Patent: December 22, 2015Assignee: VERISIGN, INC.Inventors: Aditya Anand Mugali, Jr., Andrew W. Simpson, Scott King Walker
-
Patent number: 9172716Abstract: Systems and methods for analyzing domain name system (“DNS”) lookup data perform operations that may include: calculating traffic scores for a network address based on a set of DNS lookup data associated with the network address, where the set of DNS lookup data includes a plurality of query records having one or more queried network addresses; calculating a first variance and a second variance for the network address based on the traffic scores for the network address; and determining a rank of the network address based on the first and second variances.Type: GrantFiled: November 8, 2012Date of Patent: October 27, 2015Assignee: VERISIGN, INCInventors: Aditya Anand Mugali, Jr., Andrew W. Simpson, Scott King Walker
-
Publication number: 20120036110Abstract: A computer-implemented method, system, and program product for automatically reviewing a mapping between information models. The method includes: receiving a mapping between an element in the first information model to an element in the second information model. Each element is associated with an element identifier and an element value, and the mapping signifies a relationship between the element in the first information model and the element in the second information model. The method further includes comparing the received mapping against one or more known indications of suspicious mappings to determine if the received mapping resembles one of the indications of suspicious mappings. If the received mapping is determined to be suspicious, identifying the received mapping as one that requires review.Type: ApplicationFiled: August 6, 2010Publication date: February 9, 2012Applicant: IBM CorporationInventors: Brian Patrick Byrne, Achille Belly Fokoue-Nkoutche, Aditya Anand Kalyanpur, Kavitha Srinivas, Min Wang