Patents by Inventor Arindam Chatterjee
Arindam Chatterjee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190034476Abstract: A system may receive a query configured to access a column in a data table. The data table may be in a flat file in a big data storage format. The system may detect the language type of the query and validate the query against the syntax of the language type. The system may also validate an access permission for data in the data table. The access permission may be stored in a permissions database. The system may generate a temporary table including the column with the temporary table configured to support the language type. The system may execute the query against the temporary table to generate a query result based on the temporary table as though it were the underlying data table. The system may enforce column-level or row-level access permissions by excluding columns or rows from the temporary table.Type: ApplicationFiled: August 20, 2018Publication date: January 31, 2019Applicant: American Express Travel Related Services Company, Inc.Inventors: Shubham Arora, Balaji Balaraman, Sandeep Bose, Arindam Chatterjee, Sastry Durvasula, Manoj Kumar Rana, Nitish Sharma
-
Patent number: 10055444Abstract: A system may receive a query configured to access a column in a data table. The data table may be in a flat file in a big data storage format. The system may detect the language type of the query and validate the query against the syntax of the language type. The system may also validate an access permission for data in the data table. The access permission may be stored in a permissions database. The system may generate a temporary table including the column with the temporary table configured to support the language type. The system may execute the query against the temporary table to generate a query result based on the temporary table as though it were the underlying data table. The system may enforce column-level or row-level access permissions by excluding columns or rows from the temporary table.Type: GrantFiled: December 16, 2015Date of Patent: August 21, 2018Assignee: AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC.Inventors: Shubham Arora, Balaji Balaraman, Sandeep Bose, Arindam Chatterjee, Sastry Durvasula, Manoj Kumar Rana, Nitish Sharma
-
Publication number: 20180121418Abstract: Systems and methods for determining action items from knowledge base for execution of operation. The system receives instructions, present in a knowledge base, which are required to execute one or more operations. Thereafter, the system parses the instructions into one or more sentences and assigns a POS tag for each word in the one or more sentences. Further, the system assigns a predefined class for each of the POS tagged word. Based on the predefined class, the system determines the action items. The action item comprises one or more actions and one or more components on which the one or more actions are to be performed. The present disclosure enables automates systems to easily execute one or more operation based on the action items thereby reducing the delay in performance of the automated system due to complexity in interpreting the instructions.Type: ApplicationFiled: December 7, 2016Publication date: May 3, 2018Inventors: Arindam Chatterjee, Debanjan Chaudhuri, Anasuya Devi Kompella
-
Patent number: 9892218Abstract: A parasitic-aware blockage structure is provided to replace a detailed blockage structure for use in connection with a capacitance extraction operation. The parasitic-aware blockage structure includes one or more parasitic-aware blockage polygons, each representing a plurality of polygons of the detailed blockage structure. The parasitic-aware blockage polygons can be formed by expanding and merging the polygons of the detailed blockage structure. Physical information is associated with each of the parasitic-aware blockage polygons, wherein the physical information defines physical characteristics of the polygons of the detailed blockage structure. Capacitance error information may also be associated with each of the parasitic-aware blockage polygons, specifying capacitive errors of the parasitic-aware blockage polygons with respect to the polygons of the detailed blockage structure.Type: GrantFiled: April 1, 2016Date of Patent: February 13, 2018Assignee: Synopsys, Inc.Inventors: Arthur B. Nieuwoudt, Claude Helmstetter, Arindam Chatterjee
-
Publication number: 20170286576Abstract: A parasitic-aware blockage structure is provided to replace a detailed blockage structure for use in connection with a capacitance extraction operation. The parasitic-aware blockage structure includes one or more parasitic-aware blockage polygons, each representing a plurality of polygons of the detailed blockage structure. The parasitic-aware blockage polygons can be formed by expanding and merging the polygons of the detailed blockage structure. Physical information is associated with each of the parasitic-aware blockage polygons, wherein the physical information defines physical characteristics of the polygons of the detailed blockage structure. Capacitance error information may also be associated with each of the parasitic-aware blockage polygons, specifying capacitive errors of the parasitic-aware blockage polygons with respect to the polygons of the detailed blockage structure.Type: ApplicationFiled: April 1, 2016Publication date: October 5, 2017Inventors: Arthur B. Nieuwoudt, Claude Helmstetter, Arindam Chatterjee
-
Publication number: 20170199896Abstract: A system may read an input file having an input file size and including a first record and a second record. The first and second record may each have a record length. The system may parse the input file into a first split file and a second split file, with the first split file including the first record and the second split file including the second record. The system may distribute the first split file to a first node to generate a first output file and the second split file to a second node to generate a second output file. Any number of additional split files may be distributed to generate any number output files. The system may combine the output files to generate a converted data file.Type: ApplicationFiled: January 13, 2016Publication date: July 13, 2017Applicant: American Express Travel Related Services Company,Inventors: Nitish Sharma, Shubham Arora, Balaji Balaraman, Sandeep Bose, Arindam Chatterjee, Sastry Durvasula, Priya Narayana, Manoj Kumar Rana
-
Publication number: 20170177888Abstract: A system may receive a query configured to access a column in a data table. The data table may be in a flat file in a big data storage format. The system may detect the language type of the query and validate the query against the syntax of the language type. The system may also validate an access permission for data in the data table. The access permission may be stored in a permissions database. The system may generate a temporary table including the column with the temporary table configured to support the language type. The system may execute the query against the temporary table to generate a query result based on the temporary table as though it were the underlying data table. The system may enforce column-level or row-level access permissions by excluding columns or rows from the temporary table.Type: ApplicationFiled: December 16, 2015Publication date: June 22, 2017Applicant: American Express Travel Related Services Co., Inc.Inventors: Shubham Arora, Balaji Balaraman, Sandeep Bose, Arindam Chatterjee, Sastry Durvasula, Manoj Kumar Rana, Nitish Sharma
-
Publication number: 20170147729Abstract: A method for floating node reduction uses a capacitance matrix that specifies coupling capacitances between signal nodes and floating nodes of an interconnect structure. Random walks are performed from a first signal node to the other signal nodes, wherein each of the random walks traverses one or more of the floating nodes. Each of the random walks is directed based on probabilities derived from the coupling capacitances of the capacitance matrix. A count is maintained for each of the other signal nodes, wherein each count specifies a number of the random walks that end on the corresponding signal node. The indirect coupling capacitance from the first signal node to a second signal node is selected to correspond with the total indirect coupling capacitance of the first signal node, times the count associated with the second signal node, divided by the total number of random walks.Type: ApplicationFiled: November 19, 2015Publication date: May 25, 2017Inventors: Alexei Svizhenko, Arindam Chatterjee, Arthur B. Nieuwoudt
-
Patent number: 9594727Abstract: A method for performing parasitic capacitance extraction of an integrated circuit (IC) design includes: defining a Gaussian surface around an origin net of the IC design; partitioning the Gaussian surface into a plurality of regions; performing an initial plurality of random walks from each region using a Monte Carlo field solver; and dynamically allocating an additional plurality of random walks among the plurality of regions, wherein the allocation is based on statistical errors associated with the initial plurality of random walks for each of the regions. Results from the random walks are averaged to estimate parasitic capacitance of the origin net. The method may include performing the random walks for each region in pairs, wherein a first random walk of the pair is selected in accordance with an anti-symmetric probability function, and a second random walk of the pair is antithetic to the first random walk of the pair.Type: GrantFiled: December 22, 2014Date of Patent: March 14, 2017Assignee: Synopsys, Inc.Inventors: Alexei Svizhenko, Arindam Chatterjee, Joseph Gregory Rollins
-
Publication number: 20160180007Abstract: A method for performing parasitic capacitance extraction of an integrated circuit (IC) design includes: defining a Gaussian surface around an origin net of the IC design; partitioning the Gaussian surface into a plurality of regions; performing an initial plurality of random walks from each region using a Monte Carlo field solver; and dynamically allocating an additional plurality of random walks among the plurality of regions, wherein the allocation is based on statistical errors associated with the initial plurality of random walks for each of the regions. Results from the random walks are averaged to estimate parasitic capacitance of the origin net. The method may include performing the random walks for each region in pairs, wherein a first random walk of the pair is selected in accordance with an anti-symmetric probability function, and a second random walk of the pair is antithetic to the first random walk of the pair.Type: ApplicationFiled: December 22, 2014Publication date: June 23, 2016Inventors: Alexei Svizhenko, Arindam Chatterjee, Joseph Gregory Rollins
-
Publication number: 20150324511Abstract: A design layout is obtained that includes floating fill shapes and signal shapes. Capacitance of the signal shapes is calculated. A simple model is used to calculate a first subset of fill shapes which contribute capacitance to the signal shapes. A capacitance model selected to meet an acceptable error level using minimum computational requirements is then selected from a set of capacitance models. The selected capacitance model is then used to extract the capacitance contribution from the first subset of fill shapes. A second subset of fill shapes is then created based on the extracted capacitance values, and if the estimated capacitance contribution is significant, the capacitance of the second subset extracted using the selected capacitance model. Additional iterations are performed for additional signal shapes.Type: ApplicationFiled: May 9, 2014Publication date: November 12, 2015Applicant: Synopsys, Inc.Inventors: Arthur Nieuwoudt, Arindam Chatterjee, William Patrick Pinello
-
Patent number: 9166797Abstract: Systems and methods that establish a secured compartment that manages sensitive user transactions/information on a user's machine. The secured compartment qualifies user interaction with the machine, and separates such qualified interaction from other user activity on the machine. A user is switched to such secured compartment upon occurrence of a predetermined event, such as in form of: an explicit request (e.g., a secure attention sequence); an implicit request (e.g., inference of user activities); and presence of a peripheral device that is bound to the secured compartment (e.g., a USB)—wherein such actions typically cannot be generated by an application running outside the secured compartment.Type: GrantFiled: October 24, 2008Date of Patent: October 20, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Thekkthalackal Varugis Kurien, Cormac E. Herley, Alice Jane Bernheim Brush, Daniel C. Robbins, Arindam Chatterjee, Scott Field
-
Patent number: 8661534Abstract: A security system is provided for use with computer systems. In various embodiments, the security system can analyze the state of security of one or more computer systems to determine whether the computer systems comply with expressed security policies and to remediate the computer systems so that they conform with the expressed security policies. In various embodiments, the security system can receive compliance documents, determine whether one or more computer systems comply with portions of security policies specified in the compliance documents, and take actions specified in the compliance documents to cause the computer systems to comply with the specified security policies. The security system may provide a common, unified programming interface that applications or tools can employ to verify or enforce security policies.Type: GrantFiled: June 26, 2007Date of Patent: February 25, 2014Assignee: Microsoft CorporationInventors: Arindam Chatterjee, Anders Samuelsson, Nils Dussart, Charles G. Jeffries, Amit R. Kulkarni
-
Patent number: 8533841Abstract: Systems and methods that automatically generate remediation processes such as acts performed as part of a benchmark model, to improve and update compliance of a machine with security policies compliance. A remediation component can automatically determine processes that are required to change and increase compliance of a machine with a security policy, and hence improve security level thereof.Type: GrantFiled: April 2, 2007Date of Patent: September 10, 2013Assignee: Microsoft CorporationInventors: Amit Raghunath Kulkarni, Arindam Chatterjee, Tristan Brown
-
Patent number: 8332909Abstract: Software restriction policy rules can be automatically generated by parsing through a specified metadata source and generating the rules in accordance with indicated preferences. Metadata sources can include storage locations, such as folders, in which case rules for each executable file in the folder can be generated. Metadata sources can also include trusted publisher stores, installation logs, difference files, and other like data sources. Indicated preferences can select from among rules based on the publisher, for files that are signed, or rules based on hashes or path information for unsigned files. In generating rules to prevent the execution of specified files, if an optimized set of rules is desired, a check can be made to determine if an exception to an existing rule can be generated instead of a new rule. The automated parsing of the indicated metadata source can provide for both completeness and correctness.Type: GrantFiled: December 16, 2008Date of Patent: December 11, 2012Assignee: Microsoft CorporationInventors: Arindam Chatterjee, Varugis Kurien, Bental Tagor, Sanjeev Dwivedi
-
Publication number: 20120216240Abstract: Data security is implemented through a query based policy constraining a primary table. Nested tables inherit the security policy by implementing the policy queries of the primary table. Operations on nested tables such as join actions execute the security policy queries once due to inheritance from the primary table therefore optimizing query modeling. A security policy may respond to a context or a role by executing queries responsive to the context.Type: ApplicationFiled: February 17, 2011Publication date: August 23, 2012Applicant: MICROSOFT CORPORATIONInventors: Ramakanthachary Gottumukkala, Vijay Kurup, Srinivasan Parthasarathy, Edvardas Budrys, Tanmoy Dutta, Arindam Chatterjee
-
Patent number: 8161560Abstract: A security health reporting system provides an application program interface (API) for use by independent software vendors (ISVs) to extend the security health reporting capabilities of the security health reporting system. An ISV security solution can register with the security health reporting system, create a schema that describes a new security class, and use the API to publish an instance of the schema for the new security class with the security health reporting system. When an instance of a schema for a new security class is published, the security health reporting system creates the new security class, and recognizes the definition for the security class within the security health reporting system. Registered ISV security solutions can then use the published schema to report their health statuses for the new security class.Type: GrantFiled: February 9, 2011Date of Patent: April 17, 2012Assignee: Microsoft CorporationInventors: Charles G. Jeffries, Doug Coburn, Barry Gerhardt, Randall K. Winjum, Arindam Chatterjee
-
Publication number: 20110131659Abstract: A security health reporting system provides an application program interface (API) for use by independent software vendors (ISVs) to extend the security health reporting capabilities of the security health reporting system. An ISV security solution can register with the security health reporting system, create a schema that describes a new security class, and use the API to publish an instance of the schema for the new security class with the security health reporting system. When an instance of a schema for a new security class is published, the security health reporting system creates the new security class, and recognizes the definition for the security class within the security health reporting system. Registered ISV security solutions can then use the published schema to report their health statuses for the new security class.Type: ApplicationFiled: February 9, 2011Publication date: June 2, 2011Applicant: Microsoft CorporationInventors: Charles G. Jeffries, Doug Coburn, Barry Gerhardt, Randall K. Winjum, Arindam Chatterjee
-
Patent number: 7908659Abstract: A security health reporting system provides an application program interface (API) for use by independent software vendors (ISVs) to extend the security health reporting capabilities of the security health reporting system. An ISV security solution can register with the security health reporting system, create a schema that describes a new security class, and use the API to publish an instance of the schema for the new security class with the security health reporting system. When an instance of a schema for a new security class is published, the security health reporting system creates the new security class, and recognizes the definition for the security class within the security health reporting system. Registered ISV security solutions can then use the published schema to report their health statuses for the new security class.Type: GrantFiled: November 10, 2006Date of Patent: March 15, 2011Assignee: Microsoft CorporationInventors: Charles G. Jeffries, Doug Coburn, Barry Gerhardt, Randall K. Winjum, Arindam Chatterjee
-
Publication number: 20100154026Abstract: Software restriction policy rules can be automatically generated by parsing through a specified metadata source and generating the rules in accordance with indicated preferences. Metadata sources can include storage locations, such as folders, in which case rules for each executable file in the folder can be generated. Metadata sources can also include trusted publisher stores, installation logs, difference files, and other like data sources. Indicated preferences can select from among rules based on the publisher, for files that are signed, or rules based on hashes or path information for unsigned files. In generating rules to prevent the execution of specified files, if an optimized set of rules is desired, a check can be made to determine if an exception to an existing rule can be generated instead of a new rule. The automated parsing of the indicated metadata source can provide for both completeness and correctness.Type: ApplicationFiled: December 16, 2008Publication date: June 17, 2010Applicant: MICROSOFT CORPORATIONInventors: Arindam Chatterjee, Varugis Kurien, Bental Tagor, Sanjeev Dwivedi