Patents by Inventor Ashutosh Saxena

Ashutosh Saxena has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9953171
    Abstract: The present invention describes a system and method for tokenization of data. The system includes a receiver configured to receive a request for tokenization. The request for tokenization comprises an input data to be tokenized. The system also includes a parser configured to determine one or more datatype from the input data. The system further includes a trained artificial neural network to generate a token for the input data based on a tokenization technique corresponding to the datatype of the input data.
    Type: Grant
    Filed: August 26, 2015
    Date of Patent: April 24, 2018
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Shikha Gupta, Ina Jain, Harigopal K. B. Ponnapalli
  • Patent number: 9934542
    Abstract: The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field.
    Type: Grant
    Filed: September 22, 2014
    Date of Patent: April 3, 2018
    Assignee: Infosys Limited
    Inventors: Nitin Singh Chauhan, Ashutosh Saxena, Krishna Chaitanya Telikicherla
  • Patent number: 9805019
    Abstract: The described technologies can be used for masking one or more heterogeneous digital contents. One or more heterogeneous digital contents can be received from one or more data sources. Further, the received one or more heterogeneous digital contents can be parsed by a first parser unit to obtain a portable format data. The portable format data can be a homogeneous digital content arranged in one or more layers. Further, masking of the portable format data can be performed by a masking unit. A masking methodology can be applied based on selection of one or more rules from a plurality of rules to obtain a masked portable format data. Further, reverse-parsing of the masked portable format data can be performed by a second parser unit to obtain a masked data. Structure of the received one or more heterogeneous digital contents remains preserved.
    Type: Grant
    Filed: September 23, 2014
    Date of Patent: October 31, 2017
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Shikha Gupta, Upagupta Mandal
  • Patent number: 9805350
    Abstract: The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one offline Digital Rights Management (DRM) user by a DRM server. This invention involves establishing the trust relationship among the DRM server, DRM client, user's machine and the end user by means of digital certificate. The server generates protected digital content by means of using a standard encryption algorithm. The invention further involves determining whether a license for accessing the protected file is requested by the legitimate user, and if so, generating a license consisting the user rights and the protected decryption key to be downloaded by legitimate user. The DRM client decrypts the protected file using a decryption key of the license, and renders the content to the end user by calling the appropriate and customized viewer during consumption.
    Type: Grant
    Filed: July 12, 2013
    Date of Patent: October 31, 2017
    Assignee: Infosys Limited
    Inventors: Ravi Sankar Veerubhotla, Ashutosh Saxena, Shikha Gupta, Harigopal K. B. Ponnapalli
  • Patent number: 9792417
    Abstract: Methods for controlling software usage are described. Methods comprise receiving a request for at least one software application license, wherein the request comprises a user count, generating, by the computing apparatus, one or more sets of license data in response to the request, wherein a set of license data comprises at least one of the user count and a corresponding sequence number, signing each of the one or more sets of license data digitally with a private key, embedding a set of signed license data into the software application, receiving user identification data from a user through an input interface associated with the computing apparatus, and validating the user identification data. Additional embodiments incorporate mechanisms for license renewal, user registration and user authentication by means of associating a range of user identification data with the license data.
    Type: Grant
    Filed: June 14, 2013
    Date of Patent: October 17, 2017
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Harigopal K. B. Ponnapalli, Malakondayya Choudary Gorantla, Ina Jain
  • Patent number: 9740726
    Abstract: The technique relates to a method and apparatus for dynamic destruction of data in a remote data storage platform. This involves receiving a first set of data records with random values and then updating the random values associated with the subsets of the first set of data records into actual values through one or more update operations. After sequential steps of updates, a second set of data records with actual values are obtained. After working of this data for a period of time the owner of the data again begins updating the actual values associated with the subset of the second set of data records into random values. When all the data records are updated to random values the owner of the data successfully ends the Service Level Agreement period.
    Type: Grant
    Filed: March 2, 2015
    Date of Patent: August 22, 2017
    Assignee: Infosys Limited
    Inventors: Sravan R, Mithun Paul, Ashutosh Saxena
  • Patent number: 9654295
    Abstract: The technologies relate to a system and method for electronic signature agnostic verification. The method involves receiving a request to verify an electronic signature, thereafter validating an integrity of the electronic signature on the basis of one or more predefined validation parameters and validation fields, then analyzing the validated electronic signature to obtain one or more features of the validated electronic signature, further decoding the analyzed electronic signature using one or more decode parameters, and finally comparing the decoded electronic signature with a predefined value received from one or more sources, to check the correctness of the decoded electronic signature. The technique supports various electronic signature formats and electronic signature standards.
    Type: Grant
    Filed: September 3, 2015
    Date of Patent: May 16, 2017
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Shikha Gupta, Harigopal K. B. Ponnapalli
  • Patent number: 9641617
    Abstract: The present invention provides a method and system for verifying integrity of cloud data using unconnected trusted device. The method involves requesting encrypted data though a terminal from a metadata offsite location on a cloud storage then entering encrypted data into an unconnected trusted device thereafter obtaining sentinel data from one or more predefined sentinel locations in encrypted data then requesting original data from the cloud storage through the terminal from the unconnected trusted device thereafter comparing sentinel data and original data for integrity and finally displaying the results.
    Type: Grant
    Filed: December 5, 2014
    Date of Patent: May 2, 2017
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Nitin Singh Chauhan, Sravan Kumar Rondla
  • Patent number: 9582609
    Abstract: The invention provides a method, a system, and a computer program product checking for human interaction dynamically to enable access to a resource in a computing environment. The method comprises collecting a plurality of objects. For each object, a plurality of properties is defined. A set of objects is selected from the plurality of collected objects. Thereafter, queries are generated based on the properties of the selected objects. Queries which have a non-unique or ambiguous response are removed. One of the remaining queries is randomly selected. The answer to the query, based on properties of the selected objects, is stored. The selected set of objects and the selected query are presented to the user who is trying to gain access to the resource. The user is enabled access to the resource if the response received from the user is validated against the stored answer of the selected query.
    Type: Grant
    Filed: March 25, 2011
    Date of Patent: February 28, 2017
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Rajiv Tripathi, Aparajith Srinivasan Vangal, Gurram Karthik
  • Patent number: 9563178
    Abstract: The present invention describes a system, method and computer product program for computation of alarm time. The system includes an alarm device for generating an alarm. The system also includes an alarm application hosted on the alarm device for providing at least one user defined alarm condition. The system further includes an alarm engine for receiving the user defined alarm condition, initiating a probe to receive data from data sources, processing the received alarm conditions and the received data to compute the alarm time and next probe time repeating iteratively until the next probe time is greater than the computed alarm time. The system generates alarm at the computed alarm time when the next probe time becomes greater than the alarm time.
    Type: Grant
    Filed: September 23, 2014
    Date of Patent: February 7, 2017
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Nitin Singh Chauhan
  • Publication number: 20160248847
    Abstract: A first input is received from a plurality of sensors. A first state including a first location based on the first input is determined. The first state is associated with a first probability. A second input is received from the plurality of sensors. A second state including a second location is determined based on the second input associated with a second probability. It is determined that the second state corresponds to an actual state based on a transition model and the second probability. The transition model associates the first state with the second state and indicates a likelihood of a transition from the first state to the second state. A rule to change a state of at least one network connected device is triggered based on the second state.
    Type: Application
    Filed: May 29, 2015
    Publication date: August 25, 2016
    Inventors: Ashutosh Saxena, Hema Swetha Koppula, Chenxia Wu, Ozan Sener
  • Publication number: 20160087803
    Abstract: The technologies relate to a system and method for electronic signature agnostic verification. The method involves receiving a request to verify an electronic signature, thereafter validating an integrity of the electronic signature on the basis of one or more predefined validation parameters and validation fields, then analyzing the validated electronic signature to obtain one or more features of the validated electronic signature, further decoding the analyzed electronic signature using one or more decode parameters, and finally comparing the decoded electronic signature with a predefined value received from one or more sources, to check the correctness of the decoded electronic signature. The technique supports various electronic signature formats and electronic signature standards.
    Type: Application
    Filed: September 3, 2015
    Publication date: March 24, 2016
    Applicant: INFOSYS LIMITED
    Inventors: Ashutosh Saxena, Shikha Gupta, Harigopal K.B. Ponnapalli
  • Publication number: 20160085971
    Abstract: The present invention describes a system and method for tokenization of data. The system includes a receiver configured to receive a request for tokenization. The request for tokenization comprises an input data to be tokenized. The system also includes a parser configured to determine one or more datatype from the input data. The system further includes a trained artificial neural network to generate a token for the input data based on a tokenization technique corresponding to the datatype of the input data.
    Type: Application
    Filed: August 26, 2015
    Publication date: March 24, 2016
    Inventors: Ashutosh Saxena, Shikha Gupta, Ina Jain, Harigopal K.B. Ponnapalli
  • Patent number: 9280669
    Abstract: The present invention provides a method and system for calculating a security index of an application hosted in a cloud environment. The application is mapped to a cloud service provider of the cloud environment, and a set of security controls and a set of security metrics applicable for the application are identified. The set of security controls and the set of security metrics are encapsulated into a security profile object by a security control module. A set of values of the set of security metrics are retrieved from the cloud service provider, by a cloud probe module, and the security index of the application is calculated.
    Type: Grant
    Filed: May 10, 2013
    Date of Patent: March 8, 2016
    Assignee: Infosys Limited
    Inventors: Nitin Singh Chauhan, Ashutosh Saxena
  • Patent number: 9258306
    Abstract: A method, non-transitory computer readable medium, and access manager device includes providing an initial challenge to a client computing device requesting access to a service. The initial challenge includes one or more of one or more objects, one or more indicative answers, and one or more questions based on the one or more objects. At least one challenge response to the initial challenge is received from the client computing device. A determination is when there is a match between the at least one challenge response to the initial challenge and corresponding response data associated with the initial challenge. One or more actions with respect to the request to access the service are performed based on the determination.
    Type: Grant
    Filed: May 10, 2013
    Date of Patent: February 9, 2016
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Sravan Kumar Rondla
  • Patent number: 9245118
    Abstract: A method, non-transitory computer readable medium, and apparatus that establishes a connection with a host computing device. One or more processes running on the host computing device are identified. One or more hooking operations performed in the one or more identified processes are identified. One or more suspected key logging actions are identified from the one or more identified hooking operations based on one or more of a first set of rules and output.
    Type: Grant
    Filed: July 17, 2013
    Date of Patent: January 26, 2016
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Harigopal K. B. Ponnapalli, Anand S. Nair
  • Patent number: 9213821
    Abstract: A method & system for human interactive proof (HIP) is provided. A user is provided to respond a query linked to a logical captcha object or an analytical captcha object. Upon receiving inputs from the user, the correct information of the said captcha & the user's input is compared. If the user's input and the correct information of the captcha object matches then the user is authenticated as human, else the user is authenticated as not a human.
    Type: Grant
    Filed: February 24, 2010
    Date of Patent: December 15, 2015
    Assignee: Infosys Limited
    Inventors: Vishal Krishna Saxena, Ashutosh Saxena
  • Publication number: 20150269364
    Abstract: The present disclosure provides method for accessing digital web content. It provides for selective access rights for users, to a web content. When the user tries to retrieve the data, the system checks for the rights available to the user, and accordingly implements the access before providing the content.
    Type: Application
    Filed: March 19, 2015
    Publication date: September 24, 2015
    Inventors: Shikha Gupta, Ravi Sankar Veerubhotla, Ashutosh Saxena, Harigopal K.B. Ponnapalli
  • Publication number: 20150261964
    Abstract: The technique relates to a method and apparatus for dynamic destruction of data in a remote data storage platform. This involves receiving a first set of data records with random values and then updating the random values associated with the subsets of the first set of data records into actual values through one or more update operations. After sequential steps of updates, a second set of data records with actual values are obtained. After working of this data for a period of time the owner of the data again begins updating the actual values associated with the subset of the second set of data records into random values. When all the data records are updated to random values the owner of the data successfully ends the Service Level Agreement period.
    Type: Application
    Filed: March 2, 2015
    Publication date: September 17, 2015
    Inventors: Sravan R, Mithun Paul, Ashutosh Saxena
  • Publication number: 20150262084
    Abstract: The technique relates to a method for defending static and dynamic reverse engineering of software license control and devices thereof. To defend static reverse engineering of software license control the licensed application is wrapped with encryption wrapper, wherein the encryption wrapper encrypts the application with a first password. Then, at the time of executing the application, a password prompt is generated. Upon receiving the first password the application is decrypted. At the time of closing the application after execution, another password prompt is generated to create the second password and then the application is re-encrypted with the second password. To defend dynamic reverse engineering of software license control one or more licensing conditions of the licensed application is tested based on control file information, a random number generation or verification point rules.
    Type: Application
    Filed: March 2, 2015
    Publication date: September 17, 2015
    Inventors: Ashutosh Saxena, Ravi Sankar Veerubhotla, Harigopal K.B. Ponnapalli