Patents by Inventor Ashutosh Saxena

Ashutosh Saxena has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9098913
    Abstract: Given an image and an aligned depth map of an object, the invention predicts the 3D location, 3D orientation and opening width or area of contact for an end of arm tooling (EOAT) without requiring a physical model.
    Type: Grant
    Filed: May 13, 2013
    Date of Patent: August 4, 2015
    Assignee: Cornell University
    Inventors: Yun Jiang, John R. Amend, Jr., Hod Lipson, Ashutosh Saxena, Stephen Moseson
  • Publication number: 20150180835
    Abstract: The present invention provides a method and system for verifying integrity of cloud data using unconnected trusted device. The method involves requesting encrypted data though a terminal from a metadata offsite location on a cloud storage then entering encrypted data into an unconnected trusted device thereafter obtaining sentinel data from one or more predefined sentinel locations in encrypted data then requesting original data from the cloud storage through the terminal from the unconnected trusted device thereafter comparing sentinel data and original data for integrity and finally displaying the results.
    Type: Application
    Filed: December 5, 2014
    Publication date: June 25, 2015
    Inventors: Ashutosh Saxena, Nitin Singh Chauhan, Sravan Kumar Rondla
  • Publication number: 20150172310
    Abstract: A method and a system to identify key logging activities is described. The method comprises triggering of at least one cloud computing network by opening of at least one browser of one or more digital device, generating of at least one proof by the cloud computing network and sending the generated proof to the sanitizer, triggering of the sanitizer by opening of the browser of the digital device to generate one or more random sequence of keystrokes, generating at least one malicious list by the sanitizer by capturing the system processes that capture the randomly generated keystrokes, updating the cloud computing network by the sanitizer with the generated malicious list, retrieving of proof by each of the system processes, verifying of the fetched proof of the system process by the proof checker and updating the cloud computing network with the restricted system processes by the proof checker.
    Type: Application
    Filed: September 23, 2014
    Publication date: June 18, 2015
    Applicant: Infosys Limited
    Inventors: Ashutosh Saxena, Harigopal K.B. Ponnapalli, Krishna Chaitanya Telikicherla
  • Publication number: 20150169882
    Abstract: The technique relates to a system and method for providing graphical dynamic user authentication and device access. The method involves maintaining a database in an electronic device having plurality of entities in a plurality of fields then prompting at least one user to generate at least one action rule at the time of first usage of the electronic device by selecting an entity among the plurality of entities from one or more of the plurality of fields thereafter storing the at least one action rule in a repository of the electronic device then prompting the at least one user to apply the at least one action rule at the time of unlocking and finally granting the at least one user an access to the electronic device if the at least one applied action successfully passes the rule identical to the at least one stored action rule for the user.
    Type: Application
    Filed: September 23, 2014
    Publication date: June 18, 2015
    Applicant: Infosys Limited
    Inventors: Ashutosh Saxena, Sravan Kumar Rondla
  • Publication number: 20150169540
    Abstract: A system and method for masking one or more heterogeneous digital contents is provided. The present invention includes receiving the one or more heterogeneous digital contents from one or more data sources. Further, the received one or more heterogeneous digital contents can be parsed by a first parser unit to obtain a portable format data. The portable format data can be a homogeneous digital content arranged in one or more layers. Further, masking of the portable format data can be performed by a masking unit. A masking methodology can be applied based on selection of one or more rules from a plurality of rules to obtain a masked portable format data. Further, reverse-parsing of the masked portable format data can be performed by a second parser unit to obtain a masked data. Structure of the received one or more heterogeneous digital contents remains preserved.
    Type: Application
    Filed: September 23, 2014
    Publication date: June 18, 2015
    Applicant: Infosys Limited
    Inventors: Ashutosh Saxena, Shikha Gupta, Upagupta Mandal
  • Patent number: 9032532
    Abstract: The present invention provides a method and system for calculating a security index of an application hosted in a cloud environment. The application is mapped to a cloud service provider of the cloud environment, and a set of security controls and a set of security metrics applicable for the application are identified. The set of security controls and the set of security metrics are encapsulated into a security profile object by a security control module. A set of values of the set of security metrics are retrieved from the cloud service provider, by a cloud probe module, and the security index of the application is calculated.
    Type: Grant
    Filed: May 10, 2013
    Date of Patent: May 12, 2015
    Assignee: Infosys Limited
    Inventors: Nitin Singh Chauhan, Ashutosh Saxena
  • Publication number: 20150127546
    Abstract: Techniques for providing internet services to a user through a toll free connection are provided. The techniques include receiving, from an Internet Access Point (IAP), a request for the internet services through the toll free connection provided by a Cloud Service Provider (CSP), wherein the CSP is selected by the user from a plurality of CSPs. Access credentials are received from IAP and are forwarded to the selected CSP. A token is received from the CSP if the user is authenticated by the CSP based on the access credentials. The token is sent to the IAP wherein the token is used by the user to access the Internet services through the toll free connection.
    Type: Application
    Filed: September 22, 2014
    Publication date: May 7, 2015
    Inventors: Ashutosh Saxena, Nitin Singh Chauhan
  • Patent number: 9009800
    Abstract: A communication system and method are disclosed for establishing a secure communication channel including: a server for generating and storing a first instance of a unique personalized client application associated with a first-time user on the server, a client terminal for the user to communicate with the server over a communication channel and a standalone computing device having a second instance of the unique personalized application. The user authenticates the server based on a first dynamic identifier (DI-1) generated by the first instance of the unique personalized client application and the server authenticates the user based on a second dynamic identifier (DI-2) generated by the second instance of the unique personalized client application.
    Type: Grant
    Filed: September 30, 2010
    Date of Patent: April 14, 2015
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Harigopal K. B. Ponnapalli
  • Patent number: 9009628
    Abstract: A method for processing information fed by a user via an inputting means is provided. The method enables, firstly, receiving a set of directional elements via a user interface. The set of directional elements represent textual or non-textual information fed by the user. Secondly, the method enables interpreting the set of directional elements. The set of directional elements are identified as a combination of motion of the inputting means on the user interface and one or more inputs from the inputting means. Further, the method enables converting the directional elements into a sequence and translating the sequence into the textual or non-textual information using a mapping format. The mapping format corresponds to a predetermined mapping format or a new mapping format. Finally, the method enables rendering the textual or non-textual information on the user interface in the form of one or more symbols.
    Type: Grant
    Filed: May 27, 2010
    Date of Patent: April 14, 2015
    Assignee: Infosys Limited
    Inventors: Kaushal Saxena, Ashutosh Saxena
  • Publication number: 20150085626
    Abstract: The present invention describes a system, method and computer product program for computation of alarm time. The system includes an alarm device for generating an alarm. The system also includes an alarm application hosted on the alarm device for providing at least one user defined alarm condition. The system further includes an alarm engine for receiving the user defined alarm condition, initiating a probe to receive data from data sources, processing the received alarm conditions and the received data to compute the alarm time and next probe time repeating iteratively until the next probe time is less than the computed alarm time. The system generates alarm at the computed alarm time when the next probe time becomes greater than the alarm time.
    Type: Application
    Filed: September 23, 2014
    Publication date: March 26, 2015
    Inventors: Ashutosh Saxena, Nitin Singh Chauhan
  • Publication number: 20150088777
    Abstract: The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field.
    Type: Application
    Filed: September 22, 2014
    Publication date: March 26, 2015
    Inventors: Nitin Singh Chauhan, Ashutosh Saxena, Krishna Chaitanya T
  • Patent number: 8881224
    Abstract: A system and method for presenting on-demand masking of data as a software service in a distributed environment is provided. An application hosted on a computing device receives request for access to application data from a user. Credentials of the user are first validated in order to determine whether the user is authorized to access the requested application data. For an authorized user, a category of the user is determined to ascertain whether the user is privileged to obtain full access. In case the user is a privileged user, unmasked application data is fetched from a database utility and provided to the user. In case the user is not a privileged user, application data access request is transferred to a data masking service. Application data is fetched from database utility, masked based on pre-defined masking rules and provided to the user.
    Type: Grant
    Filed: October 11, 2010
    Date of Patent: November 4, 2014
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Vishal Krishna Saxena, Kaushal Saxena, Surni Kumar, Mithun Paul
  • Patent number: 8839441
    Abstract: A method and system for adaptive vulnerability scanning (AVS) of an application is provided. The adaptive vulnerability scanning of an application assists in identifying new vulnerabilities dynamically. The endpoints of an application are scanned using a predefined set of rules. Subsequently, one or more possible vulnerabilities are presented. The vulnerabilities are analyzed and predefined rules are modified. The steps of scanning the application and modification of rules are iteratively repeated till the adaptive vulnerability scanning capability is achieved. A neural network is used for training the adaptive vulnerability scanner. This neural network is made to learn some rules based on predefined set of rules while undergoing the training phase. At least one weight in neural networks is altered while imparting the self learning capability.
    Type: Grant
    Filed: August 18, 2010
    Date of Patent: September 16, 2014
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Maneesh Ponnath, Vishal Anjaiah Gujjary
  • Patent number: 8744858
    Abstract: Methods and systems for providing a voice-based digital signature service are disclosed. The method includes a first user sending a document to a second user for signature, and the first user also sending a PIN to the second user and to a voice verification authority. The second user sending, to the voice verification authority, a voice recording comprising the PIN along with consent of the second user to the PIN. The voice verification authority comparing the voice recording with a predefined voice sample of the second user, and the PIN received from the first user with the PIN received from the second user. The voice verification authority then sending a notification to a signing entity based on the comparison. The signing entity signing the PIN of the document with a private key associated with the second user and sends an acknowledgement to the first user and the second user.
    Type: Grant
    Filed: September 27, 2011
    Date of Patent: June 3, 2014
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Vishal Anjaiah Gujjary, Harigopal K.B. Ponnapalli
  • Publication number: 20140047557
    Abstract: The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one online Digital Rights Management (DRM) user by a DRM server. This invention involves receiving digital contents from the publishers and those digital contents are encrypted and user rights are granted to access the contents by the publisher. The DRM server stores the decryption information, user rights and user information in a repository. After authenticating the user who is connected with the DRM server through a DRM client, the DRM server sends a license to the DRM user which includes the decryption information and the user rights. The DRM client decrypts the contents based on the license information in the memory of the user's computer device and thus the content and the license are not locally stored.
    Type: Application
    Filed: July 12, 2013
    Publication date: February 13, 2014
    Applicant: Infosys Limited
    Inventors: Ravi Sankar Veerubhotla, Ashutosh Saxena, Shikha Gupta, Harigopal K.B. Ponnapalli
  • Publication number: 20140047558
    Abstract: The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one offline Digital Rights Management (DRM) user by a DRM server. This invention involves establishing the trust relationship among the DRM server, DRM client, user's machine and the end user by means of digital certificate. The server generates protected digital content by means of using a standard encryption algorithm. The invention further involves determining whether a license for accessing the protected file is requested by the legitimate user, and if so, generating a license consisting the user rights and the protected decryption key to be downloaded by legitimate user. The DRM client decrypts the protected file using a decryption key of the license, and renders the content to the end user by calling the appropriate and customized viewer during consumption.
    Type: Application
    Filed: July 12, 2013
    Publication date: February 13, 2014
    Applicant: Infosys Limited
    Inventors: Ravi Sankar Veerubhotla, Ashutosh Saxena, Shikha Gupta, Harigopal K.B. Ponnapalli
  • Publication number: 20140026217
    Abstract: A method, non-transitory computer readable medium, and apparatus that establishes a connection with a host computing device. One or more processes running on the host computing device are identified. One or more hooking operations performed in the one or more identified processes are identified. One or more suspected key logging actions are identified from the one or more identified hooking operations based on one or more of a first set of rules and output.
    Type: Application
    Filed: July 17, 2013
    Publication date: January 23, 2014
    Inventors: Ashutosh Saxena, Harigopal K.B. Ponnapalli, Anand S. Nair
  • Publication number: 20140019586
    Abstract: A method, non-transitory computer readable medium and data masking device comprising receiving an input string comprising one or more input characters from a client computing device. A first numeric value is mapped for each of the one or more input characters of the received input string based on one or more stored datasets. Each of the mapped first numeric values are masked using the one or more stored datasets for each of the one or more input characters of the received input string to a second numeric value. A masked character for each of the second numeric values is remapped based on the one or more stored datasets. The determined masked characters are provided to the requesting client computing device.
    Type: Application
    Filed: July 10, 2013
    Publication date: January 16, 2014
    Inventors: Ashutosh Saxena, Malakondayya Choudary Gorantla, Ravi Sankar Veerubhotla, Shikha Gupta, Ina Jain
  • Publication number: 20140016856
    Abstract: Given an image and an aligned depth map of an object, the invention predicts the 3D location, 3D orientation and opening width or area of contact for an end of arm tooling (EOAT) without requiring a physical model.
    Type: Application
    Filed: May 13, 2013
    Publication date: January 16, 2014
    Applicant: Cornell University
    Inventors: Yun Jiang, John R. Amend, JR., Hod Lipson, Ashutosh Saxena, Stephen Moseson
  • Publication number: 20130339251
    Abstract: Methods for controlling software usage are described. Methods comprise receiving a request for at least one software application license, wherein the request comprises a user count, generating, by the computing apparatus, one or more sets of license data in response to the request, wherein a set of license data comprises at least one of the user count and a corresponding sequence number, signing each of the one or more sets of license data digitally with a private key, embedding a set of signed license data into the software application, receiving user identification data from a user through an input interface associated with the computing apparatus, and validating the user identification data. Additional embodiments incorporate mechanisms for license renewal, user registration and user authentication by means of associating a range of user identification data with the license data.
    Type: Application
    Filed: June 14, 2013
    Publication date: December 19, 2013
    Inventors: Ashutosh Saxena, Harigopal K. B. Ponnapalli, Malakondayya Choudary Gorantla, Ina Jain