Patents by Inventor Chetan Doddamani

Chetan Doddamani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10057237
    Abstract: An insensitive summary of an encrypted electronic document, such as email, is provided. The insensitive summary provides a summary of the encrypted electronic document without providing sensitive information, such as passwords. The electronic document may be an email, text (such as in a word processing file), spreadsheet and/or presentation. Natural language processing methods, such as parts of speech (POS) tagging, word clustering, regular expression evaluating, sensitive key word searching and/or other methods, may be used to identify and mask sensitive words before summarization and encryption of the electronic document. A user's efficiency in operating a computing device may be increased having an associated insensitive summary without compromising security of the encrypted electronic document. A user may direct a computing device to perform a search (or similarly categorize or use rules) to identify the encrypted electronic document by searching for contents of the associated insensitive summary.
    Type: Grant
    Filed: February 17, 2015
    Date of Patent: August 21, 2018
    Assignee: CA, Inc.
    Inventors: Shashanka Arnady, Chetan Doddamani, PrasannaBabu Krishnappa
  • Patent number: 9684689
    Abstract: The system and method of the present disclosure relates to data stored in a common database of a network for parallel processing by multiple processors or processing centers. As consumers and business continue to generate more and more data, the amount of data being stored across networks and computing environments increases. To monitor and process increasingly large amounts of data, the system and method of the present disclosure utilizes the atomicity of certain databases and storage devices to efficiently identify and mark data for processing by a designated processor or processing center, such that the designated processor or processing center is responsible for processing the identified and marked data. Consequently, the system ensures that no two processors or processing centers are processing the same data at the same time without the use of schedulers, queues or other conventional techniques.
    Type: Grant
    Filed: February 3, 2015
    Date of Patent: June 20, 2017
    Assignee: CA, Inc.
    Inventors: Shashanka Arnady, Anand Manvi, Chetan Doddamani
  • Publication number: 20170039570
    Abstract: A method of performing operations on a processor of a financial transaction processing system, includes receiving an eCommerce transaction message containing an account identifier for a pending eCommerce transaction and initial parameter information characterizing an originating user terminal that communicated the eCommerce transaction message. A network address of a registered user terminal that is associated with the account identifier is identified. A terminal authentication challenge message containing a request for updated parameters characterizing the registered user terminal, is communicated toward the network address. A terminal authentication response message containing updated parameter information characterizing the registered user terminal, is received from the registered user terminal. A risk score for the pending eCommerce transaction is generated based on similarity between the initial and updated parameter information.
    Type: Application
    Filed: August 4, 2015
    Publication date: February 9, 2017
    Applicant: CA, INC.
    Inventors: PRASANNA BABU KRISHNAPPA, ANAND MANVI, CHETAN DODDAMANI, SHASHANKA ARNADY, ARUN SHETTY
  • Publication number: 20170032374
    Abstract: A method of performing operations on a processor of a financial transaction processing system, includes receiving from a merchant node an eCommerce authentication request for a pending eCommerce transaction associated with a user terminal. The eCommerce authentication request contains transaction information that comprises a user terminal identifier and a reported list of wireless device identifiers that are observed by the user terminal. A risk score is generated for the pending eCommerce transaction based on comparison of the reported list of wireless device identifiers to a registered list of wireless device identifiers which has been associated with the user terminal identifier. Authentication of the eCommerce authentication request is controlled based on the risk score. Related computer nodes of financial transaction processing systems and user terminals are disclosed.
    Type: Application
    Filed: July 28, 2015
    Publication date: February 2, 2017
    Applicant: CA, INC.
    Inventors: Chetan Doddamani, Anand Manvi, Shashanka Arnady, Prasanna Babu Krishnappa, Arun Shetty
  • Publication number: 20160241546
    Abstract: An insensitive summary of an encrypted electronic document, such as email, is provided. The insensitive summary provides a summary of the encrypted electronic document without providing sensitive information, such as passwords. The electronic document may be an email, text (such as in a word processing file), spreadsheet and/or presentation. Natural language processing methods, such as parts of speech (POS) tagging, word clustering, regular expression evaluating, sensitive key word searching and/or other methods, may be used to identify and mask sensitive words before summarization and encryption of the electronic document. A user's efficiency in operating a computing device may be increased having an associated insensitive summary without compromising security of the encrypted electronic document. A user may direct a computing device to perform a search (or similarly categorize or use rules) to identify the encrypted electronic document by searching for contents of the associated insensitive summary.
    Type: Application
    Filed: February 17, 2015
    Publication date: August 18, 2016
    Applicant: CA, INC.
    Inventors: Shashanka Arnady, Chetan Doddamani, PrasannaBabu Krishnappa
  • Publication number: 20160224393
    Abstract: The system and method of the present disclosure relates to data stored in a common database of a network for parallel processing by multiple processors or processing centers. As consumers and business continue to generate more and more data, the amount of data being stored across networks and computing environments increases. To monitor and process increasingly large amounts of data, the system and method of the present disclosure utilizes the atomicity of certain databases and storage devices to efficiently identify and mark data for processing by a designated processor or processing center, such that the designated processor or processing center is responsible for processing the identified and marked data. Consequently, the system ensures that no two processors or processing centers are processing the same data at the same time without the use of schedulers, queues or other conventional techniques.
    Type: Application
    Filed: February 3, 2015
    Publication date: August 4, 2016
    Applicant: CA, INC.
    Inventors: Shashanka Arnady, Anand Manvi, Chetan Doddamani