Patents by Inventor Debashis Choudhury

Debashis Choudhury has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240114033
    Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.
    Type: Application
    Filed: December 11, 2023
    Publication date: April 4, 2024
    Inventors: Charles Prakash Rao DASARI, Maksym YARYN, Debashis CHOUDHURY, Jeffrey A. STAIMAN
  • Patent number: 11888856
    Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: January 30, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A Staiman
  • Publication number: 20230121372
    Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.
    Type: Application
    Filed: December 21, 2022
    Publication date: April 20, 2023
    Inventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A. Staiman
  • Patent number: 11570181
    Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: January 31, 2023
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A. Staiman
  • Patent number: 11552956
    Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.
    Type: Grant
    Filed: November 29, 2021
    Date of Patent: January 10, 2023
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A. Staiman
  • Publication number: 20220086165
    Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.
    Type: Application
    Filed: November 29, 2021
    Publication date: March 17, 2022
    Inventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A. Staiman
  • Patent number: 11233800
    Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: January 25, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A. Staiman
  • Publication number: 20220022005
    Abstract: Systems, methods, and computer-executable instructions for providing privacy to relative location data includes receiving a request for a location of an object. Privacy settings associated with the object are retrieved. A position of the object within a construct of a physical space is determined. An area within the construct of the physical space based on the position is determined. A location value of the object based on the area and the privacy settings is determined. The location value in response to the request for the location of the object is returned.
    Type: Application
    Filed: July 20, 2020
    Publication date: January 20, 2022
    Applicant: DeCurtis LLC
    Inventors: David DeCurtis, Derek Fournier, Paul Schottland, Debashis Choudhury, James Learish
  • Publication number: 20210377276
    Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.
    Type: Application
    Filed: May 29, 2020
    Publication date: December 2, 2021
    Inventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A. Staiman
  • Publication number: 20210377272
    Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.
    Type: Application
    Filed: May 29, 2020
    Publication date: December 2, 2021
    Inventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A. Staiman
  • Patent number: 11166142
    Abstract: Systems, methods, and computer-executable instructions for providing privacy to proximity data. A beacon identifier associated with a first object is received. Privacy data associated with the beacon identifier is determined. A filter determination of the beacon identifier based on the first privacy data is determined. An indication to filter the beacon identifier is provided. The beacon identifier is filtered, such that a running application is never aware of the detected beacon identifier.
    Type: Grant
    Filed: July 14, 2020
    Date of Patent: November 2, 2021
    Assignee: DeCurtis Corporation
    Inventors: David DeCurtis, Derek Fournier, Paul Schottland, Debashis Choudhury, James Learish
  • Patent number: 10915733
    Abstract: Systems, methods, and computer-executable instructions for determining a temperature of an individual including receiving, from a first camera, first image frames. The individual is detected in the first image frames. Facial features of the individual are detected from the first image frames. A brain thermal tunnel location is determined from the facial features of the individual. A second camera provides second image frames that include thermal data. The brain thermal tunnel locations from the first image frames are mapped to the second image frames. For each second image frame, a temperature of the individual is determined based on the mapped brain thermal tunnel location. A combined temperature is determined based on the temperatures determined from the second image frames.
    Type: Grant
    Filed: September 2, 2020
    Date of Patent: February 9, 2021
    Assignee: DeCurtis LLC
    Inventors: David DeCurtis, Derek Fournier, Matthew Winans, Debashis Choudhury, James Learish
  • Patent number: 10911893
    Abstract: Systems, methods, and computer-executable instructions for contact tracing including receiving a first beacon identifier associated with a first person and a second beacon identifier associated with a second person over a time period from a plurality of readers. A location of the first person and the second person is determined. Health data associated with the first person is received. The first person is determined to be sick and a sick period of time is determined. Two or more people, including the second person, are determined to have been within a proximity of the first person during the sick period of time. A list of the two or more people is generated.
    Type: Grant
    Filed: June 29, 2020
    Date of Patent: February 2, 2021
    Assignee: DeCurtis LLC
    Inventors: David DeCurtis, Derek Fournier, Matthew Winans, Debashis Choudhury, James Learish
  • Patent number: 10185620
    Abstract: Aspects of the disclosure relate to an ATM internal self-repair recovery system. The system may be included in software updates transmitted to the ATM. The system may include an XML file and a log file. Prior to execution of each instruction included in the XML file, the system may write an intelligent log statement to the log file. A standalone web service may monitor the log file to determine new entries to the log file. When a new entry is the last entry for more than a predetermined amount of time, a midstream ATM stall may be determined. The system may compare the new entry to an ATM stall action table. The comparison may determine an appropriate action to repair the installation process based on the table. The ATM may perform the appropriate action and thereby recover from the failures that occurred during the update process.
    Type: Grant
    Filed: September 13, 2016
    Date of Patent: January 22, 2019
    Assignee: Bank of America Corporation
    Inventors: Craig Ewington, Debashis Choudhury
  • Publication number: 20180074886
    Abstract: Aspects of the disclosure relate to an ATM internal self-repair recovery system. The system may be included in software updates transmitted to the ATM. The system may include an XML file and a log file. Prior to execution of each instruction included in the XML file, the system may write an intelligent log statement to the log file. A standalone web service may monitor the log file to determine new entries to the log file. When a new entry is the last entry for more than a predetermined amount of time, a midstream ATM stall may be determined. The system may compare the new entry to an ATM stall action table. The comparison may determine an appropriate action to repair the installation process based on the table. The ATM may perform the appropriate action and thereby recover from the failures that occurred during the update process.
    Type: Application
    Filed: September 13, 2016
    Publication date: March 15, 2018
    Inventors: Craig Ewington, Debashis Choudhury
  • Patent number: 9684894
    Abstract: An apparatus for invoking a degraded mode architecture is provided. The apparatus may include a desktop application, a branch processor, and/or a data center. The branch processor may be in communication with the data center and the desktop application. The branch processor may transmit activities that occurred in the branch processor and the desktop application to the data center. During a termination of communication between the data center and the branch processor, the branch processor may save branch processor activities and desktop application activities. After the termination of communication, the branch processor may transmit the saved activities to the data center. In addition, many components which may be found on the desktop application may also be found on the branch processor. This may enable the branch processor to perform the desktop application capabilities when there is a termination of communication between the desktop application and the branch processor.
    Type: Grant
    Filed: October 23, 2014
    Date of Patent: June 20, 2017
    Assignee: Bank of America Corporation
    Inventors: Michelle Bentubo, Debashis Choudhury, Therese J. Willis
  • Publication number: 20160155105
    Abstract: Apparatus for providing a QST are disclosed herein. The QST may identify a customer in response to a swipe of a customer identifying instrument. The QST may include a reading head, a processor, a keypad, and a communications medium. The reading head may detect identification information in response to the swipe of the instrument. The identification information may be associated with a personal identification instrument. The processor may bypass a PIN acceptance state and perform a search for at least one banking record corresponding to the personal identification instrument. The processor may terminate the identification session in response to failure to obtain a record corresponding to the identification instrument. In response, at least in part, to identification of at least one record that corresponds to the personal identification instrument, the communications medium may receive a session-auth instruction from a remote location. The session-auth instruction may initiate a banking session.
    Type: Application
    Filed: February 9, 2016
    Publication date: June 2, 2016
    Inventors: Michelle Bentubo, Debashis Choudhury, Elizabeth Anne Price
  • Publication number: 20160117663
    Abstract: An apparatus for invoking a degraded mode architecture is provided. The apparatus may include a desktop application, a branch processor, and/or a data center. The branch processor may be in communication with the data center and the desktop application. The branch processor may transmit activities that occurred in the branch processor and the desktop application to the data center. During a termination of communication between the data center and the branch processor, the branch processor may save branch processor activities and desktop application activities. After the termination of communication, the branch processor may transmit the saved activities to the data center. In addition, many components which may be found on the desktop application may also be found on the branch processor. This may enable the branch processor to perform the desktop application capabilities when there is a termination of communication between the desktop application and the branch processor.
    Type: Application
    Filed: October 23, 2014
    Publication date: April 28, 2016
    Inventors: Michelle Bentubo, Debashis Choudhury, Therese J. Willis
  • Publication number: 20160098904
    Abstract: Apparatus and methods for distributed currency dispensing across automated teller machine (“ATM”) networks are provided. In response to a malfunction component of an ATM, a customer may be directed to continue a banking transaction at another location. The other location may include a neighboring ATM. The other location may include a shared resource located within a banking center. The shared resource may perform a function of the malfunctioning ATM component. A shared resource may be accessible by a teller workstation, a platform area workstation or any suitable transaction station within a banking center.
    Type: Application
    Filed: October 7, 2014
    Publication date: April 7, 2016
    Inventors: Debashis Choudhury, Michelle Bentubo, Maxim Matvienko
  • Publication number: 20160098720
    Abstract: Apparatus for providing a QST are disclosed herein. The QST may identify a customer in response to a swipe of a customer identifying instrument. The QST may include a reading head, a processor, a keypad, and a communications medium. The reading head may detect identification information in response to the swipe of the instrument. The identification information may be associated with a personal identification instrument. The processor may bypass a PIN acceptance state and perform a search for at least one banking record corresponding to the personal identification instrument. The processor may terminate the identification session in response to failure to obtain a record corresponding to the identification instrument. In response, at least in part, to identification of at least one record that corresponds to the personal identification instrument, the communications medium may receive a session-auth instruction from a remote location. The session-auth instruction may initiate a banking session.
    Type: Application
    Filed: October 7, 2014
    Publication date: April 7, 2016
    Inventors: Michelle Bentubo, Debashis Choudhury, Elizabeth Anne Price