Patents by Inventor Dipankar Dasgupta

Dipankar Dasgupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220366048
    Abstract: An artificial intelligence (AI) based advanced malware detection tool (AIMaD), which uses a combination of both static and dynamic malware analysis in a machine learning (ML) framework. It uses reverse engineering and feature extraction technique at DLL, function call, and assembly levels; these multi-level features are then processed with N-gram (i.e., Natural Language Processing, NLP), association rule mining to feed in different machine learning classifiers. The AIMaD is able to detect malware/ransomware with high accuracy and low false-positive rate.
    Type: Application
    Filed: April 29, 2022
    Publication date: November 17, 2022
    Inventors: DIPANKAR DASGUPTA, SUBASH POUDYAL
  • Patent number: 11503035
    Abstract: A system and related methods for providing greater security and control over access to classified files and documents and other forms of sensitive information based upon a multi-user permission strategy centering on organizational structure. Based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment (e.g., mobility, use of the computing device seeking access, access policy, and the like). The selected sets of approvers are non-repetitive in nature, making it very hard to guess which approvers will be selected for a particular request.
    Type: Grant
    Filed: April 10, 2018
    Date of Patent: November 15, 2022
    Inventors: Dipankar Dasgupta, Arunava Roy, Debasis Ghosh
  • Publication number: 20210406364
    Abstract: A Dual-Filtering (DF) system to provide a robust Machine Learning (ML) platform against adversarial attacks. It employs different filtering mechanisms (one at the input and the other at the output/decision end of the learning system) to thwart adversarial attacks. The developed dual-filter software can be used as a wrapper to any existing ML-based decision support system to prevent a wide variety of adversarial evasion attacks. The DF framework utilizes two filters based on positive (input filter) and negative (output filter) verification strategies that can communicate with each other for higher robustness.
    Type: Application
    Filed: May 10, 2021
    Publication date: December 30, 2021
    Inventors: DIPANKAR DASGUPTA, KISHOR DATTA GUPTA
  • Patent number: 11038896
    Abstract: Systems and related methods for providing greater security and control over access to protected or classified resources, files and documents and other forms of sensitive information based upon an initial adaptive selection of multiple modalities for authentication in different operating environments, with subsequent multi-user permission strategy centering on organizational structure. The system calculates trustworthiness values of different authentication factors under various environmental settings, and combines a trust-based adaptive, robust and scalable software-hardware framework for the selection of authentication factors for continuous and triggered authentication with optimal algorithms to determine the security parameters of each of the authentication factors. A subset of authentication factors thus are determined for application at triggering events on-the-fly, thereby leaving no exploitable a priori pattern or clue for hackers to exploit.
    Type: Grant
    Filed: April 18, 2019
    Date of Patent: June 15, 2021
    Inventors: Dipankar Dasgupta, Arunava Roy, Debasis Ghosh, Abhijit Kumar Nag
  • Patent number: 10671747
    Abstract: A system and related methods for providing greater security and control over access to classified files and documents and other forms of sensitive information based upon a multi-user, multi-modality permission strategy centering on organizational structure, thereby making authentication strategy unpredictable so to significantly reduce the risk of exploitation. Based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment, e.g., mobility, use of the computing device seeking access, authentication factors under applicable environmental settings, access policy, and the like.
    Type: Grant
    Filed: April 10, 2017
    Date of Patent: June 2, 2020
    Inventors: Dipankar Dasgupta, Arunava Roy, Debasis Ghosh
  • Publication number: 20200014702
    Abstract: Systems and related methods for providing greater security and control over access to protected or classified resources, files and documents and other forms of sensitive information based upon an initial adaptive selection of multiple modalities for authentication in different operating environments, with subsequent multi-user permission strategy centering on organizational structure. The system calculates trustworthiness values of different authentication factors under various environmental settings, and combines a trust-based adaptive, robust and scalable software-hardware framework for the selection of authentication factors for continuous and triggered authentication with optimal algorithms to determine the security parameters of each of the authentication factors. A subset of authentication factors thus are determined for application at triggering events on-the-fly, thereby leaving no exploitable a priori pattern or clue for hackers to exploit.
    Type: Application
    Filed: April 18, 2019
    Publication date: January 9, 2020
    Inventors: DIPANKAR DASGUPTA, ARUNAVA ROY, DEBASIS GHOSH, ABHIJIT KUMAR NAG
  • Publication number: 20190312881
    Abstract: A system and related methods for providing greater security and control over access to classified files and documents and other forms of sensitive information based upon a multi-user permission strategy centering on organizational structure. Based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment (e.g., mobility, use of the computing device seeking access, access policy, and the like). The selected sets of approvers are non-repetitive in nature, making it very hard to guess which approvers will be selected for a particular request.
    Type: Application
    Filed: April 10, 2018
    Publication date: October 10, 2019
    Inventors: DIPANKAR DASGUPTA, ARUNAVA ROY, DEBASIS GHOSH
  • Publication number: 20190130124
    Abstract: A system and related methods for providing greater security and control over access to classified files and documents and other forms of sensitive information based upon a multi-user, multi-modality permission strategy centering on organizational structure, thereby making authentication strategy unpredictable so to significantly reduce the risk of exploitation. Based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment, e.g., mobility, use of the computing device seeking access, authentication factors under applicable environmental settings, access policy, and the like.
    Type: Application
    Filed: April 10, 2017
    Publication date: May 2, 2019
    Inventors: DIPANKAR DASGUPTA, ARUNAVA ROY, DEBASIS GHOSH
  • Patent number: 9912657
    Abstract: A system and methodology for adaptive selection of multiple modalities for authentication in different operating environments, thereby making authentication strategy unpredictable so to significantly reduce the risk of exploitation by authentication-guessing attacks. The system calculates trustworthiness values of different authentication factors under various environmental settings, and combines a trust-based adaptive, robust and scalable software-hardware framework for the selection of authentication factors for continuous and triggered authentication with optimal algorithms to determine the security parameters of each of the authentication factors. A subset of authentication factors thus are determined for application at triggering events on-the-fly, thereby leaving no exploitable a priori pattern or clue for hackers to exploit.
    Type: Grant
    Filed: December 14, 2015
    Date of Patent: March 6, 2018
    Inventors: Dipankar Dasgupta, Abhijit Kumar Nag, Arunava Roy
  • Publication number: 20160359838
    Abstract: A system and methodology for adaptive selection of multiple modalities for authentication in different operating environments, thereby making authentication strategy unpredictable so to significantly reduce the risk of exploitation by authentication-guessing attacks. The system calculates trustworthiness values of different authentication factors under various environmental settings, and combines a trust-based adaptive, robust and scalable software-hardware framework for the selection of authentication factors for continuous and triggered authentication with optimal algorithms to determine the security parameters of each of the authentication factors. A subset of authentication factors thus are determined for application at triggering events on-the-fly, thereby leaving no exploitable a priori pattern or clue for hackers to exploit.
    Type: Application
    Filed: December 14, 2015
    Publication date: December 8, 2016
    Inventors: DIPANKAR DASGUPTA, ABHIJIT KUMAR NAG, ARUNAVA ROY
  • Publication number: 20090019289
    Abstract: The disclosed invention is a method for screening access to a computer system using a negative authentication system. Input login requests are compared against a set of detectors comprising anti-passwords and only allowed further access if they do not match any of the anti-passwords. A method of generating a set of detectors comprising anti-passwords is also disclosed.
    Type: Application
    Filed: July 11, 2008
    Publication date: January 15, 2009
    Applicant: University of Memphis Research Foundation
    Inventor: Dipankar Dasgupta