Patents by Inventor Lakshman Kumar

Lakshman Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9984371
    Abstract: Methods of de-tokenizing secure payment tokens are disclosed. A method according to some embodiments includes receiving a request from an issuer to de-tokenize a secure payment token associated with a transaction conducted using a mobile terminal, generating a metric indicative of a risk of de-tokenizing the secure payment token, comparing the metric indicative of the risk of de-tokenizing the secure payment token to a predetermined threshold, and transmitting a response to the request to de-tokenize the secure payment token, wherein the response is based on the comparison of the metric indicative of the risk of de-tokenizing the secure payment token with the predetermined threshold.
    Type: Grant
    Filed: March 27, 2015
    Date of Patent: May 29, 2018
    Assignee: CA, INC.
    Inventors: Mahesh Malatesh Chitragar, Dhivya Kalyanasundaram, Sharath Lakshman Kumar, Vishwanatha Salian
  • Patent number: 9801094
    Abstract: This disclosure relates to a system and method for dynamically managing load on network devices in a distributed manner. As the proliferation of data rich content and increasingly more capable mobile devices has continued, the amount of data communicated over mobile operator's networks has exponentially increased. Upgrading the existing network to accommodate increased data traffic is neither desirable nor practical. One way to accommodate increased data traffic is by utilizing network resources more efficiently. This disclosure provides systems and methods for efficiently utilizing network resources by dynamically configuring the network in a distributed manner based on real-time load information.
    Type: Grant
    Filed: March 15, 2016
    Date of Patent: October 24, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Ramakumar Rajagopalan, Hassan Khani Sidhiq, Mohan Rangan, Aditya Prakash, Lakshman Kumar Narayanan, Sridhar Bhaskaran
  • Publication number: 20170200160
    Abstract: A restriction request message, including a restriction parameter for a secondary account, is received from a device that is associated with a primary account, via a network node that is outside of a secure authorization network. A replenishment request message, including a password and an account replenishment parameter for the secondary account, is also received via a network node that is outside of the authorization network. Authentication is performed based on the password, and the restriction parameter for the secondary account is identified responsive to receiving the replenishment request message. Responsive to determining that the account replenishment parameter satisfies the restriction parameter, a replacement key is generated and associated with the account replenishment parameter for the secondary account.
    Type: Application
    Filed: January 8, 2016
    Publication date: July 13, 2017
    Applicant: CA, Inc.
    Inventors: SHARATH LAKSHMAN KUMAR, MAHESH MALATESH CHITRAGAR, MOHAMMED MUJEEB KALADGI, PRADEEP G. NAIR
  • Publication number: 20170186008
    Abstract: A restriction request message, including a restriction for a secondary account, is received by a computer server from a user device via a network node that is outside of a secure authorization network. An authorization request message, including an identifier of the secondary account and a secondary password provided by a terminal that is communicatively coupled to a node of the authorization network, is received by the computer server via the authorization network. The secondary account is identified as being associated with a primary account based on the identifier included in the authorization request message. Authentication for a transaction between the terminal and the primary account is performed by the computer server based on the secondary password. An authorization response message for the transaction between the terminal and the primary account, based on the restriction for the secondary account, is transmitted from the computer server via the authorization network.
    Type: Application
    Filed: December 29, 2015
    Publication date: June 29, 2017
    Applicant: CA, Inc.
    Inventors: Rajendra Kumar Pachouri, MOHAMMED MUJEEB KALADGI, SHARATH LAKSHMAN KUMAR, MAHESH MALATESH CHITRAGAR, PRADEEP G. NAIR
  • Publication number: 20170178137
    Abstract: A message, which includes a user-defined transaction parameter for a transaction with a terminal that is communicatively coupled to a node of a secure authorization network, is received by a computer server via a network node that is outside of the secure authorization network. An authorization request message for the transaction with the terminal is received by the computer server via the secure authorization network. The authorization request message includes a one-time password that is provided by the terminal. Authentication is performed by the computer server based on the one-time password, and the user-defined transaction parameter for the transaction with the terminal is identified by the computer server based on the one-time password included in the authorization request message. An authorization response message for the transaction with the terminal based on the user-defined transaction parameter is transmitted from the computer server via the secure authorization network.
    Type: Application
    Filed: December 17, 2015
    Publication date: June 22, 2017
    Applicant: CA, Inc.
    Inventors: Rajendra Kumar Pachouri, Sharath Lakshman Kumar, Mohammed Mujeeb Kaladgi
  • Publication number: 20160358163
    Abstract: A method includes communicating with a token server to identify a key, generating an initialization vector, performing a logical operation on the key using the initialization vector to generate a modified key, encrypting a financial account number using a format preserving encryption technique to generate a payment token where the format preserving encryption technique uses the modified key, establishing a communication connection with a point-of-sale terminal, and transmitting the payment token to the point-of-sale terminal.
    Type: Application
    Filed: December 29, 2014
    Publication date: December 8, 2016
    Applicant: CA, INC.
    Inventors: SHARATH LAKSHMAN KUMAR, Mahesh Malatesh Chitragar
  • Publication number: 20160283942
    Abstract: Methods of de-tokenizing secure payment tokens are disclosed. A method according to some embodiments includes receiving a request from an issuer to de-tokenize a secure payment token associated with a transaction conducted using a mobile terminal, generating a metric indicative of a risk of de-tokenizing the secure payment token, comparing the metric indicative of the risk of de-tokenizing the secure payment token to a predetermined threshold, and transmitting a response to the request to de-tokenize the secure payment token, wherein the response is based on the comparison of the metric indicative of the risk of de-tokenizing the secure payment token with the predetermined threshold.
    Type: Application
    Filed: March 27, 2015
    Publication date: September 29, 2016
    Applicant: CA. INC.
    Inventors: MAHESH MALATESH CHITRAGAR, DHIVYA KALYANASUNDARAM, Sharath Lakshman Kumar, Vishwanatha Salian
  • Publication number: 20160275514
    Abstract: A method for preventing mobile payment is described. The method comprises generating an authorization request, via a payment module, based on sensitive data on a mobile device. The authorization request is transmitted from the payment module to an issuer system. The issuer system sends a neutralization trigger. In response to receiving the neutralization trigger, the payment module is disabled.
    Type: Application
    Filed: March 18, 2015
    Publication date: September 22, 2016
    Inventors: Sharath Lakshman KUMAR, Mahesh Malatesh CHITRAGAR, Vishwanatha SALIAN, Stephen PRASAD
  • Publication number: 20160275513
    Abstract: A method for preventing mobile payment is described. The method comprises receiving an authorization request at an issuer system from a payment module on a mobile device. The authorization request may be based on sensitive data on the mobile device. The issuer system determines whether the mobile device is missing. The issuer system sends a neutralization trigger to the mobile device, and in response to receiving the neutralization trigger, the payment module is disabled.
    Type: Application
    Filed: March 18, 2015
    Publication date: September 22, 2016
    Inventors: Sharath Lakshman KUMAR, Mahesh Malatesh CHITRAGAR, Vishwanatha SALIAN, Stephen PRASAD
  • Publication number: 20160275505
    Abstract: A method for communicating payment status is described. The method comprises generating an authorization request, via a payment module, on a mobile device. The authorization request may be generated during a contactless transaction. The authorization request is transmitted to an issuer system for verification via a local merchant terminal. The payment module receives a first verification response directly from the issuer system, and determines a transaction status from the first verification response.
    Type: Application
    Filed: March 17, 2015
    Publication date: September 22, 2016
    Inventors: Vishwanatha SALIAN, Mahesh Malatesh CHITRAGAR, Sharath Lakshman KUMAR, Mohammed Mujeeb KALADGI
  • Publication number: 20160275506
    Abstract: A method for communicating payment status is described. The method comprises receiving an authorization request, via a local merchant terminal, at an issuer system. The authorization request may be generated during a contactless transaction. The authorization request is verified at the issuer system. The issuer system generates a first verification response and a second verification response. The issuer system transmits the first verification response directly to a payment module on a mobile device. The issuer also transmits the second verification response to the local merchant terminal.
    Type: Application
    Filed: March 17, 2015
    Publication date: September 22, 2016
    Inventors: Vishwanatha SALIAN, Mahesh Malatesh CHITRAGAR, Sharath Lakshman KUMAR, Mohammed Mujeeb KALADGI
  • Publication number: 20160198365
    Abstract: This disclosure relates to a system and method for dynamically managing load on network devices in a distributed manner. As the proliferation of data rich content and increasingly more capable mobile devices has continued, the amount of data communicated over mobile operator's networks has exponentially increased. Upgrading the existing network to accommodate increased data traffic is neither desirable nor practical. One way to accommodate increased data traffic is by utilizing network resources more efficiently. This disclosure provides systems and methods for efficiently utilizing network resources by dynamically configuring the network in a distributed manner based on real-time load information.
    Type: Application
    Filed: March 15, 2016
    Publication date: July 7, 2016
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Ramakumar RAJAGOPALAN, Hassan Khani SIDHIQ, Mohan RANGAN, Aditya PRAKASH, Lakshman Kumar NARAYANAN, Sridhar BHASKARAN
  • Patent number: 9294981
    Abstract: This disclosure relates to a system and method for dynamically managing load on network devices in a distributed manner. As the proliferation of data rich content and increasingly more capable mobile devices has continued, the amount of data communicated over mobile operator's networks has exponentially increased. Upgrading the existing network to accommodate increased data traffic is neither desirable nor practical. One way to accommodate increased data traffic is by utilizing network resources more efficiently. This disclosure provides systems and methods for efficiently utilizing network resources by dynamically configuring the network in a distributed manner based on real-time load information.
    Type: Grant
    Filed: June 7, 2013
    Date of Patent: March 22, 2016
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Ramakumar Rajagopalan, Hassan Khani Sidhiq, Mohan Rangan, Aditya Prakash, Lakshman Kumar Narayanan, Sridhar Bhaskaran