Patents by Inventor Mahesh Malatesh CHITRAGAR
Mahesh Malatesh CHITRAGAR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240071220Abstract: Systems, methods and/or computer program products for improving autonomous vehicle operation by enabling communication between the autonomous vehicles and BCI systems publishing signals from nearby pedestrians. Wearable BCI devices worn by pedestrians analyze brainwave signals and classify the brainwave signals in order to filter out signals that are unrelated to crossing the street or the directionality of travel by the pedestrian. BCI devices publish, or broadcast brain wave signals related to crossing the street or directionality of travel to the surrounding area where autonomous vehicle receive and process the brainwave signals being published. The autonomous vehicles predict movements of nearby pedestrians based on the intended direction of travel signified by the collected brainwave signals, and the autonomous vehicles select driving actions in response to the anticipated movements of nearby pedestrians.Type: ApplicationFiled: August 31, 2022Publication date: February 29, 2024Inventors: Saraswathi Sailaja Perumalla, Sarbajit K. Rakshit, Mahesh Malatesh Chitragar
-
Patent number: 10607017Abstract: A method includes receiving a security profile comprising user-defined rules for processing sensitive data, and identifying a plurality of sensitive data components in a data file according to the security profile. The method further includes generating a respective format-preserving token for each of the identified plurality of sensitive data components. The method additionally includes generating a corresponding token key for each of the respective-format preserving tokens, and replacing each of the plurality of sensitive data components in the data file with the respective format-preserving token. Further, the method includes cryptographically camouflaging each of the token keys using a first password and storing each of the cryptographically camouflaged token keys.Type: GrantFiled: January 4, 2017Date of Patent: March 31, 2020Assignee: CA, INC.Inventors: Sharath L. Kumar, Mohammed Mujeeb Kaladgi, Rajendra Pachouri, Mahesh Malatesh Chitragar
-
Patent number: 10475036Abstract: A restriction request message, including a restriction parameter for a secondary account, is received from a device that is associated with a primary account, via a network node that is outside of a secure authorization network. A replenishment request message, including a password and an account replenishment parameter for the secondary account, is also received via a network node that is outside of the authorization network. Authentication is performed based on the password, and the restriction parameter for the secondary account is identified responsive to receiving the replenishment request message. Responsive to determining that the account replenishment parameter satisfies the restriction parameter, a replacement key is generated and associated with the account replenishment parameter for the secondary account.Type: GrantFiled: January 8, 2016Date of Patent: November 12, 2019Assignee: CA, Inc.Inventors: Sharath Lakshman Kumar, Mahesh Malatesh Chitragar, Mohammed Mujeeb Kaladgi, Pradeep G. Nair
-
Patent number: 10387884Abstract: A method for preventing mobile payment is described. The method comprises generating an authorization request, via a payment module, based on sensitive data on a mobile device. The authorization request is transmitted from the payment module to an issuer system. The issuer system sends a neutralization trigger. In response to receiving the neutralization trigger, the payment module is disabled.Type: GrantFiled: March 18, 2015Date of Patent: August 20, 2019Assignee: CA, Inc.Inventors: Sharath Lakshman Kumar, Mahesh Malatesh Chitragar, Vishwanatha Salian, Stephen Prasad
-
Patent number: 10360558Abstract: A method for two factor authentication is described. The method comprises sending an activation code stored on a mobile device to a server for verification. An encrypted secret key generated by the server using the activation code is received. The secret key is decrypted using the activation code stored on the mobile device. The mobile device encrypts the secret key using a predetermined PIN. As a result of a user inputting the predetermined PIN, the secret key is decrypted, the mobile device generates a first token using the secret key and transmits the first token to the server to authenticate the user. After receiving authentication from the server, the information on the mobile device is synced with the server.Type: GrantFiled: March 17, 2015Date of Patent: July 23, 2019Assignee: CA, Inc.Inventors: Mohammed Mujeeb Kaladgi, Mahesh Malatesh Chitragar, Vishwanatha Salian
-
Patent number: 10089631Abstract: A method for preventing mobile payment is described. The method comprises receiving an authorization request at an issuer system from a payment module on a mobile device. The authorization request may be based on sensitive data on the mobile device. The issuer system determines whether the mobile device is missing. The issuer system sends a neutralization trigger to the mobile device, and in response to receiving the neutralization trigger, the payment module is disabled.Type: GrantFiled: March 18, 2015Date of Patent: October 2, 2018Assignee: CA, Inc.Inventors: Sharath Lakshman Kumar, Mahesh Malatesh Chitragar, Vishwanatha Salian, Stephen Prasad
-
Patent number: 10050942Abstract: A method for two factor authentication is described. The method comprises a server receiving an activation code for verification from a mobile device. The server generates an encrypted secret key using the activation code The secret key is encrypted and sent to the mobile device. The server receives a first token generated by the mobile device. The server generates a second token using the secret key, determines whether the first token is identical to the second token, and syncs information with the mobile device.Type: GrantFiled: March 17, 2015Date of Patent: August 14, 2018Assignee: CA, Inc.Inventors: Mohammed Mujeeb Kaladgi, Mahesh Malatesh Chitragar, Vishwanatha Salian
-
Publication number: 20180189502Abstract: A method includes receiving a security profile comprising user-defined rules for processing sensitive data, and identifying a plurality of sensitive data components in a data file according to the security profile. The method further includes generating a respective format-preserving token for each of the identified plurality of sensitive data components. The method additionally includes generating a corresponding token key for each of the respective-format preserving tokens, and replacing each of the plurality of sensitive data components in the data file with the respective format-preserving token. Further, the method includes cryptographically camouflaging each of the token keys using a first password and storing each of the cryptographically camouflaged token keys.Type: ApplicationFiled: January 4, 2017Publication date: July 5, 2018Applicant: CA, Inc.Inventors: Sharath L. KUMAR, Mohammed Mujeeb KALADGI, Rajendra PACHOURI, Mahesh Malatesh CHITRAGAR
-
Patent number: 9984371Abstract: Methods of de-tokenizing secure payment tokens are disclosed. A method according to some embodiments includes receiving a request from an issuer to de-tokenize a secure payment token associated with a transaction conducted using a mobile terminal, generating a metric indicative of a risk of de-tokenizing the secure payment token, comparing the metric indicative of the risk of de-tokenizing the secure payment token to a predetermined threshold, and transmitting a response to the request to de-tokenize the secure payment token, wherein the response is based on the comparison of the metric indicative of the risk of de-tokenizing the secure payment token with the predetermined threshold.Type: GrantFiled: March 27, 2015Date of Patent: May 29, 2018Assignee: CA, INC.Inventors: Mahesh Malatesh Chitragar, Dhivya Kalyanasundaram, Sharath Lakshman Kumar, Vishwanatha Salian
-
Publication number: 20170200160Abstract: A restriction request message, including a restriction parameter for a secondary account, is received from a device that is associated with a primary account, via a network node that is outside of a secure authorization network. A replenishment request message, including a password and an account replenishment parameter for the secondary account, is also received via a network node that is outside of the authorization network. Authentication is performed based on the password, and the restriction parameter for the secondary account is identified responsive to receiving the replenishment request message. Responsive to determining that the account replenishment parameter satisfies the restriction parameter, a replacement key is generated and associated with the account replenishment parameter for the secondary account.Type: ApplicationFiled: January 8, 2016Publication date: July 13, 2017Applicant: CA, Inc.Inventors: SHARATH LAKSHMAN KUMAR, MAHESH MALATESH CHITRAGAR, MOHAMMED MUJEEB KALADGI, PRADEEP G. NAIR
-
Publication number: 20170186008Abstract: A restriction request message, including a restriction for a secondary account, is received by a computer server from a user device via a network node that is outside of a secure authorization network. An authorization request message, including an identifier of the secondary account and a secondary password provided by a terminal that is communicatively coupled to a node of the authorization network, is received by the computer server via the authorization network. The secondary account is identified as being associated with a primary account based on the identifier included in the authorization request message. Authentication for a transaction between the terminal and the primary account is performed by the computer server based on the secondary password. An authorization response message for the transaction between the terminal and the primary account, based on the restriction for the secondary account, is transmitted from the computer server via the authorization network.Type: ApplicationFiled: December 29, 2015Publication date: June 29, 2017Applicant: CA, Inc.Inventors: Rajendra Kumar Pachouri, MOHAMMED MUJEEB KALADGI, SHARATH LAKSHMAN KUMAR, MAHESH MALATESH CHITRAGAR, PRADEEP G. NAIR
-
Publication number: 20170032362Abstract: A method of enrolling a payment card in a mobile wallet app includes receiving, on a mobile device, a request from a user to enroll a financial account in a mobile wallet application installed on the mobile device, sending an enrollment request to a wallet server, the enrollment request including an identification string uniquely associated with the mobile device, receiving a payment token associated with the financial account from the wallet server, and notifying the user that the financial account has been enrolled into the mobile wallet application responsive to receipt of the payment token. Related computer program products are also disclosed.Type: ApplicationFiled: July 31, 2015Publication date: February 2, 2017Applicant: CA, Inc.Inventors: RAJDEEP LAHKAR, Mahesh Malatesh Chitragar
-
Publication number: 20160358163Abstract: A method includes communicating with a token server to identify a key, generating an initialization vector, performing a logical operation on the key using the initialization vector to generate a modified key, encrypting a financial account number using a format preserving encryption technique to generate a payment token where the format preserving encryption technique uses the modified key, establishing a communication connection with a point-of-sale terminal, and transmitting the payment token to the point-of-sale terminal.Type: ApplicationFiled: December 29, 2014Publication date: December 8, 2016Applicant: CA, INC.Inventors: SHARATH LAKSHMAN KUMAR, Mahesh Malatesh Chitragar
-
Publication number: 20160283942Abstract: Methods of de-tokenizing secure payment tokens are disclosed. A method according to some embodiments includes receiving a request from an issuer to de-tokenize a secure payment token associated with a transaction conducted using a mobile terminal, generating a metric indicative of a risk of de-tokenizing the secure payment token, comparing the metric indicative of the risk of de-tokenizing the secure payment token to a predetermined threshold, and transmitting a response to the request to de-tokenize the secure payment token, wherein the response is based on the comparison of the metric indicative of the risk of de-tokenizing the secure payment token with the predetermined threshold.Type: ApplicationFiled: March 27, 2015Publication date: September 29, 2016Applicant: CA. INC.Inventors: MAHESH MALATESH CHITRAGAR, DHIVYA KALYANASUNDARAM, Sharath Lakshman Kumar, Vishwanatha Salian
-
Publication number: 20160275506Abstract: A method for communicating payment status is described. The method comprises receiving an authorization request, via a local merchant terminal, at an issuer system. The authorization request may be generated during a contactless transaction. The authorization request is verified at the issuer system. The issuer system generates a first verification response and a second verification response. The issuer system transmits the first verification response directly to a payment module on a mobile device. The issuer also transmits the second verification response to the local merchant terminal.Type: ApplicationFiled: March 17, 2015Publication date: September 22, 2016Inventors: Vishwanatha SALIAN, Mahesh Malatesh CHITRAGAR, Sharath Lakshman KUMAR, Mohammed Mujeeb KALADGI
-
Publication number: 20160277363Abstract: A method for two factor authentication is described. The method comprises a server receiving an activation code for verification from a mobile device. The server generates an encrypted secret key using the activation code The secret key is encrypted and sent to the mobile device. The server receives a first token generated by the mobile device. The server generates a second token using the secret key, determines whether the first token is identical to the second token, and syncs information with the mobile device.Type: ApplicationFiled: March 17, 2015Publication date: September 22, 2016Applicant: CA, INC.Inventors: Mohammed Mujeeb KALADGI, Mahesh Malatesh CHITRAGAR, Vishwanatha SALIAN
-
Publication number: 20160275514Abstract: A method for preventing mobile payment is described. The method comprises generating an authorization request, via a payment module, based on sensitive data on a mobile device. The authorization request is transmitted from the payment module to an issuer system. The issuer system sends a neutralization trigger. In response to receiving the neutralization trigger, the payment module is disabled.Type: ApplicationFiled: March 18, 2015Publication date: September 22, 2016Inventors: Sharath Lakshman KUMAR, Mahesh Malatesh CHITRAGAR, Vishwanatha SALIAN, Stephen PRASAD
-
Publication number: 20160275505Abstract: A method for communicating payment status is described. The method comprises generating an authorization request, via a payment module, on a mobile device. The authorization request may be generated during a contactless transaction. The authorization request is transmitted to an issuer system for verification via a local merchant terminal. The payment module receives a first verification response directly from the issuer system, and determines a transaction status from the first verification response.Type: ApplicationFiled: March 17, 2015Publication date: September 22, 2016Inventors: Vishwanatha SALIAN, Mahesh Malatesh CHITRAGAR, Sharath Lakshman KUMAR, Mohammed Mujeeb KALADGI
-
Publication number: 20160275513Abstract: A method for preventing mobile payment is described. The method comprises receiving an authorization request at an issuer system from a payment module on a mobile device. The authorization request may be based on sensitive data on the mobile device. The issuer system determines whether the mobile device is missing. The issuer system sends a neutralization trigger to the mobile device, and in response to receiving the neutralization trigger, the payment module is disabled.Type: ApplicationFiled: March 18, 2015Publication date: September 22, 2016Inventors: Sharath Lakshman KUMAR, Mahesh Malatesh CHITRAGAR, Vishwanatha SALIAN, Stephen PRASAD
-
Publication number: 20160275491Abstract: A method for two factor authentication is described. The method comprises sending an activation code stored on a mobile device to a server for verification. An encrypted secret key generated by the server using the activation code is received. The secret key is decrypted using the activation code stored on the mobile device. The mobile device encrypts the secret key using a predetermined PIN. As a result of a user inputting the predetermined PIN, the secret key is decrypted, the mobile device generates a first token using the secret key and transmits the first token to the server to authenticate the user. After receiving authentication from the server, the information on the mobile device is synced with the server.Type: ApplicationFiled: March 17, 2015Publication date: September 22, 2016Inventors: Mohammed Mujeeb KALADGI, Mahesh Malatesh CHITRAGAR, Vishwanatha SALIAN