Patents by Inventor Mahesh Malatesh CHITRAGAR

Mahesh Malatesh CHITRAGAR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240071220
    Abstract: Systems, methods and/or computer program products for improving autonomous vehicle operation by enabling communication between the autonomous vehicles and BCI systems publishing signals from nearby pedestrians. Wearable BCI devices worn by pedestrians analyze brainwave signals and classify the brainwave signals in order to filter out signals that are unrelated to crossing the street or the directionality of travel by the pedestrian. BCI devices publish, or broadcast brain wave signals related to crossing the street or directionality of travel to the surrounding area where autonomous vehicle receive and process the brainwave signals being published. The autonomous vehicles predict movements of nearby pedestrians based on the intended direction of travel signified by the collected brainwave signals, and the autonomous vehicles select driving actions in response to the anticipated movements of nearby pedestrians.
    Type: Application
    Filed: August 31, 2022
    Publication date: February 29, 2024
    Inventors: Saraswathi Sailaja Perumalla, Sarbajit K. Rakshit, Mahesh Malatesh Chitragar
  • Patent number: 10607017
    Abstract: A method includes receiving a security profile comprising user-defined rules for processing sensitive data, and identifying a plurality of sensitive data components in a data file according to the security profile. The method further includes generating a respective format-preserving token for each of the identified plurality of sensitive data components. The method additionally includes generating a corresponding token key for each of the respective-format preserving tokens, and replacing each of the plurality of sensitive data components in the data file with the respective format-preserving token. Further, the method includes cryptographically camouflaging each of the token keys using a first password and storing each of the cryptographically camouflaged token keys.
    Type: Grant
    Filed: January 4, 2017
    Date of Patent: March 31, 2020
    Assignee: CA, INC.
    Inventors: Sharath L. Kumar, Mohammed Mujeeb Kaladgi, Rajendra Pachouri, Mahesh Malatesh Chitragar
  • Patent number: 10475036
    Abstract: A restriction request message, including a restriction parameter for a secondary account, is received from a device that is associated with a primary account, via a network node that is outside of a secure authorization network. A replenishment request message, including a password and an account replenishment parameter for the secondary account, is also received via a network node that is outside of the authorization network. Authentication is performed based on the password, and the restriction parameter for the secondary account is identified responsive to receiving the replenishment request message. Responsive to determining that the account replenishment parameter satisfies the restriction parameter, a replacement key is generated and associated with the account replenishment parameter for the secondary account.
    Type: Grant
    Filed: January 8, 2016
    Date of Patent: November 12, 2019
    Assignee: CA, Inc.
    Inventors: Sharath Lakshman Kumar, Mahesh Malatesh Chitragar, Mohammed Mujeeb Kaladgi, Pradeep G. Nair
  • Patent number: 10387884
    Abstract: A method for preventing mobile payment is described. The method comprises generating an authorization request, via a payment module, based on sensitive data on a mobile device. The authorization request is transmitted from the payment module to an issuer system. The issuer system sends a neutralization trigger. In response to receiving the neutralization trigger, the payment module is disabled.
    Type: Grant
    Filed: March 18, 2015
    Date of Patent: August 20, 2019
    Assignee: CA, Inc.
    Inventors: Sharath Lakshman Kumar, Mahesh Malatesh Chitragar, Vishwanatha Salian, Stephen Prasad
  • Patent number: 10360558
    Abstract: A method for two factor authentication is described. The method comprises sending an activation code stored on a mobile device to a server for verification. An encrypted secret key generated by the server using the activation code is received. The secret key is decrypted using the activation code stored on the mobile device. The mobile device encrypts the secret key using a predetermined PIN. As a result of a user inputting the predetermined PIN, the secret key is decrypted, the mobile device generates a first token using the secret key and transmits the first token to the server to authenticate the user. After receiving authentication from the server, the information on the mobile device is synced with the server.
    Type: Grant
    Filed: March 17, 2015
    Date of Patent: July 23, 2019
    Assignee: CA, Inc.
    Inventors: Mohammed Mujeeb Kaladgi, Mahesh Malatesh Chitragar, Vishwanatha Salian
  • Patent number: 10089631
    Abstract: A method for preventing mobile payment is described. The method comprises receiving an authorization request at an issuer system from a payment module on a mobile device. The authorization request may be based on sensitive data on the mobile device. The issuer system determines whether the mobile device is missing. The issuer system sends a neutralization trigger to the mobile device, and in response to receiving the neutralization trigger, the payment module is disabled.
    Type: Grant
    Filed: March 18, 2015
    Date of Patent: October 2, 2018
    Assignee: CA, Inc.
    Inventors: Sharath Lakshman Kumar, Mahesh Malatesh Chitragar, Vishwanatha Salian, Stephen Prasad
  • Patent number: 10050942
    Abstract: A method for two factor authentication is described. The method comprises a server receiving an activation code for verification from a mobile device. The server generates an encrypted secret key using the activation code The secret key is encrypted and sent to the mobile device. The server receives a first token generated by the mobile device. The server generates a second token using the secret key, determines whether the first token is identical to the second token, and syncs information with the mobile device.
    Type: Grant
    Filed: March 17, 2015
    Date of Patent: August 14, 2018
    Assignee: CA, Inc.
    Inventors: Mohammed Mujeeb Kaladgi, Mahesh Malatesh Chitragar, Vishwanatha Salian
  • Publication number: 20180189502
    Abstract: A method includes receiving a security profile comprising user-defined rules for processing sensitive data, and identifying a plurality of sensitive data components in a data file according to the security profile. The method further includes generating a respective format-preserving token for each of the identified plurality of sensitive data components. The method additionally includes generating a corresponding token key for each of the respective-format preserving tokens, and replacing each of the plurality of sensitive data components in the data file with the respective format-preserving token. Further, the method includes cryptographically camouflaging each of the token keys using a first password and storing each of the cryptographically camouflaged token keys.
    Type: Application
    Filed: January 4, 2017
    Publication date: July 5, 2018
    Applicant: CA, Inc.
    Inventors: Sharath L. KUMAR, Mohammed Mujeeb KALADGI, Rajendra PACHOURI, Mahesh Malatesh CHITRAGAR
  • Patent number: 9984371
    Abstract: Methods of de-tokenizing secure payment tokens are disclosed. A method according to some embodiments includes receiving a request from an issuer to de-tokenize a secure payment token associated with a transaction conducted using a mobile terminal, generating a metric indicative of a risk of de-tokenizing the secure payment token, comparing the metric indicative of the risk of de-tokenizing the secure payment token to a predetermined threshold, and transmitting a response to the request to de-tokenize the secure payment token, wherein the response is based on the comparison of the metric indicative of the risk of de-tokenizing the secure payment token with the predetermined threshold.
    Type: Grant
    Filed: March 27, 2015
    Date of Patent: May 29, 2018
    Assignee: CA, INC.
    Inventors: Mahesh Malatesh Chitragar, Dhivya Kalyanasundaram, Sharath Lakshman Kumar, Vishwanatha Salian
  • Publication number: 20170200160
    Abstract: A restriction request message, including a restriction parameter for a secondary account, is received from a device that is associated with a primary account, via a network node that is outside of a secure authorization network. A replenishment request message, including a password and an account replenishment parameter for the secondary account, is also received via a network node that is outside of the authorization network. Authentication is performed based on the password, and the restriction parameter for the secondary account is identified responsive to receiving the replenishment request message. Responsive to determining that the account replenishment parameter satisfies the restriction parameter, a replacement key is generated and associated with the account replenishment parameter for the secondary account.
    Type: Application
    Filed: January 8, 2016
    Publication date: July 13, 2017
    Applicant: CA, Inc.
    Inventors: SHARATH LAKSHMAN KUMAR, MAHESH MALATESH CHITRAGAR, MOHAMMED MUJEEB KALADGI, PRADEEP G. NAIR
  • Publication number: 20170186008
    Abstract: A restriction request message, including a restriction for a secondary account, is received by a computer server from a user device via a network node that is outside of a secure authorization network. An authorization request message, including an identifier of the secondary account and a secondary password provided by a terminal that is communicatively coupled to a node of the authorization network, is received by the computer server via the authorization network. The secondary account is identified as being associated with a primary account based on the identifier included in the authorization request message. Authentication for a transaction between the terminal and the primary account is performed by the computer server based on the secondary password. An authorization response message for the transaction between the terminal and the primary account, based on the restriction for the secondary account, is transmitted from the computer server via the authorization network.
    Type: Application
    Filed: December 29, 2015
    Publication date: June 29, 2017
    Applicant: CA, Inc.
    Inventors: Rajendra Kumar Pachouri, MOHAMMED MUJEEB KALADGI, SHARATH LAKSHMAN KUMAR, MAHESH MALATESH CHITRAGAR, PRADEEP G. NAIR
  • Publication number: 20170032362
    Abstract: A method of enrolling a payment card in a mobile wallet app includes receiving, on a mobile device, a request from a user to enroll a financial account in a mobile wallet application installed on the mobile device, sending an enrollment request to a wallet server, the enrollment request including an identification string uniquely associated with the mobile device, receiving a payment token associated with the financial account from the wallet server, and notifying the user that the financial account has been enrolled into the mobile wallet application responsive to receipt of the payment token. Related computer program products are also disclosed.
    Type: Application
    Filed: July 31, 2015
    Publication date: February 2, 2017
    Applicant: CA, Inc.
    Inventors: RAJDEEP LAHKAR, Mahesh Malatesh Chitragar
  • Publication number: 20160358163
    Abstract: A method includes communicating with a token server to identify a key, generating an initialization vector, performing a logical operation on the key using the initialization vector to generate a modified key, encrypting a financial account number using a format preserving encryption technique to generate a payment token where the format preserving encryption technique uses the modified key, establishing a communication connection with a point-of-sale terminal, and transmitting the payment token to the point-of-sale terminal.
    Type: Application
    Filed: December 29, 2014
    Publication date: December 8, 2016
    Applicant: CA, INC.
    Inventors: SHARATH LAKSHMAN KUMAR, Mahesh Malatesh Chitragar
  • Publication number: 20160283942
    Abstract: Methods of de-tokenizing secure payment tokens are disclosed. A method according to some embodiments includes receiving a request from an issuer to de-tokenize a secure payment token associated with a transaction conducted using a mobile terminal, generating a metric indicative of a risk of de-tokenizing the secure payment token, comparing the metric indicative of the risk of de-tokenizing the secure payment token to a predetermined threshold, and transmitting a response to the request to de-tokenize the secure payment token, wherein the response is based on the comparison of the metric indicative of the risk of de-tokenizing the secure payment token with the predetermined threshold.
    Type: Application
    Filed: March 27, 2015
    Publication date: September 29, 2016
    Applicant: CA. INC.
    Inventors: MAHESH MALATESH CHITRAGAR, DHIVYA KALYANASUNDARAM, Sharath Lakshman Kumar, Vishwanatha Salian
  • Publication number: 20160275506
    Abstract: A method for communicating payment status is described. The method comprises receiving an authorization request, via a local merchant terminal, at an issuer system. The authorization request may be generated during a contactless transaction. The authorization request is verified at the issuer system. The issuer system generates a first verification response and a second verification response. The issuer system transmits the first verification response directly to a payment module on a mobile device. The issuer also transmits the second verification response to the local merchant terminal.
    Type: Application
    Filed: March 17, 2015
    Publication date: September 22, 2016
    Inventors: Vishwanatha SALIAN, Mahesh Malatesh CHITRAGAR, Sharath Lakshman KUMAR, Mohammed Mujeeb KALADGI
  • Publication number: 20160277363
    Abstract: A method for two factor authentication is described. The method comprises a server receiving an activation code for verification from a mobile device. The server generates an encrypted secret key using the activation code The secret key is encrypted and sent to the mobile device. The server receives a first token generated by the mobile device. The server generates a second token using the secret key, determines whether the first token is identical to the second token, and syncs information with the mobile device.
    Type: Application
    Filed: March 17, 2015
    Publication date: September 22, 2016
    Applicant: CA, INC.
    Inventors: Mohammed Mujeeb KALADGI, Mahesh Malatesh CHITRAGAR, Vishwanatha SALIAN
  • Publication number: 20160275514
    Abstract: A method for preventing mobile payment is described. The method comprises generating an authorization request, via a payment module, based on sensitive data on a mobile device. The authorization request is transmitted from the payment module to an issuer system. The issuer system sends a neutralization trigger. In response to receiving the neutralization trigger, the payment module is disabled.
    Type: Application
    Filed: March 18, 2015
    Publication date: September 22, 2016
    Inventors: Sharath Lakshman KUMAR, Mahesh Malatesh CHITRAGAR, Vishwanatha SALIAN, Stephen PRASAD
  • Publication number: 20160275505
    Abstract: A method for communicating payment status is described. The method comprises generating an authorization request, via a payment module, on a mobile device. The authorization request may be generated during a contactless transaction. The authorization request is transmitted to an issuer system for verification via a local merchant terminal. The payment module receives a first verification response directly from the issuer system, and determines a transaction status from the first verification response.
    Type: Application
    Filed: March 17, 2015
    Publication date: September 22, 2016
    Inventors: Vishwanatha SALIAN, Mahesh Malatesh CHITRAGAR, Sharath Lakshman KUMAR, Mohammed Mujeeb KALADGI
  • Publication number: 20160275513
    Abstract: A method for preventing mobile payment is described. The method comprises receiving an authorization request at an issuer system from a payment module on a mobile device. The authorization request may be based on sensitive data on the mobile device. The issuer system determines whether the mobile device is missing. The issuer system sends a neutralization trigger to the mobile device, and in response to receiving the neutralization trigger, the payment module is disabled.
    Type: Application
    Filed: March 18, 2015
    Publication date: September 22, 2016
    Inventors: Sharath Lakshman KUMAR, Mahesh Malatesh CHITRAGAR, Vishwanatha SALIAN, Stephen PRASAD
  • Publication number: 20160275491
    Abstract: A method for two factor authentication is described. The method comprises sending an activation code stored on a mobile device to a server for verification. An encrypted secret key generated by the server using the activation code is received. The secret key is decrypted using the activation code stored on the mobile device. The mobile device encrypts the secret key using a predetermined PIN. As a result of a user inputting the predetermined PIN, the secret key is decrypted, the mobile device generates a first token using the secret key and transmits the first token to the server to authenticate the user. After receiving authentication from the server, the information on the mobile device is synced with the server.
    Type: Application
    Filed: March 17, 2015
    Publication date: September 22, 2016
    Inventors: Mohammed Mujeeb KALADGI, Mahesh Malatesh CHITRAGAR, Vishwanatha SALIAN