Patents by Inventor Maliheh Shirvanian
Maliheh Shirvanian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240105197Abstract: Provided is a method for enabling speaker de-identification in public audio data by leveraging adversarial perturbation. The method may include receiving audio data associated with at least one voice sample. One or more of the voice sample(s) may be perturbed toward an edge of a decision boundary of at least one classifier model. One pitch of each voice sample may be perturbed to shift each voice sample across the decision boundary of the at least one classifier model to provide at least one de-identified voice sample. A media file with the at least one de-identified voice sample may be encoded. A system and computer program product are also disclosed.Type: ApplicationFiled: February 10, 2022Publication date: March 28, 2024Inventors: Yangyong Zhang, Maliheh Shirvanian, Sunpreet Singh Arora
-
Publication number: 20230246820Abstract: An application or device is authenticated using secure application data validation. A server computer receives an authentication request comprising an application identifier or a user device identifier associated with a user device, the authentication request originating from the user device. The server computer receives a set of behavioral data associated with the application or the user device. Responsive to receiving the application identifier or device identifier, the server computer obtains a fuzzy vault associated with the application identifier or the user device identifier. The server computer determines a reconstructed key value using the fuzzy vault and the set of behavioral data. The application or the user device is authenticated using the reconstructed key value.Type: ApplicationFiled: September 2, 2021Publication date: August 3, 2023Applicant: Visa International Service AssociationInventors: Mihai Christodorescu, Maliheh Shirvanian, D.M. Shams Zawoad
-
Publication number: 20230216843Abstract: At an authorization server, a shared secret electronic key may be shared with a second computer. A selection to use a system to complete a transaction may be received from a first computing device. An image may be communicated to the first computing device. A digital representation entered by the user representing the image and a PIN based on the copy of the shared electronic key may be received from the second computing device. The system and method may determine if the digital representation entered by the user on the second computing device matches the image communicated to the first computing device. The system and method may determine if the PIN based on the copy of the shared electronic key from the second computing device is as expected. In response to determining the digital representation entered by the user matches the image and the PIN the second computing device is as expected, the user may be authorized.Type: ApplicationFiled: December 29, 2022Publication date: July 6, 2023Inventors: Maliheh Shirvanian, Shashank Agrawal
-
Patent number: 11676610Abstract: Acoustic signatures can be used in connection with a voice-enabled computer system. An acoustic signature can be a specific noise pattern (or other sound) that is played while the user is speaking and that is mixed in the acoustic channel with the user's speech. The microphone of the voice-enabled computer system can capture, as recorded audio, a mix of the acoustic signature and the user's voice. The voice-enabled computer system can analyze the recorded audio (locally or at a backend server) to verify that the expected acoustic signature is present and/or that no previous acoustic signature is present.Type: GrantFiled: May 11, 2022Date of Patent: June 13, 2023Assignee: Visa International Service AssociationInventors: Yangyong Zhang, Mastooreh Salajegheh, Maliheh Shirvanian, Sunpreet Singh Arora
-
Patent number: 11647018Abstract: At an authorization server, a shared secret electronic key may be shared with a second computer. A selection to use a system to complete a transaction may be received from a first computing device. An image may be communicated to the first computing device. A digital representation entered by the user representing the image and a PIN based on the copy of the shared electronic key may be received from the second computing device. The system and method may determine if the digital representation entered by the user on the second computing device matches the image communicated to the first computing device. The system and method may determine if the PIN based on the copy of the shared electronic key from the second computing device is as expected. In response to determining the digital representation entered by the user matches the image and the PIN the second computing device is as expected, the user may be authorized.Type: GrantFiled: September 11, 2019Date of Patent: May 9, 2023Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Maliheh Shirvanian, Shashank Agrawal
-
Publication number: 20230131437Abstract: Provided is a method for authentication. The method may include receiving first password data, first biometric input data, and first secret key data. A second secret key may be generated based on the first secret key and the first password. Fuzzy extractor helper data may be generated based on the first biometric input and the second secret key. The fuzzy extractor helper data and the first secret key may be stored. The user may be authenticated based on an attempted password and/or a second biometric input. A system and computer program product are also disclosed.Type: ApplicationFiled: February 12, 2021Publication date: April 27, 2023Inventors: Maliheh Shirvanian, Mihai Christodorescu, Daniel Siegfried Werner Masny, Ivan De Oliveira Nunes, Peter Byerly Rindal
-
Patent number: 11595398Abstract: The disclosure is directed to providing content access control in information centric networking (ICN) networks. Methods and systems include hardware and/or software that perform operations for sending to a content provider of an ICN network an access request for content in response to receiving a first content request from a client. The operations also include receiving from the content provider access control information for the content. The operations further include sending to the client a challenge. Additionally, the operations include receiving from the client an authorization of the content provider that includes information obtained by the client from the content provider based on the challenge. Furthermore, the operations include verifying the authorization received from the client using the access control information received from the content provider. Moreover, the operations include sending to the client the content.Type: GrantFiled: January 4, 2021Date of Patent: February 28, 2023Assignee: VeriSign, Inc.Inventors: Abedelaziz Mohaisen, Maliheh Shirvanian, G. Craig Murray
-
Publication number: 20220270618Abstract: Acoustic signatures can be used in connection with a voice-enabled computer system. An acoustic signature can be a specific noise pattern (or other sound) that is played while the user is speaking and that is mixed in the acoustic channel with the user's speech. The microphone of the voice-enabled computer system can capture, as recorded audio, a mix of the acoustic signature and the user's voice. The voice-enabled computer system can analyze the recorded audio (locally or at a backend server) to verify that the expected acoustic signature is present and/or that no previous acoustic signature is present.Type: ApplicationFiled: May 11, 2022Publication date: August 25, 2022Inventors: Yangyong Zhang, Mastooreh Salajegheh, Maliheh Shirvanian, Sunpreet Singh Arora
-
Publication number: 20220215086Abstract: A delegated biometric authentication system and related methods are disclosed. Using the system, a user can securely delegate biometric authentication to a public device from his communication device. This public device may be an Internet of things device that is not owned by the user, such as a computer, smart TV. tablet, etc. The public device may operate in a public place, such as a hotel or library. The communication device may be the users own smartphone or tablet, etc. A fuzzy vault process can be used to store the user's biometric template in the system Embodiments preserver the user's privacy without compromising authentication security and user convenience.Type: ApplicationFiled: March 24, 2022Publication date: July 7, 2022Inventors: Sunpreet Singh Arora, Maliheh Shirvanian
-
Patent number: 11355128Abstract: Acoustic signatures can be used in connection with a voice-enabled computer system. An acoustic signature can be a specific noise pattern (or other sound) that is played while the user is speaking and that is mixed in the acoustic channel with the user's speech. The microphone of the voice-enabled computer system can capture, as recorded audio, a mix of the acoustic signature and the user's voice. The voice-enabled computer system can analyze the recorded audio (locally or at a backend server) to verify that the expected acoustic signature is present and/or that no previous acoustic signature is present.Type: GrantFiled: December 20, 2019Date of Patent: June 7, 2022Assignee: Visa International Service AssociationInventors: Yangyong Zhang, Mastooreh Salajegheh, Maliheh Shirvanian, Sunpreet Singh Arora
-
Patent number: 11321445Abstract: A delegated biometric authentication system and related methods are disclosed. Using the system, a user can securely delegate biometric authentication to a public device from his communication device. This public device may be an Internet of things device that is not owned by the user, such as a computer, smart TV, tablet, etc. The public device may operate in a public place, such as a hotel or library. The communication device may be the user's own smartphone or tablet, etc. A fuzzy vault process can be used to store the user's biometric template in the system Embodiments preserver the user's privacy without compromising authentication security and user convenience.Type: GrantFiled: October 1, 2019Date of Patent: May 3, 2022Assignee: Visa International Service AssociationInventors: Sunpreet Singh Arora, Maliheh Shirvanian
-
Publication number: 20210193154Abstract: Acoustic signatures can be used in connection with a voice-enabled computer system. An acoustic signature can be a specific noise pattern (or other sound) that is played while the user is speaking and that is mixed in the acoustic channel with the user's speech. The microphone of the voice-enabled computer system can capture, as recorded audio, a mix of the acoustic signature and the user's voice. The voice-enabled computer system can analyze the recorded audio (locally or at a backend server) to verify that the expected acoustic signature is present and/or that no previous acoustic signature is present.Type: ApplicationFiled: December 20, 2019Publication date: June 24, 2021Inventors: Yangyong Zhang, Mastooreh Salajegheh, Maliheh Shirvanian, Sunpreet Singh Arora
-
Publication number: 20210097166Abstract: A delegated biometric authentication system and related methods are disclosed. Using the system, a user can securely delegate biometric authentication to a public device from his communication device. This public device may be an Internet of things device that is not owned by the user, such as a computer, smart TV, tablet, etc. The public device may operate in a public place, such as a hotel or library. The communication device may be the user's own smartphone or tablet, etc. A fuzzy vault process can be used to store the user's biometric template in the system Embodiments preserver the user's privacy without compromising authentication security and user convenience.Type: ApplicationFiled: October 1, 2019Publication date: April 1, 2021Inventors: Sunpreet Singh Arora, Maliheh Shirvanian
-
Publication number: 20210075781Abstract: At an authorization server, a shared secret electronic key may be shared with a second computer. A selection to use a system to complete a transaction may be received from a first computing device. An image may be communicated to the first computing device. A digital representation entered by the user representing the image and a PIN based on the copy of the shared electronic key may be received from the second computing device. The system and method may determine if the digital representation entered by the user on the second computing device matches the image communicated to the first computing device. The system and method may determine if the PIN based on the copy of the shared electronic key from the second computing device is as expected. In response to determining the digital representation entered by the user matches the image and the PIN the second computing device is as expected, the user may be authorized.Type: ApplicationFiled: September 11, 2019Publication date: March 11, 2021Inventors: Maliheh Shirvanian, Shashank Agrawal
-
Patent number: 10887314Abstract: The disclosure is directed to providing content access control in information centric networking (ICN) networks. Methods and systems include hardware and/or software that perform operations for sending to a content provider of an ICN network an access request for content in response to receiving a first content request from a client. The operations also include receiving from the content provider access control information for the content. The operations further include sending to the client a challenge. Additionally, the operations include receiving from the client an authorization of the content provider that includes information obtained by the client from the content provider based on the challenge. Furthermore, the operations include verifying the authorization received from the client using the access control information received from the content provider. Moreover, the operations include sending to the client the content.Type: GrantFiled: September 29, 2015Date of Patent: January 5, 2021Assignee: VERISIGN, INC.Inventors: Abedelaziz Mohaisen, Maliheh Shirvanian, G. Craig Murray
-
Publication number: 20170093752Abstract: The disclosure is directed to providing content access control in information centric networking (ICN) networks. Methods and systems include hardware and/or software that perform operations for sending to a content provider of an ICN network an access request for content in response to receiving a first content request from a client. The operations also include receiving from the content provider access control information for the content. The operations further include sending to the client a challenge. Additionally, the operations include receiving from the client an authorization of the content provider that includes information obtained by the client from the content provider based on the challenge. Furthermore, the operations include verifying the authorization received from the client using the access control information received from the content provider. Moreover, the operations include sending to the client the content.Type: ApplicationFiled: September 29, 2015Publication date: March 30, 2017Inventors: Abedelaziz Mohaisen, Maliheh Shirvanian, G. Craig Murray