Patents by Inventor Milap Shah
Milap Shah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Systems and methods for discovery, classification, and indexing of data in a native computing system
Patent number: 12259882Abstract: In general, various aspects provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for performing data discovery on a target computing system. In various aspects, a third party computing connects, via a public data network, to an edge node of the target computing system and instructs the target computing system to execute jobs to discover target data stored in data repositories in a private data network in the target computing system. In some aspects, the third party computing system may schedule the jobs on the target computing system based on computing resource availability on the target computing system.Type: GrantFiled: May 4, 2023Date of Patent: March 25, 2025Assignee: OneTrust, LLCInventors: Haribalan Raghupathy, Saravanan Pitchaimani, Jonathan Lynn, Rahul Shinde, Kevin Jones, Subramanian Viswanathan, Mahesh Sivan, Zara Dana, Milap Shah, Sivanandame Chandramohan, Abhishek Upadhyay, Anand Balasubramanian -
Publication number: 20250061154Abstract: Methods, systems, and non-transitory computer readable storage media are disclosed for optimizing computer memory usage for lookup lists in computer memory via probabilistic data structures. For example, the disclosed system generates a probabilistic data structure (e.g., a Bloom filter) to represent data in a lookup list including multi-token items by hashing items of the lookup list to sets of bit values in a bit vector. The disclosed system classifies text content in a digital document by utilizing a maximum number of tokens from multi-token items in the lookup list to select and compare sets of sequential tokens in the digital document to the probabilistic data structure. The disclosed system also iteratively reduces the number of tokens in sets of sequential tokens for subsequent comparisons. Furthermore, in some aspects, the disclosed system causes a computing device to modify a digital document and/or database operations based on the classifications.Type: ApplicationFiled: August 15, 2023Publication date: February 20, 2025Inventors: Subramanian Viswanathan, Anand Balasubramanian, Milap Shah, Tianchen Cai
-
Publication number: 20240265036Abstract: The present disclosure provides methods, apparatus, systems, computing devices, computing entities, and/or the like for providing persistent representations in graph data structures of relationships that exist among data objects found across different data-related processes to enable efficient querying of data from the different data-related processes.Type: ApplicationFiled: September 23, 2022Publication date: August 8, 2024Inventors: Subramanian Viswanathan, Milap Shah
-
Publication number: 20240098109Abstract: In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for integrating third party computing system functionality into a first party computing system by providing a risk management and mitigation computing system configured to analyze a risk of integrating the functionality provided by the third party computing system and facilitating implementation of one or more data-related controls that include performing computer-specific operations to mitigate and/or eliminate the identified risks. For example, the risk management and mitigation computing system can access risk data in tenant computing systems to determine a risk score related to the integration of the third party computing system functionality based on risks determined during prior integrations of the third party computing system functionality by other tenant computing systems.Type: ApplicationFiled: February 10, 2022Publication date: March 21, 2024Applicant: OneTrust, LLCInventors: Subramanian Viswanathan, Milap Shah
-
Publication number: 20240004871Abstract: Various embodiments provide methods, apparatus, systems, computing devices, computing entities, and/or the like for identifying targeted data for a data subject across a plurality of data objects in a data source. In accordance with one embodiment, a method is provided comprising: receiving a request to identify targeted data for a data subject; identifying a first data object using metadata for a data source that identifies the first data object as associated with a first targeted data type for a data portion from the request; identifying a first data field from a graph data structure of the first data object that identifies the first data field as used for storing data having the first targeted data type; and querying the first data object based on the first data field and the data for the first targeted data type to identify a first targeted data portion for the data subject.Type: ApplicationFiled: September 18, 2023Publication date: January 4, 2024Inventors: Kevin Jones, Saravanan Pitchaimani, Subramanian Viswanathan, Milap Shah, Ramana Malladi, Aadil Allidina, Matthew Hennig, Dylan D. Patton-Kuhl, Jonathan Blake Brannon
-
Patent number: 11797528Abstract: Various embodiments provide methods, apparatus, systems, computing devices, computing entities, and/or the like for identifying targeted data for a data subject across a plurality of data objects in a data source. In accordance with one embodiment, a method is provided comprising: receiving a request to identify targeted data for a data subject; identifying a first data object using metadata for a data source that identifies the first data object as associated with a first targeted data type for a data portion from the request; identifying a first data field from a graph data structure of the first data object that identifies the first data field as used for storing data having the first targeted data type; and querying the first data object based on the first data field and the data for the first targeted data type to identify a first targeted data portion for the data subject.Type: GrantFiled: July 8, 2021Date of Patent: October 24, 2023Assignee: OneTrust, LLCInventors: Kevin Jones, Saravanan Pitchaimani, Subramanian Viswanathan, Milap Shah, Ramana Malladi, Aadil Allidina, Matthew Hennig, Dylan D. Patton-Kuhl, Jonathan Blake Brannon
-
Patent number: 11775348Abstract: In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for generating and managing custom workflows for domain objects defined within microservices. In accordance with various aspects, a method is that comprises: receiving an attribute value for a custom workflow to include in a microservice that corresponds to an attribute defined for a workflow component; accessing mapping data for an attribute; identifying, based on the mapping data, a corresponding field of a workflows table mapped to the attribute; storing a record in the workflows table for the custom workflow with the attribute value stored in the corresponding field for the record to persist the custom workflow in the microservice.Type: GrantFiled: February 17, 2022Date of Patent: October 3, 2023Assignee: OneTrust, LLCInventors: Subramanian Viswanathan, Milap Shah
-
Publication number: 20230274213Abstract: A method, in various aspects, comprises: (1) receiving a query from a first party computing system related to integrating third party computing functionality into the first party computing system; (2) identifying a set of third party entities that provide the third party computing functionality; (3) accessing integration data; (4) identifying a set of reference entities, the set of reference entities including, for each respective third party entity, a respective reference entity that has previously integrated the third party computing into a respective reference entity computing system associated with the respective reference entity; (5) determining second integration data with respect to the set of reference entities integrating the third party computing functionality; (6) generating, based on the first integration data and the second integration data, data responsive to the query that is specific to the first party computing system; and (7) taking an action with respect to the data.Type: ApplicationFiled: May 8, 2023Publication date: August 31, 2023Applicant: OneTrust, LLCInventors: Jonathan Blake Brannon, Jason L. Sabourin, Subaramanian Viswanathan, Manesh Haridas, Milap Shah
-
SYSTEMS AND METHODS FOR DISCOVERY, CLASSIFICATION, AND INDEXING OF DATA IN A NATIVE COMPUTING SYSTEM
Publication number: 20230273921Abstract: In general, various aspects provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for performing data discovery on a target computing system. In various aspects, a third party computing connects, via a public data network, to an edge node of the target computing system and instructs the target computing system to execute jobs to discover target data stored in data repositories in a private data network in the target computing system. In some aspects, the third party computing system may schedule the jobs on the target computing system based on computing resource availability on the target computing system.Type: ApplicationFiled: May 4, 2023Publication date: August 31, 2023Inventors: Haribalan Raghupathy, Saravanan Pitchaimani, Jonathan Lynn, Rahul Shinde, Kevin Jones, Subramanian Viswanathan, Mahesh Sivan, Zara Dana, Milap Shah, Sivanandame Chandramohan, Abhishek Upadhyay, Anand Balasubramanian -
Systems and methods for discovery, classification, and indexing of data in a native computing system
Patent number: 11687528Abstract: In general, various aspects provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for performing data discovery on a target computing system. In various aspects, a third party computing connects, via a public data network, to an edge node of the target computing system and instructs the target computing system to execute jobs to discover target data stored in data repositories in a private data network in the target computing system. In some aspects, the third party computing system may schedule the jobs on the target computing system based on computing resource availability on the target computing system.Type: GrantFiled: January 25, 2022Date of Patent: June 27, 2023Assignee: OneTrust, LLCInventors: Haribalan Raghupathy, Saravanan Pitchaimani, Jonathan Lynn, Rahul Shinde, Kevin Jones, Subramanian Viswanathan, Mahesh Sivan, Zara Dana, Milap Shah, Sivanandame Chandramohan, Abhishek Upadhyay, Anand Balasubramanian -
Patent number: 11601464Abstract: In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for integrating third party computing system functionality into a first party computing system by providing a risk management and mitigation computing system configured to analyze a risk of integrating the functionality provided by the third party computing system and facilitating implementation of one or more data-related controls that include performing computer-specific operations to mitigate and/or eliminate the identified risks. For example, the risk management and mitigation computing system can access risk data in tenant computing systems to determine a risk score related to the integration of the third party computing system functionality based on risks determined during prior integrations of the third party computing system functionality by other tenant computing systems.Type: GrantFiled: February 10, 2022Date of Patent: March 7, 2023Assignee: OneTrust, LLCInventors: Subramanian Viswanathan, Milap Shah
-
Publication number: 20230031152Abstract: A system includes persistent storage containing an archive, a first interface to a messaging system that includes a plurality of channels, a second interface to a machine learning system that includes a query detection model and a reply detection model, and a processor configured to perform operations including receiving, from the message system, messages that appeared in a particular channel of the plurality of channels. The operations also include providing, to the machine learning system, the messages, where reception of the messages causes the query detection model to detect a query within the messages and the reply detection model to detect, within the messages, replies to the query. The operations further include receiving, from the machine learning system, the query and the replies, and storing, in the archive, the query, the replies, and an indication that the replies relate to the query.Type: ApplicationFiled: July 28, 2021Publication date: February 2, 2023Inventors: Vignesh Bhaskaran, Spandan Chakraborty, Soumil Mandal, Milap Shah, Amjad Shaikh
-
Patent number: 11442906Abstract: In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for generating and managing custom attributes and corresponding values for domain objects defined within microservices. In accordance with various aspects, a method is provided that comprises: receiving a custom attribute request for a domain object defined in a microservice that comprises a domain object identifier, a custom attribute to add to the domain object, and a value type for the custom attribute; identifying, based on the domain object identifier and the value type, a custom value table for the domain object that comprises placeholder fields; identifying a placeholder field that is available in the custom value table; and storing a record in the attribute schema table for the domain object and the custom attribute comprising mapping data that maps the custom attribute to the placeholder field for the custom value table.Type: GrantFiled: February 4, 2022Date of Patent: September 13, 2022Assignee: OneTrust, LLCInventors: Subramanian Viswanathan, Milap Shah
-
Publication number: 20220261288Abstract: In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for generating and managing custom workflows for domain objects defined within microservices. In accordance with various aspects, a method is that comprises: receiving an attribute value for a custom workflow to include in a microservice that corresponds to an attribute defined for a workflow component; accessing mapping data for an attribute; identifying, based on the mapping data, a corresponding field of a workflows table mapped to the attribute; storing a record in the workflows table for the custom workflow with the attribute value stored in the corresponding field for the record to persist the custom workflow in the microservice.Type: ApplicationFiled: February 17, 2022Publication date: August 18, 2022Inventors: Subramanian Viswanathan, Milap Shah
-
Patent number: 11416590Abstract: Data processing systems and methods, according to various embodiments, are adapted for automatically assessing the level of security and/or privacy risk associated with doing business with a particular vendor or other entity and for generating training material for such vendors. In various embodiments, the systems may automatically obtain and use any suitable information to assess such risk levels including, for example: (1) any security and/or privacy certifications held by the vendor; (2) the terms of one or more contracts between a particular entity and the vendor; (3) the results of one or more privacy impact assessments for the vendor; and/or (4) any other suitable data. The system may be configured to automatically approve or reject a particular vendor based on the assessed risk level associated with the vendor and this information may be automatically communicated to an entity considering doing business with the vendor and/or the vendor itself.Type: GrantFiled: October 18, 2021Date of Patent: August 16, 2022Assignee: OneTrust, LLCInventors: Jonathan Blake Brannon, Kabir A. Barday, Jason L. Sabourin, Kevin Jones, Subramanian Viswanathan, Milap Shah
-
Patent number: 11416589Abstract: Data processing systems and methods, according to various embodiments, are adapted for automatically assessing the level of security and/or privacy risk associated with doing business with a particular vendor or other entity and for generating training material for such vendors. In various embodiments, the systems may automatically obtain and use any suitable information to assess such risk levels including, for example: (1) any security and/or privacy certifications held by the vendor; (2) the terms of one or more contracts between a particular entity and the vendor; (3) the results of one or more privacy impact assessments for the vendor; and/or (4) any other suitable data. The system may be configured to automatically approve or reject a particular vendor based on the assessed risk level associated with the vendor and this information may be automatically communicated to an entity considering doing business with the vendor and/or the vendor itself.Type: GrantFiled: October 4, 2021Date of Patent: August 16, 2022Assignee: OneTrust, LLCInventors: Jonathan Blake Brannon, Kabir A. Barday, Jason L. Sabourin, Kevin Jones, Subramanian Viswanathan, Milap Shah
-
Publication number: 20220255959Abstract: In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for integrating third party computing system functionality into a first party computing system by providing a risk management and mitigation computing system configured to analyze a risk of integrating the functionality provided by the third party computing system and facilitating implementation of one or more data-related controls that include performing computer-specific operations to mitigate and/or eliminate the identified risks. For example, the risk management and mitigation computing system can access risk data in tenant computing systems to determine a risk score related to the integration of the third party computing system functionality based on risks determined during prior integrations of the third party computing system functionality by other tenant computing systems.Type: ApplicationFiled: February 10, 2022Publication date: August 11, 2022Inventors: Subramanian Viswanathan, Milap Shah
-
Publication number: 20220245099Abstract: In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for generating and managing custom attributes and corresponding values for domain objects defined within microservices. In accordance with various aspects, a method is provided that comprises: receiving a custom attribute request for a domain object defined in a microservice that comprises a domain object identifier, a custom attribute to add to the domain object, and a value type for the custom attribute; identifying, based on the domain object identifier and the value type, a custom value table for the domain object that comprises placeholder fields; identifying a placeholder field that is available in the custom value table; and storing a record in the attribute schema table for the domain object and the custom attribute comprising mapping data that maps the custom attribute to the placeholder field for the custom value table.Type: ApplicationFiled: February 4, 2022Publication date: August 4, 2022Inventors: Subramanian Viswanathan, Milap Shah
-
SYSTEMS AND METHODS FOR DISCOVERY, CLASSIFICATION, AND INDEXING OF DATA IN A NATIVE COMPUTING SYSTEM
Publication number: 20220237190Abstract: In general, various aspects provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for performing data discovery on a target computing system. In various aspects, a third party computing connects, via a public data network, to an edge node of the target computing system and instructs the target computing system to execute jobs to discover target data stored in data repositories in a private data network in the target computing system. In some aspects, the third party computing system may schedule the jobs on the target computing system based on computing resource availability on the target computing system.Type: ApplicationFiled: January 25, 2022Publication date: July 28, 2022Inventors: Haribalan Raghupathy, Saravanan Pitchaimani, Jonathan Lynn, Rahul Shinde, Kevin Jones, Subramanian Viswanathan, Mahesh Sivan, Zara Dana, Milap Shah, Sivanandame Chandramohan, Abhishek Upadhyay, Anand Balasubramanian -
Publication number: 20220043894Abstract: Data processing systems and methods, according to various embodiments, are adapted for automatically assessing the level of security and/or privacy risk associated with doing business with a particular vendor or other entity and for generating training material for such vendors. In various embodiments, the systems may automatically obtain and use any suitable information to assess such risk levels including, for example: (1) any security and/or privacy certifications held by the vendor; (2) the terms of one or more contracts between a particular entity and the vendor; (3) the results of one or more privacy impact assessments for the vendor; and/or (4) any other suitable data. The system may be configured to automatically approve or reject a particular vendor based on the assessed risk level associated with the vendor and this information may be automatically communicated to an entity considering doing business with the vendor and/or the vendor itself.Type: ApplicationFiled: October 25, 2021Publication date: February 10, 2022Applicant: OneTrust, LLCInventors: Jonathan Blake Brannon, Kabir A. Barday, Jason L. Sabourin, Kevin Jones, Subramanian Viswanathan, Milap Shah