Patents by Inventor Nihar Sharma
Nihar Sharma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11847099Abstract: The subject technology may be implemented by a device that includes at least one processor configured to encrypt a data object based at least in part on an encryption key. The at least one processor may be further configured to sign the encrypted data object with a private key and transmit the signed encrypted data object to a server for retrieval by another device. The at least one processor may be further configured to generate a sharing object corresponding to the data object, wherein the sharing object includes an encryption key and a public key that corresponds to the private key. The at least one processor may be further configured to encrypt the sharing object using a key of the other device and transmit, over a secure channel, the encrypted sharing object to the other device for subsequent retrieval and verification of the signed data object from the server.Type: GrantFiled: November 22, 2021Date of Patent: December 19, 2023Assignee: Apple Inc.Inventors: Per Love Hornquist Astrand, Van Hong, Nihar Sharma, Xixi Lu, Steven A. Myers, Michelle D. Linington, Yannick L. Sierra
-
Publication number: 20230394176Abstract: Aspects of the subject technology provide for integration between a messaging system and a collaborative application. A messaging system may receive, via user input, an instruction to create a message thread with a plurality of user accounts. The message thread may include a document link associated with a collaborative application. The messaging system may generate, for each of the user accounts, an obfuscated identifier associated with that user account and a document link. The messaging system may provide the obfuscated identifiers to the collaborative application. An initial message exchanged between the plurality of user accounts with the document link in the message thread may establish, for the collaborative application, the obfuscated identifiers that will be associated with the document link.Type: ApplicationFiled: May 30, 2023Publication date: December 7, 2023Inventors: Stephen M. LOTTERMOSER, Alejandro A. RODRIGUEZ, Alexandre S. LACOUR, Charles CIRCLAEYS, Craig M. FEDERIGHI, Delfina JOVANOVSKA, Devin O. CLARY, Elana L. STETTIN, Elliot A. BARER, Jae Woo CHANG, Johannes B. FORTMANN, Miranda J. ZHOU, Nihar SHARMA, Pierre J. DE FILIPPIS, Richard B. BLAIR, Ryan A. WILLIAMS, Vasilios E. ANTON
-
Publication number: 20220393867Abstract: This Application sets forth techniques for establishing a custodial relationship between a user device and a custodian device for recovering access to a user account and/or to encrypted user data with assistance provided by the custodian device to effect access recovery. A server of a cloud network service provides an anonymous identifier to associate with the custodian device and an account recovery key to store at the custodian device. Identity of an account of the cloud network service associated with the custodian device can be hidden from the server. The user device generates a data recovery key and provides a first portion of the data recovery key to the custodian device and a second portion of the data recovery key to the server. Integrity of the stored account recovery key and portions of the data recovery key are checked regularly by the custodian device and the user device.Type: ApplicationFiled: February 3, 2022Publication date: December 8, 2022Inventors: Gokul P. THIRUMALAI, Alexandre A. AYBES, Dmitry V. BELOV, Jean-Luc GIRAUD, Kalyan C. GOPAVARAPU, Sudhakar N. MAMBAKKAM, Rebekah H. MERCER, Keaton F. MOWERY, Steven A. MYERS, Munish K. POONIA, Nihar SHARMA, Assar E. WESTERLUND, Frederic JACOBS
-
Publication number: 20220083511Abstract: The subject technology may be implemented by a device that includes at least one processor configured to encrypt a data object based at least in part on an encryption key. The at least one processor may be further configured to sign the encrypted data object with a private key and transmit the signed encrypted data object to a server for retrieval by another device. The at least one processor may be further configured to generate a sharing object corresponding to the data object, wherein the sharing object includes an encryption key and a public key that corresponds to the private key. The at least one processor may be further configured to encrypt the sharing object using a key of the other device and transmit, over a secure channel, the encrypted sharing object to the other device for subsequent retrieval and verification of the signed data object from the server.Type: ApplicationFiled: November 22, 2021Publication date: March 17, 2022Inventors: Per Love HORNQUIST ASTRAND, Van HONG, Nihar SHARMA, Xixi LU, Steven A. MYERS, Michelle D. LININGTON, Yannick L. SIERRA
-
Patent number: 11182349Abstract: The subject technology may be implemented by a device that includes at least one processor configured to encrypt a data object based at least in part on an encryption key. The at least one processor may be further configured to sign the encrypted data object with a private key and transmit the signed encrypted data object to a server for retrieval by another device. The at least one processor may be further configured to generate a sharing object corresponding to the data object, wherein the sharing object includes an encryption key and a public key that corresponds to the private key. The at least one processor may be further configured to encrypt the sharing object using a key of the other device and transmit, over a secure channel, the encrypted sharing object to the other device for subsequent retrieval and verification of the signed data object from the server.Type: GrantFiled: May 31, 2019Date of Patent: November 23, 2021Assignee: Apple Inc.Inventors: Per Love Hornquist Astrand, Van Hong, Nihar Sharma, Xixi Lu, Steven A. Myers, Michelle D. Linington, Yannick L. Sierra
-
Patent number: 10372930Abstract: Some embodiments provide a method for storing multiple data assets in a folder structure on a cloud services platform. The method stores a separate encrypted structure for each of the data assets on the cloud services platform. A same first key provides access to each of the encrypted structures. The method stores, on the cloud services platform, a folder structure with an encrypted copy of the first key. The method stores a parent structure of the folder on the cloud services platform. The parent structure includes an encrypted copy of a second key that provides access to the encrypted copy of the first key.Type: GrantFiled: September 23, 2016Date of Patent: August 6, 2019Assignee: APPLE INC.Inventors: Nihar Sharma, Xiaonan Ma, Van Hong, Jean-Gabriel Morard, Olivier Bonnet
-
Patent number: 10049032Abstract: The present invention provides a method and system for generating negative test input data. A set of attributes and a set of attribute properties can be extracted from a requirement specification. A constraint representation syntax can be framed from the extracted set of attribute properties. A structured diagram is modeled from the framed constraint representation syntax and a set of use cases, a set of path predicates can be constructed from the structured diagram. One or more attribute classes can be determined from the set of path predicates based on an attribute constraint and an attribute dependency. The negative test input data shall be generated from the one or more attribute classes using genetic algorithm.Type: GrantFiled: December 4, 2014Date of Patent: August 14, 2018Assignee: Infosys LimitedInventors: Anjaneyulu Pasala, Nihar Sharma, Saurav Singh
-
Publication number: 20170357816Abstract: Some embodiments provide a method for storing multiple data assets in a folder structure on a cloud services platform. The method stores a separate encrypted structure for each of the data assets on the cloud services platform. A same first key provides access to each of the encrypted structures. The method stores, on the cloud services platform, a folder structure with an encrypted copy of the first key. The method stores a parent structure of the folder on the cloud services platform. The parent structure includes an encrypted copy of a second key that provides access to the encrypted copy of the first key.Type: ApplicationFiled: September 23, 2016Publication date: December 14, 2017Inventors: Nihar Sharma, Xiaonan Ma, Van Hong, Jean-Gabriel Morard, Olivier Bonnet
-
Publication number: 20150301927Abstract: The present invention provides a method and system for generating negative test input data. A set of attributes and a set of attribute properties can be extracted from a requirement specification. A constraint representation syntax can be framed from the extracted set of attribute properties. A structured diagram is modeled from the framed constraint representation syntax and a set of use cases, a set of path predicates can be constructed from the structured diagram. One or more attribute classes can be determined from the set of path predicates based on an attribute constraint and an attribute dependency. The negative test input data shall be generated from the one or more attribute classes using genetic algorithm.Type: ApplicationFiled: December 4, 2014Publication date: October 22, 2015Inventors: Anjaneyulu Pasala, Nihar Sharma, Saurav Singh