Patents by Inventor Nitin Singh Chauhan

Nitin Singh Chauhan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9934542
    Abstract: The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field.
    Type: Grant
    Filed: September 22, 2014
    Date of Patent: April 3, 2018
    Assignee: Infosys Limited
    Inventors: Nitin Singh Chauhan, Ashutosh Saxena, Krishna Chaitanya Telikicherla
  • Patent number: 9641617
    Abstract: The present invention provides a method and system for verifying integrity of cloud data using unconnected trusted device. The method involves requesting encrypted data though a terminal from a metadata offsite location on a cloud storage then entering encrypted data into an unconnected trusted device thereafter obtaining sentinel data from one or more predefined sentinel locations in encrypted data then requesting original data from the cloud storage through the terminal from the unconnected trusted device thereafter comparing sentinel data and original data for integrity and finally displaying the results.
    Type: Grant
    Filed: December 5, 2014
    Date of Patent: May 2, 2017
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Nitin Singh Chauhan, Sravan Kumar Rondla
  • Patent number: 9563178
    Abstract: The present invention describes a system, method and computer product program for computation of alarm time. The system includes an alarm device for generating an alarm. The system also includes an alarm application hosted on the alarm device for providing at least one user defined alarm condition. The system further includes an alarm engine for receiving the user defined alarm condition, initiating a probe to receive data from data sources, processing the received alarm conditions and the received data to compute the alarm time and next probe time repeating iteratively until the next probe time is greater than the computed alarm time. The system generates alarm at the computed alarm time when the next probe time becomes greater than the alarm time.
    Type: Grant
    Filed: September 23, 2014
    Date of Patent: February 7, 2017
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Nitin Singh Chauhan
  • Patent number: 9280669
    Abstract: The present invention provides a method and system for calculating a security index of an application hosted in a cloud environment. The application is mapped to a cloud service provider of the cloud environment, and a set of security controls and a set of security metrics applicable for the application are identified. The set of security controls and the set of security metrics are encapsulated into a security profile object by a security control module. A set of values of the set of security metrics are retrieved from the cloud service provider, by a cloud probe module, and the security index of the application is calculated.
    Type: Grant
    Filed: May 10, 2013
    Date of Patent: March 8, 2016
    Assignee: Infosys Limited
    Inventors: Nitin Singh Chauhan, Ashutosh Saxena
  • Publication number: 20150180835
    Abstract: The present invention provides a method and system for verifying integrity of cloud data using unconnected trusted device. The method involves requesting encrypted data though a terminal from a metadata offsite location on a cloud storage then entering encrypted data into an unconnected trusted device thereafter obtaining sentinel data from one or more predefined sentinel locations in encrypted data then requesting original data from the cloud storage through the terminal from the unconnected trusted device thereafter comparing sentinel data and original data for integrity and finally displaying the results.
    Type: Application
    Filed: December 5, 2014
    Publication date: June 25, 2015
    Inventors: Ashutosh Saxena, Nitin Singh Chauhan, Sravan Kumar Rondla
  • Patent number: 9032532
    Abstract: The present invention provides a method and system for calculating a security index of an application hosted in a cloud environment. The application is mapped to a cloud service provider of the cloud environment, and a set of security controls and a set of security metrics applicable for the application are identified. The set of security controls and the set of security metrics are encapsulated into a security profile object by a security control module. A set of values of the set of security metrics are retrieved from the cloud service provider, by a cloud probe module, and the security index of the application is calculated.
    Type: Grant
    Filed: May 10, 2013
    Date of Patent: May 12, 2015
    Assignee: Infosys Limited
    Inventors: Nitin Singh Chauhan, Ashutosh Saxena
  • Publication number: 20150127546
    Abstract: Techniques for providing internet services to a user through a toll free connection are provided. The techniques include receiving, from an Internet Access Point (IAP), a request for the internet services through the toll free connection provided by a Cloud Service Provider (CSP), wherein the CSP is selected by the user from a plurality of CSPs. Access credentials are received from IAP and are forwarded to the selected CSP. A token is received from the CSP if the user is authenticated by the CSP based on the access credentials. The token is sent to the IAP wherein the token is used by the user to access the Internet services through the toll free connection.
    Type: Application
    Filed: September 22, 2014
    Publication date: May 7, 2015
    Inventors: Ashutosh Saxena, Nitin Singh Chauhan
  • Publication number: 20150088777
    Abstract: The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field.
    Type: Application
    Filed: September 22, 2014
    Publication date: March 26, 2015
    Inventors: Nitin Singh Chauhan, Ashutosh Saxena, Krishna Chaitanya T
  • Publication number: 20150085626
    Abstract: The present invention describes a system, method and computer product program for computation of alarm time. The system includes an alarm device for generating an alarm. The system also includes an alarm application hosted on the alarm device for providing at least one user defined alarm condition. The system further includes an alarm engine for receiving the user defined alarm condition, initiating a probe to receive data from data sources, processing the received alarm conditions and the received data to compute the alarm time and next probe time repeating iteratively until the next probe time is less than the computed alarm time. The system generates alarm at the computed alarm time when the next probe time becomes greater than the alarm time.
    Type: Application
    Filed: September 23, 2014
    Publication date: March 26, 2015
    Inventors: Ashutosh Saxena, Nitin Singh Chauhan
  • Publication number: 20130305376
    Abstract: The present invention provides a method and system for calculating a security index of an application hosted in a cloud environment. The application is mapped to a cloud service provider of the cloud environment, and a set of security controls and a set of security metrics applicable for the application are identified. The set of security controls and the set of security metrics are encapsulated into a security profile object by a security control module. A set of values of the set of security metrics are retrieved from the cloud service provider, by a cloud probe module, and the security index of the application is calculated.
    Type: Application
    Filed: May 10, 2013
    Publication date: November 14, 2013
    Applicant: Infosys Limited
    Inventors: Nitin Singh Chauhan, Ashutosh Saxena