Patents by Inventor Prateek Mishra

Prateek Mishra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11526824
    Abstract: Systems and methods for determining whether a particular feature or change implemented in at least one test store causes a significant change as compared to one or more control stores are discussed. More particularly, techniques for using a time-series clustering algorithm to identify comparable sister stores to a store in which a feature change is being considered are described. Once the sister stores are identified a testing module can perform an A/B testing so as to validate whether a particular feature change being implemented in the test store causes a significant change as compared to the control stores.
    Type: Grant
    Filed: May 13, 2020
    Date of Patent: December 13, 2022
    Assignee: Walmart Apollo, LLC
    Inventors: Paridhi Kabra, Prateek Mishra, Jingying Zhang, Nitin Kapoor
  • Publication number: 20220368536
    Abstract: A method, apparatus, system, and computer program product are provided for managing the usage of verified credentials. An issuer of credentials receives a request from a person for a credential. The issuer identifies the credential from information that is controlled by the issuer. The issuer identifies a decentralized identifier (DID) record for an audit engine from a blockchain network. The DID record for the audit engine includes a public key of that is associated with the audit engine. The issuer identifies a DID record for the person from the blockchain network. The DID record for the person includes a public key that is associated with the person. The issuer generates an encrypted credential by encrypting the credential and the DID record for the person based on the public key associated with the audit engine. The issuer sends the encrypted credential to the person.
    Type: Application
    Filed: June 23, 2022
    Publication date: November 17, 2022
    Inventors: Prateek Mishra, Frank Villavicencio, Merajuddin Mohammad
  • Patent number: 11463084
    Abstract: A level shifting output circuit converts a signal from a core voltage to an I/O voltage without causing voltage overstress on transistor terminals in the level shifting output circuit. The output circuit includes protection transistors to protect various transistors in the output circuit from overvoltage conditions including those transistors coupled to I/O power supply nodes.
    Type: Grant
    Filed: September 1, 2021
    Date of Patent: October 4, 2022
    Assignee: Advanced Micro Devices, Inc.
    Inventors: Thanapandi Ganesan, Prateek Mishra, Jagadeesh Anathahalli Singrigowda, Dhruvin Devangbhai Shah, Animesh Jain, Girish Anathahalli Singrigowda
  • Patent number: 11405216
    Abstract: A method, apparatus, system, and computer program product are provided for managing the usage of verified credentials. An issuer of credentials receives a request from a person for a credential. The issuer identifies the credential from information that is controlled by the issuer. The issuer identifies a decentralized identifier (DID) record for an audit engine from a blockchain network. The DID record for the audit engine includes a public key of that is associated with the audit engine. The issuer identifies a DID record for the person from the blockchain network. The DID record for the person includes a public key that is associated with the person. The issuer generates an encrypted credential by encrypting the credential and the DID record for the person based on the public key associated with the audit engine. The issuer sends the encrypted credential to the person.
    Type: Grant
    Filed: May 7, 2020
    Date of Patent: August 2, 2022
    Assignee: ADP, Inc.
    Inventors: Prateek Mishra, Frank Villavicencio, Merajuddin Mohammad
  • Patent number: 11398900
    Abstract: Embodiments are directed to managing cryptographic keys in a multi-tenant cloud based system. Embodiments receive from a client a request for a wrapped data encryption key (“DEK”). Embodiments generate a random key and fetch encryption context that corresponds to the client. Embodiments generate the wrapped DEK including the random key and the encryption context encoded in the wrapped DEK. Embodiments then return the wrapped DEK to the client.
    Type: Grant
    Filed: February 7, 2019
    Date of Patent: July 26, 2022
    Assignee: Oracle International Corporation
    Inventors: Sirish V. Vepa, Prateek Mishra, Sreedhar Katti, Varanasi Kumar Ravi, Harold William Lockhart, Rakesh Keshava
  • Publication number: 20210351935
    Abstract: A method, apparatus, system, and computer program product are provided for managing the usage of verified credentials. An issuer of credentials receives a request from a person for a credential. The issuer identifies the credential from information that is controlled by the issuer. The issuer identifies a decentralized identifier (DID) record for an audit engine from a blockchain network. The DID record for the audit engine includes a public key of that is associated with the audit engine. The issuer identifies a DID record for the person from the blockchain network. The DID record for the person includes a public key that is associated with the person. The issuer generates an encrypted credential by encrypting the credential and the DID record for the person based on the public key associated with the audit engine. The issuer sends the encrypted credential to the person.
    Type: Application
    Filed: May 7, 2020
    Publication date: November 11, 2021
    Inventors: Prateek Mishra, Frank Villavicencio, Merajuddin Mohammad
  • Patent number: 11088993
    Abstract: An embodiment controls access to a resource, the access controlled by a multi-tenant system. Embodiments receive, at a web server, a request for the resource from a user via a web browser, the request including a Uniform Resource Locator (“URL”) associated with the resource and an identity of a tenant corresponding to the user. Embodiments determine an access policy for authenticating the user that is associated with the resource, the access policy based in part on the identity of the tenant. Embodiments then authenticate the user based on the determined access policy.
    Type: Grant
    Filed: August 12, 2019
    Date of Patent: August 10, 2021
    Assignee: Oracle International Corporation
    Inventors: Stephan Wardell, Andrew B Folkins, Vadim Lander, Prateek Mishra, Rich Levinson, Cory Womacks, Dino E. Cuthbert
  • Publication number: 20200402648
    Abstract: Examples provide a workforce manager that analyzes historical pharmacy transaction data to generate a set of forecasted future prescriptions for a selected pharmacy. The forecasted future prescriptions are divided into predicted new prescriptions and predicted refill prescriptions. The predicted refill prescriptions are classified into a set of high confidence refills and a set of low confidence refills. The labor demand associated with the set of high confidence refills are redistributed within a range of pickup dates associated with each high confidence refill prescription to smooth labor demand minimizing variation within a selected time-period. A number of personnel are identified for each day in the selected time-period based on the smoothed labor demand. A schedule is published assigning at least a portion of the forecasted future prescriptions and the number of personnel to each day in the selected time-period is output.
    Type: Application
    Filed: August 5, 2019
    Publication date: December 24, 2020
    Inventors: Shreyan Ghosh, Akash Verma, Prateek Mishra
  • Publication number: 20200364644
    Abstract: Systems and methods for determining whether a particular feature or change implemented in at least one test store causes a significant change as compared to one or more control stores are discussed. More particularly, techniques for using a time-series clustering algorithm to identify comparable sister stores to a store in which a feature change is being considered are described. Once the sister stores are identified a testing module can perform an A/B testing so as to validate whether a particular feature change being implemented in the test store causes a significant change as compared to the control stores.
    Type: Application
    Filed: May 13, 2020
    Publication date: November 19, 2020
    Inventors: Paridhi Kabra, Prateek Mishra, Jingying Zhang, Nitin Kapoor
  • Patent number: 10581820
    Abstract: Key generation and roll over is provided for a cloud based identity management system. A key set is generated that includes a previous key and expiration time, a current key and expiration time, and a next key and expiration time, and stores the key set in a database table and a memory cache associated with the database table. At the current key expiration time, the key set is rolled over, including retrieving the key set from the database table, updating the previous key and expiration time with the current key and expiration time, updating the current key and expiration time with the next key and expiration time, generating a new key and expiration time, updating the next key and expiration time with the new key and expiration time, and updating the key set in the database table and the memory cache.
    Type: Grant
    Filed: May 8, 2017
    Date of Patent: March 3, 2020
    Assignee: Oracle International Corporation
    Inventors: Rakesh Keshava, Sreedhar Katti, Sirish Vepa, Vadim Lander, Prateek Mishra
  • Publication number: 20190394024
    Abstract: Embodiments are directed to managing cryptographic keys in a multi-tenant cloud based system. Embodiments receive from a client a request for a wrapped data encryption key (“DEK”). Embodiments generate a random key and fetch encryption context that corresponds to the client. Embodiments generate the wrapped DEK including the random key and the encryption context encoded in the wrapped DEK. Embodiments then return the wrapped DEK to the client.
    Type: Application
    Filed: February 7, 2019
    Publication date: December 26, 2019
    Inventors: Sirish V. VEPA, Prateek MISHRA, Sreedhar KATTI, Varanasi Kumar RAVI, Harold William LOCKHART, Rakesh KESHAVA
  • Publication number: 20190364020
    Abstract: An embodiment controls access to a resource, the access controlled by a multi-tenant system. Embodiments receive, at a web server, a request for the resource from a user via a web browser, the request including a Uniform Resource Locator (“URL”) associated with the resource and an identity of a tenant corresponding to the user. Embodiments determine an access policy for authenticating the user that is associated with the resource, the access policy based in part on the identity of the tenant. Embodiments then authenticate the user based on the determined access policy.
    Type: Application
    Filed: August 12, 2019
    Publication date: November 28, 2019
    Inventors: Stephan WARDELL, Andrew B. FOLKINS, Vadim LANDER, Prateek MISHRA, Rich LEVINSON, Cory WOMACKS, Dino E. CUTHBERT
  • Patent number: 10425386
    Abstract: A system provides cloud-based identity and access management. The system receives a request by a web gate for an identity management service for reaching an application, and determines a tenancy from a header value of the request. The system looks up a policy configured to be applied for the tenancy, and applies the policy to the request. The system then sends the request to a microservice based on a result of the applying of the policy to the request, where the microservice performs the identity management service for reaching the application.
    Type: Grant
    Filed: May 10, 2017
    Date of Patent: September 24, 2019
    Assignee: Oracle International Corporation
    Inventors: Stephan Wardell, Andrew B. Folkins, Vadim Lander, Prateek Mishra, Rich Levinson, Cory Womacks, Dino E. Cuthbert
  • Publication number: 20170331802
    Abstract: Key generation and roll over is provided for a cloud based identity management system. A key set is generated that includes a previous key and expiration time, a current key and expiration time, and a next key and expiration time, and stores the key set in a database table and a memory cache associated with the database table. At the current key expiration time, the key set is rolled over, including retrieving the key set from the database table, updating the previous key and expiration time with the current key and expiration time, updating the current key and expiration time with the next key and expiration time, generating a new key and expiration time, updating the next key and expiration time with the new key and expiration time, and updating the key set in the database table and the memory cache.
    Type: Application
    Filed: May 8, 2017
    Publication date: November 16, 2017
    Inventors: Rakesh Keshava, Sreedhar Katti, Sirish Vepa, Vadim Lander, Prateek Mishra
  • Publication number: 20170331791
    Abstract: A system provides cloud-based identity and access management. The system receives a request by a web gate for an identity management service for reaching an application, and determines a tenancy from a header value of the request. The system looks up a policy configured to be applied for the tenancy, and applies the policy to the request. The system then sends the request to a microservice based on a result of the applying of the policy to the request, where the microservice performs the identity management service for reaching the application.
    Type: Application
    Filed: May 10, 2017
    Publication date: November 16, 2017
    Inventors: Stephan WARDELL, Andrew B. FOLKINS, Vadim LANDER, Prateek MISHRA, Rich LEVINSON, Cory WOMACKS, Dino E. CUTHBERT
  • Publication number: 20110030041
    Abstract: A method of propagating a user's authentication/session information between different requests to Web services in a network includes a web server receiving a request for access to a first web service. The request is intercepted with an agent and authentication credentials are collected. A determination is made whether the web service customer is authenticated and authorized. If the web service customer is authenticated and authorized, a session and session ticket are created. An ID and the session ticket are returned to the web server. The session ticket ID and a public key are encrypted into an assertion. The assertion is sent to the first web service. The assertion is then returned to the web service customer for use with future requests. The assertion can be in the form of a SAML assertion.
    Type: Application
    Filed: June 29, 2010
    Publication date: February 3, 2011
    Applicant: Computer Associates Think, Inc.
    Inventors: John Favazza, James Ducharme, Rich Levinson, Prateek Mishra
  • Patent number: 7747856
    Abstract: A method of propagating a user's authentication/session information between different requests to Web services in a network includes a web server receiving a request for access to a first web service. The request is intercepted with an agent and authentication credentials are collected. A determination is made whether the web service customer is authenticated and authorized. If the web service customer is authenticated and authorized, a session and session ticket are created. An ID and the session ticket are returned to the web server. The session ticket ID and a public key are encrypted into an assertion. The assertion is sent to the first web service. The assertion is then returned to the web service customer for use with future requests. The assertion can be in the form of a SAML assertion.
    Type: Grant
    Filed: July 24, 2003
    Date of Patent: June 29, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: John Favazza, James Ducharme, Rich Levinson, Prateek Mishra
  • Patent number: 7444519
    Abstract: An authentication process in a network environment provides a remote user with secured access to an enterprise network based on recognition of a third-party security token. The method includes authenticating the user against a plurality of third-party security tokens, wherein the third-party security tokens originate from a range of different partner home sites. The remote user, prior to obtaining secured access to the enterprise network, is not known to the enterprise network, and does not need to be associated with any security tokens previously originating from the enterprise network. The enterprise network is provided with the ability to rely upon third-party security tokens to authenticate the remote user.
    Type: Grant
    Filed: September 22, 2004
    Date of Patent: October 28, 2008
    Assignee: Computer Associates Think, Inc.
    Inventors: Leo Laferriere, Sharon Chang, Ravi Kumar Gudipati, Prateek Mishra
  • Publication number: 20050188212
    Abstract: An authentication process in a network environment provides a remote user with secured access to an enterprise network based on recognition of a third-party security token. The method includes authenticating the user against a plurality of third-party security tokens, wherein the third-party security tokens originate from a range of different partner home sites. The remote user, prior to obtaining secured access to the enterprise network, is not known to the enterprise network, and does not need to be associated with any security tokens previously originating from the enterprise network. The enterprise network is provided with the ability to rely upon third-party security tokens to authenticate the remote user.
    Type: Application
    Filed: September 22, 2004
    Publication date: August 25, 2005
    Applicant: NETEGRITY, INC.
    Inventors: Leo Laferriere, Sharon Chang, Ravi Gudipati, Prateek Mishra
  • Publication number: 20040139319
    Abstract: A method of propagating a user's authentication/session information between different requests to Web services in a network includes a web server receiving a request for access to a first web service. The request is intercepted with an agent and authentication credentials are collected. A determination is made whether the web service customer is authenticated and authorized. If the web service customer is authenticated and authorized, a session and session ticket are created. An ID and the session ticket are returned to the web server. The session ticket ID and a public key are encrypted into an assertion. The assertion is sent to the first web service. The assertion is then returned to the web service customer for use with future requests. The assertion can be in the form of a SAML assertion.
    Type: Application
    Filed: July 24, 2003
    Publication date: July 15, 2004
    Applicant: NETEGRITY, INC.
    Inventors: John Favazza, James Ducharme, Rich Levinson, Prateek Mishra