Patents by Inventor Rajan Mindigal Alasingara BHATTACHAR
Rajan Mindigal Alasingara BHATTACHAR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210232571Abstract: Transaction executions/commits in a blockchain network need to be fast, robust and secure and thus calls for minimal latency in transaction commits. In an execute-order-commit blockchain network, latency is high due to smart contracts been executed at every endorsing node of the blockchain network. A method and system for processing transactions in the blockchain network is disclosed. The system discloses a veriblock architecture, which enables processing a transaction request by executing an associated smart contract along with a proof of correctness of execution of smart contract using only one endorser. Further, enables verifying the smart contract by multiple endorsers. The smart contract associated with the proof, referred herein as a vericontract, is executed to generate an output and the proof using one of a) Verifiable Computing (VC) approach, b) a TEE approach and c) a hybrid approach (combination of VC and TEE).Type: ApplicationFiled: December 18, 2020Publication date: July 29, 2021Applicant: Tata Consultancy Services LimitedInventors: Meena SINGH DILIP THAKUR, Lakshmi Padmaja MADDALI, Vigneswaran RAMACHANDRAN, Rajan Mindigal Alasingara BHATTACHAR, Srujana KANCHANAPALLI, Batsayan DAS
-
Publication number: 20210211291Abstract: Conventionally, biometric template protection has been achieved to improve matching performance with high levels of security by use of deep convolution neural network models. However, such attempts have prominent security limitations mapping information of images to binary codes is stored in an unprotected form. Given this model and access to the stolen protected templates, the adversary can exploit the False Accept Rate (FAR) of the system. Secondly, once the server system is compromised all the users need to be re-enrolled again. Unlike conventional systems and approaches, present disclosure provides systems and methods that implement encrypted deep neural network(s) for biometric template protection for enrollment and verification wherein the encrypted deep neural network(s) is utilized for mapping feature vectors to a randomly generated binary code and a deep neural network model learnt is encrypted thus achieving security and privacy for data protection.Type: ApplicationFiled: September 23, 2020Publication date: July 8, 2021Applicant: Tata Consultancy Services LimitedInventors: Arun Kumar JINDAL, Imtiyazuddin SHAIK, Harika NARUMANCHI, Vasudha KUMARI, Srinivasa Rao CHALAMALA, Rajan Mindigal Alasingara BHATTACHAR, Sachin Premsukh LODHA
-
Publication number: 20210211290Abstract: This disclosure relates generally to a method and system for biometric verification. Conventional biometric verification method and system performs one or more computations in non-encrypted domain, thereby leading to security threats. The disclosed method includes performing computations such as enrollment and verification feature vector computation, dimensionality reduction of said feature vectors, and comparison of dimensionally reduced encrypted feature vectors to obtain matching scores indicating the extent of match therebetween between in encrypted domain using fully homomorphic encryption, thereby leading to secure biometric verification.Type: ApplicationFiled: September 21, 2020Publication date: July 8, 2021Applicant: Tata Consultancy Services LimitedInventors: Arun Kumar Jindal, Vasudha Kumari, Imtiyazuddin Shaik, Srinivasa Rao Chalamala, Rajan Mindigal Alasingara Bhattachar, Sachin Premsukh Lodha
-
Patent number: 10601854Abstract: Systems and methods of the present disclosure provide comprehensive risk assessment in a heterogeneous dynamic network. The framework enables ‘view’ and ‘analyses’ of complete architecture simultaneously in information view, deployment view, business view and security view. Fundamentally, data pertaining to information flow between a plurality of nodes within systems in a network is identified. One or more affected nodes or paths therebetween are identified and attack risk is computed. The graph based framework supports multiple threat models for threat evaluation. It also provides mitigation plans which will reflect reduced risk in the business view and incorporates attack tree simulations to evaluate dynamic behavior of a system under attack.Type: GrantFiled: March 31, 2017Date of Patent: March 24, 2020Assignee: Tata Consultancy Services LimitedInventors: Shivraj Vijayshankar Lokamathe, Rajan Mindigal Alasingara Bhattachar, Meena Singh Dilip Thakur, Balamuralidhar Purushothaman
-
Publication number: 20190109866Abstract: This disclosure relates generally to contract management, and more particularly to contract management in a data marketplace. In an embodiment, a system for contract management performs refactoring of a contract, during which the system extracts terms and conditions from the contract and generates a simplified view of the contract. The system further performs a requirement validation based on the contract, during which the system determines features of data entity matches requirements specified by a first party or not, based on domain specific ontologies. If the data entity features are not matching with the requirements, then the system fetches one or more relevant attributes from a list of ontologies, verifies whether the features of entity along with the selected feature(s) satisfy the requirements or not. The system accordingly generates an agreeable requirement document as output of the requirement validation.Type: ApplicationFiled: October 5, 2018Publication date: April 11, 2019Applicant: Tata Consultancy Services LimitedInventors: Shivraj Vijayshankar LOKAMATHE, Meena SINGH DILIP THAKUR, Rajan Mindigal ALASINGARA BHATTACHAR
-
Publication number: 20180048669Abstract: Systems and methods of the present disclosure provide comprehensive risk assessment in a heterogeneous dynamic network. The framework enables ‘view’ and ‘analyses’ of complete architecture simultaneously in information view, deployment view, business view and security view. Fundamentally, data pertaining to information flow between a plurality of nodes within systems in a network is identified. One or more affected nodes or paths therebetween are identified and attack risk is computed. The graph based framework supports multiple threat models for threat evaluation. It also provides mitigation plans which will reflect reduced risk in the business view and incorporates attack tree simulations to evaluate dynamic behavior of a system under attack.Type: ApplicationFiled: March 31, 2017Publication date: February 15, 2018Applicant: TATA CONSULTANCY SERVICES LIMITEDInventors: SHIVRAJ VIJAYSHANKAR LOKAMATHE, RAJAN MINDIGAL ALASINGARA BHATTACHAR, MEENA SINGH DILIP THAKUR, BALAMURALIDHAR PURUSHOTHAMAN
-
Patent number: 9774577Abstract: Disclosed are devices, systems, and methods for securing data using attribute based data access. The data may correspond to a sensory environment, and the data is secured at the device. The device secures the data by segmenting the data into number of segments and defining an access policy, further submitting the access policy to a PKG of system for generating Access Tree having attributes at different level for accessing the data. These Access Trees are securely stored on the device using IBE mechanism. Further, the data after being secured, is uploaded to a system for analysis. At the system, an access request may be received for accessing the data. The access request further includes a request attribute, whereby the system verifies if the attribute satisfies the Access Policy. If the verification is positive, an access may be provided to the data accessor for accessing the data.Type: GrantFiled: June 12, 2015Date of Patent: September 26, 2017Assignee: Tata Consultancy Services LimitedInventors: Shivraj Vijayshankar Lokamathe, Rajan Mindigal Alasingara Bhattachar, Barkur Suryanarayana Adiga, Meena Singh Dilip Thakur, Balamuralidhar Purushothaman
-
Patent number: 9614847Abstract: Method and system for user authentication are described. The method comprises receiving an authentication code from an application server seeking authentication of the user. Further, a private key of the user is computed in real time based on a user identity (ID) of the user and a master secret key of the PKG. The method further comprises, ascertaining a verification code based on the private key of the user and a verification timestamp, wherein the verification timestamp indicates a time at which the ascertaining of the verification code was initiated. Further, the authentication code is compared with the verification code. Further, the method comprises authenticating the user based on the comparison.Type: GrantFiled: March 5, 2015Date of Patent: April 4, 2017Inventors: Rajan Mindigal Alasingara Bhattachar, Shivraj Vijayshankar Lokamathe, Barkur Suryanarayana Adiga, Balamuralidhar Purushothaman, Sitaram Venkata Chamarty
-
Patent number: 9590807Abstract: A method for generating cryptographic parameters comprises generating a private_IGTABLE based on an Euler totient function of a composite number (?(n)), where the private_IGTABLE includes a plurality of random numbers (x). Further, a public_IGTABLE based on the private_IGTABLE, a composite number (n), and a group generator element (g) is generated, where the public_IGTABLE includes a corresponding modular exponentiation under modulo n for each of the plurality of random numbers with g as base. Further, a public key of a user is computed based on the public_IGTABLE, an identity number (ID) corresponding to the user, and n. Further, a secret key of the user is generated based on the ID, a master private key, the ?(n), and the private_IGTABLE. Thereafter, the cryptographic parameters are provided to the user for performing encryption and decryption, where the cryptographic parameters include at least one of the ID, the public key, and the secret key.Type: GrantFiled: March 28, 2014Date of Patent: March 7, 2017Assignee: TATA CONSULTANCY SERVICES LIMITEDInventors: Ravishankara Shastry, Barkur Suryanarayana Adiga, Rajan Mindigal Alasingara Bhattachar, Shivraj Vijayshankar Lokamathe, Balamuralidhar Purushotaman
-
Patent number: 9509511Abstract: Method and system for identity based encryption are described. The method comprises obtaining public parameters and a public key set from a central server, where the public parameters include a friendly prime, a torsion group prime order, an super-singular elliptic curve, a first torsion group, a pre-computed Tate pairing value, a first elliptic curve point and a second elliptic curve point, and a distortion map, and where the pre-computed Tate pairing value is generated by the central server. Further, a receiver key set of elliptic curve points based on a receiver identity of a receiver is determined, where the receiver key set is a subset of the public key set. Further a receiver public key based on the receiver key set is computed. Further, the data is encrypted using the Tate pairing value and an encryption component, wherein the encryption component is computed based on the receiver public key set.Type: GrantFiled: September 4, 2014Date of Patent: November 29, 2016Assignee: TATA CONSULTANCY SERVICES LIMITEDInventors: Rajan Mindigal Alasingara Bhattachar, Barkur Suryanarayana Adiga, Shivraj Vijayshankar Lokamathe, Ravishankara Shastry, Balamuralidhar Purushothaman
-
Patent number: 9262914Abstract: The present subject matter relates to a method for rogue vehicle detection. The method includes receiving at least one violation report for a vehicle from at least one mobile communication device. The at least one violation report is indicative of a traffic violation made by the one or more vehicles. The method further includes categorizing the vehicle as a rogue vehicle, based on at least one rogue vehicle detection metric, the at least one rogue vehicle detection metric being determined from the violation report. The method also includes compiling a traffic observation record based on at least one of the violation report and the rogue vehicle detection metric.Type: GrantFiled: September 7, 2012Date of Patent: February 16, 2016Assignee: TATA CONSULTANCY SERVICES LIMITEDInventors: Balamuralidhar Purushothaman, Rajan Mindigal Alasingara Bhattachar
-
Publication number: 20150372997Abstract: Disclosed are devices, systems, and methods for securing data using attribute based data access. The data may correspond to a sensory environment, and the data is secured at the device. The device secures the data by segmenting the data into number of segments and defining an access policy, further submitting the access policy to a PKG of system for generating Access Tree having attributes at different level for accessing the data. These Access Trees are securely stored on the device using IBE mechanism. Further, the data after being secured, is uploaded to a system for analysis. At the system, an access request may be received for accessing the data. The access request further includes a request attribute, whereby the system verifies if the attribute satisfies the Access Policy. If the verification is positive, an access may be provided to the data accessor for accessing the data.Type: ApplicationFiled: June 12, 2015Publication date: December 24, 2015Inventors: Shivraj Vijayshankar LOKAMATHE, Rajan Mindigal Alasingara Bhattachar, Barkur Suryanarayana Adiga, Meena Singh Dilip Thakur, Balamuralidhar Purushothaman
-
Publication number: 20150256542Abstract: Method and system for user authentication are described. The method comprises receiving an authentication code from an application server seeking authentication of the user. Further, a private key of the user is computed in real time based on a user identity (ID) of the user and a master secret key of the PKG. The method further comprises, ascertaining a verification code based on the private key of the user and a verification timestamp, wherein the verification timestamp indicates a time at which the ascertaining of the verification code was initiated. Further, the authentication code is compared with the verification code. Further, the method comprises authenticating the user based on the comparison.Type: ApplicationFiled: March 5, 2015Publication date: September 10, 2015Inventors: Rajan Mindigal Alasingara Bhattachar, Shivraj Vijayshankar Lokamathe, Barkur Suryanarayana Adiga, Balamuralidhar Purushothaman, Sitaram Venkata Chamarty
-
Publication number: 20150071435Abstract: Method and system for identity based encryption are described. The method comprises obtaining public parameters and a public key set from a central server, where the public parameters include a friendly prime, a torsion group prime order, an super-singular elliptic curve, a first torsion group, a pre-computed Tate pairing value, a first elliptic curve point and a second elliptic curve point, and a distortion map, and where the pre-computed Tate pairing value is generated by the central server. Further, a receiver key set of elliptic curve points based on a receiver identity of a receiver is determined, where the receiver key set is a subset of the public key set. Further a receiver public key based on the receiver key set is computed. Further, the data is encrypted using the Tate pairing value and an encryption component, wherein the encryption component is computed based on the receiver public key set.Type: ApplicationFiled: September 4, 2014Publication date: March 12, 2015Inventors: Rajan Mindigal Alasingara BHATTACHAR, Barkur Suryanarayana ADIGA, Shivraj Vijayshankar LOKAMATHE, Ravishankara SHASTRY, Balamuralidhar PURUSHOTHAMAN
-
Patent number: 8958345Abstract: A system and method for enhancing lifetime and throughput in a distributed wireless network is disclosed herein. The method may include sensing, by a first machine, different parameters of at least one neighboring machine; updating, by the first machine, at least one parameter of said first machine based on said sensed parameters of said neighboring machine; generating, by the first machine, a signed-graph on the basis of the updated parameter, wherein said generated graph comprises at least two nodes representing said updated parameter and at least one edge interconnecting said two nodes; iteratively updating, by the first machine, the at least one parameter at different time-scales until convergence is achieved; and communicating, by the first machine, inter-layer updates in individual layers of a transmission protocol stack of the first machine due to said update of at least one parameter.Type: GrantFiled: March 25, 2013Date of Patent: February 17, 2015Assignee: Tata Consultancy Services LimitedInventors: Hemant Kumar Rath, Rajan Mindigal Alasingara Bhattachar, Anantha Simha, Balamuralidhar Purushothaman
-
Publication number: 20140294177Abstract: A method for generating cryptographic parameters comprises generating a private_IGTABLE based on an Euler totient function of a composite number (?(n)), where the private_IGTABLE includes a plurality of random numbers (x). Further, a public_IGTABLE based on the private_IGTABLE, a composite number (n), and a group generator element (g) is generated, where the public_IGTABLE includes a corresponding modular exponentiation under modulo n for each of the plurality of random numbers with g as base. Further, a public key of a user is computed based on the public_IGTABLE, an identity number (ID) corresponding to the user, and n. Further, a secret key of the user is generated based on the ID, a master private key, the ?(n), and the private_IGTABLE. Thereafter, the cryptographic parameters are provided to the user for performing encryption and decryption, where the cryptographic parameters include at least one of the ID, the public key, and the secret key.Type: ApplicationFiled: March 28, 2014Publication date: October 2, 2014Applicant: TATA CONSULTANCY SERVICES LIMITEDInventors: Ravishankara SHASTRY, Barkur Suryanarayana ADIGA, Rajan Mindigal ALASINGARA BHATTACHAR, Shivraj Vijayshankar LOKAMATHE, Balamuralidhar PURUSHOTAMAN
-
Publication number: 20140222323Abstract: The present subject matter relates to a method for rogue vehicle detection. The method includes receiving at least one violation report for a vehicle from at least one mobile communication device. The at least one violation report is indicative of a traffic violation made by the one or more vehicles. The method further includes categorizing the vehicle as a rogue vehicle, based on at least one rogue vehicle detection metric, the at least one rogue vehicle detection metric being determined from the violation report. The method also includes compiling a traffic observation record based on at least one of the violation report and the rogue vehicle detection metric.Type: ApplicationFiled: September 7, 2012Publication date: August 7, 2014Applicant: TATA CONSULTANCY SERVICES LIMITEDInventors: Balamuralidhar Purushothaman, Rajan Mindigal Alasingara Bhattachar
-
Publication number: 20130250812Abstract: A system and method for enhancing lifetime and throughput in a distributed wireless network is disclosed herein. The method may include sensing, by a first machine, different parameters of at least one neighboring machine; updating, by the first machine, at least one parameter of said first machine based on said sensed parameters of said neighboring machine; generating, by the first machine, a signed-graph on the basis of the updated parameter, wherein said generated graph comprises at least two nodes representing said updated parameter and at least one edge interconnecting said two nodes; iteratively updating, by the first machine, the at least one parameter at different time-scales until convergence is achieved; and communicating, by the first machine, inter-layer updates in individual layers of a transmission protocol stack of the first machine due to said update of at least one parameter.Type: ApplicationFiled: March 25, 2013Publication date: September 26, 2013Applicant: Tata Consultancy Services LimitedInventors: Hemant Kumar RATH, Rajan Mindigal Alasingara BHATTACHAR, Anantha SIMHA, Balamuralidhar PURUSHOTHAMAN