Patents by Inventor Rajan Mindigal Alasingara BHATTACHAR

Rajan Mindigal Alasingara BHATTACHAR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210232571
    Abstract: Transaction executions/commits in a blockchain network need to be fast, robust and secure and thus calls for minimal latency in transaction commits. In an execute-order-commit blockchain network, latency is high due to smart contracts been executed at every endorsing node of the blockchain network. A method and system for processing transactions in the blockchain network is disclosed. The system discloses a veriblock architecture, which enables processing a transaction request by executing an associated smart contract along with a proof of correctness of execution of smart contract using only one endorser. Further, enables verifying the smart contract by multiple endorsers. The smart contract associated with the proof, referred herein as a vericontract, is executed to generate an output and the proof using one of a) Verifiable Computing (VC) approach, b) a TEE approach and c) a hybrid approach (combination of VC and TEE).
    Type: Application
    Filed: December 18, 2020
    Publication date: July 29, 2021
    Applicant: Tata Consultancy Services Limited
    Inventors: Meena SINGH DILIP THAKUR, Lakshmi Padmaja MADDALI, Vigneswaran RAMACHANDRAN, Rajan Mindigal Alasingara BHATTACHAR, Srujana KANCHANAPALLI, Batsayan DAS
  • Publication number: 20210211291
    Abstract: Conventionally, biometric template protection has been achieved to improve matching performance with high levels of security by use of deep convolution neural network models. However, such attempts have prominent security limitations mapping information of images to binary codes is stored in an unprotected form. Given this model and access to the stolen protected templates, the adversary can exploit the False Accept Rate (FAR) of the system. Secondly, once the server system is compromised all the users need to be re-enrolled again. Unlike conventional systems and approaches, present disclosure provides systems and methods that implement encrypted deep neural network(s) for biometric template protection for enrollment and verification wherein the encrypted deep neural network(s) is utilized for mapping feature vectors to a randomly generated binary code and a deep neural network model learnt is encrypted thus achieving security and privacy for data protection.
    Type: Application
    Filed: September 23, 2020
    Publication date: July 8, 2021
    Applicant: Tata Consultancy Services Limited
    Inventors: Arun Kumar JINDAL, Imtiyazuddin SHAIK, Harika NARUMANCHI, Vasudha KUMARI, Srinivasa Rao CHALAMALA, Rajan Mindigal Alasingara BHATTACHAR, Sachin Premsukh LODHA
  • Publication number: 20210211290
    Abstract: This disclosure relates generally to a method and system for biometric verification. Conventional biometric verification method and system performs one or more computations in non-encrypted domain, thereby leading to security threats. The disclosed method includes performing computations such as enrollment and verification feature vector computation, dimensionality reduction of said feature vectors, and comparison of dimensionally reduced encrypted feature vectors to obtain matching scores indicating the extent of match therebetween between in encrypted domain using fully homomorphic encryption, thereby leading to secure biometric verification.
    Type: Application
    Filed: September 21, 2020
    Publication date: July 8, 2021
    Applicant: Tata Consultancy Services Limited
    Inventors: Arun Kumar Jindal, Vasudha Kumari, Imtiyazuddin Shaik, Srinivasa Rao Chalamala, Rajan Mindigal Alasingara Bhattachar, Sachin Premsukh Lodha
  • Patent number: 10601854
    Abstract: Systems and methods of the present disclosure provide comprehensive risk assessment in a heterogeneous dynamic network. The framework enables ‘view’ and ‘analyses’ of complete architecture simultaneously in information view, deployment view, business view and security view. Fundamentally, data pertaining to information flow between a plurality of nodes within systems in a network is identified. One or more affected nodes or paths therebetween are identified and attack risk is computed. The graph based framework supports multiple threat models for threat evaluation. It also provides mitigation plans which will reflect reduced risk in the business view and incorporates attack tree simulations to evaluate dynamic behavior of a system under attack.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: March 24, 2020
    Assignee: Tata Consultancy Services Limited
    Inventors: Shivraj Vijayshankar Lokamathe, Rajan Mindigal Alasingara Bhattachar, Meena Singh Dilip Thakur, Balamuralidhar Purushothaman
  • Publication number: 20190109866
    Abstract: This disclosure relates generally to contract management, and more particularly to contract management in a data marketplace. In an embodiment, a system for contract management performs refactoring of a contract, during which the system extracts terms and conditions from the contract and generates a simplified view of the contract. The system further performs a requirement validation based on the contract, during which the system determines features of data entity matches requirements specified by a first party or not, based on domain specific ontologies. If the data entity features are not matching with the requirements, then the system fetches one or more relevant attributes from a list of ontologies, verifies whether the features of entity along with the selected feature(s) satisfy the requirements or not. The system accordingly generates an agreeable requirement document as output of the requirement validation.
    Type: Application
    Filed: October 5, 2018
    Publication date: April 11, 2019
    Applicant: Tata Consultancy Services Limited
    Inventors: Shivraj Vijayshankar LOKAMATHE, Meena SINGH DILIP THAKUR, Rajan Mindigal ALASINGARA BHATTACHAR
  • Publication number: 20180048669
    Abstract: Systems and methods of the present disclosure provide comprehensive risk assessment in a heterogeneous dynamic network. The framework enables ‘view’ and ‘analyses’ of complete architecture simultaneously in information view, deployment view, business view and security view. Fundamentally, data pertaining to information flow between a plurality of nodes within systems in a network is identified. One or more affected nodes or paths therebetween are identified and attack risk is computed. The graph based framework supports multiple threat models for threat evaluation. It also provides mitigation plans which will reflect reduced risk in the business view and incorporates attack tree simulations to evaluate dynamic behavior of a system under attack.
    Type: Application
    Filed: March 31, 2017
    Publication date: February 15, 2018
    Applicant: TATA CONSULTANCY SERVICES LIMITED
    Inventors: SHIVRAJ VIJAYSHANKAR LOKAMATHE, RAJAN MINDIGAL ALASINGARA BHATTACHAR, MEENA SINGH DILIP THAKUR, BALAMURALIDHAR PURUSHOTHAMAN
  • Patent number: 9774577
    Abstract: Disclosed are devices, systems, and methods for securing data using attribute based data access. The data may correspond to a sensory environment, and the data is secured at the device. The device secures the data by segmenting the data into number of segments and defining an access policy, further submitting the access policy to a PKG of system for generating Access Tree having attributes at different level for accessing the data. These Access Trees are securely stored on the device using IBE mechanism. Further, the data after being secured, is uploaded to a system for analysis. At the system, an access request may be received for accessing the data. The access request further includes a request attribute, whereby the system verifies if the attribute satisfies the Access Policy. If the verification is positive, an access may be provided to the data accessor for accessing the data.
    Type: Grant
    Filed: June 12, 2015
    Date of Patent: September 26, 2017
    Assignee: Tata Consultancy Services Limited
    Inventors: Shivraj Vijayshankar Lokamathe, Rajan Mindigal Alasingara Bhattachar, Barkur Suryanarayana Adiga, Meena Singh Dilip Thakur, Balamuralidhar Purushothaman
  • Patent number: 9614847
    Abstract: Method and system for user authentication are described. The method comprises receiving an authentication code from an application server seeking authentication of the user. Further, a private key of the user is computed in real time based on a user identity (ID) of the user and a master secret key of the PKG. The method further comprises, ascertaining a verification code based on the private key of the user and a verification timestamp, wherein the verification timestamp indicates a time at which the ascertaining of the verification code was initiated. Further, the authentication code is compared with the verification code. Further, the method comprises authenticating the user based on the comparison.
    Type: Grant
    Filed: March 5, 2015
    Date of Patent: April 4, 2017
    Inventors: Rajan Mindigal Alasingara Bhattachar, Shivraj Vijayshankar Lokamathe, Barkur Suryanarayana Adiga, Balamuralidhar Purushothaman, Sitaram Venkata Chamarty
  • Patent number: 9590807
    Abstract: A method for generating cryptographic parameters comprises generating a private_IGTABLE based on an Euler totient function of a composite number (?(n)), where the private_IGTABLE includes a plurality of random numbers (x). Further, a public_IGTABLE based on the private_IGTABLE, a composite number (n), and a group generator element (g) is generated, where the public_IGTABLE includes a corresponding modular exponentiation under modulo n for each of the plurality of random numbers with g as base. Further, a public key of a user is computed based on the public_IGTABLE, an identity number (ID) corresponding to the user, and n. Further, a secret key of the user is generated based on the ID, a master private key, the ?(n), and the private_IGTABLE. Thereafter, the cryptographic parameters are provided to the user for performing encryption and decryption, where the cryptographic parameters include at least one of the ID, the public key, and the secret key.
    Type: Grant
    Filed: March 28, 2014
    Date of Patent: March 7, 2017
    Assignee: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Ravishankara Shastry, Barkur Suryanarayana Adiga, Rajan Mindigal Alasingara Bhattachar, Shivraj Vijayshankar Lokamathe, Balamuralidhar Purushotaman
  • Patent number: 9509511
    Abstract: Method and system for identity based encryption are described. The method comprises obtaining public parameters and a public key set from a central server, where the public parameters include a friendly prime, a torsion group prime order, an super-singular elliptic curve, a first torsion group, a pre-computed Tate pairing value, a first elliptic curve point and a second elliptic curve point, and a distortion map, and where the pre-computed Tate pairing value is generated by the central server. Further, a receiver key set of elliptic curve points based on a receiver identity of a receiver is determined, where the receiver key set is a subset of the public key set. Further a receiver public key based on the receiver key set is computed. Further, the data is encrypted using the Tate pairing value and an encryption component, wherein the encryption component is computed based on the receiver public key set.
    Type: Grant
    Filed: September 4, 2014
    Date of Patent: November 29, 2016
    Assignee: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Rajan Mindigal Alasingara Bhattachar, Barkur Suryanarayana Adiga, Shivraj Vijayshankar Lokamathe, Ravishankara Shastry, Balamuralidhar Purushothaman
  • Patent number: 9262914
    Abstract: The present subject matter relates to a method for rogue vehicle detection. The method includes receiving at least one violation report for a vehicle from at least one mobile communication device. The at least one violation report is indicative of a traffic violation made by the one or more vehicles. The method further includes categorizing the vehicle as a rogue vehicle, based on at least one rogue vehicle detection metric, the at least one rogue vehicle detection metric being determined from the violation report. The method also includes compiling a traffic observation record based on at least one of the violation report and the rogue vehicle detection metric.
    Type: Grant
    Filed: September 7, 2012
    Date of Patent: February 16, 2016
    Assignee: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Balamuralidhar Purushothaman, Rajan Mindigal Alasingara Bhattachar
  • Publication number: 20150372997
    Abstract: Disclosed are devices, systems, and methods for securing data using attribute based data access. The data may correspond to a sensory environment, and the data is secured at the device. The device secures the data by segmenting the data into number of segments and defining an access policy, further submitting the access policy to a PKG of system for generating Access Tree having attributes at different level for accessing the data. These Access Trees are securely stored on the device using IBE mechanism. Further, the data after being secured, is uploaded to a system for analysis. At the system, an access request may be received for accessing the data. The access request further includes a request attribute, whereby the system verifies if the attribute satisfies the Access Policy. If the verification is positive, an access may be provided to the data accessor for accessing the data.
    Type: Application
    Filed: June 12, 2015
    Publication date: December 24, 2015
    Inventors: Shivraj Vijayshankar LOKAMATHE, Rajan Mindigal Alasingara Bhattachar, Barkur Suryanarayana Adiga, Meena Singh Dilip Thakur, Balamuralidhar Purushothaman
  • Publication number: 20150256542
    Abstract: Method and system for user authentication are described. The method comprises receiving an authentication code from an application server seeking authentication of the user. Further, a private key of the user is computed in real time based on a user identity (ID) of the user and a master secret key of the PKG. The method further comprises, ascertaining a verification code based on the private key of the user and a verification timestamp, wherein the verification timestamp indicates a time at which the ascertaining of the verification code was initiated. Further, the authentication code is compared with the verification code. Further, the method comprises authenticating the user based on the comparison.
    Type: Application
    Filed: March 5, 2015
    Publication date: September 10, 2015
    Inventors: Rajan Mindigal Alasingara Bhattachar, Shivraj Vijayshankar Lokamathe, Barkur Suryanarayana Adiga, Balamuralidhar Purushothaman, Sitaram Venkata Chamarty
  • Publication number: 20150071435
    Abstract: Method and system for identity based encryption are described. The method comprises obtaining public parameters and a public key set from a central server, where the public parameters include a friendly prime, a torsion group prime order, an super-singular elliptic curve, a first torsion group, a pre-computed Tate pairing value, a first elliptic curve point and a second elliptic curve point, and a distortion map, and where the pre-computed Tate pairing value is generated by the central server. Further, a receiver key set of elliptic curve points based on a receiver identity of a receiver is determined, where the receiver key set is a subset of the public key set. Further a receiver public key based on the receiver key set is computed. Further, the data is encrypted using the Tate pairing value and an encryption component, wherein the encryption component is computed based on the receiver public key set.
    Type: Application
    Filed: September 4, 2014
    Publication date: March 12, 2015
    Inventors: Rajan Mindigal Alasingara BHATTACHAR, Barkur Suryanarayana ADIGA, Shivraj Vijayshankar LOKAMATHE, Ravishankara SHASTRY, Balamuralidhar PURUSHOTHAMAN
  • Patent number: 8958345
    Abstract: A system and method for enhancing lifetime and throughput in a distributed wireless network is disclosed herein. The method may include sensing, by a first machine, different parameters of at least one neighboring machine; updating, by the first machine, at least one parameter of said first machine based on said sensed parameters of said neighboring machine; generating, by the first machine, a signed-graph on the basis of the updated parameter, wherein said generated graph comprises at least two nodes representing said updated parameter and at least one edge interconnecting said two nodes; iteratively updating, by the first machine, the at least one parameter at different time-scales until convergence is achieved; and communicating, by the first machine, inter-layer updates in individual layers of a transmission protocol stack of the first machine due to said update of at least one parameter.
    Type: Grant
    Filed: March 25, 2013
    Date of Patent: February 17, 2015
    Assignee: Tata Consultancy Services Limited
    Inventors: Hemant Kumar Rath, Rajan Mindigal Alasingara Bhattachar, Anantha Simha, Balamuralidhar Purushothaman
  • Publication number: 20140294177
    Abstract: A method for generating cryptographic parameters comprises generating a private_IGTABLE based on an Euler totient function of a composite number (?(n)), where the private_IGTABLE includes a plurality of random numbers (x). Further, a public_IGTABLE based on the private_IGTABLE, a composite number (n), and a group generator element (g) is generated, where the public_IGTABLE includes a corresponding modular exponentiation under modulo n for each of the plurality of random numbers with g as base. Further, a public key of a user is computed based on the public_IGTABLE, an identity number (ID) corresponding to the user, and n. Further, a secret key of the user is generated based on the ID, a master private key, the ?(n), and the private_IGTABLE. Thereafter, the cryptographic parameters are provided to the user for performing encryption and decryption, where the cryptographic parameters include at least one of the ID, the public key, and the secret key.
    Type: Application
    Filed: March 28, 2014
    Publication date: October 2, 2014
    Applicant: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Ravishankara SHASTRY, Barkur Suryanarayana ADIGA, Rajan Mindigal ALASINGARA BHATTACHAR, Shivraj Vijayshankar LOKAMATHE, Balamuralidhar PURUSHOTAMAN
  • Publication number: 20140222323
    Abstract: The present subject matter relates to a method for rogue vehicle detection. The method includes receiving at least one violation report for a vehicle from at least one mobile communication device. The at least one violation report is indicative of a traffic violation made by the one or more vehicles. The method further includes categorizing the vehicle as a rogue vehicle, based on at least one rogue vehicle detection metric, the at least one rogue vehicle detection metric being determined from the violation report. The method also includes compiling a traffic observation record based on at least one of the violation report and the rogue vehicle detection metric.
    Type: Application
    Filed: September 7, 2012
    Publication date: August 7, 2014
    Applicant: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Balamuralidhar Purushothaman, Rajan Mindigal Alasingara Bhattachar
  • Publication number: 20130250812
    Abstract: A system and method for enhancing lifetime and throughput in a distributed wireless network is disclosed herein. The method may include sensing, by a first machine, different parameters of at least one neighboring machine; updating, by the first machine, at least one parameter of said first machine based on said sensed parameters of said neighboring machine; generating, by the first machine, a signed-graph on the basis of the updated parameter, wherein said generated graph comprises at least two nodes representing said updated parameter and at least one edge interconnecting said two nodes; iteratively updating, by the first machine, the at least one parameter at different time-scales until convergence is achieved; and communicating, by the first machine, inter-layer updates in individual layers of a transmission protocol stack of the first machine due to said update of at least one parameter.
    Type: Application
    Filed: March 25, 2013
    Publication date: September 26, 2013
    Applicant: Tata Consultancy Services Limited
    Inventors: Hemant Kumar RATH, Rajan Mindigal Alasingara BHATTACHAR, Anantha SIMHA, Balamuralidhar PURUSHOTHAMAN