Patents by Inventor Rajnish Chitkara

Rajnish Chitkara has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230101120
    Abstract: A rollover system is provided to facilitate transitioning of client devices in a shared account network environment, from an old password to a new replacement password. The switching of passwords may take place gradually during a rollout period for client devices without required downtime and reducing a risk of lockouts. During the rollover period, a prior salt is temporarily carried over to a new verifier for the replacement password. Two new verifiers are generated: a temporary new verifier using the old salt for verification during the rollover period and another new verifier using a different new salt for verification after the rollover period had expired. During the rollover period, authentication involves the use of the temporary new verifier with the old salt or by the old verifier and old salt of the prior password. After the rollover period, authentication is based on the new verifier with a new salt.
    Type: Application
    Filed: December 7, 2022
    Publication date: March 30, 2023
    Applicant: Oracle International Corporation
    Inventors: Rajnish Chitkara, Peter Knaggs
  • Patent number: 11563563
    Abstract: Embodiments afford secure transfer of security key type(s) between different database servers having different key hierarchies. For example, a key transfer may occur from a source server to a target server during a database migration process. Particular embodiments comprise a SQL transfer command statement (e.g., TRANSFER ENCRYPTION KEY) recognized by an engine. Syntax of the SQL transfer command includes a password and a filename for a security key. Upon receiving the SQL transfer command, the engine references an information repository to identify a relevant key hierarchy and key type, encrypts the security key with a key derived from password, and stores (exports) the encrypted security key in a file for consumption (import) at the target server. The SQL transfer command may further comprise a direction component determining flow of key information, and an override function to deal with error messages arising from any already-existing security key having the same name.
    Type: Grant
    Filed: November 7, 2019
    Date of Patent: January 24, 2023
    Assignee: SAP SE
    Inventors: Rajnish Chitkara, Ramesh Gupta, Asif Iqbal Desai
  • Patent number: 11558373
    Abstract: A rollover system is provided to facilitate transitioning of client devices in a shared account network environment, from an old password to a new replacement password. The switching of passwords may take place gradually during a rollout period for client devices without required downtime and reducing a risk of lockouts. During the rollover period, a prior salt is temporarily carried over to a new verifier for the replacement password. Two new verifiers are generated: a temporary new verifier using the old salt for verification during the rollover period and another new verifier using a different new salt for verification after the rollover period had expired. During the rollover period, authentication involves the use of the temporary new verifier with the old salt or by the old verifier and old salt of the prior password. After the rollover period, authentication is based on the new verifier with a new salt.
    Type: Grant
    Filed: December 1, 2020
    Date of Patent: January 17, 2023
    Assignee: Oracle International Corporation
    Inventors: Rajnish Chitkara, Peter Knaggs
  • Publication number: 20220174061
    Abstract: A rollover system is provided to facilitate transitioning of client devices in a shared account network environment, from an old password to a new replacement password. The switching of passwords may take place gradually during a rollout period for client devices without required downtime and reducing a risk of lockouts. During the rollover period, a prior salt is temporarily carried over to a new verifier for the replacement password. Two new verifiers are generated: a temporary new verifier using the old salt for verification during the rollover period and another new verifier using a different new salt for verification after the rollover period had expired. During the rollover period, authentication involves the use of the temporary new verifier with the old salt or by the old verifier and old salt of the prior password. After the rollover period, authentication is based on the new verifier with a new salt.
    Type: Application
    Filed: December 1, 2020
    Publication date: June 2, 2022
    Applicant: Oracle International Corporation
    Inventors: Rajnish Chitkara, Peter Knaggs
  • Publication number: 20210143989
    Abstract: Embodiments afford secure transfer of security key type(s) between different database servers having different key hierarchies. For example, a key transfer may occur from a source server to a target server during a database migration process. Particular embodiments comprise a SQL transfer command statement (e.g., TRANSFER ENCRYPTION KEY) recognized by an engine. Syntax of the SQL transfer command includes a password and a filename for a security key. Upon receiving the SQL transfer command, the engine references an information repository to identify a relevant key hierarchy and key type, encrypts the security key with a key derived from password, and stores (exports) the encrypted security key in a file for consumption (import) at the target server. The SQL transfer command may further comprise a direction component determining flow of key information, and an override function to deal with error messages arising from any already-existing security key having the same name.
    Type: Application
    Filed: November 7, 2019
    Publication date: May 13, 2021
    Inventors: Rajnish Chitkara, Ramesh Gupta, Asif Iqbal Desai
  • Publication number: 20200233849
    Abstract: Disclosed herein are system, method, and computer program product embodiments for database modification and processing functionality. An embodiment operates by providing a batch of values stored in rows corresponding to a particular column responsive to a request to encrypt the values of the particular column. Encrypted values corresponding the batch of values are received and stored in a hidden column. A status of the rows corresponding to batch of values of the hidden column is updated to indicate in which rows of the hidden column the received encrypted values have been stored. Updated encrypted values are received and stored in the hidden column. The particular column is replaced with the hidden column.
    Type: Application
    Filed: January 17, 2019
    Publication date: July 23, 2020
    Inventors: Rajnish Chitkara, Michael Vander Ploeg, Anita Patel, Marlon McKenzie, Abhishek Singhi, Eunsang Kim, Hanggjun Cho, Juhyeon Jeong
  • Patent number: 9330276
    Abstract: Methods, systems and computer-readable storage mediums encoded with computer programs executed by one or more processors for conditional role activation in a database are disclosed. In an embodiment, a request to activate a role for a user of a database system is received, and a predicate for conditional activation of the role is determined. The conditions of the predicate are evaluated, and if the conditions of the predicate are satisfied, the role is activated for the user. If, however, one or more of the conditions of the predicate are not satisfied, the role is not activated for the user.
    Type: Grant
    Filed: December 28, 2012
    Date of Patent: May 3, 2016
    Assignee: Sybase, Inc.
    Inventors: Barbara Banks, Rajnish Chitkara
  • Publication number: 20140188938
    Abstract: Methods, systems and computer-readable storage mediums encoded with computer programs executed by one or more processors for conditional role activation in a database are disclosed. In an embodiment, a request to activate a role for a user of a database system is received, and a predicate for conditional activation of the role is determined. The conditions of the predicate are evaluated, and if the conditions of the predicate are satisfied, the role is activated for the user. If, however, one or more of the conditions of the predicate are not satisfied, the role is not activated for the user.
    Type: Application
    Filed: December 28, 2012
    Publication date: July 3, 2014
    Inventors: Barbara Banks, Rajnish Chitkara
  • Publication number: 20080033960
    Abstract: A database system providing encrypted column data support with decrypt default functionality. In a database system, a method providing automated encryption support for column data comprises steps of: defining Structured Query Language (SQL) extensions for creating and managing column encryption keys and database tables with encrypted column data; receiving an SQL statement specifying creation of a column encryption key; receiving an SQL statement specifying creation of a database table having particular column data encrypted with the column encryption key; receiving an SQL statement specifying a default value to be provided in response to requests for the column data without decrypt permission; in response to a subsequent database operation requesting encrypted column data from a user with decrypt permission, automatically decrypting the column data; and in response to a subsequent database operation requesting the encrypted column data from a user without decrypt permission, returning the default value.
    Type: Application
    Filed: August 17, 2007
    Publication date: February 7, 2008
    Applicant: SYBASE, INC.
    Inventors: Barbara Banks, Rajnish Chitkara, Shiping Chen
  • Publication number: 20060053112
    Abstract: A database system providing SQL extensions for automated encryption and decryption of column data is described. In one embodiment, for example, in a database system, a method is described for providing automated encryption support for column data, the method comprises steps of: defining Structured Query Language (SQL) extensions for creating and managing column encryption keys, and for creating and managing database tables with encrypted column data; receiving an SQL statement specifying creation of a particular column encryption key; receiving an SQL statement specifying creation of a database table having particular column data encrypted with the particular column encryption key; and in response to a subsequent database operation that requires the particular column data that has been encrypted, automatically decrypting the particular column data for use by the database operation.
    Type: Application
    Filed: October 13, 2004
    Publication date: March 9, 2006
    Applicant: SYBASE, INC.
    Inventors: Rajnish Chitkara, Barbara Banks, Anita Patel