Patents by Inventor Ramesh Alagar
Ramesh Alagar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11799643Abstract: A device participates in a cyclical collaboration system. The device receives a request from a third party. A request value is determined that is associated with the request. A first random number is determined based on the first request value. The first random number is provided to a downstream device. A second random number is received that is generated by a upstream device. A first encrypted request value is determined based on the first request value, the first random number, and the second random number. The first encrypted request value is provided to a multiple party encryption subsystem. Encrypted request values generated by other participants of the cyclical collaboration network are received from the multiple party encryption subsystem. A validation score is determined based on the first encrypted request values and the encrypted request values received from the multiple party encryption subsystem.Type: GrantFiled: January 19, 2021Date of Patent: October 24, 2023Assignee: Bank of America CorporationInventors: Prabakar Rangarajan, Ramesh Alagar
-
Patent number: 11657168Abstract: A system for detecting data leakage is disclosed. The system intercepts web traffic data, de-duplicates the web traffic data, and extracts data elements from the web traffic data. The system further groups the data elements into multiple clusters based on data types associated with the data elements. The system then identifies data elements in a cluster that were previously sent to a user and identifies allowed data elements from an allow table that are supposed to be sent to the user. The system determines whether there is a data leakage by determining whether the identified data elements in the cluster comprises at least one data element that is not in the identified allowed data elements in the allow table.Type: GrantFiled: November 30, 2020Date of Patent: May 23, 2023Assignee: Bank of America CorporationInventors: Ramesh Alagar, Prabakar Rangarajan
-
Patent number: 11630644Abstract: Aspects of the disclosure relate to design as a service for configuring custom software. A computing platform may receive natural language input from a user specifying a software customization request. The computing platform may convert the natural language input into a visual output corresponding to the software customization request. The computing platform may send the visual output to a user interface. The computing platform may receive a modification request from the user specifying, using natural language, one or more modifications to the visual output. The computing platform may modify, using natural language processing, the visual output based on the modification request. The computing platform may log the one or more modifications to the visual output in a tracking log. The computing platform may send the modified visual output to the user interface.Type: GrantFiled: May 27, 2021Date of Patent: April 18, 2023Assignee: Bank of America CorporationInventors: Tarannum Salahuddin Ansari, Ramesh Alagar
-
Publication number: 20220382524Abstract: Aspects of the disclosure relate to design as a service for configuring custom software. A computing platform may receive natural language input from a user specifying a software customization request. The computing platform may convert the natural language input into a visual output corresponding to the software customization request. The computing platform may send the visual output to a user interface. The computing platform may receive a modification request from the user specifying, using natural language, one or more modifications to the visual output. The computing platform may modify, using natural language processing, the visual output based on the modification request. The computing platform may log the one or more modifications to the visual output in a tracking log. The computing platform may send the modified visual output to the user interface.Type: ApplicationFiled: May 27, 2021Publication date: December 1, 2022Inventors: Tarannum Salahuddin Ansari, Ramesh Alagar
-
Patent number: 11463459Abstract: An intrusion detection system that includes a processor configured to receive HyperText Transfer Protocol (HTTP) data and to convert the HTTP data into a data tree object that links field values from the HTTP data. The processor is further configured to identify a field value from the data object tree and to determine a set of feature values for the field value corresponding with input features for the neural network model. The processor is further configured to apply the determined set of feature values to the neural network model to generate an attack vector array. The attack vector array includes flag bits that each correspond with an attack type. The processor is further configured to trigger an event in response to determining that at least one flag bit is set.Type: GrantFiled: February 25, 2021Date of Patent: October 4, 2022Assignee: Bank of America CorporationInventors: Ramesh Alagar, Prabakar Rangarajan
-
Publication number: 20220231847Abstract: A device participates in a cyclical collaboration system. The device receives a request from a third party. A request value is determined that is associated with the request. A first random number is determined based on the first request value. The first random number is provided to a downstream device. A second random number is received that is generated by a upstream device. A first encrypted request value is determined based on the first request value, the first random number, and the second random number. The first encrypted request value is provided to a multiple party encryption subsystem. Encrypted request values generated by other participants of the cyclical collaboration network are received from the multiple party encryption subsystem. A validation score is determined based on the first encrypted request values and the encrypted request values received from the multiple party encryption subsystem.Type: ApplicationFiled: January 19, 2021Publication date: July 21, 2022Inventors: Prabakar Rangarajan, Ramesh Alagar
-
Patent number: 11349755Abstract: A system is provided for exchanging data using Electronic Data Interchange (EDI). A transmitting entity obtains an EDI file from a document that is to be transmitted to a destination server and adds routing information to the EDI file based on a first routing configuration, wherein the routing information is to be used by the receiving entity for routing the EDI file to the destination server. The receiving entity receives the EDI file from the transmitting entity and extracts the routing information from the EDI file. The receiving entity determines the destination server from a second routing configuration based on the extracted routing information and forwards the EDI file to the destination server.Type: GrantFiled: July 21, 2020Date of Patent: May 31, 2022Assignee: Bank of America CorporationInventors: Prabakar Rangarajan, Ramesh Alagar, Rangarajan Lakshminarasimhan
-
Patent number: 11334881Abstract: An apparatus includes a memory and a hardware processor. The memory stores a private encryption key. The processor intercepts a first transaction request from a user, communicates a first recertification request to a certificate authority that issued the private encryption key, and receives, from the certificate authority, a first message indicating that the private encryption key is valid for use. In response to the first message, the processor generates a first digital signature using the private encryption key, generates a first non-repudiation message comprising the first digital signature and the first message, generates a second message comprising the first transaction request and the first non-repudiation message, and communicates the second message to a server to process the first transaction request.Type: GrantFiled: January 28, 2019Date of Patent: May 17, 2022Assignee: Bank of America CorporationInventors: Prabakar Rangarajan, Tarannum Salahuddin Ansari, Prabhu Sannasi Maharajan, Ramesh Alagar
-
Publication number: 20220029912Abstract: A system is provided for exchanging data using Electronic Data Interchange (EDI). A transmitting entity obtains an EDI file from a document that is to be transmitted to a destination server and adds routing information to the EDI file based on a first routing configuration, wherein the routing information is to be used by the receiving entity for routing the EDI file to the destination server. The receiving entity receives the EDI file from the transmitting entity and extracts the routing information from the EDI file. The receiving entity determines the destination server from a second routing configuration based on the extracted routing information and forwards the EDI file to the destination server.Type: ApplicationFiled: July 21, 2020Publication date: January 27, 2022Inventors: Prabakar Rangarajan, Ramesh Alagar, Rangarajan Lakshminarasimhan
-
Publication number: 20210203678Abstract: An intrusion detection system that includes a processor configured to receive HyperText Transfer Protocol (HTTP) data and to convert the HTTP data into a data tree object that links field values from the HTTP data. The processor is further configured to identify a field value from the data object tree and to determine a set of feature values for the field value corresponding with input features for the neural network model. The processor is further configured to apply the determined set of feature values to the neural network model to generate an attack vector array. The attack vector array includes flag bits that each correspond with an attack type. The processor is further configured to trigger an event in response to determining that at least one flag bit is set.Type: ApplicationFiled: February 25, 2021Publication date: July 1, 2021Inventors: Ramesh Alagar, Prabakar Rangarajan
-
Patent number: 10965694Abstract: An intrusion detection system that includes a tree builder engine configured to receive HyperText Transfer Protocol (HTTP) data and to convert the HTTP data into a data tree object that links field values from the HTTP data. The system further includes a feature extractor engine configured to identify a field value from the data object tree and to determine a set of feature values for the field value corresponding with input features for the neural network model. The system further includes a neural network engine configured to apply the determined set of feature values to the neural network model to generate an attack vector array. The attack vector array includes flag bits that each correspond with an attack type. the system further includes an intrusion analyzer engine configured to trigger an event in response to determining that at least one flag bit is set.Type: GrantFiled: December 11, 2018Date of Patent: March 30, 2021Assignee: Bank of America CorporationInventors: Ramesh Alagar, Prabakar Rangarajan
-
Publication number: 20210081554Abstract: A system for detecting data leakage is disclosed. The system intercepts web traffic data, de-duplicates the web traffic data, and extracts data elements from the web traffic data. The system further groups the data elements into multiple clusters based on data types associated with the data elements. The system then identifies data elements in a cluster that were previously sent to a user and identifies allowed data elements from an allow table that are supposed to be sent to the user. The system determines whether there is a data leakage by determining whether the identified data elements in the cluster comprises at least one data element that is not in the identified allowed data elements in the allow table.Type: ApplicationFiled: November 30, 2020Publication date: March 18, 2021Inventors: Ramesh Alagar, Prabakar Rangarajan
-
Patent number: 10853509Abstract: A system for detecting data leakage is disclosed. The system intercepts web traffic data, de-duplicates the web traffic data, and extracts data elements from the web traffic data. The system further groups the data elements into multiple clusters based on data types associated with the data elements. The system then identifies data elements in a cluster that were previously sent to a user and identifies allowed data elements from an allow table that are supposed to be sent to the user. The system determines whether there is a data leakage by determining whether the identified data elements in the cluster comprises at least one data element that is not in the identified allowed data elements in the allow table.Type: GrantFiled: August 24, 2018Date of Patent: December 1, 2020Assignee: Bank of America CorporationInventors: Ramesh Alagar, Prabakar Rangarajan
-
Patent number: 10771568Abstract: A system for generating user session objects is disclosed. The system intercepts web traffic data and extracts dynamic content items from the web traffic data such that the dynamic content items are separated from static content items. The system further groups the dynamic content items based on their associated user session IDs. The system then links together the dynamic content items of a group in sequence to generate a user session object, wherein the dynamic content items include one or more static content reference IDs associated with the static content items.Type: GrantFiled: September 20, 2018Date of Patent: September 8, 2020Assignee: Bank of America CorporationInventors: Ramesh Alagar, Prabakar Rangarajan
-
Publication number: 20200242598Abstract: An apparatus includes a memory and a hardware processor. The memory stores a private encryption key. The processor intercepts a first transaction request from a user, communicates a first recertification request to a certificate authority that issued the private encryption key, and receives, from the certificate authority, a first message indicating that the private encryption key is valid for use. In response to the first message, the processor generates a first digital signature using the private encryption key, generates a first non-repudiation message comprising the first digital signature and the first message, generates a second message comprising the first transaction request and the first non-repudiation message, and communicates the second message to a server to process the first transaction request.Type: ApplicationFiled: January 28, 2019Publication date: July 30, 2020Inventors: Prabakar Rangarajan, Tarannum Salahuddin Ansari, Prabhu Sannasi Maharajan, Ramesh Alagar
-
Publication number: 20200186548Abstract: An intrusion detection system that includes a tree builder engine configured to receive HyperText Transfer Protocol (HTTP) data and to convert the HTTP data into a data tree object that links field values from the HTTP data. The system further includes a feature extractor engine configured to identify a field value from the data object tree and to determine a set of feature values for the field value corresponding with input features for the neural network model. The system further includes a neural network engine configured to apply the determined set of feature values to the neural network model to generate an attack vector array. The attack vector array includes flag bits that each correspond with an attack type. the system further includes an intrusion analyzer engine configured to trigger an event in response to determining that at least one flag bit is set.Type: ApplicationFiled: December 11, 2018Publication date: June 11, 2020Inventors: Ramesh Alagar, Prabakar Rangarajan
-
Publication number: 20200099754Abstract: A system for generating user session objects is disclosed. The system intercepts web traffic data and extracts dynamic content items from the web traffic data such that the dynamic content items are separated from static content items. The system further groups the dynamic content items based on their associated user session IDs. The system then links together the dynamic content items of a group in sequence to generate a user session object, wherein the dynamic content items include one or more static content reference IDs associated with the static content items.Type: ApplicationFiled: September 20, 2018Publication date: March 26, 2020Inventors: Ramesh Alagar, Prabakar Rangarajan
-
Publication number: 20200065504Abstract: A system for detecting data leakage is disclosed. The system intercepts web traffic data, de-duplicates the web traffic data, and extracts data elements from the web traffic data. The system further groups the data elements into multiple clusters based on data types associated with the data elements. The system then identifies data elements in a cluster that were previously sent to a user and identifies allowed data elements from an allow table that are supposed to be sent to the user. The system determines whether there is a data leakage by determining whether the identified data elements in the cluster comprises at least one data element that is not in the identified allowed data elements in the allow table.Type: ApplicationFiled: August 24, 2018Publication date: February 27, 2020Inventors: Ramesh Alagar, Prabakar Rangarajan