Patents by Inventor Rohit Joshi
Rohit Joshi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240078334Abstract: Disclosed herein are system, method, and computer program product embodiments for vaultless tokenization. Alphanumeric values may be determined based on numeric values generated from a hash of numeric user information shuffled through a plurality of randomly generated alphanumeric tables. The numeric user information and the alphanumeric values may be used to generate a table index. Shuffled numeric user information may be generated based on the table index and a plurality of randomly generated numeric tables, and transformed to alphanumeric user information (e.g., via format-preserving encryption, additive cipher, etc.). Each character of the alphanumeric user information may be shuffled through a different alphanumeric table of the plurality of alphanumeric tables identified for the character based on the table index. Moreover, an alphanumeric token may be generated based on the shuffled characters of the alphanumeric user information.Type: ApplicationFiled: September 1, 2022Publication date: March 7, 2024Applicant: Capital One Services, LLCInventors: Rohit JOSHI, Hao CHENG, Michael James CAUGHEY
-
Publication number: 20240059449Abstract: The present application provides a bottle. The bottle may include a sidewall and a base section. The base section includes a number of ribs extending from a center dome to a flex surface about the sidewall to resist deformation in the sidewall.Type: ApplicationFiled: February 11, 2022Publication date: February 22, 2024Inventors: Rohit JOSHI, Jeffrey KLOK, Feng Simon SHI
-
Patent number: 11907137Abstract: Disclosed are systems and methods for leader node election, comprising a cluster system including a plurality of nodes, a node registry, wherein nodes are configured to transmit registration requests to the node registry, receive node data is response, and to determine a leader node based on the earliest registered node, and wherein the leader node is configured to dynamically allocate data slots between the plurality of nodes, and each of the nodes are configured to store data associated with allocated data slots in an in-memory least recently used component and data associated with all of the data slots in a persistent storage component.Type: GrantFiled: January 26, 2022Date of Patent: February 20, 2024Assignee: CAPITAL ONE SERVICES, LLCInventors: Rohit Joshi, Ashish Gupta
-
Publication number: 20240045602Abstract: Disclosed are systems and methods for adaptive partitioning of memory and storage resources of a first cluster node of a cluster system, comprising a plurality of nodes; wherein the first node includes one or more shards; and a client device in data communication with the plurality of nodes, wherein the first node is configured to: receive a client request, identify one of the one or more shards based on the client request, retrieve shard rules of the identified shard, determine an allocation of one or more memory slots of the identified shard based on the client request, lock the one or more memory slots, and perform one or more operations on the one or more memory slots associated with the client request based on the allocation.Type: ApplicationFiled: August 3, 2022Publication date: February 8, 2024Inventors: Rohit JOSHI, Ashish GUPTA, Hao CHENG
-
Publication number: 20230362136Abstract: Methods and systems disclosed herein describe tokenizing data to generate a secure token that is limited in scope (e.g., directed to a specific recipient) and limited in time (e.g., valid for only a specified period of time). A detokenization process may be employed to recover encrypted data of the secure token without the need for any relational database lookup processes, thereby reducing cost while maintaining robust protection against unintended recipients that attempt to recover the encrypted data.Type: ApplicationFiled: May 3, 2022Publication date: November 9, 2023Inventors: Hao Cheng, Rohit Joshi, Ashish Gupta
-
Patent number: 11741249Abstract: Disclosed herein are system, method, and computer program product embodiments for processing tokenization requests in-memory of an application server. Reliance on remote devices, such as hardware security modules, is reduced because functions associated with processing tokenization requests is performed at the application server instead of the remote devices. Applicant server includes a multi-level cache for storing and accessing data for generating, hashing, and encrypting tokens in response to tokenization requests received from client devices.Type: GrantFiled: March 5, 2021Date of Patent: August 29, 2023Assignee: Capital One Services, LLCInventors: Rohit Joshi, Marek Bazler, Lan Xie, Hao Cheng
-
Publication number: 20230254153Abstract: In some embodiments, reducing authentication delays related to security module processing may be facilitated. In some embodiments, a first authentication code may be generated based on a first verification code associated with an account. The first authentication code may be stored in association with the account. An authentication request may be obtained to authenticate an action, and the authentication request may comprise a second verification code. A security module request may be generated for a security module response related to the second verification code. A second authentication code may be generated based on the second verification code. Based on a determination that the second authentication code corresponds to the first authentication code, an authentication response for the authentication request may be provided.Type: ApplicationFiled: February 9, 2022Publication date: August 10, 2023Applicant: Capital One Services, LLCInventors: Rohit JOSHI, Swapna Mandala, Vishal Parikh
-
Publication number: 20230251976Abstract: Disclosed are systems and methods for leader node election, comprising a cluster system including a plurality of nodes, a node registry, wherein nodes are configured to transmit registration requests to the node registry, receive node data is response, and to determine a leader node based on the earliest registered node, and wherein the leader node is configured to dynamically allocate data slots between the plurality of nodes, and each of the nodes are configured to store data associated with allocated data slots in an in-memory least recently used component and data associated with all of the data slots in a persistent storage component.Type: ApplicationFiled: January 26, 2022Publication date: August 10, 2023Inventors: Rohit JOSHI, Ashish GUPTA
-
Publication number: 20230236748Abstract: Disclosed are systems and methods for node management performed by a client driver of a client device comprising receiving cluster topology data from the cluster system; transmitting, a data request to each of a plurality of nodes in a cluster system; receiving a reply from each of the nodes that are responsive; assigning, by the client driver, based on the received replies, a responsive status for each of the nodes that are responsive or a non-responsive status for each of nodes that are non-responsive; updating a listing of management data, wherein the management data includes: an identification of each of the plurality of nodes, and a current status of each of the plurality of nodes; and routing, by the client driver, a client request to one of the plurality of nodes that are responsive based on the cluster topology data.Type: ApplicationFiled: January 26, 2022Publication date: July 27, 2023Inventors: Rohit JOSHI, Ashish GUPTA, Glen Hao CHENG
-
Publication number: 20230169016Abstract: Methods and systems disclosed herein describe obfuscating plaintext cryptographic material stored in memory. A random location in an obfuscation buffer may be selected for each byte of the plaintext cryptographic material. The location of each byte of the plaintext cryptographic material may be stored in a position tracking buffer. To recover the scrambled plaintext cryptographic material, the location of each byte of the plaintext cryptographic material may be read from the position tracking buffer. Each byte of the plaintext cryptographic material may then be read from the obfuscation buffer and written to a temporary buffer. When each byte of the plaintext cryptographic material is recovered, the plaintext cryptographic material may be used to perform one or more cryptographic operations. The scrambling techniques described herein reduce the likelihood of a malicious user recovering plaintext cryptographic material while stored in memory.Type: ApplicationFiled: January 26, 2023Publication date: June 1, 2023Inventors: Hao Cheng, Rohit Joshi, Lan Xie
-
Patent number: 11634972Abstract: A catcher for use in a wellbore includes a housing and an insert disposed within the housing. A method of using the catcher includes disintegrating at least a portion of the insert while the insert is held rotationally stationary with respect to the housing by a taper connection between the insert and the housing.Type: GrantFiled: February 12, 2021Date of Patent: April 25, 2023Assignee: Weatherford Technology Holdings, LLCInventors: Richard Lee Giroux, Rohit Joshi, Joshua Vernon Symms, Ryan Bacsik
-
Patent number: 11617972Abstract: The instant launder cover is readily fabricated by pultrusion, vacuum bag, or other non-sprayed methods and may advantageously be used with various sizes of tanks and/or launder troughs. The cover system effectively controls odor using, for example, optional gaskets while not requiring stiffening flanges or interfering with wiper mechanisms or other components of the tank or system.Type: GrantFiled: June 29, 2021Date of Patent: April 4, 2023Assignee: Enduro Composites, IncInventors: Kevin George Schmit, Gustavo Barbera, Rohit Joshi
-
Publication number: 20230086187Abstract: In some implementations, a system may obtain a first model that is trained to identify feature data associated with a client system using one or more services of a service platform. The system may train, based on the feature data, a second model to identify anomalies associated with devices accessing the one or more services in association with a client identifier of the client system. The system may receive access data associated with an acting device accessing a service of the service platform. The system may determine, using the second model, that the acting device accessing the service corresponds to potential anomalous activity based on the access information. The system may obtain, from a verification device, a verification that the acting device accessing the service is anomalous activity. The system may perform, based on obtaining the verification, an action associated with the acting device.Type: ApplicationFiled: November 28, 2022Publication date: March 23, 2023Inventors: Bozhao TAN, Vikash TIWARI, Fedor DZEGILENKO, Ashish GUPTA, Jeffrey MICHEL, Jonathan WEIMER, Meenakshi PANDA, Vinayak HULAWALE, Rohit JOSHI
-
Patent number: 11604740Abstract: Methods and systems disclosed herein describe obfuscating plaintext cryptographic material stored in memory. A random location in an obfuscation buffer may be selected for each byte of the plaintext cryptographic material. The location of each byte of the plaintext cryptographic material may be stored in a position tracking buffer. To recover the scrambled plaintext cryptographic material, the location of each byte of the plaintext cryptographic material may be read from the position tracking buffer. Each byte of the plaintext cryptographic material may then be read from the obfuscation buffer and written to a temporary buffer. When each byte of the plaintext cryptographic material is recovered, the plaintext cryptographic material may be used to perform one or more cryptographic operations. The scrambling techniques described herein reduce the likelihood of a malicious user recovering plaintext cryptographic material while stored in memory.Type: GrantFiled: December 1, 2020Date of Patent: March 14, 2023Assignee: Capital One Services, LLCInventors: Hao Cheng, Rohit Joshi, Lan Xie
-
Patent number: 11516240Abstract: In some implementations, a system may obtain a first model that is trained to identify feature data associated with a client system using one or more services of a service platform. The system may train, based on the feature data, a second model to identify anomalies associated with devices accessing the one or more services in association with a client identifier of the client system. The system may receive access data associated with an acting device accessing a service of the service platform. The system may determine, using the second model, that the acting device accessing the service corresponds to potential anomalous activity based on the access information. The system may obtain, from a verification device, a verification that the acting device accessing the service is anomalous activity. The system may perform, based on obtaining the verification, an action associated with the acting device.Type: GrantFiled: December 29, 2020Date of Patent: November 29, 2022Assignee: Capital One Services, LLCInventors: Bozhao Tan, Vikash Tiwari, Fedor Dzegilenko, Ashish Gupta, Jeffrey Michel, Jonathan Weimer, Meenakshi Panda, Vinayak Hulawale, Rohit Joshi
-
Patent number: 11431563Abstract: This relates generally to create and manage a cloud infrastructure using a cloud infrastructure tool. An example method includes, at a server associated with a cloud management platform, receiving a configuration file associated with a cloud infrastructure tool describing a desired state of a cloud infrastructure; creating a cloud template based on the configuration file; determining cloud resources for achieving the desired state of the cloud infrastructure based on the cloud template; for each of the cloud resources: determining a type of the cloud resource; identifying a native resource associated with the cloud management platform based on the type of the resource; mapping an identification of the native resource to the cloud resource; and storing the mapping between the cloud resource and the native resource in a non-native format; and displaying a graphical user interface configured to display a topology for the cloud resources and the cloud infrastructure tool.Type: GrantFiled: July 27, 2021Date of Patent: August 30, 2022Assignee: VMware, Inc.Inventors: Danny Holzman, Rambabu Duddukuri, Kiran Krishna Singh, Rajesh Chalavadi, Hongvan Nguyen, Rohit Joshi
-
Publication number: 20220259946Abstract: A catcher for use in a wellbore includes a housing and an insert disposed within the housing. A method of using the catcher includes disintegrating at least a portion of the insert while the insert is held rotationally stationary with respect to the housing by a taper connection between the insert and the housing.Type: ApplicationFiled: February 12, 2021Publication date: August 18, 2022Inventors: Richard Lee GIROUX, Rohit JOSHI, Joshua Vernon SYMMS, Ryan BACSIK
-
Patent number: 11385901Abstract: A system including: at least one processor; and at least one memory having stored thereon computer program code that, when executed by the at least one processor, controls the system to: receive a data model identification and a dataset; in response to determining that the data model does not contain a hierarchical structure, perform expectation propagation on the dataset to approximate the data model with a hierarchical structure; divide the dataset into a plurality of channels; for each of the plurality of channels: divide the data into a plurality of microbatches; process each microbatch of the plurality of microbatches through parallel iterators; and process the output of the parallel iterators through single-instruction multiple-data (SIMD) layers; and asynchronously merge results of the SIMD layers.Type: GrantFiled: May 13, 2020Date of Patent: July 12, 2022Assignee: CAPITAL ONE SERVICES, LLCInventors: Matthew van Adelsberg, Rohit Joshi, Siqi Wang
-
Publication number: 20220210172Abstract: In some implementations, a system may obtain a first model that is trained to identify feature data associated with a client system using one or more services of a service platform. The system may train, based on the feature data, a second model to identify anomalies associated with devices accessing the one or more services in association with a client identifier of the client system. The system may receive access data associated with an acting device accessing a service of the service platform. The system may determine, using the second model, that the acting device accessing the service corresponds to potential anomalous activity based on the access information. The system may obtain, from a verification device, a verification that the acting device accessing the service is anomalous activity. The system may perform, based on obtaining the verification, an action associated with the acting device.Type: ApplicationFiled: December 29, 2020Publication date: June 30, 2022Inventors: Bozhao TAN, Vikash TIWARI, Fedor DZEGILENKO, Ashish GUPTA, Jeffrey MICHEL, Jonathan WEIMER, Meenakshi PANDA, Vinayak HULAWALE, Rohit JOSHI
-
Patent number: D959273Type: GrantFiled: January 5, 2021Date of Patent: August 2, 2022Assignee: The Coca-Cola CompanyInventors: Rohit Joshi, Abagail Bleakney, Mohammad Adom Safiullah, Naser Hossain, Ahmed Tasnub Takaddus, Jay Hanan, Katherine Lai