Patents by Inventor Salil Kumar
Salil Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10700863Abstract: A method for secret sharing utilizing multiple features of an input includes: receiving a registration input; obtaining features from the registration input; generating a secret key and a plurality of shared keys according to a shared secret scheme; associating each of the plurality of shared keys with a respective feature of the registration input; generating a plurality of additional features associated with additional keys having a similar format as a shared key associated with a respective feature; storing the plurality of shared keys associated with respective features together with the plurality of additional keys associated with additional features; and encrypting an element to be protected by the secret key using the secret key.Type: GrantFiled: April 26, 2019Date of Patent: June 30, 2020Assignee: Aetna Inc.Inventor: Salil Kumar Jain
-
Patent number: 10541813Abstract: Embodiments of the disclosure provide a method of incorporating multiple authentication systems and protocols. The types of authentication systems and protocols can vary based on desired assurance levels. A Centralized Authentication System together with an authentication policy dictates acceptable authentication systems. Authorization data for each authorization system are captured and packaged into a single Object Data Structure. The authorization data can be compared to data stored in an identity store for authentication. The authorization data can also be used for user and device registration and for transferring an authentication or registration token from a previously authenticated and registered device to a new device.Type: GrantFiled: May 8, 2017Date of Patent: January 21, 2020Assignee: Aetna Inc.Inventors: Salil Kumar Jain, Abbie Barbir, Sylvan Tran, Jay Marehalli, Derek Swift
-
Publication number: 20190273740Abstract: Embodiments of the disclosure provide a method of establishing a user profile using multiple channels. Embodiments allow compatibility of the user profile across several authentication systems. The user profile is created upon registration and is updated with attributes after authenticating and authorizing the user according to a pre-defined assurance level. The user profile contains attributes pertaining to the user and user device. The attributes can be analyzed by authentication systems to optimize data security.Type: ApplicationFiled: May 20, 2019Publication date: September 5, 2019Inventors: Salil Kumar Jain, Abbie Barbir, Sylvan Tran, Jayavardhan N. Marehalli, Derek Swift
-
Patent number: 10404735Abstract: A method for assessing and responding to potential cybersecurity risks includes: obtaining, by a computing device, a plurality of attributes relating to an authentication event; determining, by the computing device, based on a cybersecurity risk assessment model, whether the plurality of attributes relating to the authentication event indicate a potential cybersecurity risk, wherein the cybersecurity risk assessment model is individualized on a per-user or per-device basis; and causing, by the computing device, in response to determining that the determined plurality of attributes relating to the authentication event indicate a potential cybersecurity risk, a heightened security measure to be implemented.Type: GrantFiled: February 2, 2017Date of Patent: September 3, 2019Assignee: Aetna Inc.Inventor: Salil Kumar Jain
-
Publication number: 20190253248Abstract: A method for secret sharing utilizing multiple features of an input includes: receiving a registration input; obtaining features from the registration input; generating a secret key and a plurality of shared keys according to a shared secret scheme; associating each of the plurality of shared keys with a respective feature of the registration input; generating a plurality of additional features associated with additional keys having a similar format as a shared key associated with a respective feature; storing the plurality of shared keys associated with respective features together with the plurality of additional keys associated with additional features; and encrypting an element to be protected by the secret key using the secret key.Type: ApplicationFiled: April 26, 2019Publication date: August 15, 2019Inventor: Salil Kumar Jain
-
Patent number: 10326593Abstract: A method for secret sharing utilizing multiple features of an input includes: receiving a registration input; obtaining features from the registration input; generating a secret key and a plurality of shared keys according to a shared secret scheme; associating each of the plurality of shared keys with a respective feature of the registration input; generating a plurality of additional features associated with additional keys having a similar format as a shared key associated with a respective feature; storing the plurality of shared keys associated with respective features together with the plurality of additional keys associated with additional features; and encrypting an element to be protected by the secret key using the secret key.Type: GrantFiled: October 18, 2016Date of Patent: June 18, 2019Assignee: AETNA INC.Inventor: Salil Kumar Jain
-
Publication number: 20180309758Abstract: Embodiments of the disclosure provide a method of incorporating multiple authentication systems and protocols. The types of authentication systems and protocols can vary based on desired assurance levels. A Centralized Authentication System together with an authentication policy dictates acceptable authentication systems. Authorization data for each authorization system are captured and packaged into a single Object Data Structure. The authorization data can be compared to data stored in an identity store for authentication. The authorization data can also be used for user and device registration and for transferring an authentication or registration token from a previously authenticated and registered device to a new device.Type: ApplicationFiled: July 2, 2018Publication date: October 25, 2018Inventors: Salil Kumar Jain, Abbie Barbir
-
Publication number: 20180219891Abstract: A method for assessing and responding to potential cybersecurity risks includes: obtaining, by a computing device, a plurality of attributes relating to an authentication event; determining, by the computing device, based on a cybersecurity risk assessment model, whether the plurality of attributes relating to the authentication event indicate a potential cybersecurity risk, wherein the cybersecurity risk assessment model is individualized on a per-user or per-device basis; and causing, by the computing device, in response to determining that the determined plurality of attributes relating to the authentication event indicate a potential cybersecurity risk, a heightened security measure to be implemented.Type: ApplicationFiled: February 2, 2017Publication date: August 2, 2018Inventor: Salil Kumar Jain
-
Publication number: 20180026983Abstract: Embodiments of the disclosure provide a method of establishing a user profile using multiple channels. Embodiments allow compatibility of the user profile across several authentication systems. The user profile is created upon registration and is updated with attributes after authenticating and authorizing the user according to a pre-defined assurance level. The user profile contains attributes pertaining to the user and user device. The attributes can be analyzed by authentication systems to optimize data security.Type: ApplicationFiled: July 20, 2017Publication date: January 25, 2018Inventors: Salil Kumar Jain, Abbie Barbir, Sylvan Tran, Jayavardhan N. Marehalli, Derek Swift
-
Publication number: 20180025148Abstract: Embodiments of the disclosure provide a method for enhancing standard authentication systems to include risk-based decisions. Risk-based decisions can be selectively implemented within existing authentication systems to strategically modify and supplement security if an unacceptable risk is detected. Embodiments capture information pertaining to a user and user device. Information is stored to create a profile for the user and user device. A comparison between the stored information and live data can be performed within authentication systems to optimize security. If the results of the comparison demonstrate the presence of an acceptable risk, then the need for subsequent authentication can be reduced or eliminated, which improves a user experience.Type: ApplicationFiled: July 19, 2017Publication date: January 25, 2018Inventors: Salil Kumar Jain, Abbie Barbir, Derek Swift
-
Publication number: 20180013557Abstract: A method for secret sharing with required key(s) includes: generating, by a computing system, a secret key such that a minimum number of a plurality of shared keys, together with one or more required keys, are needed for derivation of the secret key; and encrypting, by the computing system, an element to be protected using the secret key.Type: ApplicationFiled: September 13, 2016Publication date: January 11, 2018Inventor: Salil Kumar Jain
-
Publication number: 20170373861Abstract: A method for secret sharing utilizing multiple features of an input includes: receiving a registration input; obtaining features from the registration input; generating a secret key and a plurality of shared keys according to a shared secret scheme; associating each of the plurality of shared keys with a respective feature of the registration input; generating a plurality of additional features associated with additional keys having a similar format as a shared key associated with a respective feature; storing the plurality of shared keys associated with respective features together with the plurality of additional keys associated with additional features; and encrypting an element to be protected by the secret key using the secret key.Type: ApplicationFiled: October 18, 2016Publication date: December 28, 2017Inventor: Salil Kumar Jain
-
Publication number: 20170323094Abstract: Embodiments of the disclosure provide a method of incorporating multiple authentication systems and protocols. The types of authentication systems and protocols can vary based on desired assurance levels. A Centralized Authentication System together with an authentication policy dictates acceptable authentication systems. Authorization data for each authorization system are captured and packaged into a single Object Data Structure. The authorization data can be compared to data stored in an identity store for authentication. The authorization data can also be used for user and device registration and for transferring an authentication or registration token from a previously authenticated and registered device to a new device.Type: ApplicationFiled: May 8, 2017Publication date: November 9, 2017Inventors: Salil Kumar Jain, Abbie Barbir, Sylvan Tran, Jay Marehalli, Derek Swift
-
Publication number: 20170177792Abstract: A system for analyzing biological data, comprising: a storage configured to store a plurality of data files containing biological data obtained from a plurality of devices; a server configured to: host a plurality of applications, each configured to be implemented on the server and to provide analysis, manipulation, comparison, visualization, or a combination thereof, of the biological data included in the data files, wherein the plurality of applications allow a user to analyze different data files related to the same sample and compare the results of the analysis.Type: ApplicationFiled: March 24, 2015Publication date: June 22, 2017Inventors: Nivedita Sumi MAJUMDAR, Harrison LEONG, Shakila POTHINI, David HOARD, Christopher FONG, Pratik Simon SOARES, Salil KUMAR, Thomas WESSEL, Manjula ALIMINATI, Levente EGRY
-
Publication number: 20150206218Abstract: According to some embodiments, an apparatus comprises a camera, one or more processors, and a display. The camera is pointed at a real estate property. The one or more processors determine information associated with the real estate property. Determining the information comprises, determining a camera position based on a longitude, a latitude, and an orientation of the camera, applying a correction factor to the camera position to yield an approximate longitude and an approximate latitude of the real estate property, determining an address of the real estate property based on the approximate longitude and the approximate latitude, and retrieving the information associated with the real estate property based on the address. The display displays at least a portion of the information associated with the real estate property.Type: ApplicationFiled: January 21, 2014Publication date: July 23, 2015Applicant: Bank of America CorporationInventors: Nirmalya Banerjee, Hood Qaim-Magami, Salil Kumar Jain, Bridget Elizabeth O'Connor
-
Publication number: 20100017146Abstract: An automated system for evaluating biological samples which includes a centralized registry that contains protocols and configuration information for both instruments and analysis applications. The registry provides for improved automation of biological process runs using an autoanalysis applications manager component or daemon, which accesses and transmits the appropriate protocol and configuration information to selected instruments and/or applications. This information is used to instruct data capture by the biological instruments and direct the analysis of the data by the analysis applications.Type: ApplicationFiled: September 24, 2009Publication date: January 21, 2010Applicant: Life Technologies CorporationInventors: Thomas E. Birkett, Puneet Suri, Kai C. Yung, Sylvia H. Fang, Salil Kumar, Benjamin B. Jones, Jon M. Sorenson, Yuandan Lou, Catherine E. Frantz
-
Publication number: 20070010953Abstract: An automated system for evaluating biological samples which includes a centralized registry that contains protocols and configuration information for both instruments and analysis applications. The registry provides for improved automation of biological process runs using an autoanalysis applications manager component or daemon, which accesses and transmits the appropriate protocol and configuration information to selected instruments and/or applications. This information is used to instruct data capture by the biological instruments and direct the analysis of the data by the analysis applications.Type: ApplicationFiled: September 15, 2006Publication date: January 11, 2007Applicant: APPLERA CORPORATIONInventors: Thomas Birkett, Puneet Suri, Kai Yung, Sylvia Fang, Salil Kumar, Benjamin Jones, Jon Sorenson, Yuandan Lou, Catherine Frantz
-
Patent number: 7110890Abstract: An automated system for evaluating biological samples which includes a centralized registry that contains protocols and configuration information for both instruments and analysis applications. The registry provides for improved automation of biological process runs using an autoanalysis applications manager component or daemon, which accesses and transmits the appropriate protocol and configuration information to selected instruments and/or applications. This information is used to instruct data capture by the biological instruments and direct the analysis of the data by the analysis applications.Type: GrantFiled: August 28, 2003Date of Patent: September 19, 2006Assignee: Applera CorporationInventors: Thomas E. Birkett, Puneet Suri, Kai C. Yung, Sylvia H. Fang, Salil Kumar, Benjamin B. Jones, Jon M. Sorenson, Yuandan Lou, Catherine E. Frantz
-
Publication number: 20040121369Abstract: An automated system for evaluating biological samples which includes a centralized registry that contains protocols and configuration information for both instruments and analysis applications. The registry provides for improved automation of biological process runs using an autoanalysis applications manager component or daemon, which accesses and transmits the appropriate protocol and configuration information to selected instruments and/or applications. This information is used to instruct data capture by the biological instruments and direct the analysis of the data by the analysis applications.Type: ApplicationFiled: August 28, 2003Publication date: June 24, 2004Inventors: Thomas E. Birkett, Puneet Suri, Kai C. Yung, Sylvia H. Fang, Salil Kumar, Benjamin B. Jones, Jon M. Sorenson, Yuandan Lou, Catherine E. Frantz