Patents by Inventor Satyajit Nath

Satyajit Nath has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11645584
    Abstract: Systems and methods for identifying recommended topics are disclosed. An example method may be performed by one or more processors of a system and include identifying one or more attributes of a system user, identifying a subset of topics relevant to the system user based on analyzing the one or more attributes of the system user using an analysis model trained with a machine learning process to identify relevant topics for system users based on historical user attributes, generating, for each respective topic of the subset of topics, using the trained analysis model, a relevance score for the respective topic based at least in part on a most recent system page previously accessed by the system user and a current system page accessed by the system user, and generating one or more recommended topics for the system user based on the relevance scores.
    Type: Grant
    Filed: August 9, 2021
    Date of Patent: May 9, 2023
    Assignee: Intuit Inc.
    Inventors: Sirigiri Venkata Giri, Govinda Raj Sambamurthy, Charu Garg, Samar Ranjan, Anshika Pandita, Manish Jain, Anand Patil, Satyajit Nath Bhowmik
  • Publication number: 20210365839
    Abstract: Systems and methods for identifying recommended topics are disclosed. An example method may be performed by one or more processors of a system and include identifying one or more attributes of a system user, identifying a subset of topics relevant to the system user based on analyzing the one or more attributes of the system user using an analysis model trained with a machine learning process to identify relevant topics for system users based on historical user attributes, generating, for each respective topic of the subset of topics, using the trained analysis model, a relevance score for the respective topic based at least in part on a most recent system page previously accessed by the system user and a current system page accessed by the system user, and generating one or more recommended topics for the system user based on the relevance scores.
    Type: Application
    Filed: August 9, 2021
    Publication date: November 25, 2021
    Applicant: Intuit Inc.
    Inventors: Sirigiri Venkata Giri, Govinda Raj Sambamurthy, Charu Garg, Samar Ranjan, Anshika Pandita, Manish Jain, Anand Patil, Satyajit Nath Bhowmik
  • Patent number: 11138519
    Abstract: A method and system provides personalized self-help assistance to users of a data management system. The method and system trains an analysis model to identify relevant assistance topics based personal attributes of the user and contextual attributes associated with the user. The method and system outputs personalized assistance topics recommendation data to the user based on the analysis of the analysis model.
    Type: Grant
    Filed: May 23, 2018
    Date of Patent: October 5, 2021
    Assignee: Intuit Inc.
    Inventors: Sirigiri Venkata Giri, Govinda Raj Sambamurthy, Charu Garg, Samar Ranjan, Anshika Pandita, Manish Jain, Anand Patil, Satyajit Nath Bhowmik
  • Patent number: 9286484
    Abstract: Techniques for utilizing security criteria to implement document retention for electronic documents are disclosed. The security criteria can also limit when, how and where access to the electronic documents is permitted. The security criteria can pertain to keys (or ciphers) used to secure (e.g., encrypt) electronic files (namely, electronic documents), or to unsecure (e.g., decrypt) electronic files already secured. At least a portion of the security criteria can be used to implement document retention, namely, a document retention policy. After a secured electronic document has been retained for the duration of the document retention policy, the associated security criteria becomes no longer available, thus preventing subsequent access to the secured electronic document. In other words, access restrictions on electronic documents can be used to prevent access to electronic documents which are no longer to be retained.
    Type: Grant
    Filed: December 13, 2013
    Date of Patent: March 15, 2016
    Assignee: Intellectual Ventures I LLC
    Inventor: Satyajit Nath
  • Patent number: 8739302
    Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy and enforced in conjunction with one or more cryptographic methods.
    Type: Grant
    Filed: February 24, 2012
    Date of Patent: May 27, 2014
    Assignee: Intellectual Ventures I LLC
    Inventors: Klimenty Vainstein, Satyajit Nath, Michael Michio Ouye
  • Publication number: 20140101457
    Abstract: Techniques for utilizing security criteria to implement document retention for electronic documents are disclosed. The security criteria can also limit when, how and where access to the electronic documents is permitted. The security criteria can pertain to keys (or ciphers) used to secure (e.g., encrypt) electronic files (namely, electronic documents), or to unsecure (e.g., decrypt) electronic files already secured. At least a portion of the security criteria can be used to implement document retention, namely, a document retention policy. After a secured electronic document has been retained for the duration of the document retention policy, the associated security criteria becomes no longer available, thus preventing subsequent access to the secured electronic document. In other words, access restrictions on electronic documents can be used to prevent access to electronic documents which are no longer to be retained.
    Type: Application
    Filed: December 13, 2013
    Publication date: April 10, 2014
    Applicant: INTELLECTUAL VENTURES I LLC
    Inventor: Satyajit NATH
  • Patent number: 8613102
    Abstract: Techniques for utilizing security criteria to implement document retention for electronic documents are disclosed. The security criteria can also limit when, how and where access to the electronic documents is permitted. The security criteria can pertain to keys (or ciphers) used to secure (e.g., encrypt) electronic files (namely, electronic documents), or to unsecure (e.g., decrypt) electronic files already secured. At least a portion of the security criteria can be used to implement document retention, namely, a document retention policy. After a secured electronic document has been retained for the duration of the document retention policy, the associated security criteria becomes no longer available, thus preventing subsequent access to the secured electronic document. In other words, access restrictions on electronic documents can be used to prevent access to electronic documents which are no longer to be retained.
    Type: Grant
    Filed: March 30, 2004
    Date of Patent: December 17, 2013
    Assignee: Intellectual Ventures I LLC
    Inventor: Satyajit Nath
  • Patent number: 8327138
    Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy.
    Type: Grant
    Filed: April 16, 2010
    Date of Patent: December 4, 2012
    Assignee: Guardian Data Storage LLC
    Inventors: Satyajit Nath, Klimenty Vainstein, Michael Michio Ouye
  • Publication number: 20120159191
    Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy and enforced in conjunction with one or more cryptographic methods.
    Type: Application
    Filed: February 24, 2012
    Publication date: June 21, 2012
    Applicant: Guardian Data Storage, LLC
    Inventors: Klimenty VAINSTEIN, Satyajit NATH, Michael Michio OUYE
  • Patent number: 8127133
    Abstract: One or more labels are associated with a data object. One or more policies are associated with each of the labels. Based on the labels associated with the data objects, the associated policies are dispatched to policy decision engines to take one or more actions to enforce the policy. The labels, and the policies associated with the labels, are chosen by a business administrator within an enterprise, and are implemented by an Information Technology (IT) administrator. The association between labels and polices allows the policy to be applied to an object to be decoupled from the characterization of the nature of the object, or its purpose and/or role within an enterprise, business purpose and/or context of the object. Examples of policies are: access, backup, retention, isolation, audit, etc.
    Type: Grant
    Filed: January 25, 2007
    Date of Patent: February 28, 2012
    Assignee: Microsoft Corporation
    Inventors: David B. Cross, Satyajit Nath, George Z. Li, Tanmoy Dutta, Sunil Gottumukkala
  • Patent number: 8127366
    Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy and enforced in conjunction with one or more cryptographic methods.
    Type: Grant
    Filed: September 30, 2003
    Date of Patent: February 28, 2012
    Assignee: Guardian Data Storage, LLC
    Inventors: Klimenty Vainstein, Satyajit Nath, Michael Michio Ouye
  • Patent number: 7882539
    Abstract: Abstracting access control policy from access check mechanisms allows for richer expression of policy, using a declarative model with semantics, than what is permitted by the access check mechanisms. Further, abstracting access control policy allows for uniform expression of policy across multiple access check mechanisms. Proof-like reasons for any access query are provided, such as who has access to what resource, built from the policy statements themselves, independent of the access check mechanism that provide access. Access is audited and policy-based reasons for access are provided based on the access control policy.
    Type: Grant
    Filed: June 2, 2006
    Date of Patent: February 1, 2011
    Assignee: Microsoft Corporation
    Inventors: Muthukrishnan Paramasivam, Charles F. Rose, III, Dave M. McPherson, Raja Pazhanivel Perumal, Satyajit Nath, Paul J. Leach, Ravindra Nath Pandya
  • Publication number: 20100199088
    Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy.
    Type: Application
    Filed: April 16, 2010
    Publication date: August 5, 2010
    Applicant: Guardian Data Storage, LLC
    Inventors: Satyajit Nath, Klimenty Vainstein, Michael Michio Ouye
  • Patent number: 7730543
    Abstract: Improved system and approaches for permitting users of different organizations to access secured files (e.g., documents) are disclosed. These users can be part of a group that is shared across a plurality of file security systems. For example, at a first file security system, a user of the shared group can secure a file for restricted access by those users within the shared group. Subsequently, at a different file security system, another user of the shared group is able to access the content of the secured file.
    Type: Grant
    Filed: June 30, 2003
    Date of Patent: June 1, 2010
    Inventor: Satyajit Nath
  • Patent number: 7703140
    Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy.
    Type: Grant
    Filed: September 30, 2003
    Date of Patent: April 20, 2010
    Assignee: Guardian Data Storage, LLC
    Inventors: Satyajit Nath, Klimenty Vainstein, Michael Michio Ouye
  • Publication number: 20080184329
    Abstract: One or more labels are associated with a data object. One or more policies are associated with each of the labels. Based on the labels associated with the data objects, the associated policies are dispatched to policy decision engines to take one or more actions to enforce the policy. The labels, and the policies associated with the labels, are chosen by a business administrator within an enterprise, and are implemented by an Information Technology (IT) administrator. The association between labels and polices allows the policy to be applied to an object to be decoupled from the characterization of the nature of the object, or its purpose and/or role within an enterprise, business purpose and/or context of the object. Examples of policies are: access, backup, retention, isolation, audit, etc.
    Type: Application
    Filed: January 25, 2007
    Publication date: July 31, 2008
    Applicant: Microsoft Corporation
    Inventors: David B. Cross, Satyajit Nath, George Z. Li, Tanmoy Dutta, Sunil P. Gottumukkala
  • Publication number: 20070283411
    Abstract: Abstracting access control policy from access check mechanisms allows for richer expression of policy, using a declarative model with semantics, than what is permitted by the access check mechanisms. Further, abstracting access control policy allows for uniform expression of policy across multiple access check mechanisms. Proof-like reasons for any access query are provided, such as who has access to what resource, built from the policy statements themselves, independent of the access check mechanism that provide access. Access is audited and policy-based reasons for access are provided based on the access control policy.
    Type: Application
    Filed: June 2, 2006
    Publication date: December 6, 2007
    Applicant: Microsoft Corporation
    Inventors: Muthukrishnan Paramasivam, Charles F. Rose, Dave M. McPherson, Raja Pazhanivel Perumal, Satyajit Nath, Paul J. Leach, Ravindra Nath Pandya
  • Publication number: 20050223242
    Abstract: Techniques for utilizing security criteria to implement document retention for electronic documents are disclosed. The security criteria can also limit when, how and where access to the electronic documents is permitted. The security criteria can pertain to keys (or ciphers) used to secure (e.g., encrypt) electronic files (namely, electronic documents), or to unsecure (e.g., decrypt) electronic files already secured. At least a portion of the security criteria can be used to implement document retention, namely, a document retention policy. After a secured electronic document has been retained for the duration of the document retention policy, the associated security criteria becomes no longer available, thus preventing subsequent access to the secured electronic document. In other words, access restrictions on electronic documents can be used to prevent access to electronic documents which are no longer to be retained.
    Type: Application
    Filed: March 30, 2004
    Publication date: October 6, 2005
    Inventor: Satyajit Nath
  • Publication number: 20050071658
    Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy.
    Type: Application
    Filed: September 30, 2003
    Publication date: March 31, 2005
    Inventors: Satyajit Nath, Klimenty Vainstein, Michael Ouye
  • Publication number: 20050071275
    Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy and enforced in conjunction with one or more cryptographic methods.
    Type: Application
    Filed: September 30, 2003
    Publication date: March 31, 2005
    Inventors: Klimenty Vainstein, Satyajit Nath, Michael Ouye