Patents by Inventor Satyajit Nath
Satyajit Nath has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11645584Abstract: Systems and methods for identifying recommended topics are disclosed. An example method may be performed by one or more processors of a system and include identifying one or more attributes of a system user, identifying a subset of topics relevant to the system user based on analyzing the one or more attributes of the system user using an analysis model trained with a machine learning process to identify relevant topics for system users based on historical user attributes, generating, for each respective topic of the subset of topics, using the trained analysis model, a relevance score for the respective topic based at least in part on a most recent system page previously accessed by the system user and a current system page accessed by the system user, and generating one or more recommended topics for the system user based on the relevance scores.Type: GrantFiled: August 9, 2021Date of Patent: May 9, 2023Assignee: Intuit Inc.Inventors: Sirigiri Venkata Giri, Govinda Raj Sambamurthy, Charu Garg, Samar Ranjan, Anshika Pandita, Manish Jain, Anand Patil, Satyajit Nath Bhowmik
-
Publication number: 20210365839Abstract: Systems and methods for identifying recommended topics are disclosed. An example method may be performed by one or more processors of a system and include identifying one or more attributes of a system user, identifying a subset of topics relevant to the system user based on analyzing the one or more attributes of the system user using an analysis model trained with a machine learning process to identify relevant topics for system users based on historical user attributes, generating, for each respective topic of the subset of topics, using the trained analysis model, a relevance score for the respective topic based at least in part on a most recent system page previously accessed by the system user and a current system page accessed by the system user, and generating one or more recommended topics for the system user based on the relevance scores.Type: ApplicationFiled: August 9, 2021Publication date: November 25, 2021Applicant: Intuit Inc.Inventors: Sirigiri Venkata Giri, Govinda Raj Sambamurthy, Charu Garg, Samar Ranjan, Anshika Pandita, Manish Jain, Anand Patil, Satyajit Nath Bhowmik
-
Patent number: 11138519Abstract: A method and system provides personalized self-help assistance to users of a data management system. The method and system trains an analysis model to identify relevant assistance topics based personal attributes of the user and contextual attributes associated with the user. The method and system outputs personalized assistance topics recommendation data to the user based on the analysis of the analysis model.Type: GrantFiled: May 23, 2018Date of Patent: October 5, 2021Assignee: Intuit Inc.Inventors: Sirigiri Venkata Giri, Govinda Raj Sambamurthy, Charu Garg, Samar Ranjan, Anshika Pandita, Manish Jain, Anand Patil, Satyajit Nath Bhowmik
-
Patent number: 9286484Abstract: Techniques for utilizing security criteria to implement document retention for electronic documents are disclosed. The security criteria can also limit when, how and where access to the electronic documents is permitted. The security criteria can pertain to keys (or ciphers) used to secure (e.g., encrypt) electronic files (namely, electronic documents), or to unsecure (e.g., decrypt) electronic files already secured. At least a portion of the security criteria can be used to implement document retention, namely, a document retention policy. After a secured electronic document has been retained for the duration of the document retention policy, the associated security criteria becomes no longer available, thus preventing subsequent access to the secured electronic document. In other words, access restrictions on electronic documents can be used to prevent access to electronic documents which are no longer to be retained.Type: GrantFiled: December 13, 2013Date of Patent: March 15, 2016Assignee: Intellectual Ventures I LLCInventor: Satyajit Nath
-
Patent number: 8739302Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy and enforced in conjunction with one or more cryptographic methods.Type: GrantFiled: February 24, 2012Date of Patent: May 27, 2014Assignee: Intellectual Ventures I LLCInventors: Klimenty Vainstein, Satyajit Nath, Michael Michio Ouye
-
Publication number: 20140101457Abstract: Techniques for utilizing security criteria to implement document retention for electronic documents are disclosed. The security criteria can also limit when, how and where access to the electronic documents is permitted. The security criteria can pertain to keys (or ciphers) used to secure (e.g., encrypt) electronic files (namely, electronic documents), or to unsecure (e.g., decrypt) electronic files already secured. At least a portion of the security criteria can be used to implement document retention, namely, a document retention policy. After a secured electronic document has been retained for the duration of the document retention policy, the associated security criteria becomes no longer available, thus preventing subsequent access to the secured electronic document. In other words, access restrictions on electronic documents can be used to prevent access to electronic documents which are no longer to be retained.Type: ApplicationFiled: December 13, 2013Publication date: April 10, 2014Applicant: INTELLECTUAL VENTURES I LLCInventor: Satyajit NATH
-
Patent number: 8613102Abstract: Techniques for utilizing security criteria to implement document retention for electronic documents are disclosed. The security criteria can also limit when, how and where access to the electronic documents is permitted. The security criteria can pertain to keys (or ciphers) used to secure (e.g., encrypt) electronic files (namely, electronic documents), or to unsecure (e.g., decrypt) electronic files already secured. At least a portion of the security criteria can be used to implement document retention, namely, a document retention policy. After a secured electronic document has been retained for the duration of the document retention policy, the associated security criteria becomes no longer available, thus preventing subsequent access to the secured electronic document. In other words, access restrictions on electronic documents can be used to prevent access to electronic documents which are no longer to be retained.Type: GrantFiled: March 30, 2004Date of Patent: December 17, 2013Assignee: Intellectual Ventures I LLCInventor: Satyajit Nath
-
Patent number: 8327138Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy.Type: GrantFiled: April 16, 2010Date of Patent: December 4, 2012Assignee: Guardian Data Storage LLCInventors: Satyajit Nath, Klimenty Vainstein, Michael Michio Ouye
-
Publication number: 20120159191Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy and enforced in conjunction with one or more cryptographic methods.Type: ApplicationFiled: February 24, 2012Publication date: June 21, 2012Applicant: Guardian Data Storage, LLCInventors: Klimenty VAINSTEIN, Satyajit NATH, Michael Michio OUYE
-
Patent number: 8127366Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy and enforced in conjunction with one or more cryptographic methods.Type: GrantFiled: September 30, 2003Date of Patent: February 28, 2012Assignee: Guardian Data Storage, LLCInventors: Klimenty Vainstein, Satyajit Nath, Michael Michio Ouye
-
Patent number: 8127133Abstract: One or more labels are associated with a data object. One or more policies are associated with each of the labels. Based on the labels associated with the data objects, the associated policies are dispatched to policy decision engines to take one or more actions to enforce the policy. The labels, and the policies associated with the labels, are chosen by a business administrator within an enterprise, and are implemented by an Information Technology (IT) administrator. The association between labels and polices allows the policy to be applied to an object to be decoupled from the characterization of the nature of the object, or its purpose and/or role within an enterprise, business purpose and/or context of the object. Examples of policies are: access, backup, retention, isolation, audit, etc.Type: GrantFiled: January 25, 2007Date of Patent: February 28, 2012Assignee: Microsoft CorporationInventors: David B. Cross, Satyajit Nath, George Z. Li, Tanmoy Dutta, Sunil Gottumukkala
-
Patent number: 7882539Abstract: Abstracting access control policy from access check mechanisms allows for richer expression of policy, using a declarative model with semantics, than what is permitted by the access check mechanisms. Further, abstracting access control policy allows for uniform expression of policy across multiple access check mechanisms. Proof-like reasons for any access query are provided, such as who has access to what resource, built from the policy statements themselves, independent of the access check mechanism that provide access. Access is audited and policy-based reasons for access are provided based on the access control policy.Type: GrantFiled: June 2, 2006Date of Patent: February 1, 2011Assignee: Microsoft CorporationInventors: Muthukrishnan Paramasivam, Charles F. Rose, III, Dave M. McPherson, Raja Pazhanivel Perumal, Satyajit Nath, Paul J. Leach, Ravindra Nath Pandya
-
Publication number: 20100199088Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy.Type: ApplicationFiled: April 16, 2010Publication date: August 5, 2010Applicant: Guardian Data Storage, LLCInventors: Satyajit Nath, Klimenty Vainstein, Michael Michio Ouye
-
Patent number: 7730543Abstract: Improved system and approaches for permitting users of different organizations to access secured files (e.g., documents) are disclosed. These users can be part of a group that is shared across a plurality of file security systems. For example, at a first file security system, a user of the shared group can secure a file for restricted access by those users within the shared group. Subsequently, at a different file security system, another user of the shared group is able to access the content of the secured file.Type: GrantFiled: June 30, 2003Date of Patent: June 1, 2010Inventor: Satyajit Nath
-
Patent number: 7703140Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy.Type: GrantFiled: September 30, 2003Date of Patent: April 20, 2010Assignee: Guardian Data Storage, LLCInventors: Satyajit Nath, Klimenty Vainstein, Michael Michio Ouye
-
Publication number: 20080184329Abstract: One or more labels are associated with a data object. One or more policies are associated with each of the labels. Based on the labels associated with the data objects, the associated policies are dispatched to policy decision engines to take one or more actions to enforce the policy. The labels, and the policies associated with the labels, are chosen by a business administrator within an enterprise, and are implemented by an Information Technology (IT) administrator. The association between labels and polices allows the policy to be applied to an object to be decoupled from the characterization of the nature of the object, or its purpose and/or role within an enterprise, business purpose and/or context of the object. Examples of policies are: access, backup, retention, isolation, audit, etc.Type: ApplicationFiled: January 25, 2007Publication date: July 31, 2008Applicant: Microsoft CorporationInventors: David B. Cross, Satyajit Nath, George Z. Li, Tanmoy Dutta, Sunil P. Gottumukkala
-
Publication number: 20070283411Abstract: Abstracting access control policy from access check mechanisms allows for richer expression of policy, using a declarative model with semantics, than what is permitted by the access check mechanisms. Further, abstracting access control policy allows for uniform expression of policy across multiple access check mechanisms. Proof-like reasons for any access query are provided, such as who has access to what resource, built from the policy statements themselves, independent of the access check mechanism that provide access. Access is audited and policy-based reasons for access are provided based on the access control policy.Type: ApplicationFiled: June 2, 2006Publication date: December 6, 2007Applicant: Microsoft CorporationInventors: Muthukrishnan Paramasivam, Charles F. Rose, Dave M. McPherson, Raja Pazhanivel Perumal, Satyajit Nath, Paul J. Leach, Ravindra Nath Pandya
-
Publication number: 20050223242Abstract: Techniques for utilizing security criteria to implement document retention for electronic documents are disclosed. The security criteria can also limit when, how and where access to the electronic documents is permitted. The security criteria can pertain to keys (or ciphers) used to secure (e.g., encrypt) electronic files (namely, electronic documents), or to unsecure (e.g., decrypt) electronic files already secured. At least a portion of the security criteria can be used to implement document retention, namely, a document retention policy. After a secured electronic document has been retained for the duration of the document retention policy, the associated security criteria becomes no longer available, thus preventing subsequent access to the secured electronic document. In other words, access restrictions on electronic documents can be used to prevent access to electronic documents which are no longer to be retained.Type: ApplicationFiled: March 30, 2004Publication date: October 6, 2005Inventor: Satyajit Nath
-
Publication number: 20050071275Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy and enforced in conjunction with one or more cryptographic methods.Type: ApplicationFiled: September 30, 2003Publication date: March 31, 2005Inventors: Klimenty Vainstein, Satyajit Nath, Michael Ouye
-
Publication number: 20050071658Abstract: Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy.Type: ApplicationFiled: September 30, 2003Publication date: March 31, 2005Inventors: Satyajit Nath, Klimenty Vainstein, Michael Ouye