Patents by Inventor Sekhar Nagasundaram
Sekhar Nagasundaram has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11811923Abstract: A computer node comprising multiple software modules may receive a cryptographic key from a hardware security module. The computer node may use the cryptographic key to produce two key portions, which are distributed to two software modules. These software modules and an optional additional software module may use the key portions in order to encrypt an initial message. The key portions and their locations in memory are periodically updated in order to provide improved cryptographic security.Type: GrantFiled: March 8, 2021Date of Patent: November 7, 2023Assignee: Visa International Service AssociationInventors: Oleg Gryb, Sekhar Nagasundaram
-
Publication number: 20230254129Abstract: Methods and systems for managing cryptographic keys in on-premises and cloud computing environments and performing multi-party cryptography are disclosed. A cryptographic key can be retrieved from a hardware security module by a key management computer. The key management computer can generate key shares from the cryptographic key, and securely distribute the key shares to computer nodes or key share databases. The computer nodes can use the key shares in order to perform secure multi-party cryptography.Type: ApplicationFiled: March 29, 2023Publication date: August 10, 2023Applicant: Visa International Service AssociationInventors: Oleg Gryb, Sekhar Nagasundaram
-
Patent number: 11664982Abstract: Methods and systems for managing cryptographic keys in on-premises and cloud computing environments and performing multi-party cryptography are disclosed. A cryptographic key can be retrieved from a hardware security module by a key management computer. The key management computer can generate key shares from the cryptographic key, and securely distribute the key shares to computer nodes or key share databases. The computer nodes can use the key shares in order to perform secure multi-party cryptography.Type: GrantFiled: September 24, 2018Date of Patent: May 30, 2023Assignee: Visa International Service AssociationInventors: Oleg Gryb, Sekhar Nagasundaram
-
Publication number: 20210273784Abstract: Methods and systems for managing cryptographic keys in on-premises and cloud computing environments and performing multi-party cryptography are disclosed. A cryptographic key can be retrieved from a hardware security module by a key management computer. The key management computer can generate key shares from the cryptographic key, and securely distribute the key shares to computer nodes or key share databases. The computer nodes can use the key shares in order to perform secure multi-party cryptography.Type: ApplicationFiled: September 24, 2018Publication date: September 2, 2021Inventors: Oleg Gryb, Sekhar Nagasundaram
-
Publication number: 20210194688Abstract: A computer node comprising multiple software modules may receive a cryptographic key from a hardware security module. The computer node may use the cryptographic key to produce two key portions, which are distributed to two software modules. These software modules and an optional additional software module may use the key portions in order to encrypt an initial message. The key portions and their locations in memory are periodically updated in order to provide improved cryptographic security.Type: ApplicationFiled: March 8, 2021Publication date: June 24, 2021Inventors: Oleg Gryb, Sekhar Nagasundaram
-
Patent number: 10972263Abstract: A computer node comprising multiple software modules may receive a cryptographic key from a hardware security module. The computer node may use the cryptographic key to produce two key portions, which are distributed to two software modules. These software modules and an optional additional software module may use the key portions in order to encrypt an initial message. The key portions and their locations in memory are periodically updated in order to provide improved cryptographic security.Type: GrantFiled: August 31, 2017Date of Patent: April 6, 2021Assignee: Visa International Service AssociationInventors: Oleg Gryb, Sekhar Nagasundaram
-
Publication number: 20200389304Abstract: A computer node comprising multiple software modules may receive a cryptographic key from a hardware security module. The computer node may use the cryptographic key to produce two key portions, which are distributed to two software modules. These software modules and an optional additional software module may use the key portions in order to encrypt an initial message. The key portions and their locations in memory are periodically updated in order to provide improved cryptographic security.Type: ApplicationFiled: August 31, 2017Publication date: December 10, 2020Inventors: Oleg Gryb, Sekhar Nagasundaram
-
Patent number: 10586054Abstract: Embodiments of the invention relate to systems and methods for providing an anonymization engine. One embodiment of the present invention relates to a method comprising receiving a message directed at a recipient computer located outside a secure area by a privacy computer located within a secure area. The privacy computer may identify private information using a plurality of privacy rules and anonymize the message according to the plurality of privacy rules. Another embodiment may be directed to a method comprising receiving a request for sensitive data from a requesting computer. An anonymization computer may determine a sensitive data record associated with the request and may anonymize the sensitive data record by performing at least two of: removing unnecessary sensitive data entries from the sensitive data record, masking the sensitive data entries to maintain format, separating the sensitive data entries into associated data groupings, and de-contexting the data.Type: GrantFiled: December 26, 2018Date of Patent: March 10, 2020Assignee: Visa International Service AssociationInventors: Sekhar Nagasundaram, Selim Aissi
-
Patent number: 10515358Abstract: Embodiments of the present invention are directed to methods, systems, apparatuses, and computer-readable mediums for generating and providing a transaction token that may provide contextual information associated with the token. Accordingly, the transaction token may provide any entities within a transaction processing system immediate information about the context in which the token was generated, how the token may be used, and any other information that may be pertinent to processing the token.Type: GrantFiled: October 20, 2014Date of Patent: December 24, 2019Assignee: Visa International Service AssociationInventors: Sekhar Nagasundaram, Ajit Gaddam, Selim Aissi
-
Publication number: 20190130115Abstract: Embodiments of the invention relate to systems and methods for providing an anonymization engine. One embodiment of the present invention relates to a method comprising receiving a message directed at a recipient computer located outside a secure area by a privacy computer located within a secure area. The privacy computer may identify private information using a plurality of privacy rules and anonymize the message according to the plurality of privacy rules. Another embodiment may be directed to a method comprising receiving a request for sensitive data from a requesting computer. An anonymization computer may determine a sensitive data record associated with the request and may anonymize the sensitive data record by performing at least two of: removing unnecessary sensitive data entries from the sensitive data record, masking the sensitive data entries to maintain format, separating the sensitive data entries into associated data groupings, and de-contexting the data.Type: ApplicationFiled: December 26, 2018Publication date: May 2, 2019Inventors: Sekhar Nagasundaram, Selim Aissi
-
Patent number: 10204227Abstract: Embodiments of the invention relate to systems and methods for providing an anonymization engine. One embodiment of the present invention relates to a method comprising receiving a message directed at a recipient computer located outside a secure area by a privacy computer located within a secure area. The privacy computer may identify private information using a plurality of privacy rules and anonymize the message according to the plurality of privacy rules. Another embodiment may be directed to a method comprising receiving a request for sensitive data from a requesting computer. An anonymization computer may determine a sensitive data record associated with the request and may anonymize the sensitive data record by performing at least two of: removing unnecessary sensitive data entries from the sensitive data record, masking the sensitive data entries to maintain format, separating the sensitive data entries into associated data groupings, and de-contexting the data.Type: GrantFiled: April 19, 2017Date of Patent: February 12, 2019Assignee: Visa International Service AssociationInventors: Sekhar Nagasundaram, Selim Aissi
-
Patent number: 9978094Abstract: A method for providing a token revocation list is disclosed. The method includes maintaining a status for each of a plurality of tokens in a token revocation database. Token validation requests are received, and the statuses of payment tokens can be determined. Response messages with the statuses of the payment tokens are then sent to token status requesters so that they may make decisions on whether or not to use them to process transactions.Type: GrantFiled: October 10, 2014Date of Patent: May 22, 2018Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Ajit Gaddam, Selim Aissi, Sekhar Nagasundaram
-
Publication number: 20170220818Abstract: Embodiments of the invention relate to systems and methods for providing an anonymization engine. One embodiment of the present invention relates to a method comprising receiving a message directed at a recipient computer located outside a secure area by a privacy computer located within a secure area. The privacy computer may identify private information using a plurality of privacy rules and anonymize the message according to the plurality of privacy rules. Another embodiment may be directed to a method comprising receiving a request for sensitive data from a requesting computer. An anonymization computer may determine a sensitive data record associated with the request and may anonymize the sensitive data record by performing at least two of: removing unnecessary sensitive data entries from the sensitive data record, masking the sensitive data entries to maintain format, separating the sensitive data entries into associated data groupings, and de-contexting the data.Type: ApplicationFiled: April 19, 2017Publication date: August 3, 2017Inventors: Sekhar Nagasundaram, Selim Aissi
-
Patent number: 9665722Abstract: Embodiments of the invention relate to systems and methods for providing an anonymization engine. One embodiment of the present invention relates to a method comprising receiving a message directed at a recipient computer located outside a secure area by a privacy computer located within a secure area. The privacy computer may identify private information using a plurality of privacy rules and anonymize the message according to the plurality of privacy rules. Another embodiment may be directed to a method comprising receiving a request for sensitive data from a requesting computer. An anonymization computer may determine a sensitive data record associated with the request and may anonymize the sensitive data record by performing at least two of: removing unnecessary sensitive data entries from the sensitive data record, masking the sensitive data entries to maintain format, separating the sensitive data entries into associated data groupings, and de-contexting the data.Type: GrantFiled: August 12, 2013Date of Patent: May 30, 2017Assignee: Visa International Service AssociationInventors: Sekhar Nagasundaram, Selim Aissi
-
Patent number: 9547769Abstract: Embodiments of the invention broadly described, introduce systems and methods for protecting data at a data protection hub using a data protection policy. One embodiment of the invention discloses a method for protecting unprotected data. The method comprises receiving a data protection request message comprising unprotected data and one or more policy parameters, determining a data protection transformation using the policy parameters, performing the data protection transformation on the unprotected data to generate protected data, and sending the protected data.Type: GrantFiled: July 3, 2013Date of Patent: January 17, 2017Assignee: Visa International Service AssociationInventors: Selim Aissi, Sekhar Nagasundaram
-
Patent number: 9544134Abstract: Embodiments of the invention broadly described, introduce systems and methods for enabling the searching of encrypted data. One embodiment of the invention discloses a method for generating a searchable encrypted database. The method comprises receiving a plurality of sensitive data records comprising personal information of different users, identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user, generating a searchable field index for each of the one or more searchable fields, and encrypting the sensitive data records using a database encryption key.Type: GrantFiled: December 28, 2015Date of Patent: January 10, 2017Assignee: Visa International Service AssociationInventors: Selim Aissi, Sekhar Nagasundaram
-
Publication number: 20160112190Abstract: Embodiments of the invention broadly described, introduce systems and methods for enabling the searching of encrypted data. One embodiment of the invention discloses a method for generating a searchable encrypted database. The method comprises receiving a plurality of sensitive data records comprising personal information of different users, identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user, generating a searchable field index for each of the one or more searchable fields, and encrypting the sensitive data records using a database encryption key.Type: ApplicationFiled: December 28, 2015Publication date: April 21, 2016Inventors: Selim Aissi, Sekhar Nagasundaram
-
Patent number: 9256764Abstract: Embodiments of the invention broadly described, introduce systems and methods for enabling the searching of encrypted data. One embodiment of the invention discloses a method for generating a searchable encrypted database. The method comprises receiving a plurality of sensitive data records comprising personal information of different users, identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user, generating a searchable field index for each of the one or more searchable fields, and encrypting the sensitive data records using a database encryption key.Type: GrantFiled: August 13, 2013Date of Patent: February 9, 2016Assignee: Visa International Service AssociationInventors: Selim Aissi, Sekhar Nagasundaram
-
Publication number: 20150112870Abstract: Embodiments of the present invention are directed to methods, systems, apparatuses, and computer-readable mediums for generating and providing a transaction token that may provide contextual information associated with the token. Accordingly, the transaction token may provide any entities within a transaction processing system immediate information about the context in which the token was generated, how the token may be used, and any other information that may be pertinent to processing the token.Type: ApplicationFiled: October 20, 2014Publication date: April 23, 2015Inventors: Sekhar Nagasundaram, Ajit Gaddam, Selim Aissi
-
Publication number: 20150106239Abstract: A method for providing a token revocation list is disclosed. The method includes maintaining a status for each of a plurality of tokens in a token revocation database. Token validation requests are received, and the statuses of payment tokens can be determined. Response messages with the statuses of the payment tokens are then sent to token status requesters so that they may make decisions on whether or not to use them to process transactions.Type: ApplicationFiled: October 10, 2014Publication date: April 16, 2015Inventors: Ajit Gaddam, Selim Aissi, Sekhar Nagasundaram