Patents by Inventor Sharath L. Kumar

Sharath L. Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10607017
    Abstract: A method includes receiving a security profile comprising user-defined rules for processing sensitive data, and identifying a plurality of sensitive data components in a data file according to the security profile. The method further includes generating a respective format-preserving token for each of the identified plurality of sensitive data components. The method additionally includes generating a corresponding token key for each of the respective-format preserving tokens, and replacing each of the plurality of sensitive data components in the data file with the respective format-preserving token. Further, the method includes cryptographically camouflaging each of the token keys using a first password and storing each of the cryptographically camouflaged token keys.
    Type: Grant
    Filed: January 4, 2017
    Date of Patent: March 31, 2020
    Assignee: CA, INC.
    Inventors: Sharath L. Kumar, Mohammed Mujeeb Kaladgi, Rajendra Pachouri, Mahesh Malatesh Chitragar
  • Publication number: 20190311361
    Abstract: A method includes receiving a transaction authorization request for a transaction between a user and a transaction system. The method also determines the location of the transaction system based and receiving the location of an account holder device associated with the account. The method also determines whether an increased authorization level is required for the transaction based on the location of the transaction system and the location of the account holder device. If the increased authorization level is required for the transaction, the method includes transmitting an increased authorization inquiry to the transaction system and receiving a response to the increased authorization inquiry. The increased authorization inquiry may be associated with a predetermined response. The method determines whether to authorize the transaction based on the response by the user and the predetermined response to the increased authorization inquiry.
    Type: Application
    Filed: April 9, 2018
    Publication date: October 10, 2019
    Inventors: Sharath L. KUMAR, Sanjay Ramdas RAI, Keerthidhara Mala DONGRE, Arun SHETTY, Stephen PRASAD
  • Publication number: 20190122219
    Abstract: According to an embodiment of the present disclosure, a method by a server includes receiving, by the server, a request to conduct a transaction between a merchant and a secondary device associated within an account. A request for a personal identification number (PIN) is transmitted to the secondary computing device. The PIN is received from the secondary computing device. The PIN and transaction information associated with the transaction is forwarded to a primary computing device registered with the account. Authorization to allow the secondary computing device to conduct the transaction is received from the primary computing device. Based on the authorization received from the primary computing device, the transaction between the secondary computing device and a merchant is authorized.
    Type: Application
    Filed: October 24, 2017
    Publication date: April 25, 2019
    Inventors: Sharath L. Kumar, Arun Shetty, Badrinath Mohan, Jaimini Ram, Stephen Prasad
  • Publication number: 20190109842
    Abstract: According to an embodiment of the present disclosure, a method by a server includes receiving, by the server, a request to register a computing device for conducting transactions associated with an account. The server determines that a primary computing device is already registered as a first authorized device for conducting transactions associated with the account. A request to authorize the computing device as a second authorized device for conducting transactions associated with the account is transmitted to the primary computing device. Permission to register the computing device as the second authorized device is received from the primary computing device. The computing device is then registered as the second authorized device for conducting transactions associated with the account.
    Type: Application
    Filed: October 6, 2017
    Publication date: April 11, 2019
    Inventors: Sharath L. Kumar, Arun Shetty, Badrinath Mohan, Jaimini Ram, Stephen Prasad
  • Publication number: 20180189502
    Abstract: A method includes receiving a security profile comprising user-defined rules for processing sensitive data, and identifying a plurality of sensitive data components in a data file according to the security profile. The method further includes generating a respective format-preserving token for each of the identified plurality of sensitive data components. The method additionally includes generating a corresponding token key for each of the respective-format preserving tokens, and replacing each of the plurality of sensitive data components in the data file with the respective format-preserving token. Further, the method includes cryptographically camouflaging each of the token keys using a first password and storing each of the cryptographically camouflaged token keys.
    Type: Application
    Filed: January 4, 2017
    Publication date: July 5, 2018
    Applicant: CA, Inc.
    Inventors: Sharath L. KUMAR, Mohammed Mujeeb KALADGI, Rajendra PACHOURI, Mahesh Malatesh CHITRAGAR
  • Publication number: 20180150836
    Abstract: Techniques are disclosed relating to generating tokens dynamically using payment keys. In some embodiments, a computer system may receive a transaction authorization request including a transaction token. The computer system may, in some embodiments, identify a transaction account number and a plurality of payment keys that were sent to a user device. Further, in some embodiments, the computer system may generate an authentication token that is usable to validate the transaction token.
    Type: Application
    Filed: November 29, 2016
    Publication date: May 31, 2018
    Inventors: Sharath L. Kumar, Sandeep Banisetti, Mohammed Mujeeb Kaladgi, Yashwant Ramkishan Sawant