Patents by Inventor Shashanka Arnady
Shashanka Arnady has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250024266Abstract: A server computer receives from a resource provider device transaction data, a first set of wireless communication signals available to the resource provider device, a second set of wireless communication signals available to the resource provider device, and a sound level detected by the resource provider device. The server computer retrieves from a user device a first set of wireless communication signals available to the user device, a second set of wireless communication signals available to the user device, and a sound level detected by the user device. The server computer computes a score based on the first sets of wireless communication signals, the second sets of wireless communication signals, and the detected sound levels. The server computer transmits to an authorization computer the transaction data and the score, thereby causing the transaction to be processed or terminated based on the transaction data and the score.Type: ApplicationFiled: July 12, 2023Publication date: January 16, 2025Applicant: Visa International Service AssociationInventors: Nithin Shakthidhar B G, Shashanka Arnady, Sreeharsha Rangarajan
-
Publication number: 20190228085Abstract: An intelligent log file pattern identifier (“pattern identifier”) has been created that intelligently mines log files for patterns in a reduced time complexity of O(N2), which is substantially faster than O(N3). This pattern identifier can leverage truncated hashes of events, a suffix array, and a longest common prefix array to reduce the time complexity of pattern mining from O(N3) to a worst-case time complexity of O(N2). The pattern identifier analyzes event records in a log file using a multi-stage process to perform pattern mining. The multi-stage process involves filtering event records to preserve their static content, performing suffix sorting, and determining common prefix lengths of the suffixes of the static content to determine a full set of non-overlapping patterns across the event records. The pattern identifier then determines and generates a set of unique transaction patterns based on the non-overlapping patterns.Type: ApplicationFiled: January 19, 2018Publication date: July 25, 2019Inventors: Sayan Biswas, Shashanka Arnady, Nithin BG Shakthidhar
-
Patent number: 10057237Abstract: An insensitive summary of an encrypted electronic document, such as email, is provided. The insensitive summary provides a summary of the encrypted electronic document without providing sensitive information, such as passwords. The electronic document may be an email, text (such as in a word processing file), spreadsheet and/or presentation. Natural language processing methods, such as parts of speech (POS) tagging, word clustering, regular expression evaluating, sensitive key word searching and/or other methods, may be used to identify and mask sensitive words before summarization and encryption of the electronic document. A user's efficiency in operating a computing device may be increased having an associated insensitive summary without compromising security of the encrypted electronic document. A user may direct a computing device to perform a search (or similarly categorize or use rules) to identify the encrypted electronic document by searching for contents of the associated insensitive summary.Type: GrantFiled: February 17, 2015Date of Patent: August 21, 2018Assignee: CA, Inc.Inventors: Shashanka Arnady, Chetan Doddamani, PrasannaBabu Krishnappa
-
Patent number: 9684689Abstract: The system and method of the present disclosure relates to data stored in a common database of a network for parallel processing by multiple processors or processing centers. As consumers and business continue to generate more and more data, the amount of data being stored across networks and computing environments increases. To monitor and process increasingly large amounts of data, the system and method of the present disclosure utilizes the atomicity of certain databases and storage devices to efficiently identify and mark data for processing by a designated processor or processing center, such that the designated processor or processing center is responsible for processing the identified and marked data. Consequently, the system ensures that no two processors or processing centers are processing the same data at the same time without the use of schedulers, queues or other conventional techniques.Type: GrantFiled: February 3, 2015Date of Patent: June 20, 2017Assignee: CA, Inc.Inventors: Shashanka Arnady, Anand Manvi, Chetan Doddamani
-
Publication number: 20170039570Abstract: A method of performing operations on a processor of a financial transaction processing system, includes receiving an eCommerce transaction message containing an account identifier for a pending eCommerce transaction and initial parameter information characterizing an originating user terminal that communicated the eCommerce transaction message. A network address of a registered user terminal that is associated with the account identifier is identified. A terminal authentication challenge message containing a request for updated parameters characterizing the registered user terminal, is communicated toward the network address. A terminal authentication response message containing updated parameter information characterizing the registered user terminal, is received from the registered user terminal. A risk score for the pending eCommerce transaction is generated based on similarity between the initial and updated parameter information.Type: ApplicationFiled: August 4, 2015Publication date: February 9, 2017Applicant: CA, INC.Inventors: PRASANNA BABU KRISHNAPPA, ANAND MANVI, CHETAN DODDAMANI, SHASHANKA ARNADY, ARUN SHETTY
-
Publication number: 20170032374Abstract: A method of performing operations on a processor of a financial transaction processing system, includes receiving from a merchant node an eCommerce authentication request for a pending eCommerce transaction associated with a user terminal. The eCommerce authentication request contains transaction information that comprises a user terminal identifier and a reported list of wireless device identifiers that are observed by the user terminal. A risk score is generated for the pending eCommerce transaction based on comparison of the reported list of wireless device identifiers to a registered list of wireless device identifiers which has been associated with the user terminal identifier. Authentication of the eCommerce authentication request is controlled based on the risk score. Related computer nodes of financial transaction processing systems and user terminals are disclosed.Type: ApplicationFiled: July 28, 2015Publication date: February 2, 2017Applicant: CA, INC.Inventors: Chetan Doddamani, Anand Manvi, Shashanka Arnady, Prasanna Babu Krishnappa, Arun Shetty
-
Publication number: 20160241546Abstract: An insensitive summary of an encrypted electronic document, such as email, is provided. The insensitive summary provides a summary of the encrypted electronic document without providing sensitive information, such as passwords. The electronic document may be an email, text (such as in a word processing file), spreadsheet and/or presentation. Natural language processing methods, such as parts of speech (POS) tagging, word clustering, regular expression evaluating, sensitive key word searching and/or other methods, may be used to identify and mask sensitive words before summarization and encryption of the electronic document. A user's efficiency in operating a computing device may be increased having an associated insensitive summary without compromising security of the encrypted electronic document. A user may direct a computing device to perform a search (or similarly categorize or use rules) to identify the encrypted electronic document by searching for contents of the associated insensitive summary.Type: ApplicationFiled: February 17, 2015Publication date: August 18, 2016Applicant: CA, INC.Inventors: Shashanka Arnady, Chetan Doddamani, PrasannaBabu Krishnappa
-
Publication number: 20160224393Abstract: The system and method of the present disclosure relates to data stored in a common database of a network for parallel processing by multiple processors or processing centers. As consumers and business continue to generate more and more data, the amount of data being stored across networks and computing environments increases. To monitor and process increasingly large amounts of data, the system and method of the present disclosure utilizes the atomicity of certain databases and storage devices to efficiently identify and mark data for processing by a designated processor or processing center, such that the designated processor or processing center is responsible for processing the identified and marked data. Consequently, the system ensures that no two processors or processing centers are processing the same data at the same time without the use of schedulers, queues or other conventional techniques.Type: ApplicationFiled: February 3, 2015Publication date: August 4, 2016Applicant: CA, INC.Inventors: Shashanka Arnady, Anand Manvi, Chetan Doddamani