Patents by Inventor Simy Chacko
Simy Chacko has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11983295Abstract: This disclosure relates to method and system for identifying Personally Identifiable Information (PII) through secret patterns. The method includes receiving user data from at least one data source through a plurality of communication channels. The user data includes PII and non-PII. The user data is associated with a user. The PII includes a plurality of personal identifiers. The method further includes identifying the PII in user data through a predictive model. The method further includes generating a secret pattern based on the PII identified through the predictive model. The secret pattern is an identifiable label. The method further includes adding the secret pattern to each of the plurality of personal identifiers in PII. The method further includes identifying each of the plurality of personal identifiers through the secret pattern in real-time, when user data is transmitted from the at least one data source to at least one data destination.Type: GrantFiled: February 22, 2022Date of Patent: May 14, 2024Inventors: Simy Chacko, Venkatesh Shankar, Ramesh Gurusamy, Sumathi Babu
-
Publication number: 20240135525Abstract: A method and system of providing assistance during an operation performed on an equipment by a smart assistance device. A first set of image frames and a second set of image frames corresponding to forward steps and reverse steps respectively performed during the operation are received from an imaging device. Parts of the equipment are detected in each of first set of image frames and tagged. The smart assistance device detects parts of the equipment present in an image frame for each of the second set of the image frames. A discrepancy is determined in the reverse steps by comparing the parts of the equipment present in the frame of the second set of the image frames with the parts tagged in the corresponding first image frame of the first set of image frames. A notification and recommendation is provided to correct the discrepancy.Type: ApplicationFiled: October 8, 2023Publication date: April 25, 2024Inventors: SIMY CHACKO, VENKATESH SHANKAR, JOSE VINCENT, YADAV PAWAN JIYALAL
-
Patent number: 11616817Abstract: The present disclosure relates to a system and method for controlling data interception in a communication network. One or more requests from a user for accessing one or more microservices are received through an Application Programming Interface (API). Information associated with one or more requests is the detected and requests are classified as secured microservice request and non-secured microservice request. The information is detected through predefined rules. Authentication token is then issued for secured microservice based on the detecting. The authentication token stores information detected by the detector in a geo storage system. The one or more requests are then routed according to the authentication token towards one or more corresponding microservices of the one or more microservices.Type: GrantFiled: March 10, 2021Date of Patent: March 28, 2023Assignee: HCL Technologies LimitedInventors: Simy Chacko, Venkatesh Shankar, Ramesh Gurusamy, Vijay Kulandaisamy
-
Publication number: 20220321530Abstract: The invention relates to method and system for enhancing computer network security. The method includes receiving a plurality of requests from client devices to avail a plurality of responses from services running on servers; determining a URL pattern for each of the plurality of requests based on URL associated with that request; determining a request data signature for each of the plurality of requests or a response data signature for each of the plurality of responses based on a set of request parameters associated with that request or based on a set of response parameters associated with that response, respectively, using a first machine learning model; and determining an authenticity of each of the plurality of requests based on the URL pattern and the data signature associated with that request, or an authenticity of each of the plurality of responses based on the data signature associated with that response.Type: ApplicationFiled: March 16, 2022Publication date: October 6, 2022Inventors: Simy Chacko, Venkatesh Shankar, Ramesh Gurusamy, Jose Vincent
-
Publication number: 20220319174Abstract: A method and system for recording, organizing, and tracing events is disclosed. In some embodiments, the method includes obtaining real-time video data captured using a video capturing equipment. The real-time video data comprises a plurality of sequential image frames and audio data associated with each of a plurality of events. The method further includes extracting first timestamp data and first text data from each of the plurality of sequential image frames, extracting second timestamp data and second text data from the audio data, generating text data associated with each of the plurality of events based on the first timestamp data, the first text data, the second timestamp data, and the second text data, storing the generated text data for subsequent audit, and discarding the real-time video data associated with each of the plurality of events.Type: ApplicationFiled: March 24, 2022Publication date: October 6, 2022Inventors: SIMY CHACKO, VENKATESH SHANKAR, RAMESH GURUSAMY, VIJAY KULANDAISAMY
-
Publication number: 20220284119Abstract: This disclosure relates to method and system for identifying Personally Identifiable Information (PII) through secret patterns. The method includes receiving user data from at least one data source through a plurality of communication channels. The user data includes PII and non-PII. The user data is associated with a user. The PII includes a plurality of personal identifiers. The method further includes identifying the PII in user data through a predictive model. The method further includes generating a secret pattern based on the PII identified through the predictive model. The secret pattern is an identifiable label. The method further includes adding the secret pattern to each of the plurality of personal identifiers in PII. The method further includes identifying each of the plurality of personal identifiers through the secret pattern in real-time, when user data is transmitted from the at least one data source to at least one data destination.Type: ApplicationFiled: February 22, 2022Publication date: September 8, 2022Inventors: SIMY CHACKO, VENKATESH SHANKAR, RAMESH GURUSAMY, SUMATHI BABU
-
Patent number: 11397898Abstract: Disclosed is a system for allowing secure access to a microservice. An Application Programming Interface (API) gateway receives a request comprising a Uniform Resource Locator (URL) associated to the microservice. A set of input parameters indicating information about the user device and the microservice is identified from the URL. The system performs validation of input parameters, extraction of request patterns, tracking of IP address, and detection of user credentials to provide output parameters. A decision tree comprising rules is generated by using a supervised machine learning technique on the output parameters. Further, the API gateway creates a stateless identity token to encrypt the request. The stateless identity token is created based on the user credentials and at least one rule applicable to the request. Once the stateless identity token is created, the stateless identity token is verified to allow the secure access to the microservice.Type: GrantFiled: February 14, 2020Date of Patent: July 26, 2022Assignee: HCL TECHNOLOGIES LIMITEDInventors: Simy Chacko, Venkatesh Shankar
-
Publication number: 20210289005Abstract: The present disclosure relates to a system and method for controlling data interception in a communication network. One or more requests from a user for accessing one or more microservices are received through an Application Programming Interface (API). Information associated with one or more requests is the detected and requests are classified as secured microservice request and non-secured microservice request. The information is detected through predefined rules. Authentication token is then issued for secured microservice based on the detecting. The authentication token stores information detected by the detector in a geo storage system. The one or more requests are then routed according to the authentication token towards one or more corresponding microservices of the one or more microservices.Type: ApplicationFiled: March 10, 2021Publication date: September 16, 2021Inventors: Simy CHACKO, Venkatesh SHANKAR, Ramesh GURUSAMY, Vijay KULANDAISAMY
-
Patent number: 11120117Abstract: Disclosed is a system for delegating access of sensitive information by a user device to a requestor device through a central server. A receiving module receives a first token Identification (ID) generated by the user device in an offline mode and a request, comprising a second token ID, from the requestor device. A validation module validates the request by comparing the first token ID and the second token ID. An identification module identifies a subset of the sensitive information based on a profile of the requestor, when the first token ID is matched with the second token ID. A watermarking module watermarks the subset of the sensitive information with a set of variables to generate watermarked sensitive information. Upon generating the watermarked sensitive information, the access delegation module delegates the access of the watermarked sensitive information to the requestor device.Type: GrantFiled: March 5, 2019Date of Patent: September 14, 2021Inventors: Simy Chacko, Jose Vincent, Ramesh Gurusamy, Vijay Kulandaisamy
-
Publication number: 20200272912Abstract: Disclosed is a system for allowing secure access to a microservice. An Application Programming Interface (API) gateway receives a request comprising a Uniform Resource Locator (URL) associated to the microservice. A set of input parameters indicating information about the user device and the microservice is identified from the URL. The system performs validation of input parameters, extraction of request patterns, tracking of IP address, and detection of user credentials to provide output parameters. A decision tree comprising rules is generated by using a supervised machine learning technique on the output parameters. Further, the API gateway creates a stateless identity token to encrypt the request. The stateless identity token is created based on the user credentials and at least one rule applicable to the request. Once the stateless identity token is created, the stateless identity token is verified to allow the secure access to the microservice.Type: ApplicationFiled: February 14, 2020Publication date: August 27, 2020Applicant: HCL TECHNOLOGIES LIMITEDInventors: Simy CHACKO, Venkatesh SHANKAR
-
Patent number: 10685053Abstract: System and method for generating professional profile of an employee in an organization are disclosed. An organizational ontology may be built for the employee. The organizational ontology may be indicative of interrelationships between the employee, other employees and tasks performed by the employee. Further, email data associated with the employee may be stored for a complete lifecycle of the employee. The email data may be analyzed to identify insights about the employee and the professional profile may be generated based on the identified insights.Type: GrantFiled: June 20, 2017Date of Patent: June 16, 2020Assignee: HCL Technologies LimitedInventors: S U M Prasad Dhanyamraju, Satya Sai Prakash Kanakadandi, Simy Chacko
-
Patent number: 10673733Abstract: Disclosed is a system for debugging the network environment under regression testing. Initially, a data receiving module receives data pertaining to the network environment. An extraction module extracts a plurality of features by using a parser. An identification module identifies an error as a Problem Report (PR) or a False Failure (FF) based on classification of a test case execution log and a similarity confidence. The test case execution log may be classified based on comparison of a predefined pattern with an error pattern of the test case execution log. A generation module may generate second test case based on the plurality of features, a predefined set of instructions and the error pattern associated with the test case execution log by using a K-means and a Nearest Neighbour algorithm. A debugging module debugs the network environment based on execution of a test case.Type: GrantFiled: January 18, 2019Date of Patent: June 2, 2020Assignee: HCL Technologies LimitedInventors: Venkatesh Shankar, Simy Chacko
-
Patent number: 10574632Abstract: The system and method for secure sharing of a source code is disclosed. The method comprises. The method comprises receiving a source code associated with an application, and a defect identification number associated with a defective feature in the application. The method comprises identifying a defective feature of an application and non-defective features of the application based on a defect investigation methodology. The method comprises generating a checkout ID associated with the application and further generates a secured second set of source code based on one of an encryption methodology and an obfuscating methodology. The method further comprises providing a secured source code to a third party for debugging the defective feature in the application.Type: GrantFiled: June 6, 2017Date of Patent: February 25, 2020Assignee: HCL Technologies LimitedInventors: Simy Chacko, Suresh Naidu P, Shiva Sholayappan, S U M Prasad Dhanyamraju
-
Patent number: 10452528Abstract: The present disclosure relates to system(s) and method(s) for assisting a user in application development lifecycle. The system is configured to receive a new use case from a user device and identify a sub-set of development solutions from a set of development solutions, stored in a historical data repository, that are applicable for developing code corresponding to the new use case. Furthermore, the system is configured to receive a set test cases corresponding to each development solution from the historical data repository. Furthermore, the system is configured to generate a problem report and a false failure report based on analysis of the set of test cases. The system is further configured to rank the sub-set of development solutions based on analysis of the problem report and the false failure report. Further, the system is configured to generate a decision template based on the ranking of the sub-set of development solutions.Type: GrantFiled: February 27, 2018Date of Patent: October 22, 2019Assignee: HCL Technologies LimitedInventors: Venkatesh Shankar, Simy Chacko
-
Publication number: 20190286804Abstract: Disclosed is a system for delegating access of sensitive information by a user device to a requestor device through a central server. A receiving module receives a first token Identification (ID) generated by the user device in an offline mode and a request, comprising a second token ID, from the requestor device. A validation module validates the request by comparing the first token ID and the second token ID. An identification module identifies a subset of the sensitive information based on a profile of the requestor, when the first token ID is matched with the second token ID. A watermarking module watermarks the subset of the sensitive information with a set of variables to generate watermarked sensitive information. Upon generating the watermarked sensitive information, the access delegation module delegates the access of the watermarked sensitive information to the requestor device.Type: ApplicationFiled: March 5, 2019Publication date: September 19, 2019Inventors: Simy CHACKO, Jose VINCENT, Ramesh GURUSAMY, Vijay KULANDAISAMY
-
Publication number: 20190286542Abstract: The present disclosure relates to a record and replay system(s) and method(s) for automating one or more activities with self-learning, the method comprises obtaining data from one or more data source systems and identifying an intent associated with the data based on classification of the data in to one or more domain using a clustering and classification methodology. The method further comprises extracting one or more parameters from the data and a parameters databased based on the intent using a named entity recognition extractor and identifying the activity to be performed based on the one or more parameters and the intent. The method furthermore comprises executing the activity using the one or more parameter, thereby automating execution of one or more activities.Type: ApplicationFiled: March 8, 2019Publication date: September 19, 2019Inventors: Venkatesh SHANKAR, Simy CHACKO
-
Publication number: 20190230021Abstract: Disclosed is a system for debugging the network environment under regression testing. Initially, a data receiving module receives data pertaining to the network environment. An extraction module extracts a plurality of features by using a parser. An identification module identifies an error as a Problem Report (PR) or a False Failure (FF) based on classification of a test case execution log and a similarity confidence. The test case execution log may be classified based on comparison of a predefined pattern with an error pattern of the test case execution log. A generation module may generate second test case based on the plurality of features, a predefined set of instructions and the error pattern associated with the test case execution log by using a K-means and a Nearest Neighbour algorithm. A debugging module debugs the network environment based on execution of a test case.Type: ApplicationFiled: January 18, 2019Publication date: July 25, 2019Inventors: Venkatesh SHANKAR, Simy CHACKO
-
Patent number: 10235141Abstract: Disclosed is a system for providing source code suggestion to a user in real-time. A mining module mines source code information, pre-stored in a source code repository, to create a reference model. A code receiving module receives input lines of code from a user, via a User Interface, in real-time. A mapping module maps the one or more parameters with the metadata corresponding to each source code block stored in the reference model. A code suggestion module identifies one or more target source code blocks from the plurality of source code blocks. The code suggestion module suggests at least one target source code block, of the one or more target source code blocks, to be populated in the input lines of code thereby providing the source code suggestion to a user in real-time.Type: GrantFiled: May 31, 2017Date of Patent: March 19, 2019Assignee: HCL TECHNOLOGIES LTD.Inventors: Simy Chacko, Suresh Naidu P, Shiva Kumar Sholayappan, S U M Prasad Dhanyamraju
-
Patent number: 10127142Abstract: Defect classification and association in a software development environment. The embodiments herein relates to a software development environment, and more particularly to managing defects in a software development environment. The defect management engine may use information present in the code repository to create a master list of features and/or sub-features. Using the master list, the defect management engine may scan and parse all reported defects (which may be present in the defect repository). The defect management engine may associate defects with features present in the master list. The defect management engine may then extract the test cases and map the test cases to the defects. The defect management engine may determine the test coverage metric and the test case sufficiency metric. The defect management engine may also label unmapped defects as orphan defects.Type: GrantFiled: October 9, 2014Date of Patent: November 13, 2018Assignee: HCL TECHNOLOGIES LTD.Inventors: Dhanyamraju S U M Prasad, Satya Sai Prakash K, Simy Chacko, Sekhar Ramaraju, Sankar Pabba
-
Publication number: 20180276110Abstract: The present disclosure relates to system(s) and method(s) for assisting a user in application development lifecycle. The system is configured to receive a new use case from a user device and identify a sub-set of development solutions from a set of development solutions, stored in a historical data repository, that are applicable for developing code corresponding to the new use case. Furthermore, the system is configured to receive a set test cases corresponding to each development solution from the historical data repository. Furthermore, the system is configured to generate a problem report and a false failure report based on analysis of the set of test cases. The system is further configured to rank the sub-set of development solutions based on analysis of the problem report and the false failure report. Further, the system is configured to generate a decision template based on the ranking of the sub-set of development solutions.Type: ApplicationFiled: February 27, 2018Publication date: September 27, 2018Inventors: Venkatesh SHANKAR, Simy CHACKO