Patents by Inventor Sitaram Venkata CHAMARTY

Sitaram Venkata CHAMARTY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9852288
    Abstract: The present subject matter relates to securing data on a computing system. In an example, a request to execute an application instance of the application is received. After receiving the request a role to be associated with the application instance may be identified based on one of user inputs, an object-role mapping, and a set of rules. Further, the application is executable in a plurality of application instances and the role of the application instance is indicative of a nature of activity to be performed in the application instance. The identified role is then associated with the application instance. Based on the role, data pertaining to the application instance may be stored in a memory location allocated to the role of the application instance. Further, each role has a dedicated memory location.
    Type: Grant
    Filed: February 6, 2015
    Date of Patent: December 26, 2017
    Assignee: Tata Consultancy Services Limited
    Inventors: Harshita Vani Nallagonda, Sitaram Venkata Chamarty, Lakshmi Padmaja Maddali, Praveen Gauravaram, R. Vigneswaran
  • Patent number: 9614847
    Abstract: Method and system for user authentication are described. The method comprises receiving an authentication code from an application server seeking authentication of the user. Further, a private key of the user is computed in real time based on a user identity (ID) of the user and a master secret key of the PKG. The method further comprises, ascertaining a verification code based on the private key of the user and a verification timestamp, wherein the verification timestamp indicates a time at which the ascertaining of the verification code was initiated. Further, the authentication code is compared with the verification code. Further, the method comprises authenticating the user based on the comparison.
    Type: Grant
    Filed: March 5, 2015
    Date of Patent: April 4, 2017
    Inventors: Rajan Mindigal Alasingara Bhattachar, Shivraj Vijayshankar Lokamathe, Barkur Suryanarayana Adiga, Balamuralidhar Purushothaman, Sitaram Venkata Chamarty
  • Publication number: 20160132687
    Abstract: The present subject matter relates to securing data on a computing system. In an example, a request to execute an application instance of the application is received. After receiving the request a role to be associated with the application instance may be identified based on one of user inputs, an object-role mapping, and a set of rules. Further, the application is executable in a plurality of application instances and the role of the application instance is indicative of a nature of activity to be performed in the application instance. The identified role is then associated with the application instance. Based on the role, data pertaining to the application instance may be stored in a memory location allocated to the role of the application instance. Further, each role has a dedicated memory location.
    Type: Application
    Filed: February 6, 2015
    Publication date: May 12, 2016
    Inventors: Harshita Vani Nallagonda, Sitaram Venkata Chamarty, Lakshmi Padmaja Maddali, Praveen Gauravaram, R. Vigneswaran
  • Publication number: 20150256542
    Abstract: Method and system for user authentication are described. The method comprises receiving an authentication code from an application server seeking authentication of the user. Further, a private key of the user is computed in real time based on a user identity (ID) of the user and a master secret key of the PKG. The method further comprises, ascertaining a verification code based on the private key of the user and a verification timestamp, wherein the verification timestamp indicates a time at which the ascertaining of the verification code was initiated. Further, the authentication code is compared with the verification code. Further, the method comprises authenticating the user based on the comparison.
    Type: Application
    Filed: March 5, 2015
    Publication date: September 10, 2015
    Inventors: Rajan Mindigal Alasingara Bhattachar, Shivraj Vijayshankar Lokamathe, Barkur Suryanarayana Adiga, Balamuralidhar Purushothaman, Sitaram Venkata Chamarty
  • Patent number: 8826457
    Abstract: The present subject matter relates to devices and methods for enterprise digital rights management. In one implementation, a device includes a security module configured to generate a security key. The security module encrypts at least one document of a user, using the security key, to generate a protected document. Further, the device includes an access control module configured to assign an access right to one or more users within an enterprise for accessing the protected document. The access control module is further configured to delegate the access right from the user to another user. The access control module is furthermore configured to lock at least one of the user and the protected document.
    Type: Grant
    Filed: August 6, 2012
    Date of Patent: September 2, 2014
    Assignee: Tata Consultancy Services Limited
    Inventors: Sitaram Venkata Chamarty, Marc-Andre Laverdiere-Papineau, Arun Kandadai Ramachandran
  • Publication number: 20130024948
    Abstract: The present subject matter relates to devices and methods for enterprise digital rights management. In one implementation, a device includes a security module configured to generate a security key. The security module encrypts at least one document of a user, using the security key, to generate a protected document. Further, the device includes an access control module configured to assign an access right to one or more users within an enterprise for accessing the protected document. The access control module is further configured to delegate the access right from the user to another user. The access control module is furthermore configured to lock at least one of the user and the protected document.
    Type: Application
    Filed: August 6, 2012
    Publication date: January 24, 2013
    Applicant: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Sitaram Venkata CHAMARTY, Marc-Andre LAVERDIERE-PAPINEAU, Arun Kandadai RAMACHANDRAN
  • Publication number: 20120304306
    Abstract: The present subject matter relates to devices and methods for enterprise digital rights management. In one implementation, a device includes a security module configured to generate a security key. The security module encrypts at least one document of a user, using the security key, to generate a protected document. Further, the device includes an access control module configured to assign an access right to one or more users within an enterprise for accessing the protected document. The access control module is further configured to delegate the access right from the user to another user. The access control module is furthermore configured to lock at least one of the user and the protected document.
    Type: Application
    Filed: December 20, 2011
    Publication date: November 29, 2012
    Applicant: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Sitaram Venkata CHAMARTY, Marc-Andre LAVERDIERE-PAPINEAU, Arun Kandadai RAMACHANDRAN