Patents by Inventor Snezana Sahter
Snezana Sahter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12132721Abstract: A federation link is used to facilitate bi-directional identity federation between software applications. The federation link is created to include user and account identity information for software applications having respective authentication providers. The federation link is created by one of the software applications and shared, for example, with the authentication provider of the other software application. The federation link can be utilized by both software applications to facilitate automated user authentication when navigating in either direction between the software applications.Type: GrantFiled: October 19, 2023Date of Patent: October 29, 2024Assignee: INTUIT INC.Inventors: Snezana Sahter, Kumar Govind Jha, Saurabh Mistry, Mukesh Garg, Sivaraman Sathyamurthy
-
Publication number: 20240348595Abstract: A federation link is used to facilitate bi-directional identity federation between software applications. The federation link is created to include user and account identity information for software applications having respective authentication providers. The federation link is created by one of the software applications and shared, for example, with the authentication provider of the other software application. The federation link can be utilized by both software applications to facilitate automated user authentication when navigating in either direction between the software applications.Type: ApplicationFiled: October 19, 2023Publication date: October 17, 2024Applicant: INTUIT INC.Inventors: Snezana SAHTER, Kumar Govind JHA, Saurabh MISTRY, Mukesh GARG, Sivaraman SATHYAMURTHY
-
Patent number: 12101376Abstract: A method scalably authorizes requests. A request to authorize access to a resource is received. A plurality of policies controlling the request is identified. The plurality of policies are concurrently processed. A decision for a policy is received. The decision is of a plurality of decisions corresponding to the plurality of policies. The policy is of the plurality of policies. The decision is determined using a machine learning model and the request. An aggregate decision is generated from the plurality of decisions. A token to access the resource is transmitted in response to the aggregate decision.Type: GrantFiled: January 28, 2021Date of Patent: September 24, 2024Assignee: Intuit Inc.Inventors: Sachin Kumar Maheshwari, Bala Dutt, Ravi Kumar Chauhan, Thomas Ryan Barnes, Snezana Sahter
-
Patent number: 11892919Abstract: An apparatus may include a database and a processor in communication with at least one network. The processor may be configured to instantiate an application stack comprising a data missing detector, a data source router, and a response handler. The data missing detector may be configured to receive a request for data and determine whether the data is available from the database. The data source router may be configured to identify an alternate database from which to obtain the data when the data is not available from the database and route the request for data through the at least one network to an alternate processor associated with the alternate database. The response handler may be configured identify responsive data to a routed response received from another processor in the database and send the responsive data to a requesting device. Multiple apparatuses may form a distributed system.Type: GrantFiled: June 7, 2023Date of Patent: February 6, 2024Assignee: INTUIT INC.Inventors: Snezana Sahter, Shivam Dixit, Akash Sudhirbhai Shah, Satyanarayana Thirumani, Saroj Kumar Yadav, Karan Bagaria, Gokul Sarangapani, Sivaraman Sathyamurthy
-
Patent number: 11893627Abstract: In various exemplary embodiments, a system and associated method to perform an adaptive risk-based assessment of a user is disclosed. A method includes receiving a request from a user to perform an action at an electronic marketplace, retrieving a plurality of risk assessment factors associated with the action and the user, performing a risk assessment process on the risk assessment factors to identify a risk mitigation process, requesting that the user perform the identified risk mitigation process, and allowing the user to perform the action in response to the user completing the risk mitigation.Type: GrantFiled: September 5, 2019Date of Patent: February 6, 2024Assignee: EBAY INC.Inventors: Farhang Kassaei, Amanda A. Earhart, Snezana Sahter, Srinivasu Gottipati, Lars Wright, Craig Rowley, Lakshman Shyam Sundar Maddali, Nainesh Nayudu
-
Patent number: 11831633Abstract: A federation link is used to facilitate bi-directional identity federation between software applications. The federation link is created to include user and account identity information for software applications having respective authentication providers. The federation link is created by one of the software applications and shared, for example, with the authentication provider of the other software application. The federation link can be utilized by both software applications to facilitate automated user authentication when navigating in either direction between the software applications.Type: GrantFiled: April 12, 2023Date of Patent: November 28, 2023Assignee: INTUIT INC.Inventors: Snezana Sahter, Kumar Govind Jha, Saurabh Mistry, Mukesh Garg, Sivaraman Sathyamurthy
-
Patent number: 11768813Abstract: A method may include selecting a cohort of entities for migration from a source storage repository to a target storage repository, obtaining a mapping between a source storage schema of the source storage repository to a target storage schema of the target storage repository, and migrating data for the entities in the cohort. Migrating the data of an entity may include copying, without locking the data in the source storage repository and in the target storage repository, the data from the source storage repository to the target storage repository, verifying, while the data is locked, that the data in the source storage repository is the same as the data in the target storage repository, changing, while the data in the source storage repository and the target storage repository is locked, an entity pointer for the entity to the target storage repository based on the verifying, and unlocking the data.Type: GrantFiled: September 30, 2022Date of Patent: September 26, 2023Assignee: Intuit Inc.Inventors: Smit Shah, Raymond Chan, Suresh Muthu, Snezana Sahter
-
Patent number: 11615201Abstract: Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers. Each entry in the first table includes a physical location identifier and information about a physical location. A second memory is configured according to a second table, where each entry in the second table includes the physical location identifier and an account identifier of a user for accessing a service. The first and second tables are configured to separate profile information from the address information of the user. Additionally, a firewall is configured to control access to the second memory. The firewall defines an authentication zone including the second memory but not the first memory, where access to the second memory by internal services is allowed and direct access by the user to the second memory is denied.Type: GrantFiled: December 17, 2019Date of Patent: March 28, 2023Assignee: eBay Inc.Inventors: Snezana Sahter, Arumugam Alwarappan, Mahendar Madhavan, Mallikarjuna Potta
-
Publication number: 20220239733Abstract: A method scalably authorizes requests. A request to authorize access to a resource is received. A plurality of policies controlling the request is identified. The plurality of policies are concurrently processed. A decision for a policy is received. The decision is of a plurality of decisions corresponding to the plurality of policies. The policy is of the plurality of policies. The decision is determined using a machine learning model and the request. An aggregate decision is generated from the plurality of decisions. A token to access the resource is transmitted in response to the aggregate decision.Type: ApplicationFiled: January 28, 2021Publication date: July 28, 2022Applicant: Intuit Inc.Inventors: Sachin Kumar Maheshwari, Bala Dutt, Ravi Kumar Chauhan, Thomas Ryan Barnes, Snezana Sahter
-
Patent number: 11360955Abstract: In various example embodiments, a system and method for versioning data in an unstructured data store are presented. The method includes generating a first record in the unstructured data store based on a version of a second record in the unstructured data store. The method further includes initializing a parent version identifier of the first record based on the version of the second record. The method further includes comparing the parent version identifier of the first record to a version identifier of the second record. The method further includes determining whether the first record is consistent based on the comparison.Type: GrantFiled: March 23, 2018Date of Patent: June 14, 2022Assignee: eBay Inc.Inventors: Scot Fraser Hamilton, Rekha Patel, Satya Seethasridhar, Nicholas Whyte, Parikshit Arora, Snezana Sahter
-
Publication number: 20200202033Abstract: Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers. Each entry in the first table includes a physical location identifier and information about a physical location. A second memory is configured according to a second table, where each entry in the second table includes the physical location identifier and an account identifier of a user for accessing a service. The first and second tables are configured to separate profile information from the address information of the user. Additionally, a firewall is configured to control access to the second memory. The firewall defines an authentication zone including the second memory but not the first memory, where access to the second memory by internal services is allowed and direct access by the user to the second memory is denied.Type: ApplicationFiled: December 17, 2019Publication date: June 25, 2020Inventors: Snezana Sahter, Arumugam Alwarappan, Mahendar Madhavan, Mallikarjuna Potta
-
Patent number: 10528755Abstract: Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers. Each entry in the first table includes a physical location identifier and information about a physical location. A second memory is configured according to a second table, where each entry in the second table includes the physical location identifier and an account identifier of a user for accessing a service. The first and second tables are configured to separate profile information from the address information of the user. Additionally, a firewall is configured to control access to the second memory. The firewall defines an authentication zone including the second memory but not the first memory, where access to the second memory by internal services is allowed and direct access by the user to the second memory is denied.Type: GrantFiled: July 5, 2018Date of Patent: January 7, 2020Assignee: eBay Inc.Inventors: Snezana Sahter, Arumugam Alwarappan, Mahendar Madhavan, Mallikarjuna Potta
-
Publication number: 20190392514Abstract: In various exemplary embodiments, a system and associated method to perform an adaptive risk-based assessment of a user is disclosed. A method includes receiving a request from a user to perform an action at an electronic marketplace, retrieving a plurality of risk assessment factors associated with the action and the user, performing a risk assessment process on the risk assessment factors to identify a risk mitigation process, requesting that the user perform the identified risk mitigation process, and allowing the user to perform the action in response to the user completing the risk mitigation.Type: ApplicationFiled: September 5, 2019Publication date: December 26, 2019Inventors: Farhang Kassaei, Amanda A. Earhart, Snezana Sahter, Srinivasu Gottipati, Lars Wright, Craig Rowley, Lakshman Shyam Sundar Maddali, Nainesh Nayudu
-
Patent number: 10489853Abstract: In various exemplary embodiments, a system and associated method to perform an adaptive risk-based assessment of a user is disclosed. A method includes receiving a request from a user to perform an action at an electronic marketplace, retrieving a plurality of risk assessment factors associated with the action and the user, performing a risk assessment process on the risk assessment factors to identify a risk mitigation process, requesting that the user perform the identified risk mitigation process, and allowing the user to perform the action in response to the user completing the risk mitigation.Type: GrantFiled: November 20, 2017Date of Patent: November 26, 2019Assignee: eBay Inc.Inventors: Farhang Kassaei, Amanda A. Earhart, Snezana Sahter, Srinivasu Gottipati, Lars Wright, Craig Rowley, Lakshman Shyam Sundar Maddali, Nainesh Nayudu
-
Publication number: 20190294708Abstract: In various example embodiments, a system and method for versioning data in an unstructured data store are presented. The method includes generating a first record in the unstructured data store based on a version of a second record in the unstructured data store. The method further includes initializing a parent version identifier of the first record based on the version of the second record. The method further includes comparing the parent version identifier of the first record to a version identifier of the second record. The method further includes determining whether the first record is consistent based on the comparison.Type: ApplicationFiled: March 23, 2018Publication date: September 26, 2019Inventors: Scot Fraser Hamilton, Rekha Patel, Satya Seethasridhar, Nicholas Whyte, Parikshit Arora, Snezana Sahter
-
Publication number: 20190108254Abstract: Systems and methods for multi-dimensional query statement modification are described. A system presents a user interface including a first plurality of graphical elements representing a plurality of activity dimensions to a user. The system detects a user selection of a first activity dimension and a second user selection of a first attribute of the first activity dimension without a selection of the second attribute. The system searches objects using a search query based on the first activity dimension and the first attribute to return search results including a first object published on a network-based publication system by a client. The system provides a notification message to the user responsive to identifying feedback information that is received from a trading partner of the client as transgressing a first threshold. The feedback information is identified based on the first object and the second attribute that is not selected from the user interface.Type: ApplicationFiled: November 19, 2018Publication date: April 11, 2019Applicant: eBay Inc.Inventors: Marc Delingat, Snezana Sahter, Liangjie Xu
-
Patent number: 10133772Abstract: Systems and methods for multi-dimensional query statement modification are described. A system presents a user interface including a first plurality of graphical elements representing a plurality of activity dimensions to a user. The system detects a user selection of a first activity dimension and a second user selection of a first attribute of the first activity dimension without a selection of the second attribute. The system searches objects using a search query based on the first activity dimension and the first attribute to return search results including a first object published on a network-based publication system by a client. The system provides a notification message to the user responsive to identifying feedback information that is received from a trading partner of the client as transgressing a first threshold. The feedback information is identified based on the first object and the second attribute that is not selected from the user interface.Type: GrantFiled: April 5, 2016Date of Patent: November 20, 2018Assignee: eBay Inc.Inventors: Marc Delingat, Snezana Sahter, Liangjie Xu
-
Publication number: 20180314848Abstract: Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers. Each entry in the first table includes a physical location identifier and information about a physical location. A second memory is configured according to a second table, where each entry in the second table includes the physical location identifier and an account identifier of a user for accessing a service. The first and second tables are configured to separate profile information from the address information of the user. Additionally, a firewall is configured to control access to the second memory. The firewall defines an authentication zone including the second memory but not the first memory, where access to the second memory by internal services is allowed and direct access by the user to the second memory is denied.Type: ApplicationFiled: July 5, 2018Publication date: November 1, 2018Inventors: Snezana Sahter, Arumugam Alwarappan, Mahendar Madhavan, Mallikarjuna Potta
-
Patent number: 10043031Abstract: Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers. Each entry in the first table includes a physical location identifier and information about a physical location. A second memory is configured according to a second table, where each entry in the second table includes the physical location identifier and an account identifier of a user for accessing a service. The first and second tables are configured to separate profile information from the address information of the user. Additionally, a firewall is configured to control access to the second memory. The firewall defines an authentication zone including the second memory but not the first memory, where access to the second memory by internal services is allowed and direct access by the user to the second memory is denied.Type: GrantFiled: November 8, 2016Date of Patent: August 7, 2018Assignee: eBay Inc.Inventors: Snezana Sahter, Arumugam Alwarappan, Mahendar Madhavan, Mallikarjuna Potta
-
Publication number: 20180129820Abstract: Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers. Each entry in the first table includes a physical location identifier and information about a physical location. A second memory is configured according to a second table, where each entry in the second table includes the physical location identifier and an account identifier of a user for accessing a service. The first and second tables are configured to separate profile information from the address information of the user. Additionally, a firewall is configured to control access to the second memory. The firewall defines an authentication zone including the second memory but not the first memory, where access to the second memory by internal services is allowed and direct access by the user to the second memory is denied.Type: ApplicationFiled: November 8, 2016Publication date: May 10, 2018Inventors: Snezana Sahter, Arumugam Alwarappan, Mahendar Madhavan, Mallikarjuna Potta