Patents by Inventor Sunpreet Singh Arora
Sunpreet Singh Arora has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240282161Abstract: Provided is a computer-implemented method for authenticating an identification document. The method includes determining, with at least one processor, whether image data associated with the identification document has at least one predetermined indicia. In response to determining that the image data has the at least one predetermined indicia, the method includes determining whether the at least one predetermined indicia corresponds to at least one invalidation mark on the identification document, and, in response to determining that the at least one predetermined indicia corresponds to the at least one invalidation mark, determining, that the identification document is invalid. In response to determining that the identification document is invalid, the method includes preventing or causing the prevention of at least one action from being performed. A system and computer program product for authenticating identification documents are also disclosed.Type: ApplicationFiled: May 3, 2024Publication date: August 22, 2024Inventors: Sunpreet Singh Arora, Kim R. Wagner
-
Publication number: 20240283659Abstract: A method is disclosed. The method comprises receiving, by a user device from an identity network computer, a query set comprising a plurality of test identity attributes; encrypting, by the user device, the query set to form an obscured query set; computing, by the user device, a zero-knowledge proof using the obscured query set and an encrypted identity attribute associated with a user operating the user device; and transmitting, by the user device to the identity network computer, the obscured query set and the zero-knowledge proof, wherein the identity network computer verifies the zero-knowledge proof, retrieves an encrypted identity attribute associated with the user, evaluates the obscured query set with respect to the encrypted identity attribute, and transmits a result of the evaluation to a relying party computer.Type: ApplicationFiled: May 3, 2024Publication date: August 22, 2024Applicant: Visa International Service AssociationInventors: Kim Wagner, Brian Sullivan, Dinah Sloan, Hao Ngo, Gaven James Watson, Sunpreet Singh Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman
-
Patent number: 12069047Abstract: Training an adversarial perturbation detector comprises accessing a training set comprising an enrolled biometric sample xi and a public biometric sample x of an enrolled user, and submitted biometric samples x? of a second user, the submitted biometric samples x? comprising perturbed adversarial samples x?+?x?. A transformation function k(?) is provided having learnable a parameter ? and a classifier having a learnable parameter ?. The training set is used to learn the parameters ? and ? by inputting the training set to the transformation function k(?). The transformation function k(?) generates transformed enrolled samples k(xi), a transformed public biometric sample k(x), and a transformed adversarial sample k(x?+?x?). The classifier classifies the transformed adversarial sample k(x?+?x?) as a success or as a fail based on the transformed enrolled samples k(xi). Based on a result of the classification, the learnable parameters ? and ? are updated.Type: GrantFiled: September 23, 2022Date of Patent: August 20, 2024Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Yuhang Wu, Sunpreet Singh Arora, Hao Yang
-
Publication number: 20240223365Abstract: A method is disclosed. The method includes receiving, by a processing network computer from a relying party computer associated with a relying party, a request for data associated with a user operating a user device. The processing network computer may retrieve first encrypted data of the user having a user-layer of encryption. The processing computer can then generate a second symmetric key to add a relying party-layer of encryption to the first encrypted data using a stream cipher. The doubly encrypted data may be transmitted to a user device that removes the user-layer of encryption on the first doubly encrypted data, and then adds a second relying party-layer of encryption to form second doubly encrypted data. The second doubly encrypted data may be transmitted to the relying party computer, which can remove both relying party-layers of encryption to gain access to the data associated with the user.Type: ApplicationFiled: March 11, 2024Publication date: July 4, 2024Applicant: Visa International Service AssociationInventors: Sunpreet Singh Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman, Kim Wagner, Gaven Watson
-
Patent number: 12028370Abstract: Described herein are a system and techniques for detecting whether biometric data provided in an access request is genuine or a replay. In some embodiments, the system uses an machine learning model trained using genuine and replay sample data which is optimized in order to produce a result set in which results for the genuine samples are pulled closer to a genuine center and results for the replay samples are pushed away from the genuine center. Subjecting input biometric data (e.g., an audio sample) to the trained model results in a classification of the input biometric data as genuine or replay, which can then be used to determine whether or not to verify the input biometric data.Type: GrantFiled: February 1, 2022Date of Patent: July 2, 2024Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Mengjun Leng, Sunpreet Singh Arora, Kim Wagner
-
Patent number: 12028455Abstract: Methods and systems for privacy-preserving identity attribute verification are presented. During an interaction between a relying entity and a user, a relying entity computer can transmit a policy token to a user device. The policy token may indicate the information needed by the relying entity in order to perform the interaction. The user device can verify the policy token, then use the policy token in conjunction with an identity token to generate a zero-knowledge proof. The user device may transmit the zero-knowledge proof to an identity service provider computer. The identity service provider computer may verify the zero-knowledge proof, then generate a verification message. The identity service provider computer may sign the verification message and transmit the signed verification message to the relying entity computer. The relying entity computer may verify the verification message and complete the interaction with the user.Type: GrantFiled: July 14, 2020Date of Patent: July 2, 2024Assignee: Visa International Service AssociationInventors: Kim Ritter Wagner, Sunpreet Singh Arora, Gaven James Watson, Mihai Christodorescu, Shashank Agrawal
-
Integrating identity tokens and privacy-preserving identity attribute attestations into interactions
Patent number: 12015720Abstract: A method is disclosed. The method comprises receiving, by an identity network computer, a query set including a plurality of test identity attributes. After receiving the query set, the identity network computer may retrieve derivatives of identity attributes associated with a user, and an encrypted trapdoor, then compute an obscured query set using the query set, and optionally the derivatives of identity attributes. The identity network computer may transmit the obscured query set (i) and the encrypted trapdoor to a user device associated with the user, which generates and transmits a first modified trapdoor and the obscured query set to a relying party computer, or (ii) and a second modified trapdoor to the relying party computer. The relying party computer may thereafter use the obscured query set, and the first modified trapdoor or the second modified trapdoor, to determine if the identity attributes is a member of the query set.Type: GrantFiled: November 17, 2021Date of Patent: June 18, 2024Assignee: Visa International Service AssociationInventors: Kim Wagner, Brian Sullivan, Dinah Sloan, Hao Ngo, Gaven James Watson, Sunpreet Singh Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman -
Publication number: 20240171410Abstract: A method is disclosed. The method comprises receiving, from a server computer, a challenge, and displaying objects from an object list to a user. The method includes determining that a user has visually selected an object from the object list and moving the selected object on a display according to screen coordinates. A client computer captures a biometric of the user, and compares the biometric to another biometric stored in the client computer to provide a first comparison output, and compares a derivative of the selected object to a derivative of an object stored in the client computer to produce a second comparison output. The client computer signs the challenge with a private key and sends the signed challenge to the server computer, and the server computer verifies the signed challenge.Type: ApplicationFiled: May 10, 2022Publication date: May 23, 2024Applicant: Visa International Service AssociationInventors: Sunpreet Singh Arora, William Leddy, Shengfei Gu, Minghua Xu
-
Patent number: 11978299Abstract: Provided is a computer-implemented method for authenticating an identification document. The method includes determining, with at least one processor, whether image data associated with the identification document has at least one predetermined indicia. In response to determining that the image data has the at least one predetermined indicia, the method includes determining whether the at least one predetermined indicia corresponds to at least one invalidation mark on the identification document, and, in response to determining that the at least one predetermined indicia corresponds to the at least one invalidation mark, determining, that the identification document is invalid. In response to determining that the identification document is invalid, the method includes preventing or causing the prevention of at least one action from being performed. A system and computer program product for authenticating identification documents are also disclosed.Type: GrantFiled: February 14, 2023Date of Patent: May 7, 2024Assignee: Visa International Service AssociationInventors: Sunpreet Singh Arora, Kim R. Wagner
-
Patent number: 11956359Abstract: A method is disclosed. The method includes receiving, by a processing network computer from a relying party computer associated with a relying party, a request for data associated with a user operating a user device. The processing network computer may retrieve first encrypted data of the user having a user-layer of encryption. The processing computer can then generate a second symmetric key to add a relying party-layer of encryption to the first encrypted data using a stream cipher. The doubly encrypted data may be transmitted to a user device that removes the user-layer of encryption on the first doubly encrypted data, and then adds a second relying party-layer of encryption to form second doubly encrypted data. The second doubly encrypted data may be transmitted to the relying party computer, which can remove both relying party-layers of encryption to gain access to the data associated with the user.Type: GrantFiled: February 10, 2022Date of Patent: April 9, 2024Assignee: Visa International Service AssociationInventors: Sunpreet Singh Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman, Kim Wagner, Gaven Watson
-
Publication number: 20240105197Abstract: Provided is a method for enabling speaker de-identification in public audio data by leveraging adversarial perturbation. The method may include receiving audio data associated with at least one voice sample. One or more of the voice sample(s) may be perturbed toward an edge of a decision boundary of at least one classifier model. One pitch of each voice sample may be perturbed to shift each voice sample across the decision boundary of the at least one classifier model to provide at least one de-identified voice sample. A media file with the at least one de-identified voice sample may be encoded. A system and computer program product are also disclosed.Type: ApplicationFiled: February 10, 2022Publication date: March 28, 2024Inventors: Yangyong Zhang, Maliheh Shirvanian, Sunpreet Singh Arora
-
Patent number: 11943363Abstract: Described herein are a system and techniques for enabling biometric authentication without exposing the authorizing entity to sensitive information. In some embodiments, the system receives a biometric template from a user device which is encrypted using a public key associated with the system. The encrypted biometric template is then provided to a second entity along with a biometric identifier. Upon receiving a request to complete a transaction that includes the biometric identifier and a second biometric template, the second entity may encrypt the second biometric template using the same public key associated with the system and perform a comparison between the two encrypted biometric templates. The resulting match result data file is already encrypted and can be provided to the system to determine an extent to which the two biometric templates match.Type: GrantFiled: July 25, 2018Date of Patent: March 26, 2024Assignee: Visa International Service AssociationInventors: John F. Sheets, Kim R. Wagner, Sunpreet Singh Arora, Lacey Best-Rowden, Chunxi Jiang
-
Publication number: 20240039719Abstract: A method is disclosed. The method includes receiving, by a processing network computer from a relying party computer associated with a relying party, a request for data associated with a user operating a user device. The processing network computer may retrieve first encrypted data of the user having a user-layer of encryption. The processing computer can then generate a second symmetric key to add a relying party-layer of encryption to the first encrypted data using a stream cipher. The doubly encrypted data may be transmitted to a user device that removes the user-layer of encryption on the first doubly encrypted data, and then adds a second relying party-layer of encryption to form second doubly encrypted data. The second doubly encrypted data may be transmitted to the relying party computer, which can remove both relying party-layers of encryption to gain access to the data associated with the user.Type: ApplicationFiled: February 10, 2022Publication date: February 1, 2024Applicant: Visa International Service AssociationInventors: Sunpreet Singh Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman, Kim Wagner, Gaven Watson
-
Publication number: 20240020410Abstract: A method is disclosed. The method comprises receiving, by a digital identity computer, a request for personal data associated with a user. The digital identity computer may retrieve encrypted personal data, wherein the personal data is encrypted with a public key associated with the user. The digital identity computer may encrypt the encrypted personal data with a first public key associated with a relying party or derivative thereof to form subsequently encrypted personal data. The method may then proceed to transmit the subsequently encrypted personal data or derivative thereof to a relying party computer, or a user device. If the user device receives the subsequently encrypted personal data, the user device may thereafter transmit the subsequently encrypted personal data or derivative thereof to the relying party computer. Then, the relying party computer obtains the personal data from the subsequently encrypted personal data or derivative thereof.Type: ApplicationFiled: September 28, 2021Publication date: January 18, 2024Applicant: Visa International Service AssociationInventors: Sunpreet Singh Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman, Kim Wagner, Gaven James Watson, David Henstock, Jason Lightman
-
Publication number: 20230403160Abstract: Embodiments are directed to a method for securely performing biometric authentication online. The method described can be used to securely perform biometric authentication on a mobile device. For protecting the privacy of the user's biometric data, a cryptographic comparison protocol can be used to perform matching of encrypted templates. For example, the cryptographic comparison protocol may involve Fuzzy Extractors (FE), Homomorphic Encryption (HE), and/or Secure Multi-Party Computation (SMPC).Type: ApplicationFiled: August 25, 2023Publication date: December 14, 2023Applicant: Visa International Service AssociationInventors: Jason Blackhurst, Kim Wagner, John F. Sheets, Chunxi Jiang, Sunpreet Singh Arora
-
Patent number: 11811761Abstract: Techniques for intelligently deciding the optimal authenticator(s) from amongst those supported by an electronic device are described. The authentication system according to some embodiments may include a dynamic machine learner that incorporates the attributes of: (i) user behavior attributes (e.g., preferred authenticator); (ii) device attributes (e.g., hardware and software specifications, applications, etc.); and (iii) operating environment attributes (e.g., ambient light, noise, etc.), as well as the interplay between the aforementioned attributes over time to make the decision. In some embodiments, the authentication activities and patterns of other users of similar type (e.g., users exhibiting similar behavior across different operating environments) can also be learned and employed to improve the decision making process over time.Type: GrantFiled: January 28, 2022Date of Patent: November 7, 2023Assignee: Visa International Service AssociationInventors: Sunpreet Singh Arora, Kim R. Wagner, John F. Sheets, Lacey Best-Rowden
-
Publication number: 20230334332Abstract: Techniques are disclosed for performing adversarial object detection. In one example, a system obtains a feature vector upon receiving an object to be classified. The system then generates a graph using the feature vector for the object and other feature vectors that are respectively obtained from a reference set of objects, whereby the feature vector corresponds to a center node of the graph. The system uses a distance metric to select neighbor nodes from among the reference set of objects for inclusion into the graph, and then determines edge weights between nodes of the graph based on a distance between respective feature vectors between nodes. The system then applies a graph discriminator to the graph to classify the object as adversarial or benign, the graph discriminator being trained using (I) the feature vectors associated with nodes of the graph and (II) the edge weights between the nodes of the graph.Type: ApplicationFiled: September 30, 2021Publication date: October 19, 2023Applicant: Visa International Service AssociationInventors: Yuhang Wu, Sunpreet Singh Arora, Hao Yang, Ahmed Abusnaina
-
Patent number: 11792012Abstract: A method is disclosed. An authentication node may receive a plurality of encrypted match values, wherein the plurality of encrypted match values were formed by a plurality of worker nodes that compare a plurality of encrypted second biometric template parts derived from a second biometric template to a plurality of encrypted first biometric template parts derived from a first biometric template. The authentication node may decrypt the plurality of encrypted match values resulting in a plurality of decrypted match values. The authentication node may then determine if a first biometric template matches the second biometric template using the plurality of decrypted match values. An enrollment node may be capable of enrolling a biometric template and storing encrypted biometric template parts at worker nodes.Type: GrantFiled: March 1, 2022Date of Patent: October 17, 2023Assignee: Visa International Service AssociationInventors: Sunpreet Singh Arora, Lacey Best-Rowden, Kim Wagner
-
Patent number: 11777736Abstract: Embodiments are directed to a method for securely performing biometric authentication online. The method described can be used to securely perform biometric authentication on a mobile device. For protecting the privacy of the users biometric data, a cryptographic comparison protocol can be used to perform matching of encrypted templates. For example, the cryptographic comparison protocol may involve Fuzzy Extractors (FE), Homomorphic Encryption (HE), and/or Secure Multi-Party Computation (SMPC).Type: GrantFiled: July 26, 2018Date of Patent: October 3, 2023Assignee: Visa International Service AssociationInventors: Jason Blackhurst, Kim Wagner, John F. Sheets, Chunxi Jiang, Sunpreet Singh Arora
-
Publication number: 20230289441Abstract: In some embodiments, a malware detection system includes an attack channel removal unit, a feature extraction unit coupled to the attack channel removal unit, and a graphical encoding unit coupled to the feature extraction unit and a malware detection unit. In some embodiments, based upon graphically-encoded component-based features and monotonic features extracted from attack-channel-free software output by the attack channel removal unit, the malware detection unit detects malware in software input into the malware detection system. In some embodiments, the monotonic features extracted from the attack-channel free software and the graphically-encoded component-based features are combined to generate a combination monotonic-component based feature vector. In some embodiments, the combination monotonic-component based feature vector is used to detect malware using the malware detection system.Type: ApplicationFiled: March 11, 2022Publication date: September 14, 2023Applicant: Visa International Service AssociationInventors: Ahmed Abusnaina, Yizhen Wang, Sunpreet Singh Arora, Ke Wang, Mihai Christodorescu