Patents by Inventor Vamshi Ramarapu
Vamshi Ramarapu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11936651Abstract: Embodiments of the invention are directed to an automated account restoration system. In some embodiments, the system determines a state of an account based on a likelihood that the account has been compromised. If the account is determined to be in a low-risk state, then upon an successful login to that account, a verification cookie may be generated which is unique to a user device used to access the account. If the account is determined to be in a high-risk state, then system may prevent access to the account except by user devices that include a valid verification cookie.Type: GrantFiled: February 20, 2019Date of Patent: March 19, 2024Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Vinjith Nagaraja, Dhruv Vig, Raymond Brammer, Vamshi Ramarapu, James Myers, David Capezza, Nagaveera Venkata Su Tavvala, Swapneel Mahajan, Shalini Mayor
-
Patent number: 11734433Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application. An application, that uses code libraries, and information regarding known library vulnerabilities are received, then it is determined if one or more libraries in the application are vulnerable based upon the information. For each of the one or more vulnerable libraries, a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If an application test score on the test application is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each of the one or more vulnerable libraries.Type: GrantFiled: March 30, 2022Date of Patent: August 22, 2023Assignee: Visa International Service AssociationInventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu
-
Publication number: 20220222353Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application are disclosed. An application that uses code libraries and information regarding known library vulnerabilities is received, then it can be determined if one or more libraries in the application is vulnerable based upon the information. For each of the one or more vulnerable libraries a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If the application test is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each vulnerable library.Type: ApplicationFiled: March 30, 2022Publication date: July 14, 2022Inventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu
-
Patent number: 11308218Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application. An application that uses code libraries and information regarding known library vulnerabilities are received, then it identifies one or more libraries in the application that are vulnerable based upon the information. For each of the one or more vulnerable libraries, a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If an application test score on the test application is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each of the one or more vulnerable libraries.Type: GrantFiled: December 20, 2018Date of Patent: April 19, 2022Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu
-
Patent number: 11271931Abstract: Techniques for securely generating and using a “fingerprint” for authentication. A server computer receives a first data set from a user device (including a first fuzzy hash of first user data on the user device). The server computer generates a first fingerprint value based on the first data set. The server computer detects an event corresponding to a user in association with the user device. The server computer identifies a baseline fingerprint value (generated based on a baseline fuzzy hash of user data on the user device). The server computer compares the first fingerprint value to the baseline fingerprint value to generate a similarity score. The server computer may determine that the similarity score exceeds a threshold value but does not represent an exact match, and, based on the similarity score, authenticate the user and update the baseline fingerprint value based on the first fingerprint value.Type: GrantFiled: September 19, 2019Date of Patent: March 8, 2022Assignee: Visa International Service AssociationInventors: Vinjith Nagaraja, Nagaveera Venkata Su Tavvala, Jose Rios Trevino, Vamshi Ramarapu, Swapneel Mahajan, Joel Trunick, Shalini Mayor, James Myers, Raymond Brammer, Ireneusz Pazdzierniak, Shashi Velur, Feng Chi Wang, Vincent Hesener
-
Publication number: 20210099444Abstract: Embodiments of the invention are directed to an automated account restoration system. In some embodiments, the system determines a state of an account based on a likelihood that the account has been compromised. If the account is determined to be in a low-risk state, then upon an successful login to that account, a verification cookie may be generated which is unique to a user device used to access the account. If the account is determined to be in a high-risk state, then system may prevent access to the account except by user devices that include a valid verification cookie.Type: ApplicationFiled: February 20, 2019Publication date: April 1, 2021Inventors: Vinjith Nagaraja, Dhruv Vig, Raymond Brammer, Vamshi Ramarapu, James Myers, David Capezza, Nagaveera Venkata Su Tavvala, Swapneel Mahajan, Shalini Mayor
-
Publication number: 20200202007Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application are disclosed. The method includes receiving an application that uses code libraries and information regarding known library vulnerabilities, then determining if one or more libraries in the application is vulnerable based upon the information. For each of the one or more vulnerable libraries a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If the application test is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each vulnerable library.Type: ApplicationFiled: December 20, 2018Publication date: June 25, 2020Inventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu
-
Publication number: 20200099684Abstract: Techniques for securely generating and using a “fingerprint” for authentication. A server computer receives a first data set from a user device (including a first fuzzy hash of first user data on the user device). The server computer generates a first fingerprint value based on the first data set. The server computer detects an event corresponding to a user in association with the user device. The server computer identifies a baseline fingerprint value (generated based on a baseline fuzzy hash of user data on the user device). The server computer compares the first fingerprint value to the baseline fingerprint value to generate a similarity score. The server computer may determine that the similarity score exceeds a threshold value but does not represent an exact match, and, based on the similarity score, authenticate the user and update the baseline fingerprint value based on the first fingerprint value.Type: ApplicationFiled: September 19, 2019Publication date: March 26, 2020Inventors: Vinjith Nagaraja, Nagaveera Venkata Su Tavvala, Jose Rios Trevino, Vamshi Ramarapu, Swapneel Mahajan, Joel Trunick, Shalini Mayor, James Myers, Raymond Scott Brammer, Ireneusz Pazdzierniak, Shashi Velur, Feng Chi Wang, Vincent Hesener