Patents by Inventor Vijay K. Madisetti

Vijay K. Madisetti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180288022
    Abstract: A method of generating wallets for discrete blockchain networks comprising receiving a primary and a first secondary seeds, generating an enhanced hierarchical deterministic (HD) wallet, comprising deriving an enhanced parent public key and an enhanced parent private key from the primary seed, generating a first toughened HD wallet, comprising deriving a first toughened parent public and private key pair from the first secondary seed, deriving a first toughened primary child public/private key pair from a function including as inputs the first toughened parent public/private key pair, a first parent chain code, and the enhanced parent public key, and performing an identity registration and certification procedure for both the enhanced and the first toughened HD wallets. An identify of a user associated with each of the enhanced and the first toughened HD wallets is verifiable by an external blockchain network because of the identity registration and certification procedures.
    Type: Application
    Filed: December 4, 2017
    Publication date: October 4, 2018
    Inventors: Vijay K Madisetti, Arshdeep Bahga
  • Patent number: 9935772
    Abstract: A system and method for servicing secure data object management aware applications using a cloud-based host environment and a local secure container. The cloud-based host environment creates a controlled digital object from a master digital object, and activates a tether associated with the controlled digital object. The tether includes an access permission, and optionally an operation permission (e.g., view, delete, store, edit, and copy) and a command (e.g., timeout, destroy). The controlled digital object is stored to an isolated storage of the secure container. The tether contents control access and manipulation of the controlled digital object. Certain conditions (e.g., timeout period reached, anomalous data access pattern detected), cause the controlled digital object to be destroyed and/or the tether to be inactivated.
    Type: Grant
    Filed: August 15, 2017
    Date of Patent: April 3, 2018
    Inventors: Vijay K Madisetti, Arshdeep Bahga, Michael Richter
  • Patent number: 9769213
    Abstract: A system and method for secure data object management system comprising a cloud-based host environment and a local secure container. The cloud-based host environment creates a controlled digital object from a master digital object, and activates a tether associated with the controlled digital object. The tether includes an access permission, and optionally an operation permission (e.g., view, delete, store, edit, and copy) and a command (e.g., timeout, destroy). The controlled digital object is stored to an isolated storage of the secure container. The tether contents control access and manipulation of the controlled digital object. Certain conditions (e.g., timeout period reached, anomalous data access pattern detected), cause the controlled digital object to be destroyed and/or the tether to be inactivated. In accordance with applicable law, the cloud-based host environment utilizes the tether to detect, identify, and/or thwart unauthorized host environments in possession of the controlled digital object.
    Type: Grant
    Filed: February 17, 2017
    Date of Patent: September 19, 2017
    Inventors: Vijay K Madisetti, Arshdeep Bahga, Michael Richter
  • Publication number: 20040006637
    Abstract: Methods for minimizing starting run time of application software are presented. Application software may be divided into blocks or components. If divided into blocks, a block may include a block loader function for calling another block having an instruction otherwise not included. Application software is transmitted to a client, which may begin execution as the application software is being transmitted. The client may encounter a block loader function causing the server to transmit the block that includes the instruction. In response to receiving the transmission, the client runs the application software using the instruction. If the application software is divided into components, each component may be encapsulated by a handler. A component may be divided into sub-components. A function included in a sub-component may be dependent upon a function in another sub-component. If the function is called, then the function(s) dependent upon the called function are transmitted to the client.
    Type: Application
    Filed: April 25, 2003
    Publication date: January 8, 2004
    Inventors: Pramote Kuacharoen, Vincent J. Mooney III, Vijay K. Madisetti
  • Publication number: 20030074487
    Abstract: Linking of a new or updated module to an operating system without affecting other modules, and without reboot or recompilation. A core module includes a table of locations of application program interfaces of other modules. A selected module is linked to the core module. Specifically, the module is initialized and provided with a pointer to the core module's table. The table is provided with an address of the APIs of the module. The other modules are unaffected by the linking because they are not provided with the address of the module. A reboot or recompilation of the operating system is unnecessary because the other modules are unaffected. Nevertheless, the other modules have access to the APIs of the module and to each others' APIs through the core module.
    Type: Application
    Filed: October 17, 2002
    Publication date: April 17, 2003
    Inventors: Tankut Akgul, Pramote Kuacharoen, Vincent J. Mooney, Vijay K. Madisetti
  • Publication number: 20030074650
    Abstract: Configuration of a debugger that saves resources and debugs on a target system rather than from a host system. The target system stores a table with global variables and addresses, and a module table with system-wide functions and addresses. In response to a trigger, a debugger module is loaded from the host system and linked to the target system by causing the debugger module to exchange information with the tables. The debugger module uses the table to find a variable address and sets a pointer to the address. The debugger module provides the table with a local name and address of a variable local to the debugger module. The debugger module uses the module table to find an MT address of a function and sets a pointer to the MT address. The debugger module provides the module table with an MT address of a function local to the debugger module.
    Type: Application
    Filed: October 17, 2002
    Publication date: April 17, 2003
    Inventors: Tankut Akgul, Pramote Kuacharoen, Vincent J. Mooney, Vijay K. Madisetti