Patents by Inventor Vijayarangan Natarajan

Vijayarangan Natarajan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230401496
    Abstract: Embodiments herein provide a method and system for a real-time allocation of a preferred room type based on one or more preferences of a customer. Every hotel maintains its own reservation database, the system gathers some of property management system (PMS) attributes of that day from the hotel administrator. The PMS attributes includes customer's booked room type, number of rooms booked, number of days customers will stay. Further, the system verifies all the preferences of the hotel and the different room type that are available for offering to customers on the day of check-in. A Check-in Check-Out model takes the attributes such as customers' reservation details, weather, arrival, and departure patterns of the customers from the transportation data store to predict the check-in and check-out time of the customers using pre-trained machine learning prediction models. A looping technique maps the rooms to the customers according to the preferred room types.
    Type: Application
    Filed: May 23, 2023
    Publication date: December 14, 2023
    Applicant: Tata Consultancy Services Limited
    Inventors: Sakthi Priya Manivannan, Rashmi Kumari, Premraj Agnello Furtado, Vijayarangan Natarajan
  • Publication number: 20230153703
    Abstract: The present disclosure herein provides methods and systems for optimizing personalized hospitality offerings to suit based on the customer requirement. The present disclosure employs a bucket of prediction models, namely (i) pre-trained hotel prediction model for predicting one or more hotels present in a destination city, (ii) the pre-trained room prediction model for predicting the one or more vacant rooms from the one or more hotels, and (iii) the pre-trained ancillary services prediction model for the predicting the one or more ancillary services available for the one or more vacant rooms. Each prediction model is separately trained on the features obtained from the unstructured historical training data, using a feature extraction technique. The fluidic pricing mechanism is used to provide personalized hospitality offerings by determining the fluidic pricing and offers to multiple relevant ancillary service bundles which may suit mostly to the diverse customers.
    Type: Application
    Filed: November 16, 2022
    Publication date: May 18, 2023
    Applicant: Tata Consultancy Services Limited
    Inventors: Vijayarangan NATARAJAN, Mayank MISHRA, Premraj FURTADO, Gaurav SONI
  • Patent number: 11216897
    Abstract: System and method for contract management in a data marketplace are disclosed. In an embodiment, the system performs refactoring of a contract, during which the system extracts terms and conditions from the contract and generates a simplified view of the contract. The system further performs a requirement validation based on the contract, during which the system determines features of data entity matches requirements specified by a first party or not, based on domain specific ontologies. If the data entity features are not matching with the requirements, then the system fetches one or more relevant attributes from a list of ontologies, verifies whether the features of entity along with the selected feature(s) satisfy the requirements or not. The system accordingly generates an agreeable requirement document as output of the requirement validation.
    Type: Grant
    Filed: February 22, 2017
    Date of Patent: January 4, 2022
    Assignee: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Kumar Mansukhlal Vidhani, Vijayarangan Natarajan, Sachin Premsukh Lodha, Kishore Padmanabhan
  • Publication number: 20210182990
    Abstract: System and method for contract management in a data marketplace are disclosed. In an embodiment, the system performs refactoring of a contract, during which the system extracts terms and conditions from the contract and generates a simplified view of the contract. The system further performs a requirement validation based on the contract, during which the system determines features of data entity matches requirements specified by a first party or not, based on domain specific ontologies. If the data entity features are not matching with the requirements, then the system fetches one or more relevant attributes from a list of ontologies, verifies whether the features of entity along with the selected feature(s) satisfy the requirements or not. The system accordingly generates an agreeable requirement document as output of the requirement validation.
    Type: Application
    Filed: February 21, 2017
    Publication date: June 17, 2021
    Applicant: Tata Consultancy Services Limited
    Inventors: Kumar Mansukhlal VIDHANI, Vijayarangan NATARAJAN, Sachin Premsukh LODHA, Kishore PADMANABHAN
  • Publication number: 20190108758
    Abstract: This disclosure relates generally to a system and method to predict flight delay. Moreover, the embodiments herein further provide the system and method to predict timings of an airline in real time by considering historical operations (arrival and departure) data, historical airport data (captured at the time of arrival and departure) including congestion information, and weather data of the airport. The flight delays involves prediction of arrival and departure times of flight. Herein, the method categorizes input data related to an airline history, airline network, airport data and various airline reference data. Further, the method analyses the cause of delay which may be due to maintenance issues with the aircraft, fueling, weather, congestion in air traffic, and security issues etc. The system and method computes the flight delay due to multiple airline operations and different input datasets using stochastic approximation approach.
    Type: Application
    Filed: October 5, 2018
    Publication date: April 11, 2019
    Applicant: Tata Consultancy Services Limited
    Inventors: Satish BYRAVAN, Kishore PADMANABHAN, Vijayarangan NATARAJAN, Kartick NARASIMHADEVARA, Viswanath Kumar GANESAN, Sreedhar GUDLA, Ramesh Babu Sangaiaha PERUMAL, Subramaniam BALAKRISHNAN, Balaji JAGANNATHAN
  • Publication number: 20190066207
    Abstract: Conventional systems and methods for order management are not geared to address varying and modifiable attributes of data products which may lead to conflicts that need to be resolved for a trade to conclude. Systems and methods are provided for resolving such conflicts prevalent in voluminous data hubs such as data marketplaces associated with buy orders and sell orders including metadata associated with product data, terms and conditions and price attributes. The conflict resolution provided is an automated and streamlined process that takes into account basic requirements of buyers and sellers along with a comprehensive resolution of conflicts that may arise when meeting the privacy requirements associated with data being traded, contract requirements proposed or concluded for the data being traded, reputation score associated with the trading parties and price discovery based on the variations in trading mechanisms possible in huge data marketplace.
    Type: Application
    Filed: February 22, 2017
    Publication date: February 28, 2019
    Applicant: Tata Consultancy Services Limited
    Inventors: Sandeep SAXENA, Vijayarangan NATARAJAN, Shirish Subhash KARANDE, Kishore PADMANABHAN, Ram Harith VISWANATHAN
  • Publication number: 20190057441
    Abstract: A method and system is provided for allocating a suitable price discovery mechanism in a data marketplace. The system takes a set of requirements from one or more buyers and a set of specifications for the data products from one or more sellers. The matching is performed on the set of requirements and the set of specifications of the data products to determine whether data transaction should be proceeded or not. The output is then provided to the classification module to classify the data marketplace to choose the most suitable price discovery mechanism which can be used for a particular data transaction in the data marketplace. The system can use of any of the following price discovery techniques. Bid order matching, auctioning or direct negotiation. Once the price is finalized, the finalized price then can be send to an order management module of the data marketplace.
    Type: Application
    Filed: February 22, 2017
    Publication date: February 21, 2019
    Applicant: Tata Consultancy Services Limited
    Inventors: Shishir DAHAKE, Kishore PADMANABHAN, Vijayarangan NATARAJAN, Sandeep SAXENA, Ram Harith VISWANATHAN
  • Patent number: 8842833
    Abstract: The present application provides a system and method for a set of Extensible Authentication Protocols (EAPs) based on ECC (Elliptic Curve Cryptography) and SKE (Symmetric Key Encryption) mechanisms (with a suitable permutation) that can serve Confidentiality, Authentication, Authorization and Accounting (CAAA) issues at an affordable cost. According to one embodiment, a method and system of ECC and SKE based EAPs (through a permutation technique) which can avoid replay attacks. The application also provides a light weight security with better performance in comparison to the lower layer chip level security provided by 2G, 3G or 4G Applications and no certificates exchanged during the communication.
    Type: Grant
    Filed: May 26, 2011
    Date of Patent: September 23, 2014
    Assignee: Tata Consultancy Services Limited
    Inventor: Vijayarangan Natarajan
  • Patent number: 8670563
    Abstract: A system and method for facilitating secure client server communication using elliptical curve cryptography and certificateless public key infrastructure has been disclosed. The system includes a secret key generation means which generates a secret key of m-bits based on the elliptic curve diffie hellman algorithm. The system further includes a session key generation means which makes use of said secret key and elliptic curve diffie hellman algorithm to generate a session key. The session key is used to facilitate secured communication between the client and the server.
    Type: Grant
    Filed: December 8, 2010
    Date of Patent: March 11, 2014
    Assignee: Tata Consultancy Services Ltd.
    Inventor: Vijayarangan Natarajan
  • Patent number: 8467532
    Abstract: The present invention provides a system and method for a set of Extensible Authentication Protocols (EAPs) that can serve Confidentiality, Authentication, Authorization and Accounting (CAAA) issues at an affordable cost. According to one embodiment of the invention, a system and method is provided to generate random sequences (through prime numbers) which can be used in the authentication process of certificateless extensible authentication protocols (EAPs) for mobile and wireless communications. The invention also provides a light weight security with better performance in comparison to the lower layer chip level security provided by 2G, 3G or 4G applications.
    Type: Grant
    Filed: December 14, 2010
    Date of Patent: June 18, 2013
    Assignee: Tata Consultancy Services Limited
    Inventor: Vijayarangan Natarajan
  • Patent number: 8358784
    Abstract: The present invention provides a system and method for designing secure synchronization protocols in mobile communication by using Deterministic Random Number Generator (DRNG) through linear operators without using multi-precision integers. It also provides an efficient way to generate a huge size collection of pseudorandom numbers with a less computational complexity and DRSG is designed for mobile and wireless communications and also the said DRSG algorithm is a lightweight algorithm. The generated sequence has a lot of applications in Mobile computation and Information security. The invention provides a securely transfer of registry and provision of consumer details over the communication network and also provide a light weight security with better performance in comparison to the lower layer chip level security provided by 2G, 3G or 4G applications.
    Type: Grant
    Filed: December 14, 2010
    Date of Patent: January 22, 2013
    Assignee: Tata Consultancy Services Limited
    Inventor: Vijayarangan Natarajan
  • Publication number: 20120023336
    Abstract: A system and method for facilitating secure client server communication using elliptical curve cryptography and certificateless public key infrastructure has been disclosed. The system includes a secret key generation means which generates a secret key of m-bits based on the elliptic curve diffie hellman algorithm. The system further includes a session key generation means which makes use of said secret key and elliptic curve diffie hellman algorithm to generate a session key. The session key is used to facilitate secured communication between the client and the server.
    Type: Application
    Filed: December 8, 2010
    Publication date: January 26, 2012
    Inventor: Vijayarangan Natarajan
  • Publication number: 20120008775
    Abstract: The present application provides a system and method for a set of Extensible Authentication Protocols (EAPs) based on ECC (Elliptic Curve Cryptography) and SKE (Symmetric Key Encryption) mechanisms (with a suitable permutation) that can serve Confidentiality, Authentication, Authorization and Accounting (CAAA) issues at an affordable cost. According to one embodiment, a method and system of ECC and SKE based EAPs (through a permutation technique) which can avoid replay attacks. The application also provides a light weight security with better performance in comparison to the lower layer chip level security provided by 2G, 3G or 4G Applications and no certificates exchanged during the communication.
    Type: Application
    Filed: May 26, 2011
    Publication date: January 12, 2012
    Applicant: TATA CONSULTANCY SERVICES LIMITED
    Inventor: Vijayarangan Natarajan
  • Publication number: 20110164751
    Abstract: The present invention provides a system and method for designing secure synchronization protocols in mobile communication by using Deterministic Random Number Generator (DRNG) through linear operators without using multi-precision integers. It also provides an efficient way to generate a huge size collection of pseudorandom numbers with a less computational complexity and DRSG is designed for mobile and wireless communications and also the said DRSG algorithm is a lightweight algorithm. The generated sequence has a lot of applications in Mobile computation and Information security. The invention provides a securely transfer of registry and provision of consumer details over the communication network and also provide a light weight security with better performance in comparison to the lower layer chip level security provided by 2G, 3G or 4G applications.
    Type: Application
    Filed: December 14, 2010
    Publication date: July 7, 2011
    Inventor: VIJAYARANGAN NATARAJAN
  • Publication number: 20110164749
    Abstract: The present invention provides a system and method for a set of Extensible Authentication Protocols (EAPs) that can serve Confidentiality, Authentication, Authorization and Accounting (CAAA) issues at an affordable cost. According to one embodiment of the invention, a system and method is provided to generate random sequences (through prime numbers) which can be used in the authentication process of certificateless extensible authentication protocols (EAPs) for mobile and wireless communications. The invention also provides a light weight security with better performance in comparison to the lower layer chip level security provided by 2G, 3G or 4G applications.
    Type: Application
    Filed: December 14, 2010
    Publication date: July 7, 2011
    Inventor: VIJAYARANGAN NATARAJAN