Patents by Inventor Vinjith Nagaraja
Vinjith Nagaraja has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12231402Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.Type: GrantFiled: January 2, 2024Date of Patent: February 18, 2025Assignee: Visa International Service AssociationInventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, Jr., Keeshini Manivannan
-
Patent number: 12099626Abstract: Provided are systems for conducting private set intersection (PSI) techniques with multiple parties using a data repository that include at least one processor to generate a data repository, receive, from a submission entity system associated with a submission entity, a private set intersection (PSI) data query that includes a match parameter for performing the PSI data query, transmit, to the submission entity system, a data classification encryption key, wherein the data classification encryption key is associated with a data field that corresponds to a match parameter data field of the match parameter, determine whether to authorize the PSI data query on the data repository, transmit, to the submission entity system, a data authorization encryption key based on determining to authorize the PSI data query on the data repository, and perform the PSI data query on the data repository. Methods and computer program products are also provided.Type: GrantFiled: May 11, 2023Date of Patent: September 24, 2024Assignee: Visa International Service AssociationInventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel
-
Publication number: 20240187221Abstract: Embodiments are directed to methods and systems for crypto-agile encryption and decryption. A computer system can possess a protocol file that identifies one or more cryptographic software modules. Using these cryptographic software modules, the computer system can generate a plurality of shared secrets and a session key, then use the session key to encrypt a message. The message can be sent to a server computer that can subsequently decrypt the message. At a later time, the protocol file can be updated to identify a different set of cryptographic software modules, which can be used to encrypt messages. Further, the server computer can transmit additional cryptographic software modules to the computer system, enabling the computer system to use those cryptographic software modules to generate cryptographic keys. As such, the cryptographic protocol file can be changed in response to changes in the cryptographic needs of the computer system.Type: ApplicationFiled: February 2, 2022Publication date: June 6, 2024Applicant: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Vinjith Nagaraja, Minghua Xu, Jose Rios Trevino, Gaven Watson, Pratyay Mukherjee, Yilei Chen, Daniel Masny, Mihai Christodorescu
-
Publication number: 20240179123Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.Type: ApplicationFiled: January 2, 2024Publication date: May 30, 2024Inventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, JR., Keeshini Manivannan
-
Patent number: 11991282Abstract: A method performed by a user device is disclosed. The method comprising generating a secret and measuring a biometric template of a user operating the user device. The method then generates a plurality of secret shares of the secret and of the biometric template. The user device then transmits the secret shares of the secret and of the biometric template to a plurality of recovery devices. After, the user device may then initiate a recovery of the secret and measure a biometric measurement of the user. Data of the biometric measurement may be transmitted to the plurality of recovery devices, where the recovery devices perform a partial computation. The user device use the plurality of partial computations to determine a match between the biometric template and the biometric measurement. If the two biometrics match, the user device can reconstruct the secret using shares of the secret from the recovery devices.Type: GrantFiled: July 30, 2021Date of Patent: May 21, 2024Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel, Shengfei Gu, Sikhar Patranabis, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal, Shan Jin
-
Patent number: 11936651Abstract: Embodiments of the invention are directed to an automated account restoration system. In some embodiments, the system determines a state of an account based on a likelihood that the account has been compromised. If the account is determined to be in a low-risk state, then upon an successful login to that account, a verification cookie may be generated which is unique to a user device used to access the account. If the account is determined to be in a high-risk state, then system may prevent access to the account except by user devices that include a valid verification cookie.Type: GrantFiled: February 20, 2019Date of Patent: March 19, 2024Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Vinjith Nagaraja, Dhruv Vig, Raymond Brammer, Vamshi Ramarapu, James Myers, David Capezza, Nagaveera Venkata Su Tavvala, Swapneel Mahajan, Shalini Mayor
-
Patent number: 11895088Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.Type: GrantFiled: September 21, 2022Date of Patent: February 6, 2024Assignee: Visa International Service AssociationInventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, Jr., Keeshini Manivannan
-
Patent number: 11861582Abstract: Embodiments include apparatuses, methods, and systems for performing security protection of association between a user device and a user. A computing system receives from a service provider a notification that an identifier of a user device has been activated in the user device to be associated with a user identifier to replace an existing identifier of the user device associated with the user identifier. The computing system further receives from the user device a request for information associated with the user identifier to be sent to the user device associated with the identifier of the user device. Before sending the requested information to the user device, the computing system verifies the identifier of the user device has been activated by the user by an additional authentication of the user through a communication path between the user and the computing system. Other embodiments may also be described and claimed.Type: GrantFiled: December 9, 2020Date of Patent: January 2, 2024Assignee: Visa International Service AssociationInventors: Vinjith Nagaraja, Dhaval Gangar
-
Publication number: 20230401331Abstract: Embodiments of the present disclosure are directed to methods and systems used to determine private set intersections (PSIs) and execute private database joins (PDJs). Some embodiments are characterized by binning techniques that enables PSI and PDJ methods to be performed by worker nodes in a computing cluster in parallel, thus reducing execution time. A first party computing system and a second party computing system can each tokenize their respective datasets, then assign the datasets to bins. The bins can each be padded with dummy tokens. Then the first party computing system and second party computing system can execute several Nparallel PSI on pairs of corresponding bins. The results can then be combined to produce a tokenized intersection set, which can then be detokenized to produce the set intersection.Type: ApplicationFiled: October 6, 2021Publication date: December 14, 2023Applicant: Visa International Service AssociationInventors: Minghua Xu, Mihai Christodorescu, Wei Sun, Peter Rindal, Ranjit Kumaresan, Vinjith Nagaraja, Karankumar Hiteshbhai Patel
-
Publication number: 20230281334Abstract: Provided are systems for conducting private set intersection (PSI) techniques with multiple parties using a data repository that include at least one processor to generate a data repository, receive, from a submission entity system associated with a submission entity, a private set intersection (PSI) data query that includes a match parameter for performing the PSI data query, transmit, to the submission entity system, a data classification encryption key, wherein the data classification encryption key is associated with a data field that corresponds to a match parameter data field of the match parameter, determine whether to authorize the PSI data query on the data repository, transmit, to the submission entity system, a data authorization encryption key based on determining to authorize the PSI data query on the data repository, and perform the PSI data query on the data repository. Methods and computer program products are also provided.Type: ApplicationFiled: May 11, 2023Publication date: September 7, 2023Inventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel
-
Patent number: 11734433Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application. An application, that uses code libraries, and information regarding known library vulnerabilities are received, then it is determined if one or more libraries in the application are vulnerable based upon the information. For each of the one or more vulnerable libraries, a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If an application test score on the test application is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each of the one or more vulnerable libraries.Type: GrantFiled: March 30, 2022Date of Patent: August 22, 2023Assignee: Visa International Service AssociationInventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu
-
Patent number: 11720742Abstract: Methods and systems for detecting webpages that share malicious content are presented. A first set of webpages that hosts a web account checker is identified. A baseline page structure score and a baseline language score are calculated based on the identified first set of webpages. Content from a second set of webpages is collected and analyzed based on the calculated baseline page structure and the calculated baseline language scores. One or more of the second set of webpages is flagged as malicious based on the analyzing of the content collected from the second set of webpages.Type: GrantFiled: September 14, 2020Date of Patent: August 8, 2023Assignee: PayPal, Inc.Inventors: Vinjith Nagaraja, Meethil Vijay Yadav, Bradley Wardman
-
Patent number: 11687666Abstract: Provided are systems for conducting private set intersection (PSI) techniques with multiple parties using a data repository that include at least one processor to generate a data repository, receive, from a submission entity system associated with a submission entity, a private set intersection (PSI) data query that includes a match parameter for performing the PSI data query, transmit, to the submission entity system, a data classification encryption key, wherein the data classification encryption key is associated with a data field that corresponds to a match parameter data field of the match parameter, determine whether to authorize the PSI data query on the data repository, transmit, to the submission entity system, a data authorization encryption key based on determining to authorize the PSI data query on the data repository, and perform the PSI data query on the data repository. Methods and computer program products are also provided.Type: GrantFiled: January 12, 2021Date of Patent: June 27, 2023Assignee: Visa International Service AssociationInventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel
-
Publication number: 20230050481Abstract: A method performed by a user device is disclosed. The method comprising generating a secret and measuring a biometric template of a user operating the user device. The method then generates a plurality of secret shares of the secret and of the biometric template. The user device then transmits the secret shares of the secret and of the biometric template to a plurality of recovery devices. After, the user device may then initiate a recovery of the secret and measure a biometric measurement of the user. Data of the biometric measurement may be transmitted to the plurality of recovery devices, where the recovery devices perform a partial computation. The user device use the plurality of partial computations to determine a match between the biometric template and the biometric measurement. If the two biometrics match, the user device can reconstruct the secret using shares of the secret from the recovery devices.Type: ApplicationFiled: July 30, 2021Publication date: February 16, 2023Inventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel, Shengfei Gu, Sikhar Patranabis, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal, Shan Jin
-
Publication number: 20230017103Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.Type: ApplicationFiled: September 21, 2022Publication date: January 19, 2023Inventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, Jr., Keeshini Manivannan
-
Patent number: 11477164Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.Type: GrantFiled: December 12, 2019Date of Patent: October 18, 2022Assignee: Visa International Service AssociationInventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, Jr., Keeshini Manivannan
-
Publication number: 20220222353Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application are disclosed. An application that uses code libraries and information regarding known library vulnerabilities is received, then it can be determined if one or more libraries in the application is vulnerable based upon the information. For each of the one or more vulnerable libraries a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If the application test is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each vulnerable library.Type: ApplicationFiled: March 30, 2022Publication date: July 14, 2022Inventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu
-
Publication number: 20220222366Abstract: Provided are systems for conducting private set intersection (PSI) techniques with multiple parties using a data repository that include at least one processor to generate a data repository, receive, from a submission entity system associated with a submission entity, a private set intersection (PSI) data query that includes a match parameter for performing the PSI data query, transmit, to the submission entity system, a data classification encryption key, wherein the data classification encryption key is associated with a data field that corresponds to a match parameter data field of the match parameter, determine whether to authorize the PSI data query on the data repository, transmit, to the submission entity system, a data authorization encryption key based on determining to authorize the PSI data query on the data repository, and perform the PSI data query on the data repository. Methods and computer program products are also provided.Type: ApplicationFiled: January 12, 2021Publication date: July 14, 2022Inventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel
-
Patent number: 11308218Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application. An application that uses code libraries and information regarding known library vulnerabilities are received, then it identifies one or more libraries in the application that are vulnerable based upon the information. For each of the one or more vulnerable libraries, a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If an application test score on the test application is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each of the one or more vulnerable libraries.Type: GrantFiled: December 20, 2018Date of Patent: April 19, 2022Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu
-
Patent number: 11271931Abstract: Techniques for securely generating and using a “fingerprint” for authentication. A server computer receives a first data set from a user device (including a first fuzzy hash of first user data on the user device). The server computer generates a first fingerprint value based on the first data set. The server computer detects an event corresponding to a user in association with the user device. The server computer identifies a baseline fingerprint value (generated based on a baseline fuzzy hash of user data on the user device). The server computer compares the first fingerprint value to the baseline fingerprint value to generate a similarity score. The server computer may determine that the similarity score exceeds a threshold value but does not represent an exact match, and, based on the similarity score, authenticate the user and update the baseline fingerprint value based on the first fingerprint value.Type: GrantFiled: September 19, 2019Date of Patent: March 8, 2022Assignee: Visa International Service AssociationInventors: Vinjith Nagaraja, Nagaveera Venkata Su Tavvala, Jose Rios Trevino, Vamshi Ramarapu, Swapneel Mahajan, Joel Trunick, Shalini Mayor, James Myers, Raymond Brammer, Ireneusz Pazdzierniak, Shashi Velur, Feng Chi Wang, Vincent Hesener