Patents by Inventor Yashwant Ramkishan Sawant
Yashwant Ramkishan Sawant has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10867302Abstract: A method includes determining a match score indicative of similarities between (1) signal information associated with a current route being traveled by a user in connection with a transaction with a merchant and (2) signal information associated with an established route traveled by the user in connection with a previous transaction between the user and the merchant, wherein the signal information comprises signal signatures that identify one or more signal emitters identified along each route. The method also includes determining whether the current route matches the established route based on whether the match score is above a threshold. The method further includes if the match score is below the threshold, transmitting a message indicating that the user was not authenticated.Type: GrantFiled: May 11, 2017Date of Patent: December 15, 2020Assignee: CA, Inc.Inventors: Yashwant Ramkishan Sawant, Sandeep Banisetti, Mohammed Mujeeb Kaladgi, Junaid Ahmed Jameel
-
Patent number: 10713345Abstract: Provided is a process that includes: receiving, with a first device, a request to authenticate a user; obtaining, with the first device, an unstructured-data authentication input; extracting, with the first computing device, a plurality of features of the unstructured-data authentication input to form a structured-data representation; determining, with the first device, a first instance of a value that deterministically varies; and determining, with the first device, a first encrypted value based on both the structured-data representation and the first instance of the value that deterministically varies; and sending, with the first device, the first encrypted value to a second computing device.Type: GrantFiled: February 28, 2019Date of Patent: July 14, 2020Assignee: CA, Inc.Inventors: Banisetti Sandeep, Mohammed Mujeeb Kaladgi, Yashwant Ramkishan Sawant, Ruqiya Nikhat Kaladgi
-
Patent number: 10692074Abstract: Techniques are disclosed relating to authorization of asset sharing for transactions by other user accounts. In some embodiments, an apparatus is configured to transmit a request to a mobile device on behalf of a first user account. In some embodiments, the apparatus is configured to receive, from the mobile device in response to the request, an electronic message in a format recognized by an authorization computing system. In some embodiments, the electronic message includes a constraint for a transaction, a replenishment key, and a hash value generated based on at least a portion of other information in the message. In some embodiments, the apparatus is configured to transmit the electronic message for communication to the authorization computing system. In some embodiments, the apparatus is configured to receive transaction authorization based on a comparison of the hash value in the electronic message and a copy of the hash value from the mobile device.Type: GrantFiled: October 18, 2016Date of Patent: June 23, 2020Assignee: CA TECHNOLOGIES, INC.Inventors: Yashwant Ramkishan Sawant, Banisetti Sandeep, Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi
-
Publication number: 20200137213Abstract: A computer system includes a service terminal, a server computer system, and a mobile device and is used to facilitate a transaction between a user and the service terminal. The service terminal receives authentication information from the user and sends the authentication information to the computer server system. Before transaction resolves, the server computer system sends a request to the mobile device to gather environmental information from one or more sensors in the physical environment of the mobile device. In response, the mobile device identifies sensors, communications with one or more sensors, and receives environmental information. The mobile device sends indications of the environmental information, which the server computer system receives and evaluates. Based on the evaluating, the server computer system determines to alter the transaction, and based on the determination to alter the transaction sends a command altering the transaction to the service terminal.Type: ApplicationFiled: October 25, 2018Publication date: April 30, 2020Inventors: Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Junaid Ahmed Jamell, Yashwant Ramkishan Sawant
-
Patent number: 10599878Abstract: Technologies are provided herein and include embodiments for protecting applications and information on a user computing device and include generating a menu of icons including an application icon and a decoy icon that correspond to a mobile application in a mobile device, where the application icon is assigned to a first location in the menu and the decoy icon is assigned to a second location in the menu. The embodiment further includes communicating icon location information to the mobile application, providing the menu of icons for display on a display screen of the mobile device, receiving a first indication of user input to select the decoy icon in the menu of icons, invoking the mobile application based on the decoy icon being selected, and communicating, to the mobile application based on the decoy icon being selected, second location information indicating the second location in the menu of icons.Type: GrantFiled: November 20, 2017Date of Patent: March 24, 2020Assignee: CA, Inc.Inventors: Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Yashwant Ramkishan Sawant, Sandeep Banisetti
-
Publication number: 20190303928Abstract: According to one aspect of the present disclosure, a payment initiation request is received at a point of sale (POS) device from a user device. A challenge string stored at the POS device is transmitted from the POS device to the user device based on the payment initiation request. Payment information and a signed version of the particular challenge string are received at the POS device from the user device. The signed version of the particular challenge string is based on a private key associated with the user device and the particular challenge string. An authentication request including the signed version of the particular challenge string is transmitted from the POS device to a server device. An indication of whether the user device is authenticated is received at the POS device, from the server device, based on the authentication request, and a payment protocol is executed using the payment information.Type: ApplicationFiled: March 29, 2018Publication date: October 3, 2019Applicant: CA, Inc.Inventors: Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Yashwant Ramkishan Sawant, Sandeep Banisetti
-
Publication number: 20190297075Abstract: Techniques are disclosed relating to performing repeated secondary user authentication. An authentication computer system may receive, from a server computer system, a request to authenticate a user to a service that is provided by the server computer system. The authentication computer system may cause an out-of-band authentication message to be sent to an authentication application associated with the user. The authentication computer system may receive an authentication response including an authentication code that is generated, without user input, by the authentication application. The authentication server may determine whether to authenticate the authentication response and send an authentication indication to the server computer system.Type: ApplicationFiled: March 26, 2018Publication date: September 26, 2019Inventors: Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Yashwant Ramkishan Sawant, Sandeep Banisetti
-
Patent number: 10417449Abstract: To protect confidential data, a mobile device determines whether the mobile device is at a location susceptible to visual capture of confidential data entered into the phone by external cameras. The mobile device determines whether focus of a display is on a field in which confidential data is entered. If the mobile device determines that it is at a location susceptible to an external imaging device visually capturing confidential data input into the input field, then the mobile device activate a light source on a same side as the screen presenting the display.Type: GrantFiled: January 10, 2018Date of Patent: September 17, 2019Assignee: CA, Inc.Inventors: Mohammed Mujeeb Kaladgi, Jameel Ahmed Kaladgi, Ruqiya Nikhat Kaladgi, Yashwant Ramkishan Sawant
-
Publication number: 20190258827Abstract: An authentication server receives an item authentication query message requesting authentication of an item that is available from a computer server. An authentication score for the item is generated based on information contained in the item authentication query message. The authentication score is then provided for display at a client terminal. Authentication of the information contained in the item authentication query provides a level of computer security to end-users.Type: ApplicationFiled: February 19, 2018Publication date: August 22, 2019Applicant: CA, Inc.Inventors: Mohammed Mujeeb Kaladgi, Junaid Ahmed Jameel, Ruqiya Nikhat Kaladgi, Yashwant Ramkishan Sawant, Sangharsh Aglave
-
Patent number: 10380377Abstract: In accordance with the teachings of the present disclosure, a method is provided for reducing the chances of shoulder surfing. The method may include determining an approximate angle of orientation of a mobile device and selecting one of first or second input key layouts, based upon the approximate angle of orientation. The first input key layout may be a standard layout of alphanumeric characters and the second input key layout may be a disordered layout of the alphanumeric characters. The method may also include displaying the selected one of the first or second input key layouts at a graphical user interface of the mobile device and receiving an input of sensitive information at the graphical user interface.Type: GrantFiled: March 31, 2016Date of Patent: August 13, 2019Assignee: CA, Inc.Inventors: Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Jameel Ahmed Kaladgi, Yashwant Ramkishan Sawant
-
Patent number: 10339334Abstract: Aspects of the embodiments are directed to an augmented reality Completely Automated Public Turing test to tell Computers and Humans Apart (“captcha”). Upon determining that a user, operating a user device, is attempting to access a website, a host server can cause a camera on the user device to activate and begin streaming and image feed to the host device across a network. The host device can determine an appropriate augmentation to the image feed that is germane to the context and/or environment of what is being displayed in the image feed. The augmentation can be displayed to the user on a display of the user device. The augmentation can also include a prompt instructing the user how to interact with the augmentation. The host server can determine whether to grant the user access based on the user's interaction with the augmentation.Type: GrantFiled: May 25, 2017Date of Patent: July 2, 2019Assignee: CA, Inc.Inventors: Yashwant Ramkishan Sawant, Mohammed Mujeeb Kaladgi, Junaid Ahmed Jameel, Sandeep Banisetti
-
Publication number: 20190197228Abstract: Provided is a process that includes: receiving, with a first device, a request to authenticate a user; obtaining, with the first device, an unstructured-data authentication input; extracting, with the first computing device, a plurality of features of the unstructured-data authentication input to form a structured-data representation; determining, with the first device, a first instance of a value that deterministically varies; and determining, with the first device, a first encrypted value based on both the structured-data representation and the first instance of the value that deterministically varies; and sending, with the first device, the first encrypted value to a second computing deviceType: ApplicationFiled: February 28, 2019Publication date: June 27, 2019Inventors: Banisetti Sandeep, Mohammed Mujeeb Kaladgi, Yashwant Ramkishan Sawant, Ruqiya Nikhat Kaladgi
-
Publication number: 20190156071Abstract: Technologies are provided herein and include embodiments for protecting applications and information on a user computing device and include generating a menu of icons including an application icon and a decoy icon that correspond to a mobile application in a mobile device, where the application icon is assigned to a first location in the menu and the decoy icon is assigned to a second location in the menu. The embodiment further includes communicating icon location information to the mobile application, providing the menu of icons for display on a display screen of the mobile device, receiving a first indication of user input to select the decoy icon in the menu of icons, invoking the mobile application based on the decoy icon being selected, and communicating, to the mobile application based on the decoy icon being selected, second location information indicating the second location in the menu of icons.Type: ApplicationFiled: November 20, 2017Publication date: May 23, 2019Inventors: Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Yashwant Ramkishan Sawant, Sandeep Banisetti
-
Publication number: 20190124078Abstract: Aspects of the embodiments are directed to systems, methods, and computer program products that facilitate authentication of a user for providing authentication for access to secured services using an interactive voice response (IVR) service. A user device can include an application. The application can prompt the user to register with an authentication service to create an authentication credential. The user device can receive from the authentication service an authentication secret key. The application can prompt the user for a fingerprint scan, which the application can use to secure the authentication secret key. The user, when attempting to access a secured service, can provide another fingerprint scan to unlock the authentication secret key. The application can generate a one-time-password from the authentication secret key, and can transmit that OTP to an authentication service associated with the secured service provider.Type: ApplicationFiled: October 20, 2017Publication date: April 25, 2019Inventors: Junaid Ahmed Jameel, Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Yashwant Ramkishan Sawant
-
Patent number: 10255416Abstract: Provided is a process that includes: receiving, with a first device, a request to authenticate a user; obtaining, with the first device, an unstructured-data authentication input; extracting, with the first computing device, a plurality of features of the unstructured-data authentication input to form a structured-data representation; determining, with the first device, a first instance of a value that deterministically varies; and determining, with the first device, a first encrypted value based on both the structured-data representation and the first instance of the value that deterministically varies; and sending, with the first device, the first encrypted value to a second computing device.Type: GrantFiled: January 25, 2017Date of Patent: April 9, 2019Assignee: CA, Inc.Inventors: Banisetti Sandeep, Mohammed Mujeeb Kaladgi, Yashwant Ramkishan Sawant, Ruqiya Nikhat Kaladgi
-
Publication number: 20190057210Abstract: A method of providing a dynamic user details-based password policy includes steps of receiving a first set of information from a user and in response to receiving the first set of information, determining a first sensitivity score. The method also includes determining whether the first sensitivity score is greater than a baseline sensitivity score. The baseline sensitivity score may be based on historic account information from the user and requirements for an historic account password are based on the baseline sensitivity score. The method further includes in response to determining that the first sensitivity score is greater than the baseline sensitivity score, prompting the user to modify the historic account password to create a first password. Requirements for the first password are based on the first sensitivity score and require increased strength of the first password relative to the historic account password.Type: ApplicationFiled: August 18, 2017Publication date: February 21, 2019Inventors: Abhijeet Hanumantrao AELKATWAD, Yashwant Ramkishan SAWANT, Mehak BANSAL, Rahul Gurudas DHAVALIKAR
-
Publication number: 20180341779Abstract: Aspects of the embodiments are directed to an augmented reality Completely Automated Public Turing test to tell Computers and Humans Apart (“captcha”). Upon determining that a user, operating a user device, is attempting to access a website, a host server can cause a camera on the user device to activate and begin streaming and image feed to the host device across a network. The host device can determine an appropriate augmentation to the image feed that is germane to the context and/or environment of what is being displayed in the image feed. The augmentation can be displayed to the user on a display of the user device. The augmentation can also include a prompt instructing the user how to interact with the augmentation. The host server can determine whether to grant the user access based on the user's interaction with the augmentation.Type: ApplicationFiled: May 25, 2017Publication date: November 29, 2018Inventors: Yashwant Ramkishan Sawant, Mohammed Mujeeb Kaladgi, Junaid Ahmed Jameel, Sandeep Banisetti
-
Publication number: 20180330377Abstract: A method includes determining a match score indicative of similarities between (1) signal information associated with a current route being traveled by a user in connection with a transaction with a merchant and (2) signal information associated with an established route traveled by the user in connection with a previous transaction between the user and the merchant, wherein the signal information comprises signal signatures that identify one or more signal emitters identified along each route. The method also includes determining whether the current route matches the established route based on whether the match score is above a threshold. The method further includes if the match score is below the threshold, transmitting a message indicating that the user was not authenticated.Type: ApplicationFiled: May 11, 2017Publication date: November 15, 2018Inventors: Yashwant Ramkishan SAWANT, Sandeep BANISETTI, Mohammed Mujeeb KALADGI, Junaid Ahmed JAMEEL
-
Patent number: 10120995Abstract: A device unlock pattern (“pattern password”) is static in that the same pattern is entered each time to unlock a device. Due to this repetition, a pattern password may be discovered by an application that captures touchscreen gestures, by inspection of fingerprints or smudges on a screen, or simply by an onlooker that views the pattern password being entered. A variable hint pattern can be used to impede discovery. A hint pattern is a sub-pattern (“hint”) of the pattern password to be completed for device unlock. A variable hint pattern can impede discovery by changing the sub-pattern at a defined change threshold related to unlock attempts. The device can randomly change the sub-pattern or randomly change the missing portions of the pattern password at each change threshold. As a result, different inputs complete the pattern password. This variance stymies the methods typically used to discover pattern passwords.Type: GrantFiled: December 22, 2015Date of Patent: November 6, 2018Assignee: CA, Inc.Inventors: Yashwant Ramkishan Sawant, Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Junaid Ahmed Jameel, Jameel Ahmed Kaladgi
-
Publication number: 20180276655Abstract: Aspects of the embodiments are directed to methods, systems, and computer program products for shared mobile wallet transactions. In embodiments, a mobile device can transmit a shared mobile wallet transaction request message to a mobile device operated by a shared mobile wallet contributor across a network connection; receive, from the shared mobile wallet contributor, a wallet transaction packet, the wallet transaction packet comprising a monetary contribution value and an identifier of the shared mobile wallet contributor; create a shared mobile wallet transaction packet comprising a monetary contribution value for the user, an identifier of the user, the monetary contribution value for the shared mobile wallet contributor, and an identifier of the shared mobile wallet contributor; and transmit the shared mobile wallet transaction packet to a point of sale device across a communications link. The communications link can be a near-field communications link.Type: ApplicationFiled: March 22, 2017Publication date: September 27, 2018Inventors: Yashwant Ramkishan Sawant, Mohammed Mujeeb Kaladgi, Sandeep Banisetti, Ruqiya Nikhat Kaladgi