Patents by Inventor Yashwant Ramkishan Sawant

Yashwant Ramkishan Sawant has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180276610
    Abstract: A method includes determining a number of matching signal signatures within (1) ambient signal information for an order location and (2) ambient signal information for a delivery location, wherein the ambient signal information comprises signal signatures that identify a plurality of signal emitters at each location. The method also includes determining whether the delivery location matches the order location based on the number of matching signal signatures. The method further includes transmitting a message to a delivery operator indicating whether the delivery location matches the order location.
    Type: Application
    Filed: March 27, 2017
    Publication date: September 27, 2018
    Applicant: CA, Inc.
    Inventors: Yashwant Ramkishan SAWANT, Sandeep BANISETTI, Mohammed Mujeeb KALADGI, Junaid Ahmed JAMEEL
  • Publication number: 20180212960
    Abstract: Provided is a process that includes: receiving, with a first device, a request to authenticate a user; obtaining, with the first device, an unstructured-data authentication input; extracting, with the first computing device, a plurality of features of the unstructured-data authentication input to form a structured-data representation; determining, with the first device, a first instance of a value that deterministically varies; and determining, with the first device, a first encrypted value based on both the structured-data representation and the first instance of the value that deterministically varies; and sending, with the first device, the first encrypted value to a second computing device
    Type: Application
    Filed: January 25, 2017
    Publication date: July 26, 2018
    Inventors: Banisetti Sandeep, Mohammed Mujeeb Kaladgi, Yashwant Ramkishan Sawant, Ruqiya Nikhat Kaladgi
  • Publication number: 20180150836
    Abstract: Techniques are disclosed relating to generating tokens dynamically using payment keys. In some embodiments, a computer system may receive a transaction authorization request including a transaction token. The computer system may, in some embodiments, identify a transaction account number and a plurality of payment keys that were sent to a user device. Further, in some embodiments, the computer system may generate an authentication token that is usable to validate the transaction token.
    Type: Application
    Filed: November 29, 2016
    Publication date: May 31, 2018
    Inventors: Sharath L. Kumar, Sandeep Banisetti, Mohammed Mujeeb Kaladgi, Yashwant Ramkishan Sawant
  • Publication number: 20180137268
    Abstract: Techniques are disclosed relating to authenticating a user via a lock screen. In one embodiment, a computer device presents a two-dimensional matrix of elements on a display of the computing device and detects a continuous gesture performed by a user on the display over the two-dimensional matrix of elements. In some embodiments, the gesture includes a first portion selecting a first set of the elements and a second portion selecting a second set of the elements. In response to detecting the continuous gesture, the computer device authenticates the user based on the selected first set of elements and initiates performance of an action based on the second set of elements such as execution of a particular application, opening a particular file, opening a particular menu of an application, etc.
    Type: Application
    Filed: November 17, 2016
    Publication date: May 17, 2018
    Inventors: Yashwant Ramkishan Sawant, Sandeep Banisetti, Mohammed Mujeeb Kaladgi, Junaid Ahmed Jameel
  • Publication number: 20180129824
    Abstract: To protect confidential data, a mobile device determines whether the mobile device is at a location susceptible to visual capture of confidential data entered into the phone by external cameras. The mobile device determines whether focus of a display is on a field in which confidential data is entered. If the mobile device determines that it is at a location susceptible to an external imaging device visually capturing confidential data input into the input field, then the mobile device activate a light source on a same side as the screen presenting the display.
    Type: Application
    Filed: January 10, 2018
    Publication date: May 10, 2018
    Inventors: Mohammed Mujeeb Kaladgi, Jameel Ahmed Kaladgi, Ruqiya Nikhat Kaladgi, Yashwant Ramkishan Sawant
  • Patent number: 9953479
    Abstract: Techniques are disclosed relating to securing physical compartments and allowing users access via a mobile device configured to use a mobile authentication system. In some embodiments, a locking device for a physical container is configured to unlock only if both a transaction authentication system confirms successful authentication of a mobile device and an auxiliary key is present. The locking device may receive encrypted data from the mobile device via a short-range wireless connection, transmit the data to the transaction authentication system, and receive a message indicating whether authentication was successful. The mobile device may encrypt the data using a replenishment key from the transaction authentication system; therefore the authentication may decrypt the received encrypted data to confirm an identity of the mobile device. In some embodiments, disclosed techniques may allow users to use their mobile device to unlock a safety deposit box without requiring extensive infrastructure investment, e.
    Type: Grant
    Filed: March 17, 2017
    Date of Patent: April 24, 2018
    Assignee: CA, Inc.
    Inventors: Yashwant Ramkishan Sawant, Banisetti Sandeep, Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi
  • Publication number: 20180108007
    Abstract: Techniques are disclosed relating to authorization of asset sharing for transactions by other user accounts. In some embodiments, an apparatus is configured to transmit a request to a mobile device on behalf of a first user account. In some embodiments, the apparatus is configured to receive, from the mobile device in response to the request, an electronic message in a format recognized by an authorization computing system. In some embodiments, the electronic message includes a constraint for a transaction, a replenishment key, and a hash value generated based on at least a portion of other information in the message. In some embodiments, the apparatus is configured to transmit the electronic message for communication to the authorization computing system. In some embodiments, the apparatus is configured to receive transaction authorization based on a comparison of the hash value in the electronic message and a copy of the hash value from the mobile device.
    Type: Application
    Filed: October 18, 2016
    Publication date: April 19, 2018
    Inventors: Yashwant Ramkishan Sawant, Banisetti Sandeep, Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi
  • Patent number: 9904799
    Abstract: A display is presented on a screen of a mobile device having an electromagnetic radiation source. The electromagnetic radiation source is activated while confidential data is being input in an input field of the display. The electromagnetic radiation source is deactivated after completion of the confidential data in the input field of the display.
    Type: Grant
    Filed: January 21, 2016
    Date of Patent: February 27, 2018
    Assignee: CA, Inc.
    Inventors: Mohammed Mujeeb Kaladgi, Jameel Ahmed Kaladgi, Ruqiya Nikhat Kaladgi, Yashwant Ramkishan Sawant
  • Publication number: 20180018657
    Abstract: A mobile terminal performs operations that include receiving an authentic account identifier through a user interface from a user. Responsive to a request to enroll an account in a mobile wallet application executed by the processor of the mobile terminal, an enrollment request message is communicated via a network interface of the mobile terminal and a data network toward a wallet server. The enrollment request message includes an authentic account identifier received from a user. An enrollment response message containing a plurality of decoy account identifiers is receiving through the network interface from the wallet server. The plurality of decoy account identifiers are saved in a memory of the mobile terminal logically associated by a data structure with the authentic account identifier. Corresponding operations by a wallet server are disclosed.
    Type: Application
    Filed: July 18, 2016
    Publication date: January 18, 2018
    Applicant: CA, Inc.
    Inventors: Yashwant Ramkishan Sawant, Mohammed Mujeeb Kaladgi, Sandeep Banisetti, Ruqiya Nikhat Kaladgi
  • Publication number: 20170286715
    Abstract: In accordance with the teachings of the present disclosure, a method is provided for reducing the chances of shoulder surfing. The method may include determining an approximate angle of orientation of a mobile device and selecting one of first or second input key layouts, based upon the approximate angle of orientation. The first input key layout may be a standard layout of alphanumeric characters and the second input key layout may be a disordered layout of the alphanumeric characters. The method may also include displaying the selected one of the first or second input key layouts at a graphical user interface of the mobile device and receiving an input of sensitive information at the graphical user interface.
    Type: Application
    Filed: March 31, 2016
    Publication date: October 5, 2017
    Inventors: Mohammed Mujeeb KALADGI, Ruqiya Nikhat KALADGI, Jameel Ahmed KALADGI, Yashwant Ramkishan SAWANT
  • Publication number: 20170213048
    Abstract: A display is presented on a screen of a mobile device having an electromagnetic radiation source. The electromagnetic radiation source is activated while confidential data is being input in an input field of the display. The electromagnetic radiation source is deactivated after completion of the confidential data in the input field of the display.
    Type: Application
    Filed: January 21, 2016
    Publication date: July 27, 2017
    Inventors: Mohammed Mujeeb Kaladgi, Jameel Ahmed Kaladgi, Ruqiya Nikhat Kaladgi, Yashwant Ramkishan Sawant
  • Publication number: 20170185993
    Abstract: A user interface of an automated teller machine receives a first input that identifies a transaction type. Next, a near field communication reader of the ATM detects a first near field communication message from a first mobile device so that the automated teller machine can extract a first account identification information from that message. The first account identification information comprises data related to a first account associated with a first user. A second NFC message from a second mobile device associated with a second user is detected in order to extract a second account identification information from the second NFC message. The second account identification information comprises data related to a second account associated with the second user. Once the ATM has the needed information, it can initiate a transaction based on the transaction type, the first account identification information, and the second account identification information.
    Type: Application
    Filed: December 28, 2015
    Publication date: June 29, 2017
    Inventors: Yashwant Ramkishan Sawant, Mohammed Mujeeb H. Kaladgi, Mahesh M. Chitragar
  • Publication number: 20170177851
    Abstract: A device unlock pattern (“pattern password”) is static in that the same pattern is entered each time to unlock a device. Due to this repetition, a pattern password may be discovered by an application that captures touchscreen gestures, by inspection of fingerprints or smudges on a screen, or simply by an onlooker that views the pattern password being entered. A variable hint pattern can be used to impede discovery. A hint pattern is a sub-pattern (“hint”) of the pattern password to be completed for device unlock. A variable hint pattern can impede discovery by changing the sub-pattern at a defined change threshold related to unlock attempts. The device can randomly change the sub-pattern or randomly change the missing portions of the pattern password at each change threshold. As a result, different inputs complete the pattern password. This variance stymies the methods typically used to discover pattern passwords.
    Type: Application
    Filed: December 22, 2015
    Publication date: June 22, 2017
    Inventors: Yashwant Ramkishan Sawant, Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Junaid Ahmed Jameel, Jameel Ahmed Kaladgi