Dr. Sanjoy Paul, MBA (Wharton), IEEE Fellow

Dr. Sanjoy Paul, MBA (Wharton), IEEE Fellow

Sugar Land, Texas, United States
12K followers 500+ connections

About

I am a strategic, mission-driven global consulting executive that serves as the fuel to…

Articles by Dr. Sanjoy

Activity

Join now to see all activity

Experience

  • University of Maryland, Department of Electrical and Computer Engineering

  • -

    Houston, Texas, United States

  • -

    Houston, Texas, United States

  • -

    Houston, TX

  • -

    San Francisco Bay Area

  • -

    San Francisco Bay Area

  • -

    Mountain View, CA

  • -

    Houston, Texas Area

  • -

    Bangalore, India

  • -

    Bengaluru Area, India

  • -

    Holmdel and Whippany, New Jersey, USA

Education

Licenses & Certifications

Patents

  • Dynamic authentication technology

    Issued US 10049361

  • Community energy management system

    Issued US 9798298

  • Biometric recognition

    Issued US 9747498

  • Travel Management

    Issued US 9720930

  • Multimodal biometric profiling

    Issued US 9672581

    Abstract: Multimodal biometric profiling may include receiving a cover image and a biometric template for a person. An indication of a security requirement related to biometric profiling for the person may be received. A threshold value may be determined based on the indicated security requirement. The threshold value may be used to limit a number of biometric template bits of the biometric template that are embedded in a predetermined bit position of a cover image pixel of the cover image…

    Abstract: Multimodal biometric profiling may include receiving a cover image and a biometric template for a person. An indication of a security requirement related to biometric profiling for the person may be received. A threshold value may be determined based on the indicated security requirement. The threshold value may be used to limit a number of biometric template bits of the biometric template that are embedded in a predetermined bit position of a cover image pixel of the cover image based on cover image intensity associated with the predetermined bit position.

  • Multimodal biometric profiling

    Issued US 9672581

  • Adaptive architecture for a mobile application based on rich application, process, and resource contexts and deployed in resource constrained environments

    Issued US 9619254

    Abstract: A method for adapting execution of an application on a mobile device may be performed by a mobile device including a processor and a memory. The method may include receiving an application context, a process context, and one other context. The method also includes analyzing at least one of the application context or the process context together with the one other context. The method also includes dynamically adapting execution of the application on the mobile device based on the…

    Abstract: A method for adapting execution of an application on a mobile device may be performed by a mobile device including a processor and a memory. The method may include receiving an application context, a process context, and one other context. The method also includes analyzing at least one of the application context or the process context together with the one other context. The method also includes dynamically adapting execution of the application on the mobile device based on the analysis. Adapting execution of the application may include transferring processing related to the application to a backend server for processing.

  • Biometric authentication technology

    Issued US 9600730

    Abstract: Biometric authentication technology, in which biometric data is maintained for a group of people. The biometric data includes sorted similarity scores, where each of the sorted similarity scores is computed to represent similarity between a corresponding biometric image and a reference image. A biometric verification system accesses a biometric image of at least a portion of a person, accesses the reference image, and computes a similarity score that represents similarity between the…

    Abstract: Biometric authentication technology, in which biometric data is maintained for a group of people. The biometric data includes sorted similarity scores, where each of the sorted similarity scores is computed to represent similarity between a corresponding biometric image and a reference image. A biometric verification system accesses a biometric image of at least a portion of a person, accesses the reference image, and computes a similarity score that represents similarity between the accessed biometric image and the reference image. The biometric verification system searches the sorted similarity scores included in the biometric data using the computed similarity score and outputs a result based on the searching.

  • Biometric matching technology

    Issued US 9582723

    Abstract: Biometric matching technology, in which a watch list is managed, multiple images of a potential suspect are accessed, and parallel pre-processing of the multiple images is controlled. Based on the pre-processing, an image of the potential suspect to use in matching against the watch list is determined and the determined image is used to search sorted biometric data included in the watch list. A subset of persons from the watch list is identified based on the search and parallel…

    Abstract: Biometric matching technology, in which a watch list is managed, multiple images of a potential suspect are accessed, and parallel pre-processing of the multiple images is controlled. Based on the pre-processing, an image of the potential suspect to use in matching against the watch list is determined and the determined image is used to search sorted biometric data included in the watch list. A subset of persons from the watch list is identified based on the search and parallel analysis of the determined image of the potential suspect against detailed biometric data associated with the subset of persons in the watch list is controlled. Based on the parallel analysis, it is determined whether the potential suspect matches a person in the watch list and a result is outputted based on the determination.

  • Adaptive sensor data selection and sampling based on current and future context

    Issued US 9568895

    Abstract: A method for controlling a sensor may be performed by a mobile device including a processor and a memory. The method may include receiving raw data from the sensor, classifying the raw data into a context value, interpreting the context value into a higher-level context, receiving a predicted context based on the higher-level context, and controlling the sensor based on the predicted context. Controlling the sensor may include controlling a frequency at which raw data is received from…

    Abstract: A method for controlling a sensor may be performed by a mobile device including a processor and a memory. The method may include receiving raw data from the sensor, classifying the raw data into a context value, interpreting the context value into a higher-level context, receiving a predicted context based on the higher-level context, and controlling the sensor based on the predicted context. Controlling the sensor may include controlling a frequency at which raw data is received from the sensor, or an on/off state of the sensor. Control of the sensor may also be based on both the higher-level context and the predicted context.

  • Biometric authentication technology

    Issued US 9558415

    Abstract: Biometric authentication technology, in which biometric data is maintained for a group of people. The biometric data includes sorted similarity scores, where each of the sorted similarity scores is computed to represent similarity between a corresponding biometric image and a reference image. A biometric verification system accesses a biometric image of at least a portion of a person, accesses the reference image, and computes a similarity score that represents similarity between the…

    Abstract: Biometric authentication technology, in which biometric data is maintained for a group of people. The biometric data includes sorted similarity scores, where each of the sorted similarity scores is computed to represent similarity between a corresponding biometric image and a reference image. A biometric verification system accesses a biometric image of at least a portion of a person, accesses the reference image, and computes a similarity score that represents similarity between the accessed biometric image and the reference image. The biometric verification system searches the sorted similarity scores included in the biometric data using the computed similarity score and outputs a result based on the searching.

  • Dynamic ETA and STA transportation system

    Issued US 9530314

    Abstract: A transportation system may store a standard time of arrival table including standard time of arrivals for fixed stops and waypoints or geo-sections. Delay of a vehicle reaching a fixed stop is determined and may be used to determine an estimated time of arrival to a destination on the route. Delay may be determined in response to traversing the waypoints or geo-sections on the route, and the estimated time of arrival may be updated according to the delay at each waypoint or…

    Abstract: A transportation system may store a standard time of arrival table including standard time of arrivals for fixed stops and waypoints or geo-sections. Delay of a vehicle reaching a fixed stop is determined and may be used to determine an estimated time of arrival to a destination on the route. Delay may be determined in response to traversing the waypoints or geo-sections on the route, and the estimated time of arrival may be updated according to the delay at each waypoint or geo-section.

  • Secure online distributed data storage services

    Issued US 9483657

    Abstract: The data vaporizer provides secure online distributed data storage services that securely store and retrieve data in a public distributed storage substrate such as public cloud. The data vaporizer vaporizes (e.g., fragmented into tiny chunks of configurable sizes) data and distributes the fragments to multiple storage nodes so that the data is not vulnerable to local disk failures, secures data so that even if some of the storage nodes are compromised, the data is undecipherable to…

    Abstract: The data vaporizer provides secure online distributed data storage services that securely store and retrieve data in a public distributed storage substrate such as public cloud. The data vaporizer vaporizes (e.g., fragmented into tiny chunks of configurable sizes) data and distributes the fragments to multiple storage nodes so that the data is not vulnerable to local disk failures, secures data so that even if some of the storage nodes are compromised, the data is undecipherable to the attacker, stores data across multiple cloud storage providers and/or parties using keys (e.g., tokens) provided by multiple parties (including the owners of the data) and maintains data confidentiality and integrity even where one or more data storage provider is compromised. The data vaporizer is configurable for different domain requirements including data privacy and anonymization requirements, encryption mechanisms, regulatory compliance of storage locations, and backup and recovery constraints.

  • Biometric matching technology

    Issued US 9483689

  • Method and system for caching streaming multimedia on the internet

    Issued US 9462074

    Abstract: An apparatus and method to enhance existing caches in a network to better support streaming media storage and distribution. Helper machines are used inside the network to implement several methods which support streaming media including segmentation of streaming media objects into smaller units, cooperation of Helper machines, and novel placement and replacement policies for segments of media objects.

  • Multimodal biometric profiling

    Issued US 9424478

    Abstract: Multimodal biometric profiling may include receiving a cover image and a biometric template for a person. An indication of a security requirement related to biometric profiling for the person may be received. A threshold value may be determined based on the indicated security requirement. The threshold value may be used to limit a number of biometric template bits of the biometric template that are embedded in a predetermined bit position of a cover image pixel of the cover image…

    Abstract: Multimodal biometric profiling may include receiving a cover image and a biometric template for a person. An indication of a security requirement related to biometric profiling for the person may be received. A threshold value may be determined based on the indicated security requirement. The threshold value may be used to limit a number of biometric template bits of the biometric template that are embedded in a predetermined bit position of a cover image pixel of the cover image based on cover image intensity associated with the predetermined bit position.

  • Intelligent application back stack management

    Issued US 9405578

    Abstract: Intelligent application back stack management may include generating a first back stack for activities of an application that have been executed by a device that executes the application. The first back stack may include a back stack size limit. A further back stack may be generated for selected ones of the activities of the application if a total number of the activities of the application and further activities of the application exceeds the back stack size limit. The first back…

    Abstract: Intelligent application back stack management may include generating a first back stack for activities of an application that have been executed by a device that executes the application. The first back stack may include a back stack size limit. A further back stack may be generated for selected ones of the activities of the application if a total number of the activities of the application and further activities of the application exceeds the back stack size limit. The first back stack may be an in-memory back stack for the device that executes the application, and the further back stack may include an external on-device back stack for the device that executes the application and/or a Cloud storage based back stack. Intelligent application back stack management may further include regenerating an activity of the selected ones of the activities that is pulled from the further back stack.

  • Biometric Matching Technology

    Issued US 9390338

  • Situation-aware mobile travel advisory to public transport commuters

    Issued US 9373259

  • Customer-centric demand side management for utilities

    Issued US 9,329,650

  • Method and system for providing real-time communications services

    Issued US 9,305,301

  • Method and system for resource optimized, coarse and fine grained location tracking for planned journey

    Issued US 9,294,866

  • Biometric matching technology

    Issued US 9,292,749

  • Method and system for providing applications to various devices

    Issued US 9,286,045

  • Biometric recognition

    Issued US 9,262,675

  • Configurable key-based data shuffling and encryption

    Issued US 9,258,112

  • Method and system for providing real-time communications services

    Issued US 9,235,844

  • Systems and methods for replication of test results in a network environment

    Issued US 9,218,266

  • Adaptive architecture for a mobile application based on rich application, process, and resource contexts and deployed in resource constrained environments

    Issued US 9,207,957

  • Biometric matching technology

    Issued US 9,195,893

  • Adaptive sensor data selection and sampling based on current and future context

    Issued US 9,191,442

  • Method and system for caching streaming multimedia on the Internet

    Issued US 9,167,015

  • Method and system for determining a best price for multimedia content

    Issued US 9,141,962

  • Method and system for providing real time communications services by a service provider in collaboration with a communications service provider

    Issued US 9,111,288

  • Biometric Authentication Technology

    Issued US 9,020,207

  • Method and system for measuring, monitoring and controlling electrical power consumption

    Issued US 9013060

  • Method and system for providing real time communications services by a service provider in collaboration with a communications service provider

    Issued US 9,009,059

  • System and method for facilitating communication between different protocol stacks via virtual communication devices

    Issued US 8,990,428

  • Method and system for providing applications to various devices

    Issued US 8,959,536

  • Biometric matching technology

    Issued US 8,948,465

  • Methods, systems, and computer-readable media for detecting scene changes in a video

    Issued US 8,947,600

  • Method and system for performing transcoding resistant watermarking

    Issued US 8,885,871

  • Method And System For Real Time Detection Of Conference Room Occupancy

    Issued US 8,743,198

  • Method and system for seamless interaction and content sharing across multiple networks

    Issued US 8,676,908

  • System and method for protection of electrical appliances

    Issued US 8,659,865

  • Apparatus and method for fair message exchanges in distributed multi-player games

    Issued US 8,597,124

  • System and method for dynamic management and distribution of data in a data network

    Issued US 8,478,876

  • Method and system for testing an application

    Issued US 8,402,312

  • Providing an Advertisement to a Calling Party before Ringback

    Issued US 8,385,514

  • Method and system for efficient watermarking of video content

    Issued US 8,379,911

  • User message delivery to calling party device

    Issued US 8,270,590

  • Method and apparatus for enabling persistent connections with wireless networks

    Issued US 8,068,502

  • Class-based bandwidth allocation and admission control for virtual private networks with differentiated service

    Issued US 8,027,361

  • Method and apparatus for seamless roaming for wireless networks

    Issued US 7,894,407

  • Apparatus and method for fair message exchanges in distributed multi-party games

    Issued US 7,801,957

  • Apparatus and method for fair message exchanges in distributed multi-player games

    Issued US 7,584,248

  • Class-based bandwidth allocation and admission control for virtual private networks with differentiated service

    Issued US 7,577,161

  • High quality streaming multimedia

    Issued US 7,526,564

  • Distributed Network Monitoring With Bounded Link Utilization In IP Networks

    Issued US 7,502,329

  • Method And Apparatus For Providing Adaptive VPN To Enable Different Security Levels In Virtual Private Networks (VPNs)

    Issued US 7,478,427

  • Method And Apparatus For Providing User Identity Based Routing In A Wireless Communications Environment

    Issued US 7,426,195

  • Method And Apparatus For Enabling Peer-To-Peer Virtual Private Network (P2P-VPN) Services In A VPN-Enabled Network

    Issued US 7,421,736

  • Method And System For Caching Streaming Multimedia On The Internet

    Issued US 7398312

  • Method and Apparatus for Supporting Real-Time Multi-User Distributed Applications

    Issued US 7,133,927

  • Method Of Cache Replacement For Streaming Media

    Issued US 6721850

  • Method For Streaming Multimedia Information Over Public Networks

    Issued US 6708213

  • Data Streaming Using Caching Servers With Expandable Buffers And Adjustable Rate Of Data Transmission To Absorb Network Congestion

    Issued US 6405256

  • Method And Apparatus For Caching Web-Based Information

    Issued US 6389510

  • High Quality Streaming Multimedia

    Issued US 6377972

  • Method and Apparatus for Load Sharing on a Wide Area Network

    Issued US 6314465

  • Method and Apparatus for Load Sharing on a Wide Area Network

    Issued US 6314465

  • Hierarchical Rate Control Of Receivers In A Communication System Transmitting Layered Video Multicast Data With Retransmission

    Issued US 6215766

  • System and Method for Multicast Conferencing and Online discussion groups

    Issued US 6154463

  • A Layered Video Multicast Transmission System With Retransmission-Based Error Recovery

    Issued US 6148005

  • Real-Time Processing for Virtual Circuits in Packet Switching

    Issued US 6122275

  • Efficient Unified Replication and Caching Protocol

    Issued US 6088721

  • Method of Multicasting

    Issued US 5905871

  • Method and System for Data Transfer in the Presence of Disconnects

    Issued US 5751719

  • Methods for Providing Secure Access to Shared Information

    Issued US 5719938

  • Methods and Apparatus for Generating Conformance Test Sequences

    Issued US 5623499

  • Adaptive Forward Error

    Issued US 5600663

  • Asymmetric Protocol for Wireless Communications

    Issued US 5570367

  • A method of Multicasting

    Issued US 5541927

  • Anonymous Credit Card

    Issued US 5420926

  • Electronic Publishing

    Issued US 5509074

  • Community energy management system

    US 9798298

  • Method and system for preauthenticating a mobile node

    US 9491619

    Abstract: A method of preauthenticating a mobile node in advance of a switch from a current point of attachment (CPoA) to a next point of attachment (NPoA) is disclosed. One or more preauthentication requests are received at the CPoA. The one or more preauthentication requests include a proxy assignment from the mobile node. Each of the one or more preauthentication requests corresponds to one of one or more possible points of attachment (PPoAs). Using the CPoA, the mobile node is…

    Abstract: A method of preauthenticating a mobile node in advance of a switch from a current point of attachment (CPoA) to a next point of attachment (NPoA) is disclosed. One or more preauthentication requests are received at the CPoA. The one or more preauthentication requests include a proxy assignment from the mobile node. Each of the one or more preauthentication requests corresponds to one of one or more possible points of attachment (PPoAs). Using the CPoA, the mobile node is preauthenticated with the one or more PPoAs using a transitivity of trust between the mobile node, the CPoA, and one or more authentication servers.

Honors & Awards

  • • Distinguished Alumnus Award, IIT, Awarded to 5-8 alumni each year out of 10,000, Kharagpur, India, 2015

    -

  • • IEEE Fellow, awarded to the top 0.1% of IEEE members worldwide, 2004

    -

  • • Infosys Excellence Award for Innovations and Thought Leadership, awarded to the most innovative product of the year, 2010

    -

  • • MIT Technology Reviews’ Grand Challenges for India, Awarded to the most successful project solving societal problems, 2011

    -

  • • Schwarzkopf Prize for Technological Innovation, awarded to the most innovative project of the year, 2010

    -

  • • Thomas Alva Edison Patent Award, New Jersey R&D Council, Awarded to the most influential patent of the year, 2013

    -

  • • William R. Bennett Prize for the best original paper in IEEE/ACM Transactions on Networking, 1997

    -

Recommendations received

3 people have recommended Dr. Sanjoy

Join now to view

More activity by Dr. Sanjoy

View Dr. Sanjoy’s full profile

  • See who you know in common
  • Get introduced
  • Contact Dr. Sanjoy directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses