Professional Services
Our team provides subject matter expertise to accelerate in-house R&D for artificial intelligence (AI), machine learning (ML), and real-time embedded applications. Our engineering and design services help technology officers, product architects, and developers with security optimizations and device hardening for operational efficiencies in competitive emerging markets.
From AI/ML applications to device drivers, security protocol stacks, device protection, XIoT applications, and web services, our team and strategic global partners help companies leverage emerging technologies to innovate products efficiently and cost-effectively.
Solutions Engineering with:
Turnkey Projects in AI/ML for Application Development:
Turnkey Projects in Digital Transformation for Mission Critical Devices and Cyber Physical Systems:
Innovation Lab
Entrepreneur in Residence Programs to empower innovators with a passion to build next generation AI/ML solutions powered by data science.
Data Science Based Analytics for Outcomes Driven Healthcare Policy
Licensable Patents
US 9,503,452 B1: System and method for identity recognition and affiliation of a user in a service transaction.
Data science and artificial intelligence enabled metadata analytics for user authentication and data provenance in cyberspace. Identity recognition and affiliation (IRA) of a user in a service transaction over the Internet. Trusted data driven user profiling from cyber intelligence with privacy protection.
In contrast to passkeys which use public-private asymmetric key pairs, IRA uses a personal identification number (only known to the user), device watermarking, and quantum safe symmetric keys to establish multi-factor user trust in authenticated or anonymous access to websites and online services from any device.
US 9,734,290 B2: System and method for evidence based differential analysis and incentives based healthcare policy.
Data science and artificial intelligence enabled analytics for outcomes driven healthcare policy. Evidence based analysis and incentives based healthcare policy to lower out-of-pocket expenses for beneficiaries and payout costs to insurers, with quality healthcare and a health insurance reimbursement account (HIRA) for individuals and families.
HIRA reduces the financial burden and reliance on government managed programs (such as Medicare) and increases patient responsibility for outcomes based financial incentives to improve healthcare for all beneficiaries irrespective of income bracket.
Resources
Goal: To raise awareness and share knowledge for informed decisions by the community of cybersecurity professionals (students, researchers, technology officers, product security architects) – because protecting cyberspace is a shared responsibility and a civic duty.
Duration: 90 mins
Topics:
Location: Online or Onsite.
Presenter: Srinivas Kumar
Contact us for details to schedule a presentation or setup a free consultation to learn more about our EIR programs.
Data Science Based Analytics
DATA SCIENCE BASED ANALYTICS FOR
Data Authenticity in Cyberspace
In cyberspace, the distinction between public and private is the difference between transparency and anonymity. Securing ones private credentials (passwords, biometric identification) is a matter of protecting the use (or abuse) of ones identity. In the emerging landscape of on-demand services and the gig economy, service providers prefer transparency while consumers desire anonymity. The middle ground between “need to know” and “need to share” is a “consented and contextual” mutual disclosure between entities in a service transaction. There is a third dimension to authentication and authorization in a cyber economy where assessing “intentions” is quintessential for security with obscurity. “Know Your Visitor” is critical for risk mitigation in online and on-demand services.
Service providers need to know whether the user has been authoritatively identified for verification (recognition) and the verified user’s intent based on active context and explicit consent to mitigate risks posed by anonymity (affiliation). The users need to share reasonable and minimal context about themselves to cyber-proof their credentials and protect online privacy.
Relying exclusively on “no password” biometric identification stored on secure enclaves on the user’s device, without a fail-proof identity recovery mechanism on compromise of the biometric markers, poses a serious risk to users. While use of biometric identification and two-factor offer alternate authentication methods that a user may opt for, the immediate cyber threats posed by Bots, exploits, and billions of insecure passwords requires Identity Recognition and Affiliation (IRA) in password based online transactions. Emerging technologies based on fingerprint, face, iris, pattern (typing, speed, voice) recognition verify the user at the device. IRA provides a service to verify the device (in the transaction) and the user (device owner) by means of a device watermark and personal identification code on the user side, with corroborated active affiliation intelligence to re-verify the user on the service provider side.
Our broker service offers a simple yet powerful set of APIs for developers of web, mobile and desktop applications to leverage user consented and corroborated affiliation intelligence for privacy-friendly online services rooted in trusted (yet anonymous) identity recognition. Dovetailing dynamic attribution with static biometric identification and/or two-factor authentication enables cyber-proofing online services with non-repudiable subject awareness. This helps service providers verify authenticated consumers with affiliation intelligence, mitigate surveillance risks by unmasking anonymous users with privacy protection, and prevent service exploits by Bots.
Our service provides online consumers a simple user experience without requiring an external ancillary device for strong authentication and password locking. This alleviates cyber identity risks caused by password exploits (stolen or guessed passwords), watering hole attacks (website targeting) and phishing attacks (social engineering). With password locking and exploit protection, the user experience independent of device form factor (desktop, laptop, smartphone, public kiosk) is simplified without requiring to memorize multiple passwords and PINs.
GAP Analysis
Emerging technology trends, to simplify and accelerate the authentication ceremony pivot around “passwordless” based on biometric identification, “two factor” with a secondary device, or a “password manager”. There is no magic bullet to kill passwords altogether. In this context, Identity Recognition and Affiliation (IRA) offers non-disruptive options to benefit online consumers and service providers.
Passwordless Authentication
Identity Recognition
Identity Affiliation
DATA SCIENCE BASED ANALYTICS FOR
Outcomes Driven Healthcare Policy
Our methodology is to apply evidence-based regression analysis in the field of healthcare to develop effective activities and strategies to bend the cost curve. Our innovative software-based service leverages historic member data and statistical methods to analyze and estimate future risk factors, treatment costs, out-of-pocket expenses, and direct payments by insurance companies. We advocate a public healthcare system that provides a carrot-and-stick approach to reduce the costs by transforming today’s cost-centric industry into a profit-centric enterprise that benefits the insured, insurer, and healthcare providers.
Our solution would help reduce the burden to tax-payers on ailing government-operated programs (such as Medicare and Medicaid), reduce coverage risks to insurance companies, lower insurance premiums to recipients, and increase access to affordable healthcare to all. The key element of our approach is to empower the people to help themselves to better health by achieving a healthy body-mass-index with performance-based incentives.
Team
Contact us for details
If you need professional engineering services in turnkey projects for embedded software development or application integration with secure transport protocols, or you are an entrepreneur exploring innovative solutions based on data science for analytics in the healthcare or cybersecurity industry, please contact us for details.