Patents by Inventor Dharmender Kumar Satija

Dharmender Kumar Satija has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190289025
    Abstract: The invention describes a system and method employing machine learning and artificial intelligence engines to monitor data streams in real-time across multiple channels in order to detect anomalies and generate prioritized alerts. In particular, the invention may continuously collect data across multiple channels. The obtained data may be compared with reference data to continuously update a confidence level associated with the user, channel, entity, or other identifying factor. Based on the confidence level, profile the user to detect any inconsistencies in the data collected over time and generate an alert to the user in question and potentially to other downstream users or entities. In this way, the invention not only provides a way to detect anomalies in a cross-channel fashion, but also creates a mechanism for feedback wherein the system may incorporate user feedback to resolve alerts and detected anomalies.
    Type: Application
    Filed: March 14, 2018
    Publication date: September 19, 2019
    Inventors: Eren Kursun, Craig D. Widmann, Dharmender Kumar Satija, Andrew DongHo Kim, Shawn Parris Bench, Kolt Arthur Bell, Scott Anderson Sims
  • Publication number: 20190272360
    Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for identification of normal state authenticity indicators for user and entity authentication into applications in real-time to prevent misappropriation at the point of authenticity. In this way, the system uses multiple modeling processes for identification of authentic access requests to prevent misappropriation including utilizing phase-based characterization of different perspectives to make real-time determinations on authenticity of an interaction and/or misappropriation likelihood. The invention relies on multiple characteristics and models in simultaneous utilization for real-time authenticity decisions.
    Type: Application
    Filed: March 1, 2018
    Publication date: September 5, 2019
    Inventors: Eren Kursun, Dharmender Kumar Satija
  • Publication number: 20190272361
    Abstract: The invention is a novel system that uses a continuous and competitive authentication process to identify users within an entity's systems. In particular, the invention may continuously collect authentication data across multiple channels (e.g., authentication data obtained through a mobile app, website, telephone, on-site methods, and the like) as well as non-authentication data. The obtained data may be compared with reference data (e.g., historical data) to continuously update a confidence level associated with the user. Based on the confidence level, profile the user to detect any inconsistencies in the data collected over time. The system may further execute one or more competitive processes in parallel with traditional authentication processes to identify potentially unauthorized users.
    Type: Application
    Filed: March 1, 2018
    Publication date: September 5, 2019
    Inventors: Eren Kursun, Scott Anderson Sims, Dharmender Kumar Satija, David Eugene Swain, Kolt Arthur Bell
  • Publication number: 20190132336
    Abstract: Systems, computer program products, and methods are described herein for the creation of an exposure identification and distribution system for across silo channel integration. In this way, the system allows team integration of data across rails and silos for exposure identification. As such, the system generates a centralized repository for data and a communication linkage across the various systems used for identifying exposure and manipulated for linkage via a specific taxonomy overlay. Furthermore the system also includes logic that, when identification of a potential exposure indicate occurs, the system may communicate via distribution over the rails for integration and sharing for cross entity exposure identification.
    Type: Application
    Filed: October 30, 2017
    Publication date: May 2, 2019
    Inventors: Scott Anderson Sims, Kolt Arthur Bell, Michael Joseph Carroll, Andrew DongHo Kim, Elliot Piatetsky, Stephen M. Schneeweis, Michael E. Toth, Craig D. Widmann, Dharmender Kumar Satija, Sai Kishan Alapati, Hitesh J. Shah
  • Publication number: 20190130098
    Abstract: Systems, computer program products, and methods are described herein for cross platform user event record aggregation system. The present invention is configured to receive one or more exposure events from one or more detection systems; determine that a combination of at least a portion of the one or more exposure events indicates an intrusion in at least one of the one or more detection systems, thereby requiring elevated review of each exposure event; initiate the elevated review based on at least the indication of the intrusion; determine whether the intrusion is benign or harmful; and re-train the machine learning algorithm based on at least determining whether the intrusion is benign or harmful, thereby adjusting the score for future incidents of each exposure event in the combination of at least a portion of the one or more exposure events.
    Type: Application
    Filed: October 30, 2017
    Publication date: May 2, 2019
    Inventors: Scott Anderson Sims, Kolt Arthur Bell, Michael Joseph Carroll, Elliot Piatetsky, Stephen M. Schneeweis, Craig D. Widmann, Dharmender Kumar Satija, Sai Kishan Alapati
  • Publication number: 20190132328
    Abstract: Systems, computer program products, and methods are described herein for elevated authentication model using cross-channel data. The present invention is configured to receive one or more exposure events from a detection system, wherein at least one of the one or more exposure events indicates that a user has failed an authentication requirement in at least one communication channel associated with the detection system; store the one or more exposure events in a centralized repository; determine one or more other communication channels across the one or more detection systems available for access to the user; and increase an authentication requirement of the user in the one or more other communication channels, wherein increasing the authentication requirement further comprises increasing an authentication level required to enable the user to access at least one of the one or more functions associated with at least one of the one or more applications.
    Type: Application
    Filed: October 30, 2017
    Publication date: May 2, 2019
    Inventors: Scott Anderson Sims, Kolt Arthur Bell, Michael Joseph Carroll, Andrew DongHo Kim, Elliot Piatetsky, Stephen M. Schneeweis, Michael E. Toth, Craig D. Widmann, Dharmender Kumar Satija, Sai Kishan Alapati
  • Publication number: 20150379627
    Abstract: An integrated financial application management device having a consolidated system that may allow users to access one or more financial applications and/or functions, wherein said users are subject to different regulations governing access to various types of financial information. The integrated financial application management device may provide a tailored user interface such that information that is visible to the user is customized based upon login information identifying a user as, among others, a customer of a financial institution, a fiduciary, or a broker-dealer.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventors: Dharmender Kumar Satija, Ashwin Roongta, Chris Butler