Patents by Inventor Ara Jermakyan
Ara Jermakyan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12111918Abstract: Methods and systems for evaluating microservice system level activities including system calls and commands, and generating security policies for microservices are disclosed. A microservice agent, operating on a microservice host, can collect system level activity data corresponding to a plurality of microservices operating on the microservice host. The microservice agent can transmit the system level activity data to a microservice evaluator that can use the system level activity data to train machine learning models to identify normal and abnormal microservice system level activities. The normal and abnormal system level activities can be used to generate security policies that can be applied to the microservices. Microservices that perform abnormal system level activities or system level activities that violate security policies can be paused or terminated.Type: GrantFiled: September 18, 2018Date of Patent: October 8, 2024Assignee: Visa International Service AssociationInventors: Ajit Gaddam, Ara Jermakyan, Pushkar Joglekar, Vlad Spichek
-
Publication number: 20240333812Abstract: Methods and systems for analyzing request to access resources and determining a resource access policy are provided. The resource access system can train, store, evaluate, and deploy machine learning models that learn to output a trust score associated with a resource access request, the trust score relating to the request's legitimacy. A resource access system can receive a request for a resource from a requesting entity. The resource access system can determine an entity profile using request data in the request. The resource access system can request data from the request to determine whether the request is normal or anomalous. Using a policy engine, the resource access system can determine a resource access policy, such as allowing or denying access to the resource.Type: ApplicationFiled: June 11, 2024Publication date: October 3, 2024Applicant: Visa International Service AssociationInventors: Ajit Gaddam, Ara Jermakyan, Pushkar Joglekar
-
Patent number: 12052218Abstract: A method and system for protecting access to remote systems, such as resource databases containing sensitive resources, such as cryptographic keys or personally identifying information, is disclosed. A server can receive a plurality of access requests from a requesting entity. The server can identify an entity profile corresponding to the access requests, as well as a machine learning model corresponding to the entity profile. The access requests can be used to form access sequences, which can be evaluated by the machine learning model. The machine learning model returns an anomaly score that can be compared to a threshold. If the anomaly score exceeds the threshold, the server can prevent further access to the remote system, for example, by revoking a credential associated with the requesting entity.Type: GrantFiled: June 28, 2018Date of Patent: July 30, 2024Assignee: Visa International Service AssociationInventors: Ajit Gaddam, Pushkar Joglekar, Ara Jermakyan
-
Patent number: 12041140Abstract: Methods and systems for analyzing request to access resources and determining a resource access policy are provided. The resource access system can train, store, evaluate, and deploy machine learning models that learn to output a trust score associated with a resource access request, the trust score relating to the request's legitimacy. A resource access system can receive a request for a resource from a requesting entity. The resource access system can determine an entity profile using request data in the request. The resource access system can request data from the request to determine whether the request is normal or anomalous. Using a policy engine, the resource access system can determine a resource access policy, such as allowing or denying access to the resource.Type: GrantFiled: April 2, 2018Date of Patent: July 16, 2024Assignee: Visa International Service AssociationInventors: Ajit Gaddam, Ara Jermakyan, Pushkar Joglekar
-
Publication number: 20240020758Abstract: Disclosed are a method and system for generating a behavior profile for a new entity. The method is performed in response to and immediately after a new entity is added to a fraud detection system. The method includes generating a doppelganger behavior profile for the new entity based on feature data of the new entity and pre-existing entities. Generating the profile includes determining a similarity score for each pre-existing entity, ranking the plurality of pre-existing entities based on the score, selecting pre-existing entities based on the ranking, and combining behavior profiles of the preexisting entities to produce the profile. The method also includes assigning the profile to the new entity and monitoring the new entity. The method further includes detecting fraud, an anomaly, and/or malicious intent based on the profile, and automatically suspending an aspect of the new entity in response to the detection.Type: ApplicationFiled: September 26, 2023Publication date: January 18, 2024Inventors: Pushkar Joglekar, Ajit Gaddam, Ara Jermakyan
-
Patent number: 11810185Abstract: A method and system for generating a behavior profile for a new entity to be added to a behavior-monitored system include receiving feature data of a new entity and feature data of a plurality of pre-existing entities from at least one data source. The plurality of pre-existing entities are associated with a plurality of pre-existing behavior profiles. A doppelganger behavior profile is determined for the new entity based at least partially on the feature data of the new entity and the feature data of the plurality of pre-existing entities, and the doppelganger behavior profile is assigned to the new entity. A target action is implemented with respect to the new entity based at least partially on the doppelganger behavior profile assigned to the new entity.Type: GrantFiled: July 12, 2017Date of Patent: November 7, 2023Assignee: Visa International Service AssociationInventors: Pushkar Joglekar, Ajit Gaddam, Ara Jermakyan
-
Publication number: 20220050897Abstract: Methods and systems for evaluating microservice system level activities including system calls and commands, and generating security policies for microservices are disclosed. A microservice agent, operating on a microservice host, can collect system level activity data corresponding to a plurality of microservices operating on the microservice host. The microservice agent can transmit the system level activity data to a microservice evaluator that can use the system level activity data to train machine learning models to identify normal and abnormal microservice system level activities. The normal and abnormal system level activities can be used to generate security policies that can be applied to the microservices. Microservices that perform abnormal system level activities or system level activities that violate security policies can be paused or terminated.Type: ApplicationFiled: September 18, 2018Publication date: February 17, 2022Inventors: Ajit Gaddam, Ara Jermakyan, Pushkar Joglekar, Vlad Spichek
-
Publication number: 20210328969Abstract: A method and system for protecting access to remote systems, such as resource datases containing sensitive resources, such as cryptographic keys or personally identifying information, is disclosed. A server can receive a plurality of access requests from a requesting entity. The server can identify an entity profile corresponding to the access requests, as well as a machine learning model corresponding to the entity profile. The access requests can be used to form access sequences, which can be evaluated by the machine learning model. The machine learning model returns an anomaly score that can be compared to a threshold. If the anomaly score exceeds the threshold, the server can prevent further access to the remote system, for example, by revoking a credential associated with the requesting entity.Type: ApplicationFiled: June 28, 2018Publication date: October 21, 2021Inventors: Ajit Gaddam, Pushkar Joglekar, Ara Jermakyan
-
Publication number: 20210319099Abstract: Methods and systems for inducing model shift in a malicious computer's machine learning model is disclosed. A data processor can determine that a malicious computer uses a machine learning model with a boundary function to determine outcomes. The data processor can then generate transition data intended to shift the boundary function and then provide the transition data to the malicious computer. The data processor can repeat generating and providing the transition data, thereby causing the boundary function to shift over time.Type: ApplicationFiled: August 23, 2018Publication date: October 14, 2021Inventors: Ajit Gaddam, Ara Jermakyan, Pushkar Joglekar
-
Publication number: 20210209512Abstract: Methods and systems for detecting and correcting model shift in machine learning models are disclosed. A computer can receive a set of input data from a data source. The computer can apply the input data to a machine learning model to produce a first set of classification data. The computer can perform a metadata test and validate the current machine learning model and the set of input data using a plurality of previously generated machine learning models. The plurality of previously generated machine learning models can produce a plurality of sets of classification data, which can be compared to the first set of classification data. Based on the comparison, the computer can determine whether the set of input data is associated with a malicious entity.Type: ApplicationFiled: August 23, 2018Publication date: July 8, 2021Inventors: Ajit Gaddam, Ara Jermakyan, Pushkar Joglekar
-
Publication number: 20210160247Abstract: Methods and systems for analyzing request to access resources and determining a resource access policy are provided. The resource access system can train, store, evaluate, and deploy machine learning models that learn to output a trust score associated with a resource access request, the trust score relating to the request's legitimacy. A resource access system can receive a request for a resource from a requesting entity. The resource access system can determine an entity profile using request data in the request. The resource access system can request data from the request to determine whether the request is normal or anomalous. Using a policy engine, the resource access system can determine a resource access policy, such as allowing or denying access to the resource.Type: ApplicationFiled: April 2, 2018Publication date: May 27, 2021Applicant: Visa International Service AssociationInventors: Ajit GADDAM, Ara JERMAKYAN, Pushkar JOGLEKAR
-
Publication number: 20210103937Abstract: A method and system for generating a behavior profile for a new entity to be added to a behavior-monitored system include receiving feature data of a new entity and feature data of a plurality of pre-existing entities from at least one data source. The plurality of pre-existing entities are associated with a plurality of pre-existing behavior profiles. A doppelganger behavior profile is determined for the new entity based at least partially on the feature data of the new entity and the feature data of the plurality of pre-existing entities, and the doppelganger behavior profile is assigned to the new entity. A target action is implemented with respect to the new entity based at least partially on the doppelganger behavior profile assigned to the new entity.Type: ApplicationFiled: July 12, 2017Publication date: April 8, 2021Inventors: Pushkar Joglekar, Ajit Gaddam, Ara Jermakyan