Patents by Inventor Iptisha Raote

Iptisha Raote has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10366129
    Abstract: A data security threat control and monitoring system and method described herein may provide visibility into users' activities and their access to sensitive information (e.g., social security number, addresses, fingerprints, and the like) in order to evaluate and mitigate, for example, insider data security threats. The system may monitor various types of activities, such as end users' behavior on applications and/or end users' access, downloads, and copies of sensitive data. The system may monitor for suspected or detected violations and incidents for applications, such as suspicious, disruptive, or policy-violating (actual or attempted) activities. A distributed file system may be used to extract data from one or more databases and to transform the data. The data may be processed, such as to generate distribution fact and dimension files. Servers, such as web servers, may generate reports indicating insider threat activity using the processed files.
    Type: Grant
    Filed: December 4, 2015
    Date of Patent: July 30, 2019
    Assignee: Bank of America Corporation
    Inventors: Candace R. Gordon, Alys Lisella, Iptisha Raote, Haresh Kurani, Parash Sharma, Steven K. Bickmore, Ravi Kiran Sonthi, Lauren Fields Doran, Deborah J. Bessent
  • Publication number: 20170163677
    Abstract: A data security threat control and monitoring system and method described herein may provide visibility into users' activities and their access to sensitive information (e.g., social security number, addresses, fingerprints, and the like) in order to evaluate and mitigate, for example, insider data security threats. The system may monitor various types of activities, such as end users' behavior on applications and/or end users' access, downloads, and copies of sensitive data. The system may monitor for suspected or detected violations and incidents for applications, such as suspicious, disruptive, or policy-violating (actual or attempted) activities. A distributed file system may be used to extract data from one or more databases and to transform the data. The data may be processed, such as to generate distribution fact and dimension files. Servers, such as web servers, may generate reports indicating insider threat activity using the processed files.
    Type: Application
    Filed: December 4, 2015
    Publication date: June 8, 2017
    Inventors: Candace R. Gordon, Alys Lisella, Iptisha Raote, Haresh Kurani, Parash Sharma, Steven K. Bickmore, Ravi Kiran Sonthi, Lauren Fields Doran, Deborah J. Bessent