Patents by Inventor Jai Rawat

Jai Rawat has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7330876
    Abstract: A method and system of implementing recorded data for automating interactions which occur across the Internet includes storing data at a central Web server adapted for maintaining a database. Responsive to a program script requesting data, computer program code at the central Web server selectively extracts stored data from the database, manipulates the data in accordance with the request, and supplies the manipulated data in a desired format.
    Type: Grant
    Filed: October 13, 2000
    Date of Patent: February 12, 2008
    Assignee: AOL LLC, a Delaware limited liability company
    Inventors: Jai Rawat, Silvia Doundakova, Vladmir Fridman, Rajalakshmi Subramanian, Geoffrey George Chemmannoor, Kespragada Ravi Shankar, Subbu Gandrala, Simon Waddington, Benedict T. S. Gladstone
  • Patent number: 7281029
    Abstract: A method and system for capturing data for automating interactions occurring across the Internet includes storing data at a central Web server adapted for maintaining a database. Responsive to a program script requesting data, computer program code at the central Web server selectively extracts stored data from the database, manipulates the data in accordance with the request, and supplies the manipulated data in a desired format. The program script is also able to capture manually entered data to the database when new request data is entered manually after the normal form submission.
    Type: Grant
    Filed: May 13, 2003
    Date of Patent: October 9, 2007
    Assignee: AOL LLC, a Delaware limited liability company
    Inventor: Jai Rawat
  • Publication number: 20070112688
    Abstract: A method and apparatus for performing secure online transactions provides a user interface that is intuitive and easily to understand. The invention integrates an online wallet service with credit card issuers that provide online credit card authentication services. The method provides a keypad interface for PIN entry, or an interface that resembles an offline transaction receipt. The apparatus that stores personal information and credit card information uses a level-two authentication password to protect the user's credit card information. The invention integrates with the credit card issuer when a personal identification number is required for the user to perform online transactions by the credit card issuer. The embodiments include integrations when the level-two authentication password is equivalent to the personal identification number and that when they or not equivalent.
    Type: Application
    Filed: January 12, 2007
    Publication date: May 17, 2007
    Inventors: Vasileios Zissimopoulos, Jai Rawat, John Marshall
  • Patent number: 7200577
    Abstract: A method and apparatus for performing secure online transactions provides a user interface that is intuitive and easily to understand. The invention integrates an online wallet service with credit card issuers that provide online credit card authentication services. The method provides a keypad interface for PIN entry, or an interface that resembles an offline transaction receipt. The apparatus that stores personal information and credit card information uses a level-two authentication password to protect the user's credit card information. The invention integrates with the credit card issuer when a personal identification number is required for the user to perform online transactions by the credit card issuer. The embodiments include integrations when the level-two authentication password is equivalent to the personal identification number and that when they or not equivalent.
    Type: Grant
    Filed: May 1, 2002
    Date of Patent: April 3, 2007
    Assignee: America Online Incorporated
    Inventors: Vasileios “Bill” Zissimopoulos, Jai Rawat, John Marshall
  • Publication number: 20070025313
    Abstract: A method for monitoring a selected region of an airspace associated with local area networks of computing devices is provided. The method includes providing one or more segments of a legacy local area network to be protected in a selected geographic region. The legacy local area network is characterized by an unsecured airspace within the selected geographic region. The method includes determining a security policy associated with the one or more segments of the legacy local area network. The security policy at least characterizes a type of wireless activity in the unsecured airspace to be permitted, denied, or ignored. Additionally, the method includes connecting one or more sniffer devices into the legacy local area network. The one or more sniffer devices are spatially disposed within the selected geographic region to cause at least a portion of the unsecured airspace to be secured according to the security policy.
    Type: Application
    Filed: September 18, 2006
    Publication date: February 1, 2007
    Applicant: AirTight Networks, Inc. (F/K/A Wibhu Technologies, Inc.)
    Inventors: Pravin Bhagwat, Hemant Chaskar, David King, Jai Rawat
  • Patent number: 7154874
    Abstract: A method for monitoring a selected region of an airspace associated with local area networks of computing devices is provided. The method includes providing one or more segments of a legacy local area network to be protected in a selected geographic region. The legacy local area network is characterized by an unsecured airspace within the selected geographic region. The method includes determining a security policy associated with the one or more segments of the legacy local area network. The security policy at least characterizes a type of wireless activity in the unsecured airspace to be permitted, denied, or ignored. Additionally, the method includes connecting one or more sniffer devices into the legacy local area network. The one or more sniffer devices are spatially disposed within the selected geographic region to cause at least a portion of the unsecured airspace to be secured according to the security policy.
    Type: Grant
    Filed: November 14, 2005
    Date of Patent: December 26, 2006
    Assignee: AirTight Networks, Inc.
    Inventors: Pravin Bhagwat, Hemant Chaskar, David C. King, Jai Rawat
  • Publication number: 20060193300
    Abstract: Method and system for monitoring a plurality of network segments in a local area network within a selected geographic region is provided. The monitoring is performed to check compliance with one or more wireless security policies. The method comprises providing a network monitoring device and coupling the network monitoring device to a connection port of the local are network. Moreover, the method includes providing one or more sniffers that are adapted to interact with a wireless medium. The sniffers are spatially disposed within and/or in a vicinity of the selected geographic region. The method includes determining a connectivity status of at least one wireless access device to the local area network.
    Type: Application
    Filed: August 29, 2005
    Publication date: August 31, 2006
    Applicant: AirTight Networks, Inc. (F/K/A Wibhu Technologies, Inc.)
    Inventors: Jai Rawat, Jatin Parekh
  • Publication number: 20060153153
    Abstract: A method for monitoring a selected region of an airspace associated with local area networks of computing devices is provided. The method includes providing one or more segments of a legacy local area network to be protected in a selected geographic region. The legacy local area network is characterized by an unsecured airspace within the selected geographic region. The method includes determining a security policy associated with the one or more segments of the legacy local area network. The security policy at least characterizes a type of wireless activity in the unsecured airspace to be permitted, denied, or ignored. Additionally, the method includes connecting one or more sniffer devices into the legacy local area network. The one or more sniffer devices are spatially disposed within the selected geographic region to cause at least a portion of the unsecured airspace to be secured according to the security policy.
    Type: Application
    Filed: November 14, 2005
    Publication date: July 13, 2006
    Applicant: AirTight Networks, Inc. (F/K/A Wibhu Technologies, Inc.)
    Inventors: Pravin Bhagwat, Hemant Chaskar, David King, Jai Rawat
  • Patent number: 7002943
    Abstract: A method for monitoring a selected region of an airspace associated with local area networks of computing devices is provided. The method includes providing one or more segments of a legacy local area network to be protected in a selected geographic region. The legacy local area network is characterized by an unsecured airspace within the selected geographic region. The method includes determining a security policy associated with the one or more segments of the legacy local area network. The security policy at least characterizes a type of wireless activity in the unsecured airspace to be permitted, denied, or ignored. Additionally, the method includes connecting one or more sniffer devices into the legacy local area network. The one or more sniffer devices are spatially disposed within the selected geographic region to cause at least a portion of the unsecured airspace to be secured according to the security policy.
    Type: Grant
    Filed: October 15, 2004
    Date of Patent: February 21, 2006
    Assignee: AirTight Networks, Inc.
    Inventors: Pravin Bhagwat, Hemant Chaskar, David C. King, Jai Rawat
  • Patent number: 6981028
    Abstract: A method and system of implementing recorded data for automating interactions which occur across the Internet includes storing data at a central Web server adapted for maintaining a database. Responsive to a program script requesting data, computer program code at the central Web server selectively extracts stored data from the database, manipulates the data in accordance with the request, and supplies the manipulated data in a format desired by the requesting program script.
    Type: Grant
    Filed: April 28, 2000
    Date of Patent: December 27, 2005
    Assignee: Obongo, Inc.
    Inventors: Jai Rawat, Samir Palnitkar
  • Publication number: 20050256841
    Abstract: A method and system of implementing recorded data for automating interactions which occur across the Internet includes storing data at a central Web server adapted for maintaining a database. Responsive to a program script requesting data, computer program code at the central Web server selectively extracts stored data from the database, manipulates the data in accordance with the request, and supplies the manipulated data in a format desired by the requesting program script.
    Type: Application
    Filed: June 28, 2005
    Publication date: November 17, 2005
    Inventors: Jai Rawat, Samir Palnitkar
  • Publication number: 20050198580
    Abstract: Graphic screen names are used instead of using text screen names in a Web chat room or an instant messaging system so that screen scrapers cannot generate an e-mail list for spam by extracting the screen names from the Web chat room or instant messaging system.
    Type: Application
    Filed: March 5, 2004
    Publication date: September 8, 2005
    Inventors: Morgan Hua, Jai Rawat
  • Publication number: 20050128989
    Abstract: A method for monitoring a selected region of an airspace associated with local area networks of computing devices is provided. The method includes providing one or more segments of a legacy local area network to be protected in a selected geographic region. The legacy local area network is characterized by an unsecured airspace within the selected geographic region. The method includes determining a security policy associated with the one or more segments of the legacy local area network. The security policy at least characterizes a type of wireless activity in the unsecured airspace to be permitted, denied, or ignored. Additionally, the method includes connecting one or more sniffer devices into the legacy local area network. The one or more sniffer devices are spatially disposed within the selected geographic region to cause at least a portion of the unsecured airspace to be secured according to the security policy.
    Type: Application
    Filed: October 15, 2004
    Publication date: June 16, 2005
    Applicant: AirTight Networks, Inc
    Inventors: Pravin Bhagwat, Hemant Chaskar, David King, Jai Rawat
  • Publication number: 20050086068
    Abstract: A system and method for electronic wallet conversion allows conversion of a basic electronic wallet to a more flexible wallet account, providing additional services and requiring additional authentication. The basic accountholder eventually requires the additional services provided by the more flexible wallet, typically editing rights and making purchases at sites requiring authentication beyond the basic level. To convert the account, the account holder is presented with a one-time challenge and response mechanism that requires the accountholder to summon information that only the account holder would know. If a successful match is made, the account is converted to the more flexible account for all time. The accountholder replaces the one-time challenge and response with a second-level password that grants the accountholder ongoing access to more sensitive wallet features, such as the ability to purchase at sites requiring a second-level password, and editing rights to the information stored in the wallet.
    Type: Application
    Filed: October 20, 2003
    Publication date: April 21, 2005
    Inventors: Benjamin Quigley, Robert Sandler, Fletcher Jones, Rajesh Mahajan, Prakash Muppirala, David Lowe, Laura Price, Seth Goldstein, Venkatesh Subramanya, Jai Rawat
  • Publication number: 20040230647
    Abstract: A method and system for capturing data for automating interactions occurring across the Internet includes storing data at a central Web server adapted for maintaining a database. Responsive to a program script requesting data, computer program code at the central Web server selectively extracts stored data from the database, manipulates the data in accordance with the request, and supplies the manipulated data in a desired format. The program script is also able to capture manually entered data to the database when new request data is entered manually after the normal form submission.
    Type: Application
    Filed: May 13, 2003
    Publication date: November 18, 2004
    Inventor: Jai Rawat
  • Publication number: 20040111374
    Abstract: An intelligent method of e-commerce order completion automatically completes an order using either stored billing information, or information supplied at purchase if none is stored. User sends an order to a merchant. On receipt, user's authentication level is checked. If user is authenticated and billing information has been stored, it is retrieved and order completed without further user action. When none has been stored, flow redirects to a digital form for entering billing information, whereupon order is completed. In this case, after order completion, the user may save billing information to create a new digital wallet. To create the wallet, if the user isn't authenticated, or is insufficiently authenticated, they are first prompted to authenticate. Upon wallet creation, the user is fully authenticated and can complete purchases quickly without providing billing information with every purchase.
    Type: Application
    Filed: December 6, 2002
    Publication date: June 10, 2004
    Inventors: Seth Goldstein, Rajesh Mahajan, Prakash Muppirala, Benjamin L. Quigley, Jai Rawat, Venkatesh Subramanya, Vincent Tran
  • Publication number: 20040068693
    Abstract: Client side program code examines electronic documents such as web pages and automatically fills out fields of forms contained in the document with the appropriate data from a user profile, without requiring prior mapping or examination of the form. The application maps user data to the appropriate form field by examining label text on the form as the user sees it, i.e. text that is visually nearest the field. For fields lacking labels, the application examines the field context to determine the required data. To enter the information in the correct format, the application parses visual hints concerning, for example, the date format provided to the user and formats the data accordingly. In the absence of any usable visual cues or contextual information, the program code parses the form's underlying markup code.
    Type: Application
    Filed: October 6, 2003
    Publication date: April 8, 2004
    Inventors: Jai Rawat, Ajoy Kumar Bhatia, Vasileios ?quot;Bill?quot; Zissimopoulos
  • Patent number: 6662340
    Abstract: Client side program code examines electronic documents such as web pages and automatically fills out fields of forms contained in the document with the appropriate data from a user profile, without requiring prior mapping or examination of the form. The application maps user data to the appropriate form field by examining label text on the form as the user sees it, i.e. text that is visually nearest the field. For fields lacking labels, the application examines the field context to determine the required data. To enter the information in the correct format, the application parses visual hints concerning, for example, the date format provided to the user and formats the data accordingly. In the absence of any usable visual cues or contextual information, the program code parses the form's underlying markup code.
    Type: Grant
    Filed: May 30, 2002
    Date of Patent: December 9, 2003
    Assignee: America Online, Incorporated
    Inventors: Jai Rawat, Ajoy Kumar Bhatia, Vasileios Bill Zissimopoulos
  • Publication number: 20030208682
    Abstract: A method and apparatus for performing secure online transactions provides a user interface that is intuitive and easily to understand. The invention integrates an online wallet service with credit card issuers that provide online credit card authentication services. The method provides a keypad interface for PIN entry, or an interface that resembles an offline transaction receipt. The apparatus that stores personal information and credit card information uses a level-two authentication password to protect the user's credit card information. The invention integrates with the credit card issuer when a personal identification number is required for the user to perform online transactions by the credit card issuer. The embodiments include integrations when the level-two authentication password is equivalent to the personal identification number and that when they or not equivalent.
    Type: Application
    Filed: May 1, 2002
    Publication date: November 6, 2003
    Inventors: Vasileios Bill Zissimopoulos, Jai Rawat, John Marshall
  • Publication number: 20020174185
    Abstract: A method and system of automating capture of electronic data provide a user with an effective universal Internet identity and e-mail address, comprehensive e-mail filtering and forwarding services, and e-receipt identification and data extraction. Detailed user e-mail preferences data stored at a central server may be selectively altered such that incoming correspondence is redirected in accordance with the user's preferences. Computer program code at the central server parses incoming e-mail header information and data content, selectively extracts data from identified types of correspondence, and forwards extracted data in accordance with user preferences data. Additional computer program code may manipulate the extracted data in accordance with format requirements and display the manipulated data to a user in a desired format.
    Type: Application
    Filed: May 1, 2001
    Publication date: November 21, 2002
    Inventors: Jai Rawat, Silvia Doundakova, Oswald D'sa, Julian Gordon, Renuka Kulkarni, Vijayasankar Dhanapal, Srinivas Gubbala, Santhosh Raman, Rajiv Anand