Patents by Inventor Pushkar Joglekar

Pushkar Joglekar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240020758
    Abstract: Disclosed are a method and system for generating a behavior profile for a new entity. The method is performed in response to and immediately after a new entity is added to a fraud detection system. The method includes generating a doppelganger behavior profile for the new entity based on feature data of the new entity and pre-existing entities. Generating the profile includes determining a similarity score for each pre-existing entity, ranking the plurality of pre-existing entities based on the score, selecting pre-existing entities based on the ranking, and combining behavior profiles of the preexisting entities to produce the profile. The method also includes assigning the profile to the new entity and monitoring the new entity. The method further includes detecting fraud, an anomaly, and/or malicious intent based on the profile, and automatically suspending an aspect of the new entity in response to the detection.
    Type: Application
    Filed: September 26, 2023
    Publication date: January 18, 2024
    Inventors: Pushkar Joglekar, Ajit Gaddam, Ara Jermakyan
  • Patent number: 11810185
    Abstract: A method and system for generating a behavior profile for a new entity to be added to a behavior-monitored system include receiving feature data of a new entity and feature data of a plurality of pre-existing entities from at least one data source. The plurality of pre-existing entities are associated with a plurality of pre-existing behavior profiles. A doppelganger behavior profile is determined for the new entity based at least partially on the feature data of the new entity and the feature data of the plurality of pre-existing entities, and the doppelganger behavior profile is assigned to the new entity. A target action is implemented with respect to the new entity based at least partially on the doppelganger behavior profile assigned to the new entity.
    Type: Grant
    Filed: July 12, 2017
    Date of Patent: November 7, 2023
    Assignee: Visa International Service Association
    Inventors: Pushkar Joglekar, Ajit Gaddam, Ara Jermakyan
  • Patent number: 11423403
    Abstract: Disclosed are methods for authorizing a transaction, including receiving a policy message, the policy message including a policy ruleset for determining whether a transaction is authorized and biometric parameters for a machine learning algorithm for authenticating an identity of a user involved in a transaction, receiving biometric measurement data associated with a biometric measurement of a user involved in the transaction, calculating an authentication score based on the biometric measurement data using the machine learning algorithm, wherein the authentication score includes an indication of whether an identity of the user is authenticated based on the biometric measurement data, determining whether the transaction satisfies the policy ruleset for determining authorization of the transaction, and transmitting a decision message, wherein the decision message includes an indication of whether the transaction satisfies the policy ruleset. Systems and computer program products are also disclosed.
    Type: Grant
    Filed: August 29, 2019
    Date of Patent: August 23, 2022
    Assignee: Visa International Service Association
    Inventors: Vlad Spichek, Ajit Gaddam, Heng Tang, Pushkar Joglekar
  • Patent number: 11281552
    Abstract: Methods and systems for evaluating metrics (e.g., quality of service metrics) corresponding to a monitored computer, detecting metric anomalies, and issuing alerts, are disclosed. A metrics collecting agent, operating on a monitored computer, collects metrics corresponding to the monitored computer and/or one or more monitored services. These metrics are transmitted to a monitoring server that dynamically determines metric thresholds corresponding to normal metrics and anomalous metrics. Using these metric thresholds, along with a machine learning model, the monitoring server can determine whether one or more metrics are anomalous, automatically issue alerts to security and operations teams, and/or transmit a control instruction to the monitored computer in order to fix the issue causing the anomalous metrics.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: March 22, 2022
    Assignee: Visa International Service Association
    Inventors: Pushkar Joglekar, Ajit Gaddam, Heng Tang
  • Publication number: 20220050897
    Abstract: Methods and systems for evaluating microservice system level activities including system calls and commands, and generating security policies for microservices are disclosed. A microservice agent, operating on a microservice host, can collect system level activity data corresponding to a plurality of microservices operating on the microservice host. The microservice agent can transmit the system level activity data to a microservice evaluator that can use the system level activity data to train machine learning models to identify normal and abnormal microservice system level activities. The normal and abnormal system level activities can be used to generate security policies that can be applied to the microservices. Microservices that perform abnormal system level activities or system level activities that violate security policies can be paused or terminated.
    Type: Application
    Filed: September 18, 2018
    Publication date: February 17, 2022
    Inventors: Ajit Gaddam, Ara Jermakyan, Pushkar Joglekar, Vlad Spichek
  • Publication number: 20210374027
    Abstract: Methods and systems for evaluating metrics (e.g., quality of service metrics) corresponding to a monitored computer, detecting metric anomalies, and issuing alerts, are disclosed. A metrics collecting agent, operating on a monitored computer, collects metrics corresponding to the monitored computer and/or one or more monitored services. These metrics are transmitted to a monitoring server that dynamically determines metric thresholds corresponding to normal metrics and anomalous metrics. Using these metric thresholds, along with a machine learning model, the monitoring server can determine whether one or more metrics are anomalous, automatically issue alerts to security and operations teams, and/or transmit a control instruction to the monitored computer in order to fix the issue causing the anomalous metrics.
    Type: Application
    Filed: April 30, 2019
    Publication date: December 2, 2021
    Inventors: Pushkar Joglekar, Ajit Gaddam, Heng Tang
  • Publication number: 20210328969
    Abstract: A method and system for protecting access to remote systems, such as resource datases containing sensitive resources, such as cryptographic keys or personally identifying information, is disclosed. A server can receive a plurality of access requests from a requesting entity. The server can identify an entity profile corresponding to the access requests, as well as a machine learning model corresponding to the entity profile. The access requests can be used to form access sequences, which can be evaluated by the machine learning model. The machine learning model returns an anomaly score that can be compared to a threshold. If the anomaly score exceeds the threshold, the server can prevent further access to the remote system, for example, by revoking a credential associated with the requesting entity.
    Type: Application
    Filed: June 28, 2018
    Publication date: October 21, 2021
    Inventors: Ajit Gaddam, Pushkar Joglekar, Ara Jermakyan
  • Publication number: 20210319099
    Abstract: Methods and systems for inducing model shift in a malicious computer's machine learning model is disclosed. A data processor can determine that a malicious computer uses a machine learning model with a boundary function to determine outcomes. The data processor can then generate transition data intended to shift the boundary function and then provide the transition data to the malicious computer. The data processor can repeat generating and providing the transition data, thereby causing the boundary function to shift over time.
    Type: Application
    Filed: August 23, 2018
    Publication date: October 14, 2021
    Inventors: Ajit Gaddam, Ara Jermakyan, Pushkar Joglekar
  • Publication number: 20210209512
    Abstract: Methods and systems for detecting and correcting model shift in machine learning models are disclosed. A computer can receive a set of input data from a data source. The computer can apply the input data to a machine learning model to produce a first set of classification data. The computer can perform a metadata test and validate the current machine learning model and the set of input data using a plurality of previously generated machine learning models. The plurality of previously generated machine learning models can produce a plurality of sets of classification data, which can be compared to the first set of classification data. Based on the comparison, the computer can determine whether the set of input data is associated with a malicious entity.
    Type: Application
    Filed: August 23, 2018
    Publication date: July 8, 2021
    Inventors: Ajit Gaddam, Ara Jermakyan, Pushkar Joglekar
  • Publication number: 20210160247
    Abstract: Methods and systems for analyzing request to access resources and determining a resource access policy are provided. The resource access system can train, store, evaluate, and deploy machine learning models that learn to output a trust score associated with a resource access request, the trust score relating to the request's legitimacy. A resource access system can receive a request for a resource from a requesting entity. The resource access system can determine an entity profile using request data in the request. The resource access system can request data from the request to determine whether the request is normal or anomalous. Using a policy engine, the resource access system can determine a resource access policy, such as allowing or denying access to the resource.
    Type: Application
    Filed: April 2, 2018
    Publication date: May 27, 2021
    Applicant: Visa International Service Association
    Inventors: Ajit GADDAM, Ara JERMAKYAN, Pushkar JOGLEKAR
  • Publication number: 20210103937
    Abstract: A method and system for generating a behavior profile for a new entity to be added to a behavior-monitored system include receiving feature data of a new entity and feature data of a plurality of pre-existing entities from at least one data source. The plurality of pre-existing entities are associated with a plurality of pre-existing behavior profiles. A doppelganger behavior profile is determined for the new entity based at least partially on the feature data of the new entity and the feature data of the plurality of pre-existing entities, and the doppelganger behavior profile is assigned to the new entity. A target action is implemented with respect to the new entity based at least partially on the doppelganger behavior profile assigned to the new entity.
    Type: Application
    Filed: July 12, 2017
    Publication date: April 8, 2021
    Inventors: Pushkar Joglekar, Ajit Gaddam, Ara Jermakyan
  • Publication number: 20210065194
    Abstract: Disclosed are methods for authorizing a transaction, including receiving a policy message, the policy message including a policy ruleset for determining whether a transaction is authorized and biometric parameters for a machine learning algorithm for authenticating an identity of a user involved in a transaction, receiving biometric measurement data associated with a biometric measurement of a user involved in the transaction, calculating an authentication score based on the biometric measurement data using the machine learning algorithm, wherein the authentication score includes an indication of whether an identity of the user is authenticated based on the biometric measurement data, determining whether the transaction satisfies the policy ruleset for determining authorization of the transaction, and transmitting a decision message, wherein the decision message includes an indication of whether the transaction satisfies the policy ruleset. Systems and computer program products are also disclosed.
    Type: Application
    Filed: August 29, 2019
    Publication date: March 4, 2021
    Inventors: Vlad Spichek, Ajit Gaddam, Heng Tang, Pushkar Joglekar