Patents by Inventor Rajandra Laxman Kulkarni

Rajandra Laxman Kulkarni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080114858
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for reconstructing data on a network. An user utilizes a transmitting device to transmit data packets that are split between a plurality of data centers for processing. The data packets are captured at the data centers. The data packets are recombined. The recombined data can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 15, 2008
    Applicant: FMR Corp.
    Inventors: Stephen Singh, Rajandra Laxman Kulkarni, Vijay C. Bhatt, Dan Tonelli
  • Publication number: 20080115192
    Abstract: Described are methods, systems, and apparatus, including computer program products for providing customizable authentication for service provisioning. A first user is enabled to customize an authentication system associated with a service type. Customizing the authentication system includes defining one or more authentication rules for determining access for a second user to a service for the service type.
    Type: Application
    Filed: November 7, 2006
    Publication date: May 15, 2008
    Inventors: Rajandra Laxman Kulkarni, Adam Greenberg, Anthony M. Marotto, Alexander L. Popowycz, Michael Francis LoPiano
  • Publication number: 20080114883
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for unifying user sessions on a network. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 15, 2008
    Applicant: FMR Corp.
    Inventors: Stephen Singh, Rajandra Laxman Kulkarni, Vijay C. Bhatt, Dan Tonelli
  • Publication number: 20080109873
    Abstract: Described are methods, systems, and apparatus, including computer program products for providing authentication for service provisioning. One or more executable authentication rules are provided for determining access by a user to one or more services. At least a first executable authentication rule is selected from the one or more executable authentication rules. The first executable authentication rule is for determining access by the user to at least a first service from the one or more services, wherein selecting the first executable authentication rule is based on: a characteristic of the user, a characteristic of a request, a characteristic of an acquisition point, or any combination thereof. A rules credential is generated. The rules credential includes the first executable authentication rule.
    Type: Application
    Filed: May 1, 2007
    Publication date: May 8, 2008
    Applicant: FMR Corp.
    Inventors: Rajandra Laxman Kulkarni, Adam Greenberg, Anthony M. Marotto, Alexander L. Popowycz, Michael Francis LoPiano
  • Publication number: 20080109884
    Abstract: Described are methods, systems, and apparatus, including computer program products for providing authentication for service provisioning. One or more executable authentication rules are provided for determining access by a user to one or more services. A request is received from the user. The request is for a first service from the one or more services at an enforcement point. It is determined, at the enforcement point, if at least a first executable authentication rule from the one or more executable authentication rules applies to the user. The first executable authentication rule is for determining access by the user to the first service, wherein determining if the first executable authentication rule applies includes determining if one or more triggers specified by the first executable authentication rule are triggered.
    Type: Application
    Filed: May 1, 2007
    Publication date: May 8, 2008
    Applicant: FMR Corp.
    Inventors: Rajandra Laxman Kulkarni, Adam Greenberg, Anthony M. Marotto, Alexander L. Popowycz, Michael Francis LoPiano
  • Publication number: 20080109365
    Abstract: Described are methods, systems, and apparatus, including computer program products for providing customizable authentication for service provisioning. A first user is enabled to customize an authentication system associated with a service. Customizing the authentication system includes defining a first executable authentication rule for a second user and a second executable authentication rule for a third user. The second executable authentication rule is different from the first executable authentication rule. The second user is different from the third user. The first executable authentication rule is employed for determining access by the second user to the service. The second executable authentication rule is employed for determining access by the third user to the service.
    Type: Application
    Filed: May 1, 2007
    Publication date: May 8, 2008
    Applicant: FMR Corp.
    Inventors: Rajandra Laxman Kulkarni, Adam Greenberg, Anthony M. Marotto, Alexander L. Popowycz, Michael Francis LoPiano
  • Publication number: 20080109869
    Abstract: Described are methods, systems, and apparatus, including computer program products for providing authentication for service provisioning. An executable authentication rule is provided for determining access by a user to a service. A request for the service is received at an enforcement point from the user. It is determined if the user satisfies the executable authentication rule. Access is provided by the user to the service if the user does not satisfy the executable authentication rule.
    Type: Application
    Filed: May 1, 2007
    Publication date: May 8, 2008
    Applicant: FMR Corp.
    Inventors: Rajandra Laxman Kulkarni, Adam Greenberg, Anthony M. Marotto, Alexander L. Popowycz, Michael Francis LoPiano
  • Publication number: 20080109874
    Abstract: Described are methods, systems, and apparatus, including computer program products for providing authentication for service provisioning. At least a first and a second executable authentication rule are provided. One or both of the first and second executable authentications are for determining access by a user to a service. The first executable authentication rule is selected when a lifecycle state associated with the user is in a first state. The second executable authentication rule is selected when the lifecycle state is in a second state. A rules credential is generated. The rules credential includes the selected executable authentication rule.
    Type: Application
    Filed: May 1, 2007
    Publication date: May 8, 2008
    Applicant: FMR Corp.
    Inventors: Rajandra Laxman Kulkarni, Adam Greenberg, Anthony M. Marotto, Alexander L. Popowycz, Michael Francis LoPiano