Patents by Inventor Rishabh Kothari

Rishabh Kothari has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11620653
    Abstract: Systems and methods for detecting digital abuse or digital fraud that involves malicious account testing includes implementing a machine learning threat model that predicts malicious account testing using misappropriate accounts, wherein a subset of a plurality of learnable variables of an algorithmic structure of the machine learning threat model includes one or more learnable variables derived based on feature data indicative of malicious account testing; wherein implementing the machine learning threat model includes: (i) identifying event data from an online event that is suspected to involve digital fraud or digital abuse, (ii) extracting adverse feature data from the event data that map to the one or more learnable variables of the subset, and (iii) providing the adverse feature data as model input to the machine learning threat model; and computing, using the machine learning threat model, a threat prediction indicating a probability that the online event involves malicious account testing.
    Type: Grant
    Filed: July 25, 2022
    Date of Patent: April 4, 2023
    Assignee: Sift Science, Inc.
    Inventors: Wei Liu, Kevin Lee, Hui Wang, Rishabh Kothari, Helen Marushchenko
  • Publication number: 20220366422
    Abstract: Systems and methods for detecting digital abuse or digital fraud that involves malicious account testing includes implementing a machine learning threat model that predicts malicious account testing using misappropriate accounts, wherein a subset of a plurality of learnable variables of an algorithmic structure of the machine learning threat model includes one or more learnable variables derived based on feature data indicative of malicious account testing; wherein implementing the machine learning threat model includes: (i) identifying event data from an online event that is suspected to involve digital fraud or digital abuse, (ii) extracting adverse feature data from the event data that map to the one or more learnable variables of the subset, and (iii) providing the adverse feature data as model input to the machine learning threat model; and computing, using the machine learning threat model, a threat prediction indicating a probability that the online event involves malicious account testing.
    Type: Application
    Filed: July 25, 2022
    Publication date: November 17, 2022
    Inventors: Wei Liu, Kevin Lee, Hui Wang, Rishabh Kothari, Helen Marushchenko
  • Patent number: 11429974
    Abstract: Systems and methods for detecting digital abuse or digital fraud that involves malicious account testing includes implementing a machine learning threat model that predicts malicious account testing using misappropriate accounts, wherein a subset of a plurality of learnable variables of an algorithmic structure of the machine learning threat model includes one or more learnable variables derived based on feature data indicative of malicious account testing; wherein implementing the machine learning threat model includes: (i) identifying event data from an online event that is suspected to involve digital fraud or digital abuse, (ii) extracting adverse feature data from the event data that map to the one or more learnable variables of the subset, and (iii) providing the adverse feature data as model input to the machine learning threat model; and computing, using the machine learning threat model, a threat prediction indicating a probability that the online event involves malicious account testing.
    Type: Grant
    Filed: July 19, 2021
    Date of Patent: August 30, 2022
    Assignee: Sift Science, Inc.
    Inventors: Wei Liu, Kevin Lee, Hui Wang, Rishabh Kothari, Helen Marushchenko
  • Publication number: 20220020027
    Abstract: Systems and methods for detecting digital abuse or digital fraud that involves malicious account testing includes implementing a machine learning threat model that predicts malicious account testing using misappropriate accounts, wherein a subset of a plurality of learnable variables of an algorithmic structure of the machine learning threat model includes one or more learnable variables derived based on feature data indicative of malicious account testing; wherein implementing the machine learning threat model includes: (i) identifying event data from an online event that is suspected to involve digital fraud or digital abuse, (ii) extracting adverse feature data from the event data that map to the one or more learnable variables of the subset, and (iii) providing the adverse feature data as model input to the machine learning threat model; and computing, using the machine learning threat model, a threat prediction indicating a probability that the online event involves malicious account testing.
    Type: Application
    Filed: July 19, 2021
    Publication date: January 20, 2022
    Inventors: Wei Liu, Kevin Lee, Hui Wang, Rishabh Kothari, Helen Marushchenko
  • Publication number: 20210224826
    Abstract: A system and method for generating an insult rate and reconfiguring an automated decisioning workflow includes configuring a testing group based on sampling from online events having an adverse disposal decision computed by an automated decisioning workflow computer that is configured with machine learning-based threat score thresholds that, if satisfied, causes a computation of a disallow decision or a block decision for a given online event; evaluating a performance and collecting performance data of distinct members of the testing group over a testing period; computing an insult rate for the testing group based on the performance data; computing an insult rate equilibrium for the automated decisioning workflow computer based on the performance data; evaluating the insult rate against the insult rate equilibrium; and reconfiguring adverse decisioning thresholds based on the evaluation of the insult rate of the testing group against the insult rate equilibrium for the automated decisioning workflow computer.
    Type: Application
    Filed: April 5, 2021
    Publication date: July 22, 2021
    Inventors: Rajiv Veeraraghavan, Pradhan Umesh, Rishabh Kothari, Abbey Chaver
  • Patent number: 11068910
    Abstract: A system and method for generating an insult rate and reconfiguring an automated decisioning workflow includes configuring a testing group based on sampling from online events having an adverse disposal decision computed by an automated decisioning workflow computer that is configured with machine learning-based threat score thresholds that, if satisfied, causes a computation of a disallow decision or a block decision for a given online event; evaluating a performance and collecting performance data of distinct members of the testing group over a testing period; computing an insult rate for the testing group based on the performance data; computing an insult rate equilibrium for the automated decisioning workflow computer based on the performance data; evaluating the insult rate against the insult rate equilibrium; and reconfiguring adverse decisioning thresholds based on the evaluation of the insult rate of the testing group against the insult rate equilibrium for the automated decisioning workflow computer.
    Type: Grant
    Filed: April 5, 2021
    Date of Patent: July 20, 2021
    Assignee: Sift Science, Inc.
    Inventors: Rajiv Veeraraghavan, Pradhan Umesh, Rishabh Kothari, Abbey Chaver
  • Patent number: 10997608
    Abstract: A system and method for generating an insult rate and reconfiguring an automated decisioning workflow includes configuring a testing group based on sampling from online events having an adverse disposal decision computed by an automated decisioning workflow computer that is configured with machine learning-based threat score thresholds that, if satisfied, causes a computation of a disallow decision or a block decision for a given online event; evaluating a performance and collecting performance data of distinct members of the testing group over a testing period; computing an insult rate for the testing group based on the performance data; computing an insult rate equilibrium for the automated decisioning workflow computer based on the performance data; evaluating the insult rate against the insult rate equilibrium; and reconfiguring adverse decisioning thresholds based on the evaluation of the insult rate of the testing group against the insult rate equilibrium for the automated decisioning workflow computer.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: May 4, 2021
    Assignee: Sift Science, Inc.
    Inventors: Rajiv Veeraraghavan, Pradhan Bagur Umesh, Rishabh Kothari, Abbey Chaver
  • Patent number: 10489740
    Abstract: A method of reallocating inventory in a fulfillment network is disclosed herein. The fulfillment network can include a plurality of distribution centers. An allocation plan can be created in a one of a variety of different manners, where the allocation plan involves allocating an item to one or more distribution centers in the fulfillment network. Thereafter, the allocation plan can be analyzed for feasibility. If the allocation plan is not feasible, each distribution center in the allocation plan can be analyzed to determine if using the distribution center is feasible. If the distribution center cannot be used, another distribution in the same cluster of distribution centers is examined for feasibility. This process is repeated for each distribution center in the allocation plan. Once an alternative allocation plan has been developed in this manner, items can be allocated. Existing inventory can be taken into account in the allocation plan.
    Type: Grant
    Filed: November 23, 2015
    Date of Patent: November 26, 2019
    Assignee: WALMART APOLLO, LLC
    Inventors: Rishabh Kothari, Arash Asadi-Shahmirzadi, Vvs Varaprasad Nagalla, Zhiwei Qin
  • Publication number: 20170147964
    Abstract: A method of reallocating inventory in a fulfillment network is disclosed herein. The fulfillment network can include a plurality of distribution centers. An allocation plan can be created in a one of a variety of different manners, where the allocation plan involves allocating an item to one or more distribution centers in the fulfillment network. Thereafter, the allocation plan can be analyzed for feasibility. If the allocation plan is not feasible, each distribution center in the allocation plan can be analyzed to determine if using the distribution center is feasible. If the distribution center cannot be used, another distribution in the same cluster of distribution centers is examined for feasibility. This process is repeated for each distribution center in the allocation plan. Once an alternative allocation plan has been developed in this maimer, items can be allocated. Existing inventory can be taken into account in the allocation plan.
    Type: Application
    Filed: November 23, 2015
    Publication date: May 25, 2017
    Applicant: WAL-MART STORES, INC.
    Inventors: Rishabh Kothari, Arash Asadi-Shahmirzadi, Vvs Varaprasad Nagalla, Zhiwei Qin
  • Publication number: 20150046227
    Abstract: A computer-implemented method is disclosed for optimizing a flow network. In the method, a computer system may obtain first data characterizing supply sites, demand sites, and lanes of a distribution network. The computing system may also obtain second data characterizing supply and demand for an item distributed within the distribution network. Using the first and second data, a computer system may determine a maximum possible flow of the item within the distribution network. Subsequently, the computer system may use the maximum possible flow as a benchmark in determining which lanes of the distribution network are required to achieve the maximum possible flow and which lanes of the distribution network are redundant lanes. From among a remaining set of required, non-redundant lanes, a computer system may select a lowest cost solution for achieving the maximum possible flow.
    Type: Application
    Filed: August 12, 2013
    Publication date: February 12, 2015
    Applicant: Wal-Mart Stores, Inc.
    Inventors: Arash Asadi, Rishabh Kothari, Jagtej Bewli