Patents by Inventor Stephen Singh

Stephen Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240241867
    Abstract: An enterprise level Application Programming Interface (API) driven service to integrate and automate data quality processes within organizations is provided. The service has capabilities to ingest data from heterogenous data sources and provide data quality metrics irrespective of data domain type. A subscribing application can write Data Quality (DQ) checks as code using templates of a customized rule engine and generate metrics based on pre-defined schedules. Analytics and visualization and reporting capabilities of the service empower stakeholders such as data managers, application developers, and risk assessors to obtain actionable insights into data quality. Stakeholders can use service-generated DQ measures, such as accuracy, completeness, and timeliness, to identify data quality concerns and proactively implement remediation actions to reduce data use risk.
    Type: Application
    Filed: February 27, 2023
    Publication date: July 18, 2024
    Applicant: JPMorgan Chase Bank, N.A.
    Inventors: Prashant NIRANTAR, Stephen C BOSSONG, Parul SINGH, Aditya TOLETI, Vikram MIRMIRA
  • Publication number: 20120221721
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting fraudulent activity. A computing device in a second network receives a plurality of interactions between data centers in a first network and one or more devices, remote from the data centers, of a user, the interactions forming an aggregate user session representing the user's activity over a period of time with the data centers via the devices. The computing device monitors data transaction requests of the interactions and is configured to respond to each request with a response that appears as if the request was executed. If the interactions are harmful, the computing device interdicts the interactions from execution by the data centers and allows the devices to submit additional interactions. If unable to determine whether the subsequent interactions are harmful, the computing device transmits the interactions to the data centers for execution and marks the interactions.
    Type: Application
    Filed: May 11, 2012
    Publication date: August 30, 2012
    Applicant: FMR LLC
    Inventors: Vijay C. Bhatt, Stephen Singh, Rajandra Laxman Kulkarni, Adam Greenberg
  • Patent number: 8180873
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for subscribing to data feeds on a network. An user utilizes a transmitting device to transmit data packets that are split between a plurality of data centers for processing. The data packets are captured at the data centers. The data packets are recombined. The recombined data can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Grant
    Filed: November 14, 2006
    Date of Patent: May 15, 2012
    Assignee: FMR LLC
    Inventors: Vijay C. Bhatt, Stephen Singh, Rajandra Laxman Kulkarni, Adam Greenberg
  • Patent number: 8145560
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting fraudulent activity on a network. A user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into a user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Grant
    Filed: November 14, 2006
    Date of Patent: March 27, 2012
    Assignee: FMR LLC
    Inventors: Rajandra Laxman Kulkarni, Vijay C. Bhatt, Stephen Singh, Dan Tonelli, Adam Greenberg
  • Patent number: 8010971
    Abstract: An application destined for a client VoIP device is available at a service provider 20 and is loaded first to a client-side device over an unsecure public network, using a secure protocol. The VoIP device is not able to receive the application directly using the secure protocol and the client side device is instructed to load the application to the client VoIP device over a private network using an unsecure protocol.
    Type: Grant
    Filed: June 29, 2005
    Date of Patent: August 30, 2011
    Assignee: FMR LLC
    Inventors: Stephen Singh, Fergal Glynn
  • Patent number: 7856494
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting and interdicting fraudulent activity on a network. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Grant
    Filed: November 14, 2006
    Date of Patent: December 21, 2010
    Assignee: FMR LLC
    Inventors: Rajandra Laxman Kulkarni, Vijay C. Bhatt, Stephen Singh, Adam Greenberg
  • Publication number: 20080114858
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for reconstructing data on a network. An user utilizes a transmitting device to transmit data packets that are split between a plurality of data centers for processing. The data packets are captured at the data centers. The data packets are recombined. The recombined data can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 15, 2008
    Applicant: FMR Corp.
    Inventors: Stephen Singh, Rajandra Laxman Kulkarni, Vijay C. Bhatt, Dan Tonelli
  • Publication number: 20080114885
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting fraudulent activity on a network. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 15, 2008
    Applicant: FMR Corp.
    Inventors: Rajandra Laxman Kulkarni, Vijay C. Bhatt, Stephen Singh, Dan Tonelli
  • Publication number: 20080114886
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting and interdicting fraudulent activity on a network. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 15, 2008
    Applicant: FMR Corp.
    Inventors: Rajandra Laxman Kulkarni, Vijay C. Bhatt, Stephen Singh, Adam Greenberg
  • Publication number: 20080114888
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for subscribing to data feeds on a network. An user utilizes a transmitting device to transmit data packets that are split between a plurality of data centers for processing. The data packets are captured at the data centers. The data packets are recombined. The recombined data can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 15, 2008
    Applicant: FMR Corp.
    Inventors: Vijay C. Bhatt, Stephen Singh, Rajandra Laxman Kulkarni, Adam Greenberg
  • Publication number: 20080114883
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for unifying user sessions on a network. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 15, 2008
    Applicant: FMR Corp.
    Inventors: Stephen Singh, Rajandra Laxman Kulkarni, Vijay C. Bhatt, Dan Tonelli
  • Publication number: 20080115213
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting fraudulent activity on a network using stored information. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 15, 2008
    Applicant: FMR Corp.
    Inventors: Vijay C. Bhatt, Rajandra Laxman Kulkarni, Stephen Singh, Adam Greenberg
  • Publication number: 20080019390
    Abstract: Described are methods, systems, and apparatus, including computer program products for providing user selectable multimodal information services. A user is enabled to select a response mode from a plurality of modes associated with a request type. The response mode defines a representation format of information associated with the request type. A request message is received from the user. The request message is capable of having been transmitted by any one of the plurality of modes and is associated with the request type. The selected response mode is determined based on the request message. A response message based on the selected response mode is transmitted.
    Type: Application
    Filed: July 19, 2006
    Publication date: January 24, 2008
    Inventors: Stephen Singh, Eugene Cartright
  • Publication number: 20070178843
    Abstract: Described are methods and apparatus, including computer program products, for automated testing of a handheld device over a network. A first predefined test is executed on a handheld device to generate a first element with a first predefined value for a first parameter associated with the first element and the first element is transmitted over a communication network to a desktop computing device. Receipt of the first element is verified at the desktop computing device. Also verified is that the first parameter associated with the first element has the first predefined value.
    Type: Application
    Filed: February 1, 2006
    Publication date: August 2, 2007
    Applicant: FMR Corp.
    Inventors: Stephen Singh, Devang Shah, Paul Gallagher, Pradeep Phatak, Anubhav Jindal
  • Publication number: 20070008893
    Abstract: An application destined for a client VoIP device is available at a service provider 20 and is loaded first to a client-side device over an unsecure public network, using a secure protocol. The VoIP device is not able to receive the application directly using the secure protocol and the client side device is instructed to load the application to the client VoIP device over a private network using an unsecure protocol.
    Type: Application
    Filed: June 29, 2005
    Publication date: January 11, 2007
    Inventors: Stephen Singh, Fergal Glynn