Patents by Inventor Vijay C. Bhatt
Vijay C. Bhatt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120221721Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting fraudulent activity. A computing device in a second network receives a plurality of interactions between data centers in a first network and one or more devices, remote from the data centers, of a user, the interactions forming an aggregate user session representing the user's activity over a period of time with the data centers via the devices. The computing device monitors data transaction requests of the interactions and is configured to respond to each request with a response that appears as if the request was executed. If the interactions are harmful, the computing device interdicts the interactions from execution by the data centers and allows the devices to submit additional interactions. If unable to determine whether the subsequent interactions are harmful, the computing device transmits the interactions to the data centers for execution and marks the interactions.Type: ApplicationFiled: May 11, 2012Publication date: August 30, 2012Applicant: FMR LLCInventors: Vijay C. Bhatt, Stephen Singh, Rajandra Laxman Kulkarni, Adam Greenberg
-
Patent number: 8180873Abstract: Described are computer-based methods and apparatuses, including computer program products, for subscribing to data feeds on a network. An user utilizes a transmitting device to transmit data packets that are split between a plurality of data centers for processing. The data packets are captured at the data centers. The data packets are recombined. The recombined data can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.Type: GrantFiled: November 14, 2006Date of Patent: May 15, 2012Assignee: FMR LLCInventors: Vijay C. Bhatt, Stephen Singh, Rajandra Laxman Kulkarni, Adam Greenberg
-
Patent number: 8145560Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting fraudulent activity on a network. A user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into a user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.Type: GrantFiled: November 14, 2006Date of Patent: March 27, 2012Assignee: FMR LLCInventors: Rajandra Laxman Kulkarni, Vijay C. Bhatt, Stephen Singh, Dan Tonelli, Adam Greenberg
-
Patent number: 7856494Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting and interdicting fraudulent activity on a network. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.Type: GrantFiled: November 14, 2006Date of Patent: December 21, 2010Assignee: FMR LLCInventors: Rajandra Laxman Kulkarni, Vijay C. Bhatt, Stephen Singh, Adam Greenberg
-
Publication number: 20080114858Abstract: Described are computer-based methods and apparatuses, including computer program products, for reconstructing data on a network. An user utilizes a transmitting device to transmit data packets that are split between a plurality of data centers for processing. The data packets are captured at the data centers. The data packets are recombined. The recombined data can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.Type: ApplicationFiled: November 14, 2006Publication date: May 15, 2008Applicant: FMR Corp.Inventors: Stephen Singh, Rajandra Laxman Kulkarni, Vijay C. Bhatt, Dan Tonelli
-
Publication number: 20080114888Abstract: Described are computer-based methods and apparatuses, including computer program products, for subscribing to data feeds on a network. An user utilizes a transmitting device to transmit data packets that are split between a plurality of data centers for processing. The data packets are captured at the data centers. The data packets are recombined. The recombined data can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.Type: ApplicationFiled: November 14, 2006Publication date: May 15, 2008Applicant: FMR Corp.Inventors: Vijay C. Bhatt, Stephen Singh, Rajandra Laxman Kulkarni, Adam Greenberg
-
Publication number: 20080114885Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting fraudulent activity on a network. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.Type: ApplicationFiled: November 14, 2006Publication date: May 15, 2008Applicant: FMR Corp.Inventors: Rajandra Laxman Kulkarni, Vijay C. Bhatt, Stephen Singh, Dan Tonelli
-
Publication number: 20080114883Abstract: Described are computer-based methods and apparatuses, including computer program products, for unifying user sessions on a network. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.Type: ApplicationFiled: November 14, 2006Publication date: May 15, 2008Applicant: FMR Corp.Inventors: Stephen Singh, Rajandra Laxman Kulkarni, Vijay C. Bhatt, Dan Tonelli
-
Publication number: 20080114886Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting and interdicting fraudulent activity on a network. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.Type: ApplicationFiled: November 14, 2006Publication date: May 15, 2008Applicant: FMR Corp.Inventors: Rajandra Laxman Kulkarni, Vijay C. Bhatt, Stephen Singh, Adam Greenberg
-
Publication number: 20080115213Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting fraudulent activity on a network using stored information. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.Type: ApplicationFiled: November 14, 2006Publication date: May 15, 2008Applicant: FMR Corp.Inventors: Vijay C. Bhatt, Rajandra Laxman Kulkarni, Stephen Singh, Adam Greenberg
-
Publication number: 20020188537Abstract: Systems and methods increase an entity's return on assets by allowing the entity to redeploy idle and surplus assets, assist in the sale and disposal process, and provide the resources to easily locate and buy from an aggregation of idle and surplus assets. The entity may establish confidential and secure internal trading communities, private trading communities and public trading groups. Pre-authorized users may view and search idle and surplus assets listed within the trading groups by category, keyword or attribute. Furthermore, the systems and methods may be integrated into the legacy systems and existing data structures of an entity.Type: ApplicationFiled: February 15, 2002Publication date: December 12, 2002Inventors: Peter A. Leeds, Kimbo B. Mundy, Girish Haran, Vijay C. Bhatt, John C. Stauffer, Lap Kong Cheng