Patents by Inventor Vijay C. Bhatt

Vijay C. Bhatt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120221721
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting fraudulent activity. A computing device in a second network receives a plurality of interactions between data centers in a first network and one or more devices, remote from the data centers, of a user, the interactions forming an aggregate user session representing the user's activity over a period of time with the data centers via the devices. The computing device monitors data transaction requests of the interactions and is configured to respond to each request with a response that appears as if the request was executed. If the interactions are harmful, the computing device interdicts the interactions from execution by the data centers and allows the devices to submit additional interactions. If unable to determine whether the subsequent interactions are harmful, the computing device transmits the interactions to the data centers for execution and marks the interactions.
    Type: Application
    Filed: May 11, 2012
    Publication date: August 30, 2012
    Applicant: FMR LLC
    Inventors: Vijay C. Bhatt, Stephen Singh, Rajandra Laxman Kulkarni, Adam Greenberg
  • Patent number: 8180873
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for subscribing to data feeds on a network. An user utilizes a transmitting device to transmit data packets that are split between a plurality of data centers for processing. The data packets are captured at the data centers. The data packets are recombined. The recombined data can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Grant
    Filed: November 14, 2006
    Date of Patent: May 15, 2012
    Assignee: FMR LLC
    Inventors: Vijay C. Bhatt, Stephen Singh, Rajandra Laxman Kulkarni, Adam Greenberg
  • Patent number: 8145560
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting fraudulent activity on a network. A user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into a user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Grant
    Filed: November 14, 2006
    Date of Patent: March 27, 2012
    Assignee: FMR LLC
    Inventors: Rajandra Laxman Kulkarni, Vijay C. Bhatt, Stephen Singh, Dan Tonelli, Adam Greenberg
  • Patent number: 7856494
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting and interdicting fraudulent activity on a network. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Grant
    Filed: November 14, 2006
    Date of Patent: December 21, 2010
    Assignee: FMR LLC
    Inventors: Rajandra Laxman Kulkarni, Vijay C. Bhatt, Stephen Singh, Adam Greenberg
  • Publication number: 20080114858
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for reconstructing data on a network. An user utilizes a transmitting device to transmit data packets that are split between a plurality of data centers for processing. The data packets are captured at the data centers. The data packets are recombined. The recombined data can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 15, 2008
    Applicant: FMR Corp.
    Inventors: Stephen Singh, Rajandra Laxman Kulkarni, Vijay C. Bhatt, Dan Tonelli
  • Publication number: 20080114888
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for subscribing to data feeds on a network. An user utilizes a transmitting device to transmit data packets that are split between a plurality of data centers for processing. The data packets are captured at the data centers. The data packets are recombined. The recombined data can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 15, 2008
    Applicant: FMR Corp.
    Inventors: Vijay C. Bhatt, Stephen Singh, Rajandra Laxman Kulkarni, Adam Greenberg
  • Publication number: 20080114885
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting fraudulent activity on a network. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 15, 2008
    Applicant: FMR Corp.
    Inventors: Rajandra Laxman Kulkarni, Vijay C. Bhatt, Stephen Singh, Dan Tonelli
  • Publication number: 20080114883
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for unifying user sessions on a network. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 15, 2008
    Applicant: FMR Corp.
    Inventors: Stephen Singh, Rajandra Laxman Kulkarni, Vijay C. Bhatt, Dan Tonelli
  • Publication number: 20080114886
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting and interdicting fraudulent activity on a network. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 15, 2008
    Applicant: FMR Corp.
    Inventors: Rajandra Laxman Kulkarni, Vijay C. Bhatt, Stephen Singh, Adam Greenberg
  • Publication number: 20080115213
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for detecting fraudulent activity on a network using stored information. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 15, 2008
    Applicant: FMR Corp.
    Inventors: Vijay C. Bhatt, Rajandra Laxman Kulkarni, Stephen Singh, Adam Greenberg
  • Publication number: 20020188537
    Abstract: Systems and methods increase an entity's return on assets by allowing the entity to redeploy idle and surplus assets, assist in the sale and disposal process, and provide the resources to easily locate and buy from an aggregation of idle and surplus assets. The entity may establish confidential and secure internal trading communities, private trading communities and public trading groups. Pre-authorized users may view and search idle and surplus assets listed within the trading groups by category, keyword or attribute. Furthermore, the systems and methods may be integrated into the legacy systems and existing data structures of an entity.
    Type: Application
    Filed: February 15, 2002
    Publication date: December 12, 2002
    Inventors: Peter A. Leeds, Kimbo B. Mundy, Girish Haran, Vijay C. Bhatt, John C. Stauffer, Lap Kong Cheng