Detroit, MI, United States of America

Rajneesh Kumar


Average Co-Inventor Count = 3.0

ph-index = 1


Company Filing History:


Years Active: 2025

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Rajneesh Kumar: Innovator in Anomaly Detection Technology

Introduction

Rajneesh Kumar is a notable inventor based in Detroit, MI (US). He has made significant contributions to the field of technology, particularly in the area of network security. His innovative work focuses on detecting anomalous user access behaviors, which is crucial for maintaining the integrity of network systems.

Latest Patents

Rajneesh Kumar holds a patent for a "Method, apparatus, system, and non-transitory computer readable medium for detecting anomalous user access behaviors." This patent describes a server designed to detect anomalies associated with users accessing a network. The server receives a dataset that includes both static and dynamic data. The static data encompasses location data of resources linked to the network and user data, while the dynamic data consists of user access events. The server employs a variety of unsupervised machine learning models to identify anomalies based on this data. If a critical anomaly is detected, the server generates and transmits a security alert to a security operation center. This invention represents a significant advancement in the field of cybersecurity.

Career Highlights

Rajneesh Kumar is currently employed at Charles Schwab & Company, Inc., where he continues to develop innovative solutions in technology. His work has been instrumental in enhancing the security measures employed by financial institutions.

Collaborations

Rajneesh has collaborated with several talented individuals, including William Walker and Bashar Abouseido. These partnerships have contributed to the successful development of his patented technology.

Conclusion

Rajneesh Kumar is a pioneering inventor whose work in anomaly detection technology is making waves in the cybersecurity landscape. His contributions are vital for protecting networks from unauthorized access and ensuring data security.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…