Difference between revisions of "Capital One Services, LLC patent applications published on October 5th, 2023"

From WikiPatents
Jump to navigation Jump to search
(Creating a new page)
 
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
 +
'''Summary of the patent applications from Capital One Services, LLC on October 5th, 2023'''
 +
 +
Capital One Services, LLC has recently filed patents for various systems and methods related to authentication, identity verification, digital wallets, smart devices, contractual document analysis, customer traffic analysis, and user profiles. These patents aim to enhance functionality, security, and user experience in different domains.
 +
 +
Notable recent patent applications by Capital One Services, LLC include:
 +
 +
* A system for authentication based on website browsing activity, where an authentication device compares valid web addresses associated with a virtual credential to the web address of the current website.
 +
* A system for validating requests to use encrypted versions of physical identifiers, involving sending validation prompts, receiving responses, and performing actions associated with the user.
 +
* A system and method for verifying user identity by comparing hash information generated based on user credentials with hash information received from an entity's server.
 +
* Systems and methods for enhancing the functionality and security of digital wallets using hardware security modules (HSMs) to manage multiple cryptocurrency wallets and secure management of signing keys and addresses.
 +
* An application for smart devices that can determine the exact location on the ground where the device is pointing and display a target on the live video feed.
 +
* A device that analyzes contractual documents, converts image data into text data, identifies key terms, and provides recommendations on whether to accept the offer based on recipient preferences.
 +
* A system used by a financial institution to store transaction data and compare it to social data from a social networking site to create spend memory records.
 +
* A system that generates user profiles based on exchange behavior data and determines relevant entities for users based on their profiles.
 +
* A system that scans mobile devices for applications created by partnered companies and offers benefits when those applications are found.
 +
* A system and method for analyzing customer traffic in retail stores using sensors, displays, and processors to track user movement and generate records.
 +
 +
These recent patent filings demonstrate Capital One Services, LLC's focus on developing innovative solutions to improve authentication, identity verification, digital wallets, smart devices, contractual document analysis, customer traffic analysis, and user profiles.
 +
 +
 +
 +
 
==Patent applications for Capital One Services, LLC on October 5th, 2023==
 
==Patent applications for Capital One Services, LLC on October 5th, 2023==
  
Line 5: Line 27:
 
'''Inventor'''
 
'''Inventor'''
 
Reilly CARPENTER
 
Reilly CARPENTER
 
'''Brief explanation'''
 
This abstract describes a system and method for activating a card using augmented reality. It involves using a customer's device to capture an image of the card in real-time, extracting the card information from the image, and using it to activate the card either on the customer's device or on a financial provider's server. The customer's device then displays interactive graphics overlaid on the card image to guide the customer through the activation process and provide information about the card and the associated financial service. The customer can interact with the graphics to access tutorials or set preferences related to the card and financial service.
 
 
'''Abstract'''
 
Systems and methods are provided for activating a card using augmented reality. The systems and methods may include capturing a real-time image of the card using a customer device, and extracting card information from the real-time image. The card information may be processed and used by a customer device or a financial provider server to activate the card. The customer device may display interactive graphics overlaid on the real-time card image to guide the customer through the activation process, and to educate the customer about the components of the card and aspects of the financial service associated with the card, such as a credit card service. The customer may interact with the overlaid graphics such as by selecting icons or portions of the card to trigger tutorials or to set preferences related to the card and/or financial service.
 
  
 
===AUGMENTED REALITY EXTENDED VIEW (17711474)===
 
===AUGMENTED REALITY EXTENDED VIEW (17711474)===
Line 16: Line 32:
 
'''Inventor'''
 
'''Inventor'''
 
Michael Mossoba
 
Michael Mossoba
 
'''Brief explanation'''
 
This abstract describes a technology that allows users to view web page content outside of a web browser using augmented reality glasses. The content is identified and saved to a network-accessible storage location. The augmented reality glasses then receive a request for the content and retrieve it from the storage location. The glasses then display the content in a way that extends the user's view beyond the web browser and physical display.
 
 
'''Abstract'''
 
Disclosed embodiments include systems, devices, and methods for extending a view of an interface by way of augmented reality glasses. Web page content can be identified for presentation outside the purview of a web browser. The content can be saved to a network-accessible store. Subsequently, a request is sent, including the location of the network-accessible store, to augmented reality glasses. The content can be acquired from the location by the augmented reality glasses. Subsequently, the content can be rendered by the augmented reality glasses in a manner that extends the view beyond the web browser and physical display.
 
  
 
===MANAGING EXECUTION OF DATA PROCESSING JOBS IN A VIRTUAL COMPUTING ENVIRONMENT (18194776)===
 
===MANAGING EXECUTION OF DATA PROCESSING JOBS IN A VIRTUAL COMPUTING ENVIRONMENT (18194776)===
Line 27: Line 37:
 
'''Inventor'''
 
'''Inventor'''
 
Ming YUAN
 
Ming YUAN
 
'''Brief explanation'''
 
This abstract describes a device that receives a request for a data processing job, along with timing information for when the job should be executed. The device also receives user data associated with the job request and validates the job based on this data. It then determines the priority of the job based on the user data and timing information. The device adds the job data to a job queue and monitors a virtual computing environment to see when resources become available. Once a virtual resource is available, the device sends the necessary data to that resource to execute the data processing job, taking into account the priority of the job.
 
 
'''Abstract'''
 
A device may receive a job request associated with a data processing job, including job timing data specifying a time at which the data processing job is to be executed by a virtual computing environment. The device may receive user data associated with the job request and validate the data processing job based on the user data. In addition, the device may identify a priority associated with the data processing job, based on the user data and the job timing data. The device may provide, to a job queue, job data that corresponds to the data processing job, and monitor the virtual computing environment to determine when virtual resources are available. The device may also determine, based on the monitoring, that a virtual resource is available and, based on the determination and the priority, provide the virtual resource with data that causes execution of the data processing job.
 
  
 
===SYSTEMS AND METHODS FOR A SERVERLESS ORCHESTRATION LAYER (18192079)===
 
===SYSTEMS AND METHODS FOR A SERVERLESS ORCHESTRATION LAYER (18192079)===
Line 38: Line 42:
 
'''Inventor'''
 
'''Inventor'''
 
Ajay SHINDE
 
Ajay SHINDE
 
'''Brief explanation'''
 
The abstract describes a system and method for managing data without the need for a server. It involves receiving a dataset that is divided into multiple partitions. The system scans the dataset and identifies two specific partitions. It then generates messages to initiate jobs for each partition, with the sequencing of these messages based on a predetermined model. The system generates separate jobs for each partition and transmits them in the order determined by the sequencing of the messages.
 
 
'''Abstract'''
 
Systems and methods for implementing a server-less data management may include receiving a dataset comprising a plurality of partitions, scanning the dataset to identify a first partition and a second partition, generating a first kick-off job message associated with the first partition and a second kick-off job message associated with the second partition, sequencing the first kick-off job message before the second kick-off job message based on a sequencing model, generating a first job based on the first kick-off job message and a second job based on the second kick-off job message; and transmitting the first job before the second job based on sequencing the first kick-off job message before the second kick-off job message.
 
  
 
===LINEAGE-DRIVEN SOURCE CODE GENERATION FOR BUILDING, TESTING, DEPLOYING, AND MAINTAINING DATA MARTS AND DATA PIPELINES (18332030)===
 
===LINEAGE-DRIVEN SOURCE CODE GENERATION FOR BUILDING, TESTING, DEPLOYING, AND MAINTAINING DATA MARTS AND DATA PIPELINES (18332030)===
Line 49: Line 47:
 
'''Inventor'''
 
'''Inventor'''
 
Venkateshwara MUDUMBA
 
Venkateshwara MUDUMBA
 
'''Brief explanation'''
 
This abstract describes a system that uses an analytics platform to process a configuration of data lineage. The platform identifies data sources and data sets related to a specific data analytics use case, as well as the relationships between these data sets. It then parses a source code template that contains functions to build a data mart and a data pipeline for the analytics use case. The source code template includes tokens that specify the elements identified in the data lineage configuration. The analytics platform automatically generates executable source code based on the data lineage configuration and the source code template to build the necessary data mart and data pipeline for the analytics use case.
 
 
'''Abstract'''
 
In some implementations, an analytics platform may process a data lineage configuration to identify one or more data sources storing one or more data sets associated with a data analytics use case and identify one or more data relations associated with the one or more data sets. The analytics platform may parse a source code template defining one or more functions to build a data mart and a data pipeline that enables the data analytics use case. The source code template may include one or more tokens to specify elements that define the one or more data sources, data sets, and data relations identified in the data lineage configuration. The analytics platform may automatically generate source code that is executable to build a data mart and a data pipeline to enable the data analytics use case based on the data lineage configuration and the source code template.
 
  
 
===METHOD AND SYSTEM FOR IMPLEMENTING A FAST DATASET SEARCH USING A COMPRESSED REPRESENTATION OF A PLURALITY OF DATASETS (18328376)===
 
===METHOD AND SYSTEM FOR IMPLEMENTING A FAST DATASET SEARCH USING A COMPRESSED REPRESENTATION OF A PLURALITY OF DATASETS (18328376)===
Line 60: Line 52:
 
'''Inventor'''
 
'''Inventor'''
 
Austin Walters
 
Austin Walters
 
'''Brief explanation'''
 
This abstract describes a method for storing and organizing datasets in computer memory. The method involves compressing and storing multiple datasets as index representations. A sample dataset is then received and compressed into a representation. The method further includes determining which of the stored datasets is most similar to the sample dataset based on their respective representations.
 
 
'''Abstract'''
 
A method includes storing, by one or more processors of one or more computing devices, a plurality of datasets in a non-transitory computer memory associated with the one or more computing devices. A plurality of index representations is generated where each one of the plurality of index representations includes a compressed representation of a respective one of the plurality of datasets. The plurality of index representations is stored in the non-transitory computer memory. A sample dataset is received by the one or more processors. A sample dataset representation is generated that includes a compressed representation of the sample dataset. A determination that at least one of the plurality of datasets is most similar to the sample dataset based on the sample dataset representation and the plurality of index representations is performed.
 
  
 
===UNSTRUCTURED TEXT PROCESSING FOR GEOGRAPHICAL LOCATION DETERMINATION SYSTEM (17709844)===
 
===UNSTRUCTURED TEXT PROCESSING FOR GEOGRAPHICAL LOCATION DETERMINATION SYSTEM (17709844)===
Line 71: Line 57:
 
'''Inventor'''
 
'''Inventor'''
 
Lokesh S. Tulshan
 
Lokesh S. Tulshan
 
'''Brief explanation'''
 
This abstract describes systems and methods for determining addresses for assets, prioritizing the addresses for inspection, and using natural language processing techniques on user input. The system receives unstructured text input from a user regarding an inspection of an asset's address. Natural language techniques are applied to this text to automate the response message. If the asset is not found, the system suggests another address for the user to inspect, based on changes in address priority caused by processing the user's input.
 
 
'''Abstract'''
 
Aspects described herein include systems and methods for determining addresses for assets, prioritizing the addresses for inspection by users, and applying natural language processing techniques to unstructured text input by the users. According to some aspects, a message may be received that includes unstructured text that was input by a user. The unstructured text may be associated with an inspection, by the user, of an address for an asset. One or more natural language techniques may be applied to the unstructured text to, among other things, facilitate the determination and sending of a response message to the unstructured text in an automated fashion. The response message may, if the asset was not found, include another address as a suggestion for the user to inspect for the asset. This suggested address may be determined based on changes to address priority that were caused by processing of the unstructured text.
 
  
 
===Scaling By Dynamic Discovery For Data Processing (18134711)===
 
===Scaling By Dynamic Discovery For Data Processing (18134711)===
Line 82: Line 62:
 
'''Inventor'''
 
'''Inventor'''
 
Hala Salim El-Ali
 
Hala Salim El-Ali
 
'''Brief explanation'''
 
The abstract describes a method, system, and apparatus for improving the speed of processing search requests from users. It involves partitioning searchable content and distributing the segments across multiple processing nodes. These nodes further sub-partition the content for local processing by search actors. The processing nodes are registered with an external storage device, which also maintains a global results collector. This collector gathers results from the partitions of searchable content. Local collector actors receive compiled results from local search actors on a processing node, and these results are sent to the global results collector for compilation across all processing nodes. Finally, the results of the user's search request are provided to the user.
 
 
'''Abstract'''
 
Aspects described herein may relate to methods, systems, and apparatuses that partitions searchable content and distributes the segments across a plurality of processing nodes, which in turn further sub-partitions the partitions for processing by local search actor in order to increase the speed with which a search request from a user is processed. Processing nodes available to receive partitioned searchable content are registered with an external storage device. The external storage device also maintains a global results collector that compiles results from the partitions of searchable content. Respective local collector actors receive compiled results from local search actors for a processing node and the compiled results are sent to the global results collector for compiling for the plurality of processing nodes. Results of the user search request are then provided to the user.
 
  
 
===METHODS, MEDIUMS, AND SYSTEMS FOR REUSABLE INTELLIGENT SEARCH WORKFLOWS (17710009)===
 
===METHODS, MEDIUMS, AND SYSTEMS FOR REUSABLE INTELLIGENT SEARCH WORKFLOWS (17710009)===
Line 93: Line 67:
 
'''Inventor'''
 
'''Inventor'''
 
Paul CHO
 
Paul CHO
 
'''Brief explanation'''
 
This abstract describes a method, system, and medium for conducting an intelligent semantic search across a large number of records. It is particularly useful for responding to information requests from regulatory agencies. The method involves training an embedding model to convert queries into an embedding space. When a new query is received, it is embedded using this model. The embedded query is then used to search a set of documents, such as previous responses to regulatory inquiries, using an indexing model that enables efficient searches in embedding spaces. The search returns a number of results, which are ranked using a ranking model. User feedback on the quality of the results is collected and used to retrain the ranking model.
 
 
'''Abstract'''
 
Exemplary embodiments provide methods, mediums, and systems for performing a reusable, intelligent semantic search across a potentially large number of records. Embodiments may be particularly useful for responding to requests for information from regulatory agencies. In one embodiment, an embedding model is trained to embed queries in an embedding space. When a new query is received, the new query is embedded with the embedding model. A set of documents (e.g., previous responses to regulatory inquiries) may be searched using the embedded query and an indexing model that allows for efficient searches of embedding spaces. A number of results may be returned from the document store, and the results may be ranked by a ranking model. User feedback about the quality of the results may be received, and the ranking model may be retrained based on the feedback.
 
  
 
===SYSTEM AND METHOD FOR USING IMAGES TO AUTHENTICATE A USER (18331121)===
 
===SYSTEM AND METHOD FOR USING IMAGES TO AUTHENTICATE A USER (18331121)===
Line 104: Line 72:
 
'''Inventor'''
 
'''Inventor'''
 
Clayton JOHNSON
 
Clayton JOHNSON
 
'''Brief explanation'''
 
The abstract describes a method for authenticating a user based on their facial features. It involves receiving an image of the user and comparing it to previously captured images to identify unique facial characteristics. The method also includes comparing the user's facial features to those of a non-user and using facial recognition technology to match the user's facial features with images stored in social networking profiles. By analyzing the differences and similarities, the user can be authenticated.
 
 
'''Abstract'''
 
Systems and methods for authenticating a user, the method including receiving an image of a user of a device, identifying a first facial descriptor of the user from the received image and from previously captured images of the user, and determining a difference between the first facial descriptor from the received image and that from the previously captured images. The method further includes identifying a second facial descriptor of a non-user from the previously captured images of the user, and applying facial recognition to images stored in a plurality of second social networking profiles associated with a first social networking profile of the user to identify the second facial descriptor from the images stored in the second social networking profiles. Based on the difference and the second facial descriptor, the user may be authenticated.
 
  
 
===SYSTEMS AND METHODS FOR AUTHENTICATING USERS (18331926)===
 
===SYSTEMS AND METHODS FOR AUTHENTICATING USERS (18331926)===
Line 115: Line 77:
 
'''Inventor'''
 
'''Inventor'''
 
Joshua EDWARDS
 
Joshua EDWARDS
 
'''Brief explanation'''
 
This abstract describes a method for generating an authentication prompt based on an object detected in a user's environment. The object must meet certain criteria, such as being present in multiple samples and being in a specific spatial region where the user looked. The user is then prompted to authenticate themselves, and their response is obtained from their device. The user's authentication is then determined based on their response.
 
 
'''Abstract'''
 
In some embodiments, an authentication prompt may be generated based on (i) an object, detected in an image stream of an environment of a user, satisfying one or more criteria and (ii) object data associated with the detected object. The criteria may include (i) the object being in a plurality of different samples and (ii) the object being in a first spatial region of a first sample of the different samples, where the first spatial region of the first sample is a spatial region at which the user looked. An authentication response may be obtained from a user device of the user in connection with the authentication prompt, and the user may be authenticated based on the authentication response obtained from the user device.
 
  
 
===TRANSACTION CARD WITH LIGHTWEIGHT CORE (18327046)===
 
===TRANSACTION CARD WITH LIGHTWEIGHT CORE (18327046)===
Line 126: Line 82:
 
'''Inventor'''
 
'''Inventor'''
 
Tyler MAIMAN
 
Tyler MAIMAN
 
'''Brief explanation'''
 
The abstract describes transaction cards that have a lighter weight core. These cards have a body with two outer layers and a corrugated core in between. The core is made up of alternating peaks and valleys that are connected to the outer layers. The cards also have an identification chip that is directly connected to the corrugated core.
 
 
'''Abstract'''
 
Provided are transaction cards with a reduced weight core. In some approaches, a transaction card may include a body having a first outer layer opposite a second outer layer, and a corrugated core between the first outer layer and the second outer layer, wherein the corrugated core comprises a plurality of alternating peaks and valleys coupled to the first outer layer and the second outer layer. The transaction card may further include an identification chip positioned through the first outer layer, wherein the identification chip is directly coupled to the corrugated core.
 
  
 
===COMPUTER-BASED SYSTEMS CONFIGURED FOR DETECTING, CLASSIFYING, AND VISUALIZING EVENTS IN LARGE-SCALE, MULTIVARIATE AND MULTIDIMENSIONAL DATASETS AND METHODS OF USE THEREOF (18301822)===
 
===COMPUTER-BASED SYSTEMS CONFIGURED FOR DETECTING, CLASSIFYING, AND VISUALIZING EVENTS IN LARGE-SCALE, MULTIVARIATE AND MULTIDIMENSIONAL DATASETS AND METHODS OF USE THEREOF (18301822)===
Line 137: Line 87:
 
'''Inventor'''
 
'''Inventor'''
 
John C. Stocker
 
John C. Stocker
 
'''Brief explanation'''
 
This abstract describes a system and method that uses a processor to analyze a data set containing time-varying data points. The processor applies a detection model to identify different types of event observations, such as anomalies, change-points, patterns, or outliers. It then generates anomaly records in a data store based on these event observations. Additionally, the processor automatically generates event records for the anomaly records, linking them to variables of the time-varying data points. The event records are used to apply changes to each event observation based on the linking.
 
 
'''Abstract'''
 
Systems and methods of the present disclosure include at least one processor that receives a data set of a data stream from a data source, where the data set includes a time-varying data points. The processor determines event observations associated with data points of the time-varying data points based on a detection model to identify types of the event observations, including: i) anomalies, ii) change-points, iii) patterns, or iv) outliers. The processor generates anomaly records in an event data store based on the event observations and automatically generates event records for at least one of the anomaly records based on variables of at least one dimension of the time-varying data points, where the event record links one or more event observations. The processor automatically applies changes in the event record to each event observation of the one or more event observations based on the linking by the event record.
 
  
 
===SYSTEM AND METHOD FOR PROVIDING API VERSION CONTROL (18205870)===
 
===SYSTEM AND METHOD FOR PROVIDING API VERSION CONTROL (18205870)===
Line 148: Line 92:
 
'''Inventor'''
 
'''Inventor'''
 
Satish KESIBOYANA
 
Satish KESIBOYANA
 
'''Brief explanation'''
 
This abstract describes a system that allows for version control across different APIs. It explains that a client device can send communications to a service application API in a format that the API does not accept. To solve this issue, a central API receives the communication and identifies the versions of both the client device's API and the service application API. It then formats the communication to a format that the service application API can accept and forwards it to the service application.
 
 
'''Abstract'''
 
Described herein is a system for providing version control across APIs. In an embodiment, an application of a client device may transmit communications to a service application API that are in a format not accepted by the service application API, using the application API. A central (or public) API may receive the communication transmitted by the application's API. The central API may identify the versions of the application's API and the service application API. The central API may format the communication based on the mapped fields, to a format accepted by the service application API. The central API  may forward the formatted communication to the service application.
 
  
 
===ORIENTATIONLESS TRANSACTION CARD (17706767)===
 
===ORIENTATIONLESS TRANSACTION CARD (17706767)===
Line 159: Line 97:
 
'''Inventor'''
 
'''Inventor'''
 
Bryant YEE
 
Bryant YEE
 
'''Brief explanation'''
 
The abstract describes a transaction card that consists of multiple layers. The card includes contact pads on the top and bottom layers, which are connected to each other through intermediate layers and a middle layer. These contact pads allow for an electrical connection to a chip that is placed between the top and bottom layers of the card.
 
 
'''Abstract'''
 
A transaction card is provided. The transaction card can include a top layer, a first intermediate layer, a middle layer, a second intermediate layer, and a bottom layer. Contact pads can be disposed in the top layer and bottom layer and can be electrically connected to each other via the first intermediate layer, the second intermediate layer, and the middle layer to provide an electrical connection to the same chip. At least one of the contact pads can be coupled to an integrated chip disposed between the top layer and the bottom layer.
 
  
 
===SYSTEMS AND METHODS FOR TOKEN-BASED DEVICE BINDING DURING MERCHANT CHECKOUT (17712853)===
 
===SYSTEMS AND METHODS FOR TOKEN-BASED DEVICE BINDING DURING MERCHANT CHECKOUT (17712853)===
Line 170: Line 102:
 
'''Inventor'''
 
'''Inventor'''
 
Jeffrey RULE
 
Jeffrey RULE
 
'''Brief explanation'''
 
The abstract describes a system and method for real-time digital authentication. It involves receiving a hashed user credential from a third-party entity and comparing it to a stored hashed credential. If there is a match, a user eligibility operation is performed for the first transaction. If the user is eligible, an authentication challenge is generated and, upon successful completion by the user, their payment credentials are retrieved and authenticated. Finally, a checkout operation for the first transaction is authorized.
 
 
'''Abstract'''
 
Systems and methods are disclosed herein for real-time digital authentication. According to some embodiments, receiving a hashed user credential from the third party entity, performing a matching operation between the received hashed user credential and a stored hashed credential stored in the non-transitory memory, the received hashed user credential and the stored hashed credential being hashed using the same hashing algorithm, and in response to detecting a match between the received hashed user credential and the stored hashed user credential, performing a user eligibility operation associated with the first transaction. The authentication method may further include in response to determining that the user is eligible for the first transaction, generating an authentication challenge to the user, in response to the user successfully completing the authentication challenge, retrieving payment credentials of the user and authenticating the user, and authorizing a checkout operation associated with the first transaction.
 
  
 
===PHYSICAL MEDIUM FOR RESTRICTED ACCOUNT ACCESS TO CONTRIBUTED RESOURCES (17657971)===
 
===PHYSICAL MEDIUM FOR RESTRICTED ACCOUNT ACCESS TO CONTRIBUTED RESOURCES (17657971)===
Line 181: Line 107:
 
'''Inventor'''
 
'''Inventor'''
 
Maneill PAREKH
 
Maneill PAREKH
 
'''Brief explanation'''
 
The abstract describes a physical medium that can be used to identify an account and initiate exchanges of resources. The physical medium includes components such as a radio frequency (RF) component, an integrated circuit (IC) chip component, a memory, and processors. It can provide an identifier of an account through RF, IC chip, or an optical image displayed on its surface. The physical medium can transmit this identifier to start a first exchange for receiving resources from another account. It can also communicate with a terminal when it is in close proximity to complete a second exchange using the resources, based on certain restriction parameters.
 
 
'''Abstract'''
 
In some implementations, a physical medium may include a radio frequency (RF) component, an integrated circuit (IC) chip component, a memory, and one or more processors coupled to the memory. The physical medium may be configured to provide an indication of an identifier of an account associated with the physical medium via the RF component, the IC chip component, or an optical image displayed on a surface of the physical medium. The physical medium may be configured to transmit an indication of the identifier to initiate a first exchange associated with receiving resources from another account. The physical medium may be configured to communicate with a terminal, based on detecting that the physical medium is within a communicative proximity of the terminal, to complete a second exchange at least partially using the resources based on information associated with the second exchange satisfying one or more restriction parameters.
 
  
 
===SYSTEMS AND METHODS FOR PRODUCT PLACEMENT OPTIMIZATION BY SENSING CUSTOMER TRAFFIC IN STORES (18330594)===
 
===SYSTEMS AND METHODS FOR PRODUCT PLACEMENT OPTIMIZATION BY SENSING CUSTOMER TRAFFIC IN STORES (18330594)===
Line 192: Line 112:
 
'''Inventor'''
 
'''Inventor'''
 
Thomas S. Poole
 
Thomas S. Poole
 
'''Brief explanation'''
 
The disclosed embodiments describe a system and method for analyzing customer traffic in retail stores. The system includes sensors placed in the store, displays associated with the sensors, memory devices, and processors. The system receives signals from the sensors when a user device is near them, extracts the device's identifier from the signal, correlates the signal with the corresponding display, generates a record of the user's movement based on the signal, and stores the record.
 
 
'''Abstract'''
 
The disclosed embodiments generally relate to in-store customer traffic analysis systems and methods. The system includes at least one sensor positioned within a retail store, at least one display associated with the at least one sensor, one or more memory devices storing instructions and one or more hardware processors configured to execute the instructions to perform operations. The operations include receiving a sensor signal indicating that a user device is within a proximity to the at least one sensor in the retail store, extracting a user device identifier from the sensor signal, correlating the sensor signal to the at least one display, generating a foot traffic record associated with the user device identifier and the at least one display, based on the received sensor signal, and storing the generated foot traffic record.
 
  
 
===SYSTEM AND METHOD FOR SCANNING A MOBILE COMPUTING DEVICE FOR INSTALLED APPLICATIONS (18331140)===
 
===SYSTEM AND METHOD FOR SCANNING A MOBILE COMPUTING DEVICE FOR INSTALLED APPLICATIONS (18331140)===
Line 203: Line 117:
 
'''Inventor'''
 
'''Inventor'''
 
Anatoly IVASYUK
 
Anatoly IVASYUK
 
'''Brief explanation'''
 
This abstract describes a system that scans a mobile device for applications created by partnered companies and offers benefits when those applications are found. The system maintains a list of applications and their associated companies with rewards programs. It then checks the installed applications on the mobile device, identifies any matches with the list, and generates notifications based on the rewards program. These notifications are then displayed to the user.
 
 
'''Abstract'''
 
Systems, methods, and computer-readable storage media for scanning a mobile computing device for applications produced by partnered entities and providing benefits when those applications are found. An exemplary system does this by accessing a list of applications and associating each application with a respective entity which has a rewards program linked to a specific entity. The system issues a request for application information of the applications which are installed on the mobile computing device, identifies applications that match the list of applications in the data record, and generates at least one notification based on the identified applications and the rewards program. The system then displays the at least one notification.
 
  
 
===PEER-BASED SELECTION USING MACHINE LEARNING (17657250)===
 
===PEER-BASED SELECTION USING MACHINE LEARNING (17657250)===
Line 214: Line 122:
 
'''Inventor'''
 
'''Inventor'''
 
Lukiih CUAN
 
Lukiih CUAN
 
'''Brief explanation'''
 
This abstract describes a system that generates profiles for users based on their exchange behavior data. The system receives a request from a user and uses their profile, along with the profile of another user, to determine a relevant entity for the first user. The system then transmits this information to the user's device.
 
 
'''Abstract'''
 
In some implementations, a system may generate a first exchange profile for a first user and a second exchange profile for a second user. The first exchange profile may identify one or more characteristics of an exchange behavior of the first user based on exchange data of the first user, and the second exchange profile may identify one or more characteristics of an exchange behavior of the second user based on exchange data of the second user. The system may receive, from a first device of the first user, a request for a selection for the first user. The system may determine, based on the first exchange profile and the second exchange profile, an entity that is relevant to the first user. The system may transmit, to the first device of the first user, information indicating the selection for the first user, where the selection identifies the entity.
 
  
 
===SYSTEM AND METHOD FOR PROVIDING A SPEND MEMORY RECORD (18330583)===
 
===SYSTEM AND METHOD FOR PROVIDING A SPEND MEMORY RECORD (18330583)===
Line 225: Line 127:
 
'''Inventor'''
 
'''Inventor'''
 
Dwij TRIVEDI
 
Dwij TRIVEDI
 
'''Brief explanation'''
 
This abstract describes a system and method used by a financial institution to store transaction data from previous financial transactions made by account holders. The system retrieves this transaction data and compares it to social data obtained from a social networking site. Based on similarities between the two sets of data, the system creates a spend memory record. This record is then provided to the account holder's mobile device through a communication interface.
 
 
'''Abstract'''
 
Systems and methods include a database maintained by a financial institution that stores transaction data associated with a previous financial transaction performed via a financial account of a respective account holder, wherein the transaction data comprises a transaction location and a transaction timestamp, a spend memory processor of the financial institution that retrieves the transaction data from the database, interacts with a social linking application programming interface (API) to receive, via a network, social data from a social networking site, wherein the social data comprises a social location and a social timestamp, compares the social data to the transaction data, and creates a spend memory record based on one or more similarities between the social data and the transaction data, and a communication interface of the financial institution that provides the spend memory record to a mobile device associated with the account holder.
 
  
 
===DOCUMENT TERM RECOGNITION AND ANALYTICS (18328881)===
 
===DOCUMENT TERM RECOGNITION AND ANALYTICS (18328881)===
Line 236: Line 132:
 
'''Inventor'''
 
'''Inventor'''
 
Olalekan AWOYEMI
 
Olalekan AWOYEMI
 
'''Brief explanation'''
 
This abstract describes a device that can analyze a contractual document and provide a recommendation on whether to accept the offer based on the identified key terms and recipient preferences. The device converts image data of the document into text data, identifies key terms within the document, and determines the likelihood of these terms being favorable to the recipient. It then generates a recommendation based on this analysis and provides it to another device for further consideration.
 
 
'''Abstract'''
 
A device receives image data of a contractual document that includes an offer including terms of a proposed transaction, converts the image data to text data that identifies text within the contractual document, and receives preferences information for a recipient of the offer. The device identifies key terms within the contractual document by using term identification to analyze the text. The key terms may include a first key term that identifies subject matter of the proposed transaction and other key terms that are part of the offer. The device determines term scores that correspond to likelihoods of the other key terms being favorable to the recipient by using a data model to analyze the key terms and the preferences information. The device, based on the term scores, generates and provides another device with a recommendation to be used in determining whether the accept the offer.
 
  
 
===METHOD FOR DETERMINING CORRECT SCANNING DISTANCE USING AUGMENTED REALITY AND MACHINE LEARNING MODELS (18101982)===
 
===METHOD FOR DETERMINING CORRECT SCANNING DISTANCE USING AUGMENTED REALITY AND MACHINE LEARNING MODELS (18101982)===
Line 247: Line 137:
 
'''Inventor'''
 
'''Inventor'''
 
Staevan DUCKWORTH
 
Staevan DUCKWORTH
 
'''Brief explanation'''
 
A smart device has an application that shows a live video from its camera. The application can figure out the exact location on the ground where the smart device is pointing. It can then display a target on the video to show this location. Depending on how far the smart device is from this location, the application can add an indicator to the video. This indicator tells the user if the smart device is at the right distance to identify an object using a machine learning model.
 
 
'''Abstract'''
 
A smart device is provided with an application program for displaying a video feed received from the smart device's camera. The application can determine the coordinates for an intersection point, which is a point on the ground where the smart device is pointing at. The application can display a target on the visual representation of the intersection point. Based on whether the smart device is at an appropriate distance from the intersection point, the user interface can superimpose an indicator on the video feed received from the camera. This can inform the user whether the smart device is at an optimal scan distance from the intersection point (or an object) so that the object can be identified by a machine learning model.
 
  
 
===CUSTODIAL DIGITAL WALLET MANAGEMENT SYSTEMS (17711810)===
 
===CUSTODIAL DIGITAL WALLET MANAGEMENT SYSTEMS (17711810)===
Line 258: Line 142:
 
'''Inventor'''
 
'''Inventor'''
 
Kevin Osborn
 
Kevin Osborn
 
'''Brief explanation'''
 
This abstract describes systems and methods for enhancing the functionality and security of digital wallets. It suggests using hardware security modules (HSMs) to manage multiple cryptocurrency wallets in a custodial capacity. These HSMs would have features to improve the functionality and security of the wallets. The abstract also mentions secure management of signing keys and cryptocurrency addresses in wallets associated with user accounts, without the risk of theft or compromise.
 
 
'''Abstract'''
 
Systems and methods, as described herein, relate to increasing the functionality and security of digital wallets. These methods, techniques, and infrastructure may use hardware security modules (HSMs) to manage a plurality of cryptocurrency wallets in a custodial capacity. The HSMs may have functionality incorporated therein improve the functionality and security of cryptocurrency wallets. The aspects discussed herein may also relate to methods, techniques, and infrastructure to securely manage signing keys and cryptocurrency addresses contained in cryptocurrency wallets for a plurality of accounts that may be associated with a user account or user account identifier without exposing the keys to being stolen or otherwise comprised.
 
  
 
===SYSTEMS AND METHODS FOR SECURE REMOTE IDENTITY VERIFICATION (18314092)===
 
===SYSTEMS AND METHODS FOR SECURE REMOTE IDENTITY VERIFICATION (18314092)===
Line 269: Line 147:
 
'''Inventor'''
 
'''Inventor'''
 
Ryan FOX
 
Ryan FOX
 
'''Brief explanation'''
 
This abstract describes a system and method for verifying the identity of a user who wants to access a resource or service from a particular entity. The system includes a processor and instructions stored in a medium. The operations of the system involve receiving the user's credential information and receiving hash information from the entity's server. The system then generates its own hash information based on the user's information and compares it with the hash information received from the server. Based on this comparison, the system sends an indication to the server regarding the authentication result.
 
 
'''Abstract'''
 
Systems and methods are provided for authenticating an identity of a user requesting a resource or service from an entity. In some embodiments, a system may include at least one processor; and a non-transitory medium containing instructions that cause the system to perform operations. The operations may include receiving credential information associated with the remote user, and receiving, from the server associated with the entity, first hash information. The operations may also include generating second hash information based on information associated with the user, comparing the first hash information with the second hash information, and transmitting an indication based on the comparison to the server associated with the entity.
 
  
 
===VERIFICATION BASED ON AN ENCRYPTED REPRESENTATION OF A PHYSICAL IDENTIFIER ASSOCIATED WITH A USER (17657525)===
 
===VERIFICATION BASED ON AN ENCRYPTED REPRESENTATION OF A PHYSICAL IDENTIFIER ASSOCIATED WITH A USER (17657525)===
Line 280: Line 152:
 
'''Inventor'''
 
'''Inventor'''
 
Abdelkader M'Hamed BENKREIRA
 
Abdelkader M'Hamed BENKREIRA
 
'''Brief explanation'''
 
This abstract describes a system where a server receives a request from a user to use an encrypted version of their physical identifier. The server then sends a validation prompt to another user device, receives a response, and validates the request. The server then sends encrypted portions of the identifier to two remote servers to perform different actions associated with the user.
 
 
'''Abstract'''
 
In some implementations, a server may receive, from a first user device, a request to use an encrypted representation of a digital representation of a physical identifier (ID) associated with the user. Accordingly, the server may transmit, to a second user device, a prompt associated with validation of the request, and may receive, from the second user device, a response to the prompt. The server may validate the request using the response to the prompt. The server may transmit, to a first remote server, at least a first portion of the encrypted representation with a request to perform a first action associated with the user. The server may additionally transmit, to a second remote server, at least a second portion of the encrypted representation with a request to perform a second action associated with the user.
 
  
 
===VIRTUAL CREDENTIAL AUTHENTICATION BASED ON BROWSING CONTEXT (18327391)===
 
===VIRTUAL CREDENTIAL AUTHENTICATION BASED ON BROWSING CONTEXT (18327391)===
Line 291: Line 157:
 
'''Inventor'''
 
'''Inventor'''
 
Varun GUPTA
 
Varun GUPTA
 
'''Brief explanation'''
 
This abstract describes a system where an authentication device receives information about a user's website browsing activity. The device identifies valid web addresses associated with a virtual credential and compares them to the web address of the current website where the user entered their credential. The device then transmits information to the user's device to indicate whether the browsing activity is authenticated or not.
 
 
'''Abstract'''
 
In some implementations, an authentication device may receive information related to website browsing activity at a client device. The information related to the website browsing activity may include information associated with a web address for a current website where information associated with a virtual credential was entered. The authentication device may identify one or more valid web addresses associated with the virtual credential, which may be valid only for an entity associated with the one or more valid web addresses. The authentication device may transmit, to the client device, information to indicate whether the website browsing activity is authenticated based on a comparison of the web address for the current website where the information associated with the virtual credential was entered and the one or more valid web addresses associated with the virtual credential.
 

Latest revision as of 01:40, 12 October 2023

Summary of the patent applications from Capital One Services, LLC on October 5th, 2023

Capital One Services, LLC has recently filed patents for various systems and methods related to authentication, identity verification, digital wallets, smart devices, contractual document analysis, customer traffic analysis, and user profiles. These patents aim to enhance functionality, security, and user experience in different domains.

Notable recent patent applications by Capital One Services, LLC include:

  • A system for authentication based on website browsing activity, where an authentication device compares valid web addresses associated with a virtual credential to the web address of the current website.
  • A system for validating requests to use encrypted versions of physical identifiers, involving sending validation prompts, receiving responses, and performing actions associated with the user.
  • A system and method for verifying user identity by comparing hash information generated based on user credentials with hash information received from an entity's server.
  • Systems and methods for enhancing the functionality and security of digital wallets using hardware security modules (HSMs) to manage multiple cryptocurrency wallets and secure management of signing keys and addresses.
  • An application for smart devices that can determine the exact location on the ground where the device is pointing and display a target on the live video feed.
  • A device that analyzes contractual documents, converts image data into text data, identifies key terms, and provides recommendations on whether to accept the offer based on recipient preferences.
  • A system used by a financial institution to store transaction data and compare it to social data from a social networking site to create spend memory records.
  • A system that generates user profiles based on exchange behavior data and determines relevant entities for users based on their profiles.
  • A system that scans mobile devices for applications created by partnered companies and offers benefits when those applications are found.
  • A system and method for analyzing customer traffic in retail stores using sensors, displays, and processors to track user movement and generate records.

These recent patent filings demonstrate Capital One Services, LLC's focus on developing innovative solutions to improve authentication, identity verification, digital wallets, smart devices, contractual document analysis, customer traffic analysis, and user profiles.



Contents

Patent applications for Capital One Services, LLC on October 5th, 2023

AUGMENTED REALITY CARD ACTIVATION (18330907)

Inventor Reilly CARPENTER

AUGMENTED REALITY EXTENDED VIEW (17711474)

Inventor Michael Mossoba

MANAGING EXECUTION OF DATA PROCESSING JOBS IN A VIRTUAL COMPUTING ENVIRONMENT (18194776)

Inventor Ming YUAN

SYSTEMS AND METHODS FOR A SERVERLESS ORCHESTRATION LAYER (18192079)

Inventor Ajay SHINDE

LINEAGE-DRIVEN SOURCE CODE GENERATION FOR BUILDING, TESTING, DEPLOYING, AND MAINTAINING DATA MARTS AND DATA PIPELINES (18332030)

Inventor Venkateshwara MUDUMBA

METHOD AND SYSTEM FOR IMPLEMENTING A FAST DATASET SEARCH USING A COMPRESSED REPRESENTATION OF A PLURALITY OF DATASETS (18328376)

Inventor Austin Walters

UNSTRUCTURED TEXT PROCESSING FOR GEOGRAPHICAL LOCATION DETERMINATION SYSTEM (17709844)

Inventor Lokesh S. Tulshan

Scaling By Dynamic Discovery For Data Processing (18134711)

Inventor Hala Salim El-Ali

METHODS, MEDIUMS, AND SYSTEMS FOR REUSABLE INTELLIGENT SEARCH WORKFLOWS (17710009)

Inventor Paul CHO

SYSTEM AND METHOD FOR USING IMAGES TO AUTHENTICATE A USER (18331121)

Inventor Clayton JOHNSON

SYSTEMS AND METHODS FOR AUTHENTICATING USERS (18331926)

Inventor Joshua EDWARDS

TRANSACTION CARD WITH LIGHTWEIGHT CORE (18327046)

Inventor Tyler MAIMAN

COMPUTER-BASED SYSTEMS CONFIGURED FOR DETECTING, CLASSIFYING, AND VISUALIZING EVENTS IN LARGE-SCALE, MULTIVARIATE AND MULTIDIMENSIONAL DATASETS AND METHODS OF USE THEREOF (18301822)

Inventor John C. Stocker

SYSTEM AND METHOD FOR PROVIDING API VERSION CONTROL (18205870)

Inventor Satish KESIBOYANA

ORIENTATIONLESS TRANSACTION CARD (17706767)

Inventor Bryant YEE

SYSTEMS AND METHODS FOR TOKEN-BASED DEVICE BINDING DURING MERCHANT CHECKOUT (17712853)

Inventor Jeffrey RULE

PHYSICAL MEDIUM FOR RESTRICTED ACCOUNT ACCESS TO CONTRIBUTED RESOURCES (17657971)

Inventor Maneill PAREKH

SYSTEMS AND METHODS FOR PRODUCT PLACEMENT OPTIMIZATION BY SENSING CUSTOMER TRAFFIC IN STORES (18330594)

Inventor Thomas S. Poole

SYSTEM AND METHOD FOR SCANNING A MOBILE COMPUTING DEVICE FOR INSTALLED APPLICATIONS (18331140)

Inventor Anatoly IVASYUK

PEER-BASED SELECTION USING MACHINE LEARNING (17657250)

Inventor Lukiih CUAN

SYSTEM AND METHOD FOR PROVIDING A SPEND MEMORY RECORD (18330583)

Inventor Dwij TRIVEDI

DOCUMENT TERM RECOGNITION AND ANALYTICS (18328881)

Inventor Olalekan AWOYEMI

METHOD FOR DETERMINING CORRECT SCANNING DISTANCE USING AUGMENTED REALITY AND MACHINE LEARNING MODELS (18101982)

Inventor Staevan DUCKWORTH

CUSTODIAL DIGITAL WALLET MANAGEMENT SYSTEMS (17711810)

Inventor Kevin Osborn

SYSTEMS AND METHODS FOR SECURE REMOTE IDENTITY VERIFICATION (18314092)

Inventor Ryan FOX

VERIFICATION BASED ON AN ENCRYPTED REPRESENTATION OF A PHYSICAL IDENTIFIER ASSOCIATED WITH A USER (17657525)

Inventor Abdelkader M'Hamed BENKREIRA

VIRTUAL CREDENTIAL AUTHENTICATION BASED ON BROWSING CONTEXT (18327391)

Inventor Varun GUPTA