Difference between revisions of "Capital One Services, LLC patent applications published on December 28th, 2023"

From WikiPatents
Jump to navigation Jump to search
(Creating a new page)
 
(Creating a new page)
Tag: Replaced
Line 8: Line 8:
 
Reza FARIVAR
 
Reza FARIVAR
  
 
'''Brief explanation'''
 
The abstract describes a system where a server device receives information about a user participating in a screen sharing session and associates it with the user's interactions with an application on their device. The server then determines the user interface elements corresponding to the current view of the application and transmits this information to another device, allowing it to reconstruct the same view based on the received information and stored data.
 
 
* The server device receives information about a user participating in a screen sharing session.
 
* The user's interactions with an application on their device are associated with their identity.
 
* The server determines the user interface elements corresponding to the current view of the application.
 
* Information about these elements is transmitted to another device.
 
* The other device can reconstruct the same view using the received information and stored data.
 
 
== Potential Applications ==
 
* Collaborative work: Multiple users can view and interact with the same application interface simultaneously, enhancing collaboration and productivity.
 
* Remote assistance: Support personnel can see the exact view of the application the user is experiencing, allowing for more effective troubleshooting and guidance.
 
* Training and education: Instructors can share their application views with students, providing a real-time learning experience.
 
 
== Problems Solved ==
 
* Difficulty in sharing application views: This system simplifies the process of sharing application views between devices, eliminating the need for complex screen sharing setups.
 
* Ineffective remote assistance: Support personnel often struggle to understand the exact issue a user is facing. This system provides a clear and accurate representation of the user's application view, aiding in troubleshooting.
 
* Limited collaboration: Traditional screen sharing methods often restrict collaboration to one user controlling the application. This system enables multiple users to interact with the same application view simultaneously.
 
 
== Benefits ==
 
* Enhanced collaboration: Users can work together on the same application view, improving teamwork and productivity.
 
* Accurate remote assistance: Support personnel can accurately diagnose and resolve issues by seeing the exact application view of the user.
 
* Real-time learning: Instructors can provide a live demonstration of an application, allowing students to follow along and learn effectively.
 
 
'''Abstract'''
 
A server device may receive information identifying a user of a first device participating in a screen sharing session with a second device and associate the information identifying the user of the first device with information indicating a sequence of interactions with an application at the first device. The server device may determine one or more user interface elements that correspond to a current view of the application at the first device based on the sequence of interactions, and transmit, to the second device, information identifying the one or more user interface elements that correspond to the current view to permit the second device to reconstruct the current view based on the information identifying the one or more user interface elements that correspond to the current view and stored information related to a plurality of views associated with the application.
 
  
 
===SYSTEMS AND METHODS FOR PRESENTING WEB APPLICATION CONTENT ([[18463437. SYSTEMS AND METHODS FOR PRESENTING WEB APPLICATION CONTENT simplified abstract (Capital One Services, LLC)|18463437]])===
 
===SYSTEMS AND METHODS FOR PRESENTING WEB APPLICATION CONTENT ([[18463437. SYSTEMS AND METHODS FOR PRESENTING WEB APPLICATION CONTENT simplified abstract (Capital One Services, LLC)|18463437]])===
Line 43: Line 16:
 
Sayak BANERJEE
 
Sayak BANERJEE
  
 
'''Brief explanation'''
 
The patent application describes a method for presenting web application content using a web browser. Here are the key points:
 
 
* The method involves executing a web application that displays a web page element in a web browser.
 
* When a user performs an action, the method identifies the application component requested by the user.
 
* The method queries a component registry database to find the application component.
 
* From a link in the component registry database, the method obtains the application component code.
 
* The method incorporates the application component code into the web page element.
 
* Finally, the method renders the application component code and the web page element using the web browser, displaying the application component as part of the web page element.
 
 
Potential applications of this technology:
 
 
* This method can be used to enhance web applications by dynamically loading and displaying different components based on user actions.
 
* It can be used to create interactive and customizable web pages that adapt to user preferences and actions.
 
* This technology can be applied to various industries, such as e-commerce, online gaming, and social media platforms.
 
 
Problems solved by this technology:
 
 
* This method simplifies the process of presenting web application content by automatically incorporating application components into web page elements.
 
* It eliminates the need for manual coding and integration of application components, saving time and effort for developers.
 
* Users can have a seamless and interactive experience as the web application dynamically loads and displays the requested components.
 
 
Benefits of this technology:
 
 
* Developers can easily add and update application components without modifying the entire web application.
 
* Users can enjoy a personalized and interactive web experience with dynamically loaded components.
 
* This method improves the efficiency and flexibility of web application development.
 
 
'''Abstract'''
 
Systems and methods are disclosed for presenting web application content. A method for presenting web application content includes executing a web application using a web browser, the web application configured to display a web page element in a web browser. The method includes identifying an application component requested by a user action. The method also includes querying a component registry database for the application component, the component registry database including one or more application components loadable by the web application. The method then includes obtaining, from a link in the component registry database, application component code for the application component. The method also includes incorporating the application component code into the web page element. The method also includes rendering the application component code and the web page element using the web browser so that the application component is displayed in the web browser as part of the web page element.
 
  
 
===METHODS AND SYSTEMS FOR CLASSIFYING DATABASE RECORDS BY INTRODUCING TIME DEPENDENCY INTO TIME-HOMOGENEOUS PROBABILITY MODELS ([[18462642. METHODS AND SYSTEMS FOR CLASSIFYING DATABASE RECORDS BY INTRODUCING TIME DEPENDENCY INTO TIME-HOMOGENEOUS PROBABILITY MODELS simplified abstract (Capital One Services, LLC)|18462642]])===
 
===METHODS AND SYSTEMS FOR CLASSIFYING DATABASE RECORDS BY INTRODUCING TIME DEPENDENCY INTO TIME-HOMOGENEOUS PROBABILITY MODELS ([[18462642. METHODS AND SYSTEMS FOR CLASSIFYING DATABASE RECORDS BY INTRODUCING TIME DEPENDENCY INTO TIME-HOMOGENEOUS PROBABILITY MODELS simplified abstract (Capital One Services, LLC)|18462642]])===
Line 82: Line 24:
 
Hao Hua HUANG
 
Hao Hua HUANG
  
 
'''Brief explanation'''
 
Methods and systems are described for improving the efficiency of classifying user files in a database, particularly those with a temporal element. This is achieved by introducing time dependency into time-homogeneous probability models, which can then be used to classify user files more efficiently.
 
 
* The patent introduces time dependency into time-homogeneous probability models.
 
* This allows for improved classification of user files in a database.
 
* The method is particularly useful for files with a temporal element.
 
* By incorporating time dependency, the data processing efficiency is enhanced.
 
 
== Potential Applications ==
 
This technology has potential applications in various fields, including:
 
 
* Data management systems
 
* Content classification systems
 
* File organization and retrieval systems
 
* Time-sensitive data analysis
 
 
== Problems Solved ==
 
The technology addresses the following problems:
 
 
* Inefficient classification of user files in a database
 
* Difficulty in handling files with a temporal element
 
* Lack of time dependency in time-homogeneous probability models
 
* Slow data processing for files requiring temporal analysis
 
 
== Benefits ==
 
The benefits of this technology include:
 
 
* Improved efficiency in classifying user files
 
* Enhanced data processing speed
 
* More accurate classification of files with a temporal element
 
* Better organization and retrieval of time-sensitive data
 
 
'''Abstract'''
 
Methods and systems are described herein for improving data processing efficiency of classifying user files in a database. More particularly, methods and systems are described herein for improving data processing efficiency of classifying user files in a database in which the user files have a temporal element. The methods and system described herein accomplish these improvements by introducing time dependency into time-homogeneous probability models. Once time dependency has been introduced into the time-homogeneous probability models, these models may be used to improve the data processing efficiency of classifying the user files that feature a temporal element.
 
  
 
===USING BIOMETRIC BEHAVIOR TO PREVENT USERS FROM INAPPROPRIATELY ENTERING SENSITIVE INFORMATION ([[17847418. USING BIOMETRIC BEHAVIOR TO PREVENT USERS FROM INAPPROPRIATELY ENTERING SENSITIVE INFORMATION simplified abstract (Capital One Services, LLC)|17847418]])===
 
===USING BIOMETRIC BEHAVIOR TO PREVENT USERS FROM INAPPROPRIATELY ENTERING SENSITIVE INFORMATION ([[17847418. USING BIOMETRIC BEHAVIOR TO PREVENT USERS FROM INAPPROPRIATELY ENTERING SENSITIVE INFORMATION simplified abstract (Capital One Services, LLC)|17847418]])===
Line 125: Line 32:
 
Jennifer Kwok
 
Jennifer Kwok
  
 
'''Brief explanation'''
 
The patent application describes a system that uses biometric behavior to prevent the incorrect entry of sensitive information into electronic forms. Here are the key points:
 
 
* The system collects the current biometric behavior of a user while interacting with an electronic form.
 
* This behavior is compared to the user's past benchmark biometric behavior with the same electronic form.
 
* A similarity score is calculated based on the comparison result.
 
* If the similarity score meets a predetermined threshold, it is inferred that sensitive information has been incorrectly entered.
 
* The system identifies the incorrectly entered sensitive information.
 
* A machine learning model is triggered to generate a risk score based on the similarity score and the identified sensitive information.
 
* If the risk score meets a predetermined threshold, the user is prompted to redact the incorrectly entered sensitive information.
 
 
Potential applications of this technology:
 
 
* Online banking and financial transactions
 
* Healthcare records and patient information
 
* Government forms and applications
 
* E-commerce platforms
 
 
Problems solved by this technology:
 
 
* Prevents the incorrect entry of sensitive information into electronic forms
 
* Reduces the risk of data breaches and unauthorized access to sensitive information
 
* Enhances user experience by providing prompts for redacting incorrect information
 
 
Benefits of this technology:
 
 
* Improved security and protection of sensitive information
 
* Efficient and accurate identification of incorrectly entered information
 
* Customizable thresholds for similarity and risk scores to adapt to different use cases
 
* Integration with machine learning models for continuous improvement and adaptation.
 
 
'''Abstract'''
 
Disclosed embodiments can pertain to utilizing biometric behavior to prevent inappropriate entry of sensitive information. Current biometric behavior of a user, specific to the user's interaction with an electronic form, can be acquired and compared to benchmark biometric behavior of the user associated with past interaction with the electronic form to create a comparison result. A similarity score based on the comparison result can then be established. It can be inferred that sensitive information was incorrectly entered into the electronic form when the similarity score satisfies a predetermined similarity threshold. The sensitive information can be identified, and a machine learning model can be triggered to generate a risk score based on the similarity score and the identified sensitive information. A user can be prompted to redact incorrectly entered sensitive information when the risk score satisfies a predetermined risk threshold.
 
  
 
===TECHNIQUES TO PERFORM DYNAMIC CALL CENTER AUTHENTICATION UTILIZING A CONTACTLESS CARD ([[17850278. TECHNIQUES TO PERFORM DYNAMIC CALL CENTER AUTHENTICATION UTILIZING A CONTACTLESS CARD simplified abstract (Capital One Services, LLC)|17850278]])===
 
===TECHNIQUES TO PERFORM DYNAMIC CALL CENTER AUTHENTICATION UTILIZING A CONTACTLESS CARD ([[17850278. TECHNIQUES TO PERFORM DYNAMIC CALL CENTER AUTHENTICATION UTILIZING A CONTACTLESS CARD simplified abstract (Capital One Services, LLC)|17850278]])===
Line 167: Line 40:
 
Francis OGBENNAH
 
Francis OGBENNAH
  
 
'''Brief explanation'''
 
==Abstract==
 
Techniques and systems are described for performing authentication using a mini-application. This patent application introduces a simplified explanation of the abstract and provides bullet points to explain the patent/innovation.
 
 
* The patent application focuses on techniques and systems for authentication.
 
* Authentication is performed using a mini-application.
 
* The mini-application is designed to simplify the authentication process.
 
* The techniques and systems described in the patent application aim to enhance security and user experience during authentication.
 
 
==Potential Applications==
 
The technology described in this patent application has potential applications in various industries and scenarios, including:
 
 
* Online banking and financial services: The mini-application can be used to authenticate users accessing their accounts and conducting transactions securely.
 
* E-commerce platforms: The technology can be implemented to verify the identity of users during online purchases, ensuring secure transactions.
 
* Social media platforms: The mini-application can be utilized to authenticate users and protect their accounts from unauthorized access.
 
* Government services: The technology can be applied to authenticate citizens accessing government portals and services securely.
 
 
==Problems Solved==
 
The technology presented in this patent application addresses several problems related to authentication processes, including:
 
 
* Simplifying authentication: The mini-application simplifies the authentication process, making it more user-friendly and efficient.
 
* Enhancing security: By utilizing a mini-application, the technology enhances security measures, reducing the risk of unauthorized access.
 
* Improving user experience: The simplified authentication process provided by the mini-application improves the overall user experience, making it more convenient and user-friendly.
 
 
==Benefits==
 
The technology described in this patent application offers several benefits, including:
 
 
* Increased security: By utilizing a mini-application for authentication, the technology enhances security measures, reducing the risk of identity theft and unauthorized access.
 
* Improved user experience: The simplified authentication process provided by the mini-application improves user experience, making it more convenient and user-friendly.
 
* Streamlined processes: The technology streamlines the authentication process, saving time and effort for both users and service providers.
 
 
'''Abstract'''
 
Techniques and systems to perform authentication utilizing a mini-application.
 
  
 
===CONTEXT-BASED PATTERN MATCHING FOR SENSITIVE DATA DETECTION ([[17849439. CONTEXT-BASED PATTERN MATCHING FOR SENSITIVE DATA DETECTION simplified abstract (Capital One Services, LLC)|17849439]])===
 
===CONTEXT-BASED PATTERN MATCHING FOR SENSITIVE DATA DETECTION ([[17849439. CONTEXT-BASED PATTERN MATCHING FOR SENSITIVE DATA DETECTION simplified abstract (Capital One Services, LLC)|17849439]])===
Line 209: Line 48:
 
Anh TRUONG
 
Anh TRUONG
  
 
'''Brief explanation'''
 
The patent application describes a method for associating data labels with tokens in a text sequence by matching patterns.
 
* The method involves generating patterns to indicate a data label and associating a candidate token with the data label.
 
* The candidate token is selected from the text sequence based on a match with the patterns.
 
* The method also includes updating the patterns with new matches and removing patterns that match with certain token sequences.
 
* The token sequence collection is updated to include the candidate token and a context token.
 
 
Potential applications of this technology:
 
* Text classification and labeling in natural language processing tasks.
 
* Information extraction from unstructured text data.
 
* Sentiment analysis and opinion mining in social media or customer reviews.
 
 
Problems solved by this technology:
 
* Efficient and automated labeling of tokens in a text sequence.
 
* Handling large volumes of unstructured text data for analysis.
 
* Improving accuracy and consistency in text classification tasks.
 
 
Benefits of this technology:
 
* Streamlined and automated process for labeling tokens in text data.
 
* Increased efficiency and productivity in text analysis tasks.
 
* Improved accuracy and consistency in data labeling and classification.
 
 
'''Abstract'''
 
A method includes generating first patterns indicating a data label and associating a candidate token of a text sequence with the data label by removing first tokens from the text sequence based on a match of the first tokens with a token of second patterns and selecting the candidate token from other tokens of the text sequence based on a match between the candidate token and a token of the second patterns. The method also includes updating a token sequence collection to comprise the candidate token and a context token, updating the second patterns with new patterns that match the candidate token and the context token, and removing a first pattern from the second patterns based on a determination that the first pattern matches with a token sequence associated with the test tokens.
 
  
 
===SYSTEM AND METHOD FOR DYNAMIC GENERATION OF URL BY SMART CARD ([[18242405. SYSTEM AND METHOD FOR DYNAMIC GENERATION OF URL BY SMART CARD simplified abstract (Capital One Services, LLC)|18242405]])===
 
===SYSTEM AND METHOD FOR DYNAMIC GENERATION OF URL BY SMART CARD ([[18242405. SYSTEM AND METHOD FOR DYNAMIC GENERATION OF URL BY SMART CARD simplified abstract (Capital One Services, LLC)|18242405]])===
Line 242: Line 56:
 
Jeffrey RULE
 
Jeffrey RULE
  
 
'''Brief explanation'''
 
The abstract describes a smart card and methods for secure data access using the smart card. The smart card includes a microprocessor, memory, counter, and a unique identifier. It can generate a unique URL and transmit it securely to other devices for data access.
 
 
* The smart card is made of a substrate and includes a microprocessor, memory, counter, and unique identifier.
 
* It contains an applet in its memory.
 
* The smart card can dynamically generate a unique URL.
 
* The URL is transmitted securely via a contactless communication interface.
 
* The URL facilitates secure data access from other devices.
 
 
== Potential Applications ==
 
* Secure access to sensitive data or systems.
 
* Authentication and authorization processes.
 
* Secure transactions and payments.
 
* Access control for physical spaces or digital resources.
 
 
== Problems Solved ==
 
* Ensures secure data access by generating unique URLs.
 
* Provides a contactless communication interface for transmitting the URLs.
 
* Protects sensitive data and systems from unauthorized access.
 
 
== Benefits ==
 
* Enhanced security for data access and transactions.
 
* Convenient and efficient contactless communication.
 
* Unique URLs provide a secure and reliable means of access control.
 
 
'''Abstract'''
 
Embodiments of a smart card and systems and methods for secure data access using a smart card are described. The smart card may be formed a substrate and may include a microprocessor, a memory containing an applet, a counter, and a unique identifier. The smart card may dynamically generate a unique uniform resource location (URL) and transmit the URL to via a contactless communication interface to securely facilitate data access from other devices.
 
  
 
===SYSTEMS AND METHODS FOR GENERATING REAL-TIME DYNAMIC CONVERSATIONAL RESPONSES DURING CONVERSATIONAL INTERACTIONS USING MACHINE LEARNING MODELS ([[17850282. SYSTEMS AND METHODS FOR GENERATING REAL-TIME DYNAMIC CONVERSATIONAL RESPONSES DURING CONVERSATIONAL INTERACTIONS USING MACHINE LEARNING MODELS simplified abstract (Capital One Services, LLC)|17850282]])===
 
===SYSTEMS AND METHODS FOR GENERATING REAL-TIME DYNAMIC CONVERSATIONAL RESPONSES DURING CONVERSATIONAL INTERACTIONS USING MACHINE LEARNING MODELS ([[17850282. SYSTEMS AND METHODS FOR GENERATING REAL-TIME DYNAMIC CONVERSATIONAL RESPONSES DURING CONVERSATIONAL INTERACTIONS USING MACHINE LEARNING MODELS simplified abstract (Capital One Services, LLC)|17850282]])===
Line 278: Line 64:
 
Md Arafat Hossain KHAN
 
Md Arafat Hossain KHAN
  
 
'''Brief explanation'''
 
The patent application describes methods and systems for generating real-time dynamic conversational responses using machine learning models. These models are trained based on historic intents and user-specific interactions. Here are the key points:
 
 
* The invention uses machine learning models to generate real-time dynamic conversational responses.
 
* The models are trained using historic intents and user-specific interactions.
 
* One model selects a first intent from a range of intents based on historic data.
 
* Another model selects a first interaction-specific intent from a range of interaction-specific intents based on interaction-specific data for a user.
 
 
==Potential Applications==
 
This technology has potential applications in various fields, including:
 
 
* Customer service: It can be used to provide automated and personalized responses to customer queries in real-time.
 
* Virtual assistants: Virtual assistants can use this technology to generate more natural and context-aware responses during conversations.
 
* Chatbots: Chatbots can benefit from this technology to improve their conversational abilities and provide more accurate and relevant information.
 
 
==Problems Solved==
 
The technology addresses several problems in conversational interactions, such as:
 
 
* Lack of real-time dynamic responses: Traditional conversational systems often provide static and predefined responses, which may not be suitable for dynamic conversations.
 
* Limited personalization: Without user-specific training, conversational systems may struggle to understand and respond to individual users' needs and preferences.
 
* Contextual understanding: By considering historic intents and interaction-specific data, the technology enables better understanding of the context and generates more relevant responses.
 
 
==Benefits==
 
The use of this technology offers several benefits, including:
 
 
* Improved user experience: Real-time dynamic responses make conversations more engaging and natural, enhancing the overall user experience.
 
* Personalization: By considering user-specific data, the technology can tailor responses to individual users, making interactions more personalized.
 
* Enhanced efficiency: Automated and context-aware responses save time and effort for both users and conversational systems.
 
 
'''Abstract'''
 
Methods and systems are presented for generating real-time dynamic conversational responses during conversational interactions using machine learning models based on historic intents for a plurality of users and user-specific interactions. The machine learning models comprise a neural network trained to select a first intent from a plurality of intents based on historic data accumulated prior to the conversational interaction and a neural network trained to select a first interaction-specific intent from a plurality of interaction-specific intents based on interaction-specific data for a user.
 
  
 
===TOKEN SYNTHESIS FOR MACHINE LEARNING MODELS ([[17849391. TOKEN SYNTHESIS FOR MACHINE LEARNING MODELS simplified abstract (Capital One Services, LLC)|17849391]])===
 
===TOKEN SYNTHESIS FOR MACHINE LEARNING MODELS ([[17849391. TOKEN SYNTHESIS FOR MACHINE LEARNING MODELS simplified abstract (Capital One Services, LLC)|17849391]])===
Line 318: Line 72:
 
Anh TRUONG
 
Anh TRUONG
  
 
'''Brief explanation'''
 
The abstract describes a method for generating vectors associated with tokens using learning models and clustering criteria. It also involves modifying the vectors to generate perturbed vectors and synthesizing tokens based on these perturbed vectors. A second learning model is then trained based on the synthesized tokens.
 
 
* Method for generating vectors associated with tokens using learning models and clustering criteria
 
* Modifying vectors to generate perturbed vectors associated with a different label
 
* Updating vector sets with the perturbed vectors
 
* Synthesizing tokens based on the perturbed vectors using a different set of parameters
 
* Training a second learning model based on the synthesized tokens
 
 
== Potential Applications ==
 
* Natural language processing
 
* Sentiment analysis
 
* Text classification
 
* Information retrieval
 
 
== Problems Solved ==
 
* Improving the accuracy of learning models by generating perturbed vectors
 
* Enhancing the performance of clustering algorithms
 
* Increasing the efficiency of training learning models
 
 
== Benefits ==
 
* Improved accuracy and performance of learning models
 
* Enhanced clustering algorithms
 
* More efficient training of learning models
 
 
'''Abstract'''
 
A method includes generating a first vector associated with a token using a first set of parameters of a first learning model based on the token, determining a prediction indicating that the token is associated with a first label based on a set of clustering criteria, the first vector, vectors of a first vector set, and vectors of a second vector. The method includes generating a perturbed vector associated with a second label by modifying a value of the first vector and updating the second vector set to comprise the perturbed vector. The method also includes generating a synthesized token associated with the second vector set based on the perturbed vector using a second set of parameters of the first learning model and training a second learning model based on the synthesized token.
 
  
 
===SYSTEMS AND METHODS FOR AUTOMATED OBJECT RECOGNITION ([[18460014. SYSTEMS AND METHODS FOR AUTOMATED OBJECT RECOGNITION simplified abstract (Capital One Services, LLC)|18460014]])===
 
===SYSTEMS AND METHODS FOR AUTOMATED OBJECT RECOGNITION ([[18460014. SYSTEMS AND METHODS FOR AUTOMATED OBJECT RECOGNITION simplified abstract (Capital One Services, LLC)|18460014]])===
Line 354: Line 80:
 
Hannes Mikael JOUHIKAINEN
 
Hannes Mikael JOUHIKAINEN
  
 
'''Brief explanation'''
 
The patent application describes a method for recognizing objects in a video stream using machine learning algorithms.
 
 
* The method receives a video stream from a source and selects specific frames at a certain rate.
 
* The selected frames are divided into image blocks.
 
* The machine learning algorithm determines an image recognition parameter to identify image blocks containing an object.
 
* A likelihood metric is calculated based on the frame selection rate to determine if an image block corresponds to the object.
 
* Information identifying the object is displayed on a display.
 
 
==Potential Applications==
 
This technology has potential applications in various fields, including:
 
 
* Surveillance systems: It can be used to identify specific objects or individuals in video footage, enhancing security measures.
 
* Autonomous vehicles: The method can help vehicles recognize and track objects in real-time, improving safety and navigation.
 
* Augmented reality: It can be utilized to identify and overlay digital information on real-world objects in real-time.
 
 
==Problems Solved==
 
The method addresses the following problems:
 
 
* Object recognition in video streams: It provides a solution for accurately identifying objects in a continuous video stream.
 
* Efficient processing: By selecting frames at a certain rate, it reduces computational resources required for object recognition.
 
* Real-time identification: The method enables real-time identification of objects, allowing for immediate action or response.
 
 
==Benefits==
 
The technology offers several benefits, including:
 
 
* Improved accuracy: By utilizing machine learning algorithms, it enhances the accuracy of object recognition in video streams.
 
* Resource efficiency: The frame selection rate optimizes computational resources, making the method more efficient.
 
* Real-time response: The ability to identify objects in real-time enables immediate action or response based on the recognized objects.
 
 
'''Abstract'''
 
A method for recognizing an object in a video stream may include receiving a video stream comprising a plurality of video frames from a video source. The method may also select at least one video frame from the video frames according to a frame selection rate. The method may also partition the selected video frame into a first plurality of image blocks, and recognize, out of the first plurality of image blocks, a second plurality of image blocks which comprise an image of an object, the recognition being based on an image recognition parameter determined by a machine-learning algorithm. The method may also determine that at least one of the second plurality of image blocks corresponds to the object based on a likelihood metric, the likelihood metric being determined by the processor based on at least the frame selection rate, and display, on a display, information identifying the object.
 
  
 
===PROGRAMMATIC SELECTOR FOR CHOOSING A WELL-SUITED STACKED MACHINE LEARNING ENSEMBLE PIPELINE AND HYPERPARAMETER VALUES ([[17848728. PROGRAMMATIC SELECTOR FOR CHOOSING A WELL-SUITED STACKED MACHINE LEARNING ENSEMBLE PIPELINE AND HYPERPARAMETER VALUES simplified abstract (Capital One Services, LLC)|17848728]])===
 
===PROGRAMMATIC SELECTOR FOR CHOOSING A WELL-SUITED STACKED MACHINE LEARNING ENSEMBLE PIPELINE AND HYPERPARAMETER VALUES ([[17848728. PROGRAMMATIC SELECTOR FOR CHOOSING A WELL-SUITED STACKED MACHINE LEARNING ENSEMBLE PIPELINE AND HYPERPARAMETER VALUES simplified abstract (Capital One Services, LLC)|17848728]])===
Line 395: Line 88:
 
Michael LANGFORD
 
Michael LANGFORD
  
 
'''Brief explanation'''
 
The patent application describes a stacked machine learning model ensemble pipeline architecture selector that selects the best architecture for a given configuration input and target data set.
 
 
* The selector uses genetic programming to generate and score possible stacked ensemble pipeline architectures.
 
* It aims to find an architecture that is well-suited for the target data set and conforms to the configuration input.
 
* The selector converges on an architecture that meets specific scores, evaluation metrics, or other criteria.
 
 
Potential applications of this technology:
 
 
* Improving the performance of machine learning models by selecting the most suitable ensemble pipeline architecture.
 
* Automating the process of selecting the best architecture for a given data set and configuration input.
 
* Enhancing the accuracy and efficiency of machine learning systems.
 
 
Problems solved by this technology:
 
 
* Selecting the optimal ensemble pipeline architecture can be a time-consuming and complex task.
 
* Different data sets and configuration inputs require different architectures, making manual selection challenging.
 
* This technology automates the process and ensures the selection of a well-suited architecture.
 
 
Benefits of this technology:
 
 
* Saves time and effort by automating the selection process.
 
* Increases the accuracy and performance of machine learning models by choosing the most suitable architecture.
 
* Provides a systematic approach to selecting ensemble pipeline architectures for different data sets and configuration inputs.
 
 
'''Abstract'''
 
The exemplary embodiments may provide a stacked machine learning model ensemble pipeline architecture selector that selects a well-suited stacked machine learning model ensemble pipeline architecture for a specified configuration input and a target data set. The stacked machine learning model ensemble pipeline architecture selector may generate and score possible stacked machine learning model ensemble pipeline architectures to locate one that is well-suited for the target data set and the conforms with the configuration input. The stacked machine learning model ensemble pipeline architecture selector may use genetic programming to generate successive generations of possible stacked ensemble pipeline architectures and to score those architectures to determine how well-suited they are. In this manner, the stacked machine learning model ensemble pipeline architecture selector may converge on an architecture that is well-suited, for example, that meet one or more scores, evaluation metrics, and/or the like.
 
  
 
===AUTOMATED PAYMENT SPLITTING ([[17846540. AUTOMATED PAYMENT SPLITTING simplified abstract (Capital One Services, LLC)|17846540]])===
 
===AUTOMATED PAYMENT SPLITTING ([[17846540. AUTOMATED PAYMENT SPLITTING simplified abstract (Capital One Services, LLC)|17846540]])===
Line 431: Line 96:
 
Phoebe Atkins
 
Phoebe Atkins
  
 
'''Brief explanation'''
 
The disclosed technology relates to automated payment splitting. It involves detecting a bill for goods or services and identifying contacts who are with the user through social media image analysis. These contacts are then notified to join a payment group, which is created upon receiving a response. A split payment rubric is determined for the group, assigning payment responsibilities to each person based on social media image analysis. Finally, the bill is paid through a split payment among the group according to the rubric.
 
 
* The technology automates the process of splitting a bill among a group of people.
 
* It detects a bill for goods or services and identifies contacts who are with the user through social media image analysis.
 
* Contacts are notified to join a payment group, which is created upon receiving a response.
 
* A split payment rubric is determined for the group, assigning payment responsibilities to each person based on social media image analysis.
 
* The bill is paid through a split payment among the group according to the rubric.
 
 
==Potential Applications==
 
* This technology can be applied in various industries where group payments are common, such as restaurants, travel, and shared expenses.
 
* It can be integrated into mobile payment apps or platforms to provide a seamless and automated payment splitting experience for users.
 
 
==Problems Solved==
 
* Simplifies the process of splitting a bill among a group of people, eliminating the need for manual calculations and individual payments.
 
* Reduces the potential for conflicts or misunderstandings regarding payment responsibilities within a group.
 
* Saves time and effort by automating the payment splitting process.
 
 
==Benefits==
 
* Provides a convenient and efficient way to split bills among a group of people.
 
* Enhances social interactions by streamlining the payment process and reducing friction.
 
* Reduces the burden on individuals to manually calculate and collect payments from each person in a group.
 
 
'''Abstract'''
 
Disclosed embodiments pertain to automated payment splitting. A bill to a user for goods or services can be detected. Contacts that are collocated with the user can be determined via social media image analysis. A notification can be sent to the contacts to join a payment group. The payment group can be created upon receiving a response to the notification. A split payment rubric can be determined for the payment group. The split payment rubric can enumerate payment responsibilities of each person in the payment group using social media image analysis. Payment of the bill can be completed via a split payment amongst the payment group according to the split payment rubric.
 
  
 
===SYSTEMS AND METHODS FOR ACCOUNTS WITH MULTIPLE PROFILES ([[17851514. SYSTEMS AND METHODS FOR ACCOUNTS WITH MULTIPLE PROFILES simplified abstract (Capital One Services, LLC)|17851514]])===
 
===SYSTEMS AND METHODS FOR ACCOUNTS WITH MULTIPLE PROFILES ([[17851514. SYSTEMS AND METHODS FOR ACCOUNTS WITH MULTIPLE PROFILES simplified abstract (Capital One Services, LLC)|17851514]])===
Line 465: Line 104:
 
Wendy Wu
 
Wendy Wu
  
 
'''Brief explanation'''
 
The disclosed patent application describes a method for using accounts with multiple profiles, allowing a primary user to create secondary user profiles with their own Virtual Card Numbers (VCNs) and spending limits.
 
 
* The system allows a primary user to create one or more secondary user profiles with their own VCNs and attributes.
 
* Each secondary user profile can have individual spending limits, including merchant category, overall spending, and geographic limits.
 
* Soft spending limits can be set, allowing the primary user to approve purchases that exceed the limits.
 
* The primary user can assemble attributes to create specific and creative spending limits for each secondary user profile.
 
* Each transaction is associated with the user profile using the specific VCN, and a graphical user interface (GUI) is generated for the primary user to view the second user profile, its current balance, and transaction history.
 
 
Potential applications of this technology:
 
 
* Family budgeting: The primary user can create secondary user profiles for family members, allowing them to have their own spending limits and track their transactions.
 
* Business expense management: The primary user can create secondary user profiles for employees, enabling them to have separate spending limits for business expenses.
 
* Parental control: The primary user can create secondary user profiles for children, setting spending limits and monitoring their transactions.
 
 
Problems solved by this technology:
 
 
* Lack of control over spending: The system allows the primary user to set spending limits for each secondary user profile, preventing excessive spending.
 
* Difficulty in tracking transactions: The GUI generated by the system provides the primary user with an overview of the second user profile's balance and transaction history, making it easier to track expenses.
 
 
Benefits of this technology:
 
 
* Enhanced financial management: The system allows for better control and management of finances by providing separate profiles and spending limits.
 
* Flexibility and customization: The primary user can assemble attributes to create unique spending limits for each secondary user profile.
 
* Improved transparency: The GUI provides a clear overview of the second user profile's balance and transaction history, promoting transparency in financial management.
 
 
'''Abstract'''
 
Disclosed embodiments may include a method for using accounts with multiple profiles where the system allows a primary user to create one or more secondary user profiles. Each secondary user profile is associated with its own VCN and one or more attributes. The one or more attributes can be used to limit the spending ability of each secondary user individually with hard and soft spending limits including merchant category, overall spending, and geographic limits. Purchases by a secondary user that violate the soft limits may be allowed by the primary user using an application associated with the primary account number. Attributes can be assembled by the primary user to create specific and creative spending limits. The system associates each transaction with the user profile using the specific VCN and generates a GUI for the primary user showing the second user profile, its current balance, and transaction history.
 
  
 
===MOBILE WEB BROWSER AUTHENTICATION AND CHECKOUT USING A CONTACTLESS CARD ([[17847961. MOBILE WEB BROWSER AUTHENTICATION AND CHECKOUT USING A CONTACTLESS CARD simplified abstract (Capital One Services, LLC)|17847961]])===
 
===MOBILE WEB BROWSER AUTHENTICATION AND CHECKOUT USING A CONTACTLESS CARD ([[17847961. MOBILE WEB BROWSER AUTHENTICATION AND CHECKOUT USING A CONTACTLESS CARD simplified abstract (Capital One Services, LLC)|17847961]])===
Line 502: Line 112:
 
Jeffrey RULE
 
Jeffrey RULE
  
 
'''Brief explanation'''
 
The abstract describes a system where a merchant page in a browser can receive a selection of a financial institution. The merchant page generates a URI that directs to an application. The URI is registered with the application and the financial institution in a mobile operating system. When the URI is selected, the mobile OS launches the application, which authenticates credentials for an account. The application associates user ID and session ID parameters with the account and receives a cryptogram from a contactless card. The application then receives an indication from a server that verifies the cryptogram. The OS then launches the browser, which refreshes the page and includes a virtual card number (VCN) in a form field. A transaction can be processed based on the VCN.
 
 
* The system allows a merchant page to generate a URI that directs to an application.
 
* The application authenticates credentials for an account and associates user ID and session ID parameters with the account.
 
* The application receives a cryptogram from a contactless card and verifies it with a server.
 
* The browser is launched by the mobile OS and refreshes the page with a VCN in a form field.
 
* Transactions can be processed based on the VCN.
 
 
== Potential Applications ==
 
* Online shopping platforms
 
* Mobile payment systems
 
* Financial institutions and banks
 
 
== Problems Solved ==
 
* Simplifies the authentication process for mobile transactions
 
* Provides a secure method for verifying cryptograms from contactless cards
 
* Streamlines the transaction process for users and merchants
 
 
== Benefits ==
 
* Enhanced security for mobile transactions
 
* Improved user experience with simplified authentication and transaction processing
 
* Increased efficiency for merchants and financial institutions in handling mobile payments.
 
 
'''Abstract'''
 
A merchant page in a browser may receive selection of a first financial institution. The merchant page may generate a uniform resource identifier (URI) directed to an application. At least a portion of the URI may be registered with the application and the first financial institution in a mobile operating system. Responsive to receiving selection of the URI, the mobile OS may launch the application, which may authenticate credentials for an account. The application may associate the user ID parameter and the session ID parameter with the account and receive a cryptogram from a contactless card. The application may receive, from a server, an indication specifying the server verified the cryptogram. The OS may launch the browser, which may refresh the page. The refreshed page may include a virtual card number (VCN) in a first form field. A transaction may be processed based on the VCN.
 
  
 
===METHODS AND SYSTEMS FOR DISPLAYING ACCOUNT INFORMATION ([[18465036. METHODS AND SYSTEMS FOR DISPLAYING ACCOUNT INFORMATION simplified abstract (Capital One Services, LLC)|18465036]])===
 
===METHODS AND SYSTEMS FOR DISPLAYING ACCOUNT INFORMATION ([[18465036. METHODS AND SYSTEMS FOR DISPLAYING ACCOUNT INFORMATION simplified abstract (Capital One Services, LLC)|18465036]])===
Line 537: Line 120:
 
Adam R. KOEPPEL
 
Adam R. KOEPPEL
  
 
'''Brief explanation'''
 
The patent application describes systems and methods for displaying account information using a portable smart display device that communicates with a mobile device. Here are the key points:
 
 
* The smart display device is small enough to fit in a wallet and can be easily accessed by the user.
 
* It provides quick and secure access to account information without the need for complex login and verification processes.
 
* The device receives real-time account information from the mobile device and displays it when activated.
 
* This technology offers an enjoyable user experience and serves as a useful tool for quickly informing the user about their financial situation.
 
 
Potential applications of this technology:
 
 
* Personal finance management tools
 
* Banking and financial institution applications
 
* Retail and e-commerce platforms
 
* Mobile payment systems
 
 
Problems solved by this technology:
 
 
* Eliminates the need for multi-step login and verification processes, saving time and effort for users.
 
* Provides a convenient and easily accessible way to check account information on the go.
 
* Enhances user experience by offering real-time updates and quick access to financial data.
 
 
Benefits of this technology:
 
 
* Quick and easy access to account information
 
* Enhanced security with short-range communication between devices
 
* Portable and convenient for users to carry in their wallets
 
* Real-time updates provide users with up-to-date financial information
 
 
'''Abstract'''
 
Systems and methods are provided for displaying account information. The systems and methods may include a portable smart display device in short-range communication with a mobile device. The smart display device may be configured to provide a user with quick and easy yet secure access to account information, without the need for multi-step login and verification processes. The smart display device may be sized to fit within a wallet and within quick, easy reach of a user. The smart display device may receive up-to-date account information from the mobile device, and display the account information on-demand upon detecting an activation event, thereby providing an enjoyable user experience and a useful tool for quickly informing the user of their financial situation.
 
  
 
===SYSTEMS AND METHODS FOR SECURELY GENERATING AND PRINTING A DOCUMENT ([[18467378. SYSTEMS AND METHODS FOR SECURELY GENERATING AND PRINTING A DOCUMENT simplified abstract (Capital One Services, LLC)|18467378]])===
 
===SYSTEMS AND METHODS FOR SECURELY GENERATING AND PRINTING A DOCUMENT ([[18467378. SYSTEMS AND METHODS FOR SECURELY GENERATING AND PRINTING A DOCUMENT simplified abstract (Capital One Services, LLC)|18467378]])===
Line 576: Line 128:
 
Jade GARRETT
 
Jade GARRETT
  
 
'''Brief explanation'''
 
The patent application describes a system and method for securely generating and printing documents. Here are the key points:
 
 
* The system receives document information from a computing device through a network.
 
* The information is verified, and if valid, document generation data is created using a portion of the information.
 
* The document generation data includes metadata that allows the generation of an image of the document.
 
* The system verifies authentication information from both the computing device and the printing device.
 
* Once authenticated, the document generation data is transmitted to the printing device through the network.
 
* The printing device then prints the image of the document.
 
 
Potential applications of this technology:
 
 
* Secure document generation and printing for businesses and organizations.
 
* Document authentication and verification processes.
 
* Streamlining document generation and printing workflows.
 
 
Problems solved by this technology:
 
 
* Ensures the security and integrity of document generation and printing processes.
 
* Reduces the risk of unauthorized access or tampering with sensitive documents.
 
* Simplifies and automates the document generation and printing workflow.
 
 
Benefits of this technology:
 
 
* Enhanced security and privacy for document generation and printing.
 
* Improved efficiency and accuracy in document workflows.
 
* Streamlined collaboration and sharing of documents between different devices and locations.
 
 
'''Abstract'''
 
Systems and methods for securely generating and printing documents are disclosed. For example, processor(s) of a computer system may receive information for the document from a computing device through a network, verify the information for the document, and upon verification, generate document generation data using at least a portion of the information for the document. The document generation data may include document metadata that enables generation of an image of the document and/or the image of the document. Upon the processor(s) verifying first authentication information of a first code associated with a printing device received from the computing device through the network and second authentication information of a second code associated with the computing device received from the printing device through the network, the processor(s) may transmit the document generation data to the printing device through the network, and cause the printing device to print the image of the document.
 
  
 
===SYSTEMS AND METHODS FOR MONITORING POST-TRANSACTION ADJUSTMENTS ([[17851568. SYSTEMS AND METHODS FOR MONITORING POST-TRANSACTION ADJUSTMENTS simplified abstract (Capital One Services, LLC)|17851568]])===
 
===SYSTEMS AND METHODS FOR MONITORING POST-TRANSACTION ADJUSTMENTS ([[17851568. SYSTEMS AND METHODS FOR MONITORING POST-TRANSACTION ADJUSTMENTS simplified abstract (Capital One Services, LLC)|17851568]])===
Line 615: Line 136:
 
Anne Moshyedi
 
Anne Moshyedi
  
 
'''Brief explanation'''
 
The disclosed patent application describes a system for monitoring post-transaction adjustments. Here are the key points:
 
 
* The system receives data related to a transaction and determines if it indicates a post-transaction event (PTE).
 
* If a PTE is detected, the system prompts the user to confirm the event and enter a post-transaction amount (PTA) associated with it.
 
* The system continuously monitors the data to check if it has been updated with a second PTA.
 
* If a second PTA is found and it matches the first PTA, the system confirms the transaction and displays a confirmation indication to the user.
 
* If the PTAs do not match, the system takes fraud prevention actions.
 
 
Potential applications of this technology:
 
 
* Financial institutions can use this system to monitor and verify post-transaction adjustments, ensuring the accuracy of transactions and preventing fraud.
 
* E-commerce platforms can implement this system to provide an additional layer of security and prevent unauthorized post-transaction changes.
 
* Payment processors can utilize this technology to detect and prevent fraudulent activities related to post-transaction adjustments.
 
 
Problems solved by this technology:
 
 
* Ensures the accuracy of post-transaction adjustments by verifying the user's confirmation and matching PTAs.
 
* Helps prevent fraud by detecting discrepancies between PTAs and taking appropriate action.
 
* Provides a user-friendly interface for confirming post-transaction events and displaying confirmation indications.
 
 
Benefits of this technology:
 
 
* Increases transaction security by monitoring and verifying post-transaction adjustments.
 
* Reduces the risk of fraudulent activities by promptly detecting and preventing unauthorized changes.
 
* Enhances user experience by providing a clear and intuitive interface for confirming and displaying transaction confirmations.
 
 
'''Abstract'''
 
Disclosed embodiments may include a system for monitoring post-transaction adjustments. The system may receive data associated with a transaction, and determine whether the transaction is indicative of a post-transaction event (PTE). The system may cause a user device to display, via a GUI, a notification to prompt a user to confirm the PTE occurred and to enter a post-transaction amount (PTA) associated with the PTE. The system may monitor the data to determine whether the data has been updated to include a second PTA, and if so, the system may determine whether the first and second PTAs match. When a match is determined, the system may confirm the transaction, modify the GUI to generate a modified GUI comprising a confirmation indication, and cause the user device to display the confirmation indication. When no match is determined, the system may initiate fraud prevention action(s).
 
  
 
===AUTHENTICATING A CARD BASED ON CARD MOVEMENT ([[17847771. AUTHENTICATING A CARD BASED ON CARD MOVEMENT simplified abstract (Capital One Services, LLC)|17847771]])===
 
===AUTHENTICATING A CARD BASED ON CARD MOVEMENT ([[17847771. AUTHENTICATING A CARD BASED ON CARD MOVEMENT simplified abstract (Capital One Services, LLC)|17847771]])===
Line 653: Line 144:
 
Cruz Vargas
 
Cruz Vargas
  
 
'''Brief explanation'''
 
The disclosed embodiments of this patent application relate to user authentication and fraud detection at a card reader. Here is a simplified explanation of the abstract:
 
 
* A sensor is used to capture the movement of a card when it is presented to a card reader.
 
* The movement of the card can be measured in terms of speed, acceleration, or motion.
 
* This card movement data is compared to pre-stored data associated with the owner of the card.
 
* If the comparison result meets a predetermined threshold, the card user is authenticated.
 
* Once authenticated, the transaction can be authorized based on the user's identity.
 
 
Potential applications of this technology:
 
 
* This technology can be used in various industries where card readers are used, such as retail, banking, and transportation.
 
* It can enhance security measures by adding an additional layer of authentication to prevent unauthorized transactions.
 
 
Problems solved by this technology:
 
 
* This technology helps to detect and prevent fraud by verifying the authenticity of the card user before authorizing a transaction.
 
* It provides an extra level of security by analyzing the movement of the card, which can help identify suspicious or unauthorized activity.
 
 
Benefits of this technology:
 
 
* Improved user authentication: By analyzing card movement, this technology can provide a more reliable and accurate method of authenticating card users.
 
* Enhanced fraud detection: The ability to detect fraudulent activity before a transaction occurs can help prevent financial losses and protect cardholders.
 
* Increased security: Adding card movement analysis to the authentication process adds an extra layer of security, making it more difficult for unauthorized individuals to use stolen or counterfeit cards.
 
 
'''Abstract'''
 
Disclosed embodiments concern user authentication and detecting fraud at a card reader before an unauthorized transaction occurs based on card movement. A sensor can capture the movement of a card within proximity of a card reader that captures financial data from a card issued to a user. Card movement can correspond to the card's speed, acceleration, or motion during physical presentation of the card to the card reader. Card movement data associated with the card movement can be captured and compared to pre-stored data associated with an owner of the card to create a comparison result. A card user can be authenticated when the comparison result satisfies a predetermined threshold. Authorization of a transaction can then be performed based on an authenticated identity of the card user.
 
  
 
===SYSTEMS AND METHODS FOR ASSISTING USERS IN ASSESSING COSTS OF TRANSACTIONS ([[18466407. SYSTEMS AND METHODS FOR ASSISTING USERS IN ASSESSING COSTS OF TRANSACTIONS simplified abstract (Capital One Services, LLC)|18466407]])===
 
===SYSTEMS AND METHODS FOR ASSISTING USERS IN ASSESSING COSTS OF TRANSACTIONS ([[18466407. SYSTEMS AND METHODS FOR ASSISTING USERS IN ASSESSING COSTS OF TRANSACTIONS simplified abstract (Capital One Services, LLC)|18466407]])===
Line 689: Line 152:
 
Austin WALTERS
 
Austin WALTERS
  
 
'''Brief explanation'''
 
The patent application describes a system and method for helping users assess the costs of transactions. Here are the key points:
 
 
* The system determines the cost of a transaction associated with a user.
 
* The user is classified into a category based on their consumer interest characteristics and the characteristics associated with the category.
 
* A relatable product is identified based on the consumer interest characteristics of the category. This product is commonly purchased by others in the same category.
 
* The system calculates a relatable cost value, which represents the cost of the user's transaction using a quantity of the relatable product.
 
* The relatable cost value is then presented to the user.
 
 
Potential applications of this technology:
 
 
* E-commerce platforms can use this system to provide users with a better understanding of the costs associated with their transactions.
 
* Financial institutions can utilize this system to help users assess the costs of their financial transactions, such as loans or investments.
 
* Retailers can use this system to offer personalized cost comparisons to customers, helping them make more informed purchasing decisions.
 
 
Problems solved by this technology:
 
 
* Users often struggle to accurately assess the costs of their transactions, leading to potential financial difficulties or regretful purchases.
 
* This system addresses this problem by providing users with a relatable cost value based on their consumer interest characteristics and the purchasing behavior of others in the same category.
 
 
Benefits of this technology:
 
 
* Users can make more informed decisions about their transactions, leading to better financial management.
 
* The system helps users understand the true costs of their purchases, reducing the likelihood of unexpected expenses.
 
* Businesses can provide personalized cost comparisons, enhancing the user experience and potentially increasing customer satisfaction and loyalty.
 
 
'''Abstract'''
 
Systems and methods are disclosed for assisting users in assessing costs of transactions. For instance, method may include: determining a cost value of at least one transaction associated with a user; classifying the user into a category, based on consumer interest characteristics of the user and consumer interest characteristics associated with the category; determining a relatable product based on the consumer interest characteristics associated with the category, the relatable product being a product purchased by a plurality of persons classified in the category; determining a relatable cost value, the relatable cost value being a representation of the cost value of the at least one transaction using a quantity of the respective relatable product; and presenting the relatable cost value to the user.
 
  
 
===OPTIMIZED EXCHANGE RATES BASED ON USER PROFILES ([[17808127. OPTIMIZED EXCHANGE RATES BASED ON USER PROFILES simplified abstract (Capital One Services, LLC)|17808127]])===
 
===OPTIMIZED EXCHANGE RATES BASED ON USER PROFILES ([[17808127. OPTIMIZED EXCHANGE RATES BASED ON USER PROFILES simplified abstract (Capital One Services, LLC)|17808127]])===
Line 726: Line 160:
 
Michael MOSSOBA
 
Michael MOSSOBA
  
 
'''Brief explanation'''
 
The patent application describes a device that obtains a user profile associated with a user, including their gaming profile, use history, and exchange history. The device uses a machine learning model to determine a propensity score based on the user's memory usage indicated by their gaming profile. Based on this score, the device determines an exchange rate for converting program points to virtual points in a game. When the user initiates an exchange, the device communicates with another device to make the virtual points available in a second account.
 
 
* Device obtains user profile with gaming profile, use history, and exchange history
 
* Machine learning model determines propensity score based on user's memory usage
 
* Propensity score used to determine exchange rate for converting program points to virtual points
 
* Device communicates with another device to make virtual points available in a second account
 
 
== Potential Applications ==
 
* Gaming platforms and consoles
 
* Virtual currency systems
 
* Online marketplaces
 
 
== Problems Solved ==
 
* Efficient conversion of program points to virtual points
 
* Personalized exchange rates based on user behavior
 
* Seamless transfer of virtual points to another account
 
 
== Benefits ==
 
* Improved user experience in gaming and virtual currency systems
 
* Increased user engagement and loyalty
 
* Customized exchange rates based on user preferences
 
* Simplified process for transferring virtual points to another account
 
 
'''Abstract'''
 
In some implementations, a device may obtain a first user profile associated with a first user that indicates: a first user gaming profile; a first use history, associated with program points, of the first user; and/or a first exchange history associated with the first user. The device may determine, using a machine learning model, a propensity score associated with the first user based on the first user profile that is based on a memory usage, associated with a gaming console, indicated by the first user gaming profile. The device may determine, based on the propensity score, a first exchange rate for converting the program points to the virtual points of the first game. The device may receive an indication of an exchange initiated by the first user. The device may communicate, with a device, to cause the one or more virtual points to be made available to a second account.
 
  
 
===DEMAND EQUILIBRIUM BASED PRICING ([[17846148. DEMAND EQUILIBRIUM BASED PRICING simplified abstract (Capital One Services, LLC)|17846148]])===
 
===DEMAND EQUILIBRIUM BASED PRICING ([[17846148. DEMAND EQUILIBRIUM BASED PRICING simplified abstract (Capital One Services, LLC)|17846148]])===
Line 761: Line 168:
 
Ray Cheng
 
Ray Cheng
  
 
'''Brief explanation'''
 
The patent application describes a demand-equilibrium-based pricing system that uses transaction data to determine the pricing schedule for a merchant's items. Here are the key points:
 
 
* The system utilizes transaction data to generate and train a pricing model.
 
* The pricing model is used to determine a pricing schedule for the merchant's items.
 
* The pricing schedule sets prices based on the time of day and the transaction rate of the merchant.
 
* The pricing schedule can be displayed digitally at the merchant's location.
 
* The pricing schedule can be updated to achieve a target transaction rate throughout the merchant's business hours.
 
 
== Potential Applications ==
 
This technology can be applied in various industries and scenarios, including:
 
 
* Retail: Retailers can use this system to dynamically adjust prices based on demand and transaction rates, optimizing revenue and customer satisfaction.
 
* Hospitality: Hotels and restaurants can implement this system to adjust prices for rooms, meals, and services based on demand fluctuations throughout the day.
 
* Transportation: Airlines, ride-sharing services, and public transportation can utilize this system to adjust fares based on demand and optimize capacity utilization.
 
* Online marketplaces: E-commerce platforms can employ this system to dynamically adjust prices for products based on demand and transaction rates.
 
 
== Problems Solved ==
 
The demand-equilibrium-based pricing system addresses the following problems:
 
 
* Inefficient pricing: Traditional fixed pricing models may not accurately reflect demand and can result in missed revenue opportunities or dissatisfied customers.
 
* Manual pricing updates: Manually adjusting prices based on demand can be time-consuming and prone to errors.
 
* Suboptimal capacity utilization: Without dynamic pricing, businesses may struggle to optimize capacity utilization during peak and off-peak hours.
 
 
== Benefits ==
 
Implementing this technology offers several benefits:
 
 
* Revenue optimization: By adjusting prices based on demand, businesses can maximize revenue potential and profitability.
 
* Improved customer satisfaction: Dynamic pricing ensures that prices are aligned with demand, providing customers with fair and competitive pricing.
 
* Efficient pricing updates: The system automates the pricing update process, saving time and reducing the risk of errors.
 
* Capacity utilization optimization: Businesses can better manage capacity during peak and off-peak hours, improving operational efficiency.
 
 
'''Abstract'''
 
Disclosed aspects pertain to demand-equilibrium-based pricing. Transaction data associated with a merchant can be utilized to generate and train a pricing model. The pricing model can be invoked to determine a pricing schedule for a set of items offered by the merchant. The pricing schedule can set prices of items based on the time of day and the transaction rate of the merchant. The pricing schedule can be implemented with the merchant through a digital display. The pricing schedule can also be updated such that prices for the items offered by the merchant can change based on the time of day to achieve a target transaction rate through the merchant's business hours.
 
  
 
===SYSTEMS AND METHODS FOR PURCHASE DEVICE ([[18462929. SYSTEMS AND METHODS FOR PURCHASE DEVICE simplified abstract (Capital One Services, LLC)|18462929]])===
 
===SYSTEMS AND METHODS FOR PURCHASE DEVICE ([[18462929. SYSTEMS AND METHODS FOR PURCHASE DEVICE simplified abstract (Capital One Services, LLC)|18462929]])===
Line 804: Line 176:
 
Adam KOEPPEL
 
Adam KOEPPEL
  
 
'''Brief explanation'''
 
The abstract describes a system and method for in-store purchases. Here is a simplified explanation of the abstract:
 
 
* The method involves a customer using their device to provide their preferences and other data.
 
* The customer data is stored and used to identify a merchant located near the customer.
 
* Based on the customer's preferences, a customer order is determined for the identified merchant.
 
* A notification containing the customer order is sent to the merchant's device.
 
 
Potential applications of this technology:
 
 
* This technology can be used in retail stores to streamline the purchasing process for customers.
 
* It can be integrated into mobile apps or websites of merchants to enhance the customer experience.
 
* The system can be used in various industries such as restaurants, grocery stores, and clothing stores.
 
 
Problems solved by this technology:
 
 
* It eliminates the need for customers to physically browse through a store or wait in line to place an order.
 
* It allows customers to easily communicate their preferences and receive personalized recommendations.
 
* The system reduces the chances of miscommunication between customers and merchants.
 
 
Benefits of this technology:
 
 
* Customers can save time and effort by pre-ordering their desired items before arriving at the store.
 
* Merchants can provide personalized recommendations and offers based on customer preferences.
 
* The system improves efficiency and customer satisfaction by streamlining the ordering process.
 
 
'''Abstract'''
 
Systems and methods for in-store purchases are provided. An exemplary method may include receiving by a customer device associated with a customer, customer data including customer preference data. The method may include storing the received customer data and identifying a merchant at a location of the customer. The method may also include determining a customer order for the identified merchant based on the customer preference data. Further, the method may include transmitting a notification to a merchant device associated with the identified merchant, the notification including the determined customer order.
 
  
 
===TRANSACTION AND RECEIPT BASED ALERT AND NOTIFICATION SYSTEM AND TECHNIQUES ([[18243596. TRANSACTION AND RECEIPT BASED ALERT AND NOTIFICATION SYSTEM AND TECHNIQUES simplified abstract (Capital One Services, LLC)|18243596]])===
 
===TRANSACTION AND RECEIPT BASED ALERT AND NOTIFICATION SYSTEM AND TECHNIQUES ([[18243596. TRANSACTION AND RECEIPT BASED ALERT AND NOTIFICATION SYSTEM AND TECHNIQUES simplified abstract (Capital One Services, LLC)|18243596]])===
Line 841: Line 184:
 
Latika GULATI
 
Latika GULATI
  
 
'''Brief explanation'''
 
The abstract describes a sales notification application that can provide users with information about better prices for products. Here are the key points:
 
 
* The application obtains product information from purchase receipts uploaded by mobile devices.
 
* It determines similarities between the product information from different purchases.
 
* The application aggregates the product information based on these similarities.
 
* Users can provide a selected product and its purchase location for comparison to the aggregated information.
 
* The application outputs a comparison result to the sales notification application.
 
* Users can use a payment card enabled by the application to purchase the selected product.
 
 
==Potential Applications==
 
* Retail: This technology can be used by retailers to provide customers with notifications about better prices for products they have purchased before, encouraging repeat purchases.
 
* Price Comparison: The application can be used as a price comparison tool, helping users find the best deals for products they are interested in.
 
* Personal Finance: Users can use the application to track their spending and make informed decisions about future purchases.
 
 
==Problems Solved==
 
* Lack of Price Awareness: The application solves the problem of users not being aware of better prices for products they have purchased before.
 
* Time-consuming Price Comparison: Users can save time by using the application to compare prices instead of manually searching for the best deals.
 
* Impulse Purchases: The application helps users make more informed purchasing decisions by providing them with information about better prices.
 
 
==Benefits==
 
* Cost Savings: Users can save money by being notified about better prices for products they have purchased before.
 
* Convenience: The application provides users with a convenient way to compare prices and make informed purchasing decisions.
 
* Personalization: The application tailors the notifications and recommendations based on the user's previous purchases, providing a personalized shopping experience.
 
 
'''Abstract'''
 
Examples are described that enable a sales notification application executing on the mobile device to provide an indication of a better price for a product. In the examples, product information may be obtained from product purchase receipts uploaded by mobile devices executing an instance of a sales notification application. Similarities may be determined between the product information received from each product purchase of the plurality of product purchases. The product information from each of the uploaded receipts may be aggregated based on the determined similarity between the product information. A selected product and a location at which the selected product has been purchased previously may be received for comparison to the aggregated information in a product purchase database. A comparison result may be output to the sales notification application. A payment card may be enabled to purchase the selected product.
 
  
 
===SYSTEMS AND METHODS FOR SECURING RISK IN BLOCKCHAIN NETWORKS ([[17851437. SYSTEMS AND METHODS FOR SECURING RISK IN BLOCKCHAIN NETWORKS simplified abstract (Capital One Services, LLC)|17851437]])===
 
===SYSTEMS AND METHODS FOR SECURING RISK IN BLOCKCHAIN NETWORKS ([[17851437. SYSTEMS AND METHODS FOR SECURING RISK IN BLOCKCHAIN NETWORKS simplified abstract (Capital One Services, LLC)|17851437]])===
Line 877: Line 192:
 
Samuel Rapowitz
 
Samuel Rapowitz
  
 
'''Brief explanation'''
 
The disclosed technology is about using creditworthiness tokens issued in a blockchain network to assess and secure credit risk in response to specific financial events. Here is a simplified explanation of the abstract:
 
 
* The technology uses creditworthiness tokens issued in a blockchain network to assess and secure credit risk.
 
* A blockchain node device stores an issuance smart contract associated with an identity, including a wallet address and allocation parameters.
 
* An event query is sent to an external oracle device, requesting event data associated with the identity.
 
* The oracle device provides event data in response to the query.
 
* The allocation parameters are applied to the event data to determine the number of creditworthiness tokens.
 
* The determined tokens are allocated to the identity through the wallet address.
 
* The creditworthiness tokens can be transferred or used as collateral, representing the creditworthiness of the identity across financial institutions.
 
 
==Potential Applications==
 
This technology has potential applications in various areas, including:
 
 
* Credit assessment and risk management in the banking and financial sector.
 
* Securing loans and mortgages based on creditworthiness tokens.
 
* Streamlining and automating credit evaluation processes.
 
* Enabling peer-to-peer lending platforms with enhanced credit risk assessment.
 
 
==Problems Solved==
 
The technology addresses several problems in credit risk assessment and management, such as:
 
 
* Lack of transparency and trust in traditional credit evaluation systems.
 
* Time-consuming and manual processes for assessing creditworthiness.
 
* Difficulties in verifying and validating credit information across multiple financial institutions.
 
* Limited access to credit for individuals or businesses with limited credit history.
 
 
==Benefits==
 
The technology offers several benefits, including:
 
 
* Increased transparency and trust through the use of blockchain technology.
 
* Improved efficiency and speed in credit assessment and risk management.
 
* Enhanced access to credit for individuals or businesses with limited credit history.
 
* Facilitates secure and reliable transfer of creditworthiness tokens across financial institutions.
 
 
'''Abstract'''
 
The disclosed technology relates to assessing and securing credit risk using creditworthiness tokens issued in a blockchain network responsive to particular financial events. An exemplary blockchain node device may store an issuance smart contract associated with an identity and including a first wallet address and allocation parameters. An event query may be sent to an oracle device external to the blockchain network. The event query may include the identity. Event data associated with the identity may then be received from the oracle device in response to the event query. A number of creditworthiness tokens is determined based on an application of the allocation parameters to the event data. The determined number of creditworthiness tokens is then allocated to the identity via the first wallet address. Thereafter, the creditworthiness tokens can be transferred or collateralized, e.g., and can represent creditworthiness for the identity across financial institutions.
 
  
 
===DETERMINING WHETHER A USER HAS POSSESSION OF A TRANSACTION CARD AND/OR WHETHER THE USER IS AUTHORIZED TO POSSESS THE TRANSACTION CARD ([[18460979. DETERMINING WHETHER A USER HAS POSSESSION OF A TRANSACTION CARD AND/OR WHETHER THE USER IS AUTHORIZED TO POSSESS THE TRANSACTION CARD simplified abstract (Capital One Services, LLC)|18460979]])===
 
===DETERMINING WHETHER A USER HAS POSSESSION OF A TRANSACTION CARD AND/OR WHETHER THE USER IS AUTHORIZED TO POSSESS THE TRANSACTION CARD ([[18460979. DETERMINING WHETHER A USER HAS POSSESSION OF A TRANSACTION CARD AND/OR WHETHER THE USER IS AUTHORIZED TO POSSESS THE TRANSACTION CARD simplified abstract (Capital One Services, LLC)|18460979]])===
Line 923: Line 200:
 
Francisco PEREZLEON
 
Francisco PEREZLEON
  
 
'''Brief explanation'''
 
The patent application describes a device that receives a transaction request and determines information about a transaction card. It sends a query to a user device, asking the user to confirm possession of the transaction card. The device then receives a response from the user device and determines whether the user actually has the transaction card. Based on this determination, the device performs certain actions.
 
 
* The device receives a transaction request and determines information about a transaction card.
 
* It sends a query to a user device, asking the user to confirm possession of the transaction card.
 
* The query includes an instruction for the user to confirm possession via a component of the user device.
 
* The device receives a response from the user device regarding possession of the transaction card.
 
* It determines whether the user actually has possession of the transaction card based on the response and the information about the card.
 
* Based on this determination, the device performs at least one action.
 
 
== Potential Applications ==
 
* This technology can be used in payment systems to verify the possession of a transaction card before completing a transaction.
 
* It can be implemented in access control systems to ensure that only authorized users have access to certain areas or resources.
 
* The technology can be applied in identity verification processes to confirm the possession of an identification card or document.
 
 
== Problems Solved ==
 
* The technology solves the problem of unauthorized use of transaction cards by verifying the user's possession of the card.
 
* It addresses the issue of fraudulent transactions by confirming that the user physically possesses the transaction card.
 
* The technology helps prevent unauthorized access to restricted areas or resources by verifying the user's possession of an access card.
 
 
== Benefits ==
 
* By confirming the user's possession of a transaction card, the technology enhances security and reduces the risk of fraud.
 
* It provides an additional layer of authentication, making it harder for unauthorized individuals to use someone else's card or gain access to restricted areas.
 
* The technology offers a convenient and efficient way to verify possession of a transaction card without the need for physical interaction with the card itself.
 
 
'''Abstract'''
 
A device receives a transaction request concerning a transaction and a transaction card from a transaction terminal, and determines, based on the transaction request, information concerning the transaction card. The device sends, based on the transaction request and to a user device, a query concerning possession of the transaction card by a user of the user device, where the query includes an instruction for the user to confirm possession of the transaction card via a component of the user device. The device receives, from the user device and after sending the query to the user device, a response concerning possession of the transaction card by the user, and determines, based on the response and the information concerning the transaction card, whether the user has possession of the transaction card. The device performs, based on determining whether the user has possession of the transaction card, at least one action.
 
  
 
===AUDIBLE TRANSACTION VERIFICATION WITH AN ASSISTANCE DEVICE ([[17847266. AUDIBLE TRANSACTION VERIFICATION WITH AN ASSISTANCE DEVICE simplified abstract (Capital One Services, LLC)|17847266]])===
 
===AUDIBLE TRANSACTION VERIFICATION WITH AN ASSISTANCE DEVICE ([[17847266. AUDIBLE TRANSACTION VERIFICATION WITH AN ASSISTANCE DEVICE simplified abstract (Capital One Services, LLC)|17847266]])===
Line 959: Line 208:
 
Joshua Edwards
 
Joshua Edwards
  
 
'''Brief explanation'''
 
==Abstract==
 
A user assistance device has been developed to help users validate transactions on payment terminals. The device can detect a payment terminal that accepts payment cards at a point of sale and determine the transaction amount for validation. It then generates audio of the transaction amount and plays it on the user assistance device. This allows the user to hear the transaction amount before deciding whether to accept or reject the transaction. Additionally, the device can analyze transaction information and provide suggestions to the user on whether to accept or reject the transaction.
 
 
==Bullet Points==
 
* User assistance device for validating transactions on payment terminals
 
* Detects payment terminals at point of sale
 
* Determines transaction amount for validation
 
* Generates audio of the transaction amount
 
* Plays audio on the user assistance device
 
* Allows user to hear transaction amount before accepting or rejecting
 
* Analyzes transaction information to suggest acceptance or rejection
 
 
==Potential Applications==
 
* Retail stores
 
* Restaurants
 
* Online shopping platforms
 
* Banks and financial institutions
 
 
==Problems Solved==
 
* Difficulty in validating transaction amounts on payment terminals
 
* Potential errors in accepting or rejecting transactions due to unclear transaction information
 
* Lack of accessibility for visually impaired users
 
 
==Benefits==
 
* Enhanced user experience in validating transactions
 
* Improved accuracy in accepting or rejecting transactions
 
* Increased accessibility for visually impaired users
 
 
'''Abstract'''
 
A user assistance device aids validation of transactions on payment terminals. A payment terminal that accepts a payment card at a point of sale can be detected. A transaction amount for validation can be determined from the payment terminal. Subsequently, audio of the transaction amount can be generated. Playing of the audio on a user assistance device can then be triggered, allowing a user to hear the transaction amount before accepting or rejecting the transaction. Further, transaction information can be analyzed and used to suggest whether a customer should accept or reject the transaction.
 
  
 
===DETERMINING A CHANGE TO PRODUCT INFORMATION OR USER INFORMATION VIA HASHING ([[18457531. DETERMINING A CHANGE TO PRODUCT INFORMATION OR USER INFORMATION VIA HASHING simplified abstract (Capital One Services, LLC)|18457531]])===
 
===DETERMINING A CHANGE TO PRODUCT INFORMATION OR USER INFORMATION VIA HASHING ([[18457531. DETERMINING A CHANGE TO PRODUCT INFORMATION OR USER INFORMATION VIA HASHING simplified abstract (Capital One Services, LLC)|18457531]])===
Line 999: Line 216:
 
Qiaochu TANG
 
Qiaochu TANG
  
 
'''Brief explanation'''
 
The abstract describes a device that determines the price of a product based on its attributes and provides the price for display on a user device. The device generates hash values and bit-strings to represent the attributes of the product and determines changes in the attributes to adjust the price accordingly.
 
 
* The device determines the price of a product based on its attributes.
 
* It generates hash values and bit-strings to represent the attributes.
 
* Changes in the attributes are determined by comparing the generated bit-strings.
 
* The device adjusts the price of the product based on the changes in attributes.
 
* The new price is provided for display on a user device.
 
 
== Potential Applications ==
 
* E-commerce platforms can use this technology to dynamically adjust prices based on changes in product attributes.
 
* Retailers can utilize this technology to offer personalized pricing based on individual customer preferences.
 
* Pricing optimization algorithms can incorporate this technology to automatically adjust prices based on market conditions and competitor prices.
 
 
== Problems Solved ==
 
* This technology solves the problem of manually determining and adjusting prices based on product attributes.
 
* It eliminates the need for constant monitoring and manual price adjustments by automating the process.
 
* It allows for real-time price adjustments based on changes in product attributes.
 
 
== Benefits ==
 
* The device provides an efficient and automated way to determine and adjust prices based on product attributes.
 
* It enables dynamic pricing strategies that can respond to market conditions and customer preferences.
 
* The technology streamlines the pricing process, saving time and resources for businesses.
 
 
'''Abstract'''
 
A device may determine a price of a product based on first information concerning attributes of the product, and provide the price for display by a user device. The device may generate first hash values based on the first information, where a particular first hash value is associated with a particular attribute, and generate a first bit-string that includes the plurality of first hash values. The device may generate second hash values based on second information concerning the attributes of the product, where a particular second hash value is associated with the particular attribute. The device may generate a second bit-string that includes the second hash values, and determine a change to the particular attribute based on the first bit-string and the second bit-string. The device may determine a new price of the product based on the change, and provide the new price for display by the user device.
 
  
 
===Email Processing for Improved Authentication Question Accuracy ([[18243334. Email Processing for Improved Authentication Question Accuracy simplified abstract (Capital One Services, LLC)|18243334]])===
 
===Email Processing for Improved Authentication Question Accuracy ([[18243334. Email Processing for Improved Authentication Question Accuracy simplified abstract (Capital One Services, LLC)|18243334]])===
Line 1,034: Line 224:
 
Viraj Chaudhary
 
Viraj Chaudhary
  
 
'''Brief explanation'''
 
Methods, systems, and apparatuses are described in this patent application for improving the accuracy of authentication questions using e-mail processing. Here's a simplified explanation of the abstract:
 
 
* A user device sends a request for access to an account.
 
* The system identifies a list of organizations associated with the account.
 
* The system processes the e-mails associated with the account to determine which organizations the user has conducted transactions with.
 
* A modified list of organizations is generated by removing the organizations identified in the previous step.
 
* An authentication question is generated and sent to the user device.
 
* The system receives a response to the authentication question.
 
* Based on the response, the user device is granted access to the account.
 
 
Potential applications of this technology:
 
 
* Enhancing the security of online accounts by adding an extra layer of authentication.
 
* Streamlining the authentication process by using e-mail data to generate personalized questions.
 
* Improving the accuracy of authentication questions by considering the user's transaction history.
 
 
Problems solved by this technology:
 
 
* Traditional authentication methods may be vulnerable to hacking or unauthorized access.
 
* Users may struggle to remember complex passwords or security questions.
 
* Existing authentication questions may be too generic and easily guessable.
 
 
Benefits of this technology:
 
 
* Increased security for online accounts by using personalized authentication questions.
 
* Reduced risk of unauthorized access or identity theft.
 
* Improved user experience with a more streamlined and efficient authentication process.
 
 
'''Abstract'''
 
Methods, systems, and apparatuses are described herein for improving the accuracy of authentication questions using e-mail processing. A request for access to an account may be received from a user device. A plurality of organizations may be identified. One or more e-mail associated with the account may be identified. The e-mails may be processed to identify one or more organizations that correspond to transactions conducted by a user. A modified plurality of organizations may be generated by removing, from the plurality of organizations, the one or more organizations. An authentication question may be generated and provided to the user device. A response to the authentication question may be received, and the user device may be provided access based on the response.
 
  
 
===METHOD AND SYSTEM FOR PROTECTION OF CLOUD-BASED INFRASTRUCTURE ([[17748592. METHOD AND SYSTEM FOR PROTECTION OF CLOUD-BASED INFRASTRUCTURE simplified abstract (Capital One Services, LLC)|17748592]])===
 
===METHOD AND SYSTEM FOR PROTECTION OF CLOUD-BASED INFRASTRUCTURE ([[17748592. METHOD AND SYSTEM FOR PROTECTION OF CLOUD-BASED INFRASTRUCTURE simplified abstract (Capital One Services, LLC)|17748592]])===
Line 1,074: Line 232:
 
Syed Sameer Hakim
 
Syed Sameer Hakim
  
 
'''Brief explanation'''
 
Methods, systems, devices, and computer-readable media for a quarantining system are described in this patent application. The system aims to protect against potentially harmful or malicious activity associated with API requests for accessing applications.
 
 
* A client device sends an API request to a service provider system to access a specific application.
 
* The service provider system receives the request at a gateway and determines if it is associated with potentially harmful or unexpected activity.
 
* If the request is flagged as suspicious, it is routed to a quarantine environment.
 
* In the quarantine environment, a decoy API is identified, which is configured to interface with a decoy application that emulates the requested application using decoy information.
 
* The API request is modified to call the decoy API instead.
 
* The decoy application is executed, and a decoy response is generated.
 
* The decoy response is sent back to the client device as a response to the API request.
 
 
Potential applications of this technology:
 
 
* Enhancing cybersecurity measures by identifying and isolating potentially harmful API requests.
 
* Protecting sensitive data and applications from unauthorized access or malicious activity.
 
* Providing a secure environment for testing and analyzing suspicious API requests.
 
 
Problems solved by this technology:
 
 
* Mitigating the risk of harmful or malicious activity associated with API requests.
 
* Preventing unauthorized access to applications and sensitive data.
 
* Reducing the potential impact of security breaches or attacks.
 
 
Benefits of this technology:
 
 
* Improved security and protection against potential threats.
 
* Enhanced ability to detect and respond to suspicious API requests.
 
* Minimized risk of data breaches and unauthorized access.
 
* Provides a controlled environment for analyzing and understanding potential threats.
 
 
'''Abstract'''
 
Methods, systems, devices, and computer-readable media for a quarantining system are provided. A message comprising an application programming interface (API) request may be sent by a client device to a service provider system for access to a first application. The message may be received at a gateway of the service provider system. The gateway may determine that the API request is associated with potentially harmful, malicious, or otherwise unexpected activity. The message may be routed to a quarantine environment and a decoy API configured to interface with a decoy application that uses decoy information to emulate the requested first application may be identified. The API request may be modified to call the decoy API. The decoy application may be executed and a decoy response generated. The decoy response may be sent to the client device in response to the API request.
 
  
 
===SMART VIDEO CONFERENCE ENVIRONMENT ([[17846073. SMART VIDEO CONFERENCE ENVIRONMENT simplified abstract (Capital One Services, LLC)|17846073]])===
 
===SMART VIDEO CONFERENCE ENVIRONMENT ([[17846073. SMART VIDEO CONFERENCE ENVIRONMENT simplified abstract (Capital One Services, LLC)|17846073]])===
Line 1,114: Line 239:
  
 
Xiaoguang Zhu
 
Xiaoguang Zhu
 
 
'''Brief explanation'''
 
The disclosed technology is a smart video conference environment that enhances the video conferencing experience by segmenting the live video of a participant into a foreground and a background. Here are the key points:
 
 
* The live video of a conference participant is divided into a foreground (participant) and a background (excluding the participant).
 
* The background can be replaced with a virtual background chosen based on various factors.
 
* Factors for selecting the virtual background include context data from a calendar, content related to the context data, and transaction history.
 
* The background can be updated based on the topics of conversation among conference participants.
 
* Interactive content can be presented in the virtual background, allowing participants to interact with it.
 
* Additional content can be overlaid on both the participant and the background.
 
 
Potential applications of this technology:
 
 
* Enhancing the video conferencing experience by providing virtual backgrounds that suit the context of the conference.
 
* Creating a more engaging and interactive environment for participants by allowing them to interact with the virtual background.
 
* Providing a customizable and professional appearance for video conferences, especially in remote work settings.
 
 
Problems solved by this technology:
 
 
* Lack of visual appeal and customization options in traditional video conferencing environments.
 
* Limited interaction and engagement among conference participants.
 
* Difficulty in maintaining a professional appearance during video conferences.
 
 
Benefits of this technology:
 
 
* Improved visual aesthetics and customization options for video conferences.
 
* Enhanced participant engagement and interaction through interactive virtual backgrounds.
 
* Professional appearance and customization options for video conferences, contributing to a more polished and effective communication experience.
 
 
'''Abstract'''
 
Disclosed embodiments relate to a smart video conference environment. A live video of a conference participant can be segmented into a foreground, including the participant, and a background that excludes the participant. The background can be replaced by a virtual background determined based on one or more factors. The factors can include context data acquired from a calendar, content based on the context data, and transaction history. Further, interaction amongst conference participants can be monitored and utilized to update the background in one instance based on topics of conversation. Interactive content presented in the virtual background permits interaction by participants with the background. Furthermore, content can also be overlaid on the participant and the background in one instance.
 

Revision as of 05:48, 2 January 2024

Contents

Patent applications for Capital One Services, LLC on December 28th, 2023

SYSTEM TO FACILITATE INTERACTION DURING A COLLABORATIVE SCREEN SHARING SESSION (18342805)

Main Inventor

Reza FARIVAR


SYSTEMS AND METHODS FOR PRESENTING WEB APPLICATION CONTENT (18463437)

Main Inventor

Sayak BANERJEE


METHODS AND SYSTEMS FOR CLASSIFYING DATABASE RECORDS BY INTRODUCING TIME DEPENDENCY INTO TIME-HOMOGENEOUS PROBABILITY MODELS (18462642)

Main Inventor

Hao Hua HUANG


USING BIOMETRIC BEHAVIOR TO PREVENT USERS FROM INAPPROPRIATELY ENTERING SENSITIVE INFORMATION (17847418)

Main Inventor

Jennifer Kwok


TECHNIQUES TO PERFORM DYNAMIC CALL CENTER AUTHENTICATION UTILIZING A CONTACTLESS CARD (17850278)

Main Inventor

Francis OGBENNAH


CONTEXT-BASED PATTERN MATCHING FOR SENSITIVE DATA DETECTION (17849439)

Main Inventor

Anh TRUONG


SYSTEM AND METHOD FOR DYNAMIC GENERATION OF URL BY SMART CARD (18242405)

Main Inventor

Jeffrey RULE


SYSTEMS AND METHODS FOR GENERATING REAL-TIME DYNAMIC CONVERSATIONAL RESPONSES DURING CONVERSATIONAL INTERACTIONS USING MACHINE LEARNING MODELS (17850282)

Main Inventor

Md Arafat Hossain KHAN


TOKEN SYNTHESIS FOR MACHINE LEARNING MODELS (17849391)

Main Inventor

Anh TRUONG


SYSTEMS AND METHODS FOR AUTOMATED OBJECT RECOGNITION (18460014)

Main Inventor

Hannes Mikael JOUHIKAINEN


PROGRAMMATIC SELECTOR FOR CHOOSING A WELL-SUITED STACKED MACHINE LEARNING ENSEMBLE PIPELINE AND HYPERPARAMETER VALUES (17848728)

Main Inventor

Michael LANGFORD


AUTOMATED PAYMENT SPLITTING (17846540)

Main Inventor

Phoebe Atkins


SYSTEMS AND METHODS FOR ACCOUNTS WITH MULTIPLE PROFILES (17851514)

Main Inventor

Wendy Wu


MOBILE WEB BROWSER AUTHENTICATION AND CHECKOUT USING A CONTACTLESS CARD (17847961)

Main Inventor

Jeffrey RULE


METHODS AND SYSTEMS FOR DISPLAYING ACCOUNT INFORMATION (18465036)

Main Inventor

Adam R. KOEPPEL


SYSTEMS AND METHODS FOR SECURELY GENERATING AND PRINTING A DOCUMENT (18467378)

Main Inventor

Jade GARRETT


SYSTEMS AND METHODS FOR MONITORING POST-TRANSACTION ADJUSTMENTS (17851568)

Main Inventor

Anne Moshyedi


AUTHENTICATING A CARD BASED ON CARD MOVEMENT (17847771)

Main Inventor

Cruz Vargas


SYSTEMS AND METHODS FOR ASSISTING USERS IN ASSESSING COSTS OF TRANSACTIONS (18466407)

Main Inventor

Austin WALTERS


OPTIMIZED EXCHANGE RATES BASED ON USER PROFILES (17808127)

Main Inventor

Michael MOSSOBA


DEMAND EQUILIBRIUM BASED PRICING (17846148)

Main Inventor

Ray Cheng


SYSTEMS AND METHODS FOR PURCHASE DEVICE (18462929)

Main Inventor

Adam KOEPPEL


TRANSACTION AND RECEIPT BASED ALERT AND NOTIFICATION SYSTEM AND TECHNIQUES (18243596)

Main Inventor

Latika GULATI


SYSTEMS AND METHODS FOR SECURING RISK IN BLOCKCHAIN NETWORKS (17851437)

Main Inventor

Samuel Rapowitz


DETERMINING WHETHER A USER HAS POSSESSION OF A TRANSACTION CARD AND/OR WHETHER THE USER IS AUTHORIZED TO POSSESS THE TRANSACTION CARD (18460979)

Main Inventor

Francisco PEREZLEON


AUDIBLE TRANSACTION VERIFICATION WITH AN ASSISTANCE DEVICE (17847266)

Main Inventor

Joshua Edwards


DETERMINING A CHANGE TO PRODUCT INFORMATION OR USER INFORMATION VIA HASHING (18457531)

Main Inventor

Qiaochu TANG


Email Processing for Improved Authentication Question Accuracy (18243334)

Main Inventor

Viraj Chaudhary


METHOD AND SYSTEM FOR PROTECTION OF CLOUD-BASED INFRASTRUCTURE (17748592)

Main Inventor

Syed Sameer Hakim


SMART VIDEO CONFERENCE ENVIRONMENT (17846073)

Main Inventor

Xiaoguang Zhu