Capital One Services, LLC patent applications published on December 14th, 2023

From WikiPatents
Jump to navigation Jump to search

Contents

Patent applications for Capital One Services, LLC on December 14th, 2023

DEPENDENCY ANALYZER IN APPLICATION DEPENDENCY DISCOVERY, REPORTING, AND MANAGEMENT TOOL (18135816)

Main Inventor

Muralidharan Balasubramanian


Brief explanation

Techniques for monitoring the operating statuses of an application and its dependencies are described in this patent application. The monitoring application collects and reports the operating status of the monitored application and its dependencies without requiring any modifications to the underlying software.
  • The monitoring application uses existing interfaces to collect operating status information.
  • It can determine the root cause of any issues in the monitored application by identifying problem services.
  • Dependency analyzer and discovery crawler techniques automatically configure and update the monitoring application.
  • Machine learning techniques are used to analyze system state information and identify patterns of performance.
  • Health reports are generated based on a baseline status of the monitored application.
  • The monitoring application can also modify API calls to test the response of the monitored application, which helps train the machine learning model.

Potential Applications

  • Monitoring the operating status of applications and their dependencies in various industries.
  • Identifying and resolving issues in software systems.
  • Providing real-time health reports and performance analysis for applications.

Problems Solved

  • Difficulty in monitoring the operating status of complex applications and their dependencies.
  • Lack of a non-intrusive monitoring solution that does not require modifications to the underlying software.
  • Challenges in identifying the root cause of issues in a monitored application.

Benefits

  • Non-intrusive monitoring that does not require modifying the monitored application or its dependencies.
  • Automatic configuration and updates of the monitoring application.
  • Machine learning-based analysis for identifying performance patterns and generating health reports.
  • Ability to test the response of the monitored application through modified API calls.

Abstract

Techniques for monitoring operating statuses of an application and its dependencies are provided. A monitoring application may collect and report the operating status of the monitored application and each dependency. Through use of existing monitoring interfaces, the monitoring application can collect operating status without requiring modification of the underlying monitored application or dependencies. The monitoring application may determine a problem service that is a root cause of an unhealthy state of the monitored application. Dependency analyzer and discovery crawler techniques may automatically configure and update the monitoring application. Machine learning techniques may be used to determine patterns of performance based on system state information associated with performance events and provide health reports relative to a baseline status of the monitored application. Also provided are techniques for testing a response of the monitored application through modifications to API calls. Such tests may be used to train the machine learning model.

INTELLIGENT SERVICES FOR APPLICATION DEPENDENCY DISCOVERY, REPORTING, AND MANAGEMENT TOOL (18223208)

Main Inventor

Muralidharan Balasubramanian


Brief explanation

Techniques for monitoring the operating statuses of an application and its dependencies are described in this patent application. The monitoring application collects and reports the operating status of the monitored application and its dependencies without requiring any modifications to the underlying software.
  • The monitoring application uses existing monitoring interfaces to collect operating status information.
  • It can identify the root cause of any issues in the monitored application by analyzing the dependencies.
  • The monitoring application can be automatically configured and updated using dependency analyzer and discovery crawler techniques.
  • Machine learning techniques are used to analyze system state information and determine patterns of performance.
  • Health reports are generated based on a baseline status of the monitored application.
  • The monitored application can be tested by modifying API calls, which helps train the machine learning model.

Potential Applications

  • Monitoring the operating status of applications and their dependencies in various industries such as IT, finance, healthcare, etc.
  • Identifying and resolving issues in real-time to ensure the smooth functioning of critical applications.
  • Providing insights into the performance of applications and their dependencies for optimization and improvement.

Problems Solved

  • Simplifies the monitoring process by collecting operating status without modifying the underlying software.
  • Enables quick identification of the root cause of issues in the monitored application.
  • Automates the configuration and updating of the monitoring application.
  • Utilizes machine learning to analyze system state information and provide health reports.

Benefits

  • Reduces the need for manual monitoring and troubleshooting of applications and their dependencies.
  • Improves the efficiency and reliability of application monitoring.
  • Enables proactive identification and resolution of issues before they impact the overall system.
  • Provides valuable insights into application performance and optimization opportunities.

Abstract

Techniques for monitoring operating statuses of an application and its dependencies are provided. A monitoring application may collect and report the operating status of the monitored application and each dependency. Through use of existing monitoring interfaces, the monitoring application can collect operating status without requiring modification of the underlying monitored application or dependencies. The monitoring application may determine a problem service that is a root cause of an unhealthy state of the monitored application. Dependency analyzer and discovery crawler techniques may automatically configure and update the monitoring application. Machine learning techniques may be used to determine patterns of performance based on system state information associated with performance events and provide health reports relative to a baseline status of the monitored application. Also provided are techniques for testing a response of the monitored application through modifications to API calls. Such tests may be used to train the machine learning model.

Data Management Ecosystem for Databases (17837818)

Main Inventor

Hari Hara Sudhan Gnanaprakasam


Brief explanation

The patent application describes a system for managing databases by migrating data objects from a sandbox to a production environment. Here are the key points:
  • The system receives a request from a user device to migrate data objects from a sandbox to a production environment.
  • The production environment consists of multiple data warehouses provided as a service in a cloud computing environment.
  • Computing resources are dynamically allocated to these data warehouses.
  • The system determines the lineage information of the data objects and updates the database catalog of the data warehouses accordingly.
  • It identifies sensitive data within the data objects and generates tokenization for that data.
  • Using the lineage information and tokenization, the system generates a migration plan.
  • The system then executes the migration plan in at least one of the data warehouses.

Potential applications of this technology:

  • Efficiently migrating data objects from a sandbox to a production environment in a cloud computing environment.
  • Managing and updating database catalogs with lineage information.
  • Ensuring the security of sensitive data by generating tokenization.

Problems solved by this technology:

  • Simplifies the process of migrating data objects from a sandbox to a production environment.
  • Provides a centralized system for managing and updating database catalogs.
  • Enhances data security by generating tokenization for sensitive data.

Benefits of this technology:

  • Streamlines the migration process, saving time and effort.
  • Improves data management by maintaining an updated database catalog.
  • Enhances data security by tokenizing sensitive information.

Abstract

Systems as described herein may implement a data management ecosystem for databases. A computing device may receive, from a first user device, a request to migrate one or more data objects from a sandbox to a production environment. The production environment may include a plurality of data warehouses that may be provided as a service in a cloud computing environment, and computing resources are dynamically allocated to the plurality of data warehouses. The computing device may determine lineage information and update a database catalog of the data warehouses with the lineage information. The computing device may identify sensitive data contained within the one or more data objects and generate tokenization for the sensitive data. Based on the lineage information in the database catalog and the tokenization, the computing device may generate a migration plan and cause the at least one of the plurality of data warehouses to execute the migration plan.

METHODS OF DATA SHARING ACROSS CLOUD REGIONS AND CLOUD PLATFORMS OF CLOUD-BASED DATA WAREHOUSING SYSTEMS S (17838117)

Main Inventor

Hiren Shah


Brief explanation

Methods, systems, devices, and computer-readable media are disclosed for sharing data between accounts hosted by a cloud-based data warehousing system on different cloud platforms or in different cloud regions. These accounts may be associated with different organizations. The sharing of data in multi-cloud platform and/or multi-cloud region environments is facilitated by the on-demand creation of one or more data collection accounts.
  • The patent application describes a method for sharing data between accounts hosted by a cloud-based data warehousing system.
  • The accounts can be on different cloud platforms or in different cloud regions.
  • The accounts may belong to different organizations.
  • Data sharing is enabled by creating one or more data collection accounts as needed.
  • The data collection accounts are created on-demand.
  • The invention allows for seamless sharing of data across different cloud platforms and regions.

Potential Applications

This technology has potential applications in various industries and scenarios, including:

  • Collaborative projects involving multiple organizations that use different cloud platforms or regions.
  • Data analysis and reporting across different cloud platforms or regions.
  • Sharing of data between different departments or teams within an organization that use different cloud platforms or regions.
  • Integration of data from multiple sources hosted on different cloud platforms or regions.

Problems Solved

The technology described in this patent application addresses several problems, including:

  • Difficulty in sharing data between accounts hosted on different cloud platforms or regions.
  • Incompatibility issues between different cloud platforms or regions.
  • Complex and time-consuming data migration processes.
  • Lack of flexibility in accessing and sharing data across different cloud platforms or regions.

Benefits

The use of this technology offers several benefits, such as:

  • Simplified and efficient sharing of data between accounts hosted on different cloud platforms or regions.
  • Increased flexibility in accessing and analyzing data across different cloud platforms or regions.
  • Reduced complexity and time required for data migration between different cloud platforms or regions.
  • Improved collaboration and data integration between organizations using different cloud platforms or regions.

Abstract

Methods, systems, devices, and computer-readable media for sharing data between accounts that are hosted by a cloud-based data warehousing system on different cloud platforms or in different cloud regions of a cloud platform, and where such accounts may be associated with different organizations. Sharing of data in the multi-cloud platform and/or multi-cloud region environments may be facilitated by the on-demand creation of one or more data collection accounts.

METHODS OF ORCHESTRATED DATA SHARING ACROSS CLOUD REGIONS AND CLOUD PLATFORMS OF CLOUD-BASED DATA WAREHOUSING SYSTEMS (17838133)

Main Inventor

Hiren Shah


Brief explanation

Methods, systems, devices, and computer-readable media are disclosed for facilitating the sharing of data between accounts hosted by a cloud-based data warehousing system on different cloud platforms or in different cloud regions. These accounts may be associated with different organizations. The sharing of data in multi-cloud platform and/or multi-cloud region environments is enabled through the on-demand creation of one or more data collection accounts.
  • The patent application describes a method for sharing data between accounts hosted by a cloud-based data warehousing system on different cloud platforms or in different cloud regions.
  • The sharing of data is facilitated by creating one or more data collection accounts on-demand.
  • The data collection accounts allow for the orchestration of data sharing between accounts associated with different organizations.
  • The invention enables data sharing in multi-cloud platform and multi-cloud region environments.

Potential Applications

This technology has potential applications in various industries and scenarios, including:

  • Data sharing between different organizations using cloud-based data warehousing systems.
  • Collaboration and data exchange between accounts hosted on different cloud platforms or in different cloud regions.
  • Integration of data from multiple sources across different cloud platforms or regions.
  • Enabling data analytics and insights by combining data from various accounts and organizations.

Problems Solved

The technology described in the patent application addresses several problems:

  • Difficulty in sharing data between accounts hosted on different cloud platforms or in different cloud regions.
  • Challenges in orchestrating data sharing between accounts associated with different organizations.
  • Complexities in integrating data from multiple sources across different cloud platforms or regions.
  • Lack of a streamlined method for enabling collaboration and data exchange in multi-cloud environments.

Benefits

The patent application offers several benefits:

  • Simplified and efficient sharing of data between accounts hosted on different cloud platforms or in different cloud regions.
  • Streamlined orchestration of data sharing between accounts associated with different organizations.
  • Improved integration of data from multiple sources across different cloud platforms or regions.
  • Enhanced collaboration and data exchange capabilities in multi-cloud environments.

Abstract

Methods, systems, devices, and computer-readable media for orchestrating the sharing of data between accounts that are hosted by a cloud-based data warehousing system on different cloud platforms or in different cloud regions of a cloud platform, and where such accounts may be associated with different organizations. Sharing of data in the multi-cloud platform and/or multi-cloud region environments may be facilitated by the on-demand creation of one or more data collection accounts.

METHODS AND SYSTEM FOR DETECTING UNMANAGED RESOURCES IN CLOUD-BASED DATA WAREHOUSING SYSTEM (17964259)

Main Inventor

Hiren Shah


Brief explanation

The abstract describes a cloud data management system that collects data from accounts hosted by a cloud-based data warehousing system on different cloud platforms or in different cloud regions. It achieves this by creating data collection accounts on-demand. The collected data is used to discover, configure, and onboard data warehouse resources to the cloud data management system.
  • The cloud data management system collects data from cloud-based data warehousing systems on different cloud platforms or regions.
  • Data collection accounts are created as needed to facilitate the collection of data in multi-cloud environments.
  • The collected data is used to discover, configure, and onboard data warehouse resources to the cloud data management system.
  • The data warehouse resources are not managed by the cloud data management system.

Potential Applications

  • Data collection and management in multi-cloud environments.
  • Integration of data from different cloud platforms or regions into a centralized data management system.
  • Discovery and onboarding of data warehouse resources based on collected data.

Problems Solved

  • Collecting data from accounts hosted on different cloud platforms or regions.
  • Managing data in multi-cloud environments.
  • Discovering and onboarding data warehouse resources not managed by the cloud data management system.

Benefits

  • Simplified data collection from multiple cloud platforms or regions.
  • Centralized management of data from different cloud-based data warehousing systems.
  • Efficient discovery and onboarding of data warehouse resources.

Abstract

Methods, systems, devices, and computer-readable media used by a cloud data management system for collecting data from accounts hosted by a cloud-based data warehousing system on different cloud platforms or in different cloud regions of a cloud platform. Collection of data in the multi-cloud platform and/or multi-cloud region environments may be facilitated by the on-demand creation of one or more data collection accounts. Based on the collected data, one or more data warehouse resources not managed by the cloud data management system may be discovered, configured, and onboarded to the cloud data management system.

SYSTEMS AND METHODS FOR CAPTURING VISIBLE INFORMATION (18451652)

Main Inventor

Joshua EDWARDS


Brief explanation

The abstract describes a transaction card construction and computer-implemented methods for a transaction card. The card has visible information applied by a laser machining system. The systems and methods described enable the sourcing of visible information using a scalable vector format. 
  • The technology allows for the addition of visible information to a transaction card using a laser machining system.
  • The system captures an image of the visible information and converts it into vector format.
  • The image is translated based on the ambient color saturation of the image.
  • The translated image is mapped to a bounding box and provided to the laser machining system for application on the transaction card.

Potential Applications

  • Transaction cards with personalized visible information
  • Enhanced security features on transaction cards
  • Customizable transaction cards for branding purposes

Problems Solved

  • Simplifies the process of adding visible information to transaction cards
  • Enables the use of scalable vector format for visible information
  • Improves the accuracy and precision of applying visible information on transaction cards

Benefits

  • Efficient and precise application of visible information on transaction cards
  • Enhanced security features through personalized visible information
  • Customizable branding options for transaction cards

Abstract

A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector-formatted visible information applied by a laser machining system. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format The systems and methods may receive a request to add visible information to a transaction card and capture an image of the visible information. The systems and methods may capture data representing the image. The systems and methods may also determine an ambient color saturation of the image. Further, systems and methods may translate the image based on the ambient color saturation of the image. The systems and methods may also map the translated image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machining system.

CALCULATING RETURN WINDOW (17839585)

Main Inventor

Leeyat Bracha Tessler


Brief explanation

The disclosed embodiments of this patent application relate to systems and methods for facilitating product returns. Here is a simplified explanation of the abstract:
  • The patent application describes a system that helps users return products they have purchased from a merchant.
  • The system uses transaction data to determine the specific product purchased by the user.
  • It predicts the return window for the product by analyzing data from merchant websites, industry standards, and transaction data.
  • The system also predicts the likelihood that a product will be returned based on the transaction data.
  • If a product is identified as a potential candidate for return, the user is notified of the return window and a confidence score associated with it.
  • The system can also determine or infer the timeliness of refunds based on transaction data and inform the user.
  • It continuously monitors transaction data and alerts the user if they do not receive the expected credit within a predetermined time.

Potential applications of this technology:

  • E-commerce platforms can use this system to provide a better return experience for their customers.
  • Retailers can use the system to proactively notify customers about return windows and refund timeliness.
  • Customers can benefit from this system by having a more streamlined and efficient return process.

Problems solved by this technology:

  • This system addresses the challenge of accurately predicting return windows for products, which can vary depending on various factors.
  • It helps users avoid the inconvenience of missing return windows or experiencing delays in receiving refunds.

Benefits of this technology:

  • Users can have a better understanding of the return window for their purchased products and the likelihood of returns.
  • The system provides users with confidence scores, allowing them to make informed decisions about returning products.
  • Users are alerted if they do not receive the expected credit within a specified time, ensuring a timely resolution to return issues.

Abstract

Disclosed embodiments pertain to systems and methods of facilitating product return. A product purchased by a user from a merchant can be determined from transaction data of the user. A return window for the product can be predicted from one or more of data from merchant websites, industry standards, or transaction data. Further, the likelihood that a product is a candidate for return can be predicted based on the transaction data. If the product is determined to be a candidate for return, the user can be notified of the return window for the product and a confidence score associated with the window. Refund timeliness can also be determined or inferred based on transaction data and provided to the user. Subsequently, transaction data can be monitored, and the user can be alerted if credit is not received after a predetermined time or the credit is less than expected.

INTERACTING WITH AN AUTOMATED TELLER MACHINE USING A USER DEVICE (18455901)

Main Inventor

Michael MOSSOBA


Brief explanation

The patent application describes a device that can be used to conduct ATM transactions. Here are the key points:
  • The device prompts the user to input their authentication credentials and select the type of ATM transaction they want to perform.
  • It detects the user's input and receives a request from the ATM device to establish a communication session.
  • The device can be coupled with the ATM device using a sync button.
  • Once coupled, the device provides the user's authentication credentials and transaction data to the ATM device, enabling it to perform the requested transaction.
  • The device also displays information about the ATM transaction to the user.

Potential applications of this technology:

  • This technology can be used in mobile banking applications, allowing users to perform ATM transactions using their smartphones or other portable devices.
  • It can also be integrated into banking kiosks or self-service terminals, providing a more convenient and user-friendly experience for customers.

Problems solved by this technology:

  • This technology eliminates the need for physical ATM cards, as users can authenticate themselves and perform transactions using their mobile devices.
  • It simplifies the ATM transaction process by allowing users to input their authentication credentials and transaction details on their own devices, instead of using the ATM's interface.

Benefits of this technology:

  • Enhanced convenience for users, as they can perform ATM transactions using their own devices without the need for physical cards.
  • Improved security, as the user's authentication credentials are entered on their own device, reducing the risk of card skimming or other fraudulent activities.
  • A more user-friendly and intuitive interface, as users can input their transaction details on their own devices, which they are already familiar with.

Abstract

A device may receive an indication that an ATM transaction is to be conducted, display prompt(s) for a user to input user authentication credential information and to select an ATM transaction type, detect user input(s) that include a user authentication credential and a selection of a particular ATM transaction type, and receive, from an ATM device, a request to establish a communication session. The ATM device may include a sync button to initiate communicative coupling of the ATM device and the user device. The request may be based on a user selection of the sync button. The device may communicatively couple to the ATM device, and provide, to the ATM device, the user authentication credential and data regarding the particular ATM transaction type to cause the ATM device to perform the ATM transaction. The device may display information regarding the ATM transaction.

SECURE COUNTLESS PAYMENT METHOD AND DEVICE WITH MOVEMENT-ACTIVATED ELECTRONIC CIRCUITRY (18457094)

Main Inventor

Tyler LOCKE


Brief explanation

The abstract describes a contactless payment device that includes a wireless communication device, a power source, a processor, an accelerometer, and an actuator. The actuator is responsible for activating or deactivating the wireless communication device based on its state.
  • The actuator activates the wireless communication device when it is in a closed state and deactivates it when it is in an open state.
  • The processor receives signals from the accelerometer and determines if the signal corresponds to a pre-programmed enabling gesture.
  • If the incoming signal matches the enabling gesture, the actuator is set in the closed state for a specific time interval.

Potential applications of this technology:

  • Contactless payment systems
  • Access control systems
  • Smart locks
  • Wearable devices

Problems solved by this technology:

  • Prevents accidental activation or deactivation of the wireless communication device
  • Enhances security by requiring a specific gesture to enable or disable the device

Benefits of this technology:

  • Improved user experience by providing a simple and intuitive way to enable or disable the device
  • Increased security by reducing the risk of unauthorized access or use
  • Energy efficiency by automatically deactivating the wireless communication device when not in use

Abstract

A contactless payment device including a wireless communication device; a power source; a processor coupled to the power source; an accelerometer communicatively coupled to the processor and the power source; and an actuator communicatively coupled to the wireless communication device and the processor. The actuator is configured to activate the wireless communication device when the actuator is set in a closed state, and deactivate the wireless communication device when the actuator is set in an open state, The processor is configured to receive an incoming signal from the accelerometer; determine whether the incoming signal corresponds to a pre-programmed signal corresponding to an enabling gesture; and set the actuator in the dosed state for a time interval, when the incoming signal corresponds to the enabling gesture.

PROACTIVE VIRTUAL CARD PROVISIONING (17839562)

Main Inventor

Mykhaylo Bulgakov


Brief explanation

The patent application describes a system for proactively creating virtual cards for online purchases. Here are the key points:
  • Virtual cards are automatically generated for users based on their online activities.
  • Trigger conditions, such as recurring transactions or registering on a merchant website, are used to identify when a virtual card should be created.
  • Once a trigger condition is detected, the user is asked for permission to add a virtual card for payment at the specific merchant.
  • If permission is granted, a request is sent to the user's financial institution to create the virtual card, which is linked to the user's account.
  • A browser script is then executed to add the virtual card as the primary payment method on the merchant's website.

Potential applications of this technology:

  • Streamlining online shopping: Users can easily create virtual cards for their favorite merchants without manually entering payment information each time.
  • Enhanced security: Virtual cards can help protect users' financial information by providing a separate payment method for each merchant.
  • Personalized offers: The system can analyze user behavior to offer targeted promotions or discounts based on their online activities.

Problems solved by this technology:

  • Tedious payment process: Users no longer need to manually enter payment information for each online purchase.
  • Security risks: Virtual cards provide an additional layer of security by keeping users' financial information separate for each merchant.

Benefits of this technology:

  • Convenience: Users can quickly and easily make online purchases without the hassle of entering payment information each time.
  • Enhanced security: Virtual cards help protect users' financial information by keeping it separate for each merchant.
  • Personalization: The system can offer personalized promotions or discounts based on users' online activities.

Abstract

Virtual cards are proactively provisioned for online purchases. Merchant transactions or user browser actions can be analyzed for the existence of a trigger condition such as recurrent merchant transactions or registration on a merchant website, among other things. In response to detecting the trigger condition, a request is sent to a customer for permission to add a virtual card for payment of a merchant online. Subsequently, a request is submitted for the virtual card for the customer from a financial institution in response to permission being granted, where the virtual card is linked to an account of the customer at the financial institution. A browser script can next be executed that adds the virtual card as the primary payment method of a website of the merchant.

TECHNIQUES TO PROCESS CONTACTLESS CARD FUNCTIONS IN A MULTIPLE BANKING SYSTEM ENVIRONMENT (18207831)

Main Inventor

Casey Barrett


Brief explanation

The abstract of the patent application describes a system and techniques for performing functions within a multiple banking system environment using switchboard routing.
  • The patent application focuses on a system that allows users to perform various functions within a multiple banking system environment.
  • The system utilizes switchboard routing to efficiently route requests and transactions between different banks.
  • The techniques described in the patent application aim to streamline the process of interacting with multiple banks and performing banking functions.
  • The system may involve the use of a centralized switchboard or routing mechanism to handle requests and transactions.
  • The patent application may include specific algorithms or methods for determining the optimal routing of requests and transactions between banks.
  • The system may also include security measures to ensure the privacy and integrity of user data and transactions.

Potential Applications

The technology described in the patent application has potential applications in various areas, including:

  • Banking and financial institutions that operate in a multiple banking system environment.
  • Fintech companies that provide services that involve interactions with multiple banks.
  • Mobile banking applications that allow users to access and manage accounts from different banks.
  • Online payment platforms that facilitate transactions between users and multiple banks.

Problems Solved

The technology described in the patent application aims to solve several problems, including:

  • Inefficiencies and complexities associated with interacting with multiple banks in a banking system environment.
  • Difficulties in routing requests and transactions between different banks in an optimal and secure manner.
  • Challenges in maintaining the privacy and integrity of user data and transactions across multiple banks.
  • Lack of a centralized mechanism to streamline and simplify the process of performing banking functions across multiple banks.

Benefits

The technology described in the patent application offers several benefits, including:

  • Improved efficiency and convenience for users in performing banking functions across multiple banks.
  • Streamlined and optimized routing of requests and transactions between different banks.
  • Enhanced security measures to protect user data and transactions in a multiple banking system environment.
  • Simplified and standardized processes for interacting with multiple banks, leading to a better user experience.

Abstract

A system and techniques to perform functions within a multiple banking system environment utilizing switchboard routing.

METHODS AND SYSTEMS FOR MANAGING MULTIPLE CONTENT DELIVERY NETWORKS (18454484)

Main Inventor

Jose MALDONADO ARJONA


Brief explanation

Methods and systems are provided for a content delivery management platform that organizes and monitors content delivery networks based on the applications, features, or functions they serve. The platform is independent of any specific content delivery network and uses an abstraction layer to bridge the gap between the networks and the content provider's needs.
  • The content delivery management platform organizes and monitors content delivery networks.
  • It categorizes the networks based on the applications, features, or functions they serve.
  • The platform is not tied to any specific content delivery network.
  • An abstraction layer is used to connect the networks with the content provider's requirements.
  • The platform serves the users by providing the necessary applications, features, or functions.

Potential Applications

  • Content providers can efficiently manage and monitor multiple content delivery networks.
  • The platform allows for easy integration of new content delivery networks without disrupting existing systems.
  • It enables content providers to optimize content delivery based on specific applications, features, or functions.

Problems Solved

  • Simplifies the management and monitoring of content delivery networks.
  • Provides a unified platform for content providers to handle multiple networks.
  • Facilitates seamless integration of new networks into existing systems.

Benefits

  • Improved efficiency in managing and monitoring content delivery networks.
  • Flexibility to adapt to changing network requirements and add new networks.
  • Enhanced optimization of content delivery based on specific needs.

Abstract

Methods and systems are for a content delivery management platform that organizes and monitors content delivery networks by the applications, features, or functions that they serve. The content delivery management platform is agnostic to the content delivery network. To provide this functionality, the content delivery management platform uses an abstraction layer to interface between the content delivery networks and the needs of the content provider (e.g., the owner of the content delivery management platform) as it serves users (e.g., provides the applications, features, or functions).

INTERNET PROTOCOL (IP) WHITELISTING FOR SIGNED UNIFORM RESOURCE LOCATORS (URLS) (17837764)

Main Inventor

Hari Hara Sudhan Gnanaprakasam


Brief explanation

The patent application describes a system for implementing IP address whitelisting for signed URLs. Here is a simplified explanation of the abstract:
  • The system receives a request from a user device to access a resource.
  • It authenticates the user device and generates a pre-signed URL that indicates the location of the resource.
  • The system then generates a signed URL by adding the identifier of the user device to the pre-signed URL.
  • When a second request to access the resource is received, the system compares the identifier of the second request with the identifier in the signed URL.
  • Based on this comparison, the system either grants or denies access to the resource.

Potential applications of this technology:

  • Secure access control for online resources.
  • Protection against unauthorized access to sensitive information.
  • Preventing unauthorized downloads or sharing of files.

Problems solved by this technology:

  • Ensures that only authenticated user devices can access the resource.
  • Provides an additional layer of security by comparing identifiers in the signed URL.
  • Helps prevent unauthorized access and potential data breaches.

Benefits of this technology:

  • Enhanced security for online resources.
  • Simplified access control process.
  • Improved protection against unauthorized access and data breaches.

Abstract

Systems as described herein may implement IP address whitelisting for signed Uniform Resource Locators (URLs). A computing device may receive, from a first user device, a first request to access a resource. The computing device may determine a first identifier of the first user device. After an authentication of the first user device, the computing device may generate a pre-signed URL indicating a location of the resource. The computing device may generate a signed URL by prefixing the pre-signed URL with the first identifier of the first user device. The computing device may receive a second request to access the resource. Based on comparing a second identifier corresponding to the second request with the first identifier in the signed URL, the computing device may grant or deny the second request access to the resource.

SYSTEMS AND METHODS FOR RISK AWARE OUTBOUND COMMUNICATION SCANNING (17806369)

Main Inventor

Rui ZHANG


Brief explanation

The patent application describes systems and methods for securing data for outbound communication. Here is a simplified explanation of the abstract:
  • The technology determines the risk profile of outbound communication, which includes data modules such as payload, origination endpoint, and destination endpoint.
  • Based on the risk profile, a scanning policy is determined from a set of scanning policies.
  • A secure machine learning model is selected from a set of secure machine learning models, based on the risk profile and authentication level.
  • The data modules are provided to the secure machine learning model according to the determined scanning policy.
  • The technology receives a sanitized version of the payload from the secure machine learning model.
  • The sanitized payload is then used for the outbound communication.

Potential applications of this technology:

  • Data security in email communication
  • Secure transmission of sensitive information in messaging apps
  • Protection of confidential data in file sharing platforms

Problems solved by this technology:

  • Mitigates the risk of data breaches during outbound communication
  • Ensures that only sanitized and secure data is transmitted
  • Reduces the chances of unauthorized access to sensitive information

Benefits of this technology:

  • Enhanced data security and privacy
  • Efficient and automated scanning and sanitization process
  • Customizable risk profiles and scanning policies for different communication scenarios

Abstract

Systems and methods for securing data for outbound communication may include: determining a risk profile for the outbound communication based, the outbound communication comprising data modules including at least a payload, an origination endpoint, and a destination endpoint; determining a scanning policy from a plurality of scanning policies, based on the determined risk profile; determining a secure machine learning model from a plurality of secure machine learning models, based on the determined risk profile, wherein the secure machine learning model is determined based on an authentication level corresponding to the determined risk profile; providing one or more data modules to the secure machine learning model, based on the determined scanning policy; receiving a sanitized version of the payload based on an output of the secure machine learning model; and providing the sanitized version of the payload for the outbound communication.

ARRANGEMENTS FOR DETECTING BI-DIRECTIONAL ARTIFICIAL INTELLIGENCE (AI) VOICE COMMUNICATIONS AND NEGOTIATING DIRECT DIGITAL COMMUNICATIONS (18209295)

Main Inventor

Andrew DOANE


Brief explanation

==Abstract==

The patent application describes a system for automatically detecting and managing bi-directional artificial intelligence (AI) communications. It introduces a method for automatically negotiating and switching to alternative direct digital communications when necessary.

Patent/Innovation Explanation

  • The patent application focuses on the development of a system that can detect and manage AI communications.
  • It proposes a method for automatically negotiating and switching to alternative direct digital communications.
  • The system aims to enhance the efficiency and effectiveness of AI communications by providing a mechanism for seamless transition to alternative communication methods.

Potential Applications

This technology has potential applications in various fields, including:

  • AI-powered customer service platforms
  • Autonomous vehicles and transportation systems
  • Smart home automation systems
  • Industrial automation and robotics
  • Virtual assistants and chatbots

Problems Solved

The technology addresses several problems in AI communications, such as:

  • Ensuring uninterrupted communication between AI systems and users
  • Detecting and resolving communication issues in real-time
  • Optimizing the efficiency and reliability of AI communications
  • Enhancing the user experience by providing seamless communication transitions

Benefits

The benefits of this technology include:

  • Improved reliability and efficiency of AI communications
  • Enhanced user experience through uninterrupted interactions
  • Real-time detection and resolution of communication issues
  • Seamless transition to alternative communication methods when needed

Abstract

Arrangements for automatically detecting bi-directional artificial intelligence (AI) communications and automatically negotiating (i.e., switching to alternative) direct digital communications.

SYSTEMS AND METHODS FOR PROVIDING WIRELESS-BEACON-RELATED SERVICES (18452840)

Main Inventor

Lawrence DOUGLAS


Brief explanation

The patent application describes a system for updating a database with wireless connection information and providing this information to other devices. Here are the key points:
  • Wireless connection information for wireless devices is received and used to update entries in a database.
  • Instructions to provide connection information to a second device are received via a first device.
  • Based on the instructions and the entries in the database, first wireless connection information for a first wireless beacon device is provided to the second device.
  • The first wireless connection information includes security information for connecting to the first wireless beacon device.
  • The first wireless beacon device is selected based on its proximity to the location of the second device.

Potential applications of this technology:

  • Smart home systems: The system can update the database with wireless connection information from various smart devices and provide this information to other devices in the home network.
  • Retail and marketing: The system can update the database with wireless connection information from beacons placed in stores, allowing customers to receive relevant information and offers on their devices based on their proximity to these beacons.
  • Industrial automation: The system can update the database with wireless connection information from sensors and devices in an industrial setting, enabling efficient monitoring and control of equipment.

Problems solved by this technology:

  • Simplifies the process of updating a database with wireless connection information by automating the process.
  • Enables easy sharing of wireless connection information between devices, eliminating the need for manual configuration.
  • Improves the user experience by providing secure and accurate wireless connection information to devices based on their proximity to beacon devices.

Benefits of this technology:

  • Streamlines the setup and configuration of wireless devices by automatically updating the database with connection information.
  • Enhances the connectivity and communication between devices by providing accurate and secure wireless connection information.
  • Improves the efficiency and effectiveness of various applications, such as smart home systems and retail marketing, by leveraging proximity-based wireless connection information.

Abstract

In some embodiments, wireless connection information for wireless devices may be received. Based on the wireless connection information, one or more entries stored in a database may be updated. One or more instructions to provide connection information to a second device may be received via a first device of a user. Based on the instructions and the entries, first wireless connection information for a first wireless beacon device may be provided to the second device. In some embodiments, the first wireless connection information may include security information that enables the second user device to connect to the first wireless beacon device. In some embodiments, the first wireless beacon device may be selected from a set of devices based on a proximity of the first wireless beacon device to a location of the second device.

GENERATING A SCREENING INTERFACE FOR COMMUNICATIONS (18455602)

Main Inventor

Asher SMITH-ROSE


Brief explanation

Methods and systems are described in this patent application for manipulating a communication acceptance screen, manipulating an interactive communication acceptance icon, and restricting access to accounts based on voice communication parameters.
  • When a communication is detected from one device to another device, it may be considered risky.
  • The system mitigates this risk by providing the user with information about the source of the communication, allowing them to reject it if desired.
  • If the user accepts the communication, the system enables monitoring of the communication.
  • The system also restricts any accounts that are disclosed within the communication.

Potential Applications

  • This technology can be applied in various communication platforms, such as messaging apps, voice call services, and video conferencing tools.
  • It can be used to enhance security and privacy by giving users more control over incoming communications.
  • This technology can be integrated into customer service systems to verify the authenticity of incoming calls and protect against fraudulent activities.

Problems Solved

  • Risky communications can pose a threat to users, such as phishing attempts or fraudulent calls.
  • Users may unknowingly disclose sensitive information during a communication, leading to potential security breaches.
  • It can be challenging for users to differentiate between legitimate and risky communications.

Benefits

  • Users are provided with information about the source of a communication, allowing them to make informed decisions on whether to accept or reject it.
  • Monitoring of accepted communications helps detect and prevent potential security breaches.
  • Restricting access to disclosed accounts adds an extra layer of protection for users' sensitive information.

Abstract

Methods and systems are described herein for manipulating a communication acceptance screen, manipulating an interactive communication acceptance icon, and restricting access to accounts based on voice communication parameters. In particular, when a communication is detected from one device to another device, that communication may be risky. Thus, the risk is mitigated by giving a user information about the source of the communication to give a user a chance to reject the communication. In addition, in instances where the user accepts the communication, the system enables monitoring the communication and restricting any accounts that are disclosed within the communication.