Capital One Services, LLC patent applications published on November 30th, 2023

From WikiPatents
Revision as of 07:08, 4 December 2023 by Wikipatents (talk | contribs)
Jump to navigation Jump to search

Summary of the patent applications from Capital One Services, LLC on November 30th, 2023

Capital One Services, LLC has recently filed several patent applications for innovative systems and methods across various domains. These patents aim to enhance security, improve efficiency, and provide unique solutions to common challenges. Here is a summary of the recent patent applications:

- One patent application focuses on using machine learning models to predict if a user will complete a task by a deadline. The system can recommend communication protocols for sending reminders to increase the likelihood of task completion.

- Another patent application introduces multi-factor authentication and intelligent call routing to enhance security and efficiency at customer call centers. Pre-authentication of customer support requests and the use of contactless cards as a second factor of authentication help reduce the risk of data misuse.

- A storage optimization system is described in another patent application, which manages emails with limited capacity. The system scans emails, identifies hyperlinks and event identifiers, and checks if the limited capacity is filled. If so, the associated email is deleted.

- A computing system is described in a patent application that performs tests on a target server using client devices. The system sends instructions to the clients, which verify the authenticity of the payload and execute the instructions as part of a non-malicious botnet. The results are used to generate a report highlighting any issues and recommendations.

- Another patent application focuses on controlling data access using a short-range transceiver and a client device. A secure memory block is created in the client device, and access to personal user data stored in it is restricted to authorized users.

- The patent application also describes dynamically encrypting requests by obtaining an updated private key for a third-party service and storing a routing entry with a security token in a caching system.

- A patent application introduces a device that receives application questions for credit applicants and broadcasts them to other devices with access to a distributed ledger. The device generates an application response, processes it using a smart contract, and determines a credit worthiness score for the individual.

- Another patent application describes a system that can locate a user in a parking lot and direct them to recommended inventory. The user captures an image of a vehicle, and the system identifies the vehicle and suggests a similar model. Directions are provided to guide the user to the recommended vehicle.

- A method for provisioning account information of a payment card is described in a patent application. User datum encryption information is transmitted, and the account provisioning information is shared after user authentication and confirmation.

- The patent application also presents a system and method for preventing government identification-based fraud by performing multiple security checks during a submission session.

Notable applications:

  • Machine learning models for task completion prediction and reminder recommendations.
  • Multi-factor authentication and intelligent call routing for customer call centers.
  • Storage optimization system for managing emails with limited capacity.
  • Computing system for performing tests on a target server using client devices.
  • Data access control using a short-range transceiver and client device.
  • Dynamic encryption of requests for third-party services.
  • Device for credit worthiness assessment using distributed ledger technology.
  • System for locating users in parking lots and providing recommendations.
  • Method for provisioning account information of a payment card.
  • System for preventing government identification-based fraud.



Contents

Patent applications for Capital One Services, LLC on November 30th, 2023

SYSTEMS AND METHODS FOR SAW TOOTH MILLING TO PREVENT CHIP FRAUD (18204188)

Main Inventor

Daniel HERRINGTON


Brief explanation

The abstract describes systems and methods for milling patterns for a card, specifically for chip fraud prevention.
  • The system includes a device with a chip that is partially encompassed in a chip pocket.
  • The chip pocket has various shapes, including peaks and valleys.
  • Connections are placed between the peaks or valleys of the chip pocket.
  • These connections are communicatively coupled to at least one surface of the chip.
  • The purpose of this design is to prevent chip fraud in cards.

Abstract

Example embodiments of systems and methods for milling patterns for a card are provided. A chip fraud prevention system include a device including a chip. The chip may be at least partially encompassed in a chip pocket. The chip pocket may include one or more shapes. The one or more shapes may include one or more peaks and one or more valleys. One or more connections may be communicatively coupled to at least one surface of the chip. The one or more connections may be placed between at least one of the one or more peaks or one or more valleys.

METHODS AND SYSTEMS FOR DYNAMIC MONITORING THROUGH GRAPHICAL USER INTERFACES (18448889)

Main Inventor

Seemit SHETH


Brief explanation

- The patent application describes methods and systems for monitoring through graphical user interfaces.

- The system includes a processor and data storage with instructions for performing operations. - The operations involve maintaining an input file with predetermined criteria for multiple factors. - A model dataset is received, generated using a model based on the input file. - A first graphical user interface is generated, displaying a subset of factors, model risk, and a selectable feature associated with a selected factor and time period. - A selection of the selectable feature is received through the first graphical user interface. - In response, a second graphical user interface is generated, recoloring a portion of the first graphical user interface.

Abstract

Methods and systems for monitoring through graphical user interfaces are disclosed. In one aspect, a system is disclosed that includes a processor and data storage including instructions that, when executed by the processor, cause the system to perform operations. The operations include maintaining an input file including predetermined criteria for a plurality of factors, receiving a model dataset generated using a model, based on the input file and the model dataset, generating a first graphical user interface that includes a graphical illustration of a subset of the plurality of factors, a model risk for the model, and a selectable feature associated with a selected factor in the subset and a selected time period. The operations further include receiving through the first graphical user interface a selection of the selectable feature, and, in response, generating a second graphical user interface that recolors a portion of the first graphical user interface.

SEARCH TOOL FOR IDENTIFYING AND SIZING CUSTOMER ISSUES THROUGH INTERACTION SUMMARIES AND CALL TRANSCRIPTS (17970019)

Main Inventor

Deepak Ramamohan


Brief explanation

- The patent application describes a search tool that can locate customer issues in call transcripts and agent notes.

- The tool can accurately count how often these issues appear in the documents. - The tool improves the speed of document search by using a pre-computed document matrix. - The document matrix can be used for multiple queries. - The tool takes into account similar terms in processing a query. - A word coverage factor is used to improve the relevance of search results. - The word coverage factor calculates the fraction of query terms present in a document.

Abstract

The exemplary embodiments may provide a search tool that can locate customer issues in call transcripts and agent notes and can provide an accurate count of how often such issues appear in the call transcripts and agent notes. The exemplary embodiments may improve the speed with which the search of documents is performed. The exemplary embodiments rely upon a document matrix that is computed once for a given corpus of documents and a given vocabulary of the documents. The document matrix may be used across multiple queries. The exemplary embodiments also account for similar terms in processing a query. The exemplary embodiments may use a word coverage factor to improve the relevance of the search results returned by the search tool. The word coverage factor acts as a multiple factor that computes the fraction a query terms that are present in a document.

Filtering Results Based on Historic Feature Usage (18231916)

Main Inventor

Vyjayanthi Vadrevu


Brief explanation

- This patent application describes a method for modifying recommendations from a recommendation engine for a product or device.

- The recommendation engine initially provides search results for a specific type of device. - The search results are then modified to include devices that have features that the user considers important. - The user's important features are determined by observing their interaction with a similar device over time. - Features that the user frequently uses and sparingly uses are identified. - The search results are then adjusted to exclude devices that do not have the features frequently used by the user.

Abstract

Aspects described herein may provide modification of recommendations from a recommendation engine for a product or a device. The recommendation engine may provide initial search results for a particular type of device. The initial search results may be modified to ensure inclusion of devices that include features that the user considers important. Features that the user considers important may be determined based on observing the user's interaction with another device of the same type. By observing the user's interaction with the other device over a period of time, features that the user commonly uses and features that the user sparingly uses may be determined. The initial search results may then be modified to remove devices that do not include the features frequently used by the user and therefore considered important to the user.

AUTOMATIC SEGMENTATION USING HIERARCHICAL TIMESERIES ANALYSIS (17824206)

Main Inventor

Adam BEAUREGARD


Brief explanation

- The patent application describes methods and systems for segmenting a dataset using a feature hierarchy with multiple levels.

- The feature hierarchy has different numbers of features at different levels. - The first level of the hierarchy is used to segment the dataset into multiple datasets. - A timeseries dataset is generated for each segment. - An anomaly detection model is used to identify anomalies within the timeseries datasets. - The number of anomalies detected is compared to a threshold. - If the number of anomalies does not reach the threshold, a second level of the hierarchy is used to further segment the dataset. - This process continues until a level of the hierarchy is found where the number of anomalies reaches the threshold. - Once the level is determined, a security rule is generated to address the anomalies.

Abstract

Methods and systems are disclosed for using a feature hierarchy with multiple levels with a different number of features at different levels to segment a dataset. The mechanism may use the first level of the hierarchy to segment a dataset into multiple datasets and then generate a timeseries dataset for each segment. Those timeseries datasets may be input into an anomaly detection model to identify a number of anomalies detected within those segments. Based on the number of anomalies not reaching a threshold, a second level of the hierarchy may be used to segment the dataset. Those segments may be input into the anomaly detection model to determine a number of anomalies for the second level. This process may continue until a level of the hierarchy is determined such that the number of anomalies reaches the threshold. The mechanism may then generate a security rule to deal with the anomalies.

TECHNIQUES TO ADD SMART DEVICE INFORMATION TO MACHINE LEARNING FOR INCREASED CONTEXT (18204767)

Main Inventor

Alan SALIMOV


Brief explanation

The patent application describes an apparatus, system, and computer readable medium that process non-dialog information from a smart device.
  • The processing circuitry receives non-dialog information and determines the data type of the received data.
  • Based on the data type, the processing circuitry transforms the data using a machine learning algorithm into standardized data.
  • The standardized transformed data is suitable for training chatbot systems.
  • This innovation allows the underutilized non-dialog information to be used as training input to improve context and conversation flow between a chatbot and a user.

Abstract

Disclosed are an apparatus, a system and a non-transitory computer readable medium that implement processing circuitry that receives non-dialog information from a smart device and determines a data type of data in the received non-dialog information. Based on the determined data type, the processing circuitry transforms the received first data using an input from a machine learning algorithm into transformed data. The transformed data is standardized data that is palatable for machine learning algorithms such as those used implemented as chatbots. The standardized transformed data is useful for training multiple different chatbot systems and enables the typically underutilized non-dialog information to be used to as training input to improve context and conversation flow between a chatbot and a user.

METHODS AND ARRANGEMENTS TO ADJUST COMMUNICATIONS (18230614)

Main Inventor

Fardin ABDI TAGHI ABAD


Brief explanation

The patent application describes a system that uses logic to adjust communications between customers based on their use of synonyms.
  • The system clusters customers into two groups based on their use of different subsets of synonyms.
  • Each group is assigned a tag, and each synonym is associated with the corresponding group's tag.
  • The system also associates models with pairs of the groups.
  • The models adjust the words used in communications between the two groups by replacing words based on the associated synonyms.

Abstract

Logic may adjust communications between customers. Logic may cluster customers into a first group associated with a first subset of synonyms and a second group associated with a second subset of the synonyms. Logic may associate a first tag with the first group and with each of the synonyms of the first subset. Logic may associate a second tag with the second group and with each of the synonyms of the second subset. Logic may associate one or more models with pairs of the groups. A first pair may comprise the first group and the second group. The first model associated with the first pair may adjust words in communications between the first group and the second group, based on the synonyms associated with the first pair, by replacement of words in a communication between customers of the first subset and customers of the second sub set.

SYSTEMS AND METHODS FOR PROVIDING NEAR FIELD COMMUNICATIONS (18359508)

Main Inventor

Panayiotis VARVAREZIS


Brief explanation

The patent application describes methods and systems for enabling Near Field Communications (NFC) on an Android mobile device.
  • The mobile device is equipped with software that determines if it should perform an NFC communication with a contactless payment terminal (CPT) using a secure element associated with an NFC controller.
  • The software enables the mobile device to establish communication with the CPT using the NFC controller.
  • The invention focuses on providing secure NFC communication between the mobile device and the CPT.
  • The disclosed methods and systems are specifically designed for Android mobile operating systems.
  • The software is executed by one or more processors within the mobile device.
  • The invention aims to enhance the functionality and security of NFC-based contactless payments on Android mobile devices.

Abstract

Methods and systems are disclosed for providing Near Field Communications. In certain embodiments, an Android mobile operating system based mobile device is configured with software that, when executed by one or more processors, determines whether the mobile device is to perform an NFC communication with a contactless payment terminal (CPT) using a secure element associated with an NFC controller included in the mobile device. Based on the determination, the mobile device is configured to execute software that performs communications with the CPT using the NEC controller.

GENERATING A SENSORY INDICATION (18448139)

Main Inventor

Daniel HERRINGTON


Brief explanation

The patent application describes a method for generating a sensory indication on a transaction card.
  • Input signal associated with a purchase is received.
  • A timer for an event related to the purchase is initiated based on the input signal.
  • An output component of the transaction card is activated when the timer expires.
  • The input signal may include information specifying a desired indication related to the event, a given output component for generating the desired indication, or other data.

Abstract

In certain embodiments, a sensory indication may be generated on a transaction card. In some embodiments, an input signal associated with a purchase (executed using a transaction card) may be received. Based on the input signal, a timer for an event related to the purchase may be initiated. An output component of the transaction card may be activated when the timer expires. In some embodiments, the input signal may include information specifying a desired indication related to the event, a given output component for generating the desired indication, or other data.

SYSTEM FOR RECURRING TIME-BASED BOUND TOKENS (17752163)

Main Inventor

Allison FENICHEL


Brief explanation

The patent application describes a method, system, and computer program for generating and managing a time-bound virtual payment card. Here are the key points:
  • The invention allows a primary account holder to request a virtual payment card linked to their account.
  • The virtual payment card is intended to be shared with a third party while maintaining the security of the primary account.
  • The account holder specifies the recipient and conditions for use of the virtual payment card, including recurring temporal parameters.
  • The card issuing financial institution receives the request and generates a virtual card that is configured according to the specified parameters.
  • The virtual card is then sent to the specified recipient.
  • The recipient activates the virtual payment card and attempts a purchase at a merchant.
  • The merchant sends a request to a service managed by the card issuing financial institution.
  • Based on the transaction information in the request, the service determines whether the transaction meets the specified conditions for use.
  • The service then approves or denies the transaction accordingly.

Abstract

A method, system and computer program product for generating and managing a time-bound virtual payment card are disclosed. A primary account holder requests a virtual payment card linked to their account to share spending with a third party while maintaining the security of their account. In the request, the account holder specifies a recipient and conditions for use of the virtual payment card including recurring temporal parameters. A service managed by the card issuing financial institution receives the request and generates a virtual card configured to the parameters specified. Thereafter, the service sends the virtual card to the specified recipient. After activating the virtual payment card, the recipient attempts a purchase at a merchant. Upon checkout, the service receives a request from the merchant and based on the transaction information in the request, determines whether the transaction meets the conditions for use and approves or denies the transaction accordingly.

NFC MOBILE CURRENCY TRANSFER (18234013)

Main Inventor

Rajko ILINCIC


Brief explanation

The patent application is about NFC-based mobile currency transfers.
  • The invention allows for mobile payments to be initiated when two mobile devices come into NFC communications range.
  • A payment card associated with an account is tapped to one or more devices to validate the currency transfer.
  • The innovation simplifies the process of transferring currency using mobile devices.
  • It utilizes NFC technology to enable secure and convenient mobile payments.
  • The invention may improve the efficiency and speed of mobile payment transactions.
  • It provides a seamless way to transfer funds between mobile devices.
  • The patent application aims to enhance the user experience of mobile payments.

Abstract

Various embodiments are generally directed to NFC-based mobile currency transfers. A mobile payment may be programmatically initialized when at least two mobile devices come into NFC communications range. A payment card associated with an account used to fund the currency transfer may be tapped to one or more of the devices to allow a server to validate the currency transfer.

PRODUCT ANALYSIS PLATFORM TO PERFORM A FACIAL RECOGNITION ANALYSIS TO PROVIDE INFORMATION ASSOCIATED WITH A PRODUCT TO A USER (18447672)

Main Inventor

Liju MATHEWS


Brief explanation

The patent application describes a device that can determine a user's level of interest in a particular product and perform actions related to a transaction involving that product. 
  • The device receives an image of the user's face and uses facial recognition analysis to determine the user's identification information.
  • Based on the identification information, the device identifies the user's account information and a product in the inventory that matches the user's interest.
  • The device then goes through a preauthorization process for the transaction involving the product and the user, using the account information.
  • Finally, the device performs an action related to the transaction based on the outcome of the preauthorization process.

Abstract

A device may determine that a user has a threshold level of interest in a type of product. The device may receive an image of a face of the user, may perform a facial recognition analysis of the image, and may determine identification information of the user based on the facial recognition analysis. The device may identify account information associated with the user based on the identification information and may identify a product in an inventory that is associated with the type of product. The device may perform a preauthorization process associated with a transaction involving the product and the user based on the account information, and may perform an action associated with the transaction based on the preauthorization process.

SYSTEM AND METHOD FOR REDUCING GOVERNMENT IDENTIFICATION FRAUD (18197478)

Main Inventor

Christopher LANGE


Brief explanation

The patent application describes a system and method for preventing government identification-based fraud. Here are the key points:
  • The system performs multiple security checks during a government identification submission session to prevent fraud.
  • A session check is conducted to ensure that the user device has not initiated too many sessions within a specific time period.
  • An attempt check is made to ensure that the user has not made too many government identification submission attempts in the current session.
  • A dual-authentication check verifies that the phone number provided for dual-authentication has not been excessively used recently.
  • A general risk assessment is performed to identify any remaining high-risk flags.
  • The purpose of these checks is to ensure that the user behind the session is not a fraudster.

Abstract

A system and method for preventing government identification-based fraud is disclosed. When a government identification submission session is initiated, several layers of security checks are performed to ensure that the user behind the session is not a fraudster. First, a session check is performed to ensure that the user device has not initiated more than a predetermined number of sessions within a predetermined time. Next, an attempt check is made in order to ensure that the user has not made more than a predetermined number of government identification submission attempts during the current session. Next, a dual-authentication check is performed to ensure that the phone number provided for the dual-authentication has not been used more than a maximum number of times during a recent period of time. And lastly, a general risk assessment is performed to look for any remaining high-risk flags.

SYSTEM AND METHOD FOR CARD PRESENT ACCOUNT PROVISIONING (18225892)

Main Inventor

Lawrence DOUGLAS


Brief explanation

- The patent application describes a method for provisioning account information of a payment card.

- User datum encryption information is transmitted to a transaction data processing system. - When a user presents the payment card at the transaction data processing system, a user datum encrypted with the encryption information and a request to share account provisioning information is received. - The user account associated with the payment card is determined and the user is authenticated. - A request for confirmation to share the account provisioning information is sent to a user device associated with the user account. - A confirmation response is received from the user device, granting permission to share the account provisioning information. - Finally, the account provisioning information is transmitted to the transaction data processing system.

Abstract

In a method for provisioning account information of a payment card, user datum encryption information is transmitted to a transaction data processing system. A user datum encrypted using the user datum encryption information and a request to share account provisioning information is received from the transaction data processing system when the payment card is present by a user at the transaction data processing system. A user account associated with the payment card is determined and the user of the payment card is authenticated. A request for confirmation that the account provisioning information should be shared is sent to a user device associated with the user account and a confirmation response is received from the user device that includes permission to share account provisioning information. Account provisioning information is then transmitted to the transaction data processing system.

Augmented Reality Vehicle Search Assistance (18231516)

Main Inventor

Geoffrey Dagley


Brief explanation

- The patent application describes a system that can automatically locate a user in a parking lot and direct them to recommended inventory.

- The system allows a customer to capture an image of a vehicle or a marker associated with a vehicle in a parking lot. - The image is processed either locally or at a server to identify the vehicle. - Information about the user is also processed to determine another vehicle that would be appropriate for a recommendation. - A prompt on a mobile device suggests a popular model similar to the vehicle being viewed. - The system then provides directions, such as augmented reality directions, to guide the user to the recommended vehicle.

Abstract

Aspects described herein may allow for auto-locating a user in a parking lot and/or automatically directing a user to recommended inventory. For example, a customer may capture an image of a vehicle, or a marker associated with a vehicle, in a parking lot. The image may be processed locally or at a server. A vehicle may be identified based on analysis of the image. Further, information regarding the user may be processed to determine another vehicle appropriate for a recommendation. For example, a prompt on a mobile device may suggest a popular model similar to the vehicle being viewed. The system may then provide directions (e.g., augmented reality directions) to the user to direct the user to the vehicle.

SECURE SYSTEM (18305426)

Main Inventor

Jeremy PHILLIPS


Brief explanation

- The patent application describes a device that receives application questions for someone applying for credit.

- The device broadcasts these questions to other devices that have access to a distributed ledger for sharing credit worthiness information. - The purpose is to generate an application response and process it using a smart contract. - The device receives encrypted application responses containing credit worthiness information about the individual. - The device decrypts these responses and determines a credit worthiness score for the individual. - The device then takes actions that allow it or another device associated with the organization to use the credit worthiness score to decide whether to approve the individual for credit.

Abstract

A device may receive application questions for an individual applying for credit with an organization. The device may broadcast the application questions to additional devices that have access to a distributed ledger for sharing credit worthiness information to cause at least one of the additional devices to generate an application response to the application questions and to process the application response using a smart contract. The device may receive one or more application responses that have been encrypted. Each of the application responses may include particular credit worthiness information relating to the individual. The device may decrypt the application responses. The device may determine a credit worthiness score for the individual using the application responses. The device may perform one or more actions that allow the device or another device associated with the organization to use the credit worthiness score to determine whether to approve the individual for credit.

Systems and Methods for Dynamically Encrypting Redirect Requests (18232663)

Main Inventor

Aditya Anand


Brief explanation

The patent application describes systems and methods for dynamically encrypting requests.
  • The invention involves obtaining an updated private key for a third-party service.
  • A routing entry with a security token for the third-party service is stored in a caching system.
  • When a request to access the third-party service is received, the client device is redirected to the third-party service.

Abstract

Systems and methods for dynamically encrypting requests in accordance with embodiments of the invention are disclosed. In one or more embodiments, a computer-implemented method includes obtaining an updated private key been issued for a third-party service, storing, in a caching system, a routing entry comprising a security token for the third-party service, receiving a request to access the third-party service, and redirecting the client device to the third-party service.

SYSTEMS AND METHODS FOR DATA ACCESS CONTROL OF SECURE MEMORY USING A SHORT-RANGE TRANSCEIVER (18232703)

Main Inventor

Jeffrey WIEKER


Brief explanation

The patent application describes systems and methods for controlling data access using a short-range transceiver, like a contactless card, and a client device.
  • The innovation focuses on data access control by creating and accessing a secure memory block in a client device.
  • The process involves handling requests to create and access the secure memory block through the interaction of a contactless card and a client device.
  • Once the secure memory block is created, personal user data can be stored in it, and access to this data is restricted to authorized users.
  • The system receives a user token and a request for a data storage key from the client device after a tap action between the contactless card and the client device.
  • It verifies the user's authorization to create the secure memory block on the client device.
  • The system then transmits the data storage key to the client device, allowing it to create the secure memory block and encrypt it using the key.

Abstract

Systems and methods for controlling data access through the interaction of a short-range transceiver, such as a contactless card, with a client device are presented. Data access control may be provided in the context of creating and accessing a secure memory block in a client device, including handling requests to obtain create and access a secure memory block via the interaction of a short-range transceiver, such as a contactless card, with a client device such that, once the secure memory block is created in memory of the client device, personal user data may be stored in the secure memory block, and access to the stored personal user data may only be provided to users authorized to review the data. An exemplary system and method may include receiving from a client device of the user a user token and a request for a data storage key, the request generated in response to a tap action between a contactless card and the client device, the contactless card associated with the user, verifying that the user is authorized to create a secure memory data block on the client device, and transmitting to the client device the data storage key, such that the client device may create a secure memory data block in memory of the client device and encrypt the secure memory data block using the data storage key.

System for Creating Randomized Scaled Testing (18365330)

Main Inventor

Austin Walters


Brief explanation

The patent application describes a computing system that includes a monitoring server, a target server, and client devices connected through networks.
  • The monitoring server identifies client devices to perform a test on the target server.
  • The monitoring server sends a payload with instructions for the test to the clients.
  • The client devices verify the authenticity of the payload and execute the instructions as part of a non-malicious botnet.
  • The test is performed on the target server system.
  • The monitoring server receives results from both the client devices and the target server.
  • Based on the results, the monitoring server generates a report.
  • The report highlights any issues, points of failure, and recommendations for addressing them.

Abstract

A computing system may comprise a monitoring server system, a target server system, and client devices that may be connected via one or more networks. The monitoring server system may identify client devices to perform a test on the target server system, and may send a payload with instructions for performing the test to the clients. The client devices may determine that the payload is authentic and execute the instructions in the payload, as part of a non-malicious botnet, to perform the test on the target server system. The monitoring server system may receive client-side results from the client devices, and server-side results from the target server system. The monitoring server system may generate a report based on the received results. The report may indicate one or more issues, points of failure and/or recommendations for mitigating the issues and/or points of failure.

STORAGE SPACE OPTIMIZATION FOR EMAILS (18449001)

Main Inventor

Lukiih CUAN


Brief explanation

The patent application describes a storage optimization system that manages emails with limited capacity.
  • The system receives multiple emails and identifies those with limited capacity.
  • It scans these emails to find hyperlinks to websites and event identifiers.
  • Using a database, the system determines the traversal path and API calls associated with the website.
  • It then traverses the website using the path and API calls, using the event identifier to check if the limited capacity is filled.
  • If the capacity is filled, the system deletes the email associated with it.

Abstract

In some implementations, a storage optimization system may receive a plurality of emails. Accordingly, the system may identify at least one email associated with a limited capacity in the plurality of emails. The system may further scan, from the at least one email, one or more hyperlinks to determine a website associated with the at least one email and an identifier associated with an event. The system may determine, using a database, a traversal path and at least one application programming interface (API) call associated with the website. Accordingly, the system may traverse the website using the traversal path and the at least one API using the identifier to determine that the limited capacity is filled. The system may delete the at least one email associated with the limited capacity based on determining that the limited capacity is filled.

SYSTEM AND METHOD FOR SECOND FACTOR AUTHENTICATION TO PERFORM SERVICES (18324252)

Main Inventor

Rajko ILINCIC


Brief explanation

The patent application describes a system and method to enhance security and efficiency at a customer call center by leveraging multi-factor authentication and intelligent call routing. 
  • The system aims to reduce the risk of sensitive customer data being misused during call handling.
  • It introduces pre-authentication of customer support requests to verify the legitimacy of the caller.
  • A contactless card associated with the client serves as a second factor of authentication, minimizing the possibility of impersonation by malicious third parties.
  • Pre-authorized customer support calls can be efficiently routed directly to call center agents, eliminating unnecessary delays.
  • Call center agents can initiate additional client authentication processes during the call, such as contactless card authentication, to access sensitive information or alleviate suspicion.

Abstract

A system and method are disclosed that leverage multi-factor authentication features of a service provider and intelligent call routing to increase security and efficiency at a customer call center. Pre-authentication of customer support requests reduces the potential for misappropriation of sensitive customer data during call handling. A contactless card uniquely associated with a client may provide a second factor of authentication via a backchannel to reduce the potential for malicious third-party impersonation of the client prior to transfer of the call to the customer call center. Pre-authorized customer support calls may be intelligently and efficiently routed directly to call center agents, without incurring further delay. During call handling, call center agents may initiate further client authentication processes, including contactless card authentication requests, over one or more different communication channels for authorizing access to sensitive information or to allay suspicion.

MACHINE LEARNING FOR DETERMINING COMMUNICATION PROTOCOLS (18366658)

Main Inventor

Sara BRODSKY


Brief explanation

- This patent application describes methods and systems for using machine learning models to determine if a user will complete a task by a deadline.

- The machine learning models can be trained to recommend a communication protocol for sending reminders to the user, increasing the likelihood of task completion. - The computing system can generate recommendations for the type of reminder to send based on the prediction of whether the user will complete the task by the deadline. - The computing system can determine the message content, communication protocol, and timing for sending the reminder message.

Abstract

Methods and systems are disclosed herein for using one or more machine learning models to determine whether a user is expected to complete a task or action by a deadline. The one or more machine learning models may be trained and/or used to recommend a communication protocol for sending a reminder to the user such that the user is predicted to be more likely to complete an action by the action's deadline. A computing system may use the one or more machine learning models to generate a recommendation for type of reminder to send, for example, if it is predicted that the user is not expected to complete the task by the deadline. A computing system may determine the message to send, the communication protocol to use, and/or the time to send the message.