Difference between revisions of "Capital One Services, LLC patent applications published on November 9th, 2023"

From WikiPatents
Jump to navigation Jump to search
(Creating a new page)
 
 
(36 intermediate revisions by the same user not shown)
Line 1: Line 1:
 +
'''Summary of the patent applications from Capital One Services, LLC on November 9th, 2023'''
 +
 +
Capital One Services, LLC has recently filed several patents related to authentication methods, computing systems, and document processing. These patents aim to provide secure and efficient ways to authenticate telephone calls, request actions with entities, transfer personal identification information (PII), tokenize data, resolve user inquiries using documents, perform account inheritance, and authenticate tokens using coded patterns.
 +
 +
In terms of authentication methods, Capital One has filed patents for authenticating the source of a telephone call before the recipient answers it. This involves the use of first and second authentication information, such as passcodes or security questions. They have also developed a system for assisted third-party password authentication, which establishes a secure connection between applications and an authorization server to obtain access tokens.
 +
 +
In the realm of computing systems, Capital One has filed patents for a system that allows users to request actions with entities and configure tokens with usage thresholds. This ensures that the requested actions do not exceed the allocated resources. They have also developed a system for securely transferring user PII across platforms, giving users control over when their information is released and improving security during the transfer process.
 +
 +
Capital One's patents also cover tokenization methods, where data is converted into secure tokens with limited scope and time. These tokens can be directed to specific recipients and have a detokenization process to recover encrypted data without the need for relational database lookup. This ensures robust protection against unintended recipients accessing the data.
 +
 +
In terms of document processing, Capital One has developed a system that predicts user intent based on chat activity and provides relevant responses. If the response does not resolve the inquiry, the system retrieves related documents for confirmation. They have also filed a patent for a system that captures multiple images of a document using a polarized filter and analyzes them to verify the document's authenticity.
 +
 +
Summary of recent patents filed by Capital One Services, LLC:
 +
 +
* Authentication methods for telephone calls and third-party password authentication.
 +
* Computing systems for requesting actions with entities, securely transferring PII, and tokenizing data.
 +
* Document processing systems for resolving user inquiries and verifying document authenticity.
 +
 +
Notable applications:
 +
 +
* Secure authentication of telephone calls before the recipient answers.
 +
* Assisted third-party password authentication.
 +
* Secure transfer of user PII across platforms.
 +
* Tokenization methods for data protection.
 +
* Document processing for resolving user inquiries and verifying document authenticity.
 +
 +
 +
 +
 
==Patent applications for Capital One Services, LLC on November 9th, 2023==
 
==Patent applications for Capital One Services, LLC on November 9th, 2023==
  
Line 8: Line 37:
 
Kevin OSBORN
 
Kevin OSBORN
  
 
'''Brief explanation'''
 
The patent application describes an authentication system that processes tokens with tailored-wavelength-range coded patterns, steganographic images, or overlapping codes.
 
* The system uses tokens that incorporate invisible-ink-printed patterns in different tailored wavelength ranges within the infrared light spectrum.
 
* Tokens may also include steganographic images with invisible-ink-printed patterns interweaved within them.
 
* Visible-ink-printed patterns and invisible-ink-printed patterns can be printed together, with the invisible-ink patterns corresponding to authentication codes or other data.
 
* The system may have other features to ensure token authentication.
 
 
'''Abstract'''
 
In some embodiments, an authentication system may be configured to process one or more tokens that incorporates one or more tailored-wavelength-range coded patterns, codes represented within a steganographic image, or “overlapping” codes. As an example, such a token may include (i) one or more invisible-ink-printed patterns printed using infrared ink corresponding to different tailored wavelength ranges within the infrared light spectrum, (ii) one or more steganographic images in which invisible-ink-printed patterns are interweaved within the steganographic images, (iii) visible-ink-printed patterns and invisible-ink-printed patterns printed substantially within the visible ink portions of the visible-ink-printed patterns, or (iv) other features, where the invisible-ink-printed patterns correspond to one or more authentication codes or other data for token authentication.
 
  
 
===USING A VIRTUAL KEYBOARD TO ENTER PARTICULAR INPUT ([[US Patent Application 17662186. USING A VIRTUAL KEYBOARD TO ENTER PARTICULAR INPUT simplified abstract|17662186]])===
 
===USING A VIRTUAL KEYBOARD TO ENTER PARTICULAR INPUT ([[US Patent Application 17662186. USING A VIRTUAL KEYBOARD TO ENTER PARTICULAR INPUT simplified abstract|17662186]])===
Line 26: Line 45:
 
Joshua EDWARDS
 
Joshua EDWARDS
  
 
'''Brief explanation'''
 
This patent application describes a system where a user device receives a message indicating an event associated with a user's account. Based on this message, the user device provides a virtual keyboard on its display screen. The user can then input specific information using this virtual keyboard. The user device then sends a second message to another device, triggering actions related to the event associated with the user's account.
 
 
* User device receives a message indicating an account event from another device.
 
* User device displays a virtual keyboard on its screen based on the received message.
 
* User inputs specific information using the virtual keyboard.
 
* User device sends a second message to another device based on the input.
 
* The second message triggers actions related to the account event on the other device.
 
 
'''Abstract'''
 
In some implementations, a user device may receive, from a first other device, a first message, wherein the first message includes information indicating an event associated with an account of a user of the user device. The user device may provide, based on receiving the first message, a virtual keyboard for display on a display screen of the user device. The user device may obtain, based on providing the virtual keyboard, particular input. The user device may send to a second other device, and based on the particular input, a second message, wherein sending the second message is to cause the second other device to perform one or more actions associated with the event that is associated with the account of the user.
 
  
 
===LEARNING-AUGMENTED APPLICATION DEPLOYMENT PIPELINE ([[US Patent Application 17739707. LEARNING-AUGMENTED APPLICATION DEPLOYMENT PIPELINE simplified abstract|17739707]])===
 
===LEARNING-AUGMENTED APPLICATION DEPLOYMENT PIPELINE ([[US Patent Application 17739707. LEARNING-AUGMENTED APPLICATION DEPLOYMENT PIPELINE simplified abstract|17739707]])===
Line 46: Line 53:
 
Roli Agrawal
 
Roli Agrawal
  
 
'''Brief explanation'''
 
- The patent application describes a method that uses a neural network to determine rule-related weights and scale rule results for an application.
 
- The method involves providing the neural network with metrics obtained from executing the application in a test environment.
 
- The neural network uses these metrics to determine the rule-related weights, which are then used to scale the rule results.
 
- The scaled rule results are compared against a threshold to determine if they pass or fail.
 
- If the scaled rule results fail the threshold but the application is still selected for deployment in a production environment, the neural network is re-trained.
 
- The re-training involves using the rule results of the application, an indication of its selection for deployment, and the rule results of other applications in the test environment.
 
- The re-trained neural network generates updated rule-related weights, which are used to scale the rule results and determine updated scaled rule results.
 
 
'''Abstract'''
 
A method includes providing a neural network with metrics obtained from an execution of an application in a test environment to determine rule-related weights, scaling rule results with the rule-related weights to determine scaled rule results. The method also includes re-training the neural network with the rule results of the application, an indication that the executed application is selected for deployment in the production environment, and rule results of other applications in the test environment in response to a determination that the scaled rule results fail a threshold but that the application is selected for deployment in a production environment. The method also includes providing the re-trained neural network with the rule results to generate updated rule-related weights and scaling the rule results by the updated rule-related weights to determine updated scaled rule results.
 
  
 
===SYSTEM AND METHOD FOR ACCESS MANAGEMENT FOR APPLICATIONS ([[US Patent Application 18221458. SYSTEM AND METHOD FOR ACCESS MANAGEMENT FOR APPLICATIONS simplified abstract|18221458]])===
 
===SYSTEM AND METHOD FOR ACCESS MANAGEMENT FOR APPLICATIONS ([[US Patent Application 18221458. SYSTEM AND METHOD FOR ACCESS MANAGEMENT FOR APPLICATIONS simplified abstract|18221458]])===
Line 66: Line 61:
 
Ron MECK
 
Ron MECK
  
 
'''Brief explanation'''
 
The patent application describes a system and method for managing access to applications in a cloud computing environment.
 
* The system scans the actions performed by an application code on resources in the cloud computing environment.
 
* It identifies the existing set of permissions for these resources.
 
* Based on the actions performed, it identifies the permissions accessed by the application code.
 
* A new set of permissions is generated by combining the existing set and the accessed permissions.
 
* The new set of permissions is stored in a database for later retrieval.
 
* When the application code is executed in a production environment, the new set of permissions is applied to the resources.
 
 
'''Abstract'''
 
A system and method for access management for applications is disclosed. The system and method includes at least: initializing, at execution time of an application code, a scan of actions performed by the application code on resources of a cloud computing environment; identifying an existing set of permissions for the resources; identifying one or more accessed permissions by the application code based on the actions performed by the application code on the resources; generating a new set of permissions for accessing the resources based on the identifying the existing set of permissions and the one or more accessed permissions; transmitting the new set of permissions to a database for storage and later retrieval; and applying the new set of permissions to the resources when the application code is executed in a production environment.
 
  
 
===METHODS AND SYSTEMS FOR CONNECTING DATA WITH NON-STANDARDIZED SCHEMAS IN CONNECTED GRAPH DATA EXCHANGES ([[US Patent Application 17735989. METHODS AND SYSTEMS FOR CONNECTING DATA WITH NON-STANDARDIZED SCHEMAS IN CONNECTED GRAPH DATA EXCHANGES simplified abstract|17735989]])===
 
===METHODS AND SYSTEMS FOR CONNECTING DATA WITH NON-STANDARDIZED SCHEMAS IN CONNECTED GRAPH DATA EXCHANGES ([[US Patent Application 17735989. METHODS AND SYSTEMS FOR CONNECTING DATA WITH NON-STANDARDIZED SCHEMAS IN CONNECTED GRAPH DATA EXCHANGES simplified abstract|17735989]])===
Line 86: Line 69:
 
Gaurav SINGH
 
Gaurav SINGH
  
 
'''Brief explanation'''
 
The patent application describes methods and systems for connecting data with non-standardized schemas in connected graph data exchanges.
 
* The system creates a custom data structure for a user profile that includes pointers between user profile attributes and existing assets in a connected graph.
 
* The custom data structure is connected to the existing assets in the connected graph.
 
* The system enables the connection of data with different schemas in a connected graph.
 
* The system improves the efficiency and effectiveness of data exchanges in a connected graph environment.
 
* The innovation allows for better organization and retrieval of data in a connected graph.
 
 
'''Abstract'''
 
Methods and systems for connecting data with non-standardized schemas in connected graph data exchanges. For example, the system generates a custom data structure corresponding to a user identifier for a user profile that includes pointers between user profile attributes (e.g., individual fields/categories within the user profile) and existing assets in a connected graph (e.g., an existing application, software profile for an application, data set, connections, etc.). The system then connects the custom data structure corresponding to the user identifier to the existing assets in the connected graph.
 
  
 
===METHODS AND SYSTEMS FOR PROVIDING AN AUGMENTED REALITY INTERFACE FOR SAVING INFORMATION FOR RECOGNIZED OBJECTS ([[US Patent Application 18138824. METHODS AND SYSTEMS FOR PROVIDING AN AUGMENTED REALITY INTERFACE FOR SAVING INFORMATION FOR RECOGNIZED OBJECTS simplified abstract|18138824]])===
 
===METHODS AND SYSTEMS FOR PROVIDING AN AUGMENTED REALITY INTERFACE FOR SAVING INFORMATION FOR RECOGNIZED OBJECTS ([[US Patent Application 18138824. METHODS AND SYSTEMS FOR PROVIDING AN AUGMENTED REALITY INTERFACE FOR SAVING INFORMATION FOR RECOGNIZED OBJECTS simplified abstract|18138824]])===
Line 105: Line 77:
 
Staevan DUCKWORTH
 
Staevan DUCKWORTH
  
 
'''Brief explanation'''
 
The patent application describes a method for using augmented reality to search for and save information about objects.
 
* The method involves displaying and capturing image data of an object.
 
* It then accesses a database of records related to objects and selects a record that matches the captured object.
 
* The method obtains the vendor identifier of the selected record and combines it with the data record to form a search record.
 
* An augmented reality interface is displayed to allow the user to save the search record.
 
* The user can interact with the interface to save the search record into a searchable data structure.
 
* The user can also retrieve the search record from the data structure and update the vendor identifier if needed.
 
* Information related to the search record is then displayed to the user.
 
 
'''Abstract'''
 
A method includes displaying and capturing image data containing an object and accessing a plurality of records related to objects, selecting a record related to the captured object, obtaining an identifier of a vendor of the object of the selected data record, combining the selected data record and the vendor identifier to form a search record, displaying, based on the search record, an augmented reality interface to receive a first interactive action for saving the search record, receiving the first interactive action, saving, in response to receiving the first interactive action, the search record into a searchable data structure, receiving a second interactive action, retrieving, in response to receiving the second interactive action, the search record from the searchable data structure, updating the vendor identifier based on the retrieved search record, and displaying information related to the search record.
 
  
 
===PROCESSING AN INPUT STREAM OF A USER DEVICE TO FACILITATE SECURITY ASSOCIATED WITH AN ACCOUNT OF A USER OF THE USER DEVICE ([[US Patent Application 17662181. PROCESSING AN INPUT STREAM OF A USER DEVICE TO FACILITATE SECURITY ASSOCIATED WITH AN ACCOUNT OF A USER OF THE USER DEVICE simplified abstract|17662181]])===
 
===PROCESSING AN INPUT STREAM OF A USER DEVICE TO FACILITATE SECURITY ASSOCIATED WITH AN ACCOUNT OF A USER OF THE USER DEVICE ([[US Patent Application 17662181. PROCESSING AN INPUT STREAM OF A USER DEVICE TO FACILITATE SECURITY ASSOCIATED WITH AN ACCOUNT OF A USER OF THE USER DEVICE simplified abstract|17662181]])===
Line 126: Line 85:
 
Joshua EDWARDS
 
Joshua EDWARDS
  
 
'''Brief explanation'''
 
The patent application describes a method for a user device to modify security parameters associated with a user's account based on the input stream obtained via a virtual keyboard.
 
 
* User device obtains an input stream from a virtual keyboard.
 
* The input stream is processed to identify specific information.
 
* If the input stream contains the specific information, the user device modifies one or more security parameters associated with the user's account.
 
 
'''Abstract'''
 
In some implementations, a user device may obtain an input stream, wherein the input stream is obtained via a virtual keyboard provided by the user device. The user device may process the input stream to determine that the input stream includes particular information. The user device may cause, based on determining that the input stream includes the particular information, one or more security parameters associated with an account of a user of the user device to be modified.
 
  
 
===TECHNIQUES FOR MULTI-VOICE SPEECH RECOGNITION COMMANDS ([[US Patent Application 18197318. TECHNIQUES FOR MULTI-VOICE SPEECH RECOGNITION COMMANDS simplified abstract|18197318]])===
 
===TECHNIQUES FOR MULTI-VOICE SPEECH RECOGNITION COMMANDS ([[US Patent Application 18197318. TECHNIQUES FOR MULTI-VOICE SPEECH RECOGNITION COMMANDS simplified abstract|18197318]])===
Line 144: Line 93:
 
Paul HURLOCKER
 
Paul HURLOCKER
  
 
'''Brief explanation'''
 
- The patent application is about techniques for multi-voice speech recognition commands.
 
- It involves monitoring a telecommunications channel between two devices.
 
- The goal is to prompt the initiation of a transaction between two entities associated with the devices.
 
- This is done by detecting an audible request from the second entity and an audible response from the first entity.
 
- The innovation aims to improve the accuracy and efficiency of voice recognition in multi-voice scenarios.
 
 
'''Abstract'''
 
Various embodiments are generally directed to techniques for multi-voice speech recognition commands, such as based on monitoring a telecommunications channel between first and second devices, for instance. Some embodiments are particularly directed to prompting initiation of a transaction between a first entity associated with a first device and a second entity associated with a second device based on detection of an audible request corresponding to the second entity and an audible response corresponding to the first entity.
 
  
 
===METHODS AND SYSTEMS FOR FACILITATING SECURE AUTHENTICATION OF USER BASED ON KNOWN DATA ([[US Patent Application 18353042. METHODS AND SYSTEMS FOR FACILITATING SECURE AUTHENTICATION OF USER BASED ON KNOWN DATA simplified abstract|18353042]])===
 
===METHODS AND SYSTEMS FOR FACILITATING SECURE AUTHENTICATION OF USER BASED ON KNOWN DATA ([[US Patent Application 18353042. METHODS AND SYSTEMS FOR FACILITATING SECURE AUTHENTICATION OF USER BASED ON KNOWN DATA simplified abstract|18353042]])===
Line 162: Line 101:
 
Austin WALTERS
 
Austin WALTERS
  
 
'''Brief explanation'''
 
- This patent application describes methods and systems for improving user authentication based on data known to the user.
 
- The methods and systems allow for secure authentication over remote communication networks without storing the user's data.
 
- Users are required to select images that they are familiar with in order to authenticate themselves.
 
- Synthetic images can be generated based on the user's own images for authentication purposes.
 
- The methods and systems address storage and privacy concerns by not storing the user's data.
 
 
'''Abstract'''
 
Methods and systems are described herein for improvements to authenticate users, particularly authenticating a user based on data known to the user. For example, methods and systems allow for users to be securely authenticated based on data known to the users over remote communication networks without storing the data known to the users. Specifically, methods and systems authenticate users by requiring users to select images that are known to the users. For example, the methods and systems may generate synthetic images based on the user's own images and require the user to select the synthetic image, from a set of a set of images, that is known to the user to authenticate the user. Moreover, the methods and systems alleviate storage and privacy concerns by not storing the data known to the users.
 
  
 
===SYSTEM AND APPARATUS FOR SECURE PASSWORD RECOVERY AND IDENTITY VERIFICATION ([[US Patent Application 18130290. SYSTEM AND APPARATUS FOR SECURE PASSWORD RECOVERY AND IDENTITY VERIFICATION simplified abstract|18130290]])===
 
===SYSTEM AND APPARATUS FOR SECURE PASSWORD RECOVERY AND IDENTITY VERIFICATION ([[US Patent Application 18130290. SYSTEM AND APPARATUS FOR SECURE PASSWORD RECOVERY AND IDENTITY VERIFICATION simplified abstract|18130290]])===
Line 180: Line 109:
 
Kate KEY
 
Kate KEY
  
 
'''Brief explanation'''
 
- The patent application describes a secure method for resetting passwords for user accounts.
 
- During the account setup process, users can provide a media file to the service provider.
 
- When a user requests a password reset, they will be presented with several media files.
 
- The user will be asked to identify the media file they provided during account setup.
 
- If the user correctly identifies the media file, their password will be reset.
 
- This method adds an extra layer of security to the password reset process.
 
- It reduces the risk of unauthorized password resets by verifying the user's identity through a unique media file.
 
 
'''Abstract'''
 
A secure method for resetting the password for an account is disclosed. During the setup of the account, the user can provide the service provider with a media file, and when the user asks the service provider to reset the password for the account, the user will be prompted with several media files. The user can be asked to identify the media file that the user provided to the service provider at the time of the setup of the account. If the user properly identifies the media file, the password will be reset.
 
  
 
===Aggregating Permissions Across Multiple Platforms ([[US Patent Application 17661823. Aggregating Permissions Across Multiple Platforms simplified abstract|17661823]])===
 
===Aggregating Permissions Across Multiple Platforms ([[US Patent Application 17661823. Aggregating Permissions Across Multiple Platforms simplified abstract|17661823]])===
Line 200: Line 117:
 
Brad Norcross
 
Brad Norcross
  
 
'''Brief explanation'''
 
- The patent application describes a system, process, and computer-readable medium for securely transferring user personal identification information (PII) across platforms.
 
- The system allows users to have greater control over when their PII is released from a secure storage in one platform and securely provided to another platform.
 
- The timing of PII releases can be controlled by specific authorizations from the user through one or more processes.
 
- The system improves security by ensuring that PII is transferred securely between platforms.
 
- The system also improves user experience by allowing controlled reuse of PII, simplifying the process of providing PII to separate processes on different platforms.
 
 
'''Abstract'''
 
A system, process, and computer-readable medium for securely transferring user personal identification information (PII) across platforms, based on specific permissions, are described. One or more aspects provide greater control, to a user, of when that user's PII may be released from a secure storage in a first platform and securely provided to a second platform. The timing of those releases of the PII may be controlled by specific authorizations from the user via one or more processes. Also, in addition to improving the security associated with the PII transferred between platforms, one or more aspects improve users' experiences by permitting controlled reuse of users' PII to simplify how users provide their PII to separate processes being performed on separate platforms.
 
  
 
===TEXT-TO-SPEECH ENRICHING SYSTEM ([[US Patent Application 18220900. TEXT-TO-SPEECH ENRICHING SYSTEM simplified abstract|18220900]])===
 
===TEXT-TO-SPEECH ENRICHING SYSTEM ([[US Patent Application 18220900. TEXT-TO-SPEECH ENRICHING SYSTEM simplified abstract|18220900]])===
Line 218: Line 125:
 
Galen Rafferty
 
Galen Rafferty
  
 
'''Brief explanation'''
 
This patent application describes a text-to-speech system that can generate audible versions of documents. Here are the key points:
 
 
* The system identifies specific portions of the document that need to be replaced with a summary when generating an audible version.
 
* It can generate summaries of the content at different levels of detail, depending on the user's request for additional information.
 
* The system then outputs the summaries in an audible format, allowing users to listen to the document instead of reading it.
 
 
'''Abstract'''
 
Disclosed herein are system, method, and computer program product embodiments for a text-to-speech system. An embodiment operates by identifying a portion of content of the document, that is to be replaced with a summary associated with the content responsive to a request for an audible version of the document. A first request for the audible version of the document is received. A first summary of the content at a first level of detail is generated. The first summary is audibly output. A second request for additional information is received. A second summary of the content at different level of detail is generated. The second summary of the content at the second level of detail is audibly output.
 
  
 
===Representing Confidence in Natural Language Processing ([[US Patent Application 18211874. Representing Confidence in Natural Language Processing simplified abstract|18211874]])===
 
===Representing Confidence in Natural Language Processing ([[US Patent Application 18211874. Representing Confidence in Natural Language Processing simplified abstract|18211874]])===
Line 236: Line 133:
 
Jeremy Goodsitt
 
Jeremy Goodsitt
  
 
'''Brief explanation'''
 
This patent application describes methods and systems for visualizing the processes of natural language processing algorithms. Here are the key points:
 
 
* The invention involves determining categories and assigning colors to each category.
 
* A natural language processing algorithm is used to process text content.
 
* Confidence values are determined for different portions of the text content, indicating the algorithm's confidence in assigning categories.
 
* Display colors are determined based on these confidence values.
 
* A user interface is displayed, showing the text content with different display colors to indicate changes in confidence across the text.
 
 
'''Abstract'''
 
Methods, systems, and computing devices for visualizing natural language processing algorithm processes are described herein. A plurality of categories may be determined. Each color of a plurality of colors may correspond to the categories. Text content may be processed using a natural language processing algorithm. Confidence values indicating, for each of a plurality of portions of the text content, a degree of confidence corresponding to one or more of the plurality of categories may be determined. Display colors may be determined based on the confidence values. A user interface comprising a visualization of the text content may be displayed, and the user interface may be configured to show each portion of the text content using a display color such that the user interface indicates changes in confidence across the plurality of characters.
 
  
 
===Payment Card With Enhanced Edge Patterns ([[US Patent Application 18222181. Payment Card With Enhanced Edge Patterns simplified abstract|18222181]])===
 
===Payment Card With Enhanced Edge Patterns ([[US Patent Application 18222181. Payment Card With Enhanced Edge Patterns simplified abstract|18222181]])===
Line 256: Line 141:
 
Timothy Dellinger
 
Timothy Dellinger
  
 
'''Brief explanation'''
 
- The patent application describes a payment card with enhanced edge patterns.
 
- The purpose of the enhanced edge design is to make the payment card more appealing to consumers and to make it stand out.
 
- The edge of the payment card can have various shapes and sizes, such as reeded or crenelated patterns.
 
- The edge of the payment card can also have dimples, chips, or other complex design patterns close to the edge.
 
- The payment card can include inclusions of other materials, such as metals, ceramic, or polymer, to fill or partially fill any voids created by the edge patterns.
 
 
'''Abstract'''
 
Aspects described herein may allow for a payment card having enhanced edge patterns. The payment card may include a complex edge morphology on the physical card that may make the payment card more likely to be used by consumers and makes the payment card stand out due to the enhanced edge design. The edge of the payment card may be reeded, crenelated, or may include various shapes of various sizes on one or more of the edge walls extending around the payment card. The edge of the payment card may also include dimples, chips, and/or other complex design patterns cut into the face of the payment card close to the edge. The payment card may also include inclusions of other materials, such as metals, ceramic, and/or polymer to be added which fill or partially fill any voids produced by the edge patterns.
 
  
 
===SYSTEMS AND METHODS FOR A MECHANICAL TRANSACTION CARD WITH PRIVACY FEATURES ([[US Patent Application 17739349. SYSTEMS AND METHODS FOR A MECHANICAL TRANSACTION CARD WITH PRIVACY FEATURES simplified abstract|17739349]])===
 
===SYSTEMS AND METHODS FOR A MECHANICAL TRANSACTION CARD WITH PRIVACY FEATURES ([[US Patent Application 17739349. SYSTEMS AND METHODS FOR A MECHANICAL TRANSACTION CARD WITH PRIVACY FEATURES simplified abstract|17739349]])===
Line 274: Line 149:
 
Bryant YEE
 
Bryant YEE
  
 
'''Brief explanation'''
 
- The patent application is for a transaction card that contains sensitive information about a user's identity and account.
 
- The card has multiple layers that hold this sensitive information.
 
- The card also has privacy features that can hide or reveal the sensitive information as needed.
 
- The purpose of the invention is to provide a secure and customizable transaction card that protects the user's privacy.
 
 
'''Abstract'''
 
A transaction card is provided. The transaction card can include one or more layers having sensitive information related to a user’s identity and account information. The transaction card can also include one or more privacy features to selectively obfuscate and reveal the sensitive information.
 
  
 
===Predictive Severity Matrix ([[US Patent Application 17661960. Predictive Severity Matrix simplified abstract|17661960]])===
 
===Predictive Severity Matrix ([[US Patent Application 17661960. Predictive Severity Matrix simplified abstract|17661960]])===
Line 291: Line 157:
 
Matthew Louis Nowak
 
Matthew Louis Nowak
  
 
'''Brief explanation'''
 
The patent application describes a method that uses machine learning models to determine the severity of potential incidents for an entity.
 
 
* Machine learning models are used to establish severity designations for potential incidents.
 
* Data from asset ownership, development operations tools, and severity matrix are compiled.
 
* The compiled data is used to determine a relationship with new metric data.
 
* Based on the determined relationship, a new entry is predicted for the severity matrix data.
 
* A notification is then generated to inform about the predicted severity designation.
 
 
'''Abstract'''
 
Aspects described herein may use machine learning models to establishing severity designations for associating with a potential occurrence of an incident of an entity. Asset ownership data, development operations tools metric data, and severity matrix data are compiled and a relationship between the compiled data and new metric data is determined. Based upon the determined relationship, a new entry to add to the severity matrix data is predicted and a notification of the same is thereafter outputted.
 
  
 
===AUTOMATED SYSTEMS FOR REDUCING COMPUTATIONAL LOADS IN THE MASS EXECUTION OF ANALYTICAL MODELS USING SCALE-OUT COMPUTING ([[US Patent Application 18196598. AUTOMATED SYSTEMS FOR REDUCING COMPUTATIONAL LOADS IN THE MASS EXECUTION OF ANALYTICAL MODELS USING SCALE-OUT COMPUTING simplified abstract|18196598]])===
 
===AUTOMATED SYSTEMS FOR REDUCING COMPUTATIONAL LOADS IN THE MASS EXECUTION OF ANALYTICAL MODELS USING SCALE-OUT COMPUTING ([[US Patent Application 18196598. AUTOMATED SYSTEMS FOR REDUCING COMPUTATIONAL LOADS IN THE MASS EXECUTION OF ANALYTICAL MODELS USING SCALE-OUT COMPUTING simplified abstract|18196598]])===
Line 311: Line 165:
 
Chandra DHANDAPANI
 
Chandra DHANDAPANI
  
 
'''Brief explanation'''
 
- The patent application describes systems and techniques for executing analytical models across multiple dimensions of data in real-time.
 
- The goal is to predict optimal decisions by analyzing client, collateral, deal structure, third party, and other relevant data.
 
- The disclosed systems and techniques aim to increase decisioning speed by reducing computational loads on decisioning systems.
 
- Advanced execution environments are used to scale-out analytical modeling computations, allowing the execution of multiple models in parallel.
 
- The execution environments are asynchronous and non-blocking, optimizing the results of the analytical models.
 
 
'''Abstract'''
 
Disclosed embodiments provide systems and techniques for mass execution of analytical models across multiple dimensions of client, collateral, deal structure, third party, and other data relevant to predicting optimal decisions in real-time. In some embodiments, disclosed systems and techniques increase decisioning speed through the reduction of computational loads on disclosed decisioning systems. Further disclosed systems and techniques may scale-out analytical modeling computations through, among other technological solutions, advanced execution environments that are asynchronous and non-blocking in nature so as to allow the execution of a plurality of analytical models in parallel and optimizing the results.
 
  
 
===TRANSITIONING INVENTORY SEARCH FROM LARGE GEOGRAPHIC AREA TO IMMEDIATE PERSONAL AREA ([[US Patent Application 18348134. TRANSITIONING INVENTORY SEARCH FROM LARGE GEOGRAPHIC AREA TO IMMEDIATE PERSONAL AREA simplified abstract|18348134]])===
 
===TRANSITIONING INVENTORY SEARCH FROM LARGE GEOGRAPHIC AREA TO IMMEDIATE PERSONAL AREA ([[US Patent Application 18348134. TRANSITIONING INVENTORY SEARCH FROM LARGE GEOGRAPHIC AREA TO IMMEDIATE PERSONAL AREA simplified abstract|18348134]])===
Line 329: Line 173:
 
Jason Hoover
 
Jason Hoover
  
 
'''Brief explanation'''
 
The patent application describes a method for improving the efficiency of an inventory management system.
 
 
* The method involves performing multiple inventory searches using different criteria and data sources.
 
* The first inventory search is performed on inventory data stored in a database using specific search criteria.
 
* Inventory data is received from a beacon sensor, which broadcasts data from multiple beacons.
 
* A second inventory search is performed by correlating the beacon data with the results of the first inventory search.
 
* Image data is received from a camera, and image classification is performed to determine class labels for inventory items within the camera's field-of-view.
 
* A third inventory search is performed by correlating the class labels with the results of the second inventory search.
 
* The results of the third inventory search are presented to a user.
 
 
'''Abstract'''
 
In one aspect, the present disclosure relates to a method for improved efficiency of an inventory management system. The method can include: performing a first inventory search of inventory data stored in a database using search criteria; receiving, from a beacon sensor, inventory data broadcast from a plurality of beacons; performing a second inventory search by correlating the inventory data broadcast from the plurality of beacons with results of the first inventory search; receiving image data from a camera; performing image classification on the image data to determine one or more class labels for an inventory item within the field-of-view of the camera; performing a third inventory search by correlating the class labels with results of the second inventory search; and presenting results of the third inventory search to a user.
 
  
 
===SYSTEM AND METHOD FOR GENERATION OF VIRTUAL ACCOUNT-LINKED CARD ([[US Patent Application 18197339. SYSTEM AND METHOD FOR GENERATION OF VIRTUAL ACCOUNT-LINKED CARD simplified abstract|18197339]])===
 
===SYSTEM AND METHOD FOR GENERATION OF VIRTUAL ACCOUNT-LINKED CARD ([[US Patent Application 18197339. SYSTEM AND METHOD FOR GENERATION OF VIRTUAL ACCOUNT-LINKED CARD simplified abstract|18197339]])===
Line 351: Line 181:
 
Joshua EDWARDS
 
Joshua EDWARDS
  
 
'''Brief explanation'''
 
- This patent application describes systems and methods for generating virtual account-linked cards.
 
- The virtual cards are generated when a physical card is forgotten and swallowed by a card reader.
 
- The virtual cards can only be used for transactions with authorized partners listed in a database.
 
- The purpose of this innovation is to provide a solution for situations where physical cards are lost or forgotten.
 
- The virtual cards serve as a temporary replacement for the physical cards.
 
- The virtual cards are restricted to ensure secure transactions with authorized partners only.
 
 
'''Abstract'''
 
Embodiments of systems and methods for generating virtual account-linked cards are described. A virtual account-linked card may be generated in response to a determination that a physical account-linked card has been forgotten at a card reader and ingested by the card reader. A virtual account-linked card may be restricted such that it can only be used to execute a transaction with authorized transaction partners identified in a database.
 
  
 
===TECHNIQUES TO PROCESS CONTACTLESS CARD FUNCTIONS IN A MULTIPLE BANKING SYSTEM ENVIRONMENT ([[US Patent Application 18221704. TECHNIQUES TO PROCESS CONTACTLESS CARD FUNCTIONS IN A MULTIPLE BANKING SYSTEM ENVIRONMENT simplified abstract|18221704]])===
 
===TECHNIQUES TO PROCESS CONTACTLESS CARD FUNCTIONS IN A MULTIPLE BANKING SYSTEM ENVIRONMENT ([[US Patent Application 18221704. TECHNIQUES TO PROCESS CONTACTLESS CARD FUNCTIONS IN A MULTIPLE BANKING SYSTEM ENVIRONMENT simplified abstract|18221704]])===
Line 370: Line 189:
 
Casey Scott BARRETT
 
Casey Scott BARRETT
  
 
'''Brief explanation'''
 
The abstract of the patent application describes a system and techniques for performing functions within a multiple banking system environment using switchboard routing.
 
 
* The patent application introduces a system that enables various functions to be performed within a multiple banking system environment.
 
* The system utilizes switchboard routing to efficiently route and manage requests and transactions between different banks.
 
* The techniques described in the patent application aim to streamline operations and improve the overall efficiency of banking systems.
 
* By implementing switchboard routing, the system can effectively handle and process a large volume of requests and transactions across multiple banks.
 
* The innovation described in the patent application provides a solution for managing complex banking operations within a multi-bank environment.
 
 
'''Abstract'''
 
A system and techniques to perform functions within a multiple banking system environment utilizing switchboard routing.
 
  
 
===SYSTEM AND METHOD FOR INSERTING DATA INTO AN INTERNET BROWSER FORM ([[US Patent Application 18102027. SYSTEM AND METHOD FOR INSERTING DATA INTO AN INTERNET BROWSER FORM simplified abstract|18102027]])===
 
===SYSTEM AND METHOD FOR INSERTING DATA INTO AN INTERNET BROWSER FORM ([[US Patent Application 18102027. SYSTEM AND METHOD FOR INSERTING DATA INTO AN INTERNET BROWSER FORM simplified abstract|18102027]])===
Line 390: Line 197:
 
Vu NGUYEN
 
Vu NGUYEN
  
 
'''Brief explanation'''
 
This patent application describes a system and method for automatically filling in payment information on web forms without user interaction. Here are the key points:
 
 
* The system identifies when a user visits a merchant's website and detects a payment form on the webpage.
 
* It then uses a payment request API to query the merchant's system for any saved payment credentials associated with the user.
 
* If the merchant's system does not have the saved payment credentials, the system checks the browser's saved payment credentials.
 
* The system generates virtual payment information based on the browser's saved credentials.
 
* This virtual payment information is then automatically inserted into the corresponding fields of the payment form, without requiring the user to enter any additional information.
 
 
'''Abstract'''
 
Systems, methods, and computer-readable storage media for inserting payment information into payment forms without user interaction. A system can identify that a user has navigated to a web page operated by a merchant computer system for a merchant and identify a payment form within the web page. The system can then execute a payment request API which generates a query for saved payment credentials for the user from the merchant computer system. When the merchant computer system indicates it does not have the saved payment credentials for the user, the system can identify browser-saved payment credentials stored in the Internet browser, then generate a virtual payment information associated with the browser-saved payment credentials. The virtual payment information can then be inserted into corresponding fields of the payment form without the user entering any additional information.
 
  
 
===SYSTEM AND METHOD FOR FACILITATING TRANSFER OF ELECTRONIC PAYMENT INFORMATION ([[US Patent Application 18142489. SYSTEM AND METHOD FOR FACILITATING TRANSFER OF ELECTRONIC PAYMENT INFORMATION simplified abstract|18142489]])===
 
===SYSTEM AND METHOD FOR FACILITATING TRANSFER OF ELECTRONIC PAYMENT INFORMATION ([[US Patent Application 18142489. SYSTEM AND METHOD FOR FACILITATING TRANSFER OF ELECTRONIC PAYMENT INFORMATION simplified abstract|18142489]])===
Line 410: Line 205:
 
Michael MOSSOBA
 
Michael MOSSOBA
  
 
'''Brief explanation'''
 
- The patent application describes a method for transferring payment account information.
 
- The method involves receiving a payment information transfer request from an account holder device associated with a first provider account.
 
- A list of payees, to whom electronic payments have been made from the first provider account, is transmitted to the account holder device for display.
 
- The account holder selects at least one payee from the list.
 
- A payment account information data file is created in a specific data format, containing payment account information for each selected payee.
 
- The payment account information data file is then transmitted to either the account holder device or an information processing system of a second account provider.
 
 
* The method simplifies the process of transferring payment account information.
 
* It allows account holders to easily select payees from a list for payment transfers.
 
* The payment account information is organized and transmitted in a predetermined data format.
 
* The method can be used with different account providers, facilitating interoperability.
 
* It improves efficiency and convenience in managing payment account information transfers.
 
 
'''Abstract'''
 
In a method for transferring payment account information, a payment information transfer request is received from an account holder device associated with a first provider account. A list of payees to which electronic payments have been made from the first provider account is transmitted to the account holder device for display to the account holder and a user selection of at least one selected payee from the list of one or more payees is received from the account holder device. A payment account information data file is assembled in a predetermined data format, the file including payment account information for each selected payee. The payment account information data file is then transmitted to at least one of the set consisting of the account holder device and an information processing system of a second account provider.
 
  
 
===SYSTEM AND METHOD FOR AUGMENTED REALITY DISPLAY OF ACCOUNT INFORMATION ([[US Patent Application 18222342. SYSTEM AND METHOD FOR AUGMENTED REALITY DISPLAY OF ACCOUNT INFORMATION simplified abstract|18222342]])===
 
===SYSTEM AND METHOD FOR AUGMENTED REALITY DISPLAY OF ACCOUNT INFORMATION ([[US Patent Application 18222342. SYSTEM AND METHOD FOR AUGMENTED REALITY DISPLAY OF ACCOUNT INFORMATION simplified abstract|18222342]])===
Line 435: Line 213:
 
Jeffrey RULE
 
Jeffrey RULE
  
 
'''Brief explanation'''
 
The patent application describes a method for displaying augmented reality images of account information on a transaction card without any visible markings.
 
 
* The method involves capturing a real-time image of the card surface and determining if the background pattern matches the pattern associated with a cardholder account.
 
* If a match is found, communication is established between the user device and the card processor on the transaction card.
 
* The user device receives an encrypted verification block from the card processor and sends an authentication request to an authentication server.
 
* If the authentication response is positive, the user device creates an augmented reality image with account information and displays it over the real-time image of the card surface.
 
 
'''Abstract'''
 
A method is provided for displaying an augmented reality image of account information associated with an indicialess transaction card having a card surface with a background pattern applied thereto. A real-time image of the card surface is captured and processed to determine if the background pattern matches a card background pattern associated with a cardholder account. Responsive to a positive determination, communication is established between the user device processor and a card processor carried by the indicialess transaction card. The user device processor receives from the card processor an encrypted verification block and transmits, to an authentication server, an authentication request including the verification block. Responsive to receiving a positive authentication response, the user device constructs an augmented reality image comprising account indicia and displays the augmented reality image superimposed over the real-time image of the background pattern on the card surface of the indicialess transaction card.
 
  
 
===ACCURATE IMAGES IN GRAPHICAL USER INTERFACES TO ENABLE DATA TRANSFER ([[US Patent Application 18224668. ACCURATE IMAGES IN GRAPHICAL USER INTERFACES TO ENABLE DATA TRANSFER simplified abstract|18224668]])===
 
===ACCURATE IMAGES IN GRAPHICAL USER INTERFACES TO ENABLE DATA TRANSFER ([[US Patent Application 18224668. ACCURATE IMAGES IN GRAPHICAL USER INTERFACES TO ENABLE DATA TRANSFER simplified abstract|18224668]])===
Line 454: Line 221:
 
Jeffrey RULE
 
Jeffrey RULE
  
 
'''Brief explanation'''
 
This patent application describes a system, methods, and computer-readable media for providing accurate images of cards.
 
* The application is executed on a mobile device and receives authentication credentials for an account.
 
* It determines the card associated with the account and the card manufacturer identifier (CMID) of the card.
 
* The application receives metadata attributes and images of the card from a digital asset management system based on the CMID.
 
* Based on the metadata attributes and attributes of the mobile device, the application determines the card's orientation for near-field communication (NFC) data transfer.
 
* The application selects an image of the card and generates a graphical user interface (GUI) with the image.
 
* The GUI includes an indication to tap the card to the mobile device according to the determined orientation.
 
 
'''Abstract'''
 
Systems, methods, and computer-readable media for providing accurate images of cards. An application executing on a mobile device may receive authentication credentials for an account, determine a card associated with the account, and determine a card manufacturer identifier (CMID) of the card. The application may receive, from a digital asset management system based on the CMID, a plurality of metadata attributes of the card and one or more images of the card. The application may determine, based on the metadata attributes and attributes of the mobile device, a first orientation of the card to enable near-field communication (NFC) data transfer between the card and the mobile device. The application may select a first image of the card. The application may generate a graphical user interface (GUI) including the first image and an indication specifying to tap the card to the mobile device according to the first orientation.
 
  
 
===METHODS AND SYSTEMS FOR PROVIDING INFORMATION ABOUT A LOCATION WITH IMAGE ANALYSIS ([[US Patent Application 18221636. METHODS AND SYSTEMS FOR PROVIDING INFORMATION ABOUT A LOCATION WITH IMAGE ANALYSIS simplified abstract|18221636]])===
 
===METHODS AND SYSTEMS FOR PROVIDING INFORMATION ABOUT A LOCATION WITH IMAGE ANALYSIS ([[US Patent Application 18221636. METHODS AND SYSTEMS FOR PROVIDING INFORMATION ABOUT A LOCATION WITH IMAGE ANALYSIS simplified abstract|18221636]])===
Line 474: Line 229:
 
Abdelkader M'Hamed BENKREIRA
 
Abdelkader M'Hamed BENKREIRA
  
 
'''Brief explanation'''
 
This patent application describes a system and method for providing information about a location using image analysis.
 
 
* The method involves retrieving location information and receiving a digital image of a location captured by a user's device.
 
* The digital image is then analyzed to detect an identification feature, which helps determine the identity of the location.
 
* The capture time of day of the digital image is identified, and a median rate of traffic at that time is determined for the location.
 
* Information is calculated based on the median rate of traffic, specifically related to how crowded the location is at the captured time of day.
 
* Finally, this information is provided to the user through a display on their device.
 
 
'''Abstract'''
 
Systems and method for providing information about a location with image analysis are described herein. The method can include: retrieving, from a user's device, location information, receiving a digital image of an location captured by a digital camera connected to the user's device, analyzing the digital image to detect an identification feature, determining an identify of the location based on the location information and the identification feature, identifying a capture time of day at which the digital image was captured, determining a median rate of traffic at the establish at the identified capture time of day, calculating information based on the median rate of traffic at the capture time of day, the information related to how crowded the location is at the captured time of day, and providing, by a display on the user's device, the information.
 
  
 
===UTILIZING MACHINE LEARNING TO GENERATE VEHICLE INFORMATION FOR A VEHICLE CAPTURED BY A USER DEVICE IN A VEHICLE LOT ([[US Patent Application 18313504. UTILIZING MACHINE LEARNING TO GENERATE VEHICLE INFORMATION FOR A VEHICLE CAPTURED BY A USER DEVICE IN A VEHICLE LOT simplified abstract|18313504]])===
 
===UTILIZING MACHINE LEARNING TO GENERATE VEHICLE INFORMATION FOR A VEHICLE CAPTURED BY A USER DEVICE IN A VEHICLE LOT ([[US Patent Application 18313504. UTILIZING MACHINE LEARNING TO GENERATE VEHICLE INFORMATION FOR A VEHICLE CAPTURED BY A USER DEVICE IN A VEHICLE LOT simplified abstract|18313504]])===
Line 494: Line 237:
 
Sasi Kumar UNNIKRISHNAN
 
Sasi Kumar UNNIKRISHNAN
  
 
'''Brief explanation'''
 
The patent application describes a device that receives vehicle data from a dealership and user data from a user device. It then compares the data to determine specific vehicle information and processes it with user profile data to determine purchase options for the user and the specific vehicle. The device then provides this information to the user device for display.
 
 
* Device receives vehicle data and user data from a user device
 
* Compares the data to determine specific vehicle information
 
* Processes the vehicle data and user profile data to determine purchase options
 
* Provides the specific vehicle data and purchase options to the user device for display
 
 
'''Abstract'''
 
A device receives vehicle data associated with vehicles located at a vehicle dealership lot, and receives, from a user device, profile data identifying a user of the user device and data identifying a particular vehicle of the vehicles. The device compares the data identifying the particular vehicle and the vehicle data to determine particular vehicle data associated with the particular vehicle, and processes the particular vehicle data and the profile data of the user, with a first model, to determine purchase options for the particular vehicle and the user. The device provides, to the user device, the particular vehicle data and the purchase options for the particular vehicle to cause the user device to display the particular vehicle data and the purchase options for the particular vehicle.
 
  
 
===AUGMENTED REALITY VEHICLE DISPLAY SYSTEMS ([[US Patent Application 18118888. AUGMENTED REALITY VEHICLE DISPLAY SYSTEMS simplified abstract|18118888]])===
 
===AUGMENTED REALITY VEHICLE DISPLAY SYSTEMS ([[US Patent Application 18118888. AUGMENTED REALITY VEHICLE DISPLAY SYSTEMS simplified abstract|18118888]])===
Line 513: Line 245:
 
Michael Anthony Young, JR.
 
Michael Anthony Young, JR.
  
 
'''Brief explanation'''
 
This patent application describes a system for displaying augmented reality content related to selected vehicle models, along with price or budget information, to help users make purchasing or financing decisions.
 
 
* The system uses physical anchors attached to a vehicle to determine its location.
 
* Augmented reality content items, such as vehicle features, are associated with the selected vehicle model.
 
* The system displays the augmented reality content items in relation to the vehicle based on the location of the physical anchors.
 
* The displayed content also includes the price associated with the selected vehicle model.
 
* The goal is to provide users with a visual representation of the vehicle and its features, along with pricing information, to aid in decision-making.
 
 
'''Abstract'''
 
Aspects described herein may allow displaying of augmented reality content items associated with selected vehicle models, as well as price or budget information associated with the displayed vehicle to facilitate the user to make purchasing or financing decisions. For example, a computing device may detect a plurality of physical anchors attached to a vehicle husk and determine location information for each of the plurality of physical anchors. The computing device may receive one or more augmented reality (AR) content items corresponding to one or more vehicle features for the selected vehicle model and display via an AR interface, the one or more AR content items positioned relative to the vehicle husk based on the location of each of the plurality of physical anchors, as well as a price associated with the selected vehicle model having the one or more vehicle features.
 
  
 
===SYSTEMS AND METHODS FOR VISUAL VERIFICATION ([[US Patent Application 18350871. SYSTEMS AND METHODS FOR VISUAL VERIFICATION simplified abstract|18350871]])===
 
===SYSTEMS AND METHODS FOR VISUAL VERIFICATION ([[US Patent Application 18350871. SYSTEMS AND METHODS FOR VISUAL VERIFICATION simplified abstract|18350871]])===
Line 533: Line 253:
 
Kevin Osborn
 
Kevin Osborn
  
 
'''Brief explanation'''
 
The patent application describes a system that uses a document holder and an image sensor to capture multiple images of a document.
 
* The system includes a polarized filter that can be rotated by a filter motor.
 
* The captured images correspond to different orientations of the polarized filter in relation to the document.
 
* The system uses one or more processors to control the filter motor and image sensors.
 
* The processors analyze the captured images to identify a specific feature of the document.
 
* The system compares the visual characteristics of the identified feature to expected visual characteristics for that feature.
 
* Based on this comparison, the system provides an indication of whether the document is verified or not.
 
 
'''Abstract'''
 
A system comprising: a document holder; an image sensor directed toward the document holder; a polarized filter between the image sensor and the document holder; a filter motor configured to rotate the polarized filter; one or more processors; and at least one memory having stored thereon computer program code that, when executed by the one or more processors, instructs the one or more processors to: control the filter motor to rotate the polarized filter; control the image sensors to capture a plurality of images of a document within the document holder, the plurality of images corresponding to a respective relative orientations of the polarized filter to the document; identify a feature of the document; and output, in response comparing respective visual characteristics of the feature of the document to corresponding expected visual characteristics of the first feature for the document, an indication of a verification of the document.
 
  
 
===SYSTEMS AND METHODS FOR TOKEN AUTHENTICATION ([[US Patent Application 17735892. SYSTEMS AND METHODS FOR TOKEN AUTHENTICATION simplified abstract|17735892]])===
 
===SYSTEMS AND METHODS FOR TOKEN AUTHENTICATION ([[US Patent Application 17735892. SYSTEMS AND METHODS FOR TOKEN AUTHENTICATION simplified abstract|17735892]])===
Line 553: Line 261:
 
Kevin OSBORN
 
Kevin OSBORN
  
 
'''Brief explanation'''
 
The patent application describes an authentication system that uses tokens with tailored-wavelength-range coded patterns or steganographic images for authentication purposes.
 
 
* The system processes tokens that incorporate invisible-ink-printed patterns in different tailored wavelength ranges within the infrared light spectrum.
 
* Tokens may also include steganographic images where invisible-ink-printed patterns are interweaved within the images.
 
* Visible-ink-printed patterns and invisible-ink-printed patterns can be printed together, with the invisible-ink patterns corresponding to authentication codes or other data.
 
* The system aims to provide secure token authentication using these unique patterns and codes.
 
 
'''Abstract'''
 
In some embodiments, an authentication system may be configured to process one or more tokens that incorporates one or more tailored-wavelength-range coded patterns, codes represented within a steganographic image, or “overlapping” codes. As an example, such a token may include (i) one or more invisible-ink-printed patterns printed using infrared ink corresponding to different tailored wavelength ranges within the infrared light spectrum, (ii) one or more steganographic images in which invisible-ink-printed patterns are interweaved within the steganographic images, (iii) visible-ink-printed patterns and invisible-ink-printed patterns printed substantially within the visible ink portions of the visible-ink-printed patterns, or (iv) other features, where the invisible-ink-printed patterns correspond to one or more authentication codes or other data for token authentication.
 
  
 
===SYSTEMS AND METHODS FOR TOKEN AUTHENTICATION ([[US Patent Application 17735917. SYSTEMS AND METHODS FOR TOKEN AUTHENTICATION simplified abstract|17735917]])===
 
===SYSTEMS AND METHODS FOR TOKEN AUTHENTICATION ([[US Patent Application 17735917. SYSTEMS AND METHODS FOR TOKEN AUTHENTICATION simplified abstract|17735917]])===
Line 572: Line 269:
 
Kevin OSBORN
 
Kevin OSBORN
  
 
'''Brief explanation'''
 
The patent application describes an authentication system that processes tokens with various coded patterns for authentication purposes.
 
* The tokens may include invisible-ink-printed patterns in different tailored wavelength ranges within the infrared light spectrum.
 
* The tokens may also incorporate invisible-ink-printed patterns interweaved within steganographic images.
 
* Visible-ink-printed patterns and invisible-ink-printed patterns may be printed together within the visible ink portions of the visible-ink-printed patterns.
 
* The invisible-ink-printed patterns correspond to authentication codes or other data for token authentication.
 
 
'''Abstract'''
 
In some embodiments, an authentication system may be configured to process one or more tokens that incorporates one or more tailored-wavelength-range coded patterns, codes represented within a steganographic image, or “overlapping” codes. As an example, such a token may include (i) one or more invisible-ink-printed patterns printed using infrared ink corresponding to different tailored wavelength ranges within the infrared light spectrum, (ii) one or more steganographic images in which invisible-ink-printed patterns are interweaved within the steganographic images, (iii) visible-ink-printed patterns and invisible-ink-printed patterns printed substantially within the visible ink portions of the visible-ink-printed patterns, or (iv) other features, where the invisible-ink-printed patterns correspond to one or more authentication codes or other data for token authentication.
 
  
 
===TCP/IP SOCKET RESILIENCY AND HEALTH MANAGEMENT ([[US Patent Application 18339691. TCP/IP SOCKET RESILIENCY AND HEALTH MANAGEMENT simplified abstract|18339691]])===
 
===TCP/IP SOCKET RESILIENCY AND HEALTH MANAGEMENT ([[US Patent Application 18339691. TCP/IP SOCKET RESILIENCY AND HEALTH MANAGEMENT simplified abstract|18339691]])===
Line 590: Line 277:
 
Sheo Raj SINHA
 
Sheo Raj SINHA
  
 
'''Brief explanation'''
 
- This patent application describes a system, method, and apparatus for account inheritance.
 
- The method involves receiving data information from multiple authorization gateways via an application programming interface (API).
 
- The overall health of each authorization gateway is calculated based on a weight assigned to each server and the corresponding service level value.
 
- Load balancing is performed by routing client request messages to a set of authorization gateways that have an overall health above a specific threshold value.
 
- The goal is to efficiently distribute the workload among the authorization gateways to ensure optimal performance and reliability.
 
 
'''Abstract'''
 
Disclosed herein are system, method, and apparatus for account inheritance. The method performed at an application server includes receiving, via an application programming interface (API), data information received by each authorization gateway of a plurality of authorization gateways. The method includes performing calculation of an overall health of each authorization gateway of the plurality of authorization gateways based on a predetermined value of a weight assigned to each server of the plurality of servers and the value of service level corresponding to each server of the plurality of servers. The method includes balancing load of each authorization gateway of the plurality of authorization gateways by routing at least one client request message to a set of one or more authorization gateways of the plurality of authorization gateways based on the calculated overall health of each authorization gateway of the plurality of authorization gateways that is above a specific threshold value.
 
  
 
===VIRTUAL-ASSISTANT-BASED RESOLUTION OF USER INQUIRIES VIA FAILURE-TRIGGERED DOCUMENT PRESENTATION ([[US Patent Application 18347367. VIRTUAL-ASSISTANT-BASED RESOLUTION OF USER INQUIRIES VIA FAILURE-TRIGGERED DOCUMENT PRESENTATION simplified abstract|18347367]])===
 
===VIRTUAL-ASSISTANT-BASED RESOLUTION OF USER INQUIRIES VIA FAILURE-TRIGGERED DOCUMENT PRESENTATION ([[US Patent Application 18347367. VIRTUAL-ASSISTANT-BASED RESOLUTION OF USER INQUIRIES VIA FAILURE-TRIGGERED DOCUMENT PRESENTATION simplified abstract|18347367]])===
Line 608: Line 285:
 
Anh TRUONG
 
Anh TRUONG
  
 
'''Brief explanation'''
 
This patent application describes a system for resolving user inquiries using documents. Here are the key points:
 
 
* The system predicts the intent of a user based on their chat activity.
 
* It provides a response to the user inquiry based on the predicted intent.
 
* If the user indicates that the response did not resolve their inquiry, the system obtains a document related to the predicted intent.
 
* The document is presented to the user through the chat interface to confirm its relevance to their inquiry.
 
 
'''Abstract'''
 
In certain embodiments, document-based resolution of user inquiries may be facilitated. A predicted intent of the user is determined based on chat activity information associated with the user. A response to a user inquiry may be provided to the user via a chat interface based on the predicted intent. User response may be obtained for the response, which may indicate a failure in providing a resolution to the user (e.g., regarding a user inquiry). Upon detecting a failure in providing the resolution, a document associated with the user and matching the predicted intent may be obtained and presented to via the chat interface. The document may have content related to the predicted intent. The document may be presented as a response to the user response to seek a confirmation from the user regarding its relevance to the user inquiry.
 
  
 
===Secure Data Exchange Using Format-Preserving Encryption ([[US Patent Application 17661773. Secure Data Exchange Using Format-Preserving Encryption simplified abstract|17661773]])===
 
===Secure Data Exchange Using Format-Preserving Encryption ([[US Patent Application 17661773. Secure Data Exchange Using Format-Preserving Encryption simplified abstract|17661773]])===
Line 627: Line 293:
 
Hao Cheng
 
Hao Cheng
  
 
'''Brief explanation'''
 
The patent application describes methods and systems for tokenizing data to create a secure token.
 
* Tokenizing data means converting it into a secure token that is limited in scope and time.
 
* The secure token is directed to a specific recipient and is valid only for a specified period.
 
* The invention includes a detokenization process to recover encrypted data from the secure token.
 
* The detokenization process does not require any relational database lookup, reducing cost.
 
* The system ensures robust protection against unintended recipients trying to access the encrypted data.
 
 
'''Abstract'''
 
Methods and systems disclosed herein describe tokenizing data to generate a secure token that is limited in scope (e.g., directed to a specific recipient) and limited in time (e.g., valid for only a specified period of time). A detokenization process may be employed to recover encrypted data of the secure token without the need for any relational database lookup processes, thereby reducing cost while maintaining robust protection against unintended recipients that attempt to recover the encrypted data.
 
  
 
===Aggregating Permissions Across Multiple Platforms with Co-Signers ([[US Patent Application 17661839. Aggregating Permissions Across Multiple Platforms with Co-Signers simplified abstract|17661839]])===
 
===Aggregating Permissions Across Multiple Platforms with Co-Signers ([[US Patent Application 17661839. Aggregating Permissions Across Multiple Platforms with Co-Signers simplified abstract|17661839]])===
Line 646: Line 301:
 
Brad Norcross
 
Brad Norcross
  
 
'''Brief explanation'''
 
- The patent application describes a system, process, and computer-readable medium for securely transferring user personal identification information (PII) across platforms.
 
- The system allows users to have greater control over when their PII is released from a secure storage in one platform and securely provided to another platform.
 
- The timing of the PII releases can be controlled by specific authorizations from the user through one or more processes.
 
- The system improves security by ensuring that PII is transferred securely between platforms.
 
- The system also improves user experience by allowing controlled reuse of PII, making it easier for users to provide their information to separate processes on different platforms.
 
 
'''Abstract'''
 
A system, process, and computer-readable medium for securely transferring user personal identification information (PII) across platforms, based on specific permissions, are described. One or more aspects provide greater control, to a user, of when that user's PII may be released from a secure storage in a first platform and securely provided to a second platform. The timing of those releases of the PII may be controlled by specific authorizations from the user via one or more processes. Also, in addition to improving the security associated with the PII transferred between platforms, one or more aspects improve users' experiences by permitting controlled reuse of users' PII to simplify how users provide their PII to separate processes being performed on separate platforms.
 
  
 
===ASSISTED THIRD-PARTY PASSWORD AUTHENTICATION ([[US Patent Application 18223105. ASSISTED THIRD-PARTY PASSWORD AUTHENTICATION simplified abstract|18223105]])===
 
===ASSISTED THIRD-PARTY PASSWORD AUTHENTICATION ([[US Patent Application 18223105. ASSISTED THIRD-PARTY PASSWORD AUTHENTICATION simplified abstract|18223105]])===
Line 664: Line 309:
 
David BENKO
 
David BENKO
  
 
'''Brief explanation'''
 
The patent application describes a system, method, and apparatus for assisted third-party password authentication.
 
* The method involves creating a secure connection between a first application and an authorization server on a client device.
 
* An inline frame associated with the first application identifies user authorization credential inputs and sends them to the authorization server.
 
* The authorization server responds by sending an authorization code back to the inline frame, which then redirects it to the first application.
 
* The client device then transmits the authorization code to the authorization server to receive an access token for accessing a second application.
 
 
'''Abstract'''
 
Disclosed herein are system, method, and apparatus for assisted third-party password authentication. The method performed at a client device includes creating a secure connection from an inline frame associated with a first application on the client device to an authorization server for accessing a second application. The method includes identifying, by the inline frame, one or more events that represent inputs for a user authorization credential, and proxying, by the inline frame, the identified one or more events to the authorization server using the secure connection. The method includes receiving an authorization code from the authorization server in response to the proxying. The method includes redirecting, by the inline frame, the authorization code to the application on the client device. The method includes transmitting, from the client device to the authorization server, the authorization code to receive an access token for accessing the second application.
 
  
 
===SYSTEM AND METHOD FOR ENABLING MULTIPLE AUXILIARY USE OF AN ACCESS TOKEN OF A USER BY ANOTHER ENTITY TO FACILITATE AN ACTION OF THE USER ([[US Patent Application 18322535. SYSTEM AND METHOD FOR ENABLING MULTIPLE AUXILIARY USE OF AN ACCESS TOKEN OF A USER BY ANOTHER ENTITY TO FACILITATE AN ACTION OF THE USER simplified abstract|18322535]])===
 
===SYSTEM AND METHOD FOR ENABLING MULTIPLE AUXILIARY USE OF AN ACCESS TOKEN OF A USER BY ANOTHER ENTITY TO FACILITATE AN ACTION OF THE USER ([[US Patent Application 18322535. SYSTEM AND METHOD FOR ENABLING MULTIPLE AUXILIARY USE OF AN ACCESS TOKEN OF A USER BY ANOTHER ENTITY TO FACILITATE AN ACTION OF THE USER simplified abstract|18322535]])===
Line 682: Line 317:
 
Lawrence DOUGLAS
 
Lawrence DOUGLAS
  
 
'''Brief explanation'''
 
The patent application describes a computing system that allows users to request actions with an entity and configure a token for use by both the user and the entity. The token is configured with a resource amount as a usage threshold.
 
 
* The computing system receives a user's request for an action with an entity.
 
* The system configures a token for the user and entity, adding the entity as an approved entity.
 
* The token is set with a usage threshold based on the resource amount of the requested action.
 
* The system receives a request from the entity to use the token.
 
* The system checks if granting the entity's request would exceed the usage threshold of the token.
 
* If the request does not exceed the threshold, the system grants the entity's request to use the token.
 
 
'''Abstract'''
 
A computing system may receive a request of the user for a first action of the user with an entity. In connection with granting the request of the user, the computing system may configure a token for use by the user and the entity such that (i) the entity is added as an approved entity, and (ii) the token is configured with a resource amount of the first action as a usage threshold of the token. The computing system may receive a request of the entity to use the token. The computing system may determine whether granting the request of the entity would cumulatively exceed the usage threshold of the token. Based on a determination that granting the request of the entity would not cumulatively exceed the resource usage of the token, the computing system may grant the request of the entity to use the token.
 
  
 
===SYSTEMS AND METHODS FOR DETECTING AND/OR PREVENTING VISHING ATTACKS USING USER-GENERATED AUTHENTICATION INFORMATION ([[US Patent Application 17661776. SYSTEMS AND METHODS FOR DETECTING AND/OR PREVENTING VISHING ATTACKS USING USER-GENERATED AUTHENTICATION INFORMATION simplified abstract|17661776]])===
 
===SYSTEMS AND METHODS FOR DETECTING AND/OR PREVENTING VISHING ATTACKS USING USER-GENERATED AUTHENTICATION INFORMATION ([[US Patent Application 17661776. SYSTEMS AND METHODS FOR DETECTING AND/OR PREVENTING VISHING ATTACKS USING USER-GENERATED AUTHENTICATION INFORMATION simplified abstract|17661776]])===
Line 702: Line 324:
  
 
Jennifer KWOK
 
Jennifer KWOK
 
 
'''Brief explanation'''
 
The abstract describes a computer-implemented method for authenticating the source of a telephone call to the recipient of the call. Here are the key points:
 
 
* The method involves receiving a request to input first authentication information before receiving the telephone call.
 
* The first authentication information can be a passcode or a selection of a security question.
 
* The user device sends the first authentication information to a computing device associated with the source of the call.
 
* The telephone call is received from the source, and the recipient answers the call.
 
* The computing device sends second authentication information, which can be the passcode or an answer to the security question.
 
* The second authentication information is outputted.
 
 
Overall, this method aims to provide a secure way to authenticate the source of a telephone call before the recipient answers it, using a combination of first and second authentication information.
 
 
'''Abstract'''
 
A computer-implemented method for authenticating a source of a telephone call to a recipient of the telephone call may include receiving, prior to receiving the telephone call, a request to input first authentication information. The first authentication information may include a passcode or a selection of a security question. The method may include receiving input of the first authentication information and sending, by the user device, the first authentication information to a computing device associated with the source of the telephone call. The method may include receiving the telephone call from the source and receiving input from the recipient of the telephone call to answer the telephone call. The method may include receiving second authentication information from the computing device, where the second authentication information may include the passcode or an answer to the security question. The method may include outputting the second authentication information.
 

Latest revision as of 03:55, 4 December 2023

Summary of the patent applications from Capital One Services, LLC on November 9th, 2023

Capital One Services, LLC has recently filed several patents related to authentication methods, computing systems, and document processing. These patents aim to provide secure and efficient ways to authenticate telephone calls, request actions with entities, transfer personal identification information (PII), tokenize data, resolve user inquiries using documents, perform account inheritance, and authenticate tokens using coded patterns.

In terms of authentication methods, Capital One has filed patents for authenticating the source of a telephone call before the recipient answers it. This involves the use of first and second authentication information, such as passcodes or security questions. They have also developed a system for assisted third-party password authentication, which establishes a secure connection between applications and an authorization server to obtain access tokens.

In the realm of computing systems, Capital One has filed patents for a system that allows users to request actions with entities and configure tokens with usage thresholds. This ensures that the requested actions do not exceed the allocated resources. They have also developed a system for securely transferring user PII across platforms, giving users control over when their information is released and improving security during the transfer process.

Capital One's patents also cover tokenization methods, where data is converted into secure tokens with limited scope and time. These tokens can be directed to specific recipients and have a detokenization process to recover encrypted data without the need for relational database lookup. This ensures robust protection against unintended recipients accessing the data.

In terms of document processing, Capital One has developed a system that predicts user intent based on chat activity and provides relevant responses. If the response does not resolve the inquiry, the system retrieves related documents for confirmation. They have also filed a patent for a system that captures multiple images of a document using a polarized filter and analyzes them to verify the document's authenticity.

Summary of recent patents filed by Capital One Services, LLC:

  • Authentication methods for telephone calls and third-party password authentication.
  • Computing systems for requesting actions with entities, securely transferring PII, and tokenizing data.
  • Document processing systems for resolving user inquiries and verifying document authenticity.

Notable applications:

  • Secure authentication of telephone calls before the recipient answers.
  • Assisted third-party password authentication.
  • Secure transfer of user PII across platforms.
  • Tokenization methods for data protection.
  • Document processing for resolving user inquiries and verifying document authenticity.



Contents

Patent applications for Capital One Services, LLC on November 9th, 2023

SYSTEMS AND METHODS FOR TOKEN AUTHENTICATION (17735967)

Main Inventor

Kevin OSBORN


USING A VIRTUAL KEYBOARD TO ENTER PARTICULAR INPUT (17662186)

Main Inventor

Joshua EDWARDS


LEARNING-AUGMENTED APPLICATION DEPLOYMENT PIPELINE (17739707)

Main Inventor

Roli Agrawal


SYSTEM AND METHOD FOR ACCESS MANAGEMENT FOR APPLICATIONS (18221458)

Main Inventor

Ron MECK


METHODS AND SYSTEMS FOR CONNECTING DATA WITH NON-STANDARDIZED SCHEMAS IN CONNECTED GRAPH DATA EXCHANGES (17735989)

Main Inventor

Gaurav SINGH


METHODS AND SYSTEMS FOR PROVIDING AN AUGMENTED REALITY INTERFACE FOR SAVING INFORMATION FOR RECOGNIZED OBJECTS (18138824)

Main Inventor

Staevan DUCKWORTH


PROCESSING AN INPUT STREAM OF A USER DEVICE TO FACILITATE SECURITY ASSOCIATED WITH AN ACCOUNT OF A USER OF THE USER DEVICE (17662181)

Main Inventor

Joshua EDWARDS


TECHNIQUES FOR MULTI-VOICE SPEECH RECOGNITION COMMANDS (18197318)

Main Inventor

Paul HURLOCKER


METHODS AND SYSTEMS FOR FACILITATING SECURE AUTHENTICATION OF USER BASED ON KNOWN DATA (18353042)

Main Inventor

Austin WALTERS


SYSTEM AND APPARATUS FOR SECURE PASSWORD RECOVERY AND IDENTITY VERIFICATION (18130290)

Main Inventor

Kate KEY


Aggregating Permissions Across Multiple Platforms (17661823)

Main Inventor

Brad Norcross


TEXT-TO-SPEECH ENRICHING SYSTEM (18220900)

Main Inventor

Galen Rafferty


Representing Confidence in Natural Language Processing (18211874)

Main Inventor

Jeremy Goodsitt


Payment Card With Enhanced Edge Patterns (18222181)

Main Inventor

Timothy Dellinger


SYSTEMS AND METHODS FOR A MECHANICAL TRANSACTION CARD WITH PRIVACY FEATURES (17739349)

Main Inventor

Bryant YEE


Predictive Severity Matrix (17661960)

Main Inventor

Matthew Louis Nowak


AUTOMATED SYSTEMS FOR REDUCING COMPUTATIONAL LOADS IN THE MASS EXECUTION OF ANALYTICAL MODELS USING SCALE-OUT COMPUTING (18196598)

Main Inventor

Chandra DHANDAPANI


TRANSITIONING INVENTORY SEARCH FROM LARGE GEOGRAPHIC AREA TO IMMEDIATE PERSONAL AREA (18348134)

Main Inventor

Jason Hoover


SYSTEM AND METHOD FOR GENERATION OF VIRTUAL ACCOUNT-LINKED CARD (18197339)

Main Inventor

Joshua EDWARDS


TECHNIQUES TO PROCESS CONTACTLESS CARD FUNCTIONS IN A MULTIPLE BANKING SYSTEM ENVIRONMENT (18221704)

Main Inventor

Casey Scott BARRETT


SYSTEM AND METHOD FOR INSERTING DATA INTO AN INTERNET BROWSER FORM (18102027)

Main Inventor

Vu NGUYEN


SYSTEM AND METHOD FOR FACILITATING TRANSFER OF ELECTRONIC PAYMENT INFORMATION (18142489)

Main Inventor

Michael MOSSOBA


SYSTEM AND METHOD FOR AUGMENTED REALITY DISPLAY OF ACCOUNT INFORMATION (18222342)

Main Inventor

Jeffrey RULE


ACCURATE IMAGES IN GRAPHICAL USER INTERFACES TO ENABLE DATA TRANSFER (18224668)

Main Inventor

Jeffrey RULE


METHODS AND SYSTEMS FOR PROVIDING INFORMATION ABOUT A LOCATION WITH IMAGE ANALYSIS (18221636)

Main Inventor

Abdelkader M'Hamed BENKREIRA


UTILIZING MACHINE LEARNING TO GENERATE VEHICLE INFORMATION FOR A VEHICLE CAPTURED BY A USER DEVICE IN A VEHICLE LOT (18313504)

Main Inventor

Sasi Kumar UNNIKRISHNAN


AUGMENTED REALITY VEHICLE DISPLAY SYSTEMS (18118888)

Main Inventor

Michael Anthony Young, JR.


SYSTEMS AND METHODS FOR VISUAL VERIFICATION (18350871)

Main Inventor

Kevin Osborn


SYSTEMS AND METHODS FOR TOKEN AUTHENTICATION (17735892)

Main Inventor

Kevin OSBORN


SYSTEMS AND METHODS FOR TOKEN AUTHENTICATION (17735917)

Main Inventor

Kevin OSBORN


TCP/IP SOCKET RESILIENCY AND HEALTH MANAGEMENT (18339691)

Main Inventor

Sheo Raj SINHA


VIRTUAL-ASSISTANT-BASED RESOLUTION OF USER INQUIRIES VIA FAILURE-TRIGGERED DOCUMENT PRESENTATION (18347367)

Main Inventor

Anh TRUONG


Secure Data Exchange Using Format-Preserving Encryption (17661773)

Main Inventor

Hao Cheng


Aggregating Permissions Across Multiple Platforms with Co-Signers (17661839)

Main Inventor

Brad Norcross


ASSISTED THIRD-PARTY PASSWORD AUTHENTICATION (18223105)

Main Inventor

David BENKO


SYSTEM AND METHOD FOR ENABLING MULTIPLE AUXILIARY USE OF AN ACCESS TOKEN OF A USER BY ANOTHER ENTITY TO FACILITATE AN ACTION OF THE USER (18322535)

Main Inventor

Lawrence DOUGLAS


SYSTEMS AND METHODS FOR DETECTING AND/OR PREVENTING VISHING ATTACKS USING USER-GENERATED AUTHENTICATION INFORMATION (17661776)

Main Inventor

Jennifer KWOK