Patents by Inventor Dwipam Katariya

Dwipam Katariya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240070295
    Abstract: Disclosed embodiments pertain to protecting sensitive information. A browser extension associated with a web browser can detect a user entering information associated with the user into an electronic form. The browser extension can monitor the user entering sensitive information into the electronic form and detect that the user has entered sensitive information incorrectly. In response, the browser extension can provide a warning to the user that sensitive information has been incorrectly entered. Instructions can be displayed to a user on how incorrectly entered sensitive information is to be corrected. The incorrectly entered sensitive information is corrected based on a response from the user before the sensitive information propagates beyond the electronic form.
    Type: Application
    Filed: August 23, 2022
    Publication date: February 29, 2024
    Inventors: Jennifer Kwok, Max Miracolo, Salik Shah, Erin Babinsky, John Martin, Nima Chitsazan, Mia Rodriguez, Andrea Montealegre, Seth Wilton Cottle, Ignacio Espino, Zviad Aznaurashvili, Dwipam Katariya, Gaurang J. Bhatt
  • Publication number: 20240061952
    Abstract: Disclosed embodiments pertain to identifying sensitive data using redacted data. Data entry into electronic form fields can be monitored and analyzed to detect improperly entered sensitive data. The type of sensitive data can be determined, and the sensitive data can be removed or redacted from the electronic form field. Surrounding context data, including text associated with the sensitive data, can be identified and captured. The context data and type of sensitive data can be utilized to train or update a machine learning model configured to identify sensitive data. In one instance, the machine learning model can be employed to detect improperly entered sensitive data, and context and type can be utilized to improve the performance and predictive power of the machine learning model.
    Type: Application
    Filed: August 22, 2022
    Publication date: February 22, 2024
    Inventors: Jennifer Kwok, John Martin, James Crews, Erin Babinsky, Shannon Yogerst, Ignacio Espino, Dwipam Katariya, Mia Rodriguez, Nima Chitsazan, Max Miracolo
  • Publication number: 20240061845
    Abstract: In some implementations, a system may receive interaction data associated with interactions between a user and subsets of a plurality of interaction parties. The system may store the interaction data and the as historical interaction data associated with historical interactions of the user. The system may provide the historical interaction data as input to a machine learning model, which may be trained using supervised learning and the historical interactions of the user or historical interactions of one or more other users with one or more of the plurality of interaction parties. The system may receive an output, based on applying the machine learning model to the historical interaction data, that may indicate one or more recommended interaction parties based at least in part on one or more factors, wherein the one or more recommended parties may be local entities local to a geographic location associated with the user.
    Type: Application
    Filed: August 16, 2022
    Publication date: February 22, 2024
    Inventors: Dwipam KATARIYA, Muhammad UDDIN, Tania CRUZ MORALES, Julian DUQUE, Kimberly STOCKLEY
  • Publication number: 20230169345
    Abstract: A method includes segmenting updates associated with a record into a set of update subsets and generating first and second vectors based on first and second update subsets using a first neural network. The first update subset is associated with a first session and a timestamp, and the second update subset is associated with a second session. The method includes determining a first output using a second neural network based on the first and second vectors and a time difference between the first and second sessions. The method includes selecting a segment of a periodic time interval based on the timestamp, determining a second output using a third neural network based on a ratio based on the segment and the periodic time interval, and generating a characterizing vector using a fourth neural network based on the first and second outputs.
    Type: Application
    Filed: December 1, 2021
    Publication date: June 1, 2023
    Applicant: Capital One Services, LLC
    Inventors: Samuel SHARPE, Dwipam Katariya, Nima Chitsazan, Qianyu Cheng, Karthik Rajasethupathy