Patents by Inventor Geeta Shyamala

Geeta Shyamala has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240193262
    Abstract: To facilitate improved email and device security, embodiments of systems and methods include intercepting, by a processor associated with an entity, an internet request, where the internet request is produced by a link received in an email at a first computing device. The processor determines that the link is externally bound relative to an entity network. The processor determines an existence of a sandbox environment instance in a set of existing sandbox environment instances. The processor routes the link through the sandbox environment instance. The processor updates the sandbox log in the database based on the sandbox environment instance and the link. The processor causes to display on a screen of the first computing device a user interface for interacting with the link in the sandbox environment instance, and the processor logs activities associated with interacting with the link in a security log.
    Type: Application
    Filed: February 26, 2024
    Publication date: June 13, 2024
    Inventors: Vincent Pham, Joseph Boayue, Lee Adcock, Geeta Shyamala, Ana Cruz, Christopher Camenares, Nahid Farhady Ghalaty
  • Publication number: 20240171706
    Abstract: Methods and systems disclosed herein describe generating virtual backgrounds for video communications. A virtual background generator may monitor a user's calendar and/or inbox for meetings. The virtual background generator may analyze the context of calendar invites and/or scheduled meetings to generate one or more virtual backgrounds for a video conference. A first background may be displayed for the video conference. Additionally, the virtual background generator may update the virtual background based on an analysis of one or more topics being discussed during the video conference. Based on the analysis of the one or more topics being discussed, the virtual background generator may generate a second virtual background to replace the first virtual background.
    Type: Application
    Filed: January 29, 2024
    Publication date: May 23, 2024
    Inventors: Sarvani Kare, Daniel Tran, Lee Adcock, Geeta Shyamala, Benjamin Polk
  • Patent number: 11973608
    Abstract: Methods and systems disclosed herein describe generating virtual backgrounds for video communications. A virtual background generator may monitor a user's calendar and/or inbox for meetings. The virtual background generator may analyze the context of calendar invites and/or scheduled meetings to generate one or more virtual backgrounds for a video conference. A first background may be displayed for the video conference. Additionally, the virtual background generator may update the virtual background based on an analysis of one or more topics being discussed during the video conference. Based on the analysis of the one or more topics being discussed, the virtual background generator may generate a second virtual background to replace the first virtual background.
    Type: Grant
    Filed: August 10, 2022
    Date of Patent: April 30, 2024
    Assignee: Capital One Services, LLC
    Inventors: Sarvani Kare, Daniel Tran, Lee Adcock, Geeta Shyamala, Benjamin Polk
  • Publication number: 20240106866
    Abstract: In some aspects, a computing system may use a machine learning model to determine whether a computer security policy should be modified to reduce the likelihood of a cyber security incident. Through the use of a machine learning model, unsafe combinations of access grants or permissions may be identified and modified to prevent cyber security incidents from occurring. The computing system may input a representation of a computer security policy into a machine learning model, which has been trained on a dataset that includes representations of computer security policies. The computing system may generate output indicating a likelihood that the first computing system will be involved in a cyber security incident. Based on the output satisfying a first threshold, the computing system may generate a recommendation to modify the first computer security policy. The computing system may modify the first computer security policy based on the recommendation.
    Type: Application
    Filed: September 26, 2022
    Publication date: March 28, 2024
    Applicant: Capital One Services, LLC
    Inventors: Geeta SHYAMALA, Lee ADCOCK, Vincent PHAM, Nahid FARHADY GHALATY
  • Patent number: 11937015
    Abstract: Methods and systems disclosed herein describe generating virtual backgrounds for video communications. A virtual background generator may monitor a user's calendar and/or inbox for meetings. The virtual background generator may analyze the context of calendar invites and/or scheduled meetings to generate one or more virtual backgrounds for a video conference. A first background may be displayed for the video conference. Additionally, the virtual background generator may update the virtual background based on an analysis of one or more topics being discussed during the video conference. Based on the analysis of the one or more topics being discussed, the virtual background generator may generate a second virtual background to replace the first virtual background.
    Type: Grant
    Filed: August 10, 2022
    Date of Patent: March 19, 2024
    Assignee: Capital One Services, LLC
    Inventors: Sarvani Kare, Daniel Tran, Lee Adcock, Geeta Shyamala, Benjamin Polk
  • Publication number: 20240069851
    Abstract: Systems and methods for generating a preview stream for a user of a video conferencing service. In some aspects, the systems and methods provide for receiving a video stream of at least a portion of a display screen of a user device and determining whether the user device has been designated as a receiving device for receiving a version of the video stream. In response to determining that the user device has not been designated as a receiving device for receiving a version of the video stream, a request is generated to designate the user device as a receiving device in addition to being a presenting device. Based on images of the video stream, a preview stream (e.g., of at least a portion of the display screen) is generated and transmitted for display at the user device.
    Type: Application
    Filed: August 25, 2022
    Publication date: February 29, 2024
    Applicant: Capital One Services, LLC
    Inventors: Alexander LINK, Geeta SHYAMALA, Benjamin POLK, Lee ADCOCK
  • Publication number: 20240073218
    Abstract: Methods and systems are disclosed for improvements in cloud services by sharing estimated and actual usage data of cloud services recipients with the cloud services provider. The sharing of this data allows the cloud services provider to better apportion cloud resources between multiple cloud services recipients. By analyzing information included in the shared data (e.g., information about one or more applications that use the cloud resources), the cloud services provider may categorize the applications and/or the functions of those applications into authorized and unauthorized uses, the determination of which, is used to further efficiently apportion the cloud services resources.
    Type: Application
    Filed: October 19, 2023
    Publication date: February 29, 2024
    Applicant: Capital One Services, LLC
    Inventors: Nahid FARHADY GHALATY, Vincent PHAM, Geeta SHYAMALA
  • Patent number: 11914701
    Abstract: To facilitate improved email and device security, embodiments of systems and methods include intercepting, by a processor associated with an entity, an internet request, where the internet request is produced by a link received in an email at a first computing device. The processor determines that the link is externally bound relative to an entity network. The processor determines an existence of a sandbox environment instance in a set of existing sandbox environment instances. The processor routes the link through the sandbox environment instance. The processor updates the sandbox log in the database based on the sandbox environment instance and the link. The processor causes to display on a screen of the first computing device a user interface for interacting with the link in the sandbox environment instance, and the processor logs activities associated with interacting with the link in a security log.
    Type: Grant
    Filed: August 8, 2022
    Date of Patent: February 27, 2024
    Assignee: Capital One Services, LLC
    Inventors: Vincent Pham, Joseph Boayue, Lee Adcock, Geeta Shyamala, Ana Cruz, Christopher Camenares, Nahid Farhady Ghalaty
  • Publication number: 20240056322
    Abstract: Methods and systems disclosed herein describe generating virtual backgrounds for video communications. A virtual background generator may monitor a user's calendar and/or inbox for meetings. The virtual background generator may analyze the context of calendar invites and/or scheduled meetings to generate one or more virtual backgrounds for a video conference. A first background may be displayed for the video conference. Additionally, the virtual background generator may update the virtual background based on an analysis of one or more topics being discussed during the video conference. Based on the analysis of the one or more topics being discussed, the virtual background generator may generate a second virtual background to replace the first virtual background.
    Type: Application
    Filed: August 10, 2022
    Publication date: February 15, 2024
    Inventors: Sarvani Kare, Daniel Tran, Lee Adcock, Geeta Shyamala, Benjamin Polk
  • Publication number: 20240056551
    Abstract: Methods and systems disclosed herein describe generating virtual backgrounds for video communications. A virtual background generator may monitor a user's calendar and/or inbox for meetings. The virtual background generator may analyze the context of calendar invites and/or scheduled meetings to generate one or more virtual backgrounds for a video conference. A first background may be displayed for the video conference. Additionally, the virtual background generator may update the virtual background based on an analysis of one or more topics being discussed during the video conference. Based on the analysis of the one or more topics being discussed, the virtual background generator may generate a second virtual background to replace the first virtual background.
    Type: Application
    Filed: August 10, 2022
    Publication date: February 15, 2024
    Inventors: Sarvani Kare, Daniel Tran, Lee Adcock, Geeta Shyamala, Benjamin Polk
  • Publication number: 20240012894
    Abstract: Methods and systems described herein for processing of codes stored within security objects may involve scanning a multitude of codes using the security object. When the codes have been scanned, the security object may store the codes until the mechanism is triggered by, for example, detection of a code processing device. As the security object cycles through the stored codes, it may detect a sound from the code processing device, and then a subsequent sound indicating that a first code and a second code have been processed. The security object may determine whether some codes (e.g., between the first code and the second code) may have been skipped and based on that determination, the security object may update cycling time (e.g., time each code is displayed) and then cycle through the other codes.
    Type: Application
    Filed: July 11, 2022
    Publication date: January 11, 2024
    Applicant: Capital One Services, LLC
    Inventors: Lee ADCOCK, Benjamin YIN, Geeta SHYAMALA, Nahid FARHADY GHALATY, Patrick SOFO
  • Publication number: 20240007472
    Abstract: Methods and systems are described herein for bypassing secondary tiers of authentication for particular security categories. An authentication system, when authenticating a user, may receive an authentication request with authentication data enabling authentication through a multi-tier authentication mechanism. When the request has been authenticated through a multi-tier authentication mechanism, the authentication system may identify a category associated with the request and generate a temporal unlock flag for that category of future requests, such that the temporal unlock flag indicates that multi-tier authentication is not required for a predetermined amount of time for requests of that category. The temporal unlock flag may be inserted into the user's record. When future requests of that same category are received, only a single-tier authentication mechanism may be required for authentication.
    Type: Application
    Filed: June 30, 2022
    Publication date: January 4, 2024
    Applicant: Capital One Services, LLC
    Inventors: Geeta SHYAMALA, Lee ADCOCK
  • Publication number: 20230410114
    Abstract: In some implementations, a physical medium for card skimming detection may include a magnetic stripe, on which account information associated with a user account may be stored, one or more sensors configured to detect when information is read from the magnetic stripe, and a processor. The physical medium may detect a first read and a second read of the magnetic stripe. The physical medium may determine that the first read and the second read occur within a time threshold of each other. The physical medium may transmit, to a device and based on determining that the first read and the second read occur with the time threshold of each other, an alert signal indicating a potential threat associated with the user account.
    Type: Application
    Filed: June 21, 2022
    Publication date: December 21, 2023
    Inventors: Benjamin YIN, Geeta SHYAMALA, Nahid FARHADY GHALATY
  • Patent number: 11831653
    Abstract: Methods and systems are disclosed for improvements in cloud services by sharing estimated and actual usage data of cloud services recipients with the cloud services provider. The sharing of this data allows the cloud services provider to better apportion cloud resources between multiple cloud services recipients. By analyzing information included in the shared data (e.g., information about one or more applications that use the cloud resources), the cloud services provider may categorize the applications and/or the functions of those applications into authorized and unauthorized uses, the determination of which, is used to further efficiently apportion the cloud services resources.
    Type: Grant
    Filed: July 28, 2022
    Date of Patent: November 28, 2023
    Assignee: Capital One Services, LLC
    Inventors: Nahid Farhady Ghalaty, Vincent Pham, Geeta Shyamala
  • Patent number: 11783125
    Abstract: Analyzing communications to determine appropriateness and provide recommendations based on prior communications. Prior communications may create a baseline tone based on the sentiment, words, or phrases used in previous communications between the user and the intended recipient and/or other user recipient pairs. Machine learning techniques may be used to continuously update a baseline tone.
    Type: Grant
    Filed: October 11, 2022
    Date of Patent: October 10, 2023
    Assignee: Capital One Services, LLC
    Inventors: Lee Adcock, Nahid Ghalaty, Ana Cruz, Geeta Shyamala, Patrick Sofo
  • Patent number: 11720897
    Abstract: A configured application for authorizing a credit card by a user and a method that may include receiving an electronic request to pair a mobile device associated with a user with a credit card of the user. The credit card may include a location tracking circuitry to remotely communicate a location of the credit card to a remote electronic recipient. The location of the credit card may be received by a processor from the remote electronic recipient. A proximity multi-factor authentication may verify that the user is an authorized user of the credit card. The mobile device associated with the user may be paired with the credit card of the user after verifying that the user is the authorized user. The processor may receive the location of the credit card paired with the mobile device from the remote electronic recipient. The location of the credit card may be displayed on a display of the mobile device associated with the user.
    Type: Grant
    Filed: December 30, 2021
    Date of Patent: August 8, 2023
    Assignee: Capital One Services, LLC
    Inventors: Christopher Camenares, Joseph Boayue, Ana Cruz, Lee Adcock, Nahid Farhady Ghalaty, Vincent Pham, Geeta Shyamala
  • Patent number: 11699437
    Abstract: Systems, methods, and computer-readable storage media for quantifying meeting effectiveness for an individual. A system configured as disclosed herein uses data from multiple meetings in which a user participated to create a user profile for the user. The system then receives data related to a new meeting in which the user participated, processes the new meeting data into segments using natural language processing, tags the resulting segments based on contexts, and compares the tagged segments to the user profile to generate a meeting effectiveness score for the new meeting which is specific to the user. The system can use machine learning to iteratively improve an ability of the system to generate the tagged segments using historical meeting data and updating that historical meeting data with each iteration of scoring a meeting's effectiveness.
    Type: Grant
    Filed: July 10, 2020
    Date of Patent: July 11, 2023
    Assignee: Capital One Services, LLC
    Inventors: Christopher Camenares, Jason Trost, Patrick Sofo, Joseph Boayue, Geeta Shyamala, Ana Cruz, Nahid Farhady Ghalaty, Vincent Pham
  • Publication number: 20230033742
    Abstract: Methods and systems are disclosed for improvements in cloud services by sharing estimated and actual usage data of cloud services recipients with the cloud services provider. The sharing of this data allows the cloud services provider to better apportion cloud resources between multiple cloud services recipients. By analyzing information included in the shared data (e.g., information about one or more applications that use the cloud resources), the cloud services provider may categorize the applications and/or the functions of those applications into authorized and unauthorized uses, the determination of which, is used to further efficiently apportion the cloud services resources.
    Type: Application
    Filed: July 28, 2022
    Publication date: February 2, 2023
    Applicant: Capital One Services, LLC
    Inventors: Nahid FARHADY GHALATY, Vincent PHAM, Geeta SHYAMALA
  • Publication number: 20230030957
    Abstract: Analyzing communications to determine appropriateness and provide recommendations based on prior communications. Prior communications may create a baseline tone based on the sentiment, words, or phrases used in previous communications between the user and the intended recipient and/or other user recipient pairs. Machine learning techniques may be used to continuously update a baseline tone.
    Type: Application
    Filed: October 11, 2022
    Publication date: February 2, 2023
    Inventors: Lee ADCOCK, Nahid GHALATY, Ana CRUZ, Geeta SHYAMALA, Patrick SOFO
  • Publication number: 20220374514
    Abstract: To facilitate improved email and device security, embodiments of systems and methods include intercepting, by a processor associated with an entity, an internet request, where the internet request is produced by a link received in an email at a first computing device. The processor determines that the link is externally bound relative to an entity network. The processor determines an existence of a sandbox environment instance in a set of existing sandbox environment instances. The processor routes the link through the sandbox environment instance. The processor updates the sandbox log in the database based on the sandbox environment instance and the link. The processor causes to display on a screen of the first computing device a user interface for interacting with the link in the sandbox environment instance, and the processor logs activities associated with interacting with the link in a security log.
    Type: Application
    Filed: August 8, 2022
    Publication date: November 24, 2022
    Inventors: Vincent Pham, Joseph Boayue, Lee Adcock, Geeta Shyamala, Ana Cruz, Christopher Camenares, Nahid Farhady Ghalaty