Patents by Inventor Sangeeta Varma

Sangeeta Varma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230252115
    Abstract: Methods for authenticating, verifying and digitally onboarding prospective account holders using an artificially-intelligent, dynamic, rules-based system are provided. Methods may include receiving digital requests for digital account onboarding. Methods include processing the digital requests at a rules engine. Methods may include generating an authentication and verification score for each digital request. Methods may include initiating one or more authentication and verification systems to authenticate and/or verify a prospective account holder associated with each digital request. Methods may include identifying an authentication and verification score for each digital request based the results of the authentication and verification systems. Methods may include creating accounts for account holders that are authenticatable and verifiable by the authentication and verification systems.
    Type: Application
    Filed: February 10, 2022
    Publication date: August 10, 2023
    Inventors: Preston Wesley Ports, III, Ryan J. Moore, Sangeeta Varma Martinez, Robert Marshall Voyles, III, Ryan M. Furey, Erin Marie McCullen, Ankana Datta, Kyle Corkery
  • Patent number: 11528267
    Abstract: A system provides for automated image authentication and external database verification. In particular, the system may perform automatic authentication of an image by extracting data and/or metadata from the image for subsequent analysis. For instance, the extracted data and/or metadata may be compared with historical data to drive authorization processes (e.g., past instances of unauthorized activity). In some embodiments, the system may further use external databases which may be hosted by a trusted third party to perform additional authentication steps and/or verification. In this way, the system may provide a reliable and efficient way to perform authentications.
    Type: Grant
    Filed: December 6, 2019
    Date of Patent: December 13, 2022
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Preston Wesley Ports, III, Sangeeta Varma Martinez, Dipika Jain, Michael Toth, Melissa K. Van Leuven, Holly Martinez, Dawn M. Friscia, Erin Marie McCullen, Deborah D. Jackson
  • Patent number: 11233920
    Abstract: Methods and systems disclosed herein relate generally to systems and methods for transforming document elements in response to modifications to a layout of a document. A layout-modification application identifies, from a first document having a first document layout, a first set of measurements of a document element and a first location of the document element within the first document. Based on an aspect-ratio difference between the first document layout and a second document layout, the layout-modification application selects a set of transformation rules that specify, for the document element, a second set of measurements and a second location within a second document. To select the particular set of transformation rules, the layout-modification application uses the determined aspect-ratio difference. The layout-modification application applies the selected set of transformation rules to the document element.
    Type: Grant
    Filed: November 19, 2020
    Date of Patent: January 25, 2022
    Assignee: Adobe Inc.
    Inventors: Xiaoyi Wang, Shayan Chandrashekar, Sangeeta Varma, Paul Asente, Michal Lukac, Chang Liu
  • Publication number: 20210176238
    Abstract: A system provides for automated image authentication and external database verification. In particular, the system may perform automatic authentication of an image by extracting data and/or metadata from the image for subsequent analysis. For instance, the extracted data and/or metadata may be compared with historical data to drive authorization processes (e.g., past instances of unauthorized activity). In some embodiments, the system may further use external databases which may be hosted by a trusted third party to perform additional authentication steps and/or verification. In this way, the system may provide a reliable and efficient way to perform authentications.
    Type: Application
    Filed: December 6, 2019
    Publication date: June 10, 2021
    Applicant: Bank of America Corporation
    Inventors: Preston Wesley Ports, III, Sangeeta Varma Martinez, Dipika Jain, Michael Toth, Melissa K. Van Leuven, Holly Martinez, Dawn M. Friscia, Erin Marie McCullen, Deborah D. Jackson
  • Publication number: 20190377479
    Abstract: The present disclosure relates to generating target content, and in particular, generating target content based on source content and a plurality of re-sizing options. In this regard, preexisting source content is selected and input into a content generation engine. A focal point associated with the source content and at least one re-sizing option are selected. A focal point associated with target content, as well as the location of textual data associated with the target content are determined. Target content is generated to conform to the at least one selected re-sizing option and the determined focal point. The target content is then displayed for further modification in a user-friendly user interface.
    Type: Application
    Filed: June 11, 2018
    Publication date: December 12, 2019
    Inventors: KYOSHI IHARA, SHIVAM GOYAL, SANGEETA VARMA, MORGAN GURFINKEL, BRIAN DUERSCH, BHAVIN BHUPENDRA DOSHI
  • Patent number: 6915347
    Abstract: A method for grouping Human Interface Devices (HIDs) into a multi-head display is provided. The HIDs are identified as either “primary” or “secondaries”. A computational-service policy module is consulted when a new HID connects to the network. If the HID is identified as a secondary, the module consults all servers within a group to see if the primary presently has an active session connected to any of the servers. If the primary is being controlled by the same server to which the secondary is connected, the session connection information for the primary is augmented to indicate that the secondary is attached to the same session, and this information is disseminated to the interested software entities. The associated session may then provide multi-head outout to the secondary. If the primary is being controlled by another server in the group, the secondary re-attaches to the server that is hosting the primary.
    Type: Grant
    Filed: December 6, 2000
    Date of Patent: July 5, 2005
    Assignee: Sun Microsystems, Inc.
    Inventors: James G. Hanko, Sangeeta Varma, J. Kent Peacock
  • Patent number: 6711681
    Abstract: A system and associated method for authorizing, or withholding authorization of, user access to a selected computer application or other resource, based on the user's response to one or more user authentication tests. If the user satisfies one or more authentication tests but satisfies less than all the tests, the system optionally allows the user access to a selected subset of the resource. Alternatively, the user loses access to a selected subset of the application for each test not satisfied by the user. An authentication test or its associated weight may change at a selected time, and the selected time may be determined with reference to a time at which the resource changes.
    Type: Grant
    Filed: May 5, 1999
    Date of Patent: March 23, 2004
    Assignee: Sun Microsystems, Inc.
    Inventors: Yayha Al-Salqan, Sangeeta Varma, Aravindan Ranganathan
  • Patent number: 6687823
    Abstract: A system and associated method for authorizing, or withholding authorization of, user access to a selected computer application or other resource, based on the user's response to one or more user authentication tests. If the user is presented with two or more authentication tests, each with an associated test weight, the system optionally sums the weights of the tests satisfied by the user; and if this sum is greater than a selected test score threshold, the user is granted access to the resource. Alternatively, the user is granted access to selected subsets of the application, including an empty or non-empty default subset, depending upon the sum of the weights of the tests satisfied by the user. An authentication test or its associated weight may change at a selected time, and the selected time may be determined with reference to a time at which the resource changes. A smartcard may be used to respond to one or more authentication tests.
    Type: Grant
    Filed: May 5, 1999
    Date of Patent: February 3, 2004
    Assignee: Sun Microsystems, Inc.
    Inventors: Yayha Al-Salqan, Sangeeta Varma, Aravindan Ranganathan
  • Publication number: 20020169967
    Abstract: Embodiments of the present invention are directed to a method and apparatus for multiple token access to thin client architecture session. In one embodiment, a user is associated with a session using an authenticated token. A user may access a session by authenticating the user's identity. An authenticated token for the user is created and the user is granted access to the session. As a result, the user will be able to access the session without the physical token by authenticating the user's identity using a passphrase or biometric identifier. In one embodiment, a user is able to access a session from one terminal when the session is already being accessed from another terminal. The user presents an authenticated token associated with the session, and the session is disconnected from the old terminal and input and output information is rerouted to the new terminal.
    Type: Application
    Filed: May 14, 2001
    Publication date: November 14, 2002
    Inventors: Sangeeta Varma, Shivaputrappa S. Vibhuti
  • Publication number: 20020046300
    Abstract: The present invention provides a mechanism for grouping several standard computers and making them act as one to generate a multi-head display. In one embodiment, the computers are designated as either “primary” or “secondary” terminals. In one embodiment, a set of policy modules decides whether and what type of computational service should be provided to the terminal. For a secondary terminal, the module determines whether the primary terminal of the group has an active session connected to any of the servers. If the primary terminal is being controlled by the server to which the secondary terminal is connected, then session connection information for the primary is augmented to indicate that the secondary is attached to the same session. If not, then the secondary is commanded to attach to the server hosting the primary terminal. A special session is presented where the primary is not attached to any server.
    Type: Application
    Filed: December 6, 2000
    Publication date: April 18, 2002
    Inventors: James G. Hanko, Sangeeta Varma, J. Kent Peacock