Patents Assigned to Capital One
-
Patent number: 11587043Abstract: Systems and methods associated with providing portals that processes electronic requests as well as generates and displays associated data are disclosed. In one embodiment, an exemplary method may comprise providing a portal comprising user interfaces configured to receive inputs from members of an organization and process related information, utilizing iframes in the portal to integrate forms from different applications within the organization that have different computing platforms, generating an intake request dashboard for the members comprising an intake form and a cost estimator tool, and generating an approver dashboard comprising an interactive user interface that displays integrated information regarding events to an approver and a UI mechanism for approving the electronic request.Type: GrantFiled: May 14, 2021Date of Patent: February 21, 2023Assignee: Capital One Services, LLCInventors: Courtney Allison Brown, Diane Gregorio
-
Patent number: 11586811Abstract: A method may include a obtaining a first data model instance comprising an identifier string and a set of attributes associated with a set of attribute name strings. The method may include obtaining an ontology graph that includes a first label, a second label, and an association between them. The method may include using a prediction model to select the first label based on the first data model instance and determining the second label based on the relationship. The method may include determining a selected set of labels that includes the first label and the second label to associate with the first data model instance. The method may include associating the selected set of labels with the first data model instance in a dataset that includes a plurality of records, where each record is associated with a different data model instance.Type: GrantFiled: March 31, 2020Date of Patent: February 21, 2023Assignee: Capital One Services, LLCInventors: Anindya Misra, Cindy Liu, Milovan Milovanovic
-
Patent number: 11588775Abstract: Methods and systems are disclosed herein for using machine learning to send notifications. A computer system may receive a message and may determine a sentiment level and/or an urgency level associated with the message. The computer system may use the sentiment level and/or urgency level to predict when the user will respond to the message. The computer system may compare the predicted response time with one or more thresholds to determine a time to send a notification for the message to the user device.Type: GrantFiled: May 13, 2021Date of Patent: February 21, 2023Assignee: Capital One Services, LLCInventors: Austin Walters, Jeremy Goodsitt, Galen Rafferty
-
Patent number: 11588828Abstract: Systems and methods are provided for automated retrieval, processing, and/or distribution of cyber-threat information using a cyber-threat device. Consistent with disclosed embodiments, the cyber-threat device may receive cyber-threat information in first formats from internal sources of cyber-threat information using an accessing component of the cyber-threat device. The cyber-threat device may receive cyber-threat information second formats from external sources of cyber-threat information using an accessing component of the cyber-threat device. The cyber-threat device may process the received cyber-threat information in the first formats and the second formats into a standard format using a processing component of the cyber-threat device. The cyber-threat device may provide the processed items of cyber-threat information to a distributor using a distributing component of the cyber-threat device.Type: GrantFiled: February 24, 2020Date of Patent: February 21, 2023Assignee: Capital One Services, LLCInventor: Nathan Weilbacher
-
Publication number: 20230052991Abstract: Methods, systems, and media enabling a progressive web application (PWA) across a web domain are disclosed herein. The PWA may be enabled by web applications among a plurality of web applications executing respective portions of the PWA functionality via linking a root level web page to a manifest. The manifest may contain metadata describing a PWA architecture across the web domain. Enabling the PWA may further include executing, by a root service worker, one or more scripts configured to enable registration by one or more component service workers according the manifest To enable the PWA, applications among a plurality of web applications, and registering, by the one or more component service workers, the web applications among the plurality of web applications.Type: ApplicationFiled: August 13, 2021Publication date: February 16, 2023Applicant: Capital One Services, LLCInventor: Jonathan RICKLIS
-
Publication number: 20230045930Abstract: Disclosed herein are system, method, and computer program product embodiments for machine learning systems to process incoming call-center calls based on inferred sentiments. An incoming call is routed to a call agent based on an inferred topic, classified based on one or more inferred sentiments of a current caller's speech, determining, based on the call classification, that a complaint has been articulated and initiating an automated assistance by searching for one or more similar callers to the current caller. Based on finding a successful call outcome associated with one or more similar callers, the system suggests one or more phrases to the call agent for use in a dialog with the current caller to improve the one or more inferred sentiments.Type: ApplicationFiled: August 13, 2021Publication date: February 16, 2023Applicant: Capital One Services, LLCInventors: Aysu Ezen CAN, Adam FAULKNER, Maury COURTLAND, David CHEN, Jonathan GALSURKAR
-
Publication number: 20230047174Abstract: Methods and systems are described herein for improvements for cybersecurity of telecommunication devices. For example, cybersecurity for telecommunication devices may be improved by analyzing activity log data of telecommunication devices for a candidate event (e.g., the uploading of malware) and disabling one or more services of a telecommunication device. By doing so, cybersecurity for telecommunication devices may be improved by detecting a possible malware intrusion attempt and disabling one or more services of the telecommunication devices. For example, activity log data of telecommunication devices may be obtained. A candidate event indicating malware may be detected in the activity log data. A number of proximate telecommunication devices satisfying a proximity threshold condition may be determined. The number of proximate telecommunication devices that satisfy a density threshold condition may be determined.Type: ApplicationFiled: August 13, 2021Publication date: February 16, 2023Applicant: Capital One Services, LLCInventors: Jeff PHARR, Son MAYS, Michael LITTLEJOHN
-
Publication number: 20230047933Abstract: An artificial intelligence-based system and method for automatically generating and adjusting tags associated with one or more UI/UX related components or features is provided. Analysis may be performed on the data collected by the one or more tags so that design change recommendations can be dynamically recommended and/or implemented. When design changes are implemented, the system may automatically reconfigure or adjust all relevant tags. The AI-based system may be a standalone platform or may be incorporated into existing UI/UX programs.Type: ApplicationFiled: August 26, 2022Publication date: February 16, 2023Applicant: Capital One Services, LLCInventors: Joseph GOLDSTEIN, Kevin PARK, Wenjie LIU
-
Publication number: 20230050991Abstract: Various embodiments are generally directed to continuous authentication of a user to a digital service based on activity of a contactless card positioned proximate to a computing device on which the digital service operates. For example, a series of periodic status messages may be provided between a client device and the contactless card to verify whether the contactless card remains active, wherein authorization to access the digital service continues while the contactless card is active, and terminates when the contactless card is inactive.Type: ApplicationFiled: November 3, 2022Publication date: February 16, 2023Applicant: Capital One Services, LLCInventors: Jeffrey RULE, Rajko ILINCIC
-
Publication number: 20230052968Abstract: Disclosed are systems and methods for utilizing virtual reality for virtual cards. For example, a method of determining verification information may include: obtaining an image of a merchant site of a merchant captured by at least one camera of a first computing device, wherein the merchant site is displayed on a display of a second computing device; identifying one or more characters in the captured image; determining that the identified one or more characters indicate a virtual credit card number associated with a user; determining a card verification value associated with the virtual credit card number and an expiration date associated with the virtual credit card number; and displaying information regarding the determined virtual credit card number on a display of the first computing device.Type: ApplicationFiled: August 9, 2022Publication date: February 16, 2023Applicant: Capital One Services, LLCInventor: Michelle OLENOSKI
-
Publication number: 20230049418Abstract: Some embodiments of the present application include obtaining datasets including a plurality of features and computing a correlation score between each of the features. Based on the correlation scores, the features may be clustered together such that each cluster includes features that are correlated with one another, and features included in different feature clusters lack correlation with one another. A machine learning model may be selected based on a set of input features for the model and the plurality of clusters such that each input feature is included in one of the feature clusters and no feature cluster includes more than one of the input features. Datasets may then be selected based on the set of input features, which may be used to generate training data for training the machine learning model.Type: ApplicationFiled: September 27, 2021Publication date: February 16, 2023Applicant: Capital One Services, LLCInventors: Prashanta SAHA, Souvik BISWAS, Joydeep DASGUPTA
-
Publication number: 20230052411Abstract: Disclosed are methods, systems, and non-transitory computer-readable medium for managing IDs in identity access management (IAM)/resource policies. For instance, the method may include obtaining a request regarding a target identification in a set of IAM/resource policies, the request including an action request; pulling the set of IAM/resource policies from a service; for each policy of the set of IAM/resource policies, traversing a data structure of the policy to return keypath(s) that include the target identification; and modifying each policy that includes the target identification by performing the action request using the keypath(s).Type: ApplicationFiled: August 10, 2021Publication date: February 16, 2023Applicant: CAPITAL ONE SERVICES, LLCInventors: Michael MUCCIARONE, Lawrence DOLINAR
-
Publication number: 20230048310Abstract: A campaign server disclosed herein includes a graphic user interface (GUI) and underlying campaign server functionality that together enable a user to build, execute and analyze the results of a campaign with increased ease and accuracy. The campaign server advantageously includes a segmentation engine which operates to dynamically update target segment population data. The campaign server GUI enables the user to construct the campaign content and to launch the campaign towards members of the dynamically updated target segment. The campaign server further operates to collect and present campaign results to the user.Type: ApplicationFiled: October 26, 2022Publication date: February 16, 2023Applicant: Capital One Services, LLCInventors: Erik MURO, Alec FEKETE, Graham CANTOR-COOKE, Steven CAO, Jonathan CHAO, Asif Khan Zinab PATAN, Prashant MEHROTRA, Deepthi POTLURI
-
Publication number: 20230049095Abstract: Systems and methods are disclosed herein for real-time digital authentication. According to some embodiments, a certification authentication method includes receiving a list of third party root certificates from a remote server, the list of third party root certificates including at least one association between a program configured to run on the computing apparatus and a public key for authenticating communication between the program and an associated server of the program. The method may also include authenticating the list of third party root certificates. The method may also include initiating a communication between the computing apparatus and the associated server and authenticating the communication with the associated server using the public key. Furthermore, the method may also include loading the program onto the one or more memories during a bootstrapping process in response to determining that the communication with the associated server is authentic.Type: ApplicationFiled: August 12, 2021Publication date: February 16, 2023Applicant: Capital One Services, LLCInventor: Srinivasan RANGARAJ
-
Publication number: 20230047184Abstract: Various embodiments are generally directed to techniques for prediction based machine learning (ML) models, such as to utilize a ML model to generate predictions based on the output of another ML model. Some embodiments are particularly directed to a secondary ML model that revises predictions generated by a primary ML model based on structured input data. In many embodiments, the secondary ML model may utilize predictions from the primary ML model to learn metadata regarding the structured input data. In many such embodiments, the metadata regarding the structured input data may be used to revise the predictions from the primary ML model. For example, the secondary ML model may utilize a structure of the input data combined with patterns in the predictions from the primary ML model to revise the predictions from the primary ML model.Type: ApplicationFiled: August 12, 2021Publication date: February 16, 2023Applicant: Capital One Services, LLCInventors: Anh TRUONG, Austin Grant WALTERS, Jeremy Edward GOODSITT
-
Publication number: 20230046591Abstract: A method for determining authenticity of a document in real-time is disclosed. The method being performed by a processor includes receiving image data of a document. The image data corresponds to at least two images of the document taken simultaneously using at least two cameras. The method includes analyzing the image data to determine a plurality of measurements corresponding to the document along three dimensions. The method includes a thickness at a plurality of location points on the document based on the plurality of measurements, and determining authenticity of the document in real-time based on the determined thickness of the document at the plurality of location points.Type: ApplicationFiled: August 11, 2021Publication date: February 16, 2023Applicant: Capital One Services, LLCInventors: Erik NEIGHBOUR, Timothy TRAN
-
Publication number: 20230052787Abstract: A processor may receive data and generate a quantified representation of the data by processing the data using at least one machine learning (ML) algorithm, the quantified representation of the data indicating a sentiment of content of the data. The processor may automatically revise the content of the communications data. The revising may include determining a reaction to the content of the communications data, generating a quantified representation of the reaction, determining a difference between the quantified representation of the reaction and the quantified representation of the communications data, identifying, based on the difference, a portion of the content having an unintended sentiment, and replacing the portion of the content with different content.Type: ApplicationFiled: June 13, 2022Publication date: February 16, 2023Applicant: Capital One Services, LLCInventors: Phoebe Atkins, Max Miracolo, Joshua Edwards, Brian McClanahan, Alexander Lin, Lin Ni Lisa Cheng, Cruz Vargas
-
Publication number: 20230050601Abstract: Disclosed are examples for providing functions to receive a media file to be stored in a media repository. In the examples, a location in the media repository may be assigned to the media file. A media file address in a blockchain platform may be assigned to the media file. Metadata including the assigned location in the media repository and the assigned media file address in the blockchain platform may be added to the media file. A media file hash value may be generated by applying a hash function to the media file including the metadata. The media file hash value may be included in a message and uploaded to the assigned media file address in the blockchain platform as a transaction in the blockchain. An indication that the media file is uploaded to the media repository may be delivered to a subscriber device from which the media file was received.Type: ApplicationFiled: November 2, 2022Publication date: February 16, 2023Applicant: Capital One Services, LLCInventors: Kenneth TAYLOR, Austin Grant WALTERS, Jeremy Edward GOODSITT, Fardin ABDI TAGHI ABAD, Reza FARIVAR, Vincent PHAM, Anh TRUONG
-
Publication number: 20230052128Abstract: Embodiments may generally be directed components and techniques to detect a request to provide banking account information over a one or more voice connections, identify the requested banking account information, and generate speech data representing the banking account information requested. In embodiments further include communicating the speech data to another device.Type: ApplicationFiled: October 26, 2022Publication date: February 16, 2023Applicant: Capital One Services, LLCInventors: Abdelkader M'Hamed BENKREIRA, Michael MOSSOBA, Joshua EDWARDS
-
Publication number: 20230046034Abstract: A system for security key rotation in a cloud computing environment is disclosed. The system performs steps to at least initiate, at a predetermined interval, a call to determine whether to initiate generation of a public-private key pair for a client application. The system determines whether to initiate generation of the public-private key pair for the client application and based on determining to initiate generation of the public-private key pair for the client application, transmits a control signal requesting generation of the public-private key pair The system generates the public-private key pair and transmits a private key associated with the public-private key pair to a secure storage location for later retrieval by the client application and transmits a public key associated with the public-private key pair to a public key service for later retrieval by a client associated with the client application.Type: ApplicationFiled: October 14, 2022Publication date: February 16, 2023Applicant: Capital One Services, LLCInventor: Bharath Bhushan SREERAVINDRA