Patents Assigned to Service
-
Patent number: 10621110Abstract: Some embodiments modify caching server operation to evict cached content based on a deterministic and multifactor modeling of the cached content. The modeling produces eviction scores for the cached items. The eviction scores are derived from two or more factors of age, size, cost, and content type. The eviction scores determine what content is to be evicted based on the two or more factors included in the eviction score derivation. The eviction scores modify caching server eviction operation for specific traffic or content patterns. The eviction scores further modify caching server eviction operation for granular control over an item's lifetime on cache.Type: GrantFiled: June 26, 2018Date of Patent: April 14, 2020Assignee: Verizon Digital Media Services Inc.Inventors: Harkeerat Singh Bedi, Amir Reza Khakpour, Robert J. Peters
-
Patent number: 10617790Abstract: The growth factor profile, connective tissue matrix constituents, and immunoprivileged status of urodele extracellular matrix (ECM) and accompanying cutaneous tissue, plus the presence of antimicrobial peptides there, render urodele-derived tissue an ideal source for biological scaffolds for xenotransplantation. In particular, a biological scaffold biomaterial can be obtained by a process that entails (A) obtaining a tissue sample from a urodele, where the tissue comprises ECM, inclusive of the basement membrane, and (B) subjecting the tissue sample to a decellularization process that maintains the structural and functional integrity of the extracellular matrix, by virtue of retaining its fibrous and non-fibrous proteins, glycoaminoglycans (GAGs) and proteoglycans, while removing sufficient cellular components of the sample to reduce or eliminate antigenicity and immunogenicity for xenograft purposes.Type: GrantFiled: January 9, 2014Date of Patent: April 14, 2020Assignee: ISE Professional Testing & Consulting Services, Inc.Inventor: Ryanne Early
-
Patent number: 10621522Abstract: An artificial intelligence system for predicting hours of operation for merchants. The system may include a processor, a database, and a storage medium storing instructions. When executed, the instructions configure the processor to: receive a request for hours of operation for the merchants; obtain, from the database, a set of credit card authorizations associated with the merchants; generate input model features based on the set of credit card authorizations; obtain ground-truth data associated with the merchants; generate a training dataset based on the ground truth data and the set of credit card authorizations; determine an hours-of-operation model based on the training data set; calculate the total prediction of hours of operation using the hours-of-operation model.Type: GrantFiled: January 4, 2018Date of Patent: April 14, 2020Assignee: Capital One Services, LLCInventors: Ashish Bansal, Jonathan Stahlman
-
Patent number: 10620334Abstract: Methods and tools for modifying magnetic tilt angle using a magnetically anisotropic material are disclosed. An electromagnetic logging tool includes an antenna coil oriented at a physical tilt angle relative to a longitudinal axis of the tool and a magnetically anisotropic material that modifies a magnetic tilt angle of the coil relative to the physical tilt angle a coil tilted at a physical tilt angle relative to an axis of the tool.Type: GrantFiled: December 31, 2014Date of Patent: April 14, 2020Assignee: Halliburton Energy Services, Inc.Inventors: Li Pan, Chao-Fu Wang, Wei Hsuan Huang, Rencheng Song
-
Publication number: 20200112551Abstract: A key master service capable of operating on a service provider in a network enables is disclosed. The key master enables authorized parties to securely exchange client information without compromising client security. One feature of the key master service is the generation of a unique key for each client. All parties in an authorized universe access, exchange and modify client information by referencing the universal key, rather than using known client identifiers. Client information is further secured by advantageously applying an obfuscation function to the data. Obfuscated client information is stored together with the universal key as keyed client data at the client and/or server, where it may be directly accessed by the service provider or third parties. Because client information is stored and exchanged without the ability to discern either the client identity or the nature of the information, such information is secured against malicious third-party interception.Type: ApplicationFiled: March 4, 2019Publication date: April 9, 2020Applicant: Capital One Services, LLCInventors: Jeremy YOCHES, Christopher Vito COVALUCCI, Scott JOHNSON
-
Publication number: 20200111187Abstract: Various embodiments are generally directed to providing a digital negotiation platform. An agent executing on a processor may programmatically negotiate parameters for an agreement based on rules and/or computing models. The agent may generate a smart contract comprising a transcript of communications and executable code operable to enforce the parameters. The smart contract may be stored in a blockchain.Type: ApplicationFiled: October 15, 2019Publication date: April 9, 2020Applicant: Capital One Services, LLCInventors: Adam VUKICH, Kaitlin NEWMAN, Colin HART, Jason JI
-
Publication number: 20200109109Abstract: Disclosed is a salt prepared from the STAT3 inhibitor known as 2-hydroxy-4-[[2-[[(4-methylphenyl)sulfonyl]oxy]acetyl]amino] benzoic acid and 2-amino-2-(hydroxymethyl)-1,3-propanediol. The salt is soluble in water and stable for extended periods of time. Further provided are pharmaceutical compositions comprising the salt and methods of administering the salt to prevent and treat cancer, such as breast cancer.Type: ApplicationFiled: April 5, 2018Publication date: April 9, 2020Applicants: The United States of America,as represented by the Secretary,Department of Health and Human Services, GLG Pharma, LLC, MRIGlobalInventors: Robert H. Shoemaker, Michael W. Lovell, Jonathan M. White, Shanker Gupta
-
Publication number: 20200110872Abstract: Exemplary embodiments relate to the secure storage of security questions through an immutable log, such as a blockchain. The security questions may be stored in a centralized location, accessible from an application or browser tab running on the user's device. When a security question is required, such as to perform a password reset on a website, the website may interact with the application or browser tab, which retrieves the question(s) from the blockchain. The user may enter their answers to the question(s), which may be hashed by the application or tab. The hashed answers may be entered into the original requesting website, which may verify with the blockchain that the correct answers have been provided. Thus, the requesting website sees neither the questions nor the answers. Additional security features may include logging requests for questions, so that a user can determine if a security question may have been compromised.Type: ApplicationFiled: October 9, 2019Publication date: April 9, 2020Applicant: Capital One Services, LLCInventors: Vincent PHAM, Austin Grant WALTERS, Jeremy Edward GOODSITT, Fardin ABDI TAGHI ABAD, Anh TRUONG, Kate KEY, Kenneth TAYLOR
-
Publication number: 20200110804Abstract: The present disclosure provides computing systems and techniques for indicating an emotional and/or environmental state of a user in a digital messaging application. A computing device can determine an emotional and/or environmental state of a first user responsive to reading or responding to a message and can convey the determined emotional and/or environmental state to a second computing device, to be transiently presented by the second computing device.Type: ApplicationFiled: May 13, 2019Publication date: April 9, 2020Applicant: Capital One Services, LLCInventors: Jeremy PHILLIPS, Andrew BEANE
-
Publication number: 20200110976Abstract: A transaction card may include a body having a first part connectable with a second part, and a magnetic stripe on a first main side of the body. A first section of the magnetic stripe is provided on the first part of the body, and a second section of the magnetic stripe is provided on the second part of the body. The transaction card may further include an engagement member extending from the first part of the body for retention within a slot of the second part of the body, the slot embedded within the body between the first main side and a second main side.Type: ApplicationFiled: November 27, 2018Publication date: April 9, 2020Applicant: Capital One Services, LLCInventors: Abdelkader M'Hamed BENKREIRA, Daniel MARSCH, Joshua EDWARDS, Michael MOSSOBA
-
Publication number: 20200108364Abstract: Blending apparatuses and related methods and computer program products are disclosed. In an aspect, blending apparatuses and related methods and computer program products of the present disclosure may include at least one energy source associated with the blending apparatuses such that at least one energy source may be used to provide at least one portion of the energy required for a given blending apparatus to function, thereby reducing or eliminating need for a separate energy source to power the blending apparatus, which reduces the overall spatial footprint required by the blending apparatus and other device(s) associated therewith. Energy generated by the at least one energy source may also be used to power one or more additional devices. Blending apparatuses of the present disclosure may additionally comprise at least one control station that allows one or more users to monitor, adjust, control, interact with the blending apparatuses, thereby increasing efficiency.Type: ApplicationFiled: October 5, 2018Publication date: April 9, 2020Applicant: Supreme Electrical Services, Inc. DBA Lime InstrumentsInventor: Cory Glass
-
Publication number: 20200109613Abstract: A mechanical perforator includes a perforator module and a slip module. The perforator module has perforator blades that may be forced outwardly to perforate a well casing joint after slips of the slip module has been deployed to bite the well casing and anchor a lower end of the mechanical perforator in the well casing.Type: ApplicationFiled: October 9, 2018Publication date: April 9, 2020Applicant: Exacta-Frac Energy Services, Inc.Inventor: JOZE JOHN HRUPP
-
Publication number: 20200110969Abstract: Various embodiments are generally directed to techniques of adjusting the combination of the samples in a training batch or training set. Embodiments include techniques to determine an accuracy for each class of a classification model, for example. Based on the determined accuracies, the combination of the samples in the training batch may be adjusted or modified to improve the training of the classification model.Type: ApplicationFiled: December 6, 2019Publication date: April 9, 2020Applicant: Capital One Services, LLCInventors: Fardin ABDI TAGHI ABAD, Jeremy Edward GOODSITT, Austin Grant WALTERS
-
Publication number: 20200109616Abstract: A hydraulic fracturing system for fracturing a subterranean formation includes a support structure that includes an electric powered pump, arranged in a first area, the electric powered pump powered by at least one electric motor, also arranged in the first area. The system further includes a variable frequency drive (VFD), arranged in a second area proximate the first area, connected to the at least one electric motor to control the speed of the at least one electric motor. The system includes a transformer, arranged in a third area proximate the second area. The system also includes a slide out platform integrated into the first area, the slide out platform being driven between a retracted position and a deployed position.Type: ApplicationFiled: October 9, 2019Publication date: April 9, 2020Applicant: U.S. Well Services, LLCInventors: Jared Oehring, Brandon N. Hinderliter, Lon Robinson
-
Publication number: 20200111099Abstract: Various embodiments are generally directed to techniques to detect suspicious activity associated with ATMs and cause dispense of money with known and/or stored serial numbers. Embodiments include techniques to perform a computing analysis utilizing the transaction information to determine whether the transaction is suspicious or not suspicious, for example. The computing analysis comprising at least one of applying one or more factors to the transaction information and applying a model to the transaction information. Embodiments also include an ATM communicating with one or more other systems, such as transaction information with a transaction services system and alerts with an emergency services system.Type: ApplicationFiled: October 4, 2018Publication date: April 9, 2020Applicant: Capital One Services, LLCInventors: Abdelkader M`Hamed BENKREIRA, Mykhaylo BULGAKOV, Adam VUKICH
-
Publication number: 20200111095Abstract: Example embodiments provide systems and methods for increasing the cryptographic strength of an encryption or message-authentication-code-(MAC) generation technique. According to some embodiments, a MAC may be constructed around a shared secret (such as a random initialization number), thereby increasing strength of the MAC against brute force attacks based on the size of the shared secret. The MAC may be combined with randomized data, and may also be encrypted to further bolster the strength of the code. These elements (shared secret, MAC algorithm, and encryption algorithm) may be employed in various combinations and to varying degrees, depending on the application and desired level of security. At each stage, the cryptographic construct operates on the cyptographically modified data from the previous stage. This layering of cryptographic constructs may increase the strength of the group of contrasts more efficiently than applying any one construct with a larger key size or similar increase in complexity.Type: ApplicationFiled: July 1, 2019Publication date: April 9, 2020Applicant: Capital One Services, LLCInventors: Kevin OSBORN, Srinivasa CHIGURUPATI, William DUANE
-
Publication number: 20200108795Abstract: A system for limiting vehicle operation is disclosed. The system may comprise one or more memory units for storing instructions and one or more processors configured to execute the instructions to perform operations. The operations may comprise determining that a key device is inside the vehicle; performing an authentication; setting the vehicle in a first vehicle mode; starting the vehicle based on the determination and the first authentication; and limiting vehicle operation based on the first vehicle mode.Type: ApplicationFiled: November 23, 2018Publication date: April 9, 2020Applicant: Capital One Services, LLCInventor: Ann Claudia CHAPIN
-
Publication number: 20200110691Abstract: A processor may receive at least one test application corresponding to an application profile. The processor may simulate the at least one test application in a non-production environment for a plurality of infrastructure configurations to generate a plurality of test performance results. The processor may evaluate the plurality of test performance results to identify an optimal infrastructure configuration from among the plurality of infrastructure configurations for the application profile. The processor may apply the optimal infrastructure configuration to an application corresponding to the application profile that is deployed in a production environment.Type: ApplicationFiled: October 3, 2018Publication date: April 9, 2020Applicant: Capital One Services, LLCInventors: Jonathan H. Bryant, Jagadesh V. Gadiyaram, Thomas Caputo
-
Publication number: 20200111042Abstract: Techniques to enhance employee performance using machine learning are described. In some embodiments, these techniques are directed to rendering recommendations to employee reviews by processing, via an input device, an employee review between a manager and an employee, the employee review comprising employee-related remarks by the manager, using the machine learning model to identify at least one employee-related remark of the employee review to have a negative impact on employee performance, the negative impact being attributed to a reviewer type of the manager or a personality type of the employee, and displaying, on an output device, an annotated employee review wherein the annotated employee review comprises the employee review and data indicating that the at least one employee-related remark is likely to result in the negative impact. Other embodiments are described and claimed.Type: ApplicationFiled: October 4, 2018Publication date: April 9, 2020Applicant: Capital One Services, LLCInventors: Vincent PHAM, Austin Grant WALTERS, Jeremy Edward GOODSITT, Fardin ABDI TAGHI ABAD, Kenneth TAYLOR, Anh TRUONG, Kate KEY
-
Publication number: 20200110900Abstract: Techniques for providing a real-time service that protects personal data of clients from customer service agents are provided. Customer data that includes personal data indicative of sensitive information of a customer can be received from the customer. The personal data within the received customer data can be detected and a token that does not include the sensitive information of the customer can be generated. The personal data and the generated token can be stored along with data indicating a relationship between the token and the personal data. The personal data in the received customer data can be replaced by the token to form modified customer data. The modified customer data can be provided to a customer service representative. The token within the modified customer data can later be detected and associated with the personal data without revealing the personal data to the customer service representative.Type: ApplicationFiled: October 8, 2019Publication date: April 9, 2020Applicant: Capital One Services, LLCInventors: Fardin ABDI TAGHI ABAD, Austin Grant WALTERS, Jeremy Edward GOODSITT, Reza FARIVAR, Vincent PHAM, Mark Louis WATSON, Kenneth TAYLOR, Anh TRUONG