Patents Assigned to Service
-
Publication number: 20250115543Abstract: Gingerenone A prodrug compounds have a structure according to Formula I, or a pharmaceutically acceptable salt thereof wherein one of R1 and R2 is H or —C(O)—R and the other of R1 and R2 is —C(O)—R. Each R independently is RA or, where RA is C18-C22 alkenyl, and RB is an amino acid side chain. The compounds are useful for inhibiting or eliminating senescence. The compounds may be administered to a subject having a senescence-associated disease or disorder, neuroinflammation, pain, and/or an amino acid deficiency.Type: ApplicationFiled: January 17, 2023Publication date: April 10, 2025Applicant: The U.S.A., as Represented by the Secretary, Department of Health and Human ServicesInventors: Ruin Moaddel, Luigi Ferrucci, Kotb Abdelmohsen, Myriam Gorospe, Martina Rossi, Christopher E. Ramsden, Gregory S. Keyes
-
Publication number: 20250117793Abstract: A system and method for validating target account data based on inputs from a user. The system may include a memory storing instructions, and a processor configured to execute the instructions to perform operations. The operations may include providing an interface; receiving a first input; receiving a second input; enabling selection of an activatable element; conducting a lookup associated with the received inputs; receiving a result of the lookup; transforming the result of the lookup into a transformed result that predicts the probability of verification; and displaying transformed result to demonstrate the validity of the received inputs.Type: ApplicationFiled: December 16, 2024Publication date: April 10, 2025Applicant: The PNC Financial Services Group, Inc.Inventors: Stephen Christopher BYERS, Howard Neil FORMAN, Janice Lynne GILL, Robert Kirk MAY, Regis John SCHRANZ
-
Publication number: 20250117764Abstract: Disclosed herein are system, apparatus, device, method and/or computer program product embodiments, and/or combinations and sub-combinations thereof for blending multiple images of a financial instrument (e.g., check) into a single blended image to mitigate potential image errors. The method generates a number of images of the financial instrument and builds a blended image by blending pixel content of common pixels from set of the images and communicates the blended image to a remote deposit server.Type: ApplicationFiled: December 19, 2024Publication date: April 10, 2025Applicant: Capital One Services, LLCInventors: Keegan FRANKLIN, Aeman JAMALI, Jordan ARRIETA, Megan OBRIEN, Danielle WEGRZYN, Michael CROGHAN, Kai SI, Sasha AHRESTANI
-
Publication number: 20250117458Abstract: A method may include receiving, using a first application programming interface (API) endpoint of an API system, an API request from a computing device. The API request may represent a request for a video that is associated with a digital rights management technology and that includes an image frame representing a content element. The method may include fetching, using the first API endpoint, the content element. The method may include forming, using the API system, a JavaScript Object Notation (JSON) object including the content element and formatting information associated with the content element. The method may further include transmitting, using a second API endpoint of the API system, the JSON object to an application server configured to generate the video based on the JSON object.Type: ApplicationFiled: October 3, 2024Publication date: April 10, 2025Applicant: Capital One Services, LLCInventors: Shahalam BAIG, Matthew HUNSBERGER, Shasanka BHANDARI, Hyunwoo KANG
-
Publication number: 20250117457Abstract: A method may include receiving, using a computing device, a document including a first page. The method may include transmitting, using the computing device, the document to an application server. The method may include receiving, using the computing device, a first video from the application server. The first video may be associated with a digital rights management technology and include a single image frame. The single image frame may represent the first page of the document. The method may include forming, using a browser module of the computing device, a first Hypertext Markup Language (HTML) element including the first video. The method may also include outputting, using an operating system of the computing device, the first video of the first HTML element to a display screen associated with the computing device.Type: ApplicationFiled: October 3, 2024Publication date: April 10, 2025Applicant: Capital One Services, LLCInventors: Shahalam BAIG, Matthew HUNSBERGER, Shasanka BHANDARI, Jackson WESTWOOD, Hyunwoo KANG
-
Publication number: 20250117461Abstract: A method may include receiving, using a browser module of a computing device, a decrypted video from a content decryption module, wherein the decrypted video is associated with a content element and a digital rights management technology. The method may include forming, using the browser module of the computing device, a HyperText Markup Language (HTML) element including the decrypted video. The method may include outputting, using an operating system of the computing device, the decrypted video of the HTML element to a display screen associated with the computing device. The method may include determining, using the operating system of the computing device, whether the outputted video is being played on the display screen. The method may also include transmitting, using the operating system of the computing device, the determination to the content decryption module.Type: ApplicationFiled: October 3, 2024Publication date: April 10, 2025Applicant: Capital One Services, LLCInventors: Matthew HUNSBERGER, Tyler MAIMAN, Joshua EDWARDS, Ian KATZMAN, Shahalam BAIG, Jackson WESTWOOD, Shasanka BHANDARI
-
Publication number: 20250117455Abstract: Described are systems and methods for dynamically protecting a digital rights management (“DRM”)-protected content element, including monitoring, via a browser module, on a first interval, DRM-protected media for impairment, the DRM-protected media having been caused to be output via a graphical user interface (“GUI”), wherein the DRM-protected media is associated with the DRM-protected content element, upon detecting impairment of the DRM-protected media, generating an indication of impairment via the browser module, based on the indication of impairment, obfuscating the DRM-protected content element via the browser module, and causing to output, via the GUI, the obfuscated DRM-protected content element.Type: ApplicationFiled: October 3, 2024Publication date: April 10, 2025Applicant: Capital One Services, LLCInventors: Joshua EDWARDS, Tyler MAIMAN, Ian KATZMAN, Shahalam BAIG, Jackson WESTWOOD, Shasanka BHANDARI, Matthew HUNSBERGER
-
Publication number: 20250117557Abstract: A method of training an artificial intelligence (AI) model including obtaining M training pairs and training the AI model using the M training pairs. Obtaining the M training pairs includes inputting an mth set of injection values in a reservoir simulator and an mth set of output values from the reservoir simulator. A method of extracting hydrocarbons from and storing carbon dioxide in a formation including, for N cycles, inputting an nth set of output values into a trained AI model, obtaining an (n+1)th set of injection values from the trained AI model, injecting an (n+1)th amount of carbon dioxide and an (n+1)th amount of treatment fluid into a hydrocarbon reservoir based on the (n+1)th set of injection values, determining an (n+1)th set of output values from the formation, and rewarding or penalizing the trained AI model based on the nth set and the (n+1)th set of output values.Type: ApplicationFiled: October 10, 2023Publication date: April 10, 2025Applicant: ARAMCO SERVICES COMPANYInventors: Uchenna Odi, Nouf Jabri
-
Publication number: 20250117456Abstract: A method may include receiving, using a browser module of a computing device, a video from an application server. The video may be associated with a content element and a digital rights management technology. The method may include forming, using the browser module, an HTML element including the video, and playing, using a video player of the computing device, the video of the HTML element on a display screen associated with the computing device. The method may include receiving, using the computing device, input data, and transmitting, using the computing device, the input data to the application server. The method may include receiving, using the computing device, a determination that the input data represents unexpected input data, from the application server. The method may include, in response to receiving the determination, causing, using the video player, the video of the HTML element to stop playing on the display screen.Type: ApplicationFiled: October 3, 2024Publication date: April 10, 2025Applicant: Capital One Services, LLCInventors: Ramin MORADI, Tyler MAIMAN, Joshua EDWARDS, Ian KATZMAN, Shahalam BAIG, Jackson WESTWOOD, Shasanka BHANDARI, Matthew HUNSBERGER
-
Publication number: 20250117459Abstract: Disclosed are systems and methods for dynamically generating digital rights management (“DRM”) protections, including receiving an indication of digital extraction associated with first sensitive information, determining an identity of an application associated with the indication of digital extraction, determining a mode associated with the indication of digital extraction, and based on the determined identity of the application and the determined mode of the digital extraction, transmitting a first alert to a DRM-protection system.Type: ApplicationFiled: October 3, 2024Publication date: April 10, 2025Applicant: Capital One Services, LLCInventors: Ian KATZMAN, Tyler MAIMAN, Joshua EDWARDS, Shahalam BAIG, Jackson WESTWOOD, Shasanka BHANDARI, Matthew HUNSBERGER
-
Publication number: 20250117454Abstract: Described are systems and methods for generating digital rights management (“DRM”)-protected layered media, including receiving an indication of sensitive information, based on the indication of sensitive information, causing to output at least two layered security elements associated with the sensitive information, the at least two layered security elements including at least a first layer associated with a first security element and a second layer associated with a second security element, determining, via a browser module, digital extraction is indicated, upon determining digital extraction is indicated, modifying the first layer such that the first layer and the associated first security element are substantially transparent, and causing to output, via a first graphical user interface (“GUI”), the at least two layered security elements with the modified first layer, such that the second layer and the associated second security element are substantially visible.Type: ApplicationFiled: October 3, 2024Publication date: April 10, 2025Applicant: Capital One Services, LLCInventors: Shahalam BAIG, Oliver DEIGHTON, Hyunwoo KANG, Shasanka BHANDARI, Matthew HUNSBERGER
-
Publication number: 20250117516Abstract: Described are systems and methods for determining a content element associated with sensitive information, including receiving a content element and locative data associated with the content element, determining whether the content element includes sensitive information, upon determining the content element includes sensitive information, encrypting the content element using DRM technologies to generate a DRM-protected content element via an application server; and causing to output, via a graphical user interface (“GUI”), the DRM-protected content element based on the locative data associated with the one or more content elements determined to include sensitive information.Type: ApplicationFiled: October 3, 2024Publication date: April 10, 2025Applicant: Capital One Services, LLCInventors: Matthew HUNSBERGER, Jackson WESTWOOD, Tyler MAIMAN, Joshua EDWARDS, Ian KATZMAN, Shahalam BAIG, Shasanka BHANDARI, Hyunwoo KANG
-
Publication number: 20250117452Abstract: A method may include receiving, using a browser module of a computing device, a first webpage, wherein the first webpage is associated with a content element. The method may include receiving, using the browser module, a video, wherein the video is associated with the content element and a digital rights management technology. The method may include forming, using the browser module, an HTML element including the video. The method may include outputting, using the browser module, at least a portion of the first webpage to a display screen. The method may include outputting, using an operating system of the computing device, the video of the HTML element to the display screen, wherein the video is configured to be overlaid on the at least a portion of the first webpage on the display screen. The method may include storing, using a storage component of the computing device, the outputted video.Type: ApplicationFiled: October 3, 2024Publication date: April 10, 2025Applicant: Capital One Services, LLCInventors: Joshua EDWARDS, Tyler MAIMAN, Ian KATZMAN, Shahalam BAIG, Jackson WESTWOOD, Shasanka BHANDARI, Matthew HUNSBERGER, David WEEKLY
-
Publication number: 20250119758Abstract: The technologies described herein are generally directed to validating the integration of new carrier components at base station equipment, e.g., in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, confirming based on installation data, an installation milestone of an installation of a carrier component at base station equipment, resulting in a confirmed milestone. The method can further include, based on the confirmed milestone, identifying for an evaluation of the installation of the carrier component, a criterion associated with a characteristic of operation of the base station equipment. Further, the method can include based on a result of evaluation of the installation, sending, by the network equipment, a validation signal to the base station equipment indicating that the installation of the carrier component is validated.Type: ApplicationFiled: December 4, 2024Publication date: April 10, 2025Applicants: AT&T Intellectual Property I, L.P., AT&T Global Network Services Czech Republic s.r.o., AT&T Mobility II LLCInventors: Shuai Hao, Alexandru Cristian Andrei, Hector Perez, Donald Coates, Jr., Zihui Ge, Alvin Hicks, Jason Tipton
-
Publication number: 20250117451Abstract: Described are systems and methods for generating protected accessible HyperText Markup Language (“HTML”), the method including receiving a request to load media content associated with a first HTML element, upon receiving the request to load the content element, generating video data associated with the content element, generating one or more digital rights management-protected files based on the video data associated with the content element, generating a second HTML element based on the one or more DRM-protected files, and causing to output, via a graphical user interface, the digital rights management-protected video data of the second HTML element.Type: ApplicationFiled: October 3, 2024Publication date: April 10, 2025Applicant: Capital One Services, LLCInventors: Matthew HUNSBERGER, Tyler MAIMAN, Joshua EDWARDS, Ian KATZMAN, Shahalam BAIG, Jackson WESTWOOD, Shasanka BHANDARI
-
Publication number: 20250113858Abstract: A compressible rod for an aerosol-generating device includes a first layer and a wrapper circumscribing the first layer. The first layer includes a first material. The first material may include tobacco. The compressible rod has a circular cross-sectional shape and a hollow center. The compressible rod is configured to be compressed, such that the compressible rod has a non-circular cross-sectional shape after compression.Type: ApplicationFiled: October 4, 2023Publication date: April 10, 2025Applicant: Altria Client Services LLCInventors: Georgios D. KARLES, Rangaraj S. SUNDAR
-
Publication number: 20250117475Abstract: Methods and systems for detecting fraudulent browser extensions are described herein. In some aspects, the system may retrieve a first unique identifier corresponding to a browser extension associated with a beacon and retrieve a second unique identifier associated with an embedded frame in a new browser extension. The system may determine whether the new browser extension is a spoofed version of the browser extension based on whether the first identifier of the browser extension matches the second identifier of the new browser extension. In response to determining that the new browser extension is spoofed, the system may execute an application programming interface (API) function to transmit a notification to an external server. The API function can be configured to generate information to include in the notification regarding the new browser extension. This allows the system to identify spoofed browser extensions and transmit a notification accordingly.Type: ApplicationFiled: October 5, 2023Publication date: April 10, 2025Applicant: Capital One Services, LLCInventor: Anthony GLYNN
-
Publication number: 20250117445Abstract: Described are systems and methods for reducing compute in digital rights management (“DRM”) protection, including generating, via an application server, first media associated with first sensitive information, wherein the first media is substantially transparent and the first sensitive information is associated with a first content element, modifying, via the application server, the first media such that the first media includes at least one DRM technology to generate first DRM-protected media, generating, via an application server, first media associated with first sensitive information, wherein the first media is substantially transparent and the first sensitive information is associated with a first content element, causing to output, via a graphical user interface (“GUI”), the first DRM-protected content element such that the first DRM-protected media is displayed.Type: ApplicationFiled: October 3, 2024Publication date: April 10, 2025Applicant: Capital One Services, LLCInventors: Joshua EDWARDS, Tyler MAIMAN, Ian KATZMAN, Shahalam BAIG, Jackson WESTWOOD, Shasanka BHANDARI, Matthew HUNSBERGER
-
Publication number: 20250117718Abstract: The disclosure relates generally to methods and systems for optimizing performance of enterprise operations using maturity assessment. Existing enterprise operations maturity assessment frameworks are inefficient and lack comprehensive and integrated coverage of all three layers of the enterprise operations. The present disclosure computes or assesses a maturity score of the enterprise operation on a predefined maturity scale. The maturity score of the enterprise operation is determined based on responses to a set of evaluators which are described as the key performance indicators for a given enterprise operation. The enterprise operation maturity assessment outcomes comprise of current overall enterprise operation maturity score, benchmarks for key performance indicators, and a subset of recommended solutions to achieve improved maturity levels.Type: ApplicationFiled: September 26, 2024Publication date: April 10, 2025Applicant: Tata Consultancy Services LimitedInventors: Ashok Ganesh PAI, Asoke DAS SARMA, Minesh Dineshchandra DESAI, Arunima PANDEY
-
Publication number: 20250117448Abstract: Described are systems and methods for dynamically securing transmitted data, including accessing a first secure application, receiving, via the first secure application, a data set, wherein the data set includes at least one of text data, image data, video data, or audio data, determining, via a first application server associated with the first secure application, a content element associated with the data set, wherein the content element includes sensitive information, generating, via the first application server, media based on the sensitive information, wherein the media is encrypted to include digital rights management (“DRM”) protection, transmitting, to a second secure application associated with a second user device, the media, and causing to output the media via a graphical user interface (“GUI”) associated with the second user device.Type: ApplicationFiled: October 3, 2024Publication date: April 10, 2025Applicant: Capital One Services, LLCInventor: Shahalam BAIG