Patents Assigned to Service
-
Publication number: 20240261474Abstract: A scaffold containing two layers is provided for attaching retinal pigment epithelial (RPE) cells, photoreceptor progenitor (PRP) cells, or both. The scaffold includes a first layer containing poly(lactic-co-glycolic acid) (PLGA), and a second layer containing polycaprolactone (PCL) loops. Scaffolds containing mature RPE cells and PRP cells can be implanted into the eye of a subject to treat a retinal degenerative disease, retinal dysfunction, retinal degradation, retinal damage, or loss of retinal pigment epithelium.Type: ApplicationFiled: May 26, 2022Publication date: August 8, 2024Applicant: THE U.S.A., as represented by the Secretary, Department of Health and Human ServicesInventors: Arvydas Maminishkis, Kapil Bharti, Davide Ortolan, Ruchi Sharma, Eric Nguyen
-
Publication number: 20240261764Abstract: A solvent extraction process for removing poly- and perfluoroalkyl substances (PFAS) from a PFAS laden adsorbent is disclosed. The process comprises introducing a substantially pure solvent at an elevated temperature to a bed of the PFAS laden adsorbent and continuously removing PFAS laden solvent from the adsorbent, wherein the introducing and removing are carried out simultaneously and continuously until a desired amount of PFAS is removed from the adsorbent. Also disclosed is a process for degrading poly- and perfluoroalkyl substances (PFAS) to environmentally benign products. The process comprises providing an aqueous solution containing PFAS at a concentration of greater than 50 ppm; and subjecting the aqueous solution to ultrasound using at least one ultrasonic transducer at a frequency and power and for a time sufficient to degrade substantially all of the PFAS in the solution to carbon dioxide and fluoride.Type: ApplicationFiled: June 7, 2022Publication date: August 8, 2024Applicant: Enviropacific Services LimitedInventors: Ricky James LEGG, Cameron SHEARER, John Dominic HAYBALL, Luke Andrew PARKINSON
-
Publication number: 20240264888Abstract: A method for testing failover includes: determining one or more cross-regional dependencies and traffic flow of an application in a first cloud environment region, wherein the one or more cross-regional dependencies include a dependency of the application in the first region to one or more applications in at least one other cloud environment region; determining a risk score associated with performing failover of the application to a second cloud environment region based on the determined one or more cross-regional dependencies and traffic flow; comparing the determined risk score with a predetermined risk score; in response to determining that the determined risk score is lower than the predetermined risk score, performing failover of the application to the second region; isolating the second region from the first region for a predetermined period of time; and monitoring operation of the application in the second region during the predetermined period of time.Type: ApplicationFiled: March 13, 2024Publication date: August 8, 2024Applicant: Capital One Services, LLCInventors: Ankit KOTHARI, Ann HAWKINS, John SAMOS
-
Publication number: 20240261521Abstract: An electronic smoking article includes an outer tube extending in a longitudinal direction, an inner tube within the outer tube and including a pair of opposing slots, a liquid supply comprising a liquid material, a coil heater, a wick and a mouth end insert. The coil heater is located in the inner tube. The coil heater is formed of an iron-free, nickel-chromium alloy and has substantially uniformly spaced windings. The wick is surrounded by the coil heater such that the wick delivers liquid material to the coil heater and the coil heater heats the liquid material to a temperature sufficient to vaporize the liquid material and form an aerosol in the inner tube.Type: ApplicationFiled: March 18, 2024Publication date: August 8, 2024Applicant: Altria Client Services LLCInventors: Christopher S. TUCKER, Geoffrey Brandon JORDAN, Barry S. SMITH, Ali A. ROSTAMI, Michael J. MULLINS
-
Publication number: 20240265128Abstract: Systems and methods generate requests for encrypted (e.g., secured) credentials and data using one of a plurality of API plugins that are selected based on an access protocol for a network partition at which requested data is determined to be stored. Through the use of the dynamically-selected API plugins, the systems and methods may provide the aforementioned functions while being compatible with the different access protocols that may be encountered when providing central management across a diverse spectrum of user accounts, networks, and/or cloud platforms.Type: ApplicationFiled: February 2, 2023Publication date: August 8, 2024Applicant: Capital One Services, LLCInventors: Jinlian WANG, Peter ZELLER, Christopher SCHULTZ
-
Publication number: 20240265063Abstract: Various embodiments are generally directed to techniques for embedding a data object into a multidimensional frame, such as for training an autoencoder to generate latent space representations of the data object based on the multidimensional frame, for instance. Additionally, in one or more embodiments latent space representations of data objects may be classified, such as with a machine learning algorithm. Some embodiments are particularly directed to embedding a data object comprising a plurality of object entries into a three-dimensional (3D) frame.Type: ApplicationFiled: February 9, 2024Publication date: August 8, 2024Applicant: Capital One Services, LLCInventors: Austin Grant WALTERS, Jeremy Edward GOODSITT, Mark Louis WATSON, Anh TRUONG
-
Publication number: 20240267735Abstract: Systems and methods for securing data transmissions using distance measurements are disclosed. A mobile device (such as a smart phone) and a base station can use ultra-wideband technology to determine the distance between the two devices. The distance measurements produced by the mobile device and the base station can be compared, directly or indirectly by the mobile device, the base station, and/or an access device to determine whether the mobile device is present at an access device or if the mobile device is not present at the access device (as expected during a relay attack). If the mobile device is not present at the access device, the access device can prevent or cancel an interaction based on the data transfer (e.g., opening a locked door of a secure building in response to receiving an access credential from the mobile device).Type: ApplicationFiled: July 8, 2021Publication date: August 8, 2024Applicant: Visa International Service AssociationInventors: Marc Kekicheff, Yuexi Chen, Mustafa Top
-
Publication number: 20240265243Abstract: This disclosure relates generally to neural network inferencing, and more particularly, to a method and system for neural network inferencing in logarithmic domain. The conventional techniques include training a neural network in logarithmic domain and performing inferencing. This leads to less accuracy, challenge in converting large models and unable to perform optimization. The present disclosure converts a pre-trained neural network into logarithmic domain using a bit manipulation based logarithm number system technique wherein the neural network is pre-trained in real time or in logarithmic domain. The method converts the weights, neural network layers and activation function into logarithmic domain. The method uses a 32-bit integer variable to store a logarithm number which leads to memory efficiency. The disclosed method is used for inferencing of convolutional neural network for natural language processing, image recognition and so on.Type: ApplicationFiled: January 25, 2024Publication date: August 8, 2024Applicant: Tata Consultancy Services LimitedInventors: Archisman BHOWMICK, Mayank MISHRA, Rekha SINGHAL, Aditya Singh RATHORE
-
Publication number: 20240265085Abstract: Techniques for processing an interaction using an interaction request include receiving, by an authorization computer from a transport computer, a request for a value, transmitting, by the authorization computer, the request for the value to a user device for approval, transmitting, by the authorization computer to the transport computer, a message comprising an identifier for the request for the value, receiving, by the authorization computer from the user device, an indication of approval of the request for the value, responsive to receiving the indication of approval from the user device, determining, by the authorization computer, whether or not the value should be granted, and transmitting, by the authorization computer to the transport computer, an authorization code indicating whether or not the value is granted and the identifier for the request.Type: ApplicationFiled: January 19, 2021Publication date: August 8, 2024Applicant: Visa International Service AssociationInventor: Vilas Hegde
-
Publication number: 20240264912Abstract: Disclosed herein are system, method, and computer program product embodiments for automatically failing over all services operating on a primary region to a secondary region upon detection or notification of a fault in the primary region. When a fault exists on the primary region, the method traverses each cluster containing services operating on the primary region and prepares an input file including a list of service names identifying each service operating on the primary region. Referencing the input file, the method fails over each service from the primary region to the secondary region by modifying a service weight corresponding to each service. This failover process of services may be done simultaneously with failing over any databases corresponding to the failed-over services from the primary region to the secondary region. The method may also introduce a sleep time after modifying each service weight to avoid any potential throttling issues.Type: ApplicationFiled: April 4, 2024Publication date: August 8, 2024Applicant: Capital One Services, LLCInventors: Ateet Kumar AWASTHI, Chris FIELDS, Saral JAIN, Matt HOWARTH
-
Publication number: 20240265282Abstract: In an example embodiment, a system is described for customizing user accounts based on user actions, which may include receiving, via a user device, a first user input requesting to create an account for a user. The system may further receive, via the user device, a second user input selecting an account type for the account from a plurality of account types. In response to these user inputs, the system may retrieve, from a server, one or more account requirements for the account type, determine that the user meets the one or more account requirements and create an account in response to determining that the user meets the one or more account requirements.Type: ApplicationFiled: April 18, 2024Publication date: August 8, 2024Applicant: Capital One Services, LLCInventors: Joseph GOLDSTEIN, Thomas DODSON, Eric DELGADO
-
Publication number: 20240261637Abstract: A play structure for an indoor or outdoor playground is disclosed. The play structure comprises an inner molded unit made of poured-in-place (PIP) rubber subsurface. The PIP rubber subsurface is poured with a mixture of rubber buffing and urethane configured to deliver improved safety, playability, and reduced maintenance requirement. The play structure further comprises a synthetic outer layer adhered to an outer surface of the inner molded unit. The outer layer adheres to the outer surface of the inner molded unit using an adhesive layer. The play structure further comprises a flat bottom surface configured to mount over the playground system and a top surface with different angles. A set of play structures are shaped and arranged on the play surface to develop core strength, balance, and coordination in toddlers by walking, jumping, and climbing on them. Further, the play structure is provided in different design configurations.Type: ApplicationFiled: May 23, 2023Publication date: August 8, 2024Applicant: Playground Equipment Services, L.L.C.Inventor: Eric L. Schmidt
-
Publication number: 20240264057Abstract: A method and apparatus for testing a specimen with pressure, applying a torque using one or more plates coupled to the test specimen, applying a bending moment, and/or applying an axial load, either separately or simultaneously, with or without rotating the specimen, and without the applied forces interfering with each other.Type: ApplicationFiled: April 18, 2024Publication date: August 8, 2024Applicant: Stress Engineering Services, Inc.Inventors: Matthew Sanders, Jack E. Miller
-
Publication number: 20240265032Abstract: Methods and systems are described herein for synchronizing communication records in computer networks. For example, the methods and systems may determine whether or not a first communication relates to a second and generate a recommendation that the communications relate to a single communication. In particular, the methods and systems described herein describe synchronizing communication records in computer networks based on detecting patterns in categories of metadata. For example, the methods and systems retrieve specific types of metadata and compare this metadata between communications in order to synchronize and/or deduplicate them.Type: ApplicationFiled: April 17, 2024Publication date: August 8, 2024Applicant: Capital One Services, LLCInventors: Aditya PAI, Brice ELDER, Niyati SHAH, Marek SEDLACEK
-
Publication number: 20240264631Abstract: A docking board removably coupled to a processor board that does not function when not operatively coupled to the docking board. The docking board sends power to and receive a control signal from the processor board when operatively coupled to the processor board and does not send power and does not receive a control signal when not operatively coupled to the processor board. The docking board is removably coupled to an expansion board that performs a computer function that is not performed by the processor board and the docking board. The docking board sends power and a control signal to the expansion board when the docking board is operatively coupled to the processor board and the expansion board, and does not send power and does not send a control signal to the expansion board when the docking board is not operatively coupled to the processor board and the expansion board.Type: ApplicationFiled: April 16, 2024Publication date: August 8, 2024Applicant: Management Services Group, Inc., doing business as (DBA) Global Technical SystemsInventor: Thomas Scott MORGAN
-
Publication number: 20240265031Abstract: Described herein is a method, system, and non-transitory computer readable medium for preventing data loss from both producer and consumer systems in continuous availability event-driven applications. The process for preventing data loss may replicate events at the broker level, and selectively receive replica events at the consumer level to account for the case the originally sent event is not received, while conserving computer and network resources. Alternatively, events and replica events may be received in duplicate. In either mode of reception, machine-learning may be used for implementing algorithms which further help to conserve resources and aid in preventing further data loss.Type: ApplicationFiled: February 13, 2024Publication date: August 8, 2024Applicant: Capital One Services, LLCInventor: Sunil KAITHA
-
Publication number: 20240265103Abstract: Systems and methods for detecting and localizing manipulations of portable document format (PDF) files are provided. The system receives one or more PDF files and processes each PDF file using a plurality of check processes. Each check process includes a defined or learned weight that determines that process's level of influence on any document's overall suspicion score, as well as an opinion score for each PDF file based on unique logic and a plurality of factors related to the particular PDF file. The system can generate an overall suspicion score for the PDF file based on the results of the check processes, which can be calculated by aggregating the weight and an opinion score associated with each check process and file. The system can then determine whether the PDF file is a suspicious file using the overall suspicion score.Type: ApplicationFiled: February 8, 2024Publication date: August 8, 2024Applicant: Insurance Services Office, Inc.Inventors: Matthew D. Frei, Cherie Ekholm, Shubhi Singh, Zheng Zhong, Palak Jain
-
Publication number: 20240265104Abstract: A method and related system operations include obtaining a time-ordered set of action types and generating a first dataset by determining, for each respective stored sequence of a plurality of stored sequences, a respective dataset element indicating that the respective stored sequence is present in the time-ordered set of action types. The method may also include generating a reduced dataset based on the first dataset by detecting that the first dataset indicates that a first sequence and a second sequence are present in the time-ordered set of action types, determining a reduced dataset element based on the detection of a presence of the first sequence and the second sequence in the time-ordered set of action types and a score between the first sequence and the second sequence indicated by a table, and detecting malicious activity using a decision model based on the reduced dataset.Type: ApplicationFiled: February 8, 2023Publication date: August 8, 2024Applicant: Capital One Services, LLCInventors: Samuel SHARPE, Christopher Bayan BRUSS, Maximo MOYER
-
Publication number: 20240265404Abstract: Disclosed herein are systems and methods for managing transaction disputes. Techniques include accessing a transaction pattern model associated with a user account; detecting deviation of a transaction from the transaction pattern model; transmitting, based on the detected deviation, transaction data to a user device; receiving an input at the user device in response to the transmitted data; generating, based on the received input, dispute data; storing the dispute data; monitoring data extracts associated with the user account; detecting, based on the monitoring, a data extract indicating a posted state of a transaction associated with the dispute data; and updating the dispute data based on the data extract indicating the posted state.Type: ApplicationFiled: April 3, 2024Publication date: August 8, 2024Applicant: Fidelity Information Services, LLCInventors: Jeffrey Paul Kubler, Shane Saunders, Joseph Fredric Sutthoff, Joe Leung, Lauren Morrison, Matthew Petersen, David Raynault, Philip J. Ponsaran
-
Publication number: 20240264808Abstract: Developing a new solution or revising an existing solution to meet organizational requirements is often time consuming. One solution to overcome the above problem is to integrate existing solution providers like bots without affecting the overall performance. Conventional methods integrate bots performing similar operations. To overcome the challenges in the conventional approaches, the present disclosure provides a method and system for Machine learning (ML) based integration of bots. The present disclosure integrates a plurality of dissimilar bots using ML approach. Further, the present disclosure enables an end-user to combine two or more similar or dissimilar bots using an interface. The end-user/user can create, combine, validate and test the combined dissimilar bots without any prior knowledge of programming. Furthermore, the present disclosure auto-recommends the end-user regarding which bots can be combined with the selected bots by checking the technical and end-user feasibility.Type: ApplicationFiled: January 31, 2024Publication date: August 8, 2024Applicant: Tata Consultancy Services LimitedInventors: NIMESH SHIVABHAI PATEL, SHREEKANT WAMAN SHIRALKAR, ZUBEENA SHIREEN SHEIKH, DHAIRYA MAULESH DHOLAKIA, DRASHTI VIJAYBHAI PATEL