Patents Assigned to Service
-
Patent number: 11891867Abstract: Disclosed herein are aspects of an expandable metal wellbore anchor for use in a wellbore. The expandable metal wellbore anchor, in one aspect, includes one or more expandable members positionable on a downhole conveyance member in a wellbore, wherein the one or more expandable members comprise a metal configured to expand in response to hydrolysis, and wherein a combined volume of the one or more expandable members is sufficient to expand to anchor one or more downhole tools within the wellbore in response to the hydrolysis.Type: GrantFiled: October 29, 2019Date of Patent: February 6, 2024Assignee: Halliburton Energy Services, Inc.Inventors: Michael Linley Fripp, Stephen Michael Greci
-
Patent number: 11893576Abstract: A transaction card includes a near-field communication (NFC) component, a security component, a wireless component, one or more memories, and one or more processors communicatively coupled to the one or more memories. The device receives a signal from a user device attempting to access a secure application, and energizes the NFC component based on the signal received from the user device. The device causes the security component to generate an encrypted code based on the NFC component being energized, and provides, via the security component, the encrypted code to the wireless component. The device provides, via the wireless component, the encrypted code to the user device to permit the user device to utilize the encrypted code as authentication for accessing the secure application.Type: GrantFiled: February 9, 2022Date of Patent: February 6, 2024Assignee: Capital One Services, LLCInventors: James Zarakas, Molly Johnson, Robert Perry, Adam Koeppel, Tyler Locke
-
Publication number: 20240037525Abstract: Systems and methods are disclosed for the deposit, withdrawal, and reuse of currency for transactions. According to disclosed embodiments, an intelligent teller machine (ITM) is configured to receive currency as payment for a transaction, to calculate and dispense any change due, and to request that the net value of the transaction (e.g., the revenue) be deposited into the financial account of the business. The currency received by the ITM is also available to make change for future purchase transactions.Type: ApplicationFiled: September 29, 2023Publication date: February 1, 2024Applicant: Capital One Services, LLCInventors: Adam R. KOEPPEL, Alex Leo NIDERBERG
-
Publication number: 20240032584Abstract: An example embodiment includes a tongue includes a forming surface of a forming channel, the forming channel configured to enable the shaping of shredded material into a desired form as a shredded material is drawn through the forming channel and an arrangement to introduce at least a portion of a web component adjacent a portion of the forming surface such that the introduced web component portion may be operative upon the drawn shredded material as a source of additional drawing action. The tongue may include an arrangement to draw a moving web into the tongue through a channel that converges with the working surface of the tongue, whereby the moving web is interposable between a moving column of shredded material and the first surface portion of the working surface to reduce friction. The tongue may further comprise an arrangement comprising a scalloped surface portion along the working surface of the tongue.Type: ApplicationFiled: October 11, 2023Publication date: February 1, 2024Applicant: Altria Client Services LLCInventors: Patrick S. MCELHINNEY, Dwight D. WILLIAMS
-
Publication number: 20240037458Abstract: Systems and methods for reducing network traffic associated with a service. In some aspects, the systems and methods provide for using a first machine learning model to process a data stream for a communication with a user and generate a confidence score regarding whether to assign a communication suppression flag to the user account. Based on the confidence score not exceeding a first threshold, a communication suppression flag is not assigned to the user account. Based on the confidence score being between first and second thresholds, at least a portion of the data stream is extracted based on temporal proximity to a time stamp of an intent of the user to not receive further communications. Using a second machine learning model, the extracted portion of the data stream is processed to generate a prediction regarding whether to assign a communication suppression flag to the user account.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Applicant: Capital One Services, LLCInventors: Mia RODRIGUEZ, Michael Mossoba, Vahid Khanagha, Joshua Edwards, Tyler Maiman, Guadalupe Bonilla, Aysu Ezen Can, Alexander Lin, Meredith L. Critzer, Feng Qiu
-
Publication number: 20240034504Abstract: A method includes separating a portion of a flattened tube of stock packing material to a custom length to form a pouch pre-form and closing a first end of the pouch pre-form leaving a second end of the pouch pre-form open. The method can include placing product into the pouch pre-form and closing the one open end of the pouch pre-form to form a closed pouch containing the product.Type: ApplicationFiled: August 7, 2023Publication date: February 1, 2024Applicant: WestRock Shared Services, LLCInventors: Greg Magnell, Jon Sonnenberg, Jeffrey Willers
-
Publication number: 20240035375Abstract: A method and a system for a confined compressive strength (CCS) and an unconfined compressive strength (UCS) for one or more bedding layers. The method may include identifying a depth interval during a drilling operation as a distance between a first depth and a second depth, measuring one or more drill bit responses within the depth interval using a sensor package disposed on the drill bit, identifying one or more torsional bit vibrations, and identifying one or more bedding layers of the formation within the depth interval from the one or more torsional bit vibrations. The method may further include identifying the (CCS) and the (UCS) for each of the one or more bedding layers and identifying a bit wear of the drill bit within each of the one or more bedding layers using the one or more drill bit responses and the one or more torsional bit vibrations.Type: ApplicationFiled: July 27, 2022Publication date: February 1, 2024Applicant: Halliburton Energy Services, Inc.Inventors: Shilin Chen, Van Jordan Brackin, Jonathan Kollar
-
Publication number: 20240040074Abstract: An apparatus for performing image searches including a camera, storage devices storing a set of instructions, and a processor coupled to the at least one storage device and the camera. The instructions configure the at least one processor to perform operations including identifying attributes of the captured image using a classification model; identifying first results based on the identified attributes; selecting a subset of first results based on corresponding probability scores, generating a first graphical user interface including interactive icons corresponding to first results in the subset, an input icon, and a first button. The operations may also include receiving a selection of the first button, performing a search to identify second results, and generating a second graphical user interface displaying the second results.Type: ApplicationFiled: October 3, 2023Publication date: February 1, 2024Applicant: Capital One Services, LLCInventors: Micah PRICE, Chi-San HO, Yue DUAN
-
Publication number: 20240037988Abstract: The present disclosure detects a pupil of an eye using circle formation based scoring method. The conventional approaches fail to provide an accurate and reliable biometric authentication due to the usage of simple thresholding based statistical methods and iris dependent segmentation methods. The present disclosure utilizes a circle plotting approach and selects the optimum circle using several parameters. The present disclosure can generate a pupil boundary that fits the pupil region inside an iris perfectly. Initially, the system receives an input image of an eye. After removing reflections, a core point of the reflection free image is identified. Further, a plurality of points are obtained based on a sudden gradient change. and a plurality of circles are plotted. Further, an optimum circle is identified using a score based optimum circle selection method. Finally, the pupil associated with the input image is identified based on the optimum circle.Type: ApplicationFiled: July 20, 2023Publication date: February 1, 2024Applicant: Tata Consultancy Services LimitedInventors: SURABHI GARG, SESHU SRI PONNAPALLI, RAJAN MINDIGAL ALASINGARA BHATTACHAR, ARVIND RAMCHANDRA Jadhav, DEEPTHI KOLLIPARA
-
Publication number: 20240037610Abstract: A system and method for automatically detecting, classifying, and processing objects captured in an image. The system receives an image from the image source and detects one or more objects in the image. The system then performs a high-level classification of each of the one or more objects in the image and extracts each of the one or more objects from the image. The system then performs a specific classification of each of the one or more objects and determines a price of each of the one or more objects. Finally, the system generates a pricing report comprising a price of each of the one or more objects.Type: ApplicationFiled: October 10, 2023Publication date: February 1, 2024Applicant: Insurance Services Office, Inc.Inventors: Bruce Zachary Porter, Dean Lebaron
-
Publication number: 20240037522Abstract: Systems and methods for processing a financial transaction are provided. In a method conducted at an issuing server computer associated with a first entity, a transaction request message is transmitted to an acquiring server computer associated with a second entity. The transaction request message is in respect of a push transaction in which funds from the first entity are transferred to the second entity and includes a first set of data elements. In response to transmitting the transaction request message, a transaction response message and a second set of data elements are received. The second set of data elements are associated with the first set of data elements and the financial transaction is processed using information contained in the first set of data elements and the second set of data elements.Type: ApplicationFiled: October 5, 2023Publication date: February 1, 2024Applicant: Visa International Service AssociationInventors: Koni Uttam Nayak, Ashish Kulpati, Pankaj Rajurkar, Glenn Leon Powell
-
Publication number: 20240037974Abstract: Described herein is a system for automatically capturing images. A device may execute an application on the device. In response to receiving a request for capturing an image of a document, the application may control the operation of the camera to contemporaneously and continuously capture image frames of an area within the field of view of a camera of the device. The field of view may include an object and in turn may be included in the captured image frames. The application may determine whether the aspect ratio and real-world size of the object in the captured image frames corresponds with a specified threshold size and aspect ratio which corresponds with a given document type. In response to determining the object corresponds to the given document type, the camera may automatically extract an image of the object.Type: ApplicationFiled: August 14, 2023Publication date: February 1, 2024Applicant: Capital One Services, LLCInventors: Jason PRIBBLE, Daniel Alan JARVIS, Nicholas CAPURSO
-
Publication number: 20240033448Abstract: An aerosol-generating system may include an electrical power supply, an electrical heater connected to the electrical power supply, and a substrate container. The substrate container may define a blind cavity containing an aerosol-forming substrate in the form of a gel that is a solid at room temperature. The electrical heater is external to the substrate container and configured to heat the substrate container to generate a vapor without contacting the aerosol-forming substrate. As result, the possibility of unwanted materials building up on the electrical heater can be reduced, thereby providing a more reliable and consistent performance.Type: ApplicationFiled: October 16, 2023Publication date: February 1, 2024Applicant: Altria Client Services LLCInventors: Gerard ZUBER, Jean-Yves VOLLMER
-
Publication number: 20240038224Abstract: Accuracy of transcript is of foremost importance in Automatic Speech Recognition (ASR). State of the art system mostly rely on spelling correction based contextual improvement in ASR, which is generally a static vocabulary based biasing approach. Embodiments of the present disclosure provide a method and system for visual context aware ASR. The method provides biasing using shallow fusion biasing approach with a modified beam search decoding technique, which introduces a non-greedy pruning strategy to allow biasing at the sub-word level. The biasing algorithm brings in the visual context of the robot to the speech recognizer based on a dynamic biasing vocabulary, improving the transcription accuracy. The dynamic biasing vocabulary, comprising objects in a current environment accompanied by their self and relational attributes, is generated using a bias prediction network that explicitly adds label to objects, which are detected and captioned via a state of the art dense image captioning network.Type: ApplicationFiled: June 13, 2023Publication date: February 1, 2024Applicant: Tata Consultancy Services LimitedInventors: CHAYAN SARKAR, PRADIP PRAMANICK, RUCHIRA SINGH
-
Publication number: 20240037652Abstract: The present disclosure relates to systems and methods for generating real-time quotes using machine learning algorithms. The system may include a processor in communication with a client device, and a storage medium storing instructions that, when executed, cause the processor to perform operations including: receiving an image of a vehicle from the client device, extracting one or more features from the image, based on the extracted features and using a machine learning algorithm, identifying one or more attributes of the vehicle, based on the identified attributes of the vehicle, determining a make and a model of the vehicle, obtaining comparison information based at least in part on the determined make and model, estimating a quote for the vehicle based on the comparison information; and transmitting the estimated quote for display on the client device.Type: ApplicationFiled: April 18, 2023Publication date: February 1, 2024Applicant: Capital One Services, LLCInventors: Qiaochu TANG, Sunil Subrahmanyam VASISHT, Stephen Michael WYLIE, Geoffrey DAGLEY, Micah PRICE, Jason Richard HOOVER
-
Publication number: 20240035359Abstract: A controllable downhole scraper includes a fluid reservoir having a pressure wall positioned and movable within the fluid reservoir defining a first portion of the fluid reservoir including a first fluid. The pressure wall exerts a force on the first fluid to maintain a first pressure. A scraper blade is movable between a retracted and an extended position. A sleeve is positioned on a tubular and slidable between a first position engaging the scraper blade to move into the retracted position, and a second position engaging the scraper blade to move into the extended position. The sleeve is configured to move between the two positions through a reduction in the first pressure in the first fluid. A restrictor is fluidly coupled between the fluid reservoir and a pressure reservoir. A gas reservoir, fluidly coupled to the first fluid, is selectively operable to reduce the first pressure in the first fluid.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Applicant: Halliburton Energy Services, Inc.Inventors: Stephen Michael GRECI, Michael Linley FRIPP, Finn Gamble MCCARTHY
-
Publication number: 20240037225Abstract: Systems and methods are disclosed for identifying resources responsible for events. In one embodiment, a method may include determining a number of unique actors in a plurality of actors that have accessed the resource. The method may further include identifying from the plurality of actors a set of affected actors that has been affected by an event and identifying from the set of affected actors a subset of resource-affected actors that accessed the resource prior to being affected by the event. The method may further include determining a number of resource-affected actors in the subset of resource-affected actors and, based on the number of unique actors and the number of resource-affected actors, determining an event score for the resource. The event score may be a lower bound of a confidence interval of a binomial proportion of the number of resource-affected actors to the number of unique actors.Type: ApplicationFiled: October 9, 2023Publication date: February 1, 2024Applicant: Capital One Services, LLCInventors: Chris MORADI, Jacob SISK, Evan BLOOM, Craig GIMBY, Xin SUN
-
Publication number: 20240039798Abstract: Methods and systems are described herein for generating communication modifications to reduce inaccurate machine-learning-based communication suppressions. The system may receive a candidate communication to be sent to a user device or user account. The system may generate a prediction indicating whether a negative action is likely to be taken by a machine learning model with respect to the candidate communication. Based on a prediction that a negative action is likely to be taken by a machine learning model with respect to the candidate communication, the system may modify the candidate communication.Type: ApplicationFiled: August 1, 2022Publication date: February 1, 2024Applicant: Capital One Services, LLCInventors: Christopher McDANIEL, Matthew Louis NOWAK, Michael Anthony YOUNG, JR.
-
Publication number: 20240035505Abstract: The method includes first defining a longitudinal channel in a major body, the major body including a first portion, a second portion and a flange, the flange being located between the first portion and the second portion, the longitudinal channel traversing through a longitudinal length of the major body from the first portion through the second portion, the first portion including a shaft, and second defining a first side end of the flange, the first side end at least partially defining a first segment of at least one first airflow inlet, the first segment being in communication with the longitudinal channel.Type: ApplicationFiled: October 11, 2023Publication date: February 1, 2024Applicant: Altria Client Services LLCInventors: Robert LEVITZ, Shmuel GAVRIELOV
-
Publication number: 20240039721Abstract: Methods and systems are described herein for enabling users to access user data of other users using cryptographic tokens. A data access system may be used to enable access. The system may receive a blockchain operation request for enabling access to first user data associated with a first user. The system may generate a cryptographic token and an access entry. When the system receives a second blockchain operation request for accessing the first user data, the system may determine one or more parameters for accessing the first user data. In response to verifying the one or more parameters, the data access system may enable access to the first user data.Type: ApplicationFiled: July 26, 2022Publication date: February 1, 2024Applicant: Capital One Services, LLCInventors: Andre YOUNG, Clayton JOHNSON, Cara WEIKEL, Judith RODRIGUEZ