Patents Assigned to Service
-
Patent number: 11834316Abstract: A gas stem assembly is disclosed including a vent tube having at least one protrusion extending radially from the vent tube and a receiver having a non-circular opening and an attachment surface at an end of the non-circular opening. The vent tube is at least partially insertable through the non-circular opening of the receiver when the vent tube and the at least one protrusion are aligned with the non-circular opening. The attachment surface of the receiver contacts the at least one protrusion to inhibit the at least one protrusion from passing back through the non-circular opening when the at least one protrusion is misaligned with the non-circular opening.Type: GrantFiled: October 28, 2022Date of Patent: December 5, 2023Assignee: M&M Machinery Services, Inc.Inventor: Alton W. Mowdy
-
Publication number: 20230384281Abstract: Milk is consumed in large quantities across the world and quality of milk is important to consumer. Multilayer packaging is one of solution to maintain quality of milk for prolonged period. However, quality of milk may change due to issues in handling, transportation, environment, and packaging. Currently available techniques fail to detect milk quality when packaging is opaque. Hence, common methods that are used for detecting quality of milk cannot be easily used over packaged milk. Present application provides non-invasive method and system for detecting quality of packaged milk. More specifically, system uses a sensing technique enabled in a capacitive Near-field communication (NFC) tag and an NFC enabled device for detecting quality of the packaged milk in real-time. In particular, the capacitive NFC tag is configured to provide milk quality information on NFC enabled device when NFC enabled device comes near capacitive NFC tag configured on packaged container.Type: ApplicationFiled: May 17, 2023Publication date: November 30, 2023Applicant: Tata Consultancy Services LimitedInventors: SHRIKANT ARJUNRAO KAPSE, PRIYA KEDIA, JAYITA DUTTA, SHANKAR BALAJIRAO KAUSLEY, PARAMA PAL, PARIJAT DILIP DESHPANDE, BEENA RAI
-
Publication number: 20230388403Abstract: Methods and systems are disclosed herein for using one or more machine learning models to determine whether a user is expected to complete a task or action by a deadline. The one or more machine learning models may be trained and/or used to recommend a communication protocol for sending a reminder to the user such that the user is predicted to be more likely to complete an action by the action's deadline. A computing system may use the one or more machine learning models to generate a recommendation for type of reminder to send, for example, if it is predicted that the user is not expected to complete the task by the deadline. A computing system may determine the message to send, the communication protocol to use, and/or the time to send the message.Type: ApplicationFiled: August 7, 2023Publication date: November 30, 2023Applicant: Capital One Services, LLCInventors: Sara BRODSKY, Jennifer KWOK, Tania CRUZ MORALES, Joshua EDWARDS, Abhay DONTHI, Jason ZWIERZYNSKI
-
Publication number: 20230385817Abstract: Various embodiments are generally directed to NFC-based mobile currency transfers. A mobile payment may be programmatically initialized when at least two mobile devices come into NFC communications range. A payment card associated with an account used to fund the currency transfer may be tapped to one or more of the devices to allow a server to validate the currency transfer.Type: ApplicationFiled: August 15, 2023Publication date: November 30, 2023Applicant: Capital One Services, LLCInventors: Rajko ILINCIC, Jeffrey RULE
-
Publication number: 20230385456Abstract: Methods and systems are disclosed for using a feature hierarchy with multiple levels with a different number of features at different levels to segment a dataset. The mechanism may use the first level of the hierarchy to segment a dataset into multiple datasets and then generate a timeseries dataset for each segment. Those timeseries datasets may be input into an anomaly detection model to identify a number of anomalies detected within those segments. Based on the number of anomalies not reaching a threshold, a second level of the hierarchy may be used to segment the dataset. Those segments may be input into the anomaly detection model to determine a number of anomalies for the second level. This process may continue until a level of the hierarchy is determined such that the number of anomalies reaches the threshold. The mechanism may then generate a security rule to deal with the anomalies.Type: ApplicationFiled: May 25, 2022Publication date: November 30, 2023Applicant: Capital One Services, LLCInventors: Adam BEAUREGARD, Michal HYRC, Peter Gaspare TERRANA, Vannia GONZALEZ MACIAS
-
Publication number: 20230386354Abstract: The present disclosure addresses unresolved problem of monopoly in content authoring, creation of dependency loop by providing a single, scalable, one-stop knowledge platform offering high degree of customization by multiple users and leveraging emerging technologies for rapid end-to-end game or learning solutions development. Embodiment of the present disclosure provides methods and systems for providing customized game-based learning and assessment framework. The present disclosure provides a mechanism to configure custom content into a readymade learning and assessment platform. The framework proposed in the present disclosure is custom built to support scalable architecture of a modular digital learning platform, and its functionalities. The system of the present disclosure allows content creators to author custom content to create immersive learning experience that could range from Spatial three-dimensional (3D) technologies, Augmented Reality (AR) and Virtual Reality (VR) or games at one place.Type: ApplicationFiled: November 29, 2022Publication date: November 30, 2023Applicant: Tata Consultancy Services LimitedInventors: Viral Prakash SHAH, Giscard Philip Surendra FERRAO, Rajesh SUNDARESAN
-
Publication number: 20230385905Abstract: A computer-implemented method for generating pre-purchasing confidence recommendations. A browser widget scans post-sale activities of a user and searches for product-specific parameters of items from the scanned purchase records. A system stores the searched product-specific parameters and the post-sale activities in a data storage. The browser widget monitors purchasing activities of the user, and in response to the monitoring, retrieving, relevant product-specific parameters and the post-sale activities matching to the monitored purchasing activities. Based on the retrieving, generating a pre-purchasing confidence recommendation to the user before completion of a purchase by the user.Type: ApplicationFiled: August 14, 2023Publication date: November 30, 2023Applicant: Visa International Service AssociationInventor: Nikhil PATIL
-
Publication number: 20230386229Abstract: Computer vision systems and methods for text classification are provided. The system detects a plurality of text regions in an image and generates a bounding box for each detected text region. The system utilizes a neural network to recognize text present within each bounding box and classifies the recognized text, based on at least one extracted feature of each bounding box and the recognized text present within each bounding box, according to a plurality of predefined tags. The system can associate a key with a value and return a key-value pair for each predefined tag.Type: ApplicationFiled: January 24, 2023Publication date: November 30, 2023Applicant: Insurance Services Office, Inc.Inventors: Khoi Nguyen, Maneesh Kumar Singh
-
Publication number: 20230385659Abstract: Existing digital marking systems employ round robin mechanism for assigning candidate responses to faculty members for correction which may require manually feeding routing data. These mechanisms do not accommodate specific requirements when rules are to be applied for answer scripts assignment to markers and do not take into consideration marking quality and schedule. Present disclosure provides systems and methods that achieve high marking standards by assigning answer script to a most eligible marker wherein parts of answer script are assigned to most eligible domain marker in case of segmented marking. Marker and answer script attributes are captured that form part of assignment rules thus enabling creation of conditions. Marker profiles are generated based on expertise and availability.Type: ApplicationFiled: October 11, 2022Publication date: November 30, 2023Applicant: Tata Consultancy Services LimitedInventors: VIRAL PRAKASH SHAH, MAHESH PATNAR, DIVYA KANAMULLA, ROHITH REDDY RIKKA, JAYALAKSHMI KARAMCHETI
-
Publication number: 20230385123Abstract: Embodiments herein provide a method and system for recommending cost optimization options for a cloud resource. The system and method employ a predefined library of optimization models to determine a best cost optimization options for a cloud resource. The one or more cloud optimization models will be available for different cloud resource type. Each cloud optimization model includes one or more cost optimization levers that can be applied to a cloud resource type. Each of the cost optimization lever includes one or more criteria to check for a condition based on the inputs provided. This criteria will generally be different for business critical and non-mission critical applications. Usage patterns, where each usage pattern is a combination of one or more optimization levers that can be applied together, including the sequence in which to apply. Herein, each criteria to shortlist the best cost saving options.Type: ApplicationFiled: May 25, 2023Publication date: November 30, 2023Applicant: Tata Consultancy Services LimitedInventors: Prasad Babu PAPPURU, Girish Phadke
-
Publication number: 20230385840Abstract: A system and method for preventing government identification-based fraud is disclosed. When a government identification submission session is initiated, several layers of security checks are performed to ensure that the user behind the session is not a fraudster. First, a session check is performed to ensure that the user device has not initiated more than a predetermined number of sessions within a predetermined time. Next, an attempt check is made in order to ensure that the user has not made more than a predetermined number of government identification submission attempts during the current session. Next, a dual-authentication check is performed to ensure that the phone number provided for the dual-authentication has not been used more than a maximum number of times during a recent period of time. And lastly, a general risk assessment is performed to look for any remaining high-risk flags.Type: ApplicationFiled: May 15, 2023Publication date: November 30, 2023Applicant: Capital One Services, LLCInventors: Christopher LANGE, Xinrou LI, Melissa Yoemans HENG, Hrishikesh Milind KARAMBELKAR
-
Publication number: 20230385912Abstract: Aspects described herein may allow for auto-locating a user in a parking lot and/or automatically directing a user to recommended inventory. For example, a customer may capture an image of a vehicle, or a marker associated with a vehicle, in a parking lot. The image may be processed locally or at a server. A vehicle may be identified based on analysis of the image. Further, information regarding the user may be processed to determine another vehicle appropriate for a recommendation. For example, a prompt on a mobile device may suggest a popular model similar to the vehicle being viewed. The system may then provide directions (e.g., augmented reality directions) to the user to direct the user to the vehicle.Type: ApplicationFiled: August 8, 2023Publication date: November 30, 2023Applicant: Capital One Services, LLCInventors: Geoffrey Dagley, Qiaochu Tang, Micah Price, Avid Ghamsari, Jason Hoover
-
Publication number: 20230382571Abstract: An apparatus configured to provide portioned instances of a compressible material includes a channel assembly, a gas source, a cutting assembly, and a discharge assembly. The channel assembly holds a bulk instance of the material extending through upper and lower channels of a continuous channel. The gas source supplies gas to compress the bulk instance. The cutting assembly moves in relation to the channel assembly to isolate the upper and lower channels, severing upper and lower material portions of the bulk instance. The discharge assembly directs gas to impinge on a lower face of the cutting assembly to discharge the lower material portion as a portioned instance. The channel assembly may be moveable, where operation of the gas source, cutting assembly, and/or discharge assembly are based on moving the channel assembly between various positions. The gas supply may be controlled based on a determined property of the portioned instance.Type: ApplicationFiled: August 8, 2023Publication date: November 30, 2023Applicant: Altria Client Services LLCInventors: Dwight David WILLIAMS, James David EVANS, Patrick Sean MCELHINNEY, Jarrod Wayne CHALKLEY
-
Publication number: 20230385804Abstract: Methods and systems are disclosed for providing Near Field Communications. In certain embodiments, an Android mobile operating system based mobile device is configured with software that, when executed by one or more processors, determines whether the mobile device is to perform an NFC communication with a contactless payment terminal (CPT) using a secure element associated with an NFC controller included in the mobile device. Based on the determination, the mobile device is configured to execute software that performs communications with the CPT using the NEC controller.Type: ApplicationFiled: July 26, 2023Publication date: November 30, 2023Applicant: Capital One Services, LLCInventor: Panayiotis VARVAREZIS
-
Publication number: 20230385451Abstract: A compromised data exchange system extracts data from websites using a crawler, detects portions within the extracted data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compares a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. A risk score may be assigned to a data item within the database in response to determining the match. In some embodiments, URL data may also be detected in the extracted data. The detected URL data represents further websites that can be automatically crawled by the system to detect further PII data.Type: ApplicationFiled: April 17, 2023Publication date: November 30, 2023Applicant: Early Warning Services, LLCInventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R. Bonin, Michael Cook
-
Publication number: 20230381293Abstract: Recombinant Norovirus Virus-Like Particles (VLPs) formed from recombinant Norovirus VP1 proteins, and methods of their use and production are disclosed. In several embodiments, the Recombinant Norovirus VLPs can be used to generate an immune response to Norovirus VP1 protein in a subject. In additional embodiments, an effective amount of the recombinant Norovirus VLPs can be administered to a subject in a method of inhibiting a Norovirus infection.Type: ApplicationFiled: October 14, 2021Publication date: November 30, 2023Applicants: The United States of America, as represented by the Secretary, Department of Health and Human Servic, The University of North Carolina at Chapel Hill, Board of Regents, the University of Texas SystemInventors: Peter Kwong, Raffaello Verardi, Yaroslav Tsybovsky, Jason Gorman, Gwo-Yu Chuang, Li Ou, Lisa Lindesmith, Ralph Baric, George Georgiou, Inga Rimkute, Mario Roederer
-
Publication number: 20230385553Abstract: Disclosed are an apparatus, a system and a non-transitory computer readable medium that implement processing circuitry that receives non-dialog information from a smart device and determines a data type of data in the received non-dialog information. Based on the determined data type, the processing circuitry transforms the received first data using an input from a machine learning algorithm into transformed data. The transformed data is standardized data that is palatable for machine learning algorithms such as those used implemented as chatbots. The standardized transformed data is useful for training multiple different chatbot systems and enables the typically underutilized non-dialog information to be used to as training input to improve context and conversation flow between a chatbot and a user.Type: ApplicationFiled: June 1, 2023Publication date: November 30, 2023Applicant: Capital One Services, LLCInventors: Alan SALIMOV, Anish KHAZANE, Omar FLOREZ CHOQUE
-
Publication number: 20230384920Abstract: Methods and systems for monitoring through graphical user interfaces are disclosed. In one aspect, a system is disclosed that includes a processor and data storage including instructions that, when executed by the processor, cause the system to perform operations. The operations include maintaining an input file including predetermined criteria for a plurality of factors, receiving a model dataset generated using a model, based on the input file and the model dataset, generating a first graphical user interface that includes a graphical illustration of a subset of the plurality of factors, a model risk for the model, and a selectable feature associated with a selected factor in the subset and a selected time period. The operations further include receiving through the first graphical user interface a selection of the selectable feature, and, in response, generating a second graphical user interface that recolors a portion of the first graphical user interface.Type: ApplicationFiled: August 11, 2023Publication date: November 30, 2023Applicant: Capital One Services, LLCInventors: Seemit SHETH, Prashanta SAHA, Huey-Meng NING, Romit DASGUPTA, Joydeep DASGUPTA, Xinyu CHEN, Sandeep KOMATIREDDY
-
Publication number: 20230385454Abstract: A system for providing updatable secure content resource. A content server may pay a content resource on the content author for an access by a requester. The content server receives a session request call from the requester prior to accessing the content resource. In response to the session request, the content server generates a session for the requester. The content server generates a payload that includes a location identifying the content resource on the content author and embeds the embedded cryptographic content. The content server transmits the generated payload to the requester. A resource server may receive an authentication access request in response to the embedded cryptographic content. In response to authenticating the authentication access request, the resource server provides the access to the requester.Type: ApplicationFiled: July 27, 2023Publication date: November 30, 2023Applicant: Visa International Service AssociationInventors: James DONALDSON, Bartlomiej PROKOP
-
Publication number: 20230383891Abstract: A method and system for a pipeline inspection gauge. The method may include disposing a pipeline inspection gauge in a pipeline. The pipeline inspection gauge may comprise one or more modules attached to each other and an orifice. The pipeline inspection gauge may further include a generator disposed within at least one of the one or more modules, a turbine connected to the generator through a shaft, and at least four wheels connected to an outer surface of at least one of the one or more modules. The method may further include moving the pipeline inspection gauge using an at least partially opened orifice, wherein force from fluid flow in the pipeline is transferred through the orifice to the pipeline inspection gauge to create movement and creating a positive pressure pulse by closing the at least partially opened orifice.Type: ApplicationFiled: May 26, 2023Publication date: November 30, 2023Applicant: Halliburton Energy Services, Inc.Inventor: Imran Sharif Vehra