Patents Assigned to Service
-
Publication number: 20230214289Abstract: Embodiments may generally be directed to systems and techniques to detect failure events in data pipelines, determine one or more remedial actions to perform, and perform the one or more remedial actions.Type: ApplicationFiled: February 24, 2023Publication date: July 6, 2023Applicant: Capital One Services, LLCInventor: Patrice BRAMBLE
-
Publication number: 20230216891Abstract: Embodiments disclosed are directed to a computing system that performs steps for providing security group differencing for applications stored in a cloud-based computing environment. The computing system receives a request to update an application stored in a cloud-based computing environment from a first version of the application to a second version of the application. The computing system identifies a first set of security group rules for the first version of the application and a second set of security group rules for the second version of the application. The computing system determines security group differencing data based on the first set of security group rules and the second set of security group rules. Subsequently, the computing system determines a security score based on the security group differencing data and provisions an adoption rule based on a comparison between the security score and a predetermined security score threshold.Type: ApplicationFiled: January 4, 2022Publication date: July 6, 2023Applicant: Capital One Services, LLCInventors: Joseph T. PAULCHELL, Mashour RAHMAN
-
Publication number: 20230212279Abstract: Methods of treating and preventing Alport syndrome through inhibiting interleukin 11 (EL-11)-mediated signalling are disclosed, as well as agents for use in such methods.Type: ApplicationFiled: June 17, 2021Publication date: July 6, 2023Applicants: Singapore Health Services PTE, LTD., National University of SingaporeInventors: Stuart Alexander Cook, Anissa Anindya, Sebastian Schaefer
-
Publication number: 20230214318Abstract: A method and system for finding vulnerabilities in a program using fuzzing have been provided. The disclosure provides a vulnerability detection framework using a language agnostic single fuzzer that can fuzz smart contracts written in different programming languages. The idea here is that a smart contract written in a high-level language is converted/compiled into an LLVM intermediate representation (LLVM IR) code and then perform the fuzzing on this LLVM IR code instead of fuzzing smart contract source code directly. The process of generating fuzz driver, report driver is automated by handling the standardization issue by carefully dividing the smart contracts into categories. The present disclosure is proposing processes of automation of fuzz or report driver generation. Further the language agnostic feature (done with intermediate representation) is also achieved. Further profiling is achieved which processes fuzzer output and generates meaningful data points.Type: ApplicationFiled: November 23, 2022Publication date: July 6, 2023Applicant: Tata Consultancy Services LimitedInventors: HARSHITA VANI NALLAGONDA, SIDDHASAGAR PANI, VIGNESWARAN RAMACHANDRAN, RAVEENDRA KUMAR MEDICHERLA, RAJAN MINDIGAL ALASINGARA BHATTACHAR
-
Publication number: 20230214527Abstract: Methods, systems, and devices for leveraging data already collected on a user in a secure and private manner, in particular to verify user credentials for third parties. The methods, systems, and devices innovate beyond traditional security and privacy platforms in computer systems by processing the data to create a useable metric for the purposes of the third parties, in which the useable metric preserves the security and privacy of the underlying data.Type: ApplicationFiled: March 13, 2023Publication date: July 6, 2023Applicant: Capital One Services, LLCInventors: Ya LIU, Matthew CARSON
-
Publication number: 20230215176Abstract: This relates generally to a method and a system for spatio-temporal polarization video analysis. The spatio-temporal polarization data is analyzed for a computer vision application such as object detection, image classification, image captioning, image reconstruction or image inpainting, face recognition and action recognition. Numerous classical and deep learning methods have been applied on polarimetric data for polarimetric imaging analysis, however, the available pre-trained models may not be directly suitable on polarization data, as polarimetric data is more complex. Further compared to analysis of the polarimetric images, a significant number of actions can be detected by polarimetric videos, hence analyzing polarimetric videos is more efficient. The disclosure is a spatio-temporal analysis of polarization video.Type: ApplicationFiled: December 21, 2022Publication date: July 6, 2023Applicant: Tata Consultancy Services LimitedInventors: Rokkam Krishna KANTH, Akshaya Ramaswamy, Achanna Anil Kumar, Jayavardhana Rama Gubbi Lakshminarasimha, Balamuralidhar Purushothaman
-
Publication number: 20230212509Abstract: Provided herein are methods of producing a distinct bilayer culture of retinal epithelial cells (RPE) with photoreceptor cells and/or photoreceptor precursor cells (PR/PRP). Further provided herein is a therapy comprising transplantation of the RPE and PR/PRP bilayer as well as methods for testing candidate drugs using the bilayer.Type: ApplicationFiled: May 28, 2021Publication date: July 6, 2023Applicants: FUJIFILM Cellular Dynamics, Inc., The United States of America, as represented by the Secretary, Department of Health and Human ServicInventors: Andrew DIAS, Erich BERNDT, Lucas CHASE, Juan AMARAL, Arvydas MAMINISHKIS, Kapil BHARTI
-
Publication number: 20230215197Abstract: Systems and methods for detection and localization of image and document forgery. The method can include the step of receiving a dataset having a plurality of authentic images and a plurality of manipulated images. The method can also include the step of benchmarking a plurality of image forgery algorithms using the dataset. The method can further include the step of generating a plurality of receiver operating characteristic (ROC) curves for each of the plurality of image forgery algorithms. The method also includes the step of calculating a plurality of area under curve metrics for each of the plurality of ROC curves. The method further includes the step of training a neural network for image forgery based on the plurality of area under curve metrics.Type: ApplicationFiled: August 9, 2022Publication date: July 6, 2023Applicant: Insurance Services Office, Inc.Inventors: Anurag Ghosh, Dongmian Zou, Maneesh Kumar Singh
-
Publication number: 20230210161Abstract: A smokeless tobacco system include one or more silicone smokeless tobacco products configured to generally retain their shape during processing, shipping, and consumer handling. Each silicone smokeless tobacco product can comprise a moist smokeless tobacco in combination with a silicone binder such that the final product has tobacco exposed along an exterior surface and is configured to have material properties providing improved handling, an improved mouth feel, and a satisfying flavor profile.Type: ApplicationFiled: January 25, 2023Publication date: July 6, 2023Applicant: Altria Client Services LLCInventors: Munmaya K. MISHRA, Frank Scott ATCHLEY, James Arthur STRICKLAND
-
Publication number: 20230212927Abstract: A perforating gun is disclosed with shaped charges at a preferential orientation. An example includes a gun body and a charge carrier disposed within the gun body. The charge carrier defines a longitudinal carrier axis and has a plurality of axially-spaced charge mounting locations. A plurality of charges are each pivotally mounted to the charge carrier at one of the respective charge mounting locations about a charge pivot axis transverse to the longitudinal carrier axis. The charges may preferentially align in response to gravity so their orientation remains constant throughout a range of inclination of the wellbore.Type: ApplicationFiled: March 11, 2022Publication date: July 6, 2023Applicant: Halliburton Energy Services, Inc.Inventors: Jason Karl Cook, Jason Paul Metzger, Randall Scott Moore, Matthew Craig Mlcak
-
Publication number: 20230210165Abstract: A wrapper for a smoking article has a base web and a plurality of elements each having at least a pair of patch areas where diffusivity is in the range of 0 to about 0.2 cm/sec. Patches of adjacent elements are circumferentially offset from one another along the axis of a smoking article. The add-on material can be applied by gravure printing in a single pass in a chevron pattern such that an apex of the element is co-linear with substantially symmetrically spaced points on a trailing, outer edge of an adjacent element. Testing elements may be simultaneously printed with the add-on material to monitor diffusivity and/or presence of add-on material.Type: ApplicationFiled: March 8, 2023Publication date: July 6, 2023Applicant: Altria Client Services LLCInventors: Marc ROSE, Timothy S. Sherwood, Robert N. Smith
-
Publication number: 20230211805Abstract: A method for at least partially automated driving of a motor vehicle includes the steps of: determining that a need exists for infrastructure-based, at least partially automated driving of the motor vehicle, and transmitting, via a communication network, a request to transmit a plurality of infrastructure data based on which the motor vehicle is drivable in an at least partially automated manner, in response to determining that a need exists for infrastructure-based, at least partially automated driving of the motor vehicle. Receiving, via the communication network, the infrastructure data in response to transmitting the request. Generating a plurality of control signals for at least partially automated controlling of a lateral and/or a longitudinal operation of the motor vehicle based on the infrastructure data, and outputting the generated control signals.Type: ApplicationFiled: March 14, 2023Publication date: July 6, 2023Applicants: Robert Bosch GmbH, ASFINAG Maut Service GmbHInventors: Stefan Nordbruch, Michael Gabb, Uwe Wilbrand, Nico Latsch, Jacqueline Erhart, Yannick Wimmer, Friedrich Vogl
-
Publication number: 20230214828Abstract: A computer-implemented method for anonymizing online transaction details may include performing a process to generate an identifier (ID) and reference address for a user, and receiving a request for transaction processing from an e-commerce server. The request may include first data including: information associated with a purchase of a product to be delivered to the user; the identifier; and the reference address. The method may further include: in response to the request, determining whether the ID and reference address are included in the request, and if so, obtaining the accurate address and shipping rate rules; applying, based on the first data and the accurate address, the shipping rate rules to determine accurate shipping rate cost information associated with delivering the product to the accurate address; performing an anonymizing process on the accurate information to obtain anonymous shipping rate information, and transmitting the anonymous shipping rate information to the e-commerce server.Type: ApplicationFiled: March 13, 2023Publication date: July 6, 2023Applicant: Capital One Services, LLCInventors: Kyle JOHNSON, Michael MOSSOBA, Abdelkader BENKREIRA, Robert PERRY, Austen NOVIS, Max MIRACOLO, Natasha MITCHKO
-
Publication number: 20230216844Abstract: A first user device can transmit an interaction request to a remote computer via a long range communication channel. The first user device can receive an authentication request message from the remote computer and can then transmit the authentication request message to a second user device via a short range communication channel. The first user device can then receive an authentication response message comprising a response value from the second user device via the short range communication channel. The first user device can then transmit the authentication response message to the remote computer causing the remote computer to verify the response value and perform further processing if the response value is verified.Type: ApplicationFiled: March 15, 2023Publication date: July 6, 2023Applicant: Visa International Service AssociationInventor: Wilson Thampi
-
Publication number: 20230210170Abstract: A cartridge of an e-vaping device includes a housing extending in a longitudinal direction, a reservoir in the housing, a heater in the housing, and an absorbent material at least partially surrounding the sinusoidal shaped member. The reservoir is configured to store a pre-vapor formulation. The heater has a sinusoidal shaped member translating about an elliptical shape to define a channel there through. The absorbent material is in fluid communication with the reservoir.Type: ApplicationFiled: March 13, 2023Publication date: July 6, 2023Applicant: Altria Client Services LLCInventors: Shmuel GAVRIELOV, Yuval MALKA, Rangaraj S. SUNDAR, Isaac WEIGENSBERG, David RUBLI, Moshe ELIYAHU, Arye WEIGENSBERG, Scott A. FATH, Christopher S. TUCKER, William J. BOGDZIEWICZ
-
Publication number: 20230216659Abstract: This disclosure relates to a computer-implemented method, a data processing apparatus, a computer program, and a computer-readable storage medium for processing encrypted data. There is provided a computer-implemented method for processing encrypted data, comprising receiving a swap key, wherein the swap key is the product of an exclusive OR operation performed on a first key and a second key; receiving a first ciphertext, wherein the first ciphertext is encrypted with the first key and not encrypted with the second key; and performing an exclusive OR operation on the swap key and the first ciphertext to produce second ciphertext, such that the second ciphertext is encrypted with the second key and not encrypted with the first key.Type: ApplicationFiled: December 18, 2020Publication date: July 6, 2023Applicant: Barclays Execution Services LimitedInventor: George FRENCH
-
Publication number: 20230214804Abstract: Methods and systems for facilitating group payment are disclosed. In one embodiment, a group payment system is configured to execute instructions to perform operations that include receiving, from a first computing device, a request to create a group payment event and, in response, providing to the first computing device a first interface associated with the group payment event. The operations further include receiving, from a second computing device, a request to join the group payment event and, in response, providing a second interface to the second computing device. The operations further include receiving, from the first and/or second computing devices, messages associated with the group payment event and modifying the first and second interfaces to display the messages. The operations further include receiving, from the first and/or second computing devices, financial contributions for the group payment event and modifying the first and second interfaces to display the financial contributions.Type: ApplicationFiled: March 14, 2023Publication date: July 6, 2023Applicant: Capital One Services, LLCInventors: Yumi CLARK, Samuel WOLFAND, Srinivas NOOKALA, Mychilo CLINE, David NORMAN, Larry DAMMAN, Hashaam MARKAS, Adam ZEDLER, Sasikiran MYADAM, Dennis BRENNAN, David DAO
-
Publication number: 20230211484Abstract: A fastener sleeve is described, including a collating sleeve body and a plurality of cylindrical sheaths in the collating sleeve body, each cylindrical sheath engageable with a fastener. A sheathing panel is also described, including at least one barrier overlay secured to a panel, a plurality of fasteners engaged in the barrier overlay and the panel, a plurality of sealing cylindrical sheaths surrounding a portion of each fastener and positioned between the fastener and the barrier overlay, such that the sheathing panel has at least one of the following properties: a water vapor transmission rate of at least 7.0 grams/m2/24 hours at 73° F. and 50% relative humidity (RH), a water vapor permeance of at least 1.3 perms at 73° F. and 50% RH, or an air infiltration rate of less than 0.2 L/s-m2 at 75 pascals. A method of engaging the fasteners with the panel is also provided.Type: ApplicationFiled: November 22, 2022Publication date: July 6, 2023Applicant: GP Building Products Services LLCInventor: Richard D. JORDAN
-
Publication number: 20230213941Abstract: The embodiments of present disclosure herein address unresolved problem of cognitive navigation strategies for a telepresence robotic system. This includes giving instruction remotely over network to go to a point in an indoor space, to go an area, to go to an object. Also, human robot interaction to give and understand interaction is not integrated in a common telepresence framework. The embodiments herein provide a telepresence robotic system empowered with a smart navigation which is based on in situ intelligent visual semantic mapping of the live scene captured by a robot. It further presents an edge-centric software architecture of a teledrive comprising a speech recognition based HRI, a navigation module and a real-time WebRTC based communication framework that holds the entire telepresence robotic system together. Additionally, the disclosure provides a robot independent API calls via device driver ROS, making the offering hardware independent and capable of running in any robot.Type: ApplicationFiled: July 22, 2022Publication date: July 6, 2023Applicant: Tata Consultancy Services LimitedInventors: SNEHASIS BANERJEE, PRADIP PRAMANICK, CHAYAN SARKAR, ABHIJAN BHATTACHARYYA, ASHIS SAU, KRITIKA ANAND, RUDDRA DEV ROYCHOUDHURY, BROJESHWAR BHOWMICK
-
Publication number: 20230214368Abstract: In certain embodiments, machine learning and lineage data may be used to manage data. In some embodiments, a computing system may use lineage data to identify two datasets that may be related. The computing system may determine that a user has access to a derivative dataset but does not have access to an original dataset that was used to create the derivative dataset. In response, the computing system may use a machine learning model to generate a similarity score indicating a level of similarity between the original dataset and the derivative dataset. If the similarity score satisfies a threshold score, the computing system may modify access rights of the user so that the user is unable to access a portion of the data in the derivative dataset.Type: ApplicationFiled: January 3, 2022Publication date: July 6, 2023Applicant: Capital One Services, LLCInventors: William YE, Jon Stofer, Thomas J. O'Connor, Jose Moreno