Patents Assigned to Service
-
Publication number: 20230214804Abstract: Methods and systems for facilitating group payment are disclosed. In one embodiment, a group payment system is configured to execute instructions to perform operations that include receiving, from a first computing device, a request to create a group payment event and, in response, providing to the first computing device a first interface associated with the group payment event. The operations further include receiving, from a second computing device, a request to join the group payment event and, in response, providing a second interface to the second computing device. The operations further include receiving, from the first and/or second computing devices, messages associated with the group payment event and modifying the first and second interfaces to display the messages. The operations further include receiving, from the first and/or second computing devices, financial contributions for the group payment event and modifying the first and second interfaces to display the financial contributions.Type: ApplicationFiled: March 14, 2023Publication date: July 6, 2023Applicant: Capital One Services, LLCInventors: Yumi CLARK, Samuel WOLFAND, Srinivas NOOKALA, Mychilo CLINE, David NORMAN, Larry DAMMAN, Hashaam MARKAS, Adam ZEDLER, Sasikiran MYADAM, Dennis BRENNAN, David DAO
-
Publication number: 20230214472Abstract: Various embodiments are generally directed to utilizing a steganographically encoded image with an offline and/or online verification or authentication protocol. A method for using the steganographic image can include: receiving or utilizing a steganographic image associated with a user at a third-party device, the steganographically encoded image including an identification of a user steganographically encoded with a fingerprint template of the user, and authenticating the user using the steganographically encoded image.Type: ApplicationFiled: February 15, 2023Publication date: July 6, 2023Applicant: Capital One Services, LLCInventors: Kevin OSBORN, Srinivasa CHIGURUPATI, Jeffrey RULE
-
Publication number: 20230212931Abstract: A hydraulic fracturing pump system includes an electric powered hydraulic fracturing pump positioned on a support structure. The system also includes a suction stabilizer/dampener coupled to a suction end of the pump. The system further includes a compressed gas supply, fluidly coupled to the suction stabilizer/dampener, and positioned on the support structure. The system also includes a flow path between the suction stabilizer/dampener and the compressed gas supply, the flow path including at least one valve and at least one regulator configured to control flow from the compressed gas supply to the suction stabilizer/dampener.Type: ApplicationFiled: November 8, 2022Publication date: July 6, 2023Applicant: U.S. Well Services, LLCInventors: Jared Oehring, Alexander Christinzio, Lon Robinson
-
Publication number: 20230214626Abstract: An article of manufacture may include a matrix barcode on a physical medium and associated with an environment. The matrix barcode may include a plurality of colors, where at least one of the plurality of colors is a least prevalent color, of a plurality of prevalent colors in the environment.Type: ApplicationFiled: March 13, 2023Publication date: July 6, 2023Applicant: Capital One Services, LLCInventors: Austin Grant WALTERS, Jeremy Edward GOODSITT, Fardin ABDI TAGHI ABAD
-
Publication number: 20230214368Abstract: In certain embodiments, machine learning and lineage data may be used to manage data. In some embodiments, a computing system may use lineage data to identify two datasets that may be related. The computing system may determine that a user has access to a derivative dataset but does not have access to an original dataset that was used to create the derivative dataset. In response, the computing system may use a machine learning model to generate a similarity score indicating a level of similarity between the original dataset and the derivative dataset. If the similarity score satisfies a threshold score, the computing system may modify access rights of the user so that the user is unable to access a portion of the data in the derivative dataset.Type: ApplicationFiled: January 3, 2022Publication date: July 6, 2023Applicant: Capital One Services, LLCInventors: William YE, Jon Stofer, Thomas J. O'Connor, Jose Moreno
-
Publication number: 20230214268Abstract: This disclosure relates to method and system for secure scheduling of workflows and virtual machine utilization in cloud. Scheduling of tasks in workflow comprises of heterogeneous and interdependent computational tasks. The method receives a set of workflows comprising of one or more heterogeneous tasks. Further, a set of parameters are extracted from each heterogeneous task to select a set of optimal VM type combination parameters and a set of security level combination parameters. The method selects the optimized combination of VM types, security service levels and task order. Further, a workflow schedule is generated for the tasks of the selected VM type combinations. The method further performs optimal selection of VM types and security services, with efficient schedule generation, and effectively reuses VM with reduced overall cost without delay in make span. Additionally, the method enhances security model with accurate risk estimation.Type: ApplicationFiled: November 23, 2022Publication date: July 6, 2023Applicant: Tata Consultancy Services LimitedInventors: SHUBHRO SHOVAN ROY, ARUN RAMAMURTHY, MANGESH SHARAD GHAROTE, SACHIN PREMSUKH LODHA
-
Publication number: 20230216914Abstract: Systems and methods are disclosed for managing workload among server clusters is disclosed. According to certain embodiments, the system may include a memory storing instructions and a processor. The processor may be configured to execute the instructions to determine historical behaviors of the server clusters in processing a workload. The processor may also be configured to execute the instructions to construct cost models for the server clusters based at least in part on the historical behaviors. The cost model is configured to predict a processor utilization demand of a workload. The processor may further be configured to execute the instructions to receive a workload and determine efficiencies of processing the workload by the server clusters based at least in part on at least one of the cost models or an execution plan of the workload.Type: ApplicationFiled: March 14, 2023Publication date: July 6, 2023Applicant: Capital One Services, LLCInventors: Subodh KUMAR, Santosh BARDWAJ
-
Publication number: 20230211989Abstract: Traditionally, counterweight fork type autonomous mobile robots (AMR) have been used for any kind of pallet. But the challenge is it occupies lot more maneuvering space while making turns, which cannot work in narrow operating zones. Hence fork over AMR is preferred. However, these fork over AMR have extended parts always touching the ground surface and thus are not suitable for pallets with a wooden plank at the bottom of the fork opening in the pallet. To overcome the above technical problems, an Adjustable Counterweight-based Fork Type Autonomous Mobile Robot (ACFTAMR) is provided that includes chassis assembly and vertical mast unit, a horizontal cross slide mechanism and forks. The chassis assembly is provided counterweight assembly and counterbalance shafts that move forward and backward during pickup and release of payload when the vertical mast unit moves in upward/downward direction, thus providing better stability and counterbalance to the ACFTAMR.Type: ApplicationFiled: July 28, 2022Publication date: July 6, 2023Applicant: Tata Consultancy Services LimitedInventors: VENKATESH PRASAD BANGALORE SRINIVAS, PRADEEPAK RAJENDRAN, SREEHARI KUMAR BHOGINENI
-
Publication number: 20230216688Abstract: Systems, methods, articles of manufacture, and computer-readable media. A server may receive a phone call and generate a uniform resource locator (URL) comprising a session identifier for an account. The server may transmit the URL to a client device. The server may receive, from a web browser, a request comprising the URL. The server may determine that the session identifier in the URL of the request matches the session identifier for the account, and transmit, to the web browser, a web page at the URL. The server may receive, from the web browser, a cryptogram read by the web page via a card reader of the client device and decrypt the cryptogram. The server may authenticate the identity of the caller for the call based on decrypting the cryptogram and the session identifier of the URL matching the session identifier of the account.Type: ApplicationFiled: March 2, 2023Publication date: July 6, 2023Applicant: Capital One Services, LLCInventors: Jeffrey RULE, Rajko ILINCIC
-
Publication number: 20230216687Abstract: The present disclosure provides an efficient system for cancelable biometric template protection which is not available in the conventional systems. Initially, the system receives a biometric template from a user. The biometric template is one of, a face image, a fingerprint, an iris image and a palmprint. Further, a vector embedding is computed based on the biometric template using a pretrained neural network. After computing the vector embedding, a key based permutation is computed based on the vector embedding and a permutation key. The permutation key is generated based on an Identification number (ID) associated with the user using a random number based key generation technique. Finally, a protected biometric template is generated by computing a permuted embedding corresponding to the biometric template based on the key based permutation using a plurality of fully connected layers pretrained using a weight based center triplet loss function.Type: ApplicationFiled: November 29, 2022Publication date: July 6, 2023Applicant: Tata Consultancy Service LimitedInventors: Surabhi GARG, Arun Kumar Jindal, Rajan Mindigal Alasingara Bhattachar, Srinivasa Rap Chalamala
-
Publication number: 20230213681Abstract: A method for identifying a collar using machine learning may include acquiring one or more measurements from one or more depth points within a wellbore including a tubular string, training a machine learning model using a training dataset to create a trained machine learning model, and identifying at least one hyperparameter using the trained machine learning model. The method may further include creating a synthetic model, wherein the synthetic model is defined by one or more pipe attributes, minimizing a mismatch between the one or more measurements and the synthetic model utilizing the at least one hyperparameter, updating the synthetic model to form an updated synthetic model, and repeating the minimizing the mismatch with the updated synthetic model until a threshold is met.Type: ApplicationFiled: January 3, 2022Publication date: July 6, 2023Applicant: Halliburton Energy Services, Inc.Inventors: Ahmed Fouda, Junwen Dai, Xusong Wang
-
Publication number: 20230214515Abstract: In certain embodiments, machine learning and lineage data may be used to manage data. In some embodiments, a computing system may use lineage data to identify two datasets that may be related. The computing system may determine that a user has access to a derivative dataset but does not have access to an original dataset that was used to create the derivative dataset. In response, the computing system may use a machine learning model to generate a similarity score indicating a level of similarity between the original dataset and the derivative dataset. If the similarity score satisfies a threshold score, the computing system may modify access rights of the user so that the user is unable to access a portion of the data in the derivative dataset.Type: ApplicationFiled: January 3, 2022Publication date: July 6, 2023Applicant: Capital One Services, LLCInventors: William Ye, Jon Stofer, Thomas J. O'Connor, Jose Moreno
-
Publication number: 20230214548Abstract: A method for formation evaluation may comprise forming one or more model parameters from one or more priori geological information and one or more downhole measurements, identifying one or more inversion controls, and performing a forward model operation using a piecewise polynomial model (PPM). The method may further comprise performing an optimization using at least the forward model operation, the one or more model parameters, and the one or more inversion controls, determining if a misfit between the one or more downhole measurements and the one or more model parameters is greater than or less than a threshold, and updating the forward model operation or the one or more priori geological information based at least in part on the misfit.Type: ApplicationFiled: January 6, 2022Publication date: July 6, 2023Applicant: Halliburton Energy Services, Inc.Inventors: Li Pan, Hsu-Hsiang Wu, Yi Jing Fan, Huiwen Sheng
-
Publication number: 20230214805Abstract: Embodiments disclosed are directed to a computing system that performs steps for entity integration. The computing system receives, from a user device, an electronic request to associate a first online account of a user associated with a first entity with a second online account of the user associated with a second entity. The computing system authenticates the user device to verify that an identity of the user is authentic. The computing system determines whether the second online account exists and, if so, identifies a match between a first user property of the first online account and a second user property of the second online account. Based on the identified match, the computing system links the first online account with the second online account and updates, based on a first online account property of the first online account, a second online account property of the second online account.Type: ApplicationFiled: January 4, 2022Publication date: July 6, 2023Applicant: Capital One Services, LLCInventors: Kaush KUMAR, Jeffrey RULE, Jinlian WANG
-
Patent number: 11695764Abstract: In some implementations, an authentication device may receive information related to website browsing activity at a client device. The information related to the website browsing activity may include information associated with a web address for a current website where information associated with a virtual credential was entered. The authentication device may identify one or more valid web addresses associated with the virtual credential, which may be valid only for an entity associated with the one or more valid web addresses. The authentication device may transmit, to the client device, information to indicate whether the website browsing activity is authenticated based on a comparison of the web address for the current website where the information associated with the virtual credential was entered and the one or more valid web addresses associated with the virtual credential.Type: GrantFiled: December 31, 2020Date of Patent: July 4, 2023Assignee: Capital One Services, LLCInventors: Varun Gupta, Allison Fenichel, Amanda Sneider
-
Patent number: 11692437Abstract: A method of fabricating a ferrite for use in a resistivity logging tool includes providing an uncured ferrite material, and pressing the uncured ferrite material into a channel to form the ferrite. The channel is defined on a surface of a bobbin associated with the resistivity logging tool, and the channel can be arcuate and extend at an angle offset from a central axis of the bobbin. The uncured ferrite material is then cured in place within the channels on the bobbin.Type: GrantFiled: January 31, 2019Date of Patent: July 4, 2023Assignee: Halliburton Energy Services, Inc.Inventors: Matthew Chase Griffing, Jin Ma, Michael Bittar
-
Patent number: 11690347Abstract: The present application provides tobacco inbred plants dS1746, dS1746MS, dS1564 and dS1564MS. The present application also provides parts of such plants and products made from those parts. The present application also includes progeny of the provided plants including hybrids.Type: GrantFiled: March 25, 2022Date of Patent: July 4, 2023Assignee: Altria Client Services LLCInventors: Andrew C. Adams, Marcos F. de Godoy Lusso, Sreepriya Pramod, Dongmei Xu
-
Patent number: 11694484Abstract: A system and method are disclosed for helping a user determine whether a vehicle is subject to a safety recall and assisting the user with addressing incomplete safety recalls. A vehicle identification number (VIN) may be extracted from an image of a vehicle captured by a user electronic device and used to request safety recall information from a remote information system, which may provide a list of recalls associated with the vehicle. A list of nearby service centers may be identified based on the physical location of the user electronic device, and service appointments to address any incomplete recalls may be scheduled, either automatically or in response to user input.Type: GrantFiled: February 23, 2022Date of Patent: July 4, 2023Assignee: United Services Automobile Association (USAA)Inventor: Dexter Moon
-
Patent number: 11692400Abstract: A first characteristic of a first discharge of electrodes of a pulse power drilling assembly in a borehole of a subterranean formation is determined. The first characteristic is based on a measurement of the first discharge. A second characteristic of a second discharge of the electrodes is determined. The second discharge occurs after the first discharge, and the second characteristic is based on a measurement of the second discharge. A difference between the first characteristic and the second characteristic is determined. A boundary layer of the subterranean formation is determined based on the difference.Type: GrantFiled: March 24, 2021Date of Patent: July 4, 2023Assignee: Halliburton Energy Services, Inc.Inventors: Matthew Eugene Cammack, Boguslaw Wiecek
-
Patent number: 11694205Abstract: Disclosed are systems and methods for data breach identification. The method may include: generating virtual card number (VCN) data sets; storing the VCN data sets on a first database; receiving one or more compromised VCN data sets stored on a second database and obtained from a scan of unindexed websites; comparing the compromised VCN data sets with the VCN data set stored on the first database to determine whether the VCN data sets have been compromised; for each compromised VCN data set, training the recurrent neural network (RNN) to associate the compromised VCN data sets with one or more sequential patterns found within the compromised VCN data sets to generate a trained RNN; receiving a first VCN data set from the first database; determining whether the first VCN data set matches a compromised VCN data set; and transmitting a message indicating the determination to a user or provider device.Type: GrantFiled: January 29, 2021Date of Patent: July 4, 2023Assignee: Capital One Services, LLCInventors: Jacob Learned, Michael Saia, Max Miracolo, Kaylyn Gibilterra