Patents Assigned to Services
  • Publication number: 20240403111
    Abstract: A computer-implemented method for reducing processor cycles when performing a set of processing tasks, the set of processing tasks involving transforming a set of discrete inputs to a set of discrete outputs, the method comprising: identifying a unique input value from the set of discrete inputs among the set of processing tasks; performing the processing task with the unique input value to generate a discrete output; and assigning the discrete output to the processing tasks of the set of processing tasks having the same discrete input as the unique input value. Preferably, the processing tasks are assigned to a plurality of synthetic groups. The method may be used for batch processing and/or may be implemented in a cloud computing environment.
    Type: Application
    Filed: May 16, 2024
    Publication date: December 5, 2024
    Applicant: Barclays Execution Services Limited
    Inventors: Pralhad Vishnu VERNEKAR, Anirudha DEODHAR, Rahul Arun GARWARE
  • Publication number: 20240401239
    Abstract: Methods for producing synthetic single-domain monoclonal antibody libraries using humanized llama nanobody framework sequences, libraries obtainable by the method, as well as antibodies selected from the libraries are described. In particular, synthetic single-domain monoclonal antibodies that specifically bind to the spike protein of SARS-COV-2 and neutralize SARS-COV-2 infection are described. Use of the disclosed antibodies for the detection, prophylaxis and treatment of SARS-COV-2 infection is described.
    Type: Application
    Filed: September 9, 2022
    Publication date: December 5, 2024
    Applicant: The U.S.A., as represented by The Secretary, Department of Health and Human Services
    Inventors: Ying Fu, Bryan D. Fleming, Alex Renn, Matthew D. Hall, Anton Simeonov
  • Publication number: 20240403372
    Abstract: Approaches provide for generating a document (e.g., a contract) that satisfies constraints of at least one party in negotiation. Information can be obtained from parties seeking to negotiate document sections (e.g., clauses or provisions) of a document such as a contract. Ranking values for a plurality of candidate contracts can be determined based on information from the parties, including their preferences for different sections (e.g., provisions) of the contract. The values can be used to optimize an optimization function that measures the degree to which candidate contracts satisfy the information provided by the parties. For example, an optimization technique, machine learning-based technique, or other appropriate technique can be utilized to determine a document or document information that satisfies the constraints of the parties. Thereafter, a contract can be selected and presented to the parties.
    Type: Application
    Filed: August 14, 2024
    Publication date: December 5, 2024
    Applicant: ISG Information Services Group Americas, Inc.
    Inventors: Christopher D. BOYCE, Paul N. FAHN, Peter A. GRAHAM
  • Publication number: 20240403878
    Abstract: A method and system for authorizing a secure transaction using a portable device are disclosed. The method includes an authorization process performed in real-time that includes two phases: an authentication phase and a transaction processing phase. In the authentication phase, a resource provider system may receive a cryptogram from a portable device and verify the cryptogram. Upon the resource provider system obtaining an authentication response indicator, the transaction processing phase may include the resource provider system generating and transmitting an authorization request message to a processing computer. The resource provider system may then receive an authorization response message from the processing computer including an authorization response indicator, which completes the authorization process.
    Type: Application
    Filed: August 15, 2024
    Publication date: December 5, 2024
    Applicant: Visa International Service Association
    Inventors: Blake McCoy, Andreas Aabye, Paul Tait, Phillip Lavender, Lily Cai
  • Publication number: 20240398006
    Abstract: An electronic cigarette (“e-Cig”) may include an adapter component for connecting a battery portion of the e-Cig with the cartridge. The adapter may be configured to utilize a bonding device, such as a ring, cylinder, or sleeve component, for connecting wires without requiring soldering. The bonding device may press a wire at a contact point against a conductive material for transmission of electrical power.
    Type: Application
    Filed: August 15, 2024
    Publication date: December 5, 2024
    Applicant: Altria Client Services LLC
    Inventors: Sammy CAPUANO, Zvika FELDMAN
  • Publication number: 20240404309
    Abstract: Computer vision systems and methods for information extraction from inspection tag images are provided. The system receives an image of an inspection tag, detects one or more tags in the image, crops and aligns the image to focus on the detected one or more tags, and processes the cropped and aligned image to automatically extract information from the depicted inspection tag. Each tag identified by the system can be bounded by a tag-box that bounds the detected tag, and a tag quality score can be calculated for each tag-box. One or more visual features can be extracted after cropping of the image, and pixel-level prediction can be performed on the image to predict and/or correct an orientation of the image. Word-level and line-level optical character recognition (OCR) is then performed on the cropped and aligned image of the tag in order to extract a plurality of information from the tag.
    Type: Application
    Filed: May 23, 2024
    Publication date: December 5, 2024
    Applicant: Insurance Services Office, Inc.
    Inventors: Venkata Subbarao Veeravarasapu, Ashwani Khemani, Surya Venteddu, Zheng Zhong, Shane De Zilwa, Talmor Meir, Keith Lew
  • Publication number: 20240402725
    Abstract: This disclosure relates generally to a method and system for task feasibility analysis with explanation for robotic task execution. Conventional methods for task feasibility analysis does not utilize an ontology for task capability understanding. The present disclosure uses an explainable semantic approach for checking task feasibility in a real world. The method creates scene graphs which is further used for generating a global knowledge graph and a semantic map. These are used for task feasibility analysis for an input task instruction received from a user. When the user provides the task instruction the method checks whether it is feasible or not. This helps in avoiding dead end tasks and provides the user to alter the task instruction towards feasible task. The disclosed method is used for robotic task execution in an environment.
    Type: Application
    Filed: May 14, 2024
    Publication date: December 5, 2024
    Applicant: Tata Consultancy Services Limited
    Inventors: SNEHASIS BANERJEE, DIBYARUP DUTTA, AVIGYAN BHATTACHARYA
  • Publication number: 20240403416
    Abstract: In some aspects, a computing system may use a machine learning model (e.g., a large language model) with a variety of query tokens as seeds to predict probabilities of future events. The system may then use the probabilities to determine the probability of a target event based on the query tokens. The system may then sort the query tokens by probability of the target event and select the top N query tokens (e.g., the top three events for a user that are predicted to be followed by the target event). The events indicated by the query tokens may be monitored for a given time period, and, if any of those events occur, the system may generate an alert.
    Type: Application
    Filed: June 2, 2023
    Publication date: December 5, 2024
    Applicant: Capital One Services, LLC
    Inventors: Samuel SHARPE, Christopher Bayan BRUSS, James O. H. MONTGOMERY
  • Publication number: 20240401425
    Abstract: An apparatus may include a connector sub rigidly securable to a conveyance for running the connector sub along a wellbore. The connector sub has a connector lug. Further, the apparatus may include a spool mandrel having a mandrel lug that is rotatable with respect to the connector sub. Additionally, the apparatus may include an intermediate sub disposed between the connector sub and the spool mandrel. The intermediate sub includes an intermediate lug extending outward from an outer surface of the intermediate sub and contact between the intermediate lug, the connector lug, and the mandrel lug bounds rotational movement of the spool mandrel with respect to the connector sub between a first angular position and a second angular position.
    Type: Application
    Filed: May 31, 2023
    Publication date: December 5, 2024
    Applicant: Halliburton Energy Services, Inc.
    Inventor: Nick Strohla
  • Publication number: 20240402183
    Abstract: Spatial analysis methods based on nearest neighbor analysis are provided of specific regions of tissue to describe cancer states and develop biomarkers to predict outcomes. In various embodiments, the spatial analysis methods involve an interaction radius to computationally isolate local interactions and prevent the data from being influenced by cells that are very far away. Thereby, spatial analysis of cancer tissue can be quickly and consistently performed in an automated fashion to focus on tumor-immune cell biology, which occurs at a localized level.
    Type: Application
    Filed: May 31, 2024
    Publication date: December 5, 2024
    Applicants: CEDARS-SINAI MEDICAL CENTER, BC CANCER, part of the Provincial Health Services Authority
    Inventors: Alexander Xu, Akil Merchant, Anthony Colombo, Tomohiro Aoki, Aixiang Jiang, Christian Steidl
  • Publication number: 20240403832
    Abstract: Methods and systems are described herein for generating parameterized records using communications data. A generation system may be used to facilitate generating the parameterized records. The system may encode a plurality of electronic messages into bag-of-words embeddings and input a plurality of bag-of-words embeddings into a machine learning model to identify electronic messages containing itemized records, each including corresponding item identifiers. The system may transmit a request to identify server records associated with the itemized records, wherein the request comprises the corresponding item identifiers, and wherein the record identification server uses the corresponding item identifiers to identify the itemized records. The system may receive the server records each of which includes corresponding parameters.
    Type: Application
    Filed: May 30, 2023
    Publication date: December 5, 2024
    Applicant: Capital One Services, LLC
    Inventors: Tyler MAIMAN, Jerry WU, Bryant YEE
  • Publication number: 20240402379
    Abstract: Systems and methods of removing motion-induced noise from datasets from a NMR tool. The method includes steps of generating an echo train from each dataset and identifying one or more datasets that were collected while a motion of the tool was below a predetermined threshold as stationary datasets. Datasets not identified as stationary are identified as moving datasets.
    Type: Application
    Filed: June 5, 2023
    Publication date: December 5, 2024
    Applicant: Halliburton Energy Services, Inc.
    Inventor: Jie YANG
  • Publication number: 20240403863
    Abstract: In a system for verifying transactions, when a user with a portable communication device nears a resource provider location, the portable communication device provides an indication to a transaction processing system of its proximity to the location. The portable communication device then provides a universally unique identifier (UUID) of a base station of the resource provider to the transaction processing system, which generates a hash using the UUID and a primary account number (PAN) of a portable transaction device that is associated with the portable communication device. When the user conducts a transaction with the portable transaction device at the provider, the provider generates a separate hash from the UUID and the PAN and sends the hash to the transaction processing system. A match between the hashes is taken into account as a positive indicator that the transaction is not fraudulent and the resource provider is complying with the system.
    Type: Application
    Filed: August 12, 2024
    Publication date: December 5, 2024
    Applicant: Visa International Service Association
    Inventors: John F. Sheets, Kim Wagner, Christian Aabye, Jing Jin
  • Publication number: 20240404341
    Abstract: Exemplary embodiments may provide keys for unlocking access to a location, like a user room, a secure location, a door at an employee location, a trunk, a closet or other locked location or item, on a payment card. Examples of a payment card include but are not limited to a credit card, a debit card, a smart card, an employee identification card, etc. A secure token that acts as digital key may be uploaded to the payment card. The payment card may then be put in close proximity of a wireless reader at the lock. The wireless reader obtains the secure token and extracts the contents. If the contents are proper, the lock is unlocked. Otherwise, the lock remains locked.
    Type: Application
    Filed: August 12, 2024
    Publication date: December 5, 2024
    Applicant: Capital One Services, LLC
    Inventors: Tyler MAIMAN, Negar KALBASI, Salik SHAH, Matthew HORTON, Abdelkader M’Hamed BENKREIRA, Phoebe ATKINS, Imren JOHAR
  • Publication number: 20240406151
    Abstract: A method is disclosed. The method includes receiving and storing, by a processing computer, a set of user data associated with a user, and an encrypted data packet from an authorizing entity computer, the encrypted data packet comprising sensitive data associated with the user encrypted using a first cryptographic key. The method includes receiving, from a user device, a request comprising at least some user data in the set of user data, determining the encrypted data packet corresponding to the at least some of the user data, and responsive to determining the encrypted data packet, obtaining a second cryptographic key. The method also includes decrypting the encrypted data packet with the second cryptographic key to obtain the sensitive data, and processing a transaction using the sensitive data or a derivative thereof.
    Type: Application
    Filed: September 23, 2022
    Publication date: December 5, 2024
    Applicant: Visa International Service Association
    Inventors: Thomas Bellenger, Manjush Gopinatha Menon
  • Publication number: 20240404650
    Abstract: Aspects of the subject technology relate to systems, methods, and computer readable media for applying generative machine learning for performing statistical inversion in borehole sensing. A method can comprise implementing an inversion workflow for borehole sensing. The method can also comprise applying a generative machine learning network technique to sample candidate material variables as part of the inversion workflow.
    Type: Application
    Filed: December 11, 2023
    Publication date: December 5, 2024
    Applicant: Halliburton Energy Services, Inc.
    Inventors: Xusong WANG, Christopher Michael JONES, Xiang WU, Jichun SUN
  • Publication number: 20240403508
    Abstract: State of the art approaches for 3D garment simulation approaches have the disadvantages that they 1) work on fixed garment type, 2) work on fixed body shapes, and 3) assume fixed garment topology. As a result, they do not offer a generic solution for garment simulation. Method and system disclosed herein use a combination of a body motion aware ARAP garment deformation and a Physics Enforcing Network (PEN), so as to generate garment simulations irrespective of garment type, body shapes, and garment topology, thus offering a generic solution.
    Type: Application
    Filed: May 22, 2024
    Publication date: December 5, 2024
    Applicant: Tata Consultancy Services Limited
    Inventors: LOKENDER TIWARI, BROJESHWAR BHOWMICK, SANJANA SINHA
  • Publication number: 20240406817
    Abstract: An enhanced automatic neighbor relation (“ANR”) function can estimate a plurality of terrestrial cells within a coverage area of an aerial cell. The enhanced ANR function can monitor an exchange of a serving cell unique identifier sent to a target cell and a target cell unique identifier sent to a serving cell. The enhanced ANR function can determine a serving cell type and a target cell type, wherein the serving cell type and the target cell type identify the serving cell and the target cell, respectively, as either a terrestrial cell type or an aerial cell type. The enhanced ANR function can then determine whether a serving cell neighbor relation table (“NRT”) associated with the serving cell, a target cell NRT associated with the target cell, or both would be compromised if a corresponding NR is added into the serving cell NRT and the target cell NRT.
    Type: Application
    Filed: August 9, 2024
    Publication date: December 5, 2024
    Applicants: AT&T Technical Services Company, Inc., AT&T Intellectual Property I, L.P.
    Inventors: Daniel Vivanco, David Beppler, Slawomir Stawiarski
  • Publication number: 20240405566
    Abstract: A method and system for performing blackstart functionality from renewable generation and battery energy storage systems are disclosed. A plant may include a microgrid that includes one or more customer loads and that may provide power to a utility grid. Blackstart may be performed to restore operations to part or all of the plant or to external loads such as microgrid customer loads or part of the utility grid. In practice, blackstart may be performed in order to restore operation to the one or more feeders in the plant, such as to the generation sources within the plant, to restore power to the plant auxiliary loads, customer loads in the microgrid, and to provide power to different sections of the grid when transitioning from shutdown mode of operation. In this way, the method and system may automatically transition from a shutdown mode of operation to an islanded mode of operation.
    Type: Application
    Filed: June 3, 2024
    Publication date: December 5, 2024
    Applicant: AES Clean Energy Services, LLC
    Inventors: Alston D Costa, Ankit Sharma, Christopher Boyer, Samuel Ley, Felipe Cantero
  • Publication number: 20240403709
    Abstract: State of the art model fairness approaches do not address the degree of local fairness of a ML model. A method and system for determining local fairness of a classification Machine Learning (ML) model with degree of fairness is disclosed. The method creates multiple perturb instances using multilevel GMM clustering approach and a constrained perturbation technique to ensure feature distribution of perturbed data, generated from a tabular base data is within the feature distribution of the tabular base data of the ML model. Further, the class of a protected attribute is flipped, black box model prediction probabilities and the cosine similarity constraint and multiplication factor on the probabilities is used to provide a degree of fairness for the local instance. Thus, provides magnitude of fairness or unfairness to the local instance.
    Type: Application
    Filed: April 25, 2024
    Publication date: December 5, 2024
    Applicant: Tata Consultancy Services Limited
    Inventors: Krishna Kumar BANSAL, Ramesh BALAJI, Bivek Benoy PAUL, Anirudh Thenguvila PURUSHOTHAMAN, Selva Sarmila KASIVISWANATHAN, Srinivasa Raghavan VENKATACHARI