Patents Assigned to Services
  • Publication number: 20250117439
    Abstract: A method may include receiving, using a computing device, a first video (FV), the computing device including a first media query (FMQ) associated with a first size (FS) of a viewport and a first rule (FR) and a second media query (SMQ) associated with a second size (SS) of the viewport and a second rule (SR), and the FV being associated with a DRM technology (DRMT) and a first value of an attribute, the first value satisfying the FR. The method may include outputting the viewport at the FS and the FV to a display, the FV being configured to be presented within the viewport outputted to the display. The method may include detecting the SS of the viewport on the display, and transmitting a request for a second video associated with the DRMT and a second value of the attribute, the second value satisfying the SR.
    Type: Application
    Filed: October 3, 2024
    Publication date: April 10, 2025
    Applicant: Capital One Services, LLC
    Inventors: Shahalam BAIG, Tyler MAIMAN, Joshua EDWARDS, Ian KATZMAN, Jackson WESTWOOD, Shasanka BHANDARI, Matthew HUNSBERGER
  • Publication number: 20250117454
    Abstract: Described are systems and methods for generating digital rights management (“DRM”)-protected layered media, including receiving an indication of sensitive information, based on the indication of sensitive information, causing to output at least two layered security elements associated with the sensitive information, the at least two layered security elements including at least a first layer associated with a first security element and a second layer associated with a second security element, determining, via a browser module, digital extraction is indicated, upon determining digital extraction is indicated, modifying the first layer such that the first layer and the associated first security element are substantially transparent, and causing to output, via a first graphical user interface (“GUI”), the at least two layered security elements with the modified first layer, such that the second layer and the associated second security element are substantially visible.
    Type: Application
    Filed: October 3, 2024
    Publication date: April 10, 2025
    Applicant: Capital One Services, LLC
    Inventors: Shahalam BAIG, Oliver DEIGHTON, Hyunwoo KANG, Shasanka BHANDARI, Matthew HUNSBERGER
  • Publication number: 20250117452
    Abstract: A method may include receiving, using a browser module of a computing device, a first webpage, wherein the first webpage is associated with a content element. The method may include receiving, using the browser module, a video, wherein the video is associated with the content element and a digital rights management technology. The method may include forming, using the browser module, an HTML element including the video. The method may include outputting, using the browser module, at least a portion of the first webpage to a display screen. The method may include outputting, using an operating system of the computing device, the video of the HTML element to the display screen, wherein the video is configured to be overlaid on the at least a portion of the first webpage on the display screen. The method may include storing, using a storage component of the computing device, the outputted video.
    Type: Application
    Filed: October 3, 2024
    Publication date: April 10, 2025
    Applicant: Capital One Services, LLC
    Inventors: Joshua EDWARDS, Tyler MAIMAN, Ian KATZMAN, Shahalam BAIG, Jackson WESTWOOD, Shasanka BHANDARI, Matthew HUNSBERGER, David WEEKLY
  • Publication number: 20250117718
    Abstract: The disclosure relates generally to methods and systems for optimizing performance of enterprise operations using maturity assessment. Existing enterprise operations maturity assessment frameworks are inefficient and lack comprehensive and integrated coverage of all three layers of the enterprise operations. The present disclosure computes or assesses a maturity score of the enterprise operation on a predefined maturity scale. The maturity score of the enterprise operation is determined based on responses to a set of evaluators which are described as the key performance indicators for a given enterprise operation. The enterprise operation maturity assessment outcomes comprise of current overall enterprise operation maturity score, benchmarks for key performance indicators, and a subset of recommended solutions to achieve improved maturity levels.
    Type: Application
    Filed: September 26, 2024
    Publication date: April 10, 2025
    Applicant: Tata Consultancy Services Limited
    Inventors: Ashok Ganesh PAI, Asoke DAS SARMA, Minesh Dineshchandra DESAI, Arunima PANDEY
  • Publication number: 20250116770
    Abstract: In Microwave radar imaging, obtaining high resolution microwave image from materials remains a challenge due to comparatively longer wavelength. Embodiments of the present disclosure provide a system for microwave imaging by Multiple-Input and Multiple-Output along with Synthetic Aperture Radar. A back-scattered signal is received from object at a target as an input. The back-scattered signal is rearranged to generate sub-array elements. A Fourier transform of the sub-array elements is computed by deploying two dimensional Fast Fourier transform to obtain two dimensional Fast Fourier transform of the sub-array elements. The 2D FFT of the sub-array elements is vectorized to obtain vectorized stacked sub-array matrix. The stacked sub band of the 2D FFT of the entire aperture array is reordered to obtain a two dimensional Fast Fourier transform of the entire aperture array. Three-dimensional reflectivity function of the target is estimated from the 2D FFT of the entire aperture array.
    Type: Application
    Filed: September 4, 2024
    Publication date: April 10, 2025
    Applicant: Tata Consultancy Services Limited
    Inventors: ANDREW GIGIE, KRISHNA KANTH ROKKAM, ACHANNA ANIL KUMAR, TAPAS CHAKRAVARTY, ARPAN PAL
  • Publication number: 20250117456
    Abstract: A method may include receiving, using a browser module of a computing device, a video from an application server. The video may be associated with a content element and a digital rights management technology. The method may include forming, using the browser module, an HTML element including the video, and playing, using a video player of the computing device, the video of the HTML element on a display screen associated with the computing device. The method may include receiving, using the computing device, input data, and transmitting, using the computing device, the input data to the application server. The method may include receiving, using the computing device, a determination that the input data represents unexpected input data, from the application server. The method may include, in response to receiving the determination, causing, using the video player, the video of the HTML element to stop playing on the display screen.
    Type: Application
    Filed: October 3, 2024
    Publication date: April 10, 2025
    Applicant: Capital One Services, LLC
    Inventors: Ramin MORADI, Tyler MAIMAN, Joshua EDWARDS, Ian KATZMAN, Shahalam BAIG, Jackson WESTWOOD, Shasanka BHANDARI, Matthew HUNSBERGER
  • Publication number: 20250117459
    Abstract: Disclosed are systems and methods for dynamically generating digital rights management (“DRM”) protections, including receiving an indication of digital extraction associated with first sensitive information, determining an identity of an application associated with the indication of digital extraction, determining a mode associated with the indication of digital extraction, and based on the determined identity of the application and the determined mode of the digital extraction, transmitting a first alert to a DRM-protection system.
    Type: Application
    Filed: October 3, 2024
    Publication date: April 10, 2025
    Applicant: Capital One Services, LLC
    Inventors: Ian KATZMAN, Tyler MAIMAN, Joshua EDWARDS, Shahalam BAIG, Jackson WESTWOOD, Shasanka BHANDARI, Matthew HUNSBERGER
  • Publication number: 20250117460
    Abstract: Systems and methods for decrypting a HyperText Markup Language (“HTML”) are described. The method may include obtaining, via a browser module associated with a first user device, an encrypted HTML element; generating, via the browser module associated with the first user device, a first request to decrypt the encrypted HTML element; transmitting, via a processor, the first request and session data; obtaining, via the processor, a license for the encrypted HTML element, wherein the license include a decryption key and at least one rule; determining, via the processor, whether the encrypted HTML element satisfies the at least one rule of the license; upon determining the encrypted HTML element satisfies the at least one rule of the license, decrypting, via the processor, the encrypted HTML element using the decryption key; and causing to output, via a graphical user interface (GUI) associated with the first user device, the decrypted HTML element.
    Type: Application
    Filed: October 3, 2024
    Publication date: April 10, 2025
    Applicant: Capital One Services, LLC
    Inventors: Shahalam BAIG, Anoop GOPI, Julian DUQUE, Daniel E. MILLER
  • Publication number: 20250117449
    Abstract: Described are systems and methods for generating a digital rights management (“DRM”)-protected input field of a media content, including receiving, via a first graphical user interface (“GUI”), at least one user input associated with a DRM-protected input field, wherein the DRM-protected input field has been caused to be output via the GUI and is substantially hidden from view, based on the at least one user input, appending at least one DRM-protected media element to the DRM-protected input field via a browser module, and causing to output, via the first GUI, the DRM-protected input field with the appended DRM-protected media such that the appended DRM-protected media is substantially visible via the first GUI.
    Type: Application
    Filed: October 3, 2024
    Publication date: April 10, 2025
    Applicant: Capital One Services, LLC
    Inventors: Matthew HUNSBERGER, Shahalam BAIG, Jackson WESTWOOD, Shasanka BHANDARI, Hyunwoo KANG
  • Publication number: 20250117455
    Abstract: Described are systems and methods for dynamically protecting a digital rights management (“DRM”)-protected content element, including monitoring, via a browser module, on a first interval, DRM-protected media for impairment, the DRM-protected media having been caused to be output via a graphical user interface (“GUI”), wherein the DRM-protected media is associated with the DRM-protected content element, upon detecting impairment of the DRM-protected media, generating an indication of impairment via the browser module, based on the indication of impairment, obfuscating the DRM-protected content element via the browser module, and causing to output, via the GUI, the obfuscated DRM-protected content element.
    Type: Application
    Filed: October 3, 2024
    Publication date: April 10, 2025
    Applicant: Capital One Services, LLC
    Inventors: Joshua EDWARDS, Tyler MAIMAN, Ian KATZMAN, Shahalam BAIG, Jackson WESTWOOD, Shasanka BHANDARI, Matthew HUNSBERGER
  • Publication number: 20250117457
    Abstract: A method may include receiving, using a computing device, a document including a first page. The method may include transmitting, using the computing device, the document to an application server. The method may include receiving, using the computing device, a first video from the application server. The first video may be associated with a digital rights management technology and include a single image frame. The single image frame may represent the first page of the document. The method may include forming, using a browser module of the computing device, a first Hypertext Markup Language (HTML) element including the first video. The method may also include outputting, using an operating system of the computing device, the first video of the first HTML element to a display screen associated with the computing device.
    Type: Application
    Filed: October 3, 2024
    Publication date: April 10, 2025
    Applicant: Capital One Services, LLC
    Inventors: Shahalam BAIG, Matthew HUNSBERGER, Shasanka BHANDARI, Jackson WESTWOOD, Hyunwoo KANG
  • Publication number: 20250117450
    Abstract: Described are systems and methods for obfuscating an accessibility element using digital rights management (“DRM”) protections, including determining, via an application server, the accessibility element is associated with a first content element, receiving, via a first graphical user interface (“GUI”), at least one user input associated with the accessibility element or the first content element, wherein the at least one user input includes at least one of hovering, selecting, or clicking, modifying, via the application server, a HyperText Markup Language (“HTML”) associated with the first content element to remove the accessibility element, and causing to output, via the first GUI, the modified first content element such that the accessibility element is no longer caused to be output.
    Type: Application
    Filed: October 3, 2024
    Publication date: April 10, 2025
    Applicant: Capital One Services, LLC
    Inventors: John Casey SMITH, Shahalam BAIG, Matthew HUNSBERGER
  • Publication number: 20250117764
    Abstract: Disclosed herein are system, apparatus, device, method and/or computer program product embodiments, and/or combinations and sub-combinations thereof for blending multiple images of a financial instrument (e.g., check) into a single blended image to mitigate potential image errors. The method generates a number of images of the financial instrument and builds a blended image by blending pixel content of common pixels from set of the images and communicates the blended image to a remote deposit server.
    Type: Application
    Filed: December 19, 2024
    Publication date: April 10, 2025
    Applicant: Capital One Services, LLC
    Inventors: Keegan FRANKLIN, Aeman JAMALI, Jordan ARRIETA, Megan OBRIEN, Danielle WEGRZYN, Michael CROGHAN, Kai SI, Sasha AHRESTANI
  • Publication number: 20250117801
    Abstract: Techniques for identifying a fraudulent interaction of a user device using time based risk features are described herein. In embodiments, time stamp information provided by an external clock and time units may be maintained by a user device. The user device may include an authentication component that is communicatively coupled to a clock component that generates the time units. In response to conducting an interaction with an access device and user device first time information may be received from the access device. Second time information may be determined based at least in part on the time units from the clock component and the time stamp information. The second time information may be compared to the first time information. An authentication plan for the interaction may be determined based at least in part on the comparison of the second time information to the first time information.
    Type: Application
    Filed: December 18, 2024
    Publication date: April 10, 2025
    Applicant: Visa International Service Association
    Inventor: Yuexi Chen
  • Publication number: 20250117448
    Abstract: Described are systems and methods for dynamically securing transmitted data, including accessing a first secure application, receiving, via the first secure application, a data set, wherein the data set includes at least one of text data, image data, video data, or audio data, determining, via a first application server associated with the first secure application, a content element associated with the data set, wherein the content element includes sensitive information, generating, via the first application server, media based on the sensitive information, wherein the media is encrypted to include digital rights management (“DRM”) protection, transmitting, to a second secure application associated with a second user device, the media, and causing to output the media via a graphical user interface (“GUI”) associated with the second user device.
    Type: Application
    Filed: October 3, 2024
    Publication date: April 10, 2025
    Applicant: Capital One Services, LLC
    Inventor: Shahalam BAIG
  • Publication number: 20250117509
    Abstract: Described are systems and methods for dynamically generating a friction-based security device, including receiving, via an application server, a first dataset, determining, via a trained machine learning model, a first friction level, wherein the trained machine learning model has been trained to predict a friction level based on at least one dataset, generating, via the application server, a first security device based on the first friction level, and causing to output, via a graphical user interface (“GUI”), the first security device.
    Type: Application
    Filed: October 3, 2024
    Publication date: April 10, 2025
    Applicant: Capital One Services, LLC
    Inventor: Shahalam BAIG
  • Publication number: 20250117451
    Abstract: Described are systems and methods for generating protected accessible HyperText Markup Language (“HTML”), the method including receiving a request to load media content associated with a first HTML element, upon receiving the request to load the content element, generating video data associated with the content element, generating one or more digital rights management-protected files based on the video data associated with the content element, generating a second HTML element based on the one or more DRM-protected files, and causing to output, via a graphical user interface, the digital rights management-protected video data of the second HTML element.
    Type: Application
    Filed: October 3, 2024
    Publication date: April 10, 2025
    Applicant: Capital One Services, LLC
    Inventors: Matthew HUNSBERGER, Tyler MAIMAN, Joshua EDWARDS, Ian KATZMAN, Shahalam BAIG, Jackson WESTWOOD, Shasanka BHANDARI
  • Publication number: 20250117669
    Abstract: Building such optimized DNN models model for resource constrained devices require huge amount of workflow setup, engineering skills and research skills. There is a need to automate the process for generation of optimized DNN models for Green analytics. A method and system providing integrated platform for rapid automated generation of Tiny ML models for edge devices by integrating multiple optimization techniques and recommending the mist appropriate technique based on available input parameters is provided. Further one of the optimization technique the Fast-NAS can be generalized across multiple applications and consume 95% less computational power (GPU hours). The enhancement is achieved using a performance evaluation technique for generated models using new metric, a new reward function with adaptive parameters, an early-exit strategy to further expedite the optimization process, and a new NAS flow enhanced with AutoML (Hyper-Parameter Optimization) to minimize human intervention.
    Type: Application
    Filed: September 12, 2024
    Publication date: April 10, 2025
    Applicant: Tata Consultancy Services Limited
    Inventors: CHETAN SUDHAKAR KADWAY, SHALINI MUKHOPADHYAY, SYED MUJIBUL ISLAM, ABHISHEK ROY CHOUDHURY, SWARNAVA DEY, SOUNAK DEY, ARPAN PAL, ARIJIT MUKHERJEE
  • Publication number: 20250115543
    Abstract: Gingerenone A prodrug compounds have a structure according to Formula I, or a pharmaceutically acceptable salt thereof wherein one of R1 and R2 is H or —C(O)—R and the other of R1 and R2 is —C(O)—R. Each R independently is RA or, where RA is C18-C22 alkenyl, and RB is an amino acid side chain. The compounds are useful for inhibiting or eliminating senescence. The compounds may be administered to a subject having a senescence-associated disease or disorder, neuroinflammation, pain, and/or an amino acid deficiency.
    Type: Application
    Filed: January 17, 2023
    Publication date: April 10, 2025
    Applicant: The U.S.A., as Represented by the Secretary, Department of Health and Human Services
    Inventors: Ruin Moaddel, Luigi Ferrucci, Kotb Abdelmohsen, Myriam Gorospe, Martina Rossi, Christopher E. Ramsden, Gregory S. Keyes
  • Publication number: 20250119758
    Abstract: The technologies described herein are generally directed to validating the integration of new carrier components at base station equipment, e.g., in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, confirming based on installation data, an installation milestone of an installation of a carrier component at base station equipment, resulting in a confirmed milestone. The method can further include, based on the confirmed milestone, identifying for an evaluation of the installation of the carrier component, a criterion associated with a characteristic of operation of the base station equipment. Further, the method can include based on a result of evaluation of the installation, sending, by the network equipment, a validation signal to the base station equipment indicating that the installation of the carrier component is validated.
    Type: Application
    Filed: December 4, 2024
    Publication date: April 10, 2025
    Applicants: AT&T Intellectual Property I, L.P., AT&T Global Network Services Czech Republic s.r.o., AT&T Mobility II LLC
    Inventors: Shuai Hao, Alexandru Cristian Andrei, Hector Perez, Donald Coates, Jr., Zihui Ge, Alvin Hicks, Jason Tipton