Patents Assigned to Services
  • Publication number: 20250139600
    Abstract: A method includes receiving, by aggregator platform computer from a user device of first user, remittance message including at least a service amount for service rendered by second user to the first user; identifying, by the aggregator platform computer, that the remittance message includes an additional amount that accompanies the service amount; upon identifying that the remittance message includes the additional amount, forwarding, by the aggregator platform computer to a plug-in computer, the remittance message including the service amount and the additional amount; identifying, by the plug-in computer in the remittance message, the service amount and the additional amount; and separating, by the plug-in computer, the service amount from the additional amount. The plug-in computer facilitates transfer of the additional amount from an account of the first user to an account of the second user and sends, to the aggregator platform computer, a service remittance message including the service amount.
    Type: Application
    Filed: October 31, 2023
    Publication date: May 1, 2025
    Applicant: Visa International Service Association
    Inventor: Buddhi Prakash Kothari
  • Publication number: 20250141936
    Abstract: Methods and systems are described herein for updating cybersecurity enforcement rules in real-time over disparate computer networks. A rule enforcement system may receive a real-time data stream. The real-time data stream may include real-time communications requiring cybersecurity verification. Real-time data communications are processed through a first rule repository. In response to determining that rule updates to rules within the first rule repository are available, a second rule repository is retrieved and brought online. Previously received real-time communication data is processed with the first rule repository and new real-time communication data is routed to the second rule repository. When previously received real-time communication data has been processed, the first rule repository is disabled.
    Type: Application
    Filed: January 3, 2025
    Publication date: May 1, 2025
    Applicant: Capital One Services, LLC
    Inventors: Srinivas Alladi, Muthukumar Kubendran
  • Publication number: 20250142608
    Abstract: Methods and systems for limiting resource access based on user input using an authentication token. In some aspects, the authentication token receives user input indicating a first allocation for a first resource access to be executed at a first time. The authentication token generates recommendations for a second allocation related to the first allocation. The user selects a second allocation. At the first time, the authentication token receives a first resource access request and executes the first allocation. The authentication token also transmits first metadata to an access approval system. At the second time, in response to a second resource access request, the authentication token or the access approval system compares the second resource access request to the first metadata or the second allocation to approve or decline the second resource access request.
    Type: Application
    Filed: October 27, 2023
    Publication date: May 1, 2025
    Applicant: Capital One Services, LLC
    Inventors: Armando MARTINEZ STONE, Samuel RAPOWITZ, Bryant YEE
  • Publication number: 20250134897
    Abstract: Disclosed are compounds of Formula (I), pharmaceutically acceptable salts thereof, and methods of preparation thereof, wherein R1, Xa, Xb, Xc, and Xd are as described in the specification. Further disclosed is an isotopic mixture of a compound of Formula (I), as well as a pharmaceutical composition containing a hyperpolarized compound of Formula (I). Also disclosed is a method of diagnosing or monitoring a patient suffering from cancer, the method including administering a pharmaceutical composition comprising an effective amount of a hyperpolarized ketoglutarate compound or a pharmaceutically acceptable salt thereof, and measuring the hyperpolarization of a compound of interest in the patient. Further disclosed is a method of preparing hyperpolarized ketoglutarate compounds for use in the above methods.
    Type: Application
    Filed: January 26, 2023
    Publication date: May 1, 2025
    Applicant: The United States of America,as represented by the Secretary,Department of Health and Human Services
    Inventors: Rolf E. SWENSON, Jessica H. ETTEDGUI-BENJAMINI, Venkatareddy SABBASANI, Deepak SAIL, Kazutoshi YAMAMOTO, Murali K. CHERUKURI
  • Publication number: 20250139075
    Abstract: The present disclosure is directed to a system for data consolidation. The system may include processors, servers, and/or storage devices. Processors in the system may be configurable to perform operations like importing data from, transforming the imported data into a plurality of tables, identifying tables comprising outlier attributes, and modifying the identified tables by normalizing or deleting corresponding attributes, Operations of the disclosed systems may also include performing a conformity check on the integration tables, generating two or more data structures arranging tables based on downstream modeling requirements, storing the two or more data structures in the single storage location, and provisioning the one or more data structures for downstream modeling.
    Type: Application
    Filed: December 27, 2024
    Publication date: May 1, 2025
    Applicant: The PNC Financial Services Group, Inc.
    Inventors: MARK GREGORY MEADEN, CHAITANYA VEJENDLA
  • Publication number: 20250138856
    Abstract: Systems and methods are described herein for optimizing cloud architectures using artificial intelligence models trained on standardized cloud architecture patterns corresponding to specific requirements. For example, the system may receive a first cloud architecture processing requirement. The system may receive a first set of available cloud resources. The system may generate a first feature input based on the first cloud architecture processing requirement and the first set of available cloud resources. The system may input the first feature input into a first artificial intelligence model to generate a first output. The system may determine, based on the first output, a first cloud architecture pattern for the first set of available cloud resources.
    Type: Application
    Filed: October 26, 2023
    Publication date: May 1, 2025
    Applicant: Capital One Services, LLC
    Inventors: Mohammad HASSAN, Catherine BARNES, Matthew Louis NOWAK
  • Publication number: 20250139615
    Abstract: Embodiments of the present invention are directed to methods and systems for managing a cryptocurrency payment network comprising one or more issuer nodes and one or more distributor nodes. Issuer nodes may be granted different rights from distributor nodes with respect to the issuance and distribution of digital currency within the cryptocurrency payment network. A management system server computer may generate unique node verification key pairs for each node in the cryptocurrency payment network, where the node verification key pairs may be used to identify and authenticate issuer nodes and distributor nodes.
    Type: Application
    Filed: December 31, 2024
    Publication date: May 1, 2025
    Applicant: Visa International Service Association
    Inventor: Phaneendra Ramaseshu Lingappa
  • Publication number: 20250141684
    Abstract: Systems and methods for validating added components for a vehicle. In some aspects, the system may determine from a plurality of cryptographic tokens related to a plurality of assets, a cryptographic token corresponding to a validation request for an asset and received from a computing device. The system may determine whether one or more added components from the validation request are capable of being integrated with the asset in presence of one or more base components for the asset from the cryptographic token. In response to determining that the one or more added components are being integrated, the system may determine, using a first machine learning model, whether the one or more added components are credible. In response to determining that at least one component of the one or more added components is not credible, the system may generate an alert indicating the at least one component as not credible.
    Type: Application
    Filed: October 26, 2023
    Publication date: May 1, 2025
    Applicant: Capital One Services, LLC
    Inventors: Chanakya KASPA, Sikkandar SIKKANDAR PACKIAM, Arunachalam RAMASWAMY
  • Publication number: 20250142325
    Abstract: In some embodiments, based on a wireless signal of a mobile device (e.g., obtained by a local device) the mobile device and a first authentication capability of the mobile device may be detected. Based on the detection of the mobile device, the mobile device may present access initiation options on a user interface of the mobile device. Based on a selection of a first option of the access initiation options via the user interface to initiate an access request for an access operation with the local device, an authentication request may be generated, where the authentication request is associated with the first authentication capability and with a first authentication tier. For example, the authentication request may be generated based on (i) the first authentication capability being detected as an authentication capability of the mobile device and (ii) the first authentication tier corresponding to an access amount of the access request.
    Type: Application
    Filed: October 27, 2023
    Publication date: May 1, 2025
    Applicant: Capital One Services, LLC
    Inventors: Mohammed Zafar IQBAL, Kevin ROSENGREN, Max DOERFLER, Brian DeLUCA, Anurag JOSHI, James DILLON, Richie HOLLINS, Jamie WARDER, William A. HODGES, Ken ALLEN
  • Publication number: 20250139442
    Abstract: State of art techniques, need a decoder following the encoder to encode EEG signals, whose morphology is undefined. Embodiments herein disclose a method and system for a Spiking Neural Network (SNN) based low power cognitive load analysis using electroencephalogram (EEG) signal. The method receives a raw EEG signal from multichannel EEG set up, wherein each of the raw EEG signal is re-referenced and encoded into a spike train using a Light-Weight-Lossless-Decoder less-Peak-based (LWDLP) encoding. Further, the spike trains are processed by the SNN architecture using backpropagation based supervised approach, wherein the spatial information and the temporal information are learnt by the SNN in form of neuronal activity and synaptic weights. Post learning the SNN architecture applies an activation function on the neuronal activity for classifying a cognitive load level experienced by a subject from among a plurality of predefined cognitive load levels using a SNN classifier.
    Type: Application
    Filed: September 12, 2024
    Publication date: May 1, 2025
    Applicant: Tata Consultancy Services Limited
    Inventors: DIGHANCHAL BANERJEE, SOUNAK DEY, DEBATRI CHATTERJEE, ARPAN PAL
  • Publication number: 20250141867
    Abstract: Systems and methods for digital media-based user authentication are disclosed herein. In some aspects, the system may receive an authentication request. The system may transmit a user verification request based on the authentication request. The system may receive media recordings in response to the user verification request. The system may detect one or more features in the media recordings. The system may generate a plurality of risk metrics for the user based on generating risk metrics for the one or more features. The system may determine an authentication probability based on the plurality of risk metrics.
    Type: Application
    Filed: October 27, 2023
    Publication date: May 1, 2025
    Applicant: Capital One Services, LLC
    Inventors: Lawrence DOUGLAS, Jeffrey RULE, Jackson MACOMBER
  • Publication number: 20250139147
    Abstract: The present disclosure relates to systems and methods for parsing unstructured data with neural networks. In one implementation, a system for parsing unstructured data may include at least one processor and at least one non-transitory memory storing instructions that, when executed by the at least one processor, cause the system to: receive unstructured data; apply a classifier to the unstructured data to identify a type of the unstructured data; based on the identification, select a corresponding neural network; apply the selected neural network to the unstructured data to obtain structured data; and output the structured data.
    Type: Application
    Filed: November 7, 2024
    Publication date: May 1, 2025
    Applicant: Capital One Services, LLC
    Inventors: Anh TRUONG, Fardin ABDI TAGHI ABAD, Austin WALTERS, Jeremy GOODSITT, Vincent PHAM, Kate KEY
  • Publication number: 20250137353
    Abstract: An inflow control valve hammer system may include a ram disposed adjacent a valve feature, a hammer device configured to drive the ram into the valve feature, and a retention feature configured to hold the hammer device in a loaded position. The retention feature is configured to release the hammer device to impact the ram in response to a threshold force being exerted on the hammer device, and the impact drives the ram to jerk the valve feature. Additionally, the inflow control valve hammer system may include a spring and an actuator. The spring may be disposed adjacent the hammer device. The spring is configured to exert the threshold force on the hammer device in an energized state. Further, the actuator is configured to energize the spring into the energized state.
    Type: Application
    Filed: August 22, 2024
    Publication date: May 1, 2025
    Applicant: Halliburton Energy Services, Inc.
    Inventors: Michael Linley Fripp, Mohan Gunasekaran, Paul James
  • Publication number: 20250139495
    Abstract: A method and related system for training a machine learning model using a federated learning structure by selectively sharing condensed data between devices includes operations to obtain datasets from client devices comprising a first client device and a second client device and updating a datasets subset to comprise a first dataset. The method further includes updating the datasets subset to comprise a second dataset based on a result indicating that a feature space distance between the first dataset and the second dataset satisfies a set of criteria and sending, to a third client device, the datasets subset comprising the first dataset and the second dataset. The method further includes obtaining, from the third client device, a set of model parameters that is derived from training based on the datasets subset and updating a server version of a machine learning model based on the set of model parameters.
    Type: Application
    Filed: October 26, 2023
    Publication date: May 1, 2025
    Applicant: Capital One Services, LLC
    Inventors: Michael DAVIS, Galen RAFFERTY, Samuel SHARPE, Brian BARR, Jeremy GOODSITT, Taylor TURNER, Kenny BEAN, Owen REINERT, Tyler FARNAN
  • Publication number: 20250139502
    Abstract: Methods and systems are described herein for minimizing development time in artificial intelligence models by automating model selection based on dataset fittings of time-series data prior to hyperparameter optimization.
    Type: Application
    Filed: October 31, 2023
    Publication date: May 1, 2025
    Applicant: Capital One Services, LLC
    Inventors: Michael LANGFORD, Abhisek JANA, Rajesh Kanna DURAIRAJ
  • Publication number: 20250139548
    Abstract: The uncertainty of availability and risk associated with the cost of power procurement hinders the consumer from using new sources of supply/storage devices or taking part in the competitive power markets or procuring power from green energy resources. Present disclosure provides a method and a system for optimal scheduling of power sources for meeting electricity demand of enterprise. In particular, the system performs portfolio optimization formulation for cost, risk and carbon emission minimization for the enterprise. The portfolio optimization formulation simulates market scenario and guides in providing effective power purchase strategy for enterprise along with real-time adjustments. In particular, the level of risk to be considered along with cost of power procurement and carbon footprint determine portfolio allocation for each time block in portfolio optimization formulation.
    Type: Application
    Filed: September 9, 2024
    Publication date: May 1, 2025
    Applicant: Tata Consultancy Services Limited
    Inventors: IRENE JACOB, VISHNU PADMAKUMAR MENON, YOGESH KUMAR BICHPURIYA, VENKATESH SARANGAN, VINODHKANNA JAYARAMAN, SAVARIRAJAN ANTONY JEGAN FERNANDO, NARAYANAN RAJAGOPAL
  • Publication number: 20250139897
    Abstract: This disclosure relates generally to a method and system for three-dimensional (3D) merchandising and space planning. State-of-the-art methods providing the merchandising and space planning for store management in three-dimensional visualization is limited to a specific fixture or to a specific area of the store. However, planning the merchandising and the space for an entire store in three-dimensional hyper-realistic visualization is not yet done. The disclosed method provides three-dimensional hyper-realistic visualization for planning the merchandize and space for an entire store by integrating data analytics capturing real-time information required during planning, and the in-house libraries facilitating quicker and easier design of the layouts for the store. The method includes importing the products from the product library, receiving real-time performance analytics for the products, and creating layout by placing the products on the fixtures imported from the fixture library.
    Type: Application
    Filed: September 9, 2024
    Publication date: May 1, 2025
    Applicant: Tata Consultancy Services Limited
    Inventors: Priyanka DASH, Paul SINGH, Balamurali VENKATESAN, Rajapriya MARIAPPAN, Sundar RAMAKRISNAN, Richard NEIEL
  • Publication number: 20250141908
    Abstract: Current OT security solutions mostly provide defensive security involving monitoring and network segmentation. However, offensive security, proven effective in IT systems, is not easily applicable to OT systems due to its sensitive nature and high availability requirements. To conduct offensive security measures in OT networks, the concept of Digital Twins emerges as a viable solution but with limited progress in developing virtual replicas that accurately simulate real environments. Further, the process of creating such replicas is inherently complex and time-consuming, often involving extensive manual work. The present invention discloses an environment named as “Battle Twin,” a specialized playground designed for breach and attack simulations specifically designed for OT networks. Battle Twin focuses on mimicking the security posture of the underlying network rather than replicating its production or behavioral aspects.
    Type: Application
    Filed: September 8, 2023
    Publication date: May 1, 2025
    Applicant: Cytomate Solutions and Services
    Inventors: Muhammad Masoom Alam, Muhammad Laiq, Hamad Saleh Hadeed
  • Publication number: 20250135589
    Abstract: An apparatus and method of use for supporting a fuel unit, the apparatus including: a frame including an attachment portion and a coupling portion, the attachment portion being configured to engage the fuel unit to thereby prevent lateral movement of the fuel unit relative to the frame, the coupling portion being configured to engage a lift table to thereby prevent lateral movement of the frame relative to the lift table; and a plurality of legs rotatably secured to the frame, each leg of the plurality of legs being configured to transition between an extended configuration and a retracted configuration, wherein the extended configuration is configured to allow a foot of a respective leg to contact a floor, wherein the retracted configuration is configured to prevent the foot of the respective leg from contacting the floor.
    Type: Application
    Filed: December 30, 2024
    Publication date: May 1, 2025
    Applicant: Vehicle Service Group, LLC
    Inventor: Gerry Lauderbaugh
  • Publication number: 20250136940
    Abstract: Disclosed herein are modified NK cells, compositions comprising modified NK cells, and methods for treating a tumor or hyperproliferative disease in a subject. In some embodiments, the modified NK cells include NK cells including a heterologous nucleic acid molecule encoding a CD16 protein comprising a valine at amino acid position 158 (CD16-V158), a heterologous nucleic acid molecule encoding a CCR7 protein, or both. In some embodiments, methods include treating a subject with a tumor by administering a composition comprising an anti-cancer monoclonal antibody and administering a composition comprising the modified NK cells to the subject. Also disclosed are methods of making modified NK cells by obtaining a population of NK cells from a subject and transfecting the population of NK cells with a heterologous nucleic acid molecule encoding CD16-V158, a heterologous nucleic acid molecule encoding a CCR7 protein, or both.
    Type: Application
    Filed: January 2, 2025
    Publication date: May 1, 2025
    Applicant: The United States of America, as represented by the Secretary, Dept. of Health and Human Services
    Inventors: Richard W. Childs, Mattias C.V. Carlsten