Patents Assigned to Services
-
Patent number: 11149518Abstract: A fracture network mapping system can include a sensor, a repeater, an acoustic signal generator, and a distributed acoustic sensing system. The sensor and the repeater can be positioned in a fracture of a well. The acoustic signal generator can be positioned in a wellbore of the well. The distributed acoustic sensing system can communicate location data of the sensor from the repeater and the acoustic signal generator to a processing device for mapping the fracture.Type: GrantFiled: October 3, 2017Date of Patent: October 19, 2021Assignee: Halliburton Energy Services, Inc.Inventors: Mikko Jaaskelainen, Ron Dusterhof
-
Publication number: 20210319445Abstract: A system and method for securely transferring funds is disclosed herein. A computing system receives a request to transfer funds from a first account associated with the transferor to a second account associated with the transferee. The computing system identifies one or more constraints specified in the request that are associated with the funds. The computing system stores the funds as reserved funds in the second accounts associated with the transferee. The computing system receives, from a third-party vendor, a transaction request for verifying a transaction between the transferee and the third-party vendor. The computing system identifies one or more parameters associated with the transaction request. The computing system determines that the one or more parameters associated with the transaction request are in accordance with the one or more rules related to use of the funds. The computing system grants the transaction request based on the determining.Type: ApplicationFiled: April 8, 2020Publication date: October 14, 2021Applicant: Capital One Services, LLCInventors: Abdelkader M'Hamed Benkreira, Michael Mossoba, Salik Shah
-
Publication number: 20210318864Abstract: Described herein are embodiments for managing comments in a program code file. A system may select program code and compile it to an intermediary code. The system may compare the intermediary code to a library of intermediary code snippets associated with comments. Based on the comparison, a system may recognize the code to be obsolete. In some embodiments, a system may generate one or more recommendations to update a code. Based on received feedback regarding a recommendation, a system may accordingly update a code.Type: ApplicationFiled: April 9, 2020Publication date: October 14, 2021Applicant: Capital One Services, LLCInventors: Reza FARIVAR, Kenneth TAYLOR, Austin Grant WALTERS, Fardin ABDI TAGHI ABAD, Anh TRUONG, Vincent PHAM, Jeremy Edward GOODSITT
-
Publication number: 20210318865Abstract: Described herein are embodiments for managing comments in a program code file. A system may select program code and compile it to an intermediary code. The system may compare the intermediary code to a library of intermediary code snippets associated with comments. Based on the comparison, a system may recognize the code to be obsolete. In some embodiments, a system may generate one or more recommendations to update a code. Based on received feedback regarding a recommendation, a system may accordingly update a code.Type: ApplicationFiled: April 9, 2020Publication date: October 14, 2021Applicant: Capital One Services, LLCInventors: Reza FARIVAR, Kenneth TAYLOR, Austin Grant WALTERS, Fardin ABDI TAGHI ABAD, Anh TRUONG, Vincent PHAM, Jeremy Edward GOODSITT
-
Publication number: 20210319046Abstract: Conventional hierarchical time-series clustering is highly time consuming process as time-series are characteristically lengthy. Moreover, finding right similarity measure providing best possible hierarchical cluster is critical to derive accurate inferences from the hierarchical clusters. Method and system for Auto Encoded Compact Sequences (AECS) based hierarchical time-series clustering that enables compact latent representation of time-series using an undercomplete multilayered Seq2Seq LSTM auto encoder followed by generating of HCs using multiple similarity measures is disclosed. Further, provided is a mechanism to select the best HC among the multiple HCs on-the-fly, based on an internal clustering performance measure of Modified Hubert statistic ?. Thus, the method provides time efficient and low computational cost approach for hierarchical clustering for both on univariate and multivariate time-series.Type: ApplicationFiled: March 22, 2021Publication date: October 14, 2021Applicant: Tata Consultancy Services LimitedInventors: Soma Bandyopadhyay, Anish Datta, Arpan Pal
-
Publication number: 20210315985Abstract: A chimeric antigen receptor is disclosed that includes: (a) an scFv comprising a light chain variable domain (VL) and a heavy chain variable domain (VH), wherein the scFv specifically binds to CCR4; (b) a hinge and transmembrane domain from CD8; (c) an intracellular 4-1BB signaling domain; and (d) an intracellular CD3 zeta signaling domain, wherein (a)-(d) are in N to C terminal order. Uses of the chimeric antigen receptor, such as for treating a malignancy, are also disclosed.Type: ApplicationFiled: June 21, 2021Publication date: October 14, 2021Applicants: THE UNITED STATES OF AMERICA, as represented by the Secretary, Department of Health and Human Servic, The United States Government as represented by the Department of Veterans AffairsInventors: Liyanage Parakrama Perera, Thomas Alexander Waldmann, Kevin Charles Conlon, Pin-Yu Perera
-
Publication number: 20210316186Abstract: A method and system for limiting the amount of screentime available to a child device based on the activity of a user of the child device. A parent device is used to specify activity threshold(s) and associate them with an amount of screentime. An activity sensor provides activity data that is converted to a screentime value. An available screentime value is decremented as screentime is used on the child device. When the available screentime value reaches zero, access to functions or apps on the child device is disabled.Type: ApplicationFiled: May 28, 2020Publication date: October 14, 2021Applicant: ATA IT Services LLCInventor: Andrew ARMOUR
-
Publication number: 20210320915Abstract: Methods and systems are described for verifying an identity of a user through contextual knowledge-based authentication. The system described uses contextual knowledge-based authentication. By verifying an identity of a user through contextual knowledge-based authentication, the verification is both more secure and more intuitive to the user. For example, by relying on confidential and/or proprietary information, the system may generate verification questions, the answers to which are known only by the user.Type: ApplicationFiled: September 2, 2020Publication date: October 14, 2021Applicant: Capital One Services, LLCInventors: Matt Davis, Pranav Khanna, Paul Melby
-
Publication number: 20210318991Abstract: Disclosed are systems, apparatuses and techniques for replicating data between different cloud computing platforms. Examples include storage replicator components operable in different cloud computing platforms. The first storage replicator component may identify the second cloud computing platform as a location to copy a data file in response to an event related to the data file stored in a first cloud computing platform. The first storage replicator component may request a copy of the data file via an application programming interface of the first cloud computing platform. The attributes of the copy of the data file which involve modification to conform to data management conventions of the second cloud computing platform may be determined and modified to comply with conventions of the second cloud computing platform. The modified copy of the data file may be forwarded to the second cloud computing platform for storage.Type: ApplicationFiled: June 23, 2021Publication date: October 14, 2021Applicant: Capital One Services, LLCInventors: Timothy HAGGERTY, Steven LONG, Deepa RAO, Eric HENRY, Yuting ZHOU
-
Publication number: 20210319355Abstract: Techniques and apparatus for an interactive element presentation process are described. In one embodiment, for example, an apparatus may include logic operative to store a plurality of model specifications for computational models, monitor the object storage service for at least one model event using a first serverless computing service, provide the plurality of model specifications associated with the at least one model event to one of a plurality of serverless computing clusters, generate model data for each of the plurality of model specifications, store the model data for each of the plurality of computational models in the object storage service, monitor the object storage service for at least one data event associated with the model data using a second serverless computing service, cause the plurality of instances to generate a plurality of trained model specifications based on training of the plurality of computational models. Other embodiments are described.Type: ApplicationFiled: April 10, 2020Publication date: October 14, 2021Applicant: Capital One Services, LLCInventors: Karthick ABIRAMAN, Bing LIU, Saranya THANGARAJ, Paul Ponce PORTUGAL, Sang Jin PARK
-
Publication number: 20210319427Abstract: Systems, methods, articles of manufacture, and computer-readable media for determining specific terms to activate a contactless card. An application executing on a server may receive a request from a device specifying a uniform resource locator comprising encrypted data, the encrypted data based at least in part on a private key assigned to a contactless card. The application may decrypt the encrypted data and determine a type of the contactless card. The application may determine a plurality of terms associated with the type of the contactless card and transmit the terms to a web browser on the device. The application may receive, from the web browser, an indication specifying acceptance of the plurality of terms. The application may store, based on the decryption of the encrypted data and the received indication specifying acceptance of the terms, an indication in a database specifying the contactless card is activated for use.Type: ApplicationFiled: April 13, 2020Publication date: October 14, 2021Applicant: Capital One Services, LLCInventors: Jeffrey RULE, Marisa THOMAS, Amy APPONYI
-
Publication number: 20210319448Abstract: Computer-implemented methods and systems are provided for locally freezing a user account in a geographic or digital space. Consistent with disclosed embodiments, locally freezing a user account in a geographic or digital space includes receiving fraud data associated with the user account, the fraud data including a location where a fraud associated with the user account has occurred, wherein the fraud location includes at least one of a digital location or a geographical location; receiving account data associated with the user account, the account data including non-fraudulent account transaction information; generating a pattern of fraud based on the fraud data; generating a pattern of use associated with the user account based on the account data; determining a geodigital area for a localized account freeze based on the pattern of fraud and the pattern of use; and performing a localized account freeze on the user account based on the determined geodigital area.Type: ApplicationFiled: April 8, 2020Publication date: October 14, 2021Applicant: Capital One Services, LLCInventors: Jeremy GOODSITT, Vincent PHAM, Fardin Abdi Taghi ABAD, Austin WALTERS
-
Publication number: 20210317725Abstract: A drill pipe mountable wellbore cleaning tool apparatus is of an improved configuration that enables attachment to a drill pipe joint having first and second connector end portions and a cylindrically shaped portion in between the connector end portions. The drill pipe joint with attached debris cleaning tool or tools is made part of a drill string. The apparatus includes a support sleeve that is mounted to the drill pipe joint in between the connector end portions. The support sleeve abuts but does not invade the integrity of the cylindrical portion. Centralizers are attached to the opposing ends of the support sleeve, with each centralizer overlapping a portion of the support sleeve. The support sleeve carries one or more debris cleaning tools in between the centralizers. These tools enable debris to be removed from a wellbore. At least one locking clamp is attached to the cylindrical portion next to a said centralizer.Type: ApplicationFiled: March 29, 2021Publication date: October 14, 2021Applicant: Odfjell Well Services Norway ASInventors: Simon Leiper, Kevin Robertson
-
Publication number: 20210317362Abstract: A system may include: a source of water fluidically coupled to a fracturing blender; water testing equipment disposed between the source of water and the fracturing blender wherein the water testing equipment is operable to measure at least one property of the source of water; a plurality of friction reducing polymers operable to be added to the fracturing blender; and a control system comprising: at least one processor; and a memory coupled to the processor to provide software that configures the processor to receive an input signal from the water testing equipment and select at least one of the plurality of friction reducing polymers.Type: ApplicationFiled: June 21, 2021Publication date: October 14, 2021Applicant: Halliburton Energy Services, Inc.Inventors: Ian Wood Straffin, Howard Thomas Riley, Teddy Joel Dubois, James William Ogle
-
Publication number: 20210319004Abstract: Various embodiments are generally directed to techniques for creating and utilizing multidimensional embedding spaces for data objects, such as to condition the data for input to a neural network, for instance. Some embodiments are particularly directed to converting semi-structured data, such as a set of data objects, into object vector sets mapped to a multidimensional embedding space. In many embodiments, an embedding space for a set of data objects may be customized with a set of dimensions that correspond to various characteristics of the set of data objects. These and other embodiments are described and claimed.Type: ApplicationFiled: April 9, 2020Publication date: October 14, 2021Applicant: Capital One Services, LLCInventors: Austin Grant WALTERS, Mark Louis WATSON, Jeremy Edward GOODSITT, Anh TRUONG, Reza FARIVAR
-
Publication number: 20210317732Abstract: Systems and method for injection a chemical into a wellbore. A chemical injection system may comprise a first valve, a chemical line, a pilot line, an injection line, and a backflow prevention valve disposable in the injection line. A production fluid recovery system may comprise a chemical injection system, a first valve, a pilot line, an injection line, a backflow prevention valve, a production tree, a wellhead, and production tubing. A method for actuating a valve in a chemical injection system may comprise pushing a fluid into a chemical line, pressurizing a pilot line to open a first valve, pushing the fluid through the first valve, increasing pressure in the pilot line to open a second valve, pushing the fluid through the second valve, pushing the fluid through a chemical line, and injecting fluid into a wellbore from the chemical line.Type: ApplicationFiled: June 22, 2021Publication date: October 14, 2021Applicant: Halliburton Energy Services, Inc.Inventors: Paul Gregory James, Ibrahim El Mallawany
-
Publication number: 20210319095Abstract: A computer-implemented method for detecting a security status of a computer system may include: in response to satisfaction of a predetermined trigger condition associated with an electronic application installed on a memory of the computer system, performing a security check process on the computer system; in response to the security check process determining that a security status of the computer system is currently compromised, performing a first security action; and in response to the security check process determining that the security status is formerly compromised, performing a second security action.Type: ApplicationFiled: April 13, 2020Publication date: October 14, 2021Applicant: Capital One Services, LLCInventor: Jon WHITMORE
-
Publication number: 20210319170Abstract: A system and method for dynamically updating a document having a plurality of modifiable fields are disclosed herein. The document receives one or more inputs for one or more fields contained in the document. The macro processor parses the one or more fields to identify the one or more inputs contained therein. The macro processor compares the one or more inputs to one or more rules defined in a macro associated with the document. Based on the comparing, the macro processor modifies the document to include a subset of modifiable fields. The macro processor generates an updated document that includes the subset of modifiable fields. A computing system presents the updated document to an end user for modification.Type: ApplicationFiled: April 9, 2020Publication date: October 14, 2021Applicant: Capital One Services, LLCInventor: Robert W. Hebert
-
Publication number: 20210315511Abstract: Sepsis is one of the most prevalent causes of mortality in Intensive Care Units (ICUs) and delayed treatment is associated with increase in death and financial burden. There is no single laboratory test or clinical sign that by itself can be considered diagnostic of sepsis. The present disclosure provides discriminating domain specific continuous and categorical features that can reliably classify a subject being monitored into a sepsis class or a normal class. A combination of physiological parameters, laboratory parameters and demographic details are used to extract the discriminating features. Even though the parameters may be sporadic in nature, the systems and methods of the present disclosure make use of a sliding time window to generate continuous features that capture the trend in the sporadic data; and a binning approach to generate categorical features to discriminate deviation from the normal class and facilitate timely treatment.Type: ApplicationFiled: December 10, 2020Publication date: October 14, 2021Applicant: Tata Consultancy Services LimitedInventors: Varsha SHARMA, Chirayata BHATTACHARYYA, Tanuka BHATTACHARJEE, Murali PODUVAL, Sundeep KHANDELWAL, Anirban DUTTA CHOUDHURY
-
Publication number: 20210319105Abstract: A computer-implemented method for detecting a code injection threat may include: performing a search process on a memory of a computer system to identify property list files; in response to an identification of a property list file, retrieving the property list file; performing an analysis process on the property list file to identify a target identifier; in response to an identification of the target identifier in the property list file, determining whether the target identifier corresponds to an electronic application stored in the memory of the computer system; in response to determining that the target identifier corresponds to the electronic application, determining that the property list file is indicative of a code injection threat to the electronic application; and in response to the determination that the property list file is indicative of a code injection threat to the electronic application, performing a security action based on the property list.Type: ApplicationFiled: April 13, 2020Publication date: October 14, 2021Applicant: Capital One Services, LLCInventor: Jon WHITMORE