Patents by Inventor Abhay DONTHI

Abhay DONTHI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250150479
    Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of receiving a notification to engage a transmission guard bot in a communication session; generating a trained transmission guard bot configured with communication capabilities to engage the communication session; engaging the trained transmission guard bot into the communication session between the plurality of computing devices associated with the plurality of users; utilizing the trained transmission guard bot to continually monitor a plurality of content data associated with the communication session for a predetermined period of time; detecting a suspicious content data point within the plurality of content data associated with the communication session based on the continual monitoring of the at least one transmission guard bot; determining a risk assessment metric associated with the communication session; and invoking an action related to spam prevention via the at least one trained transmission guard bot.
    Type: Application
    Filed: November 2, 2023
    Publication date: May 8, 2025
    Inventors: Leeyat Bracha Tessler, Dwij Trivedi, Abhay Donthi, Salik Shah, Jennifer Kwok
  • Patent number: 12192402
    Abstract: Disclosed aspects and embodiments pertain to customer distress assistance. A call can be detected to a callee from a caller. The call can be analyzed and determined to be a fraud or spam risk. In response, callee monitoring is triggered. The monitoring can capture biometrics or speech of the callee. Distress in the callee can be determined through analysis of the biometrics or speech and comparison to reference biometrics or speech of the callee. An individual associated with the callee can be selected based on determining the distress in the customer. The individual can be contacted through a notification or a call to assist the callee in distress.
    Type: Grant
    Filed: July 20, 2022
    Date of Patent: January 7, 2025
    Assignee: Capital One Services, LLC
    Inventors: Salik Shah, Jennifer Kwok, Abhay Donthi, Dwij Trivedi, Leeyat Bracha Tessler
  • Patent number: 12126751
    Abstract: Methods and systems are disclosed herein for using one or more machine learning models to determine whether a user is expected to complete a task or action by a deadline. The one or more machine learning models may be trained and/or used to recommend a communication protocol for sending a reminder to the user such that the user is predicted to be more likely to complete an action by the action's deadline. A computing system may use the one or more machine learning models to generate a recommendation for type of reminder to send, for example, if it is predicted that the user is not expected to complete the task by the deadline. A computing system may determine the message to send, the communication protocol to use, and/or the time to send the message.
    Type: Grant
    Filed: August 7, 2023
    Date of Patent: October 22, 2024
    Assignee: Capital One Services, LLC
    Inventors: Sara Brodsky, Jennifer Kwok, Tania Cruz Morales, Joshua Edwards, Abhay Donthi, Jason Zwierzynski
  • Patent number: 12113929
    Abstract: A computer-implemented method for authenticating a source of a telephone call to a recipient of the telephone call may include receiving, prior to receiving the telephone call, a request to input first authentication information. The first authentication information may include a passcode or a selection of a security question. The method may include receiving input of the first authentication information and sending, by the user device, the first authentication information to a computing device associated with the source of the telephone call. The method may include receiving the telephone call from the source and receiving input from the recipient of the telephone call to answer the telephone call. The method may include receiving second authentication information from the computing device, where the second authentication information may include the passcode or an answer to the security question. The method may include outputting the second authentication information.
    Type: Grant
    Filed: May 3, 2022
    Date of Patent: October 8, 2024
    Assignee: Capital One Services, LLC
    Inventors: Jennifer Kwok, Dwij Trivedi, Abhay Donthi, Leeyat Bracha Tessler, Salik Shah
  • Publication number: 20240265401
    Abstract: Systems and methods of provisioning post-interaction values are disclosed.
    Type: Application
    Filed: April 1, 2024
    Publication date: August 8, 2024
    Inventors: Abhay Donthi, Michael Mossoba, Asher Smith-Rose
  • Publication number: 20240259492
    Abstract: A method includes generating a set of non-trusted contacts, each contact of the set of non-trusted contacts corresponding to contact information believed to be associated with vishing attacks. The method further includes sending the set of non-trusted contacts to a computing device of a user. The computing device is configured to add the set of non-trusted contacts to a contacts list associated with an audio calling functionality of the computing device. The computing device is configured to receive a call and determine that the call is from a caller associated with a contact in the set of non-trusted contacts. The computing device is configured to silence the call, block the call, or display caller information of the contact based on the determination that the call is from the caller associated with the contact in the set of non-trusted contacts.
    Type: Application
    Filed: January 26, 2023
    Publication date: August 1, 2024
    Inventors: Leeyat Bracha Tessler, Abhay Donthi, Salik Shah, Jennifer Kwok, Dwij Trivedi
  • Publication number: 20240232890
    Abstract: Systems and methods for external account authentication are disclosed herein. They include receiving a call to pair the external account with a secure account, extracting external data from the external account, the external data corresponding to external account content, providing user activity data from the secure account as an input to an authentication machine learning model, providing the external data as an input to the authentication machine learning model, the authentication machine learning model configured to output a certainty level that the external account is associated with a user of the secure account based on the external data and the activity data, receiving the certainty level from the authentication machine learning model, determining that the certainty level meets a certainty threshold, and pairing the external account with the secure account based on determining that the certainty level meets the certainty threshold.
    Type: Application
    Filed: October 24, 2022
    Publication date: July 11, 2024
    Applicant: Capital One Services, LLC
    Inventors: Jennifer KWOK, Sara Rose BRODSKY, Jason ZWIERZYNSKI, Joshua EDWARDS, Abhay DONTHI, Tania Cruz MORALES
  • Publication number: 20240220993
    Abstract: Disclosed embodiments pertain to provisioning a virtual payment card for an authorized user in a browser. A primary cardholder can request the addition of an individual as an authorized user on the primary cardholder's account. Further information regarding the individual can be solicited and utilized to compute a risk score associated with adding the individual as an authorized user. Further processing of the request, including whether to terminate or continue, can be based on comparing the risk score to a predetermined threshold. If processing is continued, a virtual payment card linked to the primary cardholder account is generated. Next, the virtual card can be added as a payment method to a browser profile of the individual on a network-accessible computing resource. Subsequently, the authorized user can access the virtual card to make online shopping payments with a web browser personalized with the browser profile.
    Type: Application
    Filed: March 18, 2024
    Publication date: July 4, 2024
    Applicant: Capital One Services, LLC
    Inventors: Lukiih Cuan, Michael Wolf, Abhay Donthi, Phoebe Atkins
  • Publication number: 20240169329
    Abstract: A method for machine-learning based action generation, and more specifically, using machine-learning to dynamically adjust financial account payments and fees. The method may comprise: receiving user data; determining whether a trigger condition has been met; upon determining that a trigger condition has been met, generating, using a trained machine-learning model, one or more actions based on the user data associated with the user, wherein the trained machine-learning model has been trained based on (i) training user data and (ii) training action data, to learn relationships between the training user data and the training actions data, such that the trained machine-learning model is configured to use the learned relationships to generate one or more actions in response to input of the user data associated with the user; selecting a first action of the one or more actions; and automatically executing the first action.
    Type: Application
    Filed: November 22, 2022
    Publication date: May 23, 2024
    Applicant: Capital One Services, LLC
    Inventors: Jennifer KWOK, Tania Cruz MORALES, Sara Rose BRODSKY, Abhay DONTHI, Joshua EDWARDS, Jason ZWIERZYNSKI
  • Publication number: 20240169324
    Abstract: A method for executing actions based on event data using machine learning is disclosed. The method comprises: receiving occasion data associated with a user; analyzing, using a trained machine learning model, the occasion data to identify an occasion associated with a first classification, wherein the trained machine learning model has been trained based on (i) training occasion data that includes information regarding one or more occasions associated with the training occasion data and (ii) training classification data that includes a prior classification for each of the occasions, to learn relationships between the training occasion data and the training classification data, such that the trained machine learning model is configured to use the learned relationships to identify an occasion associated with a first classification in response to input of the occasion data; determining an action based on the occasion associated with the first classification; and automatically executing the action.
    Type: Application
    Filed: November 21, 2022
    Publication date: May 23, 2024
    Applicant: Capital One Services, LLC
    Inventors: Joshua EDWARDS, Jason ZWIERZYNSKI, Abhay DONTHI, Sara Rose BRODSKY, Jennifer KWOK, Tania Cruz MORALES
  • Publication number: 20240160708
    Abstract: A system and method for detecting and prevent identity theft attempts, such as phishing, vishing or other similar attacks is disclosed. A smart device, such as a smartphone operates in tandem with a biometric sensor, such as is included in a wearable device like a smartwatch or fitness tracker. The wearable tracks certain biometric and/or physiological data that can be used to identify whether the user is in a stressed state. The smart device then accesses usage logs that may indicate whether the stressed state is justified, such as whether the user had a calendar appointment at that time, or whether the call was received from a known contact etc. Justifications reduce the likelihood that the user's stress is a result of an identity theft attempt, whereas lack of justification increases the likelihood. In the latter scenario, the user is notified not to divulge sensitive information.
    Type: Application
    Filed: November 10, 2022
    Publication date: May 16, 2024
    Applicant: Capital One Services, LLC
    Inventors: Dwij TRIVEDI, Abhay DONTHI, Salik SHAH, Jennifer KWOK, Leeyat Bracha TESSLER
  • Publication number: 20240146751
    Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of receiving a permission indicator identifying a permission by the first user to detect calls being received by the computing device; receiving an indication of a particular call being received from a second user at a particular phone number; detecting a triggering condition to verify when the particular phone number is associated with the particular entity; instructing the computing device to execute a computer routine to verify when the particular phone number is associated with the particular entity; receiving an indication from the computer routine when the particular phone number is not associated with the particular entity; instructing the computing device to perform at least one security action; and instructing to notify a second computing device associated with the particular entity with information pertaining to the particular call.
    Type: Application
    Filed: November 2, 2022
    Publication date: May 2, 2024
    Inventors: Leeyat Bracha Tessler, Salik Shah, Jennifer Kwok, Abhay Donthi, Dwij Trivedi
  • Publication number: 20240144326
    Abstract: Methods and systems for estimating a vehicle status using interaction data are disclosed. An exemplary method can include obtaining, via at least one processor, information associated with a vehicle; obtaining, via the at least one processor, a set of interaction data of an individual associated with the vehicle; and accessing, via the at least one processor and on a memory, a framework indicative of an association between interaction data and vehicles status. An exemplary method may further include generating, via the at least one processor and by applying the framework to the set of interaction data and the information associated with the vehicle, an estimate of the vehicle status; generating, via the at least one processor and based on the estimate of the vehicle status, at least one evaluation for the vehicle; and outputting the at least one evaluation.
    Type: Application
    Filed: October 31, 2022
    Publication date: May 2, 2024
    Applicant: Capital One Services, LLC
    Inventors: Viraj CHAUDHARY, Abhay DONTHI, Cruz VARGAS
  • Publication number: 20240135381
    Abstract: Systems and methods for external account authentication are disclosed herein. They include receiving a call to pair the external account with a secure account, extracting external data from the external account, the external data corresponding to external account content, providing user activity data from the secure account as an input to an authentication machine learning model, providing the external data as an input to the authentication machine learning model, the authentication machine learning model configured to output a certainty level that the external account is associated with a user of the secure account based on the external data and the activity data, receiving the certainty level from the authentication machine learning model, determining that the certainty level meets a certainty threshold, and pairing the external account with the secure account based on determining that the certainty level meets the certainty threshold.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Applicant: Capital One Services, LLC
    Inventors: Jennifer KWOK, Sara Rose BRODSKY, Jason ZWIERZYNSKI, Joshua EDWARDS, Abhay DONTHI, Tania Cruz MORALES
  • Patent number: 11948154
    Abstract: Systems and methods of provisioning post-interaction values are disclosed.
    Type: Grant
    Filed: July 29, 2021
    Date of Patent: April 2, 2024
    Assignee: Capital One Services, LLC
    Inventors: Abhay Donthi, Michael Mossoba, Asher Smith-Rose
  • Patent number: 11941636
    Abstract: Disclosed embodiments pertain to provisioning a virtual payment card for an authorized user in a browser. A primary cardholder can request the addition of an individual as an authorized user on the primary cardholder's account. Further information regarding the individual can be solicited and utilized to compute a risk score associated with adding the individual as an authorized user. Further processing of the request, including whether to terminate or continue, can be based on comparing the risk score to a predetermined threshold. If processing is continued, a virtual payment card linked to the primary cardholder account is generated. Next, the virtual card can be added as a payment method to a browser profile of the individual on a network-accessible computing resource. Subsequently, the authorized user can access the virtual card to make online shopping payments with a web browser personalized with the browser profile.
    Type: Grant
    Filed: July 13, 2022
    Date of Patent: March 26, 2024
    Assignee: Capital One Services, LLC
    Inventors: Lukiih Cuan, Michael Wolf, Abhay Donthi, Phoebe Atkins
  • Publication number: 20240056511
    Abstract: Systems and methods for detecting and repairing loss of a primary digital communication channel may include a server and a user device. The server may be configured to send a push notification to an application of the user device over a network, receive, in response to the sending of the push notification, push notification status data, apply a predictive model to determine whether the primary digital communication channel has failed based on the push notification and the push notification status data; and transmit, upon a determination that the primary digital communication channel has failed, a communication to the user over one or more alternative digital communication channels.
    Type: Application
    Filed: August 15, 2022
    Publication date: February 15, 2024
    Inventors: Jason ZWIERZYNSKI, Sara Rose BRODSKY, Jennifer KWOK, Joshua EDWARDS, Abhay DONTHI, Tania CRUZ MORALES
  • Publication number: 20240036928
    Abstract: Embodiments described herein reduce resource insufficiency of a resource source despite inconsistent resource accumulation at the resource source. For example, a request frequency may be determined to define times at which the resource source is predicted to be sufficient despite the inconsistent accumulation or influx. In one use case, with respect to a distributed computing environment having computing resource source(s)/pool(s), a requesting system may identify a machine learning model trained to generate predictions for a resource source at which inconsistent resource accumulation occurs. The system may obtain accumulation data that describes accumulation events at which resources were made available at the resource source.
    Type: Application
    Filed: July 26, 2022
    Publication date: February 1, 2024
    Applicant: Capital One Services, LLC
    Inventors: Abhay DONTHI, Tania CRUZ MORALES, Jason ZWIERZYNSKI, Joshua EDWARDS, Jennifer KWOK, Sara Rose BRODSKY
  • Publication number: 20240031475
    Abstract: Disclosed aspects and embodiments pertain to customer distress assistance. A call can be detected to a callee from a caller. The call can be analyzed and determined to be a fraud or spam risk. In response, callee monitoring is triggered. The monitoring can capture biometrics or speech of the callee. Distress in the callee can be determined through analysis of the biometrics or speech and comparison to reference biometrics or speech of the callee. An individual associated with the callee can be selected based on determining the distress in the customer. The individual can be contacted through a notification or a call to assist the callee in distress.
    Type: Application
    Filed: July 20, 2022
    Publication date: January 25, 2024
    Inventors: Salik Shah, Jennifer Kwok, Abhay Donthi, Dwij Trivedi, Leeyat Bracha Tessler
  • Publication number: 20240020699
    Abstract: Disclosed embodiments pertain to provisioning a virtual payment card for an authorized user in a browser. A primary cardholder can request the addition of an individual as an authorized user on the primary cardholder's account. Further information regarding the individual can be solicited and utilized to compute a risk score associated with adding the individual as an authorized user. Further processing of the request, including whether to terminate or continue, can be based on comparing the risk score to a predetermined threshold. If processing is continued, a virtual payment card linked to the primary cardholder account is generated. Next, the virtual card can be added as a payment method to a browser profile of the individual on a network-accessible computing resource. Subsequently, the authorized user can access the virtual card to make online shopping payments with a web browser personalized with the browser profile.
    Type: Application
    Filed: July 13, 2022
    Publication date: January 18, 2024
    Inventors: Lukiih Cuan, Michael Wolf, Abhay Donthi, Phoebe Atkins