Patents by Inventor Abhay DONTHI
Abhay DONTHI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250150479Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of receiving a notification to engage a transmission guard bot in a communication session; generating a trained transmission guard bot configured with communication capabilities to engage the communication session; engaging the trained transmission guard bot into the communication session between the plurality of computing devices associated with the plurality of users; utilizing the trained transmission guard bot to continually monitor a plurality of content data associated with the communication session for a predetermined period of time; detecting a suspicious content data point within the plurality of content data associated with the communication session based on the continual monitoring of the at least one transmission guard bot; determining a risk assessment metric associated with the communication session; and invoking an action related to spam prevention via the at least one trained transmission guard bot.Type: ApplicationFiled: November 2, 2023Publication date: May 8, 2025Inventors: Leeyat Bracha Tessler, Dwij Trivedi, Abhay Donthi, Salik Shah, Jennifer Kwok
-
Patent number: 12192402Abstract: Disclosed aspects and embodiments pertain to customer distress assistance. A call can be detected to a callee from a caller. The call can be analyzed and determined to be a fraud or spam risk. In response, callee monitoring is triggered. The monitoring can capture biometrics or speech of the callee. Distress in the callee can be determined through analysis of the biometrics or speech and comparison to reference biometrics or speech of the callee. An individual associated with the callee can be selected based on determining the distress in the customer. The individual can be contacted through a notification or a call to assist the callee in distress.Type: GrantFiled: July 20, 2022Date of Patent: January 7, 2025Assignee: Capital One Services, LLCInventors: Salik Shah, Jennifer Kwok, Abhay Donthi, Dwij Trivedi, Leeyat Bracha Tessler
-
Patent number: 12126751Abstract: Methods and systems are disclosed herein for using one or more machine learning models to determine whether a user is expected to complete a task or action by a deadline. The one or more machine learning models may be trained and/or used to recommend a communication protocol for sending a reminder to the user such that the user is predicted to be more likely to complete an action by the action's deadline. A computing system may use the one or more machine learning models to generate a recommendation for type of reminder to send, for example, if it is predicted that the user is not expected to complete the task by the deadline. A computing system may determine the message to send, the communication protocol to use, and/or the time to send the message.Type: GrantFiled: August 7, 2023Date of Patent: October 22, 2024Assignee: Capital One Services, LLCInventors: Sara Brodsky, Jennifer Kwok, Tania Cruz Morales, Joshua Edwards, Abhay Donthi, Jason Zwierzynski
-
Patent number: 12113929Abstract: A computer-implemented method for authenticating a source of a telephone call to a recipient of the telephone call may include receiving, prior to receiving the telephone call, a request to input first authentication information. The first authentication information may include a passcode or a selection of a security question. The method may include receiving input of the first authentication information and sending, by the user device, the first authentication information to a computing device associated with the source of the telephone call. The method may include receiving the telephone call from the source and receiving input from the recipient of the telephone call to answer the telephone call. The method may include receiving second authentication information from the computing device, where the second authentication information may include the passcode or an answer to the security question. The method may include outputting the second authentication information.Type: GrantFiled: May 3, 2022Date of Patent: October 8, 2024Assignee: Capital One Services, LLCInventors: Jennifer Kwok, Dwij Trivedi, Abhay Donthi, Leeyat Bracha Tessler, Salik Shah
-
Publication number: 20240265401Abstract: Systems and methods of provisioning post-interaction values are disclosed.Type: ApplicationFiled: April 1, 2024Publication date: August 8, 2024Inventors: Abhay Donthi, Michael Mossoba, Asher Smith-Rose
-
Publication number: 20240259492Abstract: A method includes generating a set of non-trusted contacts, each contact of the set of non-trusted contacts corresponding to contact information believed to be associated with vishing attacks. The method further includes sending the set of non-trusted contacts to a computing device of a user. The computing device is configured to add the set of non-trusted contacts to a contacts list associated with an audio calling functionality of the computing device. The computing device is configured to receive a call and determine that the call is from a caller associated with a contact in the set of non-trusted contacts. The computing device is configured to silence the call, block the call, or display caller information of the contact based on the determination that the call is from the caller associated with the contact in the set of non-trusted contacts.Type: ApplicationFiled: January 26, 2023Publication date: August 1, 2024Inventors: Leeyat Bracha Tessler, Abhay Donthi, Salik Shah, Jennifer Kwok, Dwij Trivedi
-
Publication number: 20240232890Abstract: Systems and methods for external account authentication are disclosed herein. They include receiving a call to pair the external account with a secure account, extracting external data from the external account, the external data corresponding to external account content, providing user activity data from the secure account as an input to an authentication machine learning model, providing the external data as an input to the authentication machine learning model, the authentication machine learning model configured to output a certainty level that the external account is associated with a user of the secure account based on the external data and the activity data, receiving the certainty level from the authentication machine learning model, determining that the certainty level meets a certainty threshold, and pairing the external account with the secure account based on determining that the certainty level meets the certainty threshold.Type: ApplicationFiled: October 24, 2022Publication date: July 11, 2024Applicant: Capital One Services, LLCInventors: Jennifer KWOK, Sara Rose BRODSKY, Jason ZWIERZYNSKI, Joshua EDWARDS, Abhay DONTHI, Tania Cruz MORALES
-
Publication number: 20240220993Abstract: Disclosed embodiments pertain to provisioning a virtual payment card for an authorized user in a browser. A primary cardholder can request the addition of an individual as an authorized user on the primary cardholder's account. Further information regarding the individual can be solicited and utilized to compute a risk score associated with adding the individual as an authorized user. Further processing of the request, including whether to terminate or continue, can be based on comparing the risk score to a predetermined threshold. If processing is continued, a virtual payment card linked to the primary cardholder account is generated. Next, the virtual card can be added as a payment method to a browser profile of the individual on a network-accessible computing resource. Subsequently, the authorized user can access the virtual card to make online shopping payments with a web browser personalized with the browser profile.Type: ApplicationFiled: March 18, 2024Publication date: July 4, 2024Applicant: Capital One Services, LLCInventors: Lukiih Cuan, Michael Wolf, Abhay Donthi, Phoebe Atkins
-
Publication number: 20240169329Abstract: A method for machine-learning based action generation, and more specifically, using machine-learning to dynamically adjust financial account payments and fees. The method may comprise: receiving user data; determining whether a trigger condition has been met; upon determining that a trigger condition has been met, generating, using a trained machine-learning model, one or more actions based on the user data associated with the user, wherein the trained machine-learning model has been trained based on (i) training user data and (ii) training action data, to learn relationships between the training user data and the training actions data, such that the trained machine-learning model is configured to use the learned relationships to generate one or more actions in response to input of the user data associated with the user; selecting a first action of the one or more actions; and automatically executing the first action.Type: ApplicationFiled: November 22, 2022Publication date: May 23, 2024Applicant: Capital One Services, LLCInventors: Jennifer KWOK, Tania Cruz MORALES, Sara Rose BRODSKY, Abhay DONTHI, Joshua EDWARDS, Jason ZWIERZYNSKI
-
Publication number: 20240169324Abstract: A method for executing actions based on event data using machine learning is disclosed. The method comprises: receiving occasion data associated with a user; analyzing, using a trained machine learning model, the occasion data to identify an occasion associated with a first classification, wherein the trained machine learning model has been trained based on (i) training occasion data that includes information regarding one or more occasions associated with the training occasion data and (ii) training classification data that includes a prior classification for each of the occasions, to learn relationships between the training occasion data and the training classification data, such that the trained machine learning model is configured to use the learned relationships to identify an occasion associated with a first classification in response to input of the occasion data; determining an action based on the occasion associated with the first classification; and automatically executing the action.Type: ApplicationFiled: November 21, 2022Publication date: May 23, 2024Applicant: Capital One Services, LLCInventors: Joshua EDWARDS, Jason ZWIERZYNSKI, Abhay DONTHI, Sara Rose BRODSKY, Jennifer KWOK, Tania Cruz MORALES
-
Publication number: 20240160708Abstract: A system and method for detecting and prevent identity theft attempts, such as phishing, vishing or other similar attacks is disclosed. A smart device, such as a smartphone operates in tandem with a biometric sensor, such as is included in a wearable device like a smartwatch or fitness tracker. The wearable tracks certain biometric and/or physiological data that can be used to identify whether the user is in a stressed state. The smart device then accesses usage logs that may indicate whether the stressed state is justified, such as whether the user had a calendar appointment at that time, or whether the call was received from a known contact etc. Justifications reduce the likelihood that the user's stress is a result of an identity theft attempt, whereas lack of justification increases the likelihood. In the latter scenario, the user is notified not to divulge sensitive information.Type: ApplicationFiled: November 10, 2022Publication date: May 16, 2024Applicant: Capital One Services, LLCInventors: Dwij TRIVEDI, Abhay DONTHI, Salik SHAH, Jennifer KWOK, Leeyat Bracha TESSLER
-
Publication number: 20240146751Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of receiving a permission indicator identifying a permission by the first user to detect calls being received by the computing device; receiving an indication of a particular call being received from a second user at a particular phone number; detecting a triggering condition to verify when the particular phone number is associated with the particular entity; instructing the computing device to execute a computer routine to verify when the particular phone number is associated with the particular entity; receiving an indication from the computer routine when the particular phone number is not associated with the particular entity; instructing the computing device to perform at least one security action; and instructing to notify a second computing device associated with the particular entity with information pertaining to the particular call.Type: ApplicationFiled: November 2, 2022Publication date: May 2, 2024Inventors: Leeyat Bracha Tessler, Salik Shah, Jennifer Kwok, Abhay Donthi, Dwij Trivedi
-
Publication number: 20240144326Abstract: Methods and systems for estimating a vehicle status using interaction data are disclosed. An exemplary method can include obtaining, via at least one processor, information associated with a vehicle; obtaining, via the at least one processor, a set of interaction data of an individual associated with the vehicle; and accessing, via the at least one processor and on a memory, a framework indicative of an association between interaction data and vehicles status. An exemplary method may further include generating, via the at least one processor and by applying the framework to the set of interaction data and the information associated with the vehicle, an estimate of the vehicle status; generating, via the at least one processor and based on the estimate of the vehicle status, at least one evaluation for the vehicle; and outputting the at least one evaluation.Type: ApplicationFiled: October 31, 2022Publication date: May 2, 2024Applicant: Capital One Services, LLCInventors: Viraj CHAUDHARY, Abhay DONTHI, Cruz VARGAS
-
Publication number: 20240135381Abstract: Systems and methods for external account authentication are disclosed herein. They include receiving a call to pair the external account with a secure account, extracting external data from the external account, the external data corresponding to external account content, providing user activity data from the secure account as an input to an authentication machine learning model, providing the external data as an input to the authentication machine learning model, the authentication machine learning model configured to output a certainty level that the external account is associated with a user of the secure account based on the external data and the activity data, receiving the certainty level from the authentication machine learning model, determining that the certainty level meets a certainty threshold, and pairing the external account with the secure account based on determining that the certainty level meets the certainty threshold.Type: ApplicationFiled: October 23, 2022Publication date: April 25, 2024Applicant: Capital One Services, LLCInventors: Jennifer KWOK, Sara Rose BRODSKY, Jason ZWIERZYNSKI, Joshua EDWARDS, Abhay DONTHI, Tania Cruz MORALES
-
Patent number: 11948154Abstract: Systems and methods of provisioning post-interaction values are disclosed.Type: GrantFiled: July 29, 2021Date of Patent: April 2, 2024Assignee: Capital One Services, LLCInventors: Abhay Donthi, Michael Mossoba, Asher Smith-Rose
-
Patent number: 11941636Abstract: Disclosed embodiments pertain to provisioning a virtual payment card for an authorized user in a browser. A primary cardholder can request the addition of an individual as an authorized user on the primary cardholder's account. Further information regarding the individual can be solicited and utilized to compute a risk score associated with adding the individual as an authorized user. Further processing of the request, including whether to terminate or continue, can be based on comparing the risk score to a predetermined threshold. If processing is continued, a virtual payment card linked to the primary cardholder account is generated. Next, the virtual card can be added as a payment method to a browser profile of the individual on a network-accessible computing resource. Subsequently, the authorized user can access the virtual card to make online shopping payments with a web browser personalized with the browser profile.Type: GrantFiled: July 13, 2022Date of Patent: March 26, 2024Assignee: Capital One Services, LLCInventors: Lukiih Cuan, Michael Wolf, Abhay Donthi, Phoebe Atkins
-
Publication number: 20240056511Abstract: Systems and methods for detecting and repairing loss of a primary digital communication channel may include a server and a user device. The server may be configured to send a push notification to an application of the user device over a network, receive, in response to the sending of the push notification, push notification status data, apply a predictive model to determine whether the primary digital communication channel has failed based on the push notification and the push notification status data; and transmit, upon a determination that the primary digital communication channel has failed, a communication to the user over one or more alternative digital communication channels.Type: ApplicationFiled: August 15, 2022Publication date: February 15, 2024Inventors: Jason ZWIERZYNSKI, Sara Rose BRODSKY, Jennifer KWOK, Joshua EDWARDS, Abhay DONTHI, Tania CRUZ MORALES
-
Publication number: 20240036928Abstract: Embodiments described herein reduce resource insufficiency of a resource source despite inconsistent resource accumulation at the resource source. For example, a request frequency may be determined to define times at which the resource source is predicted to be sufficient despite the inconsistent accumulation or influx. In one use case, with respect to a distributed computing environment having computing resource source(s)/pool(s), a requesting system may identify a machine learning model trained to generate predictions for a resource source at which inconsistent resource accumulation occurs. The system may obtain accumulation data that describes accumulation events at which resources were made available at the resource source.Type: ApplicationFiled: July 26, 2022Publication date: February 1, 2024Applicant: Capital One Services, LLCInventors: Abhay DONTHI, Tania CRUZ MORALES, Jason ZWIERZYNSKI, Joshua EDWARDS, Jennifer KWOK, Sara Rose BRODSKY
-
Publication number: 20240031475Abstract: Disclosed aspects and embodiments pertain to customer distress assistance. A call can be detected to a callee from a caller. The call can be analyzed and determined to be a fraud or spam risk. In response, callee monitoring is triggered. The monitoring can capture biometrics or speech of the callee. Distress in the callee can be determined through analysis of the biometrics or speech and comparison to reference biometrics or speech of the callee. An individual associated with the callee can be selected based on determining the distress in the customer. The individual can be contacted through a notification or a call to assist the callee in distress.Type: ApplicationFiled: July 20, 2022Publication date: January 25, 2024Inventors: Salik Shah, Jennifer Kwok, Abhay Donthi, Dwij Trivedi, Leeyat Bracha Tessler
-
Publication number: 20240020699Abstract: Disclosed embodiments pertain to provisioning a virtual payment card for an authorized user in a browser. A primary cardholder can request the addition of an individual as an authorized user on the primary cardholder's account. Further information regarding the individual can be solicited and utilized to compute a risk score associated with adding the individual as an authorized user. Further processing of the request, including whether to terminate or continue, can be based on comparing the risk score to a predetermined threshold. If processing is continued, a virtual payment card linked to the primary cardholder account is generated. Next, the virtual card can be added as a payment method to a browser profile of the individual on a network-accessible computing resource. Subsequently, the authorized user can access the virtual card to make online shopping payments with a web browser personalized with the browser profile.Type: ApplicationFiled: July 13, 2022Publication date: January 18, 2024Inventors: Lukiih Cuan, Michael Wolf, Abhay Donthi, Phoebe Atkins