Patents by Inventor Ashraf METWALLI

Ashraf METWALLI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170372616
    Abstract: The disclosed embodiments include methods and systems for providing a notification relating to a geographical boundary based on monitored sensor data collected by networked devices. The disclosed embodiments include, for example, a method that monitors positional sensor data received from one or more triggering devices. The method may calculate a first boundary extent delimiting the geographical area of the first boundary based on one or more boundary extent parameters. The method may also detect an occurrence of a triggering condition that impacts a movement of at least one of a client device or at least one of the triggering devices within a geographic region that includes the first location. In response to the detected triggering event, at least one of modified start time or a second location may be established for the event, which may be provided to the client and triggering devices in a notification.
    Type: Application
    Filed: August 9, 2017
    Publication date: December 28, 2017
    Inventors: Orin DEL VECCHIO, Lauren VAN HEERDEN, Gunalan NADARAJAH, Jonathan K. BARNETT, Ashraf METWALLI, Jakub DANIELAK, Michael LOUGHRY, Daniel M. SIEGEL, Nikolas SAWTSCHUK, Sultan MEHRABI, Paul Mon-Wah CHAN, Matthew HAMILTON, Christianne MORETTI, John BARBON
  • Publication number: 20160028715
    Abstract: The disclosed embodiments include methods, systems, system terminals, and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction.
    Type: Application
    Filed: June 23, 2015
    Publication date: January 28, 2016
    Inventors: Prabaharan SIVASHANMUGAM, Lauren VAN HEERDEN, Michael D. CUMMINS, Orin DEL VECCHIO, Gunalan NADARAJAH, Edward LOUNSBURY, Paul Mon-Wah CHAN, Jonathan K. BARNETT, Ashraf METWALLI, Jakub DANIELAK
  • Publication number: 20160027009
    Abstract: The disclosed embodiments include methods and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.
    Type: Application
    Filed: June 23, 2015
    Publication date: January 28, 2016
    Inventors: Prabaharan SIVASHANMUGAM, Lauren VAN HEERDEN, Michael D. CUMMINS, Orin DEL VECCHIO, Gunalan NADARAJAH, Edward LOUNSBURY, Paul Mon-Wah CHAN, Jonathan K. BARNETT, Ashraf METWALLI, Jakub DANIELAK
  • Publication number: 20160014564
    Abstract: The disclosed embodiments include methods and systems for providing a notification relating to a geographical boundary based on monitored sensor data collected by networked devices. The disclosed embodiments include, for example, a method that monitors positional sensor data received from one or more triggering devices. The method may calculate a first boundary extent delimiting the geographical area of the first boundary based on one or more boundary extent parameters. The method may also detect an occurrence of a triggering condition that impacts a movement of at least one of a client device or at least one of the triggering devices within a geographic region that includes the first location. In response to the detected triggering event, at least one of modified start time or a second location may be established for the event, which may be provided to the client and triggering devices in a notification.
    Type: Application
    Filed: July 8, 2015
    Publication date: January 14, 2016
    Inventors: Orin DEL VECCHIO, Lauren VAN HEERDEN, Gunalan NADARAJAH, Jonathan K. BARNETT, Ashraf METWALLI, Jakub DANIELAK, Michael LOUGHRY, Daniel M. SIEGEL, Nikolas SAWTSCHUK, Sultan MEHRABI, Paul Mon-Wah CHAN, Matthew HAMILTON, Christianne MORETTI, John BARBON
  • Publication number: 20160012729
    Abstract: he disclosed embodiments include methods and systems for providing a notification relating to a geographical boundary based on monitored sensor data collected by networked devices. The disclosed embodiments include, for example, a method for receiving, by one or more processors, a request to establish a first boundary around a first location. The method may also include monitoring, by the one or more processors, one or more triggering devices. The method may also include calculating, by the one or more processors, a first boundary extent delimiting the geographical area of the first boundary based on one or more boundary extent parameters. The method may also include detecting, by the one or more processors, whether at least one of the one or more triggering devices is located within the first boundary extent.
    Type: Application
    Filed: July 8, 2015
    Publication date: January 14, 2016
    Inventors: Orin DEL VECCHIO, Lauren VAN HEERDEN, Gunalan NADARAJAH, Jonathan K. BARNETT, Ashraf METWALLI, Jakub DANIELAK, Michael LOUGHRY, Daniel M. SIEGEL, Nikolas SAWTSCHUK, Sultan MEHRABI, Paul Mon-Wah CHAN, Matthew HAMILTON, Christianne MORETTI, John BARBON
  • Publication number: 20150379644
    Abstract: The disclosed embodiments include computerized methods and system for detecting error events, such as account shortfalls, within networked computer systems operated by the financial institutions and other business entities. In one aspect, a system includes a memory storing instructions and one or more processors configured to execute the instruction to perform operating, such as receiving a payment request for a payment amount from a first account of a user to a destination account. The operations may also include determining that the first account lacks sufficient funds to cover the payment amount, and determining that the user has pre-approved a credit line account secured by a first set of investment holdings of the user that generate revenue that is periodically transferred to the first account. The operations may also include performing a fund transfer operation for the payment amount from the credit line account to the first account.
    Type: Application
    Filed: June 30, 2015
    Publication date: December 31, 2015
    Inventors: Jakub DANIELAK, Lauren VAN HEERDEN, Gunalan NADARAJAH, Orin DEL VECCHIO, Paul Mon-Wah CHAN, Jonathan K. BARNETT, Ashraf METWALLI, Matthew HAMILTON, Clara BOR, Wallace BARBOUR
  • Publication number: 20150379485
    Abstract: The disclosed embodiments include methods and system for detecting error events, such as account shortfalls, within networked computer systems operated by the financial institutions and other business. In one aspect, a system includes a memory storing instructions and one or more processors configured to execute the instruction to perform operating, such as receiving a payment request for a payment amount from a first account of a user to a destination account. The operations may also include determining that the first account lacks sufficient funds to cover the payment amount, and determining that the user has pre-approved credit facility secured by a first set of investment holdings of the user that generate revenue that is periodically transferred to the first account. The operations may also include performing a fund transfer operation for the payment amount from the credit line account to the first account.
    Type: Application
    Filed: June 30, 2015
    Publication date: December 31, 2015
    Inventors: Jakub DANIELAK, Lauren VAN HEERDEN, Gunalan NADARAJAH, Orin DEL VECCHIO, Paul Mon-Wah CHAN, Jonathan K. BARNETT, Ashraf METWALLI, Matthew HAMILTON, Clara BOR, Wallace BARBOUR