Patents by Inventor Brian Jacobson
Brian Jacobson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250061469Abstract: Systems and methods for alerting an organization about activity that may be fraudulent. Systems may include a computer processor, a storage module, a cleaning module, a preprocessing module, a features extraction module, and a machine learning module. The computer processor may be configured to run a fraud detection engine by collecting publicly available electronic forms every 36 hours, using the modules to store the forms, clean the data, preprocess the data, and run a machine learning model to extract features and to determine if a threshold indicating a risk of fraud has been exceeded. The machine learning models include a liquid, solvency, and profitability ratio classification model, a disclosure classification model, a sentiment analysis model, an anomaly detection classification model, an ownership analysis classification model, and an ESG disclosure classification model. When exceeding a threshold, the computer processor may notify an administrator of the exceeded threshold's identity.Type: ApplicationFiled: August 17, 2023Publication date: February 20, 2025Inventors: Rahul Yaksh, Amer Ali, Brian Jacobson, Elvis Nyamwange, Erik Dahl, Hari Vuppala, Pratap Dande, Rahul Phadnis, Sailesh Vezzu
-
Patent number: 12228548Abstract: A structure including a substrate and a coating over the substrate is acoustically excited to measure acoustic response in the structure. The measured acoustic response in the structure is filtered to remove acoustic response of the substrate and determine acoustic response of the coating. The acoustic response of the coating is used to inspect the coating for failure.Type: GrantFiled: March 13, 2022Date of Patent: February 18, 2025Assignees: Chevron U.S.A. Inc., Triad National Security, LLCInventors: Erica Marie Jacobson, Ian Thomas Cummings, Eric Brian Flynn, Adam Joseph Wachtor, Benjamin M Chaloner-Gill, Brock Genter, Martin Quintero, Ryan S. Sanders
-
Publication number: 20250053307Abstract: A computing platform may train, using historical information migration error information, an information reconciliation engine to predict information migration errors. The computing platform may detect migration of information from a source information system to a target information system. The computing platform may generate, by inputting the information into the information reconciliation engine, a list of predicted migration errors. The computing platform may sample the migrated information to identify a list of real time migration errors. The computing platform may identify corrective actions to address the list of predicted migration errors and the list of real time migration errors. The computing platform may generate, based on the corrective actions, a configuration file.Type: ApplicationFiled: August 8, 2023Publication date: February 13, 2025Inventors: Rahul Phadnis, Hari Vuppala, Rahul Yaksh, Pratap Dande, Elvis Nyamwange, Erik Dahl, Brian Jacobson, Sailesh Vezzu, Amer Ali
-
Publication number: 20250036739Abstract: A video QR code may be used to authenticate a user using a user device. The video QR code may include a video in which a QR code is shown in motion over a time interval. The movement may be, for example, a change in position or orientation of the QR code. The authentication process may include generating the video QR code, causing a display of the video QR code, capturing, with the user device from the display, images of the QR code at specified times during the video, and determining whether there is a match between the captured images on the user device and the displayed images at the specified times. The authentication may also confirm the geolocation of the user device and the display match. The QR code may be extracted from the images. User access to a system may be granted upon verification of the QR code.Type: ApplicationFiled: July 26, 2023Publication date: January 30, 2025Inventors: Elvis Nyamwange, Sailesh Vezzu, Amer Ali, Rahul Phadnis, Rahul Yaksh, Hari Vuppala, Pratap Dande, Brian Jacobson, Erik Dahl
-
Publication number: 20250037447Abstract: An apparatus may include conduction of a secure transfer at a point of identification using image recognition and blockchain authentication. The apparatus may include a computer processor, a camera, an image capturing machine, a reference database, an XGBoost image recognition machine learning model, and a blockchain. The computer processor may be an edge computing device. The computer processor may be configured to identify a user at a point of identification by capturing an image, running the Features detection engine to identify sets of features, running the XGBoost image recognition machine learning model to identify labels in the sets of features, and matching the sets of features and labels to a record in the reference database. The computer processor may further be configured to seek user approval on the user's portable device before providing the transfer. Once the user has approved the transfer, the transfer may be recorded in the blockchain.Type: ApplicationFiled: July 28, 2023Publication date: January 30, 2025Inventors: Elvis Nyamwange, Sailesh Vezzu, Amer Ali, Rahul Phadnis, Rahul Yaksh, Hari Vuppala, Pratap Dande, Brian Jacobson, Erik Dahl
-
Publication number: 20250037548Abstract: Aspects of the disclosure relate to detecting attempts to violate the security of an ATM. A computing system may determine whether an ATM is being used to perform a transaction. Based on the ATM not being used to perform a transaction, images of portions of the ATM may be generated. Estimated dimensions of the ATM may be determined. Digital twin data may be retrieved. The digital twin data may comprise a digital twin representation of the ATM and measured dimensions of the ATM. There may be a determination of whether the estimated dimensions of the ATM match the measured dimensions of the ATM. Based on the estimated dimensions of the ATM not matching the measured dimensions of the ATM, the ATM may be deactivated. Furthermore, a message indicating that the ATM was deactivated may be sent to a validation computing system.Type: ApplicationFiled: July 27, 2023Publication date: January 30, 2025Inventors: Elvis Nyamwange, Sailesh Vezzu, Amer Ali, Rahul Phadnis, Rahul Yaksh, Hari Vuppala, Pratap Dande, Brian Jacobson, Erik Dahl
-
Publication number: 20250028621Abstract: An apparatus may include a computer processor operating in a data center and running an AI/ML model. The apparatus may include a trace log agent and a telemetry agent. The computer processor may be configured to train and run the AI/ML model to determine if a resource in the data center is being utilized or is idle by using data provided by the trace log agent and a telemetry agent. The apparatus may include a status check engine, a discovery engine, and an analytics engine. The computer processor may be configured to run each of these engines to confirm a prediction by the AI/ML model that the resource is idle. The computer processor may be configured to notify an administrator of the data center if the AI/ML model predicts the resource is idle and the engines provide increased confidence to the prediction.Type: ApplicationFiled: July 20, 2023Publication date: January 23, 2025Inventors: Elvis Nyamwange, Erik Dahl, Brian Jacobson, Pratap Dande, Hari Vuppala, Rahul Yaksh, Rahul Phadnis, Amer Ali, Sailesh Vezzu
-
Publication number: 20250030717Abstract: Arrangements for detecting polymorphic botnets using a pattern matching engine are provided. The platform may train a pattern matching engine to generate image pattern statuses based on a training set of historical image patterns. The platform may automatically generate real-time interaction information based on monitoring interactions between user devices and cloud platforms. The platform may generate a potentially malicious image pattern based on the real-time interaction information. The platform may then input the image pattern into the pattern matching engine to generate an image pattern status for the image pattern. The platform may store the image pattern to a pattern storage repository. Based on identifying the image pattern as malicious, the platform may initiate a security action. The platform may update the pattern matching engine based on the image pattern and its image pattern status to detect future polymorphic botnet attacks.Type: ApplicationFiled: July 21, 2023Publication date: January 23, 2025Inventors: Elvis Nyamwange, Erik Dahl, Brian Jacobson, Pratap Dande, Hari Vuppala, Rahul Yaksh, Rahul Phadnis, Amer Ali, Sailesh Vezzu
-
Publication number: 20250021699Abstract: A cloud governance assessment engine using artificial intelligence (AI) may assess privacy, regulatory, and security concerns before migrating an organization's information technology (IT) services from an on-premises data center to a proposed cloud infrastructure. The assessment may consider whether the proposed cloud infrastructure is able to maintain the governance rules currently implemented at the on-premises data center. The cloud assessment engine may train and use a cloud governance assessment model to analyze, using AI, properties of the proposed cloud infrastructure to determine governance risks. Scoring may be automatically generated by the cloud governance assessment engine based on the risks to evaluate whether the cloud infrastructure meets the requirements of the organization or whether changes to the cloud infrastructure are warranted.Type: ApplicationFiled: July 13, 2023Publication date: January 16, 2025Inventors: Pratap Dande, Elvis Nyamwange, Brian Jacobson, Amer Ali, Erik Dahl, Rahul Phadnis, Rahul Yaksh, Hari Vuppala, Sailesh Vezzu
-
Publication number: 20250021640Abstract: Aspects of the disclosure relate to using multiple machine learning models and a sand-box environment to detect malicious uniform resource locators (URLs) and login pages stored in a QR code. An application on a computing device will augment QR code data stored in a QR code and the computing device sends the QR code data and computing device metadata to a deep learning computing platform. The QR code data may comprise a URL and communication protocol information. The deep learning computing platform will generate, by multiple machine learning models and a sand-box environment, a sand-box score using the URL, a user-based score using the computing device metadata, and a connections score using the communication protocol information. The deep learning platform then determines whether the computing device should reject and delete the QR code data based on whether the scores are below a pre-determined threshold.Type: ApplicationFiled: July 13, 2023Publication date: January 16, 2025Inventors: Elvis Nyamwange, Erik Dahl, Brian Jacobson, Pratap Dande, Hari Vuppala, Rahul Yaksh, Rahul Phadnis, Amer Ali, Sailesh Vezzu
-
Patent number: 12125353Abstract: A computer performs a method for pro-actively administering a physical network of automated teller machines (ATM). The network may include ATMs. The network may be coupled, using an asynchronous transfer mode Wide Area Network (WAN) and the router, to a second plurality of ATMs via a digital subscriber line (DSL) module, a Closed Circuit Television (CCTV) system to provide CCTV television footage, and/or a 5-G cellular interface. The method receives input data using a data processing block coupled to the network of ATMs. The data may be derived from the plurality of ATMS, the WAN, the second plurality of ATMs, the CCTV and/or the 5-G cellular network interface. The method cleans and processes data and leverages a virtual digital twin to predictively provide status information of the ATMs based on the data. The method may formulate and maintain predictive data using a digital twin prediction model.Type: GrantFiled: July 17, 2023Date of Patent: October 22, 2024Assignee: Bank of America CorporationInventors: Elvis Nyamwange, Erik Dahl, Brian Jacobson, Pratap Dande, Hari Vuppala, Rahul Yaksh, Rahul Phadnis, Amer Ali, Sailesh Vezzu
-
Publication number: 20240143748Abstract: Virtual machine images may be constantly scanned using background process, to identify current and evolving security risks, such as by optimizing the image scanning a last-in, first-out (LIFO) stack to prioritize most relevant images. Older and/or non-relevant image are removed from the scanning process and removed from use. Virtual machines image prioritization is based on each virtual machine image's current and/or potential usage requirement, where the LIFO stack prioritizes the scanning order. Newly created virtual machine images and/or newly re-activated virtual machine images are placed onto a provisioning queue (first-in, first out) before activation. The virtual machine images active within a host computing environment are processed via a reconciliation process to scan for indications of security vulnerabilities and/or threats to network security. Obsolete or otherwise irrelevant virtual machine images are removed from use via a repository synchronization process.Type: ApplicationFiled: November 1, 2022Publication date: May 2, 2024Inventors: Brian Jacobson, Boris Gitlin, Donna Phillips, Elvis Nyamwange, Madhukiran Bangalore Ramachandra, Vismay Mandloi
-
Publication number: 20240111644Abstract: Apparatus and methods for a proactive monitoring-container switching system is provided. The system may include a server cluster. The system may proactively monitor the servers within the cluster to determine if one or more servers within the cluster are showing weaknesses. Upon identifying the weaknesses, the system may identify an available server within the cluster and copy the contents of the weakened server to the available server. The system may then switch the DNS pointer from the weakened server to the available server. Switching the DNS pointer may switch any users and/or applications from the weakened server to the available server with minimal disruption. The synchronizing between servers may maintain the health of the server cluster.Type: ApplicationFiled: September 30, 2022Publication date: April 4, 2024Inventors: Brian Jacobson, Donna Phillips, Elvis Nyamwange, Madhukiran Bangalore Ramachandra, Vismay Mandloi
-
Publication number: 20240061667Abstract: Aspects of the disclosure are directed to importing software container images, where an image importer that may import a very large number of container images into local repositories from one or more upstream repositories to an enterprise container platform. An associated computing cluster executes containers (for example, applications and operators) based on the imported container images. Each release (version) of a product supported by the enterprise container platform may require importing newer image sets with respect to the current version. With one aspect, an image importer maintains an image list for container images of the current version, where only missing newer container images for a newer version are added to the list. Only the missing container images for the new version are imported to the enterprise container platform. This approach circumvents importing previously imported container and/or available newer images, thus reducing the amount of imported data from upstream repositories.Type: ApplicationFiled: August 22, 2022Publication date: February 22, 2024Inventors: Madhukiran Bangalore Ramachandra, Brian Jacobson, Donna Phillips, Vismay Mandloi, Elvis Nyamwange
-
Patent number: 10894529Abstract: A mobile sanitization system is described that allows the operator of a vehicle such as a forklift to spray a sanitizing solution onto the tires of the vehicle as it is rolling to quickly and efficiently sanitize the tires. The sanitizing solution is configured for killing any microorganisms that may be present in the tires of the vehicle, so that they are not transported into critical areas such as food processing areas.Type: GrantFiled: December 28, 2017Date of Patent: January 19, 2021Inventors: Clifford Loren Jacobson, Timothy Brian Jacobson
-
Publication number: 20190202412Abstract: A mobile sanitization system is described that allows the operator of a vehicle such as a forklift to spray a sanitizing solution onto the tires of the vehicle as it is rolling to quickly and efficiently sanitize the tires. The sanitizing solution is configured for killing any microorganisms that may be present in the tires of the vehicle, so that they are not transported into critical areas such as food processing areas.Type: ApplicationFiled: December 28, 2017Publication date: July 4, 2019Inventors: Clifford Loren Jacobson, Timothy Brian Jacobson
-
Patent number: 8192052Abstract: A lamp is provided. Generally, the lamp comprises light source means for providing illumination in a frontward direction, retainer means for applying a frontward-directed load to the light source, and housing means for mechanically supporting the light source means and the retainer means.Type: GrantFiled: October 3, 2008Date of Patent: June 5, 2012Assignee: Sunnex, Inc.Inventors: A. Brian Jacobson, B. Mayur Pangrekar
-
Patent number: 7903108Abstract: The invention describes a method and system for use in occlusion culling of polygons in an interactive environment, such as a game. The invention employs a boundary box to simplify the testing of occludee polygons. Occluders and occludees are also transformed into non-interpenetrating, non-overlapping polygons. Winged-edges are employed to minimize a per occludee computational cost due to precision problems that may arise at non-overlapping edges. The invention then proceeds through an active edge list to identify edge discontinuities (e.g., where an edge is added or removed from the active edge list). Depth analysis is employed to determine whether an occluder occludes an occludee at the edge discontinuity. Moreover, the invention only performs depth analysis for those locations of a screen display where an occludee is determined to reside, thereby minimizing unnecessary computations.Type: GrantFiled: August 21, 2008Date of Patent: March 8, 2011Assignee: Valve CorporationInventor: Brian Jacobson
-
Publication number: 20090091938Abstract: A lamp is provided. Generally, the lamp comprises light source means for providing illumination in a frontward direction, retainer means for applying a frontward-directed load to the light source, and housing means for mechanically supporting the light source means and the retainer means.Type: ApplicationFiled: October 3, 2008Publication date: April 9, 2009Applicant: Sunnex, Inc.Inventors: A. Brian Jacobson, B. Mayur Pangrekar
-
Publication number: 20080309659Abstract: The invention describes a method and system for use in occlusion culling of polygons in an interactive environment, such as a game. The invention employs a boundary box to simplify the testing of occludee polygons. Occluders and occludees are also transformed into non-interpenetrating, non-overlapping polygons. Winged-edges are employed to minimize a per occludee computational cost due to precision problems that may arise at non-overlapping edges. The invention then proceeds through an active edge list to identify edge discontinuities (e.g., where an edge is added or removed from the active edge list). Depth analysis is employed to determine whether an occluder occludes an occludee at the edge discontinuity. Moreover, the invention only performs depth analysis for those locations of a screen display where an occludee is determined to reside, thereby minimizing unnecessary computations.Type: ApplicationFiled: August 21, 2008Publication date: December 18, 2008Applicant: Valve CorporationInventor: Brian Jacobson