Patents by Inventor Debashis Ghosh
Debashis Ghosh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250139697Abstract: Systems, methods, and computer-readable storage media for performance indicator operations are disclosed. One method includes identifying user activity data and one or more performance indicators of a user, and modeling the user activity data to generate one or more performance products including a plurality of performance parameters corresponding to a future performance indicator of the user. The method further includes generating and presenting a graphical user interface (GUI) including one or more actionable events associated with the plurality of performance parameters, and monitoring the user activity data and the one or more performance indicators of the user based on receiving new activity data corresponding to the future performance indicator from a user data source. The method further includes presenting one or more content items on the GUI including an indication of whether the user satisfies the plurality of performance parameters of the one or more performance products.Type: ApplicationFiled: October 27, 2023Publication date: May 1, 2025Applicant: Wells Fargo Bank, N.A.Inventors: Jim Carlough, Chris A. Feathers, Debashis Ghosh, Rukiya Kelly, Justin Morris Krieger, Michael Restrepo, Jane Turpin, Matt Shuck
-
Patent number: 12271877Abstract: A system to track to model asset states and access by utilizing non-fungible tokens (NFTs). The system includes a data processing system including memory and one or more processors to receive a stating request for an asset, obtain, based on a plurality of control structures, a plurality of NFTs, each of the plurality of NFTs including a link with a metadata object including metadata of a state of the asset, encapsulate the plurality of NFTs within a container, receive, from the remote device, a state request for an asset state corresponding to a first NFT, the state request including a security token, obtain, from the metadata of the first NFT, one or more recorded security tokens, compare the security token to the one or more security tokens, and, in response to the security token matching the one or more security tokens, transmit the first NFT to the remote device.Type: GrantFiled: January 20, 2023Date of Patent: April 8, 2025Inventors: Debashis Ghosh, Luiz Fernando Flor de Silva, Nathaniel C. Eutsler, Matthew Mullin Shepherd
-
Publication number: 20250104072Abstract: Systems, methods, and computer-readable storage media for performance indicator operations. One method includes identifying, by one or more processing circuits, user activity data and one or more performance indicators of a user. The method further includes modeling, by the one or more processing circuits, the user activity data and the one or performance indicators to generate a user data structure. The method further includes determining, by the one or more processing circuits, the user data structure causing an update in the one or more performance indicators. The method further includes configuring an actionable activity corresponding to the at least one future activity of the user, wherein the actionable activity is below a user threshold. The method further includes generating and presenting, by the one or more processing circuits, a graphical user interface (GUI) including actionable elements and at least one message associated with the actionable activity.Type: ApplicationFiled: September 27, 2023Publication date: March 27, 2025Applicant: Wells Fargo Bank, N.A.Inventors: Jim Carlough, Srinivas R. Doki, Debashis Ghosh, Richard Claude Robert Trent, Jane Turpin
-
Publication number: 20250097214Abstract: Systems, apparatuses, methods, and computer program products are disclosed for simultaneous machine multifactor authentication. An example method includes simultaneously receiving, by communications hardware and in response to a machine authentication request, a plurality of authentication factors for a machine via a plurality of channels, wherein the plurality of authentication factors comprises at least one hardware-based challenge authentication factor. The example method further includes verifying, by an authentication engine, the plurality of authentication factors in parallel and authorizing, by the authentication engine, one or more actions based on a successful verification of the plurality of authentication factors.Type: ApplicationFiled: September 15, 2023Publication date: March 20, 2025Inventors: Rameshchandra Bhaskar Ketharaju, Justin Blackburn, Debashis Ghosh, Ashutosh Verma
-
Publication number: 20250078088Abstract: A computer-implemented method includes determining, by a provider computing system associated with a provider, a goal of a first customer. The computer-implemented method further includes identifying, by the provider computing system, one or more second customers similar to the first customer based on a characteristic of the first customer. The computer-implemented method further includes determining, by the provider computing system, one or more actions taken by the one or more second customers to achieve the goal. The computer-implemented method further includes generating, by the provider computing system, a graphical user interface including an indication of the one or more actions taken by the one or more second customers to achieve the goal. The computer-implemented method further includes transmitting, by the provider computing system, the graphical user interface to a customer device associated with the first customer.Type: ApplicationFiled: August 30, 2023Publication date: March 6, 2025Applicant: Wells Fargo Bank, N.A.Inventors: Srinivas R. Doki, Chris A. Feathers, Debashis Ghosh, Rukiya Kelly, Justin Morris Krieger, Heidi Schmitz, Richard Claude Robert Trent
-
Publication number: 20250077310Abstract: Systems, apparatuses, methods, and computer program products are disclosed for providing a resource allocation recommendation message to a user. An example method includes identifying a predicted liquid asset influx for the user and determining a current resource metric. The method further includes generating a resource allocation recommendation message that comprises one or more resource allocation recommendations that are each associated with (i) a user account of the one or more user accounts associated with the user or a new user account type and (ii) a resource allocation value. The method may further include providing the resource allocation recommendation message.Type: ApplicationFiled: August 28, 2023Publication date: March 6, 2025Inventors: Debashis Ghosh, Maria Chiarenza, Srinivas R. Doki, Chinimilli Vara Maheswara Satish Kumar, Michael Restrepo, Kurt D. Newman
-
Publication number: 20250077316Abstract: Systems, apparatuses, methods, and computer program products are disclosed for providing an asset savings notification to a user. An example method includes determining a user event prediction for the user and in response to determining the user event prediction, determining a predicted liquid asset influx. The method further includes generating and providing the asset savings notification.Type: ApplicationFiled: August 28, 2023Publication date: March 6, 2025Inventors: Debashis Ghosh, Maria Chiarenza, Srinivas R. Doki, Chinimilli Vara Maheswara Satish Kumar, Michael Restrepo, Kurt D. Newman
-
Publication number: 20250029457Abstract: Techniques are described for providing financial institution-specific branding and transactions based on a transaction request initiated by a user at a digital ink ATM and subsequent receipt of a cryptogram from the user's payment card at the digital ink ATM. An ATM server device receives the cryptogram from the digital ink ATM and, based on identifying information included in the cryptogram, determines the financial institution associated with the payment card. The ATM server device then communicates with a bank server device associated with the financial institution to authenticate the user. Upon authentication, the bank server sends a file containing branding information specific to the financial institution to the ATM server. The ATM server then sends instructions to the digital ink ATM displays, including a digital ink display, to display the branding information to the user. The bank server device then authorizes performance of the transaction at the digital ink ATM.Type: ApplicationFiled: December 13, 2022Publication date: January 23, 2025Inventors: Debashis Ghosh, Kurt D. Newman
-
Patent number: 12204507Abstract: Systems, apparatuses, methods, and computer program products are disclosed for obtaining data. The data may be obtained from a variety of data sources. In order to determine the preferred data source for obtaining the data, data quality scores may be computed and assigned to each data source of interest for a given implementation. Each data quality score may take into account several criteria including the computing resources required to obtain the data, the financial cost of obtaining the data, the security risk of obtaining the data, etc. Data may be obtained from the preferred data source, presented to a user associated with the data for verification, and processed in order to provide a computer-implemented services to the user.Type: GrantFiled: September 12, 2022Date of Patent: January 21, 2025Assignee: Wells Fargo Bank, N.A.Inventors: Debashis Ghosh, Maria Chiarenza, Nathaniel D. Mollison, Matthew C. Howell
-
Publication number: 20250023901Abstract: Systems, apparatuses, methods, and computer program products are disclosed for regulating data communication. An example method includes receiving, by transaction circuitry, a communication request and identifying, by data collection engine and based on the communication request, a set of security parameters. The example method further includes determining, by security analysis engine and based on the set of security parameters, a security score associated with the communication request and in an instance in which the security sore fails to satisfy a security requirement, determining, by the security analysis engine, one or more security actions based on the security score and performing, by the transaction circuitry, the one or more security actions. The example method further includes routing, by data regulation engine and based on a configuration table, a transaction associated with the communication request to a compliant communication channel.Type: ApplicationFiled: July 14, 2023Publication date: January 16, 2025Inventors: Rameshchandra Bhaskar Ketharaju, Ashutosh Verma, Debashis Ghosh, Shuvam Sengupta
-
Publication number: 20240380759Abstract: Systems, apparatuses, methods, and computer program products are disclosed for securely presenting a context-aware user notification to a user using a facility device. An example method includes receiving a user participation request for the user, wherein the user participation request comprises (i) a user characteristic attribute set and (ii) a user identification attribute set and determining a current user location based on the user characteristic attribute set and a temporal image set. The method further includes generating a display configuration set for a facility device indicative of instructions for the facility device for displaying the context-aware user notification based on the current user location.Type: ApplicationFiled: May 8, 2023Publication date: November 14, 2024Inventors: Matt T. Graves, Debashis Ghosh
-
Publication number: 20240372852Abstract: Systems, apparatuses, methods, and computer program products are disclosed for simultaneous multifactor authentication. An example method includes simultaneously receiving, by communications hardware and in response to a first authentication request, a plurality of authentication factors associated with an individual via a plurality of channels. The example method further includes performing, by an authentication engine, a verification operation that evaluates the plurality of authentication factors in parallel. The example method further includes authorizing, by the authentication engine, the one or more actions based on a successful outcome of the verification operation.Type: ApplicationFiled: May 2, 2023Publication date: November 7, 2024Inventors: Debashis Ghosh, Ashutosh Verma, Justin Blackburn, Rameshchandra Bhaskar Ketharaju, Naveen Gururaja Yeri
-
Publication number: 20240354845Abstract: Systems, apparatuses, methods, and computer program products are disclosed for continuous evaluation of customer credit. An example method includes receiving, by communications hardware, historical customer financial data, and generating, by user profile circuitry and based on the historical customer financial data, a user credit profile. The example method further includes receiving, by the communications hardware, real-time customer financial data, and updating, by the user profile circuitry and based on the real-time customer financial data, the user credit profile. The example method further includes receiving, by the communications hardware and from a server device, a request for credit data, wherein the credit data is based on the user credit profile, and transmitting, by the communications hardware, the credit data to the server device.Type: ApplicationFiled: April 19, 2023Publication date: October 24, 2024Inventors: Zoran Stanisljevic, Cecil B. Burrowes, Debashis Ghosh, Nadia Van De Walle
-
Publication number: 20240346400Abstract: A method, computer system, and computer program product that aggregates sample data regarding a plurality of factors associated with employment; performs iterative analysis on the data using machine learning to construct a predictive model; populates, using the predictive model, a database with predicted employment values for predefined geographic regions; converts the predicted employment values in the database into percentages of observed employment values for the predefined geographic regions over a specified time period to create indices of workforce elasticity for each geographic region; and rank orders the predefined geographic regions according to their indices of workforce elasticity.Type: ApplicationFiled: February 5, 2024Publication date: October 17, 2024Applicant: ADP, Inc.Inventors: Kurt Newman, Debashis Ghosh, Ramsay Cole
-
Publication number: 20240331035Abstract: Systems, apparatuses, methods, and computer program products are disclosed for facilitating sensitive data interpretation across disparate systems. An example method includes receiving, by communications hardware, a historical dataset of events having occurred within a first jurisdiction in association with an individual. The example method also includes receiving, by the communications hardware, a request associated with the first individual and a second jurisdiction. The example method also includes receiving, by an assessment engine, a predefined metrics set for the second jurisdiction. The example method also includes determining, by the assessment engine and based on the predefined metrics set, a subset of the historical dataset that is relevant to the second jurisdiction. The example method also includes utilizing, by the assessment engine, the subset of the historical dataset in connection with a credit assessment of the first individual in the second jurisdiction.Type: ApplicationFiled: March 29, 2023Publication date: October 3, 2024Inventors: Debashis Ghosh, Poonam Rao, Nadia Van De Walle, Angela Melita Maryland
-
Publication number: 20240331042Abstract: Systems, apparatuses, methods, and computer program products are disclosed for sharing financial profiles. An example method includes determining, by a financial profile identification engine, a financial footprint of an individual and analyzing, by a financial profile analysis engine, the financial footprint of the individual to identify a financial data conflict between the first set of financial data and the second set of financial data. The example method further includes determining, by the financial profile analysis engine, one or more actions to resolve the financial data conflict and generating, by secure data circuitry, a secured financial update dataset based on a conflict response. The example method further includes transmitting, by communications hardware, the secured financial update dataset to one or more of the first financial institution and the second financial institution.Type: ApplicationFiled: March 27, 2023Publication date: October 3, 2024Inventors: Cecil B. Burrowes, Debashis Ghosh, Lynne Sanders, Carrie Anne Hanson
-
Publication number: 20240330970Abstract: Systems, apparatuses, methods, and computer program products are disclosed for assessing affiliate program eligibility of a candidate user. An example method includes determining an engagement status of the candidate user with respect to an organizational entity determined to be associated with the candidate user. The method further includes evaluating whether the candidate user is eligible for one or more affiliate programs based on the engagement status for the candidate user with respect to the organizational entity and in an instance the candidate user is eligible for at least one of the one or more affiliate programs, generating an eligibility notification, wherein the eligibility notification describes the one or more affiliate programs for which the candidate user is eligible. The method further includes providing the eligibility notification to the candidate user.Type: ApplicationFiled: March 30, 2023Publication date: October 3, 2024Inventors: Debashis Ghosh, Maria Chiarenza, Stephanie Simon, Daniel Mertes
-
Patent number: 12105787Abstract: Disclosed are embodiments for pairing wearable electronic devices, such as smart rings. The paired smart rings are configured so as to provide access to certain resources requiring a higher level of security. In some embodiments, a credential is sharable between the two devices. Thus, a bank manager is able to transfer a credential providing access to bank resources to a second bank employee. The bank manager is able to configure is time and/or use limit on the transferred credential. Thus, for example, by transferring the credential, the bank manager is able to delete certain authority to the bank employee while also limiting that authority as appropriate.Type: GrantFiled: December 1, 2020Date of Patent: October 1, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Carrie Anne Hanson, Debashis Ghosh
-
Publication number: 20240320733Abstract: Systems, apparatuses, methods, and computer program products are disclosed for facilitating banking activities via an anonymous digital profile. An example method receiving, by communications hardware, a secured activity request comprising a first identifying metric of an individual and a requested banking activity identifier. The example method also includes determining, by data analysis circuitry, that the individual is not a banked customer. The example method also includes generating, by profile generation circuitry, a digital profile based on the first identifying metric, wherein generating the digital profile does not create a banked relationship with the individual, and wherein the digital profile defines a predefined set of banking activities for which the individual is authorized to perform.Type: ApplicationFiled: March 22, 2023Publication date: September 26, 2024Inventors: Tanisha Patterson-Powe, Matthew Degenhardt, Kourtney Eidam, Lynne Sanders, Anjali Shah, Debashis Ghosh, Cecil B. Burrowes, Nadia Van De Walle, Carrie Anne Hanson
-
Patent number: 12093259Abstract: The disclosed application relates to a tool by which a user may create a cloud workspace that includes a data memory space, as well as a tool for automatically identifying ad-hoc analyses on that data. The solution allows a user to connect to data sources using SQL or GUI tools, combine data from different data sources, prepare and clean the data, mine the data for insights, and move that data into downstream reporting tools for visualization. The system is linked to a code repository to allow data scientists to execute code from the code repository in trial data spaces, investigate that data, and prepare more in-depth analytics for downstream reporting tools.Type: GrantFiled: May 19, 2022Date of Patent: September 17, 2024Assignee: Target Brands, Inc.Inventors: Jeffrey Jacob Bursik, Debashis Ghosh, Matt Jesser, Robert James Koste, Jason Louer, Jayanthi Narayanan, Andrew Hangsleben, Arman Shah, Michael Jantscher, Sam Bloomquist