Patents by Inventor Erik Neighbour

Erik Neighbour has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12355922
    Abstract: In some implementations, a server device may obtain an indication of an incoming call, associated with a user device, to the call center service. The server device may perform a lookup in a database for information associated with the user device, wherein the information indicates the authentication status of a user that is established via the user device. The server device may determine whether an amount of time that the information has been stored in the database is less than or equal to a time threshold. The server device may generate an authentication token for the incoming call based on the authentication status and based on the amount of time being less than or equal to the time threshold.
    Type: Grant
    Filed: December 14, 2022
    Date of Patent: July 8, 2025
    Assignee: Capital One Services, LLC
    Inventors: Erik Neighbour, Shashikiran Pargaonkar, Jayanth Prathipati
  • Publication number: 20250217468
    Abstract: Methods and systems are disclosed herein for authenticating a user. A security device may use an object associated with a user and a device of the user to authenticate the user, for example, if the user has forgotten a password. A user may insert the object (e.g., a card, or other object) into the security device and may select an option to authenticate via a device that is trusted by both the security device and the user, rather than authenticating by entering a password at the security device.
    Type: Application
    Filed: February 24, 2025
    Publication date: July 3, 2025
    Applicant: Capital One Services, LLC
    Inventors: Emily Smith, Erik Neighbour
  • Publication number: 20250175465
    Abstract: Methods and systems are described herein for authenticating user actions, while preventing social engineering attacks on the user. A request may be received for performing an action. The system may obtain, based on a plurality of parameters, a plurality of natural language representations of the action and prompt the user, on the user's mobile device, to describe what the user is attempting to do. The system may then use a machine learning model to determine whether the requested action matches the user's response. Based on determining that the natural language response matches a natural language representation, the system may generate a communication indicating that the action has been authenticated.
    Type: Application
    Filed: November 27, 2023
    Publication date: May 29, 2025
    Applicant: Capital One Services, LLC
    Inventors: Erik NEIGHBOUR, Lea CODY
  • Publication number: 20250158823
    Abstract: Methods and systems are described herein for facilitating token use authentication using stochastic-model-derived images. The system may detect an authentication request to authenticate use of an access token and retrieve operation data associated with the access token. The system may determine, based on the operation data, source data associated with a source of a network operation and alternative source data associated with an alternative source. The system may provide, to a stochastic machine learning model, the source data to obtain a first image for the network operation and the alternative source data to obtain a second image for the network operation. The system may then generate, for display, the first image and the second image and may receive a selection of the first image. Based on the selection of the first image, the system may grant the authentication request.
    Type: Application
    Filed: November 10, 2023
    Publication date: May 15, 2025
    Applicant: Capital One Services, LLC
    Inventors: Tyler MAIMAN, Erik NEIGHBOUR
  • Publication number: 20250158658
    Abstract: The disclosed systems and methods are directed to optimizing short-range wireless read operation for performing a proximity-based reading of a contactless card by a NFC reading unit of a user device. The described implementation utilizes a video signal from a camera unit of the user device which is automatically activated upon detection of an NFC tag within a communication field of the reading unit. Various aspects of the video signal may be analyzed and processed for determination of the final position of the card on the user device, prior to performing a NFC read, following a card tap action by the user. The described implementation uses variations in signal attributes of the video feed to determine a trajectory of the card within the optical view field until the video signal goes dark or drops below a threshold.
    Type: Application
    Filed: November 13, 2023
    Publication date: May 15, 2025
    Inventors: Erik NEIGHBOUR, Anatoly IVASYUK, Christopher MATTHEWS
  • Patent number: 12282536
    Abstract: Methods and systems are disclosed herein for authenticating a user. A security device may use an object associated with a user and a device of the user to authenticate the user, for example, if the user has forgotten a password. A user may insert the object (e.g., a card, or other object) into the security device and may select an option to authenticate via a device that is trusted by both the security device and the user, rather than authenticating by entering a password at the security device.
    Type: Grant
    Filed: May 13, 2024
    Date of Patent: April 22, 2025
    Assignee: Capital One Services, LLC
    Inventors: Emily Smith, Erik Neighbour
  • Publication number: 20250053982
    Abstract: Systems and methods are directed to an improved fraud detection feature in Mobile Application Verification (MAV) device enrollment process. The proposed solution corresponds to a two-prong approach involving a strength factor evaluation of the authentication inputs provided during the initial enrollment process, and a computation of a number of trust parameters values from archived transactional records. A computational model supplemented with a machine learning process is then used to determine a device stability period as a function of the strength factor associated with the user provided authentication data and the computed trust factors.
    Type: Application
    Filed: August 9, 2023
    Publication date: February 13, 2025
    Inventors: Erik NEIGHBOUR, Amirfarrokh IRANITALAB, Lesley NEWTON
  • Publication number: 20250045364
    Abstract: A computer-implemented method includes instructing a computing device to display a password entry element configured for input of a plurality of password characters of a password, where the password entry element includes a password reveal selector, where the password reveal selector is operable to be toggled between a first state in which the plurality of password characters are obfuscated and a second state in which the plurality of password characters are revealed; receiving a first entry of the plurality of password characters in the password entry element at a first time, instructing the password entry element to display the password reveal selector; receiving a second entry of the plurality of password characters in the password entry element at a second time; instructing the password entry element to hide the password reveal selector if a duration between the first time and the second time exceeds a predetermined threshold duration.
    Type: Application
    Filed: August 2, 2023
    Publication date: February 6, 2025
    Inventors: Erik Neighbour, Jason Pribble, Maneill Parekh
  • Publication number: 20250045365
    Abstract: A computer-implemented method including instructing a computing device to display a password entry element configured for input of a plurality of password characters, the password entry element including a password reveal selector, the password reveal selector being operable to be toggled between a first state in which the plurality of password characters are obfuscated and a second state in which the plurality of password characters are revealed; receiving an entry of a password character of the plurality of password characters in the password entry element, instructing the password entry element to display the password reveal selector; detecting a speed at which each character of the plurality of password characters is entered into the password entry element; instructing the password entry element to hide the password reveal selector if a total speed at which each character of the plurality of password characters is entered is less than a predetermined threshold speed.
    Type: Application
    Filed: August 2, 2023
    Publication date: February 6, 2025
    Inventors: Erik Neighbour, Jason Pribble, Maneill Parekh
  • Publication number: 20250008214
    Abstract: Embodiments disclosed are directed to a computing system that performs steps for automatically capturing images. The computing system receives an automatic image capture control signal from an application installed on a device and captures, by a camera of the device during a predetermined time interval, preview frames of an object and a background. For each of the preview frames, the computing system identifies an outline of the object in the preview frame, removes the background of the preview frame based on the outline to generate a modified preview frame, and determines a focus value of the modified preview frame. Subsequently, the computing system determines whether a predetermined amount of focus values are greater than a threshold focus value corresponding to the device and, if so, automatically captures, via the camera, an image of the object.
    Type: Application
    Filed: July 2, 2024
    Publication date: January 2, 2025
    Applicant: Capital One Services, LLC
    Inventors: Jason PRIBBLE, Erik NEIGHBOUR, Daniel Alan JARVIS
  • Publication number: 20240406167
    Abstract: In some implementations, a device may obtain a document that includes an identification image depicting a face of a person associated with the document. The device may obtain a live user image that depicts an image of a user. The device may extract information from the document image that includes appearance information associated with the person. The appearance information may include one or more document appearance parameters. The device may analyze the identification image, the live user image, and the appearance information to determine whether the user is the person to which the document is issued. The device may perform an action based on determining whether the user is the person to which the document is issued.
    Type: Application
    Filed: June 5, 2023
    Publication date: December 5, 2024
    Inventors: Jason PRIBBLE, Swapnil PATIL, Erik NEIGHBOUR
  • Publication number: 20240403880
    Abstract: In some implementations, a device may obtain information indicating one or more exchanges, of a plurality of exchanges, of a first account associated with a first user that are to be resolved using a peer-to-peer transfer from a second account associated with a second user. The device may transmit a message, designated for a user device associated with the second user, that identifies a link associated with a resource. The device may receive, from a requesting user device, a request to access the resource. The device may determine an authentication of the requesting user device to access the resource. The device may provide, based on the authentication, the resource associated with the link for the requesting user device. The device may receive, from the requesting user device and via the resource, an indication to perform the peer-to-peer transfer, and may cause, based on the indication, the peer-to-peer transfer.
    Type: Application
    Filed: May 31, 2023
    Publication date: December 5, 2024
    Inventors: Erik NEIGHBOUR, Patrick HERR
  • Publication number: 20240406187
    Abstract: In some implementations, a device may obtain, from a user device, a document image that depicts location information associated with an owner of the document. The device may obtain location information associated with the user device. The device may perform optical character recognition using the document image to obtain a location, or may scan a machine-readable code depicted in the document image to obtain the location. The device may determine a device location based on the location information. The device may determine a confidence score based on the location and the device location. The device may determine whether the confidence score satisfies a threshold. The device may perform an action based on determining whether the confidence score satisfies the threshold.
    Type: Application
    Filed: June 5, 2023
    Publication date: December 5, 2024
    Inventors: Erik NEIGHBOUR, Jason PRIBBLE, Swapnil PATIL
  • Publication number: 20240296215
    Abstract: Methods and systems are disclosed herein for authenticating a user. A security device may use an object associated with a user and a device of the user to authenticate the user, for example, if the user has forgotten a password. A user may insert the object (e.g., a card, or other object) into the security device and may select an option to authenticate via a device that is trusted by both the security device and the user, rather than authenticating by entering a password at the security device.
    Type: Application
    Filed: May 13, 2024
    Publication date: September 5, 2024
    Applicant: Capital One Services, LLC
    Inventors: Emily SMITH, Erik NEIGHBOUR
  • Publication number: 20240236099
    Abstract: Methods, systems, and apparatuses for managing the preauthorization of user devices to access resources in one or more remote servers are described herein. Preauthorized user devices may access the resources without repeatedly going through multiple-factor authentication processes. Data for such preauthorized user devices may be maintained in a list of trusted user devices. To determine whether user devices are still eligible to be included in the list of trusted user devices, silent push notifications may be sent to the user devices. The silent push notifications may be configured not to cause outputs of any displays at the user devices or modify any current displays. Based on deliverability statistics that indicate whether the user devices acknowledged the silent push notifications, user devices may be kept in the list of trusted devices or removed from the list of trusted devices.
    Type: Application
    Filed: October 25, 2022
    Publication date: July 11, 2024
    Inventors: Erik Neighbour, Jason Pribble, Maneill Parekh
  • Patent number: 12035039
    Abstract: Embodiments disclosed are directed to a computing system that performs steps for automatically capturing images. The computing system receives an automatic image capture control signal from an application installed on a device and captures, by a camera of the device during a predetermined time interval, preview frames of an object and a background. For each of the preview frames, the computing system identifies an outline of the object in the preview frame, removes the background of the preview frame based on the outline to generate a modified preview frame, and determines a focus value of the modified preview frame. Subsequently, the computing system determines whether a predetermined amount of focus values are greater than a threshold focus value corresponding to the device and, if so, automatically captures, via the camera, an image of the object.
    Type: Grant
    Filed: December 14, 2021
    Date of Patent: July 9, 2024
    Assignee: Capital One Services, LLC
    Inventors: Jason Pribble, Erik Neighbour, Daniel Alan Jarvis
  • Publication number: 20240205338
    Abstract: In some implementations, a server device may obtain an indication of an incoming call, associated with a user device, to the call center service. The server device may perform a lookup in a database for information associated with the user device, wherein the information indicates the authentication status of a user that is established via the user device. The server device may determine whether an amount of time that the information has been stored in the database is less than or equal to a time threshold. The server device may generate an authentication token for the incoming call based on the authentication status and based on the amount of time being less than or equal to the time threshold.
    Type: Application
    Filed: December 14, 2022
    Publication date: June 20, 2024
    Inventors: Erik NEIGHBOUR, Shashikiran PARGAONKAR, Jayanth PRATHIPATI
  • Patent number: 12008096
    Abstract: Methods and systems are disclosed herein for authenticating a user. A security device may use an object associated with a user and a device of the user to authenticate the user, for example, if the user has forgotten a password. A user may insert the object (e.g., a card, or other object) into the security device and may select an option to authenticate via a device that is trusted by both the security device and the user, rather than authenticating by entering a password at the security device.
    Type: Grant
    Filed: July 11, 2023
    Date of Patent: June 11, 2024
    Assignee: Capital One Services, LLC
    Inventors: Emily Smith, Erik Neighbour
  • Publication number: 20240137365
    Abstract: Methods, systems, and apparatuses for managing the preauthorization of user devices to access resources in one or more remote servers are described herein. Preauthorized user devices may access the resources without repeatedly going through multiple-factor authentication processes. Data for such preauthorized user devices may be maintained in a list of trusted user devices. To determine whether user devices are still eligible to be included in the list of trusted user devices, silent push notifications may be sent to the user devices. The silent push notifications may be configured not to cause outputs of any displays at the user devices or modify any current displays. Based on deliverability statistics that indicate whether the user devices acknowledged the silent push notifications, user devices may be kept in the list of trusted devices or removed from the list of trusted devices.
    Type: Application
    Filed: October 24, 2022
    Publication date: April 25, 2024
    Inventors: Erik Neighbour, Jason Pribble, Maneill Parekh
  • Patent number: D1061612
    Type: Grant
    Filed: November 14, 2022
    Date of Patent: February 11, 2025
    Assignee: Capital One Services, LLC
    Inventors: Bob Uni Koshy, Emily Smith, Colin Hart, Daniel Pick, Erik Neighbour, Lea Cody