Patents by Inventor Erik Neighbour
Erik Neighbour has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12355922Abstract: In some implementations, a server device may obtain an indication of an incoming call, associated with a user device, to the call center service. The server device may perform a lookup in a database for information associated with the user device, wherein the information indicates the authentication status of a user that is established via the user device. The server device may determine whether an amount of time that the information has been stored in the database is less than or equal to a time threshold. The server device may generate an authentication token for the incoming call based on the authentication status and based on the amount of time being less than or equal to the time threshold.Type: GrantFiled: December 14, 2022Date of Patent: July 8, 2025Assignee: Capital One Services, LLCInventors: Erik Neighbour, Shashikiran Pargaonkar, Jayanth Prathipati
-
Publication number: 20250217468Abstract: Methods and systems are disclosed herein for authenticating a user. A security device may use an object associated with a user and a device of the user to authenticate the user, for example, if the user has forgotten a password. A user may insert the object (e.g., a card, or other object) into the security device and may select an option to authenticate via a device that is trusted by both the security device and the user, rather than authenticating by entering a password at the security device.Type: ApplicationFiled: February 24, 2025Publication date: July 3, 2025Applicant: Capital One Services, LLCInventors: Emily Smith, Erik Neighbour
-
Publication number: 20250175465Abstract: Methods and systems are described herein for authenticating user actions, while preventing social engineering attacks on the user. A request may be received for performing an action. The system may obtain, based on a plurality of parameters, a plurality of natural language representations of the action and prompt the user, on the user's mobile device, to describe what the user is attempting to do. The system may then use a machine learning model to determine whether the requested action matches the user's response. Based on determining that the natural language response matches a natural language representation, the system may generate a communication indicating that the action has been authenticated.Type: ApplicationFiled: November 27, 2023Publication date: May 29, 2025Applicant: Capital One Services, LLCInventors: Erik NEIGHBOUR, Lea CODY
-
Publication number: 20250158823Abstract: Methods and systems are described herein for facilitating token use authentication using stochastic-model-derived images. The system may detect an authentication request to authenticate use of an access token and retrieve operation data associated with the access token. The system may determine, based on the operation data, source data associated with a source of a network operation and alternative source data associated with an alternative source. The system may provide, to a stochastic machine learning model, the source data to obtain a first image for the network operation and the alternative source data to obtain a second image for the network operation. The system may then generate, for display, the first image and the second image and may receive a selection of the first image. Based on the selection of the first image, the system may grant the authentication request.Type: ApplicationFiled: November 10, 2023Publication date: May 15, 2025Applicant: Capital One Services, LLCInventors: Tyler MAIMAN, Erik NEIGHBOUR
-
SYSTEMS AND METHODS FOR OPTIMIZING SHORT-RANGE WIRELESS READ OF CONTACTLESS CARDS USING VIDEO SIGNAL
Publication number: 20250158658Abstract: The disclosed systems and methods are directed to optimizing short-range wireless read operation for performing a proximity-based reading of a contactless card by a NFC reading unit of a user device. The described implementation utilizes a video signal from a camera unit of the user device which is automatically activated upon detection of an NFC tag within a communication field of the reading unit. Various aspects of the video signal may be analyzed and processed for determination of the final position of the card on the user device, prior to performing a NFC read, following a card tap action by the user. The described implementation uses variations in signal attributes of the video feed to determine a trajectory of the card within the optical view field until the video signal goes dark or drops below a threshold.Type: ApplicationFiled: November 13, 2023Publication date: May 15, 2025Inventors: Erik NEIGHBOUR, Anatoly IVASYUK, Christopher MATTHEWS -
Patent number: 12282536Abstract: Methods and systems are disclosed herein for authenticating a user. A security device may use an object associated with a user and a device of the user to authenticate the user, for example, if the user has forgotten a password. A user may insert the object (e.g., a card, or other object) into the security device and may select an option to authenticate via a device that is trusted by both the security device and the user, rather than authenticating by entering a password at the security device.Type: GrantFiled: May 13, 2024Date of Patent: April 22, 2025Assignee: Capital One Services, LLCInventors: Emily Smith, Erik Neighbour
-
Publication number: 20250053982Abstract: Systems and methods are directed to an improved fraud detection feature in Mobile Application Verification (MAV) device enrollment process. The proposed solution corresponds to a two-prong approach involving a strength factor evaluation of the authentication inputs provided during the initial enrollment process, and a computation of a number of trust parameters values from archived transactional records. A computational model supplemented with a machine learning process is then used to determine a device stability period as a function of the strength factor associated with the user provided authentication data and the computed trust factors.Type: ApplicationFiled: August 9, 2023Publication date: February 13, 2025Inventors: Erik NEIGHBOUR, Amirfarrokh IRANITALAB, Lesley NEWTON
-
Publication number: 20250045364Abstract: A computer-implemented method includes instructing a computing device to display a password entry element configured for input of a plurality of password characters of a password, where the password entry element includes a password reveal selector, where the password reveal selector is operable to be toggled between a first state in which the plurality of password characters are obfuscated and a second state in which the plurality of password characters are revealed; receiving a first entry of the plurality of password characters in the password entry element at a first time, instructing the password entry element to display the password reveal selector; receiving a second entry of the plurality of password characters in the password entry element at a second time; instructing the password entry element to hide the password reveal selector if a duration between the first time and the second time exceeds a predetermined threshold duration.Type: ApplicationFiled: August 2, 2023Publication date: February 6, 2025Inventors: Erik Neighbour, Jason Pribble, Maneill Parekh
-
Publication number: 20250045365Abstract: A computer-implemented method including instructing a computing device to display a password entry element configured for input of a plurality of password characters, the password entry element including a password reveal selector, the password reveal selector being operable to be toggled between a first state in which the plurality of password characters are obfuscated and a second state in which the plurality of password characters are revealed; receiving an entry of a password character of the plurality of password characters in the password entry element, instructing the password entry element to display the password reveal selector; detecting a speed at which each character of the plurality of password characters is entered into the password entry element; instructing the password entry element to hide the password reveal selector if a total speed at which each character of the plurality of password characters is entered is less than a predetermined threshold speed.Type: ApplicationFiled: August 2, 2023Publication date: February 6, 2025Inventors: Erik Neighbour, Jason Pribble, Maneill Parekh
-
Publication number: 20250008214Abstract: Embodiments disclosed are directed to a computing system that performs steps for automatically capturing images. The computing system receives an automatic image capture control signal from an application installed on a device and captures, by a camera of the device during a predetermined time interval, preview frames of an object and a background. For each of the preview frames, the computing system identifies an outline of the object in the preview frame, removes the background of the preview frame based on the outline to generate a modified preview frame, and determines a focus value of the modified preview frame. Subsequently, the computing system determines whether a predetermined amount of focus values are greater than a threshold focus value corresponding to the device and, if so, automatically captures, via the camera, an image of the object.Type: ApplicationFiled: July 2, 2024Publication date: January 2, 2025Applicant: Capital One Services, LLCInventors: Jason PRIBBLE, Erik NEIGHBOUR, Daniel Alan JARVIS
-
Publication number: 20240406167Abstract: In some implementations, a device may obtain a document that includes an identification image depicting a face of a person associated with the document. The device may obtain a live user image that depicts an image of a user. The device may extract information from the document image that includes appearance information associated with the person. The appearance information may include one or more document appearance parameters. The device may analyze the identification image, the live user image, and the appearance information to determine whether the user is the person to which the document is issued. The device may perform an action based on determining whether the user is the person to which the document is issued.Type: ApplicationFiled: June 5, 2023Publication date: December 5, 2024Inventors: Jason PRIBBLE, Swapnil PATIL, Erik NEIGHBOUR
-
Publication number: 20240403880Abstract: In some implementations, a device may obtain information indicating one or more exchanges, of a plurality of exchanges, of a first account associated with a first user that are to be resolved using a peer-to-peer transfer from a second account associated with a second user. The device may transmit a message, designated for a user device associated with the second user, that identifies a link associated with a resource. The device may receive, from a requesting user device, a request to access the resource. The device may determine an authentication of the requesting user device to access the resource. The device may provide, based on the authentication, the resource associated with the link for the requesting user device. The device may receive, from the requesting user device and via the resource, an indication to perform the peer-to-peer transfer, and may cause, based on the indication, the peer-to-peer transfer.Type: ApplicationFiled: May 31, 2023Publication date: December 5, 2024Inventors: Erik NEIGHBOUR, Patrick HERR
-
Publication number: 20240406187Abstract: In some implementations, a device may obtain, from a user device, a document image that depicts location information associated with an owner of the document. The device may obtain location information associated with the user device. The device may perform optical character recognition using the document image to obtain a location, or may scan a machine-readable code depicted in the document image to obtain the location. The device may determine a device location based on the location information. The device may determine a confidence score based on the location and the device location. The device may determine whether the confidence score satisfies a threshold. The device may perform an action based on determining whether the confidence score satisfies the threshold.Type: ApplicationFiled: June 5, 2023Publication date: December 5, 2024Inventors: Erik NEIGHBOUR, Jason PRIBBLE, Swapnil PATIL
-
Publication number: 20240296215Abstract: Methods and systems are disclosed herein for authenticating a user. A security device may use an object associated with a user and a device of the user to authenticate the user, for example, if the user has forgotten a password. A user may insert the object (e.g., a card, or other object) into the security device and may select an option to authenticate via a device that is trusted by both the security device and the user, rather than authenticating by entering a password at the security device.Type: ApplicationFiled: May 13, 2024Publication date: September 5, 2024Applicant: Capital One Services, LLCInventors: Emily SMITH, Erik NEIGHBOUR
-
Publication number: 20240236099Abstract: Methods, systems, and apparatuses for managing the preauthorization of user devices to access resources in one or more remote servers are described herein. Preauthorized user devices may access the resources without repeatedly going through multiple-factor authentication processes. Data for such preauthorized user devices may be maintained in a list of trusted user devices. To determine whether user devices are still eligible to be included in the list of trusted user devices, silent push notifications may be sent to the user devices. The silent push notifications may be configured not to cause outputs of any displays at the user devices or modify any current displays. Based on deliverability statistics that indicate whether the user devices acknowledged the silent push notifications, user devices may be kept in the list of trusted devices or removed from the list of trusted devices.Type: ApplicationFiled: October 25, 2022Publication date: July 11, 2024Inventors: Erik Neighbour, Jason Pribble, Maneill Parekh
-
Patent number: 12035039Abstract: Embodiments disclosed are directed to a computing system that performs steps for automatically capturing images. The computing system receives an automatic image capture control signal from an application installed on a device and captures, by a camera of the device during a predetermined time interval, preview frames of an object and a background. For each of the preview frames, the computing system identifies an outline of the object in the preview frame, removes the background of the preview frame based on the outline to generate a modified preview frame, and determines a focus value of the modified preview frame. Subsequently, the computing system determines whether a predetermined amount of focus values are greater than a threshold focus value corresponding to the device and, if so, automatically captures, via the camera, an image of the object.Type: GrantFiled: December 14, 2021Date of Patent: July 9, 2024Assignee: Capital One Services, LLCInventors: Jason Pribble, Erik Neighbour, Daniel Alan Jarvis
-
Publication number: 20240205338Abstract: In some implementations, a server device may obtain an indication of an incoming call, associated with a user device, to the call center service. The server device may perform a lookup in a database for information associated with the user device, wherein the information indicates the authentication status of a user that is established via the user device. The server device may determine whether an amount of time that the information has been stored in the database is less than or equal to a time threshold. The server device may generate an authentication token for the incoming call based on the authentication status and based on the amount of time being less than or equal to the time threshold.Type: ApplicationFiled: December 14, 2022Publication date: June 20, 2024Inventors: Erik NEIGHBOUR, Shashikiran PARGAONKAR, Jayanth PRATHIPATI
-
Patent number: 12008096Abstract: Methods and systems are disclosed herein for authenticating a user. A security device may use an object associated with a user and a device of the user to authenticate the user, for example, if the user has forgotten a password. A user may insert the object (e.g., a card, or other object) into the security device and may select an option to authenticate via a device that is trusted by both the security device and the user, rather than authenticating by entering a password at the security device.Type: GrantFiled: July 11, 2023Date of Patent: June 11, 2024Assignee: Capital One Services, LLCInventors: Emily Smith, Erik Neighbour
-
Publication number: 20240137365Abstract: Methods, systems, and apparatuses for managing the preauthorization of user devices to access resources in one or more remote servers are described herein. Preauthorized user devices may access the resources without repeatedly going through multiple-factor authentication processes. Data for such preauthorized user devices may be maintained in a list of trusted user devices. To determine whether user devices are still eligible to be included in the list of trusted user devices, silent push notifications may be sent to the user devices. The silent push notifications may be configured not to cause outputs of any displays at the user devices or modify any current displays. Based on deliverability statistics that indicate whether the user devices acknowledged the silent push notifications, user devices may be kept in the list of trusted devices or removed from the list of trusted devices.Type: ApplicationFiled: October 24, 2022Publication date: April 25, 2024Inventors: Erik Neighbour, Jason Pribble, Maneill Parekh
-
Patent number: D1061612Type: GrantFiled: November 14, 2022Date of Patent: February 11, 2025Assignee: Capital One Services, LLCInventors: Bob Uni Koshy, Emily Smith, Colin Hart, Daniel Pick, Erik Neighbour, Lea Cody