Patents by Inventor GEETA

GEETA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12354106
    Abstract: Computer-implemented cyber-security, behavior-generated, event-type signed processes and machines provide for authentication and immutable transactions to overcome security risks. Clients submit requests for an immutable transactions and interactions responsive to the request are sent by the server to the client. The server generates behavioral expectations for the interactions, stores them for future comparison purposes, and transmits those to the client. The client executes user events for the interactions. The client behaviorally analyzes the user events and generates behavioral vectors corresponding to the user events. Intermediate client hashes that culminate in a final client hash are generated. User events are sent to the server. The server generates a server hash based on the behavioral expectations and the user events. The server compares the final client hash to the server hash to determine if the transaction is authentic and should be stored as immutable.
    Type: Grant
    Filed: August 31, 2022
    Date of Patent: July 8, 2025
    Assignee: Bank of America Corporation
    Inventors: Geeta Bora, Vijay Kumar Yarabolu
  • Publication number: 20250193737
    Abstract: Various embodiments of the present technology generally relate to systems and methods for performing network session processing based on slice load. In certain embodiments, a policy control function (PCF) system may comprise one or more processors, and a memory having stored thereon instructions. The instructions, upon execution, may cause the one or more processors to receive a network session request corresponding to a specified network slice, a network slice including a particular portion of a network's capacity, determine a load level of the specified network slice, and reject the network session request when the load level is above a selected threshold.
    Type: Application
    Filed: December 12, 2023
    Publication date: June 12, 2025
    Inventors: Rajiv Krishan, Geeta Mohanty, Tukaram Maruti Khandekar
  • Publication number: 20250175468
    Abstract: Methods and systems are described herein for bypassing secondary tiers of authentication for particular security categories. An authentication system, when authenticating a user, may receive an authentication request with authentication data enabling authentication through a multi-tier authentication mechanism. When the request has been authenticated through a multi-tier authentication mechanism, the authentication system may identify a category associated with the request and generate a temporal unlock flag for that category of future requests, such that the temporal unlock flag indicates that multi-tier authentication is not required for a predetermined amount of time for requests of that category. The temporal unlock flag may be inserted into the user's record. When future requests of that same category are received, only a single-tier authentication mechanism may be required for authentication.
    Type: Application
    Filed: January 27, 2025
    Publication date: May 29, 2025
    Applicant: Capital One Services, LLC
    Inventors: Geeta Shyamala, Lee Adcock
  • Patent number: 12299115
    Abstract: To facilitate improved email and device security, embodiments of systems and methods include intercepting, by a processor associated with an entity, an internet request, where the internet request is produced by a link received in an email at a first computing device. The processor determines that the link is externally bound relative to an entity network. The processor determines an existence of a sandbox environment instance in a set of existing sandbox environment instances. The processor routes the link through the sandbox environment instance. The processor updates the sandbox log in the database based on the sandbox environment instance and the link. The processor causes to display on a screen of the first computing device a user interface for interacting with the link in the sandbox environment instance, and the processor logs activities associated with interacting with the link in a security log.
    Type: Grant
    Filed: February 26, 2024
    Date of Patent: May 13, 2025
    Assignee: Capital One Services, LLC
    Inventors: Vincent Pham, Joseph Boayue, Lee Adcock, Geeta Shyamala, Ana Cruz, Christopher Camenares, Nahid Farhady Ghalaty
  • Patent number: 12291548
    Abstract: Disclosed are compounds and compositions for the activation or induction of expression of a pattern recognition receptor (e.g., STING, RIG-I, MDA5), and methods of use thereof.
    Type: Grant
    Filed: July 8, 2019
    Date of Patent: May 6, 2025
    Assignee: Sperovie Biosciences, Inc.
    Inventors: Radhakrishnan P. Iyer, Geeta Meher, Sreerupa Challa, Shenghua Zhou
  • Publication number: 20250112973
    Abstract: Various embodiments of the present technology generally relate to systems and methods for routing messages for 4G and 5G sessions. In certain embodiments, a Policy and Charging Rules Function (PCRF) system may comprise one or more processors, and a memory having stored thereon instructions. The instructions, upon execution, may cause the one or more processors to receive a 4G communication session initiation request for a 4G session, and in response to the 4G communication session initiation request, issue a session binding request directed to a Binding Support Function (BSF), the session binding request directing the BSF to create a binding record linking the 4G session to the PCRF to enable routing of Application Function (AF) messages to the PCRF via the BSF. The instructions may further cause the one or more processors to receive an AF message routed to the PCRF based on the binding record.
    Type: Application
    Filed: September 28, 2023
    Publication date: April 3, 2025
    Inventors: Rajiv Krishan, Tukaram Maruti Khandekar, Tarek Assali, Geeta Mohanty
  • Publication number: 20250108871
    Abstract: A computer includes a processor and a memory, and the memory stores instructions executable by the processor to receive a plurality of proposed longitudinal distances for a vehicle being designed and determine a predicted metric of a predefined frontal impact to the vehicle using the proposed longitudinal distances. The proposed longitudinal distances are measured along a longitudinal axis of the vehicle between structural landmarks in a front end of the vehicle.
    Type: Application
    Filed: October 3, 2023
    Publication date: April 3, 2025
    Applicant: Ford Global Technologies, LLC
    Inventors: S.M. Iskander Farooq, Mohammad Omar Faruque, Geeta Rani, Dean M. Jaradi
  • Patent number: 12255928
    Abstract: In some aspects, a computing system may use a machine learning model to determine whether a computer security policy should be modified to reduce the likelihood of a cyber security incident. Through the use of a machine learning model, unsafe combinations of access grants or permissions may be identified and modified to prevent cyber security incidents from occurring. The computing system may input a representation of a computer security policy into a machine learning model, which has been trained on a dataset that includes representations of computer security policies. The computing system may generate output indicating a likelihood that the first computing system will be involved in a cyber security incident. Based on the output satisfying a first threshold, the computing system may generate a recommendation to modify the first computer security policy. The computing system may modify the first computer security policy based on the recommendation.
    Type: Grant
    Filed: September 26, 2022
    Date of Patent: March 18, 2025
    Assignee: Capital One Services, LLC
    Inventors: Geeta Shyamala, Lee Adcock, Vincent Pham, Nahid Farhady Ghalaty
  • Publication number: 20250085285
    Abstract: Compositions and methods for phase-separation of chromatin in distinct states are provided. In particular, differentially decorated chromatin in different states can be isolated by phase separation according to the methods disclosed herein. In some cases, specific chromatin interacting proteins are added to chromatin to recreate specific, biologically relevant chromatin states in vitro, which can be phase-separated using the disclosed methods. In addition, methods of using phase-separated chromatin for in vitro screening of pharmacological agents that modulate chromatin states, including small molecule chemicals and biomolecules, are also provided.
    Type: Application
    Filed: January 18, 2023
    Publication date: March 13, 2025
    Inventors: Muryam Gourdet, Laura Hsieh, Tracy Lou, Geeta Narlikar, Daniel Elnatan
  • Patent number: 12238523
    Abstract: Various embodiments of the present technology generally relate to systems and methods for efficiently cleaning up resources within a network by bundling binding session audit requests. A binding support function (BSF) may determine support for bundled audit requests and unbundled audit requests at one or more policy control functions (PCFs) associated with potentially stale session binding records at the BSF. Based on audit support function at the PCF, the BSF may determine whether to bundle audit requests together, issue unbundled audit requests, or not issue any audit requests. PCF support for bundled or unbundled auditing may be provided via a network repository function (NRF), via headers in binding creation or update requests, or both.
    Type: Grant
    Filed: February 22, 2023
    Date of Patent: February 25, 2025
    Assignee: Oracle International Corporation
    Inventors: Rajiv Krishan, Geeta Mohanty, Gaurav Paliwal, David Bedoya, Tarek Assali
  • Patent number: 12212573
    Abstract: Methods and systems are described herein for bypassing secondary tiers of authentication for particular security categories. An authentication system, when authenticating a user, may receive an authentication request with authentication data enabling authentication through a multi-tier authentication mechanism. When the request has been authenticated through a multi-tier authentication mechanism, the authentication system may identify a category associated with the request and generate a temporal unlock flag for that category of future requests, such that the temporal unlock flag indicates that multi-tier authentication is not required for a predetermined amount of time for requests of that category. The temporal unlock flag may be inserted into the user's record. When future requests of that same category are received, only a single-tier authentication mechanism may be required for authentication.
    Type: Grant
    Filed: June 30, 2022
    Date of Patent: January 28, 2025
    Assignee: Capital One Services, LLC
    Inventors: Geeta Shyamala, Lee Adcock
  • Publication number: 20250028629
    Abstract: Systems, apparatus, articles of manufacture, and methods are disclosed to test an automated query language by interfacing with a query endpoint, generating a first test suite based on a plurality of combinations of a plurality of attributes corresponding to an API specification, transmitting the first test suite to be executed on the query endpoint, the first test suite to include instructions to cause the query endpoint to access data stored in a database accessible to a plurality of secondary endpoints, obtaining a response time corresponding to the access of the data, comparing the response time corresponding to the access of the data with a service level agreement required response time, and in response to the response time corresponding to the access of the data being longer than the service level agreement required response time, notifying a developer of the plurality of secondary endpoints.
    Type: Application
    Filed: October 7, 2023
    Publication date: January 23, 2025
    Inventors: ASHISH AGRAWAL, Amit Meena, Geeta Gokhale, Siddharth Burle
  • Publication number: 20250023905
    Abstract: Techniques associated with adaptive infrastructure security are disclosed. Information regarding a plurality of threat events from one or more source systems is received. For each of the plurality of threat events, a probability of a target system being exploited can be computed. A threat event can be selected at a first time from the plurality of threat events associated with a first probability that meets a threshold. Remedial actions performed to address the threat event at a respective source system can be received, and a guardrail to apply to the target system can be determined based on the remedial actions. The guardrail can then be applied to the target system.
    Type: Application
    Filed: September 22, 2023
    Publication date: January 16, 2025
    Inventors: SIDDHARTH BURLE, AMIT MEENA, GEETA GOKHALE
  • Patent number: 12187761
    Abstract: Disclosed are compounds and compositions for the activation or induction of expression of a pattern recognition receptor (e.g., STING, RIG-I, MDA5), and methods of use thereof.
    Type: Grant
    Filed: January 20, 2023
    Date of Patent: January 7, 2025
    Assignee: invoX Pharma Limited
    Inventors: Radhakrishnan P. Iyer, Geeta Meher, Anjaneyulu Sheri, Shenghua Zhou, Sreerupa Challa, Rayomand H. Gimi, Seetharamaiyer Padmanabhan, Dillon Cleary
  • Patent number: 12175265
    Abstract: Systems and methods are described herein for novel uses and/or improvements for predicting, using machine learning models, a process for a user based on function execution. An indication of completion of a predetermined application function associated with a user may be detected and a plurality of stored parameters associated with the user may be identified. The predetermined application function and the parameters may be input into a machine learning model to determine/obtain a process prediction for the user. The process may include a number of functions that may be sent to a user device for execution.
    Type: Grant
    Filed: March 29, 2024
    Date of Patent: December 24, 2024
    Assignee: Citibank, N.A.
    Inventors: Philip Cody Keister, Vaibhav Kumar Gupta, Sandeep Yellambhotla, Geeta Priyanka Janapareddy, Sharika Kanakam, George Higa, Melissa Mathews, Joelle Bove, Aditya Thipireddy
  • Publication number: 20240402979
    Abstract: Systems and methods for generating a preview stream for a user of a video conferencing service. In some aspects, the systems and methods provide for receiving a video stream of at least a portion of a display screen of a user device and determining whether the user device has been designated as a receiving device for receiving a version of the video stream. In response to determining that the user device has not been designated as a receiving device for receiving a version of the video stream, a request is generated to designate the user device as a receiving device in addition to being a presenting device. Based on images of the video stream, a preview stream (e.g., of at least a portion of the display screen) is generated and transmitted for display at the user device.
    Type: Application
    Filed: August 16, 2024
    Publication date: December 5, 2024
    Applicant: Capital One Services, LLC
    Inventors: Alexander Link, Geeta Shyamala, Benjamin Polk, Lee Adcock
  • Patent number: 12155671
    Abstract: Methods and systems are disclosed for improvements in cloud services by sharing estimated and actual usage data of cloud services recipients with the cloud services provider. The sharing of this data allows the cloud services provider to better apportion cloud resources between multiple cloud services recipients. By analyzing information included in the shared data (e.g., information about one or more applications that use the cloud resources), the cloud services provider may categorize the applications and/or the functions of those applications into authorized and unauthorized uses, the determination of which, is used to further efficiently apportion the cloud services resources.
    Type: Grant
    Filed: October 19, 2023
    Date of Patent: November 26, 2024
    Assignee: Capital One Services, LLC
    Inventors: Nahid Farhady Ghalaty, Vincent Pham, Geeta Shyamala
  • Patent number: 12134601
    Abstract: The present technology relates to compounds that inhibit human Ly6K and homologs thereof. Also disclosed are methods of using such compounds to: inhibit activity of a Ly6K protein in a cell; decrease migration, colony formation, and/or proliferation of a cell; modulate expression of a gene in a cell, reduce suppression of the immune response to cancer in a subject, decrease tumorigenic growth of a cancer in a subject, and treat or prevent in a subject a disorder mediated by Ly6K protein.
    Type: Grant
    Filed: November 9, 2018
    Date of Patent: November 5, 2024
    Assignee: The Henry M. Jackson Foundation for the Advancement of Military Medicine, Inc.
    Inventor: Geeta Upadhyay
  • Publication number: 20240365102
    Abstract: Various embodiments of the present technology generally relate to systems and methods for controlling data network name (DNN) or access point name (APN) replacement for roaming mobile subscribers at the home network. A security edge protection proxy (SEPP) system may receive a request from a visited network regarding a roaming user equipment (UE) associated with a home network of the SEPP system, determine a local data network name (DNN) compatible with the home network to associate with the UE, add the local DNN to the request, and forward the request to a destination within the home network.
    Type: Application
    Filed: April 26, 2023
    Publication date: October 31, 2024
    Inventors: John Mohan Raj, Geeta Mohanty, Rajiv Krishan, Uri Baniel
  • Publication number: 20240309263
    Abstract: Methods for inhibiting corrosion by contacting a surface in an oil-field system with a composition comprising a soy-based corrosion inhibitor are provided.
    Type: Application
    Filed: March 14, 2024
    Publication date: September 19, 2024
    Inventors: Geeta Rana, Jeremy Moloney