Patents by Inventor Jakub DANIELAK

Jakub DANIELAK has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160028715
    Abstract: The disclosed embodiments include methods, systems, system terminals, and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction.
    Type: Application
    Filed: June 23, 2015
    Publication date: January 28, 2016
    Inventors: Prabaharan SIVASHANMUGAM, Lauren VAN HEERDEN, Michael D. CUMMINS, Orin DEL VECCHIO, Gunalan NADARAJAH, Edward LOUNSBURY, Paul Mon-Wah CHAN, Jonathan K. BARNETT, Ashraf METWALLI, Jakub DANIELAK
  • Publication number: 20160019640
    Abstract: A method and system for recommending a physical location at which to complete an electronic activity are disclosed. In some examples, initiation of the electronic activity by a user at a first physical location is detected, that the electronic activity is to be completed at a physical location different from the first physical location is determined, one or more portions of the electronic activity that remain incomplete are determined, a second physical location at which to complete the one or more incomplete portions of the electronic activity is identified, and information about the electronic activity is provided to the second physical location. In some examples, the identification of the second physical location is based on at least characteristics of the electronic activity, the user, and/or the second physical location.
    Type: Application
    Filed: July 17, 2015
    Publication date: January 21, 2016
    Applicant: THE TORONTO-DOMINION BANK
    Inventors: Jonathan K. BARNETT, Lauren VAN HEERDEN, Orin DEL VECCHIO, Gunalan NADARAJAH, John BARBON, Paul Mon-Wah CHAN, Jakub DANIELAK, Christianne MORETTI, Matthew HAMILTON
  • Publication number: 20160019641
    Abstract: A method and system for recommending a physical location at which to complete an electronic activity are disclosed. In some examples, initiation of the electronic activity by a user at a first physical location is detected, that the electronic activity is to be completed at a physical location different from the first physical location at least in part because completion of the electronic activity requires the user and one or more other parties is determined, one or more portions of the electronic activity that remain incomplete are determined, a second physical location at which to complete the one or more incomplete portions of the electronic activity is identified, and information about the electronic activity is provided to the one or more other parties.
    Type: Application
    Filed: July 17, 2015
    Publication date: January 21, 2016
    Applicant: The Toronto-Dominion Bank
    Inventors: Jonathan K. BARNETT, Lauren VAN HEERDEN, Orin DEL VECCHIO, Gunalan NADARAJAH, John BARBON, Paul Mon-Wah CHAN, Jakub DANIELAK, Christianne MORETTI, Matthew HAMILTON
  • Publication number: 20160012427
    Abstract: The disclosed embodiments include computerized methods and systems for authenticating user identity based on non-credentialed information. For example, in response to a request from a device of a user for a service performable by one or more networked computer systems, the disclosed embodiments may identify one or more public and private sources of non-credentialed information. The disclosed embodiments may also transmit messages to devices of the individuals requesting non-credentialed information associated with the user, and based on the received responses, may verify an identity of the user based on at least a portion of the received non-credentialed information. Further, in some aspects, non-credentialed authentication processes consistent with the disclosed embodiments may reduce an ability of malicious parties to attach or hack into the one or more networked computer systems.
    Type: Application
    Filed: July 9, 2015
    Publication date: January 14, 2016
    Inventors: Lauren VAN HEERDEN, Orin DEL VECCHIO, Gunalan NADARAJAH, Paul Mon-Wah CHAN, Jonathan K. BARNETT, Jakub DANIELAK, Roisin FRITZ, John Jong Suk LEE, Hashmi T. SHAKILA
  • Publication number: 20160012469
    Abstract: A method of effecting an incentive transaction involves a computer server receiving a transaction notification message that identifies a financial transaction. The server is in communication with a database of incentive plans, each comprising a plan definition that defines an incentive transaction to be transacted with an incentive account. Each plan is associated with plan participants by participant identifiers. Each participant identifier is uniquely associated with their plan participant. The incentive account is jointly associated with the plurality of plan participants. The notification message includes a product code and the participant identifier of one plan participant.
    Type: Application
    Filed: July 10, 2015
    Publication date: January 14, 2016
    Inventors: Lauren van Heerden, Orin Del Vecchio, Gunalan Nadarajah, Paul Mon-Wah Chan, Steve Robert Langham, Jonathan K. Barnett, Jakub Danielak, Roisin Fritz, John Jong Suk Lee, Rob Miller, Ashraf Metwalli
  • Publication number: 20160014564
    Abstract: The disclosed embodiments include methods and systems for providing a notification relating to a geographical boundary based on monitored sensor data collected by networked devices. The disclosed embodiments include, for example, a method that monitors positional sensor data received from one or more triggering devices. The method may calculate a first boundary extent delimiting the geographical area of the first boundary based on one or more boundary extent parameters. The method may also detect an occurrence of a triggering condition that impacts a movement of at least one of a client device or at least one of the triggering devices within a geographic region that includes the first location. In response to the detected triggering event, at least one of modified start time or a second location may be established for the event, which may be provided to the client and triggering devices in a notification.
    Type: Application
    Filed: July 8, 2015
    Publication date: January 14, 2016
    Inventors: Orin DEL VECCHIO, Lauren VAN HEERDEN, Gunalan NADARAJAH, Jonathan K. BARNETT, Ashraf METWALLI, Jakub DANIELAK, Michael LOUGHRY, Daniel M. SIEGEL, Nikolas SAWTSCHUK, Sultan MEHRABI, Paul Mon-Wah CHAN, Matthew HAMILTON, Christianne MORETTI, John BARBON
  • Publication number: 20160012729
    Abstract: he disclosed embodiments include methods and systems for providing a notification relating to a geographical boundary based on monitored sensor data collected by networked devices. The disclosed embodiments include, for example, a method for receiving, by one or more processors, a request to establish a first boundary around a first location. The method may also include monitoring, by the one or more processors, one or more triggering devices. The method may also include calculating, by the one or more processors, a first boundary extent delimiting the geographical area of the first boundary based on one or more boundary extent parameters. The method may also include detecting, by the one or more processors, whether at least one of the one or more triggering devices is located within the first boundary extent.
    Type: Application
    Filed: July 8, 2015
    Publication date: January 14, 2016
    Inventors: Orin DEL VECCHIO, Lauren VAN HEERDEN, Gunalan NADARAJAH, Jonathan K. BARNETT, Ashraf METWALLI, Jakub DANIELAK, Michael LOUGHRY, Daniel M. SIEGEL, Nikolas SAWTSCHUK, Sultan MEHRABI, Paul Mon-Wah CHAN, Matthew HAMILTON, Christianne MORETTI, John BARBON
  • Publication number: 20160012468
    Abstract: A method of effecting an incentive transaction involves a computer server receiving a notification message that identifies a financial transaction. The server is in communication with a database of incentive plans, each comprising a plan definition that defines an incentive transaction. Each plan is associated with plan participants by participant identifiers. Each participant identifier is uniquely associated with their plan participant. The notification message includes a product code and the participant identifier of one plan participant.
    Type: Application
    Filed: July 10, 2015
    Publication date: January 14, 2016
    Inventors: Lauren van Heerden, Orin Del Vecchio, Gunalan Nadarajah, Paul Mon-Wah Chan, Steve Robert Langham, Jonathan K. Barnett, Jakub Danielak, Roisin Fritz, John Jong Suk Lee, Rob Miller, Ashraf Metwalli
  • Publication number: 20150379644
    Abstract: The disclosed embodiments include computerized methods and system for detecting error events, such as account shortfalls, within networked computer systems operated by the financial institutions and other business entities. In one aspect, a system includes a memory storing instructions and one or more processors configured to execute the instruction to perform operating, such as receiving a payment request for a payment amount from a first account of a user to a destination account. The operations may also include determining that the first account lacks sufficient funds to cover the payment amount, and determining that the user has pre-approved a credit line account secured by a first set of investment holdings of the user that generate revenue that is periodically transferred to the first account. The operations may also include performing a fund transfer operation for the payment amount from the credit line account to the first account.
    Type: Application
    Filed: June 30, 2015
    Publication date: December 31, 2015
    Inventors: Jakub DANIELAK, Lauren VAN HEERDEN, Gunalan NADARAJAH, Orin DEL VECCHIO, Paul Mon-Wah CHAN, Jonathan K. BARNETT, Ashraf METWALLI, Matthew HAMILTON, Clara BOR, Wallace BARBOUR
  • Publication number: 20150379485
    Abstract: The disclosed embodiments include methods and system for detecting error events, such as account shortfalls, within networked computer systems operated by the financial institutions and other business. In one aspect, a system includes a memory storing instructions and one or more processors configured to execute the instruction to perform operating, such as receiving a payment request for a payment amount from a first account of a user to a destination account. The operations may also include determining that the first account lacks sufficient funds to cover the payment amount, and determining that the user has pre-approved credit facility secured by a first set of investment holdings of the user that generate revenue that is periodically transferred to the first account. The operations may also include performing a fund transfer operation for the payment amount from the credit line account to the first account.
    Type: Application
    Filed: June 30, 2015
    Publication date: December 31, 2015
    Inventors: Jakub DANIELAK, Lauren VAN HEERDEN, Gunalan NADARAJAH, Orin DEL VECCHIO, Paul Mon-Wah CHAN, Jonathan K. BARNETT, Ashraf METWALLI, Matthew HAMILTON, Clara BOR, Wallace BARBOUR
  • Publication number: 20150100495
    Abstract: The disclosed embodiments include methods and systems for providing tokenized transaction accounts. In one embodiment, a computer-implemented method is provided that may include generating, by one or more processors, a first tokenized transaction account from a first transaction account associated with a first user. The method may also include providing the first tokenized transaction account to a client device associated with the first user for storage in the client device and use in transactions. The method may also include updating the first tokenized transaction account based on one or more conditions and providing the updated first tokenized transaction account to the client device for storage and use in a subsequent transaction.
    Type: Application
    Filed: October 9, 2014
    Publication date: April 9, 2015
    Inventors: Hisham I. SALAMA, Lauren VAN HEERDEN, Orin DEL VECCHIO, Paul M. CHAN, Jonathan K. BARNETT, Jakub DANIELAK
  • Publication number: 20150095132
    Abstract: The disclosed embodiments include systems and methods for administering actual and virtual investment portfolios based on social media activities associated with and information consumed by one or more users. The disclosed embodiments may be configured to obtain digital activity data identifying an interaction between the user and one or more social networks, and further, one or more elements of electronic content accessed by the user. The disclosed embodiments may also be configured to identify a loyalty program associated with the user, and a geographic region associated with the user. The disclosed embodiments may also be configured to identify one or more first securities based on the digital activity data, an investment risk tolerance of the user, and at least one or the loyalty program or the geographic region, and to transmit information identifying a first set of the one or more first securities to a user device.
    Type: Application
    Filed: September 30, 2014
    Publication date: April 2, 2015
    Applicant: The Toronto-Dominion Bank
    Inventors: Lauren VAN HEERDEN, Michael E. GLOBE, Mazin AL-SAMADI, Gunalan NADARAJAH, Orin DEL VECCHIO, Michael D. CUMMINGS, Prabaharan SIVASHANMUGAM, Edward LOUNSBURY, Paul Mon-Wah CHAN, Jonathan K. BARNETT, Ashraf METWALI, Jakub DANIELAK