Patents by Inventor Kareem EL-ONSI
Kareem EL-ONSI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230291571Abstract: The disclosed exemplary embodiments include computer-implemented systems, devices, apparatuses, and processes that dynamically implement and manage consent and permissioning protocols using container-based applications. By way of example, a device may receive, through a programmatic interface, a first request for an element of data generated by an executed application program. When the first request is consistent with consent data associated the executed application program, the device may obtain the requested data element and a digital signature applied to the requested data element by a computing system. Based on a verification of the applied digital signature, the device may generate and present a representation of the requested data element within a digital interface, along with an interface element that confirms the verification of the digital signature.Type: ApplicationFiled: May 11, 2023Publication date: September 14, 2023Inventors: Milos DUNJIC, Arthur Carroll CHOW, David Samuel TAX, Armon ROUHANI, Keith Sanjay AJMANI, Gregory Albert KLIEWER, Anthony Haituyen NGUYEN, Martin Albert LOZON, Kareem EL-ONSI, Ashkan ALAVI-HARATI, Arun Victor JAGGA
-
Publication number: 20230275846Abstract: A computer-implemented is disclosed. The method includes: allocating a first quantity of resources associated with one or more database records of an entity to a first device operation of a computing device associated with the entity; detecting a trigger condition associated with the first device operation for generating offers for lending resources to the entity in connection with the first device operation; in response to detecting the trigger condition: determining a second quantity of resources associated with the one or more database records for allocating to the first device operation based on a difference between a threshold quantity of resources associated with performing the first device operation and a total quantity of resources associated with the one or more database records previously allocated to the first device operation; and transmitting, to the computing device, a message representing an offer for lending the second quantity of resources.Type: ApplicationFiled: February 16, 2023Publication date: August 31, 2023Applicant: The Toronto-Dominion BankInventors: Kareem EL-ONSI, Garima AGGARWAL, Raymond Alan YOUNG
-
Patent number: 11689370Abstract: The disclosed exemplary embodiments include computer-implemented systems, devices, apparatuses, and processes that dynamically implement and manage consent and permissioning protocols using container-based applications. By way of example, a device may receive, through a programmatic interface, a first request for an element of data generated by an executed application program. When the first request is consistent with consent data associated the executed application program, the device may obtain the requested data element and a digital signature applied to the requested data element by a computing system. Based on a verification of the applied digital signature, the device may generate and present a representation of the requested data element within a digital interface, along with an interface element that confirms the verification of the digital signature.Type: GrantFiled: June 4, 2019Date of Patent: June 27, 2023Assignee: The Toronto-Dominion BankInventors: Milos Dunjic, Arthur Carroll Chow, David Samuel Tax, Armon Rouhani, Keith Sanjay Ajmani, Gregory Albert Kliewer, Anthony Haituyen Nguyen, Martin Albert Lozon, Kareem El-Onsi, Ashkan Alavi-Harati, Arun Victor Jagga
-
Patent number: 11611516Abstract: A computer-implemented for allocating resources is disclosed. The method includes: receiving, from a client device associated with an entity, input including a selection of a first operation; obtaining a threshold quantity of resources associated with the first operation; allocating a first quantity of resources associated with the entity to the first operation; detecting a trigger condition for obtaining resources associated with the first operation; and in response to detecting the trigger condition for obtaining resources associated with the first operation: determining a second quantity of resources associated with the entity for allocation to the first operation based on a difference between the threshold quantity of resources associated with the first operation and the first quantity of resources; and transmitting, to the client device, a signal representing a message indicating the second quantity of resources.Type: GrantFiled: July 9, 2019Date of Patent: March 21, 2023Assignee: The Toronto-Dominion BankInventors: Kareem El-Onsi, Garima Aggarwal, Raymond Alan Young
-
Publication number: 20220360446Abstract: The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that dynamically implement and manage hash-based consent and permissioning protocols. By way of example, an apparatus may obtain consent data that identifies one or more elements of data accessible to an application program executed by a device. The apparatus may generate a consent document for the application program based on at least a portion of the consent data, and may compute a consent hash value representative of the consent document. The apparatus may also generate and transmit permissioning data that includes at least the consent hash value to the device. The permissioning data may, for example, include information that instructs the executed application program to store the consent hash value within a local memory of the device and to associate the consent hash value with an access token of the executed application program.Type: ApplicationFiled: June 29, 2022Publication date: November 10, 2022Inventors: Milos DUNJIC, Arthur Carroll CHOW, David Samuel TAX, Armon ROUHANI, Keith Sanjay AJMANI, Gregory Albert KLIEWER, Anthony Haituyen NGUYEN, Martin Albert LOZON, Kareem EL-ONSI, Ashkan ALAVI-HARATI, Arun Victor JAGGA
-
Publication number: 20220263814Abstract: The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that dynamically manage consent, permissioning, and trust between computing systems and unrelated, third-party applications operating within a computing environment. By way of example, the apparatus may receive a request for an element of data that includes an access token and first credential data associated with an application program. When the first credential data corresponds to second credential data associated with the application program, may determine that the requested data element is accessible to the application program and perform operations that validate the access token. Further, and based on the validation of the access token, that apparatus may obtain and encrypt the requested data element, and may transmit the encrypted data element to a device via the communications interface.Type: ApplicationFiled: May 6, 2022Publication date: August 18, 2022Inventors: Milos DUNJIC, Arthur Carroll CHOW, David Samuel TAX, Armon ROUHANI, Keith Sanjay AJMANI, Gregory Albert KLIEWER, Anthony Haituyen NGUYEN, Martin Albert LOZON, Kareem EL-ONSI, Ashkan ALAVI-HARATI, Arun Victor JAGGA
-
Patent number: 11405207Abstract: The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that dynamically implement and manage hash-based consent and permissioning protocols. By way of example, an apparatus may obtain consent data that identifies one or more elements of data accessible to an application program executed by a device. The apparatus may generate a consent document for the application program based on at least a portion of the consent data, and may compute a consent hash value representative of the consent document. The apparatus may also generate and transmit permissioning data that includes at least the consent hash value to the device. The permissioning data may, for example, include information that instructs the executed application program to store the consent hash value within a local memory of the device and to associate the consent hash value with an access token of the executed application program.Type: GrantFiled: July 31, 2019Date of Patent: August 2, 2022Assignee: The Toronto-Dominion BankInventors: Milos Dunjic, Arthur Carroll Chow, David Samuel Tax, Armon Rouhani, Keith Sanjay Ajmani, Gregory Albert Kliewer, Anthony Haituyen Nguyen, Martin Albert Lozon, Kareem El-Onsi, Ashkan Alavi-Harati, Arun Victor Jagga
-
Patent number: 11368444Abstract: The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that dynamically manage consent, permissioning, and trust between computing systems and unrelated, third-party applications operating within a computing environment. By way of example, the apparatus may receive a request for an element of data that includes an access token and first credential data associated with an application program. When the first credential data corresponds to second credential data associated with the application program, may determine that the requested data element is accessible to the application program and perform operations that validate the access token. Further, and based on the validation of the access token, that apparatus may obtain and encrypt the requested data element, and may transmit the encrypted data element to a device via the communications interface.Type: GrantFiled: September 5, 2019Date of Patent: June 21, 2022Assignee: The Toronto-Dominion BankInventors: Milos Dunjic, Arthur Carroll Chow, David Samuel Tax, Armon Rouhani, Keith Sanjay Ajmani, Gregory Albert Kliewer, Anthony Haituyen Nguyen, Martin Albert Lozon, Kareem El-Onsi, Ashkan Alavi-Harati, Arun Victor Jagga
-
Publication number: 20220191212Abstract: The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that dynamically manage consent, permissioning, and trust between computing systems that maintain confidential data and unrelated third-party applications. By way of example, an apparatus may obtain interaction data that identifies an interaction between an application program executed at a first computing system and a programmatic interface of a second computing system. Based on the interaction data, the apparatus may generate outcome data characterizing a probability that the requested access to the data element is inconsistent with an access permission granted to the executed application program, and may modify the access permission in accordance with the outcome data. The apparatus may also perform that generate permissioning data indicative of the modified access permission and that store the permissioning data within a locally accessible or cloud-based repository.Type: ApplicationFiled: March 7, 2022Publication date: June 16, 2022Inventors: Milos Dunjic, Arthur Carroll Chow, David Samuel Tax, Armon Rouhani, Keith Sanjay Ajmani, Gregory Albert Kliewer, Anthony Haituyen Nguyen, Martin Albert Lozon, Kareem El-Onsi, Ashkan Alavi-Harati, Arun Victor Jagga
-
Patent number: 11303642Abstract: The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that dynamically manage consent, permissioning, and trust between computing systems that maintain confidential data and unrelated third-party applications. By way of example, an apparatus may obtain interaction data that identifies an interaction between an application program executed at a first computing system and a programmatic interface of a second computing system. Based on the interaction data, the apparatus may generate outcome data characterizing a probability that the requested access to the data element is inconsistent with an access permission granted to the executed application program, and may modify the access permission in accordance with the outcome data. The apparatus may also perform that generate permissioning data indicative of the modified access permission and that store the permissioning data within a locally accessible or cloud-based repository.Type: GrantFiled: June 3, 2019Date of Patent: April 12, 2022Assignee: The Toronto-Dominion BankInventors: Milos Dunjic, Arthur Carroll Chow, David Samuel Tax, Armon Rouhani, Keith Sanjay Ajmani, Gregory Albert Kliewer, Anthony Haituyen Nguyen, Martin Albert Lozon, Kareem El-Onsi, Ashkan Alavi-Harati, Arun Victor Jagga
-
Publication number: 20210075791Abstract: The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that dynamically manage consent, permissioning, and trust between computing systems and unrelated, third-party applications operating within a computing environment. By way of example, the apparatus may receive a request for an element of data that includes an access token and first credential data associated with an application program. When the first credential data corresponds to second credential data associated with the application program, may determine that the requested data element is accessible to the application program and perform operations that validate the access token. Further, and based on the validation of the access token, that apparatus may obtain and encrypt the requested data element, and may transmit the encrypted data element to a device via the communications interface.Type: ApplicationFiled: September 5, 2019Publication date: March 11, 2021Inventors: MILOS DUNJIC, Arthur Carroll Chow, David Samuel Tax, Armon Rouhani, Keith Sanjay Ajmani, Gregory Albert Kliewer, Anthony Haituyen Nguyen, Martin Albert Lozon, Kareem El-Onsi, Ashkan Alavi-Harati, Arun Victor Jagga
-
Publication number: 20210036854Abstract: The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that dynamically implement and manage hash-based consent and permissioning protocols. By way of example, an apparatus may obtain consent data that identifies one or more elements of data accessible to an application program executed by a device. The apparatus may generate a consent document for the application program based on at least a portion of the consent data, and may compute a consent hash value representative of the consent document. The apparatus may also generate and transmit permissioning data that includes at least the consent hash value to the device. The permissioning data may, for example, include information that instructs the executed application program to store the consent hash value within a local memory of the device and to associate the consent hash value with an access token of the executed application program.Type: ApplicationFiled: July 31, 2019Publication date: February 4, 2021Inventors: Milos DUNJIC, Arthur Carroll CHOW, David Samuel TAX, Armon ROUHANI, Keith Sanjay AJMANI, Gregory Albert KLIEWER, Anthony Haituyen NGUYEN, Martin Albert LOZON, Kareem EL-ONSI, Ashkan ALAVI-HARATl, Arun Victor JAGGA
-
Publication number: 20210014173Abstract: A computer-implemented for allocating resources is disclosed. The method includes: receiving, from a client device associated with an entity, input including a selection of a first operation; obtaining a threshold quantity of resources associated with the first operation; allocating a first quantity of resources associated with the entity to the first operation; detecting a trigger condition for obtaining resources associated with the first operation; and in response to detecting the trigger condition for obtaining resources associated with the first operation: determining a second quantity of resources associated with the entity for allocation to the first operation based on a difference between the threshold quantity of resources associated with the first operation and the first quantity of resources; and transmitting, to the client device, a signal representing a message indicating the second quantity of resources.Type: ApplicationFiled: July 9, 2019Publication date: January 14, 2021Applicant: The Toronto-Dominion BankInventors: Kareem EL-ONSI, Garima AGGARWAL, Raymond Alan YOUNG
-
Publication number: 20200389317Abstract: The disclosed exemplary embodiments include computer-implemented systems, devices, apparatuses, and processes that dynamically implement and manage consent and permissioning protocols using container-based applications. By way of example, a device may receive, through a programmatic interface, a first request for an element of data generated by an executed application program. When the first request is consistent with consent data associated the executed application program, the device may obtain the requested data element and a digital signature applied to the requested data element by a computing system. Based on a verification of the applied digital signature, the device may generate and present a representation of the requested data element within a digital interface, along with an interface element that confirms the verification of the digital signature.Type: ApplicationFiled: June 4, 2019Publication date: December 10, 2020Inventors: Milos Dunjic, Arthur Carroll Chow, David Samuel Tax, Armon Rouhani, Keith Sanjay Ajmani, Gregory Albert Kliewer, Anthony Haituyen Nguyen, Martin Albert Lozon, Kareem El-Onsi, Ashkan Alavi-Harati, Arun Victor Jagga
-
Publication number: 20200382510Abstract: The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that dynamically manage consent, permissioning, and trust between computing systems that maintain confidential data and unrelated third-party applications. By way of example, an apparatus may obtain interaction data that identifies an interaction between an application program executed at a first computing system and a programmatic interface of a second computing system. Based on the interaction data, the apparatus may generate outcome data characterizing a probability that the requested access to the data element is inconsistent with an access permission granted to the executed application program, and may modify the access permission in accordance with the outcome data. The apparatus may also perform that generate permissioning data indicative of the modified access permission and that store the permissioning data within a locally accessible or cloud-based repository.Type: ApplicationFiled: June 3, 2019Publication date: December 3, 2020Inventors: Milos DUNJIC, Arthur Carroll CHOW, David Samuel TAX, Armon ROUHANI, Keith Sanjay AJMANI, Gregory Albert KLIEWER, Anthony Haituyen NGUYEN, Martin Albert LOZON, Kareem EL-ONSI, Ashkan ALAVI-HARATI, Arun Victor JAGGA