Patents by Inventor Kevin Osborn
Kevin Osborn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12328651Abstract: An automated method is provided for initiating a transaction function in a transaction processing device. The method comprises establishing near field communication between the transaction processing device and an NFC transmitting device having an associated tag identifier and receiving NFC information including the tag identifier. The transaction processing device transmits the NFC information to a merchant processor and receives from the merchant processor a tag rule communication including an instruction to carry out a transaction function associated with the tag identifier or a request to associate a new transaction function with the tag identifier. Responsive to receiving an instruction to carry out a transaction function associated with the tag identifier, the transaction processing device executes the transaction function.Type: GrantFiled: July 1, 2021Date of Patent: June 10, 2025Assignee: CAPITAL ONE SERVICES, LLCInventors: David Gabriele, Wayne Lutz, Lin Ni Lisa Cheng, Daniel John Marsch, Tyler Maiman, Saleem Ahmed Sangi, Kevin Osborn
-
Publication number: 20250182176Abstract: Disclosed are a system and techniques for authenticating voice transactions with a payment card. A system example may include a purchase application executing on a smart digital device, and a payment card. The purchase application may receive an item purchase request via an audio input device of the smart digital device for an item available to purchase. The received item purchase request may be sent to an application server or the like, and, in response, a list of merchants offering the item available for purchase and each merchant's price for the item available to purchase may be received. The list may be presented on a smart digital device display for selection of at least one of the merchants selling the item may be received. A payment card may be inserted into the smart digital device's near-field communication field to provide a signal containing encrypted data.Type: ApplicationFiled: September 9, 2024Publication date: June 5, 2025Applicant: Capital One Services, LLCInventors: Kevin OSBORN, Jeffrey RULE
-
Publication number: 20250184955Abstract: A method of transmitting user guidance may include receiving captured electronic device location data. The method may include providing the electronic device location data and a plurality of account data of the unique user to a machine-learning model. The machine-learning model may be trained to identify location patterns within the electronic device location data and the plurality of account data of the unique user and output a user current location and a user base location. The method may further include determining a user target location using the user current location and the user base location. The method may further include comparing the user target location to entity target criteria to determine if the user target location satisfies the entity target criteria. The method may further include transmitting the user guidance to the electronic device associated with the unique user based on the user target location satisfying the entity target criteria.Type: ApplicationFiled: November 30, 2023Publication date: June 5, 2025Applicant: Capital One Services, LLCInventors: John ADJEI, Kendra FLORIO, Joshua EDWARDS, Kevin OSBORN, Jordan RIDENOUR
-
Patent number: 12321922Abstract: Various embodiments are directed to applying, via contactless card authentication, one or more restrictions to a virtual card number and generating the card number for use by a recipient. The one or more restrictions may be specifically personalized to the recipient and may include, for example, a merchant restriction, an amount restriction, a time period restriction, or a location restriction. The generated virtual card number along with the applied one or more restrictions may be consumed in various ways, such as writing the number to a blank card, transmitting the number directly to the recipient's computing device, etc., all via near-field communication.Type: GrantFiled: March 19, 2024Date of Patent: June 3, 2025Assignee: Capital One Services, LLCInventors: Jeffrey Rule, Kevin Osborn, Wayne Lutz
-
Patent number: 12322233Abstract: Disclosed herein are system, method, and computer program product embodiments for providing secure access to a locker of a locker system based on a token that includes token data and a message authentication code (MAC) to authenticate the token data. The token data includes at least the unique locker identifier for the locker. The MAC can be generated using a secret key. The secret key can be obtained based on a unique derivation key associated with a master key. The locker system can determine whether the token is valid based on the token data, the MAC, and the secret key. In response to a determination that the token is valid, the locker system can send a signal to unlock the locker.Type: GrantFiled: January 2, 2024Date of Patent: June 3, 2025Assignee: Capital One Services, LLCInventors: Kevin Osborn, Matt Oliver, Lin Ni Lisa Cheng
-
Publication number: 20250173705Abstract: The present embodiments include a system and method for provisioning, storing, and deriving a cryptocurrency wallet. The system includes a card, a user device, an administrator processor, and a server. The method includes generating a private key and a public key over a user datum, encrypting the keys over a key-encryption-key (KEK), and transmitting the keys to a card. The keys can be optionally stored on a server in encrypted form. Alternatively, the keys can be derived from the user datum if the user has lost them.Type: ApplicationFiled: November 28, 2023Publication date: May 29, 2025Inventors: Kevin OSBORN, Andrea MONTEALEGRE, Asher SMITH-ROSE
-
Publication number: 20250173702Abstract: A contactless card can include a plurality of keys for a specific operation, e.g., encryption or signing a communication. The contactless card can also include an applet which uses a key selection module. The key selection module can select one of the plurality of keys and the applet can use the key to, e.g., encrypt or sign a communication using an encryption or signature algorithm. The contactless card can send the encrypted or signed communication to a host computer through a client device. The host computer can repeat the key selection technique of the contactless device to select the same key and thereby decrypt or verify the communication.Type: ApplicationFiled: December 9, 2024Publication date: May 29, 2025Inventors: Jeffrey RULE, Srinivasa CHIGURUPATI, Kevin OSBORN
-
Publication number: 20250156843Abstract: This application relates generally to systems and methods for enabling a user device to detect multiple taps from a contactless card. The user device reads the contactless card for a time stamp, replaces the time stamp with a new time stamp, and determines whether the card has been recently tapped.Type: ApplicationFiled: November 14, 2023Publication date: May 15, 2025Inventors: Joshua EDWARDS, Tyler MAIMAN, Kevin OSBORN
-
Publication number: 20250156861Abstract: Example embodiments provide systems and methods for increasing the cryptographic strength of an encryption or message-authentication-code-(MAC) generation technique. According to some embodiments, a MAC may be constructed around a shared secret (such as a random initialization number), thereby increasing strength of the MAC against brute force attacks based on the size of the shared secret. The MAC may be combined with randomized data, and may also be encrypted to further bolster the strength of the code. These elements (shared secret, MAC algorithm, and encryption algorithm) may be employed in various combinations and to varying degrees, depending on the application and desired level of security. At each stage, the cryptographic construct operates on the cyptographically modified data from the previous stage. This layering of cryptographic constructs may increase the strength of the group of contrasts more efficiently than applying any one construct with a larger key size or similar increase in complexity.Type: ApplicationFiled: November 25, 2024Publication date: May 15, 2025Applicant: Capital One Services, LLCInventors: Kevin OSBORN, Srinivasa CHIGURUPATI, William DUANE
-
Publication number: 20250156936Abstract: Disclosed embodiments may include a system providing for currency transfer using augmented reality environments. The system may receive, at a user device associated with a user, a first input indicating a first selection of a first augmented reality item. The system may receive a second input indicating a first movement of the first augmented reality item. The system may determine whether the first augmented reality item is in proximity to a purchasable item. In response to determining that the first augmented reality item is in proximity to the purchasable item, the system may initiate a transfer by receiving image data containing a computer readable code associated with the purchasable item, processing the image data, retrieving store account information and transfer information regarding the purchasable item, retrieving user account information, and transmitting, to an account processor, the user account information, the store account information, and the transfer information.Type: ApplicationFiled: January 16, 2025Publication date: May 15, 2025Inventors: Samuel Rapowitz, Kevin Osborn, Mia Rodriguez, Kathryn Tikoian
-
Publication number: 20250148468Abstract: Systems and methods are directed to a modified device configuration for disposing a NFC compatible user card within a NFC field of a user mobile device so as to enable continuous proximity monitoring based on a status of an NFC link established between the card and the mobile device. The modified device configuration may be utilized to implement card tracking functionality by using a mobile application, running on the mobile device, to generate a timestamp upon detection of change in a connectivity status of the NFC link to the card. The timestamp NFC connectivity data may then be paired with mobile device GPS coordinates, concurrently retrieved from one or more mobile GPS-based navigation applications, to facilitate card tracking functionality as well as multi-factor validation for electronic transactions initiated by the NFC compatible card and/or the mobile device.Type: ApplicationFiled: November 15, 2024Publication date: May 8, 2025Inventors: Jeffrey RULE, Kevin OSBORN, Wayne LUTZ
-
Publication number: 20250148452Abstract: Disclosed is a contactless card, and a system in which the contactless card may be used. The contactless card may include a chip component, a communication interface, processing circuitry, and electromagnetic field sensing circuitry. The electromagnetic field sensing circuitry of the contactless card may be operable to provide orientation signals to the processing circuitry when the contactless card is in proximity to an oscillating electromagnetic field output by a card reader device. The processing circuitry of the contactless card may be operable to receive the orientation signals. An orientation of the contactless card with respect to the mobile device may be determined. An orientation indication signal may be generated based on the determined orientation, and a haptic indication, an audio indication, a visual indication or a combination directing movement of the contactless card in a particular direction may be output.Type: ApplicationFiled: October 11, 2024Publication date: May 8, 2025Applicant: Capital One Services, LLCInventors: Bryant Yee, Tyler Maiman, Kevin Osborn
-
Publication number: 20250147593Abstract: Disclosed is a transaction card may include a card body comprising a top surface and a bottom surface opposite the top surface, a chip secured to the top surface of the card body and configured to communicate wirelessly; a feedback element secured to the card body and including one or more tactile elements and a feedback sensor; and a feedback processor in communication with the chip and the feedback element. The feedback processor may, in response to receiving a signal from the feedback sensor indicative of the presence of a thumb or finger of a user on the feedback element and in response to receiving a signal from the chip, drive one or more of the one or more tactile elements to generate tactile feedback for the user.Type: ApplicationFiled: November 6, 2023Publication date: May 8, 2025Applicant: Capital One Services, LLCInventors: Bryant YEE, Tyler MAIMAN, Kevin OSBORN
-
Patent number: 12293074Abstract: In some implementations, a system may receive interaction data indicating an object and a user location associated with a user of a plurality of users. The system may identify a user-based storage site, of a plurality of user-based storage sites corresponding to at least a subset of the plurality of users, having an object list that includes the object. A particular user-based storage site, of the plurality of user-based storage sites, may have a storage site location associated with a corresponding user. The storage site location may be within a distance threshold of the user location. The system may transmit location data indicating the storage site location. The system may receive retrieval data indicating that the object has been retrieved from the user-based storage site. The system may update the object list of the user-based storage site.Type: GrantFiled: January 31, 2023Date of Patent: May 6, 2025Assignee: Capital One Services, LLCInventors: Jeffrey Rule, Kevin Osborn
-
Patent number: 12294648Abstract: Systems and methods for validating transfers between cryptographic addresses is disclosed. The systems and methods can include receiving instructions to transfer a first plurality of tokens from a first cryptographic address to a second cryptographic address. The transfer can be validated with a portion of the distributed validation processors. The method can include transferring a first plurality of tokens to the second cryptographic address. The method can include transferring a second plurality of tokens to a first distributed validation processor of the plurality of distributed validation processors. After a predetermined period of time and/or subsequent validations by the first distributed validation processors, the method can include transferring an amount greater than the second plurality of tokens to the first cryptographic address.Type: GrantFiled: March 3, 2022Date of Patent: May 6, 2025Assignee: CAPITAL ONE SERVICES, LLCInventors: Samuel Rapowitz, Kevin Osborn, Xiaoguang Zhu
-
Publication number: 20250141700Abstract: A method is provided for communicating with a transaction card having a card data processor, a near card field communication (NFC) interface, and a card memory having a unique card identifier stored therein. In this method, a user communication device establishes an NFC session with the transaction card and transmits to the transaction card an NFC data exchange format (NDEF) WRITE TAG command including session-specific challenge information. The user communication device transmits to the transaction card an NDEF READ TAG command and receives from the transaction card, card-specific challenge response information. The challenge response information is then used to authenticate the transaction card.Type: ApplicationFiled: November 8, 2024Publication date: May 1, 2025Inventors: Kevin OSBORN, Samuel Patrick EDWARDS, Vincent Vy NGO
-
Patent number: 12287856Abstract: A method and system performed by a processor includes receiving from a verified user, an authentication answer for identity-authentication questions. An authentication answer embedding vector in a textual embedding space is generated by inputting each authentication answer into an embedding engine and stored. An unverified-user authentication answer is received, in response to posing to the unverified user, a specific identity-authentication question of the verified user. An unverified-user authentication answer embedding vector is generated using the embedding engine. An embedding space distance is computed between the unverified-user authentication answer embedding vector and the authentication answer embedding vector for the specific identity-authentication question of the verified user posed to the unverified user. A similarity score based on the embedding space distance is computed.Type: GrantFiled: September 12, 2022Date of Patent: April 29, 2025Assignee: Capital One Services, LLCInventors: Kevin Osborn, Brian McClanahan
-
Patent number: 12289396Abstract: In a method of facilitating encrypted communications between a transmitting system having a unique identifier and a receiving system, a key generation system generates at least one encryption master key for use with the unique identifier and an encryption algorithm to produce a transmitting system-unique encryption key. The key generation system also generates a shared secret master key for use with the unique identifier and a second encryption algorithm to produce a shared secret value. The at least one encryption master key and the shared secret master key are then stored in an encryption information database. The key generation system transmits the at least one encryption master key and shared secret information to the transmitting system and transmits the at least one encryption master key, the shared secret master key and the unique identifier to the receiving data processing system.Type: GrantFiled: August 18, 2022Date of Patent: April 29, 2025Assignee: Capital One Services, LLCInventors: Kevin Osborn, James Zarakas, Mark C. Dupuis, Srinivasa Chigurupati
-
Publication number: 20250133089Abstract: In some implementations, a user device may receive, using a first application of the user device, a message that is purported to be from a source. The message may include, in a content of the message, content data and authenticity data, where the authenticity data includes a token. The user device may determine, using a second application of the user device, whether the message is authentic based on the authenticity data, where the second application is associated with the source. The user device may cause an indication of whether the message is authentic to be presented in a user interface of the user device.Type: ApplicationFiled: October 19, 2023Publication date: April 24, 2025Inventors: David Kelly WURMFELD, Kevin OSBORN
-
Publication number: 20250132905Abstract: Systems and methods are directed to generation of verifiable FIDO security keys based on hierarchically generated child keys from an extended security key pair, wherein the extended public key is stored on a verification server of the account issuing entity. In the described implementation, child FIDO key pair are hierarchically derived from an extended private/public key pair. A public key provided during a FIDO registration can be securely tied to a user identity based on verification of FIDO registration data by the issuing server using the corresponding extended public key. Accordingly, a FIDO public key is linked to a thoroughly vetted user identity, during the registration process, without an authentication action from the user. The disclosed systems and methods further enable a re-issued FIDO authenticator device to perform FIDO transactions with FIDO services previously registered against the replaced authenticator device.Type: ApplicationFiled: October 16, 2024Publication date: April 24, 2025Applicant: Capital One Services, LLCInventors: Kevin OSBORN, Srinivasa CHIGURUPATI, Wayne LUTZ