Patents by Inventor Leeyat Bracha Tessler
Leeyat Bracha Tessler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12248084Abstract: In some implementations, a user device may receive one or more first advertisements from one or more first beacons. Accordingly, the user device may exchange check-in messages with a remote device based on the one or more first advertisements. The user device may track a location using at least one or more signal strengths associated with the one or more first beacons and one or more signal strengths associated with one or more second beacons. The user device may further display and update a map based on tracking the location. The user device may receive one or more second advertisements from the one or more second beacons. Accordingly, the user device may request first information associated with the one or more second beacons that is different from second information associated with one or more third beacons. The user device may further display the first information.Type: GrantFiled: July 14, 2022Date of Patent: March 11, 2025Assignee: Capital One Services, LLCInventors: Imren Johar, Ray Cheng, Leeyat Bracha Tessler, Daniel Marsch, Rocky Guo, Bryant Yee, John Jones
-
Publication number: 20250029135Abstract: Disclosed are methods and systems for prioritization and/or validity monitoring of shared links. For instance, a share request for a link associated with a site may be received from a sharing user computing device. The link and associated information, including a valid status, may be stored. An interaction with the site on a receiving user computing device may be detected, and the link may be determined to be valid based on the stored information. A notification including the stored link may be generated and displayed on the receiving user computing device to prompt code use. Interactions indicating code use may be monitored for, code use may be detected, and the status may be updated to invalid. If a plurality of links associated with the site have been received, the links may be prioritized for inclusion in the notification based on a determined priority among sharing users of the links.Type: ApplicationFiled: July 17, 2023Publication date: January 23, 2025Applicant: Capital One Services, LLCInventors: Joshua EDWARDS, Kevin OSBORN, Leeyat Bracha TESSLER, Renee GILL
-
Publication number: 20250029134Abstract: Disclosed are methods and systems for targeted link sharing. For instance, a sharable link may be detected on a sharing user's computing device, and one or more users associated with the sharing user may be determined to be suitable to use the link. For each suitable user, an interaction history of the user, a code use behavior of the user, and information associated with the code are provided as inputs to a trained machine learning system to obtain, as output, a likelihood that the user uses the code. Each suitable user determined to have the output meet a predefined criterion may be included in a list of receiving users for display within a notification on the sharing user's computing device. The link may be distributed to a computing device of at least one receiving user selected from the list to share the link.Type: ApplicationFiled: July 17, 2023Publication date: January 23, 2025Applicant: Capital One Services, LLCInventors: Leeyat Bracha TESSLER, Joshua EDWARDS, Kevin OSBORN, Renee GILL
-
Publication number: 20250013848Abstract: In some implementations, a device may obtain video and/or lidar data relating to a physical card captured while the physical card is flipped from a first side of the physical card to a second side of the physical card. The device may determine an authenticity of the physical card, where the authenticity of the physical card is based at least in part on one or more physical characteristics of the physical card identifiable from the video and/or the lidar data. The one or more physical characteristics may relate to a thickness of the physical card, a length and width of the physical card, a shape of the physical card, and/or a design feature of the physical card. The device may cause, based on a determination that the physical card is authentic, information associated with the physical card to be transmitted or stored to be used in connection with a transaction.Type: ApplicationFiled: August 22, 2024Publication date: January 9, 2025Inventors: Leeyat Bracha TESSLER, Alexander MIRELES, Hazar ALSAHNAWI, Dennis LIU
-
Patent number: 12192402Abstract: Disclosed aspects and embodiments pertain to customer distress assistance. A call can be detected to a callee from a caller. The call can be analyzed and determined to be a fraud or spam risk. In response, callee monitoring is triggered. The monitoring can capture biometrics or speech of the callee. Distress in the callee can be determined through analysis of the biometrics or speech and comparison to reference biometrics or speech of the callee. An individual associated with the callee can be selected based on determining the distress in the customer. The individual can be contacted through a notification or a call to assist the callee in distress.Type: GrantFiled: July 20, 2022Date of Patent: January 7, 2025Assignee: Capital One Services, LLCInventors: Salik Shah, Jennifer Kwok, Abhay Donthi, Dwij Trivedi, Leeyat Bracha Tessler
-
Patent number: 12165144Abstract: A device may configure a browser to permit cash payments for online transactions. The device may monitor a browser session of the browser. The device may detect, during the browser session, navigation of the browser to a transaction page of a website. The transaction page may be configured to facilitate an online transaction with the website. The device may determine, based on detecting the navigation of the browser to the transaction page, that a cash payment is to be provided. The device may cause a validation code to be generated. The device may cause, based on the validation code being processed, a virtual transaction card to be generated. The device may facilitate, using virtual card information associated with the virtual transaction card, execution of the online transaction.Type: GrantFiled: April 10, 2023Date of Patent: December 10, 2024Assignee: Capital One Services, LLCInventors: Adam Vukich, Sarah J. Cunningham, Tyler Maiman, Michael Mossoba, Leeyat Bracha Tessler, Bryant Yee
-
Patent number: 12112220Abstract: In some implementations, a device may obtain video and/or lidar data relating to a physical card captured while the physical card is flipped from a first side of the physical card to a second side of the physical card. The device may determine an authenticity of the physical card, where the authenticity of the physical card is based at least in part on one or more physical characteristics of the physical card identifiable from the video and/or the lidar data. The one or more physical characteristics may relate to a thickness of the physical card, a length and width of the physical card, a shape of the physical card, and/or a design feature of the physical card. The device may cause, based on a determination that the physical card is authentic, information associated with the physical card to be transmitted or stored to be used in connection with a transaction.Type: GrantFiled: July 7, 2023Date of Patent: October 8, 2024Assignee: Capital One Services, LLCInventors: Leeyat Bracha Tessler, Alexander Mireles, Hazar Alsahnawi, Dennis Liu
-
Patent number: 12113929Abstract: A computer-implemented method for authenticating a source of a telephone call to a recipient of the telephone call may include receiving, prior to receiving the telephone call, a request to input first authentication information. The first authentication information may include a passcode or a selection of a security question. The method may include receiving input of the first authentication information and sending, by the user device, the first authentication information to a computing device associated with the source of the telephone call. The method may include receiving the telephone call from the source and receiving input from the recipient of the telephone call to answer the telephone call. The method may include receiving second authentication information from the computing device, where the second authentication information may include the passcode or an answer to the security question. The method may include outputting the second authentication information.Type: GrantFiled: May 3, 2022Date of Patent: October 8, 2024Assignee: Capital One Services, LLCInventors: Jennifer Kwok, Dwij Trivedi, Abhay Donthi, Leeyat Bracha Tessler, Salik Shah
-
Publication number: 20240330937Abstract: A computer-implemented method for transmitting electronic data. The method may include receiving a user data set for a user, wherein the user data set includes a user identifier and one or more user authentications for one or more entities, each entity of the one or more entities having an entity eco-friendly score, determining a user eco-friendly score for the user based on the one or more user authentications and a respective one or more entity eco-friendly scores, modifying a data store server to store the user identifier and the eco-friendly score for the user, generating a targeted event associated with a user medium, based on the user eco-friendly score, and transmitting, to a user device of the user, the targeted event via the user medium.Type: ApplicationFiled: March 31, 2023Publication date: October 3, 2024Applicant: Capital One Services, LLCInventors: Leeyat Bracha TESSLER, Shaun Kieran WEBB, Dan LIN, Apurv BAICHWAL, Daniel E. MILLER
-
Publication number: 20240311831Abstract: Systems and methods for preventing fraud using behavioral biometrics may include a server with memory and a processor. The processor may be configured to create a behavioral biometric use-print for a user based on a plurality of observed and recorded user interactions and then monitor one or more behavioral biometrics of the user while the user accesses a user account. These monitored behavioral biometrics may be compared against the behavioral biometric use-print to determine if there are material deviations indicating that the user is under stress. When the server determines that the user is under stress, it may provide an intervention to help safeguard against potential in-process fraud.Type: ApplicationFiled: March 14, 2023Publication date: September 19, 2024Inventors: Jennifer KWOK, Vyjayanthi VADREVU, Michael SAIA, Viraj CHAUDHARY, Phoebe ATKINS, Tyler MAIMAN, Leeyat Bracha TESSLER, Ray CHENG
-
Publication number: 20240311456Abstract: The present embodiments disclose systems and methods for authenticating a user with behavioral biometrics associated with a card. The card includes an accelerometer configured to measure the orientation of the card body. The system includes the card and a software application. The software application generates a user profile based on observed card biometrics, then determines whether a recent transaction significantly deviates from the profile.Type: ApplicationFiled: March 16, 2023Publication date: September 19, 2024Inventors: Jennifer KWOK, Phoebe ATKINS, Viraj CHAUDHARY, Leeyat Bracha TESSLER, Tyler MAIMAN, Ray CHENG, Vyjayanthi VADREVU, Michael SAIA
-
Publication number: 20240259492Abstract: A method includes generating a set of non-trusted contacts, each contact of the set of non-trusted contacts corresponding to contact information believed to be associated with vishing attacks. The method further includes sending the set of non-trusted contacts to a computing device of a user. The computing device is configured to add the set of non-trusted contacts to a contacts list associated with an audio calling functionality of the computing device. The computing device is configured to receive a call and determine that the call is from a caller associated with a contact in the set of non-trusted contacts. The computing device is configured to silence the call, block the call, or display caller information of the contact based on the determination that the call is from the caller associated with the contact in the set of non-trusted contacts.Type: ApplicationFiled: January 26, 2023Publication date: August 1, 2024Inventors: Leeyat Bracha Tessler, Abhay Donthi, Salik Shah, Jennifer Kwok, Dwij Trivedi
-
Publication number: 20240161183Abstract: Logic may receive one or more questions from a customer in a chat. The logic may associate the one or more questions with one or more categories of subjects. The logic may store indications of the one or more categories of the subjects with a customer profile. The logic may select questions for a quiz for the customer based on the one or more categories of the subjects in the customer profile from a set of questions. The logic may present the one or more questions to the customer. And, in some embodiments, the logic may receive answers to the one or more questions from the customer.Type: ApplicationFiled: November 10, 2022Publication date: May 16, 2024Applicant: Capital One Services, LLCInventors: Leeyat Bracha TESSLER, Illiana REED, Benjamin West POLLAK, Michael Joseph CIRILLO, Abhita MOORTHY, Mia RODRIGUEZ
-
Publication number: 20240160708Abstract: A system and method for detecting and prevent identity theft attempts, such as phishing, vishing or other similar attacks is disclosed. A smart device, such as a smartphone operates in tandem with a biometric sensor, such as is included in a wearable device like a smartwatch or fitness tracker. The wearable tracks certain biometric and/or physiological data that can be used to identify whether the user is in a stressed state. The smart device then accesses usage logs that may indicate whether the stressed state is justified, such as whether the user had a calendar appointment at that time, or whether the call was received from a known contact etc. Justifications reduce the likelihood that the user's stress is a result of an identity theft attempt, whereas lack of justification increases the likelihood. In the latter scenario, the user is notified not to divulge sensitive information.Type: ApplicationFiled: November 10, 2022Publication date: May 16, 2024Applicant: Capital One Services, LLCInventors: Dwij TRIVEDI, Abhay DONTHI, Salik SHAH, Jennifer KWOK, Leeyat Bracha TESSLER
-
Publication number: 20240152644Abstract: Systems and methods disclosed herein securely provide confidential information associated with a user during an active voice call conducted using the user's mobile device. The confidential information may be provided by generating the information in spoken form and inserting the spoken information into an audio stream of the voice call. For example, a customer may be on a phone call with a customer agent. The customer agent may ask the customer for a credit card number in order to process a financial transaction. The customer may select the credit card number via an application executing on the customer's mobile phone. The application may cause the credit card number to be spoken out loud during the voice call. A voice sample of the spoken credit card number in inserted into the audio stream of the voice call and is therefore, audible to the customer and the customer agent without being overheard by a third party.Type: ApplicationFiled: January 12, 2024Publication date: May 9, 2024Inventors: Leeyat Bracha Tessler, Kyle Johnson, Latika Gulati
-
Publication number: 20240146751Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of receiving a permission indicator identifying a permission by the first user to detect calls being received by the computing device; receiving an indication of a particular call being received from a second user at a particular phone number; detecting a triggering condition to verify when the particular phone number is associated with the particular entity; instructing the computing device to execute a computer routine to verify when the particular phone number is associated with the particular entity; receiving an indication from the computer routine when the particular phone number is not associated with the particular entity; instructing the computing device to perform at least one security action; and instructing to notify a second computing device associated with the particular entity with information pertaining to the particular call.Type: ApplicationFiled: November 2, 2022Publication date: May 2, 2024Inventors: Leeyat Bracha Tessler, Salik Shah, Jennifer Kwok, Abhay Donthi, Dwij Trivedi
-
Publication number: 20240104646Abstract: A system and method for providing a temporary credit line increase to a customer awaiting or expecting a refund or replenishment of funds is disclosed. The process can be initiated by a creditor or at the request of a customer. In the latter scenario, the customer provides evidence of the expected refund in the form of a shipping label, return receipt, or other communication. In some cases, additional shipping information is acquired from a shipping company associated with the shipping label. Based on the information received from the customer as well as customer account information, a temporary credit line increase amount is calculated. The customer is then informed of the temporary credit line increase and any terminating conditions. The temporary credit line increase remains available to the customer until one of the terminating conditions has been satisfied.Type: ApplicationFiled: September 23, 2022Publication date: March 28, 2024Applicant: Capital One Services, LLCInventors: Abdelkader M'Hamed BENKREIRA, Leeyat Bracha TESSLER, Shabnam KOUSHA
-
Publication number: 20240087064Abstract: In some implementations, a reliability modeler may receive a plurality of webpages associated with a first entity from an Internet scraping device. The reliability modeler may detect, within the plurality of webpages, at least one of a logo, a font, or a color. The reliability modeler may apply a model, trained on a set of guidelines associated with the first entity, to the logo, the font, or the color. Accordingly, the reliability modeler may determine, based on output from the model, that the plurality of webpages are unlikely to be authorized by the first entity. The reliability modeler may transmit, to a user device, an alert based on determining that the plurality of webpages are unlikely to be associated with the first entity.Type: ApplicationFiled: September 14, 2022Publication date: March 14, 2024Inventors: Leeyat Bracha TESSLER, Robert MAYS, Tyler MAIMAN, Juwan BYRD
-
Publication number: 20240087346Abstract: In some implementations, an augmented reality (AR) device may receive first images representing a webpage, an email, a product, or a store associated with a first entity. The AR device may detect, within the first images, a logo, a font, and/or a color. The AR device may apply a model, trained on a set of guidelines associated with the first entity, to the logo, the font, and/or the color. Accordingly, the AR device may receive, from the model, a first score associated with the webpage, the email, the product, or the store. The AR device may transmit an alert based on the first score. In some implementations, the AR device may further receive second images and apply the model to receive a second score associated with the webpage, the email, the product, or the store. Accordingly, the AR device may transmit an additional alert based on the second score.Type: ApplicationFiled: September 14, 2022Publication date: March 14, 2024Inventors: Leeyat Bracha TESSLER, Robert MAYS, Tyler MAIMAN, Juwan BYRD
-
Patent number: 11914751Abstract: Systems and methods disclosed herein securely provide confidential information associated with a user during an active voice call conducted using the user's mobile device. The confidential information may be provided by generating the information in spoken form and inserting the spoken information into an audio stream of the voice call. For example, a customer may be on a phone call with a customer agent. The customer agent may ask the customer for a credit card number in order to process a financial transaction. The customer may select the credit card number via an application executing on the customer's mobile phone. The application may cause the credit card number to be spoken out loud during the voice call. A voice sample of the spoken credit card number in inserted into the audio stream of the voice call and is therefore, audible to the customer and the customer agent without being overheard by a third party.Type: GrantFiled: May 4, 2022Date of Patent: February 27, 2024Assignee: Capital One Services, LLCInventors: Leeyat Bracha Tessler, Kyle Johnson, Latika Gulati