Patents by Inventor Maneesh KUMAR

Maneesh KUMAR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250141879
    Abstract: A system for implementing location-based validation in data item transfer approval is disclosed. The system receives a request message that indicates to transfer a data item. The system determines a first location data indicating where a sender has registered to a software application configured to facilitate transferring the data item and a second location data indicating a current location of the sender. The system determines a third location data indicating where a receiver has registered to the software application and a fourth location data indicating a current location of the receiver. The system determines whether the request message is anomalous based at least on rules. Each rule indicates a circumstance that a data item transfer request is to be approved or denied based on location data associated with a sender and a receiver. The system grants the request message if it is determined that the request message is not anomalous.
    Type: Application
    Filed: October 27, 2023
    Publication date: May 1, 2025
    Inventors: Abhijit Behera, Gowri Sundar Suriyanarayanan, Maneesh Kumar Sethia, Shailendra Singh
  • Publication number: 20250117785
    Abstract: A system for implementing traceability to a data item comprises a user device and a gateway server. The user device appends headers to a data packet that includes the data item. The headers comprise parameters including origin information associated with the user device and a user. The gateway server receives the data packet and compares each parameter with a counterpart parameter from a list of expected parameters. The gateway server determines whether more than a threshold number of the parameters corresponds to counterpart parameters from among the list of expected parameters. In response to determining that more than the threshold number of the parameters correspond to counterpart parameters from among the list of expected parameters, the gateway server appends a second header to the data packet, where the second header indicates that the data packet is verified. The gateway server communicates a request message that includes the data packet.
    Type: Application
    Filed: October 10, 2023
    Publication date: April 10, 2025
    Inventors: Abhijit Behera, Gowri Sundar Suriyanarayanan, Maneesh Kumar Sethia
  • Publication number: 20250119455
    Abstract: A system for performing secured operations includes a user device and a server. The user device generates a first operation data that comprises the origin of the operation and a unique identifier of a user. The user device communicates the operation data to the server. The server generates, based on the first operation data, one or more first conditional rules that comprise a first rule that indicates the operation is to be executed when a second user requesting to receive a data item is identified. The server determines that one or more first conditional rules are met. In response, the server communicates a signal to the user device, where the signal indicates to transfer the data item to a second user device associated with the second user.
    Type: Application
    Filed: October 6, 2023
    Publication date: April 10, 2025
    Inventors: Abhijit Behera, Gowri Sundar Suriyanarayanan, Maneesh Kumar Sethia
  • Publication number: 20250119404
    Abstract: A system for validating the origin information of a data item accesses a data packet that indicates a request to transfer a data item. The data packet is appended with a first header and a second header. The first header comprises information about the sender of the data packet. The second header comprises information about a user device from which the data packet has originated. The system compares the information about the sender of the data packet with previously provided user information and determines that the user information corresponds to the information about the sender. The system communicates a request that indicates whether the information about the user device is valid and receives a message that indicates the information about the user device is valid. In response, the system communicates a message that comprises the data packet and instructions that, upon execution, cause the data packet to be transferred.
    Type: Application
    Filed: October 10, 2023
    Publication date: April 10, 2025
    Inventors: Abhijit Behera, Gowri Sundar Suriyanarayanan, Maneesh Kumar Sethia
  • Publication number: 20250112703
    Abstract: A mobile device performs an alternative interaction with an entity device using optical absorption spectroscopy, such as when a traditional network connection is unavailable between the mobile device and the entity device.
    Type: Application
    Filed: October 3, 2023
    Publication date: April 3, 2025
    Inventors: Ngoc Tran, Maneesh Kumar Sethia
  • Publication number: 20250112795
    Abstract: A system is configured to perform an interaction between a first user and a second user. The system comprises memory operable to store a data log comprising information associated with the interaction and a hold duration. The system comprises a processor operably coupled to the memory and a blockchain network. The processor is configured to receive a request from a first user device to record the interaction on the blockchain network, and store information associated with the interaction in a data log. The processor is configured to determine whether a cancel request is received. If received, the processor is configured to cancel the request to record the interaction on the blockchain network. If not received, the processor is configured to hold the request to record the interaction on the blockchain network for the hold duration, and subsequently record the interaction on the blockchain network.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Inventors: Gowri Sundar Suriyanarayanan, Maneesh Kumar Sethia, Abhijit Behera
  • Publication number: 20250112767
    Abstract: A system includes a memory and a processor that validates an interaction between an initiating and a receiving device. An encrypted request is received to perform the interaction and the processor extracts an initiating device identification, a receiving device identification, and one or more numerical values associated with the interaction. Using this extracted information, the processor produces a verification key by applying a hash function and a verification checksum value using a checksum function. The verification key and verification checksum value are then compared with an authentication key and authentication checksum value that were produced in a same manner prior to the interaction being initiated. If it is determined that either the verification key and the authentication key do not have the same value, or verification checksum value and authentication checksum value do not have the same value, then the interaction is reversed.
    Type: Application
    Filed: October 2, 2023
    Publication date: April 3, 2025
    Inventors: Gowri Sundar Suriyanarayanan, Maneesh Kumar Sethia, Abhijit Behera, Shailendra Singh
  • Publication number: 20250110823
    Abstract: An error message is received from a first computing node indicating a malfunction associated with the first computing node. Based on a first error code received in the error message, a first software program is determined that is to be installed at the first computing node to resolve the malfunction. A geographically nearest second computing node to the first computing node is determined that includes the first software program. The second computing node is instructed to transmit the first software program to the first computing node. The second computing node transmits the first software program to the first computing node. The first computing node receives and installs the first software program at the first computing node.
    Type: Application
    Filed: October 2, 2023
    Publication date: April 3, 2025
    Inventors: Saurabh Garg, Maneesh Kumar Sethia, Shailendra Singh
  • Patent number: 12266119
    Abstract: Computer vision systems and methods for automatic parcel alignment are provided. The system receives a geotagged aerial image, parcel information, and semantic information where each of the parcel and semantic information are overlaid on the geotagged aerial image. The system cleans the parcel information and the semantic information. The system optimizes the parcel information by grouping geo-registered parcels present in the geotagged aerial image into a plurality of islands and generating a plurality of parcel alignment solutions for each island of the plurality of islands. The system refines the plurality of parcel alignment solutions for each island and regularizes each island. The system generates a composite parcel alignment solution based on the refined plurality of parcel alignment solutions for each regularized island to align the geo-registered parcels of each regularized island with the geotagged aerial image.
    Type: Grant
    Filed: October 3, 2023
    Date of Patent: April 1, 2025
    Assignee: Insurance Services Office, Inc.
    Inventors: Aditya Singh, Venkata Subbarao Veeravarasapu, Aurobrata Ghosh, Maneesh Kumar Singh
  • Publication number: 20250106232
    Abstract: A method includes intercepting requests, which are analyzed to identify authenticated and suspicious requests. The suspicious requests are grouped into request groups based on respective geolocation information. A rate of requests is determined for a request group. In response to determining that the rate of requests is less than or equal to a request rate threshold, parameters of a suspicious request of the request group are analyzed to determining values of the parameters. In response to determining that the value of the parameters do not match with respective malicious parameter values stored in a block list, the suspicious request is analyzed using a neural network to identify if the suspicious request is legitimate or malicious. In response to identifying that the suspicious request is malicious, a notification indicating that the suspicious request is identified as malicious is sent, and the values of the parameters are added to the block list.
    Type: Application
    Filed: September 22, 2023
    Publication date: March 27, 2025
    Inventors: Ngoc Anh Tran, Manimaran Sundaravel, Maneesh Kumar Sethia
  • Publication number: 20250106238
    Abstract: A method includes intercepting requests. The requests are analyzed to identify authenticated requests. Remaining requests are identified as suspicious requests. The suspicious requests are grouped into request groups based on respective geolocation information. A first rate of requests is determined for a first request group. In response to determining that the first rate of requests is less than or equal to a request rate threshold, parameters of a first suspicious request of the first request group are analyzed to determining values of the parameters. In response to determining that the values of the parameters are not within respective acceptable parameter value ranges, the first suspicious request is analyzed using a neural network to identify if the first suspicious request is legitimate or malicious. In response to identifying that the first suspicious request is malicious, a first notification indicating that the first suspicious request is identified as malicious is send.
    Type: Application
    Filed: September 22, 2023
    Publication date: March 27, 2025
    Inventors: Ngoc Anh Tran, Manimaran Sundaravel, Maneesh Kumar Sethia
  • Publication number: 20250104448
    Abstract: Computer vision systems and methods for text classification are provided. The system detects a plurality of text regions in an image and generates a bounding box for each detected text region. The system utilizes a neural network to recognize text present within each bounding box and classifies the recognized text, based on at least one extracted feature of each bounding box and the recognized text present within each bounding box, according to a plurality of predefined tags. The system can associate a key with a value and return a key-value pair for each predefined tag.
    Type: Application
    Filed: July 31, 2024
    Publication date: March 27, 2025
    Applicant: Insurance Services Office, Inc.
    Inventors: Khoi Nguyen, Maneesh Kumar Singh
  • Patent number: 12254466
    Abstract: Methods, systems and apparatus for dynamic multi-level detection of compromised transaction receivers are provided. The apparatus may include a sensor communication module (“SCM”) to monitor a transaction between a card and a card reader. The apparatus may include a terminal software module (“TSM”) configured to compare sensor data with data included in a threshold lookup table. Based on the comparison, the TSM may output a threshold status. The status may indicate a violation or confirmation. The apparatus may include a dynamic mutual cryptographic authenticator (“DMCA”). The DMCA may terminate the transaction in response to receipt of the threshold violation. The DMCA may initiate an encrypted challenge response communication module (“ECRCM”) in response to receipt of the threshold confirmation. The ECRCM may verify decryption and exchange of challenges between the card and the card reader. In response to confirming the decryption and exchange of the challenges, the transaction may be authenticated.
    Type: Grant
    Filed: June 6, 2024
    Date of Patent: March 18, 2025
    Assignee: Bank of America Corporation
    Inventors: Abhijit Behera, Maneesh Kumar Sethia, Rajasekhar Madala, Ajay Kumar Gowni
  • Publication number: 20250077273
    Abstract: A metaverse server comprises an edge node processor and a remote node processor. The edge node processor receives a request to perform a task comprising a first set of one or more operations and a second set of one or more operations from a client device associated with a metaverse user, executes the first set of one or more operations, sends a first notification indicating that the task is being performed to the client device, and forwards the second set of one or more operations to the remote node processor. The remote node processor receives the second set of one or more operations, executes each of the second set of one or more operations when conditions for executing the operation are satisfied, and sends a second notification indicating that the task has been completed to the client device upon completion of the second set of one or more operations.
    Type: Application
    Filed: August 31, 2023
    Publication date: March 6, 2025
    Inventors: Ngoc Tran, Maneesh Kumar Sethia, Sandeep Kumar Chauhan, Saurabh Arora
  • Publication number: 20250077626
    Abstract: A system for two-way projection of information and contactless communication of a data item includes a memory and a processor coupled to the memory. The processor initiates a virtual session for an interaction between an entity owner and a user relating to a set of objects and generates a non-fungible token for the virtual session. The processor tracks current information associated with the set of objects and simultaneously project the current information to a first virtual device of the entity owner and a second virtual device of the user. The processor receives, via the second virtual device of the user, a selection of one or more objects and a data item with respect to the selected objects. The processor communicates the data item and the generated non-fungible token for fulfillment of the selected objects to the user. The data item is communicated without requiring explicit contact by the user.
    Type: Application
    Filed: September 6, 2023
    Publication date: March 6, 2025
    Inventors: Yingcai Peng, Maneesh Kumar Sethia, Abhijit Behera, Ankit Kumar Sahoo
  • Publication number: 20250077628
    Abstract: The disclosure provides a method that includes presenting a simulated user device in a virtual environment, and receiving user credentials in response to an avatar interacting with the simulated user device. The method includes comparing the user credentials to known user credentials. The method includes determining that the avatar is associated with the user based on the comparison. The method includes identifying a first prior interaction from a data log of interactions, where the first prior interaction is associated with a first digital item token, and identifying a second prior interaction from the data log of interactions, where the second prior interaction is associated with a second digital item token. The method includes retrieving the first digital item token and the second digital item token, and presenting the first digital item token and the second digital item token on the simulated user device.
    Type: Application
    Filed: August 31, 2023
    Publication date: March 6, 2025
    Inventors: Shahadat Hossain Mazumder, Maneesh Kumar Sethia, Abhijit Behera, Sivashalini Sivajothi
  • Publication number: 20250080557
    Abstract: A device, during a first interaction in real time, accesses from optical cells a measurement of optical emissions generated by hardware components inside the device responsive to a data card interacting with the device, generates a first optical emission pattern based on the measurement, determines whether the first optical emission pattern matches a baseline optical emission pattern, upon determining a match, determines whether the data card is associated with prohibited interactions, upon determining the first data card is not associated with prohibited transactions, determines whether the device is connected to a malicious IP address, upon determining the device is not connected to a malicious IP address, approves the first interaction. The device declines the first interaction if the first optical emission pattern does not match the baseline optical emission pattern, the first data card is associated with prohibited interactions, or the device is connected to a malicious IP address.
    Type: Application
    Filed: September 1, 2023
    Publication date: March 6, 2025
    Inventors: Shahadat Hossain Mazumder, Maneesh Kumar Sethia, Abhijit Behera
  • Publication number: 20250068772
    Abstract: A system that includes a memory and a processor that determines whether to authorize an action. The processor receives a plurality of authorization messages that are requests for authorizing actions. The processor then extracts data from the plurality of authorization messages and analyzes the data with a trained neural network to group the plurality of authorization messages. The resulting plurality of message groupings are then analyzed by a long-short-term-memory algorithm (LSTM) to determine a plurality of patterns that indicate that a particular authorization message may be authorized. The processor then receives one or more new authorization messages from an external device and compares these to the plurality of patterns. If the one or more new authorization messages correspond to any of the patterns, then the external device is notified by the processor that it should deny the action associated with the new authorization messages.
    Type: Application
    Filed: August 25, 2023
    Publication date: February 27, 2025
    Inventors: Ngoc Tran, Maneesh Kumar Sethia, Saurabh Garg
  • Publication number: 20250061577
    Abstract: Computer vision systems and methods for end-to end training of neural networks are provided. The system generates a fixed point algorithm for dual-decomposition of a maximum-a-posteriori inference problem and trains the convolutional neural network and a conditional random field with the fixed point algorithm and a plurality of images of a dataset to learn to perform semantic image segmentation. The system can segment an attribute of an image of the dataset by the trained neural network and the conditional random field.
    Type: Application
    Filed: October 1, 2024
    Publication date: February 20, 2025
    Applicant: Insurance Services Office, Inc.
    Inventors: Shaofei Wang, Vishnu Sai Rao Suresh Lokhande, Maneesh Kumar Singh, Konrad Kording, Julian Yarkony
  • Patent number: D1062474
    Type: Grant
    Filed: January 12, 2022
    Date of Patent: February 18, 2025
    Assignee: Colgate-Palmolive Company
    Inventors: Maneesh Kumar, Devesh Badola, Swapnil Raut