Patents by Inventor Maneesh KUMAR
Maneesh KUMAR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250252436Abstract: Innovative systems and methods address the challenges in blockchain transaction processing, particularly in Proof of Work (POW) and Proof of Minting (POM) consensus mechanisms. These challenges encompass slow transaction processing, network congestion, high resource consumption, transaction prioritization issues, scalability limitations, environmental concerns, and the trade-off between security and efficiency. To mitigate these issues, innovative solutions combine active metadata and reinforcement learning to optimize cryptocurrency transaction processing, enhancing the Transactions Per Second (TPS) rate in Crypto Mining and Minting. Users initiate transactions, which are queued with detailed information. Active metadata efficiently processes and assigns transactions, while reinforcement learning dynamically adjusts block sizes based on transaction sizes. This streamlines transaction processing, incentivizes efficient block creation, and improves overall blockchain network performance.Type: ApplicationFiled: February 6, 2024Publication date: August 7, 2025Inventors: Maneesh Kumar Sethia, Gowri Sundar Suriyanarayanan, Sivashalini Sivajothi, Ashokkumar M, Shameera Roohin Mohammed Nasrullah, Parameswari K
-
Patent number: 12379918Abstract: A method includes receiving a request. The request is encrypted to generate an encrypted request. The encrypted request includes a version information for a first software package deployed in a standalone computing system, and a region information and a hardware information for the standalone computing system. The encrypted request is sent to a respective regional data center of a cloud computing system based on the region information of the first software package. A second software package is identified among software packages stored in the respective regional data center. The second software package corresponds to the hardware information of the first software package. The version information of the first software package is compared to a version information of the second software package. In response to identifying that the second software package is more recent than the first software package, the second software package is deployed to the standalone computing system.Type: GrantFiled: July 28, 2023Date of Patent: August 5, 2025Assignee: Bank of America CorporationInventors: Ngoc Anh Tran, Yaksh Kumar Singh, Maneesh Kumar Sethia, Amit Mishra, Pavan Kumar Kanamarlapudi, Saurabh Garg, Abhijit Behera
-
Publication number: 20250245640Abstract: Arrangements for leveraging quantum computing to optimize cash recycling at ATMs are provided. Current status data including location data, cash depletion rate data, and the like, may be received from a plurality of ATMs. Telemetry data from one or more cash replenishment vehicles may be received. The telemetry data may include GPS-based location data from a computing device associated with each vehicle, speed data, and the like. A machine learning model may be executed using the ATM status data and telemetry data as inputs to output an optimized replenishment scenario. In some examples, quantum computing may be used to analyze the data and identify the optimized replenishment scenario for execution. Executing the optimized replenishment scenario may include generating one or more instructions that causing one or more ATMs to activate or deactivate cash recycling functionality, causing one or more cash replenishment vehicles to modify a replenishment route, or the like.Type: ApplicationFiled: January 26, 2024Publication date: July 31, 2025Inventors: Shailendra Singh, Maneesh Kumar Sethia
-
Publication number: 20250240302Abstract: An apparatus comprises a memory communicatively coupled to a processor. The processor is configured to determine a configuration mapping corresponding to a deployment operation and create a secret parameter based at least in part upon the configuration mapping, receive a request to release multiple testing operations to a managed server, identify a source of the request, and determine that the request is received from a trusted device in response to determining that the source at least partially matches a server profile of the one or more server profiles. Further, the processor is configured to determine multiple pods associated with the managed server in response to determining that the request is received from the trusted device, generate a verification block based at least in part upon the secret parameter and the configuration mapping, and enable access between the pods and the portion of application data.Type: ApplicationFiled: January 23, 2024Publication date: July 24, 2025Inventors: Maneesh Kumar Sethia, Abhijit Behera, Manimaran Sundaravel, Sivashalini Sivajothi, Shailendra Singh
-
Publication number: 20250240230Abstract: An apparatus comprises a memory communicatively coupled to a processor. The memory is configured to store multiple deployment operations configured to control access to one or more portions of application data. The processor is configured to determine a deployment operation associated with a portion of the application data, perform multiple collected testing operations for the portion of the application data based at least in part upon the deployment operation, and determine pod data indicating multiple role parameters based at least in part upon the deployment operation. The role parameters are configured to indicate multiple testing operations on the portion of the application data. Further, the processor is configured to identify a pod that at least partially matches the pod data and trigger one or more distributed testing operations at the pod.Type: ApplicationFiled: January 23, 2024Publication date: July 24, 2025Inventors: Maneesh Kumar Sethia, Abhijit Behera, Manimaran Sundaravel, Sivashalini Sivajothi, Shailendra Singh
-
Publication number: 20250231758Abstract: Systems, computer program products, and methods are described herein for generating alternative software configurations using advanced computational models for data analysis and automated processing. The present disclosure is configured to analyze a software configuration to determine a non-compliant software portion, wherein the non-compliant software portion comprises a mismatch between at least a portion of the software configuration and a compliance database. Further, the present disclosure is configured to receive a compliant software portion, wherein the compliant software portion is associated with the compliance database. Further, the present disclosure is configured to reconfigure, using an artificial intelligence model, the software configuration to include the compliant software portion, wherein reconfiguring the software configuration comprises modifying the software configuration to comply with the compliance database.Type: ApplicationFiled: January 16, 2024Publication date: July 17, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Naveen Reddy Mamidi, Varun Vidyadharan Ezhava, Maneesh Kumar Sethia
-
Computer Vision Systems and Methods for Automatic Alignment of Parcels with Geotagged Aerial Imagery
Publication number: 20250232459Abstract: Computer vision systems and methods for automatic parcel alignment are provided. The system receives a geotagged aerial image, parcel information, and semantic information where each of the parcel and semantic information are overlaid on the geotagged aerial image. The system cleans the parcel information and the semantic information. The system optimizes the parcel information by grouping geo-registered parcels present in the geotagged aerial image into a plurality of islands and generating a plurality of parcel alignment solutions for each island of the plurality of islands. The system refines the plurality of parcel alignment solutions for each island and regularizes each island. The system generates a composite parcel alignment solution based on the refined plurality of parcel alignment solutions for each regularized island to align the geo-registered parcels of each regularized island with the geotagged aerial image.Type: ApplicationFiled: April 1, 2025Publication date: July 17, 2025Applicant: Insurance Services Office, Inc.Inventors: Aditya Singh, Venkata Subbarao Veeravarasapu, Aurobrata Ghosh, Maneesh Kumar Singh -
Patent number: 12354068Abstract: Arrangements for remote device control and transaction processing are provided. In some aspects, a local computing device may initiate a communication session with the self-service kiosk. The local computing device may capture self-service kiosk identifying data and may generate a deep link to an application. The local computing device may transmit the deep link and self-service kiosk identifying information to a remote computing device. An indication of selection of the deep link may be received by the local computing device and a remote transaction processing session may be initiated at the self-service kiosk. The self-service kiosk may transmit a user interface for display by the remote computing device. An option from the user interface may be selected for processing. The self-service kiosk may process the selected option, send a notification of transaction completion to the remote user computing device and terminate the communication session with the local user computing device.Type: GrantFiled: May 15, 2023Date of Patent: July 8, 2025Assignee: Bank of America CorporationInventors: Rajeswari Selvaraj, Abhijit Behera, Madhusekhar Banda, Maneesh Kumar Sethia
-
Patent number: 12327402Abstract: Systems and methods for detection and localization of image and document forgery. The method can include the step of receiving a dataset having a plurality of authentic images and a plurality of manipulated images. The method can also include the step of benchmarking a plurality of image forgery algorithms using the dataset. The method can further include the step of generating a plurality of receiver operating characteristic (ROC) curves for each of the plurality of image forgery algorithms. The method also includes the step of calculating a plurality of area under curve metrics for each of the plurality of ROC curves. The method further includes the step of training a neural network for image forgery based on the plurality of area under curve metrics.Type: GrantFiled: August 9, 2022Date of Patent: June 10, 2025Assignee: Insurance Services Office, Inc.Inventors: Anurag Ghosh, Dongmian Zou, Maneesh Kumar Singh
-
Publication number: 20250168022Abstract: A method includes analyzing a first block of a blockchain stored in a blockchain network. The first block is associated with an interaction between computing systems. Upon determining that the interaction is illegitimate, a first instruction is sent to the blockchain network to create and add a dispute block associated with a dispute of the interaction to the blockchain. Upon determining that the blockchain includes an intermediate block between the first block and the dispute block that is associated with a subsequent interaction that is performed after the interaction, source and destination computing systems for the interaction and the subsequent interaction are determined. Upon approving reversals of the interaction and the subsequent interaction, a second instruction is sent to each destination computing system to initiate a reversal of a respective interaction. A notification is sent to each source computing system that the reversal of the respective interaction is approved.Type: ApplicationFiled: November 17, 2023Publication date: May 22, 2025Inventors: Saurabh Garg, Maneesh Kumar Sethia, Shailendra Singh
-
Publication number: 20250141879Abstract: A system for implementing location-based validation in data item transfer approval is disclosed. The system receives a request message that indicates to transfer a data item. The system determines a first location data indicating where a sender has registered to a software application configured to facilitate transferring the data item and a second location data indicating a current location of the sender. The system determines a third location data indicating where a receiver has registered to the software application and a fourth location data indicating a current location of the receiver. The system determines whether the request message is anomalous based at least on rules. Each rule indicates a circumstance that a data item transfer request is to be approved or denied based on location data associated with a sender and a receiver. The system grants the request message if it is determined that the request message is not anomalous.Type: ApplicationFiled: October 27, 2023Publication date: May 1, 2025Inventors: Abhijit Behera, Gowri Sundar Suriyanarayanan, Maneesh Kumar Sethia, Shailendra Singh
-
Publication number: 20250119455Abstract: A system for performing secured operations includes a user device and a server. The user device generates a first operation data that comprises the origin of the operation and a unique identifier of a user. The user device communicates the operation data to the server. The server generates, based on the first operation data, one or more first conditional rules that comprise a first rule that indicates the operation is to be executed when a second user requesting to receive a data item is identified. The server determines that one or more first conditional rules are met. In response, the server communicates a signal to the user device, where the signal indicates to transfer the data item to a second user device associated with the second user.Type: ApplicationFiled: October 6, 2023Publication date: April 10, 2025Inventors: Abhijit Behera, Gowri Sundar Suriyanarayanan, Maneesh Kumar Sethia
-
Publication number: 20250119404Abstract: A system for validating the origin information of a data item accesses a data packet that indicates a request to transfer a data item. The data packet is appended with a first header and a second header. The first header comprises information about the sender of the data packet. The second header comprises information about a user device from which the data packet has originated. The system compares the information about the sender of the data packet with previously provided user information and determines that the user information corresponds to the information about the sender. The system communicates a request that indicates whether the information about the user device is valid and receives a message that indicates the information about the user device is valid. In response, the system communicates a message that comprises the data packet and instructions that, upon execution, cause the data packet to be transferred.Type: ApplicationFiled: October 10, 2023Publication date: April 10, 2025Inventors: Abhijit Behera, Gowri Sundar Suriyanarayanan, Maneesh Kumar Sethia
-
Publication number: 20250117785Abstract: A system for implementing traceability to a data item comprises a user device and a gateway server. The user device appends headers to a data packet that includes the data item. The headers comprise parameters including origin information associated with the user device and a user. The gateway server receives the data packet and compares each parameter with a counterpart parameter from a list of expected parameters. The gateway server determines whether more than a threshold number of the parameters corresponds to counterpart parameters from among the list of expected parameters. In response to determining that more than the threshold number of the parameters correspond to counterpart parameters from among the list of expected parameters, the gateway server appends a second header to the data packet, where the second header indicates that the data packet is verified. The gateway server communicates a request message that includes the data packet.Type: ApplicationFiled: October 10, 2023Publication date: April 10, 2025Inventors: Abhijit Behera, Gowri Sundar Suriyanarayanan, Maneesh Kumar Sethia
-
Publication number: 20250110823Abstract: An error message is received from a first computing node indicating a malfunction associated with the first computing node. Based on a first error code received in the error message, a first software program is determined that is to be installed at the first computing node to resolve the malfunction. A geographically nearest second computing node to the first computing node is determined that includes the first software program. The second computing node is instructed to transmit the first software program to the first computing node. The second computing node transmits the first software program to the first computing node. The first computing node receives and installs the first software program at the first computing node.Type: ApplicationFiled: October 2, 2023Publication date: April 3, 2025Inventors: Saurabh Garg, Maneesh Kumar Sethia, Shailendra Singh
-
Publication number: 20250112767Abstract: A system includes a memory and a processor that validates an interaction between an initiating and a receiving device. An encrypted request is received to perform the interaction and the processor extracts an initiating device identification, a receiving device identification, and one or more numerical values associated with the interaction. Using this extracted information, the processor produces a verification key by applying a hash function and a verification checksum value using a checksum function. The verification key and verification checksum value are then compared with an authentication key and authentication checksum value that were produced in a same manner prior to the interaction being initiated. If it is determined that either the verification key and the authentication key do not have the same value, or verification checksum value and authentication checksum value do not have the same value, then the interaction is reversed.Type: ApplicationFiled: October 2, 2023Publication date: April 3, 2025Inventors: Gowri Sundar Suriyanarayanan, Maneesh Kumar Sethia, Abhijit Behera, Shailendra Singh
-
Publication number: 20250112703Abstract: A mobile device performs an alternative interaction with an entity device using optical absorption spectroscopy, such as when a traditional network connection is unavailable between the mobile device and the entity device.Type: ApplicationFiled: October 3, 2023Publication date: April 3, 2025Inventors: Ngoc Tran, Maneesh Kumar Sethia
-
Publication number: 20250112795Abstract: A system is configured to perform an interaction between a first user and a second user. The system comprises memory operable to store a data log comprising information associated with the interaction and a hold duration. The system comprises a processor operably coupled to the memory and a blockchain network. The processor is configured to receive a request from a first user device to record the interaction on the blockchain network, and store information associated with the interaction in a data log. The processor is configured to determine whether a cancel request is received. If received, the processor is configured to cancel the request to record the interaction on the blockchain network. If not received, the processor is configured to hold the request to record the interaction on the blockchain network for the hold duration, and subsequently record the interaction on the blockchain network.Type: ApplicationFiled: September 29, 2023Publication date: April 3, 2025Inventors: Gowri Sundar Suriyanarayanan, Maneesh Kumar Sethia, Abhijit Behera
-
Computer vision systems and methods for automatic alignment of parcels with geotagged aerial imagery
Patent number: 12266119Abstract: Computer vision systems and methods for automatic parcel alignment are provided. The system receives a geotagged aerial image, parcel information, and semantic information where each of the parcel and semantic information are overlaid on the geotagged aerial image. The system cleans the parcel information and the semantic information. The system optimizes the parcel information by grouping geo-registered parcels present in the geotagged aerial image into a plurality of islands and generating a plurality of parcel alignment solutions for each island of the plurality of islands. The system refines the plurality of parcel alignment solutions for each island and regularizes each island. The system generates a composite parcel alignment solution based on the refined plurality of parcel alignment solutions for each regularized island to align the geo-registered parcels of each regularized island with the geotagged aerial image.Type: GrantFiled: October 3, 2023Date of Patent: April 1, 2025Assignee: Insurance Services Office, Inc.Inventors: Aditya Singh, Venkata Subbarao Veeravarasapu, Aurobrata Ghosh, Maneesh Kumar Singh -
Publication number: 20250106232Abstract: A method includes intercepting requests, which are analyzed to identify authenticated and suspicious requests. The suspicious requests are grouped into request groups based on respective geolocation information. A rate of requests is determined for a request group. In response to determining that the rate of requests is less than or equal to a request rate threshold, parameters of a suspicious request of the request group are analyzed to determining values of the parameters. In response to determining that the value of the parameters do not match with respective malicious parameter values stored in a block list, the suspicious request is analyzed using a neural network to identify if the suspicious request is legitimate or malicious. In response to identifying that the suspicious request is malicious, a notification indicating that the suspicious request is identified as malicious is sent, and the values of the parameters are added to the block list.Type: ApplicationFiled: September 22, 2023Publication date: March 27, 2025Inventors: Ngoc Anh Tran, Manimaran Sundaravel, Maneesh Kumar Sethia