Patents by Inventor Maneesh KUMAR

Maneesh KUMAR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250106238
    Abstract: A method includes intercepting requests. The requests are analyzed to identify authenticated requests. Remaining requests are identified as suspicious requests. The suspicious requests are grouped into request groups based on respective geolocation information. A first rate of requests is determined for a first request group. In response to determining that the first rate of requests is less than or equal to a request rate threshold, parameters of a first suspicious request of the first request group are analyzed to determining values of the parameters. In response to determining that the values of the parameters are not within respective acceptable parameter value ranges, the first suspicious request is analyzed using a neural network to identify if the first suspicious request is legitimate or malicious. In response to identifying that the first suspicious request is malicious, a first notification indicating that the first suspicious request is identified as malicious is send.
    Type: Application
    Filed: September 22, 2023
    Publication date: March 27, 2025
    Inventors: Ngoc Anh Tran, Manimaran Sundaravel, Maneesh Kumar Sethia
  • Publication number: 20250104448
    Abstract: Computer vision systems and methods for text classification are provided. The system detects a plurality of text regions in an image and generates a bounding box for each detected text region. The system utilizes a neural network to recognize text present within each bounding box and classifies the recognized text, based on at least one extracted feature of each bounding box and the recognized text present within each bounding box, according to a plurality of predefined tags. The system can associate a key with a value and return a key-value pair for each predefined tag.
    Type: Application
    Filed: July 31, 2024
    Publication date: March 27, 2025
    Applicant: Insurance Services Office, Inc.
    Inventors: Khoi Nguyen, Maneesh Kumar Singh
  • Patent number: 12254466
    Abstract: Methods, systems and apparatus for dynamic multi-level detection of compromised transaction receivers are provided. The apparatus may include a sensor communication module (“SCM”) to monitor a transaction between a card and a card reader. The apparatus may include a terminal software module (“TSM”) configured to compare sensor data with data included in a threshold lookup table. Based on the comparison, the TSM may output a threshold status. The status may indicate a violation or confirmation. The apparatus may include a dynamic mutual cryptographic authenticator (“DMCA”). The DMCA may terminate the transaction in response to receipt of the threshold violation. The DMCA may initiate an encrypted challenge response communication module (“ECRCM”) in response to receipt of the threshold confirmation. The ECRCM may verify decryption and exchange of challenges between the card and the card reader. In response to confirming the decryption and exchange of the challenges, the transaction may be authenticated.
    Type: Grant
    Filed: June 6, 2024
    Date of Patent: March 18, 2025
    Assignee: Bank of America Corporation
    Inventors: Abhijit Behera, Maneesh Kumar Sethia, Rajasekhar Madala, Ajay Kumar Gowni
  • Publication number: 20250077273
    Abstract: A metaverse server comprises an edge node processor and a remote node processor. The edge node processor receives a request to perform a task comprising a first set of one or more operations and a second set of one or more operations from a client device associated with a metaverse user, executes the first set of one or more operations, sends a first notification indicating that the task is being performed to the client device, and forwards the second set of one or more operations to the remote node processor. The remote node processor receives the second set of one or more operations, executes each of the second set of one or more operations when conditions for executing the operation are satisfied, and sends a second notification indicating that the task has been completed to the client device upon completion of the second set of one or more operations.
    Type: Application
    Filed: August 31, 2023
    Publication date: March 6, 2025
    Inventors: Ngoc Tran, Maneesh Kumar Sethia, Sandeep Kumar Chauhan, Saurabh Arora
  • Publication number: 20250080557
    Abstract: A device, during a first interaction in real time, accesses from optical cells a measurement of optical emissions generated by hardware components inside the device responsive to a data card interacting with the device, generates a first optical emission pattern based on the measurement, determines whether the first optical emission pattern matches a baseline optical emission pattern, upon determining a match, determines whether the data card is associated with prohibited interactions, upon determining the first data card is not associated with prohibited transactions, determines whether the device is connected to a malicious IP address, upon determining the device is not connected to a malicious IP address, approves the first interaction. The device declines the first interaction if the first optical emission pattern does not match the baseline optical emission pattern, the first data card is associated with prohibited interactions, or the device is connected to a malicious IP address.
    Type: Application
    Filed: September 1, 2023
    Publication date: March 6, 2025
    Inventors: Shahadat Hossain Mazumder, Maneesh Kumar Sethia, Abhijit Behera
  • Publication number: 20250077626
    Abstract: A system for two-way projection of information and contactless communication of a data item includes a memory and a processor coupled to the memory. The processor initiates a virtual session for an interaction between an entity owner and a user relating to a set of objects and generates a non-fungible token for the virtual session. The processor tracks current information associated with the set of objects and simultaneously project the current information to a first virtual device of the entity owner and a second virtual device of the user. The processor receives, via the second virtual device of the user, a selection of one or more objects and a data item with respect to the selected objects. The processor communicates the data item and the generated non-fungible token for fulfillment of the selected objects to the user. The data item is communicated without requiring explicit contact by the user.
    Type: Application
    Filed: September 6, 2023
    Publication date: March 6, 2025
    Inventors: Yingcai Peng, Maneesh Kumar Sethia, Abhijit Behera, Ankit Kumar Sahoo
  • Publication number: 20250077628
    Abstract: The disclosure provides a method that includes presenting a simulated user device in a virtual environment, and receiving user credentials in response to an avatar interacting with the simulated user device. The method includes comparing the user credentials to known user credentials. The method includes determining that the avatar is associated with the user based on the comparison. The method includes identifying a first prior interaction from a data log of interactions, where the first prior interaction is associated with a first digital item token, and identifying a second prior interaction from the data log of interactions, where the second prior interaction is associated with a second digital item token. The method includes retrieving the first digital item token and the second digital item token, and presenting the first digital item token and the second digital item token on the simulated user device.
    Type: Application
    Filed: August 31, 2023
    Publication date: March 6, 2025
    Inventors: Shahadat Hossain Mazumder, Maneesh Kumar Sethia, Abhijit Behera, Sivashalini Sivajothi
  • Publication number: 20250068772
    Abstract: A system that includes a memory and a processor that determines whether to authorize an action. The processor receives a plurality of authorization messages that are requests for authorizing actions. The processor then extracts data from the plurality of authorization messages and analyzes the data with a trained neural network to group the plurality of authorization messages. The resulting plurality of message groupings are then analyzed by a long-short-term-memory algorithm (LSTM) to determine a plurality of patterns that indicate that a particular authorization message may be authorized. The processor then receives one or more new authorization messages from an external device and compares these to the plurality of patterns. If the one or more new authorization messages correspond to any of the patterns, then the external device is notified by the processor that it should deny the action associated with the new authorization messages.
    Type: Application
    Filed: August 25, 2023
    Publication date: February 27, 2025
    Inventors: Ngoc Tran, Maneesh Kumar Sethia, Saurabh Garg
  • Publication number: 20250061577
    Abstract: Computer vision systems and methods for end-to end training of neural networks are provided. The system generates a fixed point algorithm for dual-decomposition of a maximum-a-posteriori inference problem and trains the convolutional neural network and a conditional random field with the fixed point algorithm and a plurality of images of a dataset to learn to perform semantic image segmentation. The system can segment an attribute of an image of the dataset by the trained neural network and the conditional random field.
    Type: Application
    Filed: October 1, 2024
    Publication date: February 20, 2025
    Applicant: Insurance Services Office, Inc.
    Inventors: Shaofei Wang, Vishnu Sai Rao Suresh Lokhande, Maneesh Kumar Singh, Konrad Kording, Julian Yarkony
  • Publication number: 20250054203
    Abstract: Computer vision systems and methods for object detection with reinforcement learning are provided. The system includes a reinforcement learning agent configured to detect an object pertaining to a target object class and a plurality of objects pertaining to different target object classes, such that the reinforcement learning agent determines a bounding box for each of the detected of objects. The system first sets parameters of the reinforcement learning agent. The system then detects an object and/or objects in an image based on the set parameters. Finally, the system determines a bounding box and/or bounding boxes for each of the detected objects.
    Type: Application
    Filed: August 20, 2024
    Publication date: February 13, 2025
    Applicant: Insurance Services Office, Inc.
    Inventors: Maneesh Kumar Singh, Sina Ditzel
  • Publication number: 20250045748
    Abstract: An apparatus is provided, including a transaction card, having: a first microprocessor configured to exchange transaction data; a sensor configured to detect movement; and a second microprocessor in communication with the sensor. The second microprocessor may be configured to store arrays of hash values, representing a movement of a user and a card; obtain hash values based on observed movement patterns, and compare them to the stored values. Upon receiving a transaction request, the microprocessor may determine in real time whether the user is in locomotion and whether the card is being intentionally tapped by the user, based on the observed movement patterns. On this basis, the second microprocessor may determine whether to require an augmented authentication for the requested transaction.
    Type: Application
    Filed: August 3, 2023
    Publication date: February 6, 2025
    Inventors: Sandeep Kumar Chauhan, Ngoc Tran, Maneesh Kumar Sethia, Saurabh Arora
  • Publication number: 20250036388
    Abstract: A method includes receiving a request. The request is encrypted to generate an encrypted request. The encrypted request includes a version information for a first software package deployed in a standalone computing system, and a region information and a hardware information for the standalone computing system. The encrypted request is sent to a respective regional data center of a cloud computing system based on the region information of the first software package. A second software package is identified among software packages stored in the respective regional data center. The second software package corresponds to the hardware information of the first software package. The version information of the first software package is compared to a version information of the second software package. In response to identifying that the second software package is more recent than the first software package, the second software package is deployed to the standalone computing system.
    Type: Application
    Filed: July 28, 2023
    Publication date: January 30, 2025
    Inventors: Ngoc Anh Tran, Yaksh Kumar Singh, Maneesh Kumar Sethia, Amit Mishra, Pavan Kumar Kanamarlapudi, Saurabh Garg, Abhijit Behera
  • Publication number: 20250022683
    Abstract: Bias supplies and plasma processing systems are disclosed. One bias supply comprises an output node, a return node, and a switch network and at least one power supply coupled to the output node and the return node. The switch network and the at least one power supply configured, in combination, to apply an asymmetric periodic voltage waveform and provide a corresponding current waveform at the output node relative to the return node. A timing parameter estimator receives a digital representation of a full cycle of the voltage and current waveforms, and generates a pulse width control signal based on a crossing time that the current waveform crosses a threshold current value after falling from a positive peak current value to control the switch network.
    Type: Application
    Filed: June 13, 2024
    Publication date: January 16, 2025
    Inventors: Maneesh Kumar Singh, Hien Minh Nguyen
  • Publication number: 20250016163
    Abstract: An apparatus comprises a memory communicatively coupled to a processor. The memory is configured to store network interchange parameters and user profiles. The processor is configured to receive a data exchange request triggered by a user device. Further, the processor is configured to request, to a decentralized network, a token indicating that a user profile associated with the user device is entitled to access an entitlement, determine whether a data exchange network is available to exchange data in accordance with the network interchange parameters, identify a second data exchange network that is available in accordance with second network interchange parameters in response to determine that the data exchange network is unavailable, and request a data exchange output from the second data exchange network via the token. The processor is configured to receive the data exchange output from the second data exchange network.
    Type: Application
    Filed: July 7, 2023
    Publication date: January 9, 2025
    Inventors: Saurabh Garg, Maneesh Kumar Sethia, Sandeep Kumar Chauhan, Saurabh Arora, Prakash Thatipamula
  • Publication number: 20240403851
    Abstract: A color-changing smart card may be provided. The smart card may include a first layer encasing at least a front of the smart card. The smart card may include a smart chip on the front of the smart card. The smart chip may be configured for transmitting and receiving electronic communications to and from a point of sale (“POS”) device. The smart card may include microcapsules residing on a second layer of the smart card. When the microcapsules are in a rest state the first layer may have a first color. When the microcapsules are in an active state the first layer may have a second color. The microcapsules may be triggered to change the color in response to the smart chip receiving an electronic communication of a status of a transaction initiated by the smart card at the POS device.
    Type: Application
    Filed: May 30, 2023
    Publication date: December 5, 2024
    Inventors: Abhijit Behera, Maneesh Kumar Sethia, Nandini Rathaur, Sandeep Kumar Chauhan, Shailendra Singh, Gowri Sundar Suriyanarayanan
  • Publication number: 20240404374
    Abstract: Aspects of the disclosure relate to reimaging an ATM using an extended reality interface and machine learning models that are configured to reimage the ATM. A computing system may send a request for authorization to access an ATM. Based on the request being granted the ATM may be accessed via an extended reality interface. Reimaging the ATM may be based on inputting ATM data associated with a state of the ATM into machine learning models that are configured to generate instructions to reimage the ATM and then execute threads based on processes that were determined based on the instructions. The threads may be executed in a RAM of the ATM in accordance with machine learning model determined priorities of the threads.
    Type: Application
    Filed: July 3, 2024
    Publication date: December 5, 2024
    Inventors: Saurabh Garg, Maneesh Kumar Sethia, Shailendra Singh
  • Patent number: 12160346
    Abstract: A system for reestablishing network connectivity for particular network equipment in a failed network zone comprises a processor associated with a server. The processor receives a flag that identifies the failed network zone including particular network equipment that have lost network connectivity in a network. The processor generates a first non-fungible token using the configuration information associated with each of the particular network equipment. The processor determines routing information based at least in part upon the configuration information and a network topology. The processor generates a second non-fungible token based at least in part upon the routing information. The processor aggregates the first non-fungible token and the second non-fungible token to generate a primary non-fungible token. The processor reestablishes network connectivity for at least a portion of the particular network equipment based at least in part upon information associated with the primary non-fungible token.
    Type: Grant
    Filed: May 18, 2023
    Date of Patent: December 3, 2024
    Assignee: Bank of America Corporation
    Inventors: Ngoc Tran, Saurabh Garg, Maneesh Kumar Sethia
  • Patent number: 12159516
    Abstract: A computing chip may comprise a memory that stores a machine-learning model. an optical absorption spectroscopy component, and one or more processors operably coupled to the memory and the optical absorption spectroscopy component. The one or more processors may cause the optical absorption spectroscopy component to emit radiation to N pre-determined directions within an internal space of a computing device. The one or more processors may cause the optical absorption spectroscopy component to sample an absorption of reflections of the emitted radiation for each of the N pre-determined directions. The one or more processors may determine that one or more hardware components of the computing device are in particular abnormal conditions by processing the N sampled absorptions with the machine-learning model. The one or more processors may send a notification indicating that the one or more hardware components are in the particular abnormal conditions.
    Type: Grant
    Filed: September 5, 2023
    Date of Patent: December 3, 2024
    Assignee: Bank of America Corporation
    Inventors: Shahadat Hossain Mazumder, Maneesh Kumar Sethia, Abhijit Behera
  • Publication number: 20240388504
    Abstract: A system for reestablishing network connectivity for particular network equipment in a failed network zone comprises a processor associated with a server. The processor receives a flag that identifies the failed network zone including particular network equipment that have lost network connectivity in a network. The processor generates a first non-fungible token using the configuration information associated with each of the particular network equipment. The processor determines routing information based at least in part upon the configuration information and a network topology. The processor generates a second non-fungible token based at least in part upon the routing information. The processor aggregates the first non-fungible token and the second non-fungible token to generate a primary non-fungible token. The processor reestablishes network connectivity for at least a portion of the particular network equipment based at least in part upon information associated with the primary non-fungible token.
    Type: Application
    Filed: May 18, 2023
    Publication date: November 21, 2024
    Inventors: NGOC TRAN, SAURABH GARG, MANEESH KUMAR SETHIA
  • Patent number: D1062474
    Type: Grant
    Filed: January 12, 2022
    Date of Patent: February 18, 2025
    Assignee: Colgate-Palmolive Company
    Inventors: Maneesh Kumar, Devesh Badola, Swapnil Raut