Patents by Inventor Neha Trehan

Neha Trehan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240177160
    Abstract: A scalable influence concentration community detection apparatus comprising an optical quantum computing device capable of nomogram analysis to provide detection of a fraudster community. A consent mechanism for sourcing consent & data from social media websites may be implemented through oscillation cryptography. Community detection may be used to determine influence concentration for each customer of the organization's customer base through the data collated by a central organization, various financial institutions, and/or social media websites. An optical quantum computing based nomogram is used to detect a community profile for relationships between users. A consent method to source data from social websites may leverage photonic waves superimposition with another security mechanism.
    Type: Application
    Filed: November 29, 2022
    Publication date: May 30, 2024
    Inventors: Pranav Kaul, Jasmeet Kaur Bhogal, Prashant Khare, Neha Trehan
  • Publication number: 20230412621
    Abstract: A system communicates a request to a plurality of network nodes to provide user information associated with a document. The system receives a plurality of log files that comprises data communications among the network nodes and responses to the request. The system determines a first number of network nodes that are associated with a first anomaly from the plurality of log files. The system determines a second number of network nodes that are associated with a second anomaly from the plurality of log files. The system determines the number of malicious network nodes by combining the first number and the second number of network nodes. If the system determines that the number of malicious network nodes exceeds a threshold percentage, it assigns one or more network nodes to store the user information until the number of malicious network nodes is less than the threshold percentage.
    Type: Application
    Filed: June 16, 2022
    Publication date: December 21, 2023
    Inventors: Prashant Khare, Pranav Kaul, Maisnam Ricky, Neha Trehan
  • Publication number: 20230409737
    Abstract: A system accesses a scan of a document that shows first user information. The system extracts the first user information from the scan of the document. The system identifies an entity associated with the document, where an identifier associated with the entity is shown on the scan of the document. The system communicates a request to provide second user information to a computing device associated with the entity. The system receives a response comprising the second user information and compares each component in the first user information with a counterpart component in the second user information. The determines whether the document is valid based on the comparison between the first user information and the second user information.
    Type: Application
    Filed: June 16, 2022
    Publication date: December 21, 2023
    Inventors: Prashant Khare, Pranav Kaul, Maisnam Ricky, Neha Trehan