Patents by Inventor Orin Del Vecchio

Orin Del Vecchio has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170124557
    Abstract: A message processing server includes a message processor, a network interface, and a memory storing a token database of multi-layer tokens. Each token in the database includes a plurality of encrypted data layers. The message processor receives, via the network interface, at least one authorization message that identifies one of the tokens, derives a first decrypted data layer from the first encrypted data layer of the token, and extracts from the first decrypted data layer a second pointer to a secondary database that stores a predetermined data value. The message processor excises the predetermined data value from the secondary database.
    Type: Application
    Filed: October 5, 2016
    Publication date: May 4, 2017
    Inventors: Avinash Malliah, Roisin F. Fritz, Jonathan K. Barnett, John Jong Suk Lee, Paul Mon-Wah Chan, Orin Del Vecchio
  • Publication number: 20170124558
    Abstract: A message processing server includes a message processor and a database of multi-layer tokens. Each token in the database includes a plurality of encrypted data layers. The first layer includes a first data pointer. A primary layer includes the first layer and identifies a reference data value. The message processor receives from a communications device an authentication request identifying a first data value, validates the authentication request from the first data value and the reference data value configured in one of the multi-layer tokens, receives a first authorization message including a first cryptographic key, derives a first decrypted data layer from the first cryptographic key and the first encrypted data layer of the one multi-layer token, and validates the first data pointer by receiving confirmation of the first data pointer pointing to a database entry comprising a second data value less than the reference data value.
    Type: Application
    Filed: October 6, 2016
    Publication date: May 4, 2017
    Inventors: Matthew Randolph Molnar, Jonathan K. BARNETT, John Jong Suk LEE, Paul Mon-Wah CHAN, Orin DEL VECCHIO
  • Publication number: 20170076408
    Abstract: The present disclosure involves systems and computer implemented methods for performing a connected device-based property evaluation. In one example, operations include identifying a property associated with an initial price and collecting information about the property by receiving information from one or more connected devices associated with the property. The one or more connected devices can each have a sensor for monitoring a condition within the property, and can providing information about the condition to the connected device, where the information is associated with a current status of the identified property. At least one action to be performed at the property based on the collected information is determined, with each action corresponding to an element at the property. An aggregate set of cost information associated with each determined action is determined and combined with the initial price to determine a modified purchase price. The modified price is then presented.
    Type: Application
    Filed: September 14, 2016
    Publication date: March 16, 2017
    Inventors: Roy D'Souza, Roisin Lara Fritz, Jonathan K. Barnett, Paul Mon-Wah Chan, John Jong-Suk Lee, Orin Del Vecchio
  • Publication number: 20170053245
    Abstract: The present disclosure involves systems and computer implemented methods for generating a virtual or augmented reality-based oversight system of business processes at a location remote from where the business process is executed. In one example, system operations include identifying a process-based operation performed at a physical first location, where the operation is associated with a request for oversight from a remote second location. A current state of the operation at the first location is identified, and at least one input source at the first location is identified. A simulation of the current state of the operation at the first location incorporating input from the input source(s) is generated for presentation at the second location. An action performed at the first location in the current state of the operation is identified, and the second location is then transmitted a request to authorize the identified action.
    Type: Application
    Filed: August 11, 2016
    Publication date: February 23, 2017
    Inventors: Christianne Moretti, James Zachary Pryor, Matthew Hamilton, Jonathan K. Barnett, Paul Mon-Wah Chan, Orin Del Vecchio, John Barbon, John Jong-Suk Lee
  • Publication number: 20170054735
    Abstract: The present disclosure involves systems and computer implemented methods for generating a virtual or augmented reality-based oversight system of business processes at a location remote from where the business process is executed. In one example, system operations include identifying a process-based operation performed at a physical first location, where the operation is associated with a request for oversight from a remote second location. A current state of the operation at the first location is identified, and at least one input source at the first location is identified. A simulation of the current state of the operation at the first location incorporating input from the input source(s) is generated for presentation at the second location. An action performed at the first location in the current state of the operation is identified, and the second location is then transmitted a request to authorize the identified action.
    Type: Application
    Filed: October 19, 2016
    Publication date: February 23, 2017
    Inventors: Christianne Moretti, James Zachary Pryor, Matthew Hamilton, Jonathan K. Barnett, Paul Mon-Wah Chan, Orin Del Vecchio, John Barbon, John Jong-Suk Lee
  • Publication number: 20170046652
    Abstract: The disclosed embodiments include computerized systems and methods for generating secured blockchain-based ledger data structures that track an ownership and usage of one or more assets, such as Internet-connected devices. In one instance, an apparatus associated with a rules authority of the secured blockchain-based ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule, including a determination of metrics indicative of a care, risk, and/or valuation of one or more of the Internet-connected devices, and additionally or alternatively, a modification of an operational or communicative functionality of the Internet-connected devices.
    Type: Application
    Filed: November 9, 2015
    Publication date: February 16, 2017
    Inventors: Perry HALDENBY, Rajan Mahadevan, John Jong Suk Lee, Paul Mon-Wah Chan, Orin Del Vecchio
  • Publication number: 20170046664
    Abstract: The disclosed embodiments include computerized systems and methods that generate secured blockchain-based ledger structures that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a centralized authority of the secured blockchain-based ledger may detect an occurrence of an event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule and involving at least one of assets tracked within the secured blockchain-based ledger or an owner of a portion of the tracked assets. By way of example, the detected event may triggering a sale, transfer, and/or re-allocation of an ownership interest in a tracked asset, and the identified rule may specify a distribution of proceeds derived from the sale, transfer, and/or re-allocation.
    Type: Application
    Filed: November 10, 2015
    Publication date: February 16, 2017
    Inventors: Perry HALDENBY, Rajan MAHADEVAN, John Jong Suk LEE, Paul Mon-Wah CHAN, Orin DEL VECCHIO
  • Publication number: 20170046792
    Abstract: The disclosed embodiments include computerized systems and methods for generating secured block-chain-based ledger data structures that track subdivide ownership and usage of one or more assets, such as Internet-connected devices. In one instance, an apparatus associated with a rules authority of the secured block-chain-based ledger may detect an occurrence of a triggering event related to at least one of partial ownership interests in the assets, and may access and decrypt a set of rules hashed into the secured block-chain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule, including a generation of additional data blocks reflecting a change in at least one of the partial ownership interests, and additionally or alternatively, processes that adaptively monitor a compliance of one or more partial owners with an Imposed usage restriction.
    Type: Application
    Filed: November 3, 2015
    Publication date: February 16, 2017
    Inventors: Perry HALDENBY, Rajan MAHADEVAN, John Jong Suk LEE, Paul Mon-Wah CHAN, Orin DEL VECCHIO
  • Publication number: 20170046651
    Abstract: The disclosed embodiments include computerized systems and methods for generating secured blockchain-based ledger data structures that track occurrences of events across fragmented and geographically dispersed lines-of-business of an enterprise. In one instance, an apparatus associated with a rules authority of the secured blockchain-based ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule, including a disbursement of various rewards to employees in response to customer-specific interactions with the enterprise. The disclosed embodiments provide a rules process for aggregating mutually incompatible enterprise data that specifies the events, and for tracking the events in uniform data structures accessible across the enterprise.
    Type: Application
    Filed: October 30, 2015
    Publication date: February 16, 2017
    Inventors: Jenny LIN, Perry Haldenby, John Jong Suk Lee, Paul Mon-Wah Chan, Orin Del Vecchio
  • Publication number: 20170046693
    Abstract: The disclosed embodiments include computerized systems and methods that generate secured blockchain-based ledger structures that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a centralized authority of the secured blockchain-based ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule. In some aspects, the detected event may correspond to a dispute involving one or more terms or conditions of a contractual agreement between a first party and one or more second parties, and the performed operations may resolve the dispute.
    Type: Application
    Filed: November 10, 2015
    Publication date: February 16, 2017
    Inventors: Perry Haldenby, Rajan Mahadevan, John Jong Suk Lee, Paul Mon-Wah Chan, Orin Del Vecchio
  • Publication number: 20170046698
    Abstract: The disclosed embodiments include computerized systems and methods that generate secured blockchain-based ledger structures that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a rules authority of the secured blockchain-based ledger may obtain data indicative of an initiated transfer of funds between parties, and may access and decrypt a set of restrictions imposed on the initiated transfer and a set of rules associated with the restrictions, which may hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may determine that the initiated transfer violates at least one of the restrictions, and may perform operations consistent with at least one of the rules associated with the at least one violated restriction.
    Type: Application
    Filed: November 9, 2015
    Publication date: February 16, 2017
    Inventors: Perry HALDENBY, Rajan MAHADEVAN, John Jong Suk LEE, Paul Mon-Wah CHAN, Orin DEL VECCHIO
  • Publication number: 20170039608
    Abstract: The disclosed embodiments include computerized methods and systems that facilitate automate trade-order entry and execution based on social media messaging. In one embodiment, an apparatus may receive, from a social-networking service, social media data that includes various social media messages associated with social-networking accounts of various users. The apparatus may detect an occurrence of a predetermined element of content within a first social media message associated with a social networking account of a first user, and may extract data identifying at least one parameter of an action from the first social media message. The apparatus may generate proposed transaction parameters that include the at least one extracted action parameter, and in response to a confirmation of the proposed transaction parameters, the apparatus may generate one or more electronic commands to initiate a performance of the action in accordance with the confirmed transaction parameters.
    Type: Application
    Filed: August 4, 2016
    Publication date: February 9, 2017
    Inventors: Bruno Sandre, Matthew Hamilton, Jonathan K. Barnett, Paul Mon-Wah Chan, John Jong Suk Lee, Orin Del Vecchio
  • Publication number: 20170039645
    Abstract: The disclosed embodiments include computerized methods and systems that facilitate automate trade-order entry and execution based on social media messaging. In an embodiment, an apparatus identifies a first social media message associated with a social networking account of a user and including at least one parameter of a transaction to purchase or sell one or more securities. The apparatus may generate proposed transaction parameters that include the at least one transaction parameter included in the first social media message, and may obtain information confirming the proposed transaction parameters from the user. In response to the confirmation, the apparatus may generate one or more electronic commands to initiate the transaction to purchase or sell the one or more securities in accordance with the confirmed transaction parameters.
    Type: Application
    Filed: October 2, 2015
    Publication date: February 9, 2017
    Inventors: Bruno SANDRE, Matthew HAMILTON, Jonathan K. BARNETI, Paul Mon-Wah CHAN, John Jong Suk LEE, Orin DEL VECCHIO
  • Publication number: 20170039652
    Abstract: The disclosed embodiments include computerized methods and systems that automatically verify an identity of a user based on social media messaging. In an embodiment, an apparatus identifies a first social media message associated with a social networking account of a user and generated by a device of the user. The apparatus may generate may extract authentication data from the first social media message, and may verify an identity of the user based on a correspondence between the extracted authentication data and at least a portion of stored user profile. In response to the verification, the apparatus may generate one or more electronic commands to initiate an action involving one or more securities.
    Type: Application
    Filed: October 2, 2015
    Publication date: February 9, 2017
    Inventors: Bruno SANDRE, Matthew HAMILTON, Jonathan K. BARNETT, Paul Mon-Wah CHAN, John Jong Suk LEE, Orin DEL VECCHIO
  • Publication number: 20170031952
    Abstract: A method for identifying a property for purchase by an image processing system, comprising: receiving one or more images from a user device, wherein the one or more images are images of properties, and wherein the user device one or more of captures, selects, and stores the one or more images; identifying one or more property attributes within the one or more images; generating image data, the image data including the one or more images and the one or more property attributes; extracting user preference information directly from the image data, the user preference information including one or more preferred aesthetic property attributes; searching an available property database using the user preference information; receiving available property information from the available property database that matches the user preference information, the available property information including information relating to one or more properties that are available for purchase; and, presenting the available property informatio
    Type: Application
    Filed: October 30, 2015
    Publication date: February 2, 2017
    Inventors: ROY D'SOUZA, NICOLA BROWNE, ROISIN LARA FRITZ, JONATHAN K. BARNETT, JOHN JONG SUK LEE, PAUL MON-WAH CHAN, ORIN DEL VECCHIO
  • Publication number: 20170032481
    Abstract: A method for identifying a property for purchase by an image processing system, comprising: receiving one or more images from a user device, wherein the one or more images are images of properties with additional matter, wherein the user device captures and stores the one or more images, and wherein the additional matter is indicative of one or more of user demographic, lifestyle, and behaviour; identifying one or more property attributes and one or more contextual attributes within the one or more images, wherein the one or more property attributes provide information pertaining to the properties in isolation from the additional matter, and wherein the one or more contextual attributes provide information pertaining to the additional matter; generating image data, the image data including the one or more images, the one or more property attributes, and the one or more contextual attributes; extracting user preference information directly from the image data, the user preference information including one or m
    Type: Application
    Filed: October 30, 2015
    Publication date: February 2, 2017
    Inventors: ROY D'SOUZA, NICOLA BROWNE, ROISIN LARA FRITZ, JONATHAN K. BARNETT, JOHN JONG SUK LEE, PAUL MON-WAH CHAN, ORIN DEL VECCHIO
  • Publication number: 20160132670
    Abstract: The disclosed embodiments include computerized methods and systems that facilitate two-factor authentication of a user based on a user-defined image and information identifying portions of the image sequentially selected by the user. In one aspect, a communications device presents a first digital image of a first user on a touchscreen display. The communications device may receive, from the first user, information identifying portions of the first digital image selected in accordance with a candidate authentication sequence established by the first user. The selected first image portions may, for example, be associated with corresponding facial features of the first user. The communications device may determine whether the candidate authentication sequence matches a reference authentication sequence associated with the first digital image, and may authenticate an identity of the first user, when the first selection sequence is determined to match the second selection sequence.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 12, 2016
    Inventors: Hisham I. SALAMA, Paul Mon-Wah CHAN, Dino D'AGOSTINO, Orin DEL VECCHIO
  • Publication number: 20160027009
    Abstract: The disclosed embodiments include methods and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.
    Type: Application
    Filed: June 23, 2015
    Publication date: January 28, 2016
    Inventors: Prabaharan SIVASHANMUGAM, Lauren VAN HEERDEN, Michael D. CUMMINS, Orin DEL VECCHIO, Gunalan NADARAJAH, Edward LOUNSBURY, Paul Mon-Wah CHAN, Jonathan K. BARNETT, Ashraf METWALLI, Jakub DANIELAK
  • Publication number: 20160028715
    Abstract: The disclosed embodiments include methods, systems, system terminals, and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction.
    Type: Application
    Filed: June 23, 2015
    Publication date: January 28, 2016
    Inventors: Prabaharan SIVASHANMUGAM, Lauren VAN HEERDEN, Michael D. CUMMINS, Orin DEL VECCHIO, Gunalan NADARAJAH, Edward LOUNSBURY, Paul Mon-Wah CHAN, Jonathan K. BARNETT, Ashraf METWALLI, Jakub DANIELAK
  • Publication number: 20160019640
    Abstract: A method and system for recommending a physical location at which to complete an electronic activity are disclosed. In some examples, initiation of the electronic activity by a user at a first physical location is detected, that the electronic activity is to be completed at a physical location different from the first physical location is determined, one or more portions of the electronic activity that remain incomplete are determined, a second physical location at which to complete the one or more incomplete portions of the electronic activity is identified, and information about the electronic activity is provided to the second physical location. In some examples, the identification of the second physical location is based on at least characteristics of the electronic activity, the user, and/or the second physical location.
    Type: Application
    Filed: July 17, 2015
    Publication date: January 21, 2016
    Applicant: THE TORONTO-DOMINION BANK
    Inventors: Jonathan K. BARNETT, Lauren VAN HEERDEN, Orin DEL VECCHIO, Gunalan NADARAJAH, John BARBON, Paul Mon-Wah CHAN, Jakub DANIELAK, Christianne MORETTI, Matthew HAMILTON