Patents by Inventor Tyler Maiman

Tyler Maiman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220414652
    Abstract: Aspects discussed herein may relate to techniques for authenticating a user using transaction-based authentication questions. Hold transactions conducted using a financial account may be identified and verified. The hold transactions may be transactions that do not post to the financial account, and therefore are not provided on any financial account statement. The transaction-based authentication questions may be generated based on the identified and verified hold transactions. The user may be authenticated based on responses by the user to the transaction-based authentication questions. Malicious actors that gain access to financial account statements are unlikely to answer the transaction-based authentication questions correctly as they are based on financial transaction data that is not provided on the financial account statements.
    Type: Application
    Filed: June 23, 2021
    Publication date: December 29, 2022
    Inventors: Joshua Edwards, David Septimus, Jenny Melendez, Samuel Rapowitz, Viraj Chaudhary, Daniel Miller, Tyler Maiman
  • Publication number: 20220417238
    Abstract: Methods, systems, and apparatuses are described herein for improving the security of personal information by preventing attempts at gleaning personal information from authentication questions. A computing device may receive a request for access to an account associated with a user. The request may comprise candidate authentication information. Based on comparing the candidate authentication information with the account data, the computing device may generate a synthetic authentication question. The synthetic authentication question may be generated as if the candidate authentication information is valid. A response to the synthetic authentication question may be received, and the request for access to the account may be denied.
    Type: Application
    Filed: June 29, 2021
    Publication date: December 29, 2022
    Inventors: Tyler Maiman, Viraj Chaudhary, Samuel Rapowitz, Daniel Miller, David Septimus, Joshua Edwards
  • Publication number: 20220414190
    Abstract: Aspects described herein may relate to techniques for detecting login activity to a financial account during a knowledge-based authentication process. The login activity may be related to access to an online interface for the financial account. The detection of login activity during the authentication process my indicate that the integrity of the authentication process is compromised as login access may provide an individual with transaction data that may be used to answer transaction-based authentication questions. As a result of detecting login activity, an alternative authentication process may be initiated or an authentication request related to the financial account may be denied.
    Type: Application
    Filed: June 23, 2021
    Publication date: December 29, 2022
    Inventors: Joshua Edwards, Samuel Rapowitz, Jenny Melendez, David Septimus, Daniel Miller, Viraj Chaudhary, Tyler Maiman, Vyjayanthi Vadrevu
  • Publication number: 20220405360
    Abstract: Methods, systems, and apparatuses are described herein for improving computer authentication processes using vocal confidence processing. A request for access to an account may be received. An authentication question may be provided to a user. Voice data indicating one or more vocal utterances by the user in response to the authentication question may be received. The voice data may be processed, and a first confidence score that indicates a degree of confidence of the user when answering the authentication question may be determined. An overall confidence score may be modified based on the first confidence score. Based on determining that the overall confidence score satisfies a threshold, data preventing the authentication question from being used in future authentication processes may be stored. The data may be removed when a time period expires.
    Type: Application
    Filed: June 16, 2021
    Publication date: December 22, 2022
    Inventors: Joshua Edwards, Tyler Maiman, David Septimus, Daniel Miller, Viraj Chaudhary, Samuel Rapowitz
  • Publication number: 20220407893
    Abstract: A security system for a network may be configured to detect one or more failed authentication attempts to access the network by at least one user device and determine the number of the failed authentication attempts. The system may determine a first risk score based on the number of failed authentication attempts and determine whether the first risk score is greater than or equal to a first risk score threshold and generate a first notification indicating that the user device is attempting to gain unauthorized access onto the network. The system may transmit the first notification to an administrator of the network, determine the user device is successfully authenticated to access the network after the number of failed authentication attempts has been detected, and apply a first set of network activity restrictions to the user device.
    Type: Application
    Filed: June 18, 2021
    Publication date: December 22, 2022
    Inventors: Tyler MAIMAN, Abdelkader BENKREIRA, Brendan WAY
  • Publication number: 20220404156
    Abstract: In some implementations, a system may identify, using a machine learning model, a pattern of events based on account information associated with a user. The system may generate a prediction of a time period during which a predicted event, associated with the pattern of events, is predicted to occur. The system may receive an indication that a vehicle, associated with the user, is to travel a route from a starting location to an ending location during the time period. The system may identify a physical location associated with the predicted event based on a location associated with the vehicle or based on the route. The system may generate a new route that includes the starting location, the physical location as a waypoint along the new route, and the ending location. The system may transmit information that identifies the new route to a device associated with the vehicle.
    Type: Application
    Filed: June 22, 2021
    Publication date: December 22, 2022
    Inventors: Lin Ni Lisa CHENG, Kathryn TIKOIAN, Tyler MAIMAN
  • Publication number: 20220407847
    Abstract: Methods, systems, and apparatuses are described herein for improving computer authentication processes through the generation of synthetic merchants. A plurality of different real merchant names may be received. The plurality of different real merchant names may be processed to determine one or more name elements. A request for access to an account associated with a user may be received. Based on the one or more name elements, one or more synthetic merchant names may be generated. Based on the one or more synthetic merchant names, synthetic transaction data may then be generated. A synthetic authentication question may be generated and presented to a user. A candidate response to the synthetic authentication question may be received. Based on the candidate response, access to the account may be provided.
    Type: Application
    Filed: June 22, 2021
    Publication date: December 22, 2022
    Inventors: Joshua Edwards, Jenny Melendez, Tyler Maiman, David Septimus, Viraj Chaudhary, Samuel Rapowitz, Daniel Miller
  • Publication number: 20220400172
    Abstract: Methods and systems are described herein for manipulating a communication acceptance screen, manipulating an interactive communication acceptance icon, and restricting access to accounts based on voice communication parameters. In particular, when a communication is detected from one device to another device, that communication may be risky. Thus, the risk is mitigated by giving a user information about the source of the communication to give a user a chance to reject the communication. In addition, in instances where the user accepts the communication, the system enables monitoring the communication and restricting any accounts that are disclosed within the communication.
    Type: Application
    Filed: August 17, 2022
    Publication date: December 15, 2022
    Applicant: Capital One Services, LLC
    Inventors: Asher SMITH-ROSE, Tyler MAIMAN, Lin Ni Lisa CHENG, Salik SHAH
  • Publication number: 20220394120
    Abstract: Methods and systems are described herein for manipulating a communication acceptance screen, manipulating an interactive communication acceptance icon, and restricting access to accounts based on voice communication parameters. In particular, when a communication is detected from one device to another device, that communication may be risky. Thus, the risk is mitigated by giving a user information about the source of the communication to give a user a chance to reject the communication. In addition, in instances where the user accepts the communication, the system enables monitoring the communication and restricting any accounts that are disclosed within the communication.
    Type: Application
    Filed: June 13, 2022
    Publication date: December 8, 2022
    Applicant: Capital One Services, LLC
    Inventors: Asher SMITH-ROSE, Tyler MAIMAN, Lin Ni Lisa CHENG, Salik SHAH
  • Publication number: 20220391905
    Abstract: Methods, systems, and apparatuses are described herein for improving computer authentication processes by generating authentication questions based on tipping trends. A computing device may receive a request for access to an account. Transactions data conducted by a user may be received. A tipping trend may be determined based on the one or more transactions conducted by the user. Based on the tipping trend, an authentication question may be generated. The authentication question may be provided, and a response to the authentication question may be received. A user device may be provided access to the account based on the response to the authentication question.
    Type: Application
    Filed: June 7, 2021
    Publication date: December 8, 2022
    Inventors: Joshua Edwards, Vyjayanthi Vadrevu, Daniel Miller, David Septimus, Tyler Maiman
  • Publication number: 20220383406
    Abstract: Methods, systems, and apparatuses are described herein for protecting user accounts using machine learning models. A machine learning model may be trained to determine whether account activity indicates a risk to credit scores. Account data, associated with a first financial account, may processed to determine whether the first financial account is associated with at least one underage user. A transaction request, associated with the first financial account, may be received. A history of transactions conducted by the first financial account may be retrieved. The trained machine learning model may be provided, as input, the transaction request and the history of transactions. An indication of risk to a credit score associated with the at least one underage user may be received as output from the trained machine learning model. A limitation may be added to the first financial account based on the indication of risk.
    Type: Application
    Filed: June 1, 2021
    Publication date: December 1, 2022
    Inventors: Jude Anasta, Abdelkader M'Hamed Benkreira, Tyler Maiman
  • Patent number: 11514466
    Abstract: Aspects described herein may allow for generating a customized price rating using a machine learning algorithm. This may have the effect of improving the display of information about merchants by including customized, personalized price ratings that better reflect the tastes and preferences of a user or group of users. According to some aspects, these and other benefits may be achieved by using a machine learning model, trained to receive input corresponding to both user data and merchant data and output an indication of customized price rating(s) for the merchant that is specific to one or more users, and then to generate information about the merchant for display that includes the customized price rating(s).
    Type: Grant
    Filed: July 9, 2021
    Date of Patent: November 29, 2022
    Assignee: Capital One Services, LLC
    Inventors: Tyler Maiman, Kathryn Tikoian, Phoebe Atkins
  • Publication number: 20220375271
    Abstract: Embodiments are generally directed systems, devices, methods, and techniques to detect vehicle service events in transactions, and to store the vehicle service events in a data store.
    Type: Application
    Filed: May 21, 2021
    Publication date: November 24, 2022
    Applicant: Capital One Services, LLC
    Inventors: Abdelkader M'Hamed BENKREIRA, Tyler MAIMAN, Brendan WAY
  • Publication number: 20220366354
    Abstract: An artificial intelligence (AI) system including an AI engine is configured to receive identification information entered into an interface, receive at least one location input entered into the interface, select at least one security question and present the selected at least one security question via the interface, and receive an answer to the at least one security question. The AI engine is further configured to apply a predictive model to determine a confidence score based on the identification information entered into the interface, the location input entered into the interface, and the answer to the at least one security question and, when the confidence score exceeds a confidence score threshold, provide user location information, the user location information selected from the user location information stored in a data storage. The provided user location information can be masked to conceal the user location information from display on the interface.
    Type: Application
    Filed: May 12, 2021
    Publication date: November 17, 2022
    Inventors: Tyler MAIMAN, Abdelkader BENKREIRA, Brendan WAY
  • Publication number: 20220366425
    Abstract: In some implementations, a system may receive a request to facilitate a service interaction involving a user. The system may determine, based on receiving the request, a priority factor associated with facilitating the service interaction for the user. The priority factor may be determined based on account activity information associated with a user account of the user. The system may determine, based on the priority factor and service information, a priority score associated with facilitating the service interaction. The system may select, based on the priority score, a queue location of a queue. The queue may be associated with a provider system that is configured to facilitate the service interaction. The system may perform an action associated with causing the provider system to facilitate the service interaction according to the queue location.
    Type: Application
    Filed: May 12, 2021
    Publication date: November 17, 2022
    Inventors: Jude Pierre ANASTA, Abdelkader M'Hamed BENKREIRA, Tyler MAIMAN
  • Publication number: 20220358338
    Abstract: Exemplary embodiments relate to updatable displays for transaction cards, such as credit cards or event passes. The displays may be, for instance, an electrophoretic or memory liquid crystal diode display. The transaction card may include a contact pad capable of engaging in wireless communication. Information may be exchanged between the transaction card and a mobile device or terminal, where a processor on the mobile device processes the received information to generate displayable information. The processor updates the display with the displayable information. The contact pad may be electrically connected to the display, and the display may derive electrical power to perform the updating from the wireless communication. For example, where the wireless communication is a near field communication (NFC), a radio frequency field may be generated that supplies enough power to run the processor and at least partially update the display.
    Type: Application
    Filed: May 27, 2022
    Publication date: November 10, 2022
    Applicant: Capital One Services, LLC
    Inventors: Bryant YEE, Tyler MAIMAN, Kevin OSBORN
  • Publication number: 20220360579
    Abstract: Methods, systems, and apparatuses are described herein for improving the accuracy of authentication questions using e-mail processing. A request for access to an account may be received from a user device. A plurality of organizations may be identified. One or more e-mail associated with the account may be identified. The e-mails may be processed to identify one or more organizations that correspond to transactions conducted by a user. A modified plurality of organizations may be generated by removing, from the plurality of organizations, the one or more organizations. An authentication question may be generated and provided to the user device. A response to the authentication question may be received, and the user device may be provided access based on the response.
    Type: Application
    Filed: May 7, 2021
    Publication date: November 10, 2022
    Inventors: Viraj Chaudhary, Vyjayanthi Vadrevu, Tyler Maiman, David Septimus, Samuel Rapowitz, Jenny Melendez, Joshua Edwards
  • Publication number: 20220358193
    Abstract: Methods, systems, and apparatuses are described herein for improving the accuracy of authentication questions using transaction limitations provided by users. A request for access to an account associated with a user may be received from a user device. An account restrictions database may be queried to determine one or more transaction rules associated with the account. The one or more transaction rules may have been created by the user and indicate limitations on financial transactions that may be performed via the account. An authentication question may be generated that is associated with a violation of the one or more transaction rules. The authentication question may be provided to the user device, and a response to the authentication question may be received. Access to the account may be provided to the user device based on the response.
    Type: Application
    Filed: May 7, 2021
    Publication date: November 10, 2022
    Inventors: Viraj Chaudhary, David Septimus, Jenny Melendez, Samuel Rapowitz, Tyler Maiman, Joshua Edwards
  • Publication number: 20220358205
    Abstract: Methods, systems, and apparatuses are described herein for improving the accuracy of synthetic authentication questions by analyzing third party account data. A request for access to a first account associated with a user may be received. The first account may be managed by a first organization. A transactions database might be queried for first account data. Second account data corresponding to a second account associated with the user might be received. That second account may be managed by a second organization different from the first organization. One or more second transactions, unique to the second account, may be identified. A synthetic transaction, configured to be different from transactions in the first account and the one or more second transactions, may be generated. An authentication question may be generated based on the synthetic transaction. Access to the first account might be provided based on a response to the authentication question.
    Type: Application
    Filed: May 7, 2021
    Publication date: November 10, 2022
    Inventors: Joshua Edwards, Vyjayanthi Vadrevu, Tyler Maiman, Viraj Chaudhary, Daniel Miller, David Septimus, Jenny Melendez, Samuel Rapowitz
  • Publication number: 20220345429
    Abstract: In some implementations, a device of a user may receive user input indicative of a selection of an application implemented by the device. The user input may be received via a graphical user interface presented by the device. The user input may be received while the application is in an unlaunched state in which the user is unauthenticated for use of the application. The device may obtain, while the application is in the unlaunched state, one or more messages of the application. The device may cause, while the application is in the unlaunched state, information indicative of at least one message, of the one or more messages, to be displayed in the graphical user interface.
    Type: Application
    Filed: July 11, 2022
    Publication date: October 27, 2022
    Inventors: Kathryn TIKOIAN, Joshua EDWARDS, Tyler MAIMAN