Patents by Inventor Zainab Zaki
Zainab Zaki has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11916920Abstract: A node of a network receives account access information (AAI) for an account that a user has with a system. The node causes a first record to be added to a distributed ledger that is used for managing access to the account, wherein the first record includes the AAI or an encrypted storage identifier that identifies a storage location for the AAI. The node determines a likelihood that the account is being accessed by the user based on the AAI and/or historical AAI for one or more accounts, that include the account, that are used to access the system. The node causes a second record that includes a value representing the likelihood to be added to the distributed ledger. The node causes one or more other nodes of the network to be alerted that the first record and the second record have been added to the distributed ledger.Type: GrantFiled: March 6, 2023Date of Patent: February 27, 2024Assignee: Capital One Services, LLCInventors: Zainab Zaki, Jeffrey Brown
-
Publication number: 20240028683Abstract: A computer-implemented method for executing a user instruction may include obtaining identification data of a user via a device associated with the user, wherein the identification data comprises at least a password, a user name, and biometric data of the user; determining, via the one or more processors, a login status based on the identification data; demonstrating, to the user, historical account data based on the login status, wherein the historical account data comprises at least historical biometric data associated with one or more historical logins; receiving, via the one or more processors, the user instruction based on the historical account data, wherein the user instruction comprises at least one of revoking a historical login, changing password, or signing out a historical device associated with a historical login of the one or more historical logins; and executing, via the one or more processors, the user instruction.Type: ApplicationFiled: October 2, 2023Publication date: January 25, 2024Applicant: Capital One Services, LLCInventors: Zainab ZAKI, Jackson CHEEK
-
Patent number: 11809537Abstract: A computer-implemented method for executing a user instruction may include obtaining identification data of a user via a device associated with the user, wherein the identification data comprises at least a password, a user name, and biometric data of the user; determining, via the one or more processors, a login status based on the identification data; demonstrating, to the user, historical account data based on the login status, wherein the historical account data comprises at least historical biometric data associated with one or more historical logins; receiving, via the one or more processors, the user instruction based on the historical account data, wherein the user instruction comprises at least one of revoking a historical login, changing password, or signing out a historical device associated with a historical login of the one or more historical logins; and executing, via the one or more processors, the user instruction.Type: GrantFiled: June 11, 2020Date of Patent: November 7, 2023Assignee: Capital One Services, LLCInventors: Zainab Zaki, Jackson Cheek
-
Publication number: 20230297994Abstract: Systems, apparatuses, and methods for verifying physical presence of a mobile device as part of an electronic transaction. Tags may be generated and displayed on one or more display devices. Those tags, which may be time-limited, may be read by a mobile device to verify physical presence of the mobile device as a prerequisite to initiating, continuing with, or completing an electronic transaction, and/or as a decision point in how the electronic transaction is to be conducted.Type: ApplicationFiled: May 23, 2023Publication date: September 21, 2023Inventors: Zainab Zaki, Jackson Cheek
-
Patent number: 11704657Abstract: Systems, apparatuses, and methods for verifying physical presence of a mobile device as part of an electronic transaction. Tags may be generated and displayed on one or more display devices. Those tags, which may be time-limited, may be read by a mobile device to verify physical presence of the mobile device as a prerequisite to initiating, continuing with, or completing an electronic transaction, and/or as a decision point in how the electronic transaction is to be conducted.Type: GrantFiled: July 15, 2020Date of Patent: July 18, 2023Assignee: Capital One Services, LLCInventors: Zainab Zaki, Jackson Cheek
-
Publication number: 20230208849Abstract: A node of a network receives account access information (AAI) for an account that a user has with a system. The node causes a first record to be added to a distributed ledger that is used for managing access to the account, wherein the first record includes the AAI or an encrypted storage identifier that identifies a storage location for the AAI. The node determines a likelihood that the account is being accessed by the user based on the AAI and/or historical AAI for one or more accounts, that include the account, that are used to access the system. The node causes a second record that includes a value representing the likelihood to be added to the distributed ledger. The node causes one or more other nodes of the network to be alerted that the first record and the second record have been added to the distributed ledger.Type: ApplicationFiled: March 6, 2023Publication date: June 29, 2023Inventors: Zainab ZAKI, Jeffrey BROWN
-
Patent number: 11665280Abstract: Example embodiments of systems and methods for telephone call regulation include the use of a predictive model. An example method includes receiving, by a predictive model, a telephone number from a user application comprising instructions for execution on a user device and determining, by the predictive model, a spam factor for the received telephone number. The example method further includes determining, by the predictive model, a classification of the received telephone number based on the spam factor and transmitting, by the predictive model, the classification of the received telephone number to the user application. The example method further includes receiving, by the predictive model, a feedback from the user application, the feedback indicative of a corrective classification of the received telephone number and modifying, by the predictive model, the spam factor for the received telephone number based on the corrective classification.Type: GrantFiled: December 3, 2021Date of Patent: May 30, 2023Assignee: CAPITAL ONE SERVICES, LLCInventors: Zainab Zaki, Manuel Vincente Vivo
-
Patent number: 11601437Abstract: A node of a network receives account access information (AAI) for an account that a user has with a system. The node causes a first record to be added to a distributed ledger that is used for managing access to the account, wherein the first record includes the AAI or an encrypted storage identifier that identifies a storage location for the AAI. The node determines a likelihood that the account is being accessed by the user based on the AAI and/or historical AAI for one or more accounts, that include the account, that are used to access the system. The node causes a second record that includes a value representing the likelihood to be added to the distributed ledger. The node causes one or more other nodes of the network to be alerted that the first record and the second record have been added to the distributed ledger.Type: GrantFiled: April 5, 2021Date of Patent: March 7, 2023Assignee: Capital One Services, LLCInventors: Zainab Zaki, Jeffrey Brown
-
Publication number: 20220414193Abstract: Systems and methods for adaptive verification may include a memory and a processor. The memory may be configured to store a plurality of animation templates. The processor may be configured to perform a first challenge process to request a first user image from a first predetermined distance, receive the first user image, request a second user image from a second predetermined distance, receive the second user image, transmit the first user image and the second user image for a verification process, the verification process including identification of one or more user attributes, receive a third user image associated with the one or more user attributes identified during the verification, and display the third user image including an adaptation, wherein the adaptation is generated for at least one of the plurality of animation templates, the adaptation illustrating the one or more user attributes.Type: ApplicationFiled: June 28, 2021Publication date: December 29, 2022Inventors: Laura Lee BOYKIN, Zainab ZAKI, Joanna WEBER
-
Publication number: 20220329581Abstract: Systems and methods for selectively authenticating an untrusted device based on a trust level are disclosed. The system can include transmitting an authentication request from a first device seeking to authenticate a second device to access to an account. The first device receives an authentication token that can be used by the second device for authentication. The authentication token can be transmitted wirelessly to the second device or can be scanned by the second device in the case that the token is a scannable image displayed on the first device. The systems can determine a trust level for the second device based on an association between the first device and the second device. The system can provide the second device a degree of access to the account that relates to the trust level.Type: ApplicationFiled: April 12, 2021Publication date: October 13, 2022Inventors: Zainab Zaki, Divya Gupta, Brian Choe
-
Patent number: 11296880Abstract: An exemplary system, method, and computer-accessible medium can include, for example, receiving at a first entity from a second entity, a first request for encrypted user information associated with at least one user, wherein the first request includes a user identifier associated with the at least one user, and wherein the first entity is different from the second entity, sending, from the first entity, a second request to a user device associated with the at least one user, wherein the second request includes a notification to the at least one user for an affirmation of the first request or a denial of the first request, receiving at the first entity from the user device, the affirmation or the denial, and sending, from the first entity to the second entity, (i) the encrypted user information if the affirmation is received or (ii) a denied notification if the denial is received.Type: GrantFiled: July 23, 2019Date of Patent: April 5, 2022Assignee: CAPITAL ONE SERVICES, LLCInventors: Jeffrey Wieker, Zainab Zaki, Clayton Johnson
-
Publication number: 20220094785Abstract: Example embodiments of systems and methods for telephone call regulation are provided. An example method includes receiving, by a predictive model, a telephone number from a user application comprising instructions for execution on a user device; determining, by the predictive model, a spam factor for the received telephone number; determining, by the predictive model, a classification of the received telephone number based on the spam factor; transmitting, by the predictive model, the classification of the received telephone number to the user application; receiving, by the predictive model, a feedback from the user application, the feedback indicative of a corrective classification of the received telephone number; and modifying, by the predictive model, the spam factor for the received telephone number based on the corrective classification.Type: ApplicationFiled: December 3, 2021Publication date: March 24, 2022Inventors: Zainab ZAKI, Manuel Vincente VIVO
-
Publication number: 20220053092Abstract: Systems and methods for telephone call regulation include the use of a predictive model. An example method includes receiving, by a predictive model, a telephone number from a user application comprising instructions for execution on a user device and determining, by the predictive model, a spam factor for the received telephone number. The example method further includes determining, by the predictive model, a classification of the received telephone number based on the spam factor and transmitting, by the predictive model, the classification of the received telephone number to the user application. The example method further includes receiving, by the predictive model, a feedback from the user application, the feedback indicative of a corrective classification of the received telephone number and modifying, by the predictive model, the spam factor for the received telephone number based on the corrective classification.Type: ApplicationFiled: August 11, 2020Publication date: February 17, 2022Inventors: Zainab ZAKI, Manuel Vincente VIVO
-
Patent number: 11233900Abstract: Systems and methods for telephone call regulation include the use of a predictive model. An example method includes receiving, by a predictive model, a telephone number from a user application comprising instructions for execution on a user device and determining, by the predictive model, a spam factor for the received telephone number. The example method further includes determining, by the predictive model, a classification of the received telephone number based on the spam factor and transmitting, by the predictive model, the classification of the received telephone number to the user application. The example method further includes receiving, by the predictive model, a feedback from the user application, the feedback indicative of a corrective classification of the received telephone number and modifying, by the predictive model, the spam factor for the received telephone number based on the corrective classification.Type: GrantFiled: August 11, 2020Date of Patent: January 25, 2022Assignee: CAPITAL ONE SERVICES, LLCInventors: Zainab Zaki, Manuel Vincente Vivo
-
Patent number: 11218473Abstract: A system for identifying suspicious logins. The system may include a memory storing executable instructions, and at least one processor configured to execute the instructions to perform operations. The operations may include receiving a first user login from an electronic device, the first user login comprising login credentials; receiving a second user login from an electronic device, the second user login comprising login credentials; analyzing a plurality of device history characteristics, wherein at least one device history characteristic comprises a determination of a last financial transaction performed by an electronic device; determining, based on the analysis, that the first and second user logins originate from different electronic devices; identifying, based on the determination and the analysis, the second user login as a suspicious login; sending, to a user, a notification of the identified suspicious login; and modifying, based on the notification, security settings on an account of the user.Type: GrantFiled: November 6, 2019Date of Patent: January 4, 2022Assignee: CAPITAL ONE SERVICES, LLCInventors: Jackson Cheek, Zainab Zaki
-
Publication number: 20210390165Abstract: A computer-implemented method for executing a user instruction may include obtaining identification data of a user via a device associated with the user, wherein the identification data comprises at least a password, a user name, and biometric data of the user; determining, via the one or more processors, a login status based on the identification data; demonstrating, to the user, historical account data based on the login status, wherein the historical account data comprises at least historical biometric data associated with one or more historical logins; receiving, via the one or more processors, the user instruction based on the historical account data, wherein the user instruction comprises at least one of revoking a historical login, changing password, or signing out a historical device associated with a historical login of the one or more historical logins; and executing, via the one or more processors, the user instruction.Type: ApplicationFiled: June 11, 2020Publication date: December 16, 2021Applicant: Capital One Services, LLCInventors: Zainab ZAKI, Jackson CHEEK
-
Publication number: 20210234867Abstract: A node of a network receives account access information (AAI) for an account that a user has with a system. The node causes a first record to be added to a distributed ledger that is used for managing access to the account, wherein the first record includes the AAI or an encrypted storage identifier that identifies a storage location for the AAI. The node determines a likelihood that the account is being accessed by the user based on the AAI and/or historical AAI for one or more accounts, that include the account, that are used to access the system. The node causes a second record that includes a value representing the likelihood to be added to the distributed ledger. The node causes one or more other nodes of the network to be alerted that the first record and the second record have been added to the distributed ledger.Type: ApplicationFiled: April 5, 2021Publication date: July 29, 2021Inventors: Zainab ZAKI, Jeffrey BROWN
-
Publication number: 20210136063Abstract: A system for identifying suspicious logins. The system may include a memory storing executable instructions, and at least one processor configured to execute the instructions to perform operations. The operations may include receiving a first user login from an electronic device, the first user login comprising login credentials; receiving a second user login from an electronic device, the second user login comprising login credentials; analyzing a plurality of device history characteristics, wherein at least one device history characteristic comprises a determination of a last financial transaction performed by an electronic device; determining, based on the analysis, that the first and second user logins originate from different electronic devices; identifying, based on the determination and the analysis, the second user login as a suspicious login; sending, to a user, a notification of the identified suspicious login; and modifying, based on the notification, security settings on an account of the user.Type: ApplicationFiled: November 6, 2019Publication date: May 6, 2021Applicant: Capital One Services, LLCInventors: Jackson CHEEK, Zainab ZAKI
-
Patent number: 10972475Abstract: A node of a network receives account access information (AAI) for an account that a user has with a system. The node causes a first record to be added to a distributed ledger that is used for managing access to the account, wherein the first record includes the AAI or an encrypted storage identifier that identifies a storage location for the AAI. The node determines a likelihood that the account is being accessed by the user based on the AAI and/or historical AAI for one or more accounts, that include the account, that are used to access the system. The node causes a second record that includes a value representing the likelihood to be added to the distributed ledger. The node causes one or more other nodes of the network to be alerted that the first record and the second record have been added to the distributed ledger.Type: GrantFiled: January 29, 2020Date of Patent: April 6, 2021Assignee: Capital One Services, LLCInventors: Zainab Zaki, Jeffrey Brown
-
Publication number: 20200410475Abstract: Systems, apparatuses, and methods for verifying physical presence of a mobile device as part of an electronic transaction. Tags may be generated and displayed on one or more display devices. Those tags, which may be time-limited, may be read by a mobile device to verify physical presence of the mobile device as a prerequisite to initiating, continuing with, or completing an electronic transaction, and/or as a decision point in how the electronic transaction is to be conducted.Type: ApplicationFiled: July 15, 2020Publication date: December 31, 2020Inventors: Zainab Zaki, Jackson Cheek