Patents by Inventor Zainab Zaki
Zainab Zaki has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250190971Abstract: Systems, apparatuses, and methods for verifying physical presence of a mobile device as part of an electronic transaction. Tags may be generated and displayed on one or more display devices. Those tags, which may be time-limited, may be read by a mobile device to verify physical presence of the mobile device as a prerequisite to initiating, continuing with, or completing an electronic transaction, and/or as a decision point in how the electronic transaction is to be conducted.Type: ApplicationFiled: February 18, 2025Publication date: June 12, 2025Inventors: Zainab Zaki, Jackson Cheek
-
Patent number: 12260389Abstract: Systems, apparatuses, and methods for verifying physical presence of a mobile device as part of an electronic transaction. Tags may be generated and displayed on one or more display devices. Those tags, which may be time-limited, may be read by a mobile device to verify physical presence of the mobile device as a prerequisite to initiating, continuing with, or completing an electronic transaction, and/or as a decision point in how the electronic transaction is to be conducted.Type: GrantFiled: May 23, 2023Date of Patent: March 25, 2025Assignee: Capital One Services, LLCInventors: Zainab Zaki, Jackson Cheek
-
Patent number: 12197554Abstract: A computer-implemented method for executing a user instruction may include obtaining identification data of a user via a device associated with the user, wherein the identification data comprises at least a password, a user name, and biometric data of the user; determining, via the one or more processors, a login status based on the identification data; demonstrating, to the user, historical account data based on the login status, wherein the historical account data comprises at least historical biometric data associated with one or more historical logins; receiving, via the one or more processors, the user instruction based on the historical account data, wherein the user instruction comprises at least one of revoking a historical login, changing password, or signing out a historical device associated with a historical login of the one or more historical logins; and executing, via the one or more processors, the user instruction.Type: GrantFiled: October 2, 2023Date of Patent: January 14, 2025Assignee: Capital One Services, LLCInventors: Zainab Zaki, Jackson Cheek
-
Patent number: 12189735Abstract: Systems and methods for adaptive verification may include a memory and a processor. The memory may be configured to store a plurality of animation templates. The processor may be configured to perform a first challenge process to request a first user image from a first predetermined distance, receive the first user image, request a second user image from a second predetermined distance, receive the second user image, transmit the first user image and the second user image for a verification process, the verification process including identification of one or more user attributes, receive a third user image associated with the one or more user attributes identified during the verification, and display the third user image including an adaptation, wherein the adaptation is generated for at least one of the plurality of animation templates, the adaptation illustrating the one or more user attributes.Type: GrantFiled: June 28, 2021Date of Patent: January 7, 2025Assignee: CAPITAL ONE SERVICES, LLCInventors: Laura Lee Boykin, Zainab Zaki, Joanna Weber
-
Publication number: 20240346130Abstract: A method, a system, and a computer program product for randomly generating and updating passwords for authentication to digital services. A first password associated with authenticating of a user is received. A plurality of random second passwords is generated based on the received first password. One or more random second passwords in the plurality of random second passwords are configured to authenticate the user for accessing at least one secure service. At least one random second password in the plurality of random second passwords is selected based on at least one factor and updated to generate an updated at least one random second password. The user is authenticated using the updated random second password for accessing the secure service.Type: ApplicationFiled: April 11, 2023Publication date: October 17, 2024Applicant: Capital One Services, LLCInventors: Daniel Pick, Zainab Zaki, Dipukumar Muraleedharakumar
-
Publication number: 20240338676Abstract: A mobile device can receive a cryptogram from a contactless card, verify the cryptogram, and when the cryptogram has been verified and a merchant mobile application is running on the mobile device, launch a shopping mobile application and/or a shopping browser extension on the mobile device.Type: ApplicationFiled: April 7, 2023Publication date: October 10, 2024Applicant: Capital One Services, LLCInventors: Daniel Pick, Zainab Zaki, Dipukumar Muraleedharakumar
-
Patent number: 11916920Abstract: A node of a network receives account access information (AAI) for an account that a user has with a system. The node causes a first record to be added to a distributed ledger that is used for managing access to the account, wherein the first record includes the AAI or an encrypted storage identifier that identifies a storage location for the AAI. The node determines a likelihood that the account is being accessed by the user based on the AAI and/or historical AAI for one or more accounts, that include the account, that are used to access the system. The node causes a second record that includes a value representing the likelihood to be added to the distributed ledger. The node causes one or more other nodes of the network to be alerted that the first record and the second record have been added to the distributed ledger.Type: GrantFiled: March 6, 2023Date of Patent: February 27, 2024Assignee: Capital One Services, LLCInventors: Zainab Zaki, Jeffrey Brown
-
Publication number: 20240028683Abstract: A computer-implemented method for executing a user instruction may include obtaining identification data of a user via a device associated with the user, wherein the identification data comprises at least a password, a user name, and biometric data of the user; determining, via the one or more processors, a login status based on the identification data; demonstrating, to the user, historical account data based on the login status, wherein the historical account data comprises at least historical biometric data associated with one or more historical logins; receiving, via the one or more processors, the user instruction based on the historical account data, wherein the user instruction comprises at least one of revoking a historical login, changing password, or signing out a historical device associated with a historical login of the one or more historical logins; and executing, via the one or more processors, the user instruction.Type: ApplicationFiled: October 2, 2023Publication date: January 25, 2024Applicant: Capital One Services, LLCInventors: Zainab ZAKI, Jackson CHEEK
-
Patent number: 11809537Abstract: A computer-implemented method for executing a user instruction may include obtaining identification data of a user via a device associated with the user, wherein the identification data comprises at least a password, a user name, and biometric data of the user; determining, via the one or more processors, a login status based on the identification data; demonstrating, to the user, historical account data based on the login status, wherein the historical account data comprises at least historical biometric data associated with one or more historical logins; receiving, via the one or more processors, the user instruction based on the historical account data, wherein the user instruction comprises at least one of revoking a historical login, changing password, or signing out a historical device associated with a historical login of the one or more historical logins; and executing, via the one or more processors, the user instruction.Type: GrantFiled: June 11, 2020Date of Patent: November 7, 2023Assignee: Capital One Services, LLCInventors: Zainab Zaki, Jackson Cheek
-
Publication number: 20230297994Abstract: Systems, apparatuses, and methods for verifying physical presence of a mobile device as part of an electronic transaction. Tags may be generated and displayed on one or more display devices. Those tags, which may be time-limited, may be read by a mobile device to verify physical presence of the mobile device as a prerequisite to initiating, continuing with, or completing an electronic transaction, and/or as a decision point in how the electronic transaction is to be conducted.Type: ApplicationFiled: May 23, 2023Publication date: September 21, 2023Inventors: Zainab Zaki, Jackson Cheek
-
Patent number: 11704657Abstract: Systems, apparatuses, and methods for verifying physical presence of a mobile device as part of an electronic transaction. Tags may be generated and displayed on one or more display devices. Those tags, which may be time-limited, may be read by a mobile device to verify physical presence of the mobile device as a prerequisite to initiating, continuing with, or completing an electronic transaction, and/or as a decision point in how the electronic transaction is to be conducted.Type: GrantFiled: July 15, 2020Date of Patent: July 18, 2023Assignee: Capital One Services, LLCInventors: Zainab Zaki, Jackson Cheek
-
Publication number: 20230208849Abstract: A node of a network receives account access information (AAI) for an account that a user has with a system. The node causes a first record to be added to a distributed ledger that is used for managing access to the account, wherein the first record includes the AAI or an encrypted storage identifier that identifies a storage location for the AAI. The node determines a likelihood that the account is being accessed by the user based on the AAI and/or historical AAI for one or more accounts, that include the account, that are used to access the system. The node causes a second record that includes a value representing the likelihood to be added to the distributed ledger. The node causes one or more other nodes of the network to be alerted that the first record and the second record have been added to the distributed ledger.Type: ApplicationFiled: March 6, 2023Publication date: June 29, 2023Inventors: Zainab ZAKI, Jeffrey BROWN
-
Patent number: 11665280Abstract: Example embodiments of systems and methods for telephone call regulation include the use of a predictive model. An example method includes receiving, by a predictive model, a telephone number from a user application comprising instructions for execution on a user device and determining, by the predictive model, a spam factor for the received telephone number. The example method further includes determining, by the predictive model, a classification of the received telephone number based on the spam factor and transmitting, by the predictive model, the classification of the received telephone number to the user application. The example method further includes receiving, by the predictive model, a feedback from the user application, the feedback indicative of a corrective classification of the received telephone number and modifying, by the predictive model, the spam factor for the received telephone number based on the corrective classification.Type: GrantFiled: December 3, 2021Date of Patent: May 30, 2023Assignee: CAPITAL ONE SERVICES, LLCInventors: Zainab Zaki, Manuel Vincente Vivo
-
Patent number: 11601437Abstract: A node of a network receives account access information (AAI) for an account that a user has with a system. The node causes a first record to be added to a distributed ledger that is used for managing access to the account, wherein the first record includes the AAI or an encrypted storage identifier that identifies a storage location for the AAI. The node determines a likelihood that the account is being accessed by the user based on the AAI and/or historical AAI for one or more accounts, that include the account, that are used to access the system. The node causes a second record that includes a value representing the likelihood to be added to the distributed ledger. The node causes one or more other nodes of the network to be alerted that the first record and the second record have been added to the distributed ledger.Type: GrantFiled: April 5, 2021Date of Patent: March 7, 2023Assignee: Capital One Services, LLCInventors: Zainab Zaki, Jeffrey Brown
-
Publication number: 20220414193Abstract: Systems and methods for adaptive verification may include a memory and a processor. The memory may be configured to store a plurality of animation templates. The processor may be configured to perform a first challenge process to request a first user image from a first predetermined distance, receive the first user image, request a second user image from a second predetermined distance, receive the second user image, transmit the first user image and the second user image for a verification process, the verification process including identification of one or more user attributes, receive a third user image associated with the one or more user attributes identified during the verification, and display the third user image including an adaptation, wherein the adaptation is generated for at least one of the plurality of animation templates, the adaptation illustrating the one or more user attributes.Type: ApplicationFiled: June 28, 2021Publication date: December 29, 2022Inventors: Laura Lee BOYKIN, Zainab ZAKI, Joanna WEBER
-
Publication number: 20220329581Abstract: Systems and methods for selectively authenticating an untrusted device based on a trust level are disclosed. The system can include transmitting an authentication request from a first device seeking to authenticate a second device to access to an account. The first device receives an authentication token that can be used by the second device for authentication. The authentication token can be transmitted wirelessly to the second device or can be scanned by the second device in the case that the token is a scannable image displayed on the first device. The systems can determine a trust level for the second device based on an association between the first device and the second device. The system can provide the second device a degree of access to the account that relates to the trust level.Type: ApplicationFiled: April 12, 2021Publication date: October 13, 2022Inventors: Zainab Zaki, Divya Gupta, Brian Choe
-
Patent number: 11296880Abstract: An exemplary system, method, and computer-accessible medium can include, for example, receiving at a first entity from a second entity, a first request for encrypted user information associated with at least one user, wherein the first request includes a user identifier associated with the at least one user, and wherein the first entity is different from the second entity, sending, from the first entity, a second request to a user device associated with the at least one user, wherein the second request includes a notification to the at least one user for an affirmation of the first request or a denial of the first request, receiving at the first entity from the user device, the affirmation or the denial, and sending, from the first entity to the second entity, (i) the encrypted user information if the affirmation is received or (ii) a denied notification if the denial is received.Type: GrantFiled: July 23, 2019Date of Patent: April 5, 2022Assignee: CAPITAL ONE SERVICES, LLCInventors: Jeffrey Wieker, Zainab Zaki, Clayton Johnson
-
Publication number: 20220094785Abstract: Example embodiments of systems and methods for telephone call regulation are provided. An example method includes receiving, by a predictive model, a telephone number from a user application comprising instructions for execution on a user device; determining, by the predictive model, a spam factor for the received telephone number; determining, by the predictive model, a classification of the received telephone number based on the spam factor; transmitting, by the predictive model, the classification of the received telephone number to the user application; receiving, by the predictive model, a feedback from the user application, the feedback indicative of a corrective classification of the received telephone number; and modifying, by the predictive model, the spam factor for the received telephone number based on the corrective classification.Type: ApplicationFiled: December 3, 2021Publication date: March 24, 2022Inventors: Zainab ZAKI, Manuel Vincente VIVO
-
Publication number: 20220053092Abstract: Systems and methods for telephone call regulation include the use of a predictive model. An example method includes receiving, by a predictive model, a telephone number from a user application comprising instructions for execution on a user device and determining, by the predictive model, a spam factor for the received telephone number. The example method further includes determining, by the predictive model, a classification of the received telephone number based on the spam factor and transmitting, by the predictive model, the classification of the received telephone number to the user application. The example method further includes receiving, by the predictive model, a feedback from the user application, the feedback indicative of a corrective classification of the received telephone number and modifying, by the predictive model, the spam factor for the received telephone number based on the corrective classification.Type: ApplicationFiled: August 11, 2020Publication date: February 17, 2022Inventors: Zainab ZAKI, Manuel Vincente VIVO
-
Patent number: 11233900Abstract: Systems and methods for telephone call regulation include the use of a predictive model. An example method includes receiving, by a predictive model, a telephone number from a user application comprising instructions for execution on a user device and determining, by the predictive model, a spam factor for the received telephone number. The example method further includes determining, by the predictive model, a classification of the received telephone number based on the spam factor and transmitting, by the predictive model, the classification of the received telephone number to the user application. The example method further includes receiving, by the predictive model, a feedback from the user application, the feedback indicative of a corrective classification of the received telephone number and modifying, by the predictive model, the spam factor for the received telephone number based on the corrective classification.Type: GrantFiled: August 11, 2020Date of Patent: January 25, 2022Assignee: CAPITAL ONE SERVICES, LLCInventors: Zainab Zaki, Manuel Vincente Vivo