Capital One Services, LLC.

United States of America

Back to Profile

1-100 of 9,253 for Capital One Services, LLC. Sort by
Query
Aggregations
Jurisdiction
        United States 7,964
        World 651
        Canada 638
Date
New (last 4 weeks) 101
2025 September (MTD) 58
2025 August 78
2025 July 76
2025 June 76
See more
IPC Class
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists 1,508
G06N 20/00 - Machine learning 1,226
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards 1,006
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices 895
H04L 9/40 - Network security protocols 821
See more
Status
Pending 2,493
Registered / In Force 6,760
Found results for  patents
  1     2     3     ...     93        Next Page

1.

SIGN-UP AUTHENTICATION

      
Application Number 19220760
Status Pending
Filing Date 2025-05-28
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Wright, Aaron
  • Kornman, Kelly Morse
  • Alrefaai, Omer

Abstract

In some implementations, a system may receive user e-mail data indicating an e-mail address and an e-mail password associated with an e-mail account of a user. The system may access the e-mail account via the e-mail address and the e-mail password. The system may identify, in the e-mail account, a sign-up authentication e-mail message associated with a sign-up by the user with an interaction party based on one or more sign-up indicators associated with the sign-up authentication e-mail message. The system may transmit a notification, to a user device, requesting confirmation that the user signed up for an account with the interaction party. The system may receive, from the user device, a user input confirming that the user signed up for the account. The system may activate a link in the sign-up authentication e-mail message to authenticate the sign-up.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 51/42 - Mailbox-related aspects, e.g. synchronisation of mailboxes

2.

SYSTEM AND METHOD FOR EFFICIENT GENERATION OF MACHINE-LEARNING MODELS

      
Application Number 19224717
Status Pending
Filing Date 2025-05-31
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Walters, Austin
  • Goodsitt, Jeremy
  • Pham, Vincent

Abstract

A system for determining data requirements to generate machine-learning models. The system may include one or more processors and one or more storage devices storing instructions. When executed, the instructions may configure the one or more processors to perform operations including: receiving a sample dataset, generating a plurality of data categories based on the sample dataset; generating a plurality of primary models of different model types using data from the corresponding one of the data categories as training data; generating a sequence of secondary models by training the corresponding one of the primary models with progressively less training data; identifying minimum viable models in the sequences of secondary models; determining a number of samples required for the minimum viable models; and generating entries in the database associating: model types; corresponding data categories; and corresponding numbers of samples in the training data used for the minimum viable models.

IPC Classes  ?

  • G06F 16/9536 - Search customisation based on social or collaborative filtering
  • G06F 9/54 - Interprogram communication
  • G06F 16/9035 - Filtering based on additional data, e.g. user or group profiles
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
  • G06F 18/2413 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
  • G06F 18/2431 - Multiple classes
  • G06N 20/00 - Machine learning

3.

DETECTING A PRE-DEFINED ACCESSIBILITY PATTERN TO MODIFY THE USER INTERFACE OF A MOBILE DEVICE

      
Application Number 19221779
Status Pending
Filing Date 2025-05-29
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Capurso, Nicholas
  • Pribble, Jason
  • Jarvis, Daniel Alan

Abstract

Disclosed herein are various embodiments for detecting predefined accessibility patterns for modifying a user interface of a mobile device. An embodiment operates by providing a plurality of times of an original screen of a user interface of an application for display on a mobile device. Sensor data corresponding to one or more user interactions with the mobile device is received, and a detected accessibility pattern indicating a visual impairment of the user is identified. The plurality of items are split into both a first screen and a second screen with larger font relative to the original screen, and the original screen is replaced with the first screen.

IPC Classes  ?

  • G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06T 7/50 - Depth or shape recovery

4.

VIRTUAL POINT-OF-SALE SYSTEM FOR THE METAVERSE

      
Application Number 18605529
Status Pending
Filing Date 2024-03-14
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Rapowitz, Samuel
  • Osborn, Kevin
  • Rodriguez, Mia
  • Tikoian, Kathryn

Abstract

A method, a system, and a computer program product for execution of transactions using virtual computing systems. A request to execute a virtual transaction with a virtual computing device communicating in a virtual computing system is received. The virtual transaction is requested by a user using a user device communicating with the virtual computing system. In response to receiving the request to execute the transaction, the user is authenticated in the virtual computing system. Authentication includes receiving, by the virtual computing device, a user authentication data representing the user and comparing the received user authentication data with stored user authentication data. Upon determining a match between the received and stored authentication data, the user is authenticated in the virtual computing system and the virtual transaction is executed using the virtual computing device. Execution of the transaction is prevented if there is no match between the received and stored authentication data.

IPC Classes  ?

  • G06Q 30/0601 - Electronic shopping [e-shopping]
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
  • G06Q 20/20 - Point-of-sale [POS] network systems
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists

5.

COMPUTER-BASED SYSTEMS CONFIGURED FOR DATABASE RESOLUTION FROM AN ENHANCED QUERY DATA REFINEMENT IN AN ELASTIC SEARCH ENVIRONMENT AND METHOD AN USE THEREOF

      
Application Number 19061739
Status Pending
Filing Date 2025-02-24
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Al-Shehab, Ali S.
  • Jeng, Jr-Wei
  • Sheth, Niti N.
  • Faruquie, Tanveer Afzal
  • Lutz, David Edward
  • Sheridan, Nathan L.

Abstract

This disclosure generally relates to computer-based systems configured for one or more novel technological applications of information processing in the field of database resolution from an enhanced query data refinement in an elastic search environment utilizing a machine learning model pipeline to resolve entity records.

IPC Classes  ?

  • G06F 16/215 - Improving data qualityData cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

6.

WRITING TO A TERRITORY ASSIGNMENT FILE USING GEOSPATIAL RELATIONSHIPS

      
Application Number 18602217
Status Pending
Filing Date 2024-03-12
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Prabhu, Vidhya
  • Nabiullin, Albert
  • Doppalapudi, Kishore Babu
  • Brunts, Andrew
  • Packiam, Sikkandar
  • Vijayaraghavan, Raghuram

Abstract

In some implementations, a device may retrieve assignment data indicating territory assignments of a plurality of entities to a plurality of territories. The entities may have physical addresses in a plurality of serviced locations, and an entity may lack a territory assignment. The device may identify, for the serviced locations, respective travel times between the serviced locations and a location relating to a physical address for the entity. The device may identify a set of nearest entities in an order of travel proximity to the location according to the respective travel times. The device may monitor, during identifying of the set of nearest entities and in accordance with the territory assignments, respective counts of nearest entities for the plurality of territories, until a count of nearest entities for a territory satisfies a threshold. The device may generate updated assignment data to indicate an assignment of the entity to the territory.

IPC Classes  ?

  • H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
  • G01C 21/34 - Route searchingRoute guidance
  • G06F 16/9038 - Presentation of query results
  • G06F 16/909 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location

7.

Resource Validation Systems and Methods

      
Application Number 19227011
Status Pending
Filing Date 2025-06-03
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • De Bruyn, Carel
  • Anthonyraj, James
  • Duong, David

Abstract

Techniques for improved data and/or resource validation provide a real-time validation of data and resources. A resource may include an aggregation of related data into a single unique unit. The validation may be performed based on one or more events or triggers, such as on the occurrence of a data change, deployment of an application, when the resource(s) are utilized, etc. The validation may be on demand (e.g., based on one or more events and/or triggers) and/or manually (e.g., via a call via an application program interface by a user).

IPC Classes  ?

8.

COMPUTER-BASED SYSTEMS CONFIGURED FOR NOVEL INFORMATION PROCESSING AND STORAGE UTILIZING ELASTIC SEARCH ENVIRONMENT OF A LOCAL CACHE AND METHOD AND USE THEREOF

      
Application Number 18602828
Status Pending
Filing Date 2024-03-12
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Al-Shehab, Ali S.
  • Jeng, Jr-Wei
  • Sheth, Niti N.
  • Faruquie, Tanveer Afzal
  • Lutz, David Edward
  • Sheridan, Nathan L.

Abstract

In order to facilitate entity resolution, systems and methods include a processor receiving entity records associated with one or more entities, the system leverages information processing techniques that include utilizing a first sector of a local cache memory to store verified entity records, and store an unverified non-exact match in a second sector of a local cache memory linking the verified and unverified entity records for real-time entity record resolution, the system and methods further order the unverified records to enhance search and reduce reliance on third party systems for entity record verification thus reducing API calls to external vendors.

IPC Classes  ?

  • G06F 16/2455 - Query execution
  • G06F 16/215 - Improving data qualityData cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors

9.

SYSTEMS AND METHODS FOR PROVIDING RESPONSES TO USER QUERIES BASED ON ADJACENT KEYWORDS

      
Application Number 18605648
Status Pending
Filing Date 2024-03-14
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Darivemula, Savio Joseph
  • Dupre, Justin
  • Gaynor, Kevin

Abstract

Systems and methods for augmenting search query responses with adjacent keyword-based filters. In some aspects, the system receives a search query of text tokens. Using a first machine learning model, the system generates a set of adjacent keywords associated with similarity metrics. Based on a keyword database, the system generates popularity metrics for each adjacent keyword. For each adjacent keyword, the system uses its popularity metric and similarity metric to generate a filter. Based on the set of filters and a geographical location associated with the search query, the system produces a set of responses to the search query.

IPC Classes  ?

  • G06F 40/284 - Lexical analysis, e.g. tokenisation or collocates
  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06F 16/9537 - Spatial or temporal dependent retrieval, e.g. spatiotemporal queries

10.

SYSTEMS AND METHODS FOR FACILITATING CRYPTOGRAPHICALLY BACKED COORDINATION OF COMPLEX COMPUTER COMMUNICATIONS

      
Application Number 19226087
Status Pending
Filing Date 2025-06-02
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor Johar, Imren

Abstract

Methods and systems for uses and/or improvements to blockchain technology. In particular, the methods and systems described herein implement a novel cryptographic resource standard that provides functionality for complex communications. The novel cryptographic resource standard allows for blockchain functions that may involve single cryptographic resource transfers or batch cryptographic resource transfers as well as on-chain batching of one or more cryptographic resources.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/08 - Key distribution
  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms

11.

COMPUTER-BASED SYSTEMS CONFIGURED FOR A CLOUD-FIRST MULTIFUNCTION API CLUSTER PROVIDING MICROSERVICES CAPABLE OF BOTH BATCH AND REAL-TIME PROCESSING AND METHOD AND USE THEREOF

      
Application Number 18605606
Status Pending
Filing Date 2024-03-14
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Al-Shehab, Ali S.
  • Jeng, Jr-Wei
  • Sheth, Niti N.
  • Faruquie, Tanveer Afzal
  • Lutz, David Edward
  • Sheridan, Nathan L.

Abstract

The disclosure is related to computer-based information processing systems configured to resolve entity records in a database. Specifically, the systems and methods utilize natural language models in a cloud-first multifunction API cluster to provide microservices capable of both batch and real-time processing of a large number of entity records.

IPC Classes  ?

  • G06F 9/54 - Interprogram communication
  • G06F 16/215 - Improving data qualityData cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors

12.

GENERATING USER GROUP DEFINITIONS

      
Application Number 19221489
Status Pending
Filing Date 2025-05-28
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Sharpe, Samuel
  • Bruss, Christopher Bayan
  • Moyer, Maximo

Abstract

Methods and systems are described herein for generating group definition sequences for accounts (e.g., user accounts) using action sequence processing and then classifying accounts using those group definition sequences. A plurality of user account actions and corresponding time that each action was taken may be received and based on that information, a sequence of action types sometimes referred to as a time-ordered dataset of action types (e.g., based on a chronological order of the actions) may be generated. The time-ordered dataset of action types may be compared with known time-ordered sequences for a particular user group or user classification. If the time-ordered dataset of action types matches the time-ordered sequences of the particular user group, the user may be classified into that user group.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/60 - Protecting data

13.

AUTOMATED VULNERABILITY EXCEPTION PROCESS

      
Application Number 18604262
Status Pending
Filing Date 2024-03-13
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Seck, Mohamed
  • Nadiminti, Sesha Sowmya
  • Franzen, Krystan R.
  • Iwan, Grant Michael
  • Reid, Shannon

Abstract

In some implementations, an exception system may receive an indication of a security vulnerability associated with a cloud environment. The exception system may provide a data structure that represents the security vulnerability to a machine learning model in order to receive a suggested exception justification. The exception system may output, to a user device associated with a user assigned to the security vulnerability, a draft exception request that includes the suggested exception justification. The exception system may receive, from the user device, a request to submit an exception request based on the draft exception request. The exception system may transmit a command to tag the security vulnerability as excepted.

IPC Classes  ?

14.

SYSTEMS AND METHODS FOR REAL-TIME CYBER INCIDENT DETECTION IN DATA SPARSE ENVIRONMENTS USING ARTIFICIAL INTELLIGENCE

      
Application Number 19221501
Status Pending
Filing Date 2025-05-28
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor Davis, Spencer

Abstract

The systems and methods use a gradient boosted decision tree, which may be trained in data sparse environments. The system also uses a data transformation step to collapse complex data into a standardized feature input (e.g., a fixed length feature input) that may be processed by the model with a constant (or near-constant) lookup time and with minimal latency. Finally, the system generates a dual variable output that provides both a metric of whether a communication is fraudulent and/or unauthorized as well as a confidence level of that determination.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

15.

TECHNIQUES TO PROCESS TRANSACTIONS WITH A CONTACTLESS CARD BASED ON ONE OR MORE CONFIGURATIONS OF THE CONTACTLESS CARD

      
Application Number 19027600
Status Pending
Filing Date 2025-01-17
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Hart, Colin
  • Rule, Jeffrey
  • Cody, Lea
  • Newman, Kaitlin

Abstract

Embodiments may be generally directed to techniques, systems, and devices to control settings stored on contactless cards.

IPC Classes  ?

  • G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
  • G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
  • G06Q 20/20 - Point-of-sale [POS] network systems
  • G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists

16.

COMPUTER-BASED SYSTEMS CONFIGURED FOR GENERATING SEARCH QUERIES FOR A SEARCH ENGINE AND METHODS OF USE THEREOF

      
Application Number 19060292
Status Pending
Filing Date 2025-02-21
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Al-Shehab, Ali S.
  • Jeng, Jr-Wei
  • Sheth, Niti N.
  • Faruquie, Tanveer Afzal
  • Lutz, David Edward
  • Sheridan, Nathan L.

Abstract

A method may include executing an entity resolution microservice programmed to receive an entity-specific data request for entity-specific data for an entity from a plurality of entities. An application programming interface (API) call is transmitted to an entity profile database that programs the entity profile database to identify entity-specific data in data records matching the entity-specific data in the entity-specific data request and transmit to the entity resolution microservice a compressed representation of the entity-specific data identified in the at least one entity profile database. The compressed representation may be received and the compressed representation may be transformed to an uncompressed representation. An entity-specific database query request for a search engine to perform a database search for additional entity-specific data is generated based on the uncompressed representation.

IPC Classes  ?

17.

COMPUTER-BASED SYSTEMS CONFIGURED FOR INSTANCE DEPENDENT OPTIMIZATION OF INFORMATION PROCESSING SYSTEMS AND METHODS OF USE THEREOF

      
Application Number 18603901
Status Pending
Filing Date 2024-03-13
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Al-Shehab, Ali S.
  • Jeng, Jr-Wei
  • Sheth, Niti N.
  • Faruquie, Tanveer Afzal
  • Lutz, David Edward
  • Sheridan, Nathan L.

Abstract

In order to facilitate entity resolution, systems and methods include a processor receiving a plurality of records associated with one or more entity records. The processor utilizes a first natural language processing model to determine a set of clusters. The processor then utilizes instance inputs to determine adjustments to the natural language processing model to determine from the groups of clusters a second map of clusters from the entity feature, then determines a merge of the entity records, and displays the merged entity records.

IPC Classes  ?

  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 40/295 - Named entity recognition

18.

ACCESSING APPLICATION CONTENT AND FEATURES USING DEEP LINKING WITH WIRELESS PROTOCOLS OR SCANNABLE CODES

      
Application Number 19224885
Status Pending
Filing Date 2025-06-01
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Yajnik, Sanjiv
  • Nalavade, Satyajit Sajanrao
  • Raste, Sunil
  • Provencio, Eddie
  • Repaka, Vikramaditya
  • Eckman, John Patrick

Abstract

Methods and systems disclosed herein enable accessing and updating content using deep linking. The system may generate a deep link for a user that links the user to an operator that requested generation of the deep link. The deep link may be encoded into a wirelessly detectable tag or a visually scannable code, which may be stored with user action data and an operator identifier. When a visually scannable code is scanned or a wirelessly detectable tag is accessed, the deep link is decoded and all data associated with the deep link is retrieve and generated for display, when needed. By generating deep links in combination with the visually scannable codes or wirelessly detectable tags, the system is able to provide quick and efficient data retrieval and update.

IPC Classes  ?

  • G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
  • G06F 8/38 - Creation or generation of source code for implementing user interfaces
  • G06F 8/65 - Updates

19.

DOCUMENT REMEMBRANCE AND COUNTERFEIT DETECTION

      
Application Number 18607884
Status Pending
Filing Date 2024-03-18
First Publication Date 2025-09-18
Owner Capital One Services, LLC (USA)
Inventor
  • Franklin, Keegan
  • Brighter, James
  • Obrien, Megan
  • Maillett, John
  • Justiz, Jane
  • Dennis, Thomas

Abstract

Disclosed herein are system, apparatus, device, method and/or computer program product embodiments for identifying, in a remote deposit system, a level of correspondence of a financial instrument with past deposit activity. The level of correspondence may be used to determine a funds availability schedule and/or identify counterfeit financial instruments. In some embodiments, the level of correspondence may be determined by comparing a date associated with the financial instrument to a date parameter, an amount of the financial instrument to an amount parameter, and/or one or more financial instrument characteristics with one or more payer-specific financial instrument characteristics.

IPC Classes  ?

  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06Q 20/04 - Payment circuits
  • G06V 20/00 - ScenesScene-specific elements
  • G06V 30/18 - Extraction of features or characteristics of the image
  • G06V 30/414 - Extracting the geometrical structure, e.g. layout treeBlock segmentation, e.g. bounding boxes for graphics or text
  • G06V 30/416 - Extracting the logical structure, e.g. chapters, sections or page numbersIdentifying elements of the document, e.g. authors
  • G06V 30/418 - Document matching, e.g. of document images

20.

SYSTEMS AND METHODS FOR CUSTOMIZING A MACHINE LEARNING MODEL

      
Application Number US2025017976
Publication Number 2025/188573
Status In Force
Filing Date 2025-02-28
Publication Date 2025-09-12
Owner CAPITAL ONE SERVICES, LLC (USA)
Inventor
  • Das, Anirban
  • Naphade, Milind
  • Chaturvedi, Isha
  • Savas, Nurtekin
  • Sorower, Mohammad
  • Chitsazan, Nima
  • Yu, Qi
  • Zhu, Chenyang
  • Huang, William

Abstract

Systems and methods for customizing a machine learning model for responding to a user query. The system receives a user query from a user of a conversational program. The system determines a set of model requirements for a first machine learning model. Based on the set of model requirements, the system determines first supplemental data corresponding to the required input data and a formatting requirement corresponding to an activation pattern. The system performs pre-processing to obtain the first supplemental data from a first supporting software program and generates the first response using the first machine learning model.

IPC Classes  ?

21.

CYBERSECURITY ENFORCEMENT USING SYNTHETIC PHISHING

      
Application Number 18596037
Status Pending
Filing Date 2024-03-05
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Goodsitt, Jeremy
  • Sharpe, Samuel
  • Yao, Steven
  • Ferri, Christopher
  • Barr, Brian
  • Davis, Michael
  • Turner, Taylor
  • Reinert, Owen
  • Bergman, Doron
  • Schneider, James

Abstract

In some implementations, a cybersecurity enforcement system may generate a synthetic phishing attempt targeting a user. The cybersecurity enforcement system may update, based at least in part on a mode of the synthetic phishing attempt, a risk profile specific to the user.

IPC Classes  ?

22.

CHATBOTS FOR ONBOARDING PROCESSES

      
Application Number 18598304
Status Pending
Filing Date 2024-03-07
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Seck, Mohamed
  • Brodie, Shanice

Abstract

In some implementations, a user device may transmit, to an onboarding system, a first inquiry. The user device may receive a first response, from the onboarding system and in response to the first inquiry. The first response may have been determined by a machine learning model. The user device may transmit, to the onboarding system, a second inquiry. The user device may receive, from the onboarding system, an indication of an escalation contact in response to the second inquiry. The user device may transmit, to the onboarding system, feedback associated with the first response. The user device may receive, from the onboarding system, an indication that the machine learning model has been updated based on the feedback.

IPC Classes  ?

  • G06N 3/0895 - Weakly supervised learning, e.g. semi-supervised or self-supervised learning

23.

COMMUNICATING VIA A COMMUNICATION CHANNEL IDENTIFIED FROM AN EXTRACT, TRANSFORM, AND LOAD PROCESS

      
Application Number 18599636
Status Pending
Filing Date 2024-03-08
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor Pandya, Asutosh

Abstract

In some implementations, a device may obtain raw data including events data indicating a series of events involving interactions between an entity and an individual, and including identity data for the individual. The device may process the raw data to determine, based on the events data and the identity data, a communication type, a communication channel, and a content for a communication to the individual. The device may generate, in accordance with processing the raw data, communication data that includes the content and has a format used for the communication channel. The device may transmit the communication data for an endpoint of the communication channel to cause transmission of the communication, including the content and using the communication type, via the communication channel.

IPC Classes  ?

  • G06F 16/25 - Integrating or interfacing systems involving database management systems

24.

SELECTIVE UNLOCKING OF A PHYSICAL CARD TO RESTRICT UNAUTHORIZED ACCESS

      
Application Number 18601161
Status Pending
Filing Date 2024-03-11
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Fishman, Jacob
  • Calderaro, Anthony
  • Tanikella, Sriram Kiran
  • Dixit, Gaurav Ramesh
  • Che, Nancy
  • Brusie, Karly
  • Olson, Brady
  • Hornberger, Cody
  • Fingar, Collin

Abstract

In some implementations, a device may receive, from a user device, a request to activate a physical card. The request may indicate information relating to the physical card and request-specific data. The device may activate the physical card in response to the request. The device may monitor, while the physical card is activated, for an expiration of an activation time duration. The activation time duration may be according to the request-specific data. The device may detect that a deactivation condition for deactivating the physical card is satisfied. The deactivation condition may be the expiration of the activation time duration or an occurrence of an exchange involving the physical card. The device may deactivate the physical card in response to satisfaction of the deactivation condition and without involvement of the user device.

IPC Classes  ?

  • G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards

25.

VIRTUAL CREDENTIAL TO SUPPORT CONTINUITY FOLLOWING MIGRATION OF A DEACTIVATED CREDENTIAL

      
Application Number 18601618
Status Pending
Filing Date 2024-03-11
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Meyer, Anthony
  • Chintireddy, Ajay Kumar
  • Chawla, Tanuj
  • Yozwiak, Virginia
  • Pries, Michelle M.
  • Hagemann, John
  • Sharma, Gunjan

Abstract

In some implementations, a system may receive information related to a virtual credential cross-referenced with a deactivated credential and a primary credential that replaces the deactivated credential. The system may receive a request to authorize a transaction using a physical transaction device associated with the deactivated credential. The system may obtain authorized user information associated with the virtual credential based on the request. The system may present an interface to validate an identity of a user attempting to authorize the transaction using the physical transaction device. The system may receive, via the interface, information related to the identity of the user attempting to authorize the transaction using the physical transaction device. The system may authorize the request based on the information related to the identity of the user attempting to authorize the transaction matching the authorized user information associated with the virtual credential.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/38 - Payment protocolsDetails thereof

26.

UTILIZING A MULTI-FUNCTION TRANSACTION CARD TO CAPTURE ITEM DATA AND ENABLE EXPEDITED CHECKOUT FOR PURCHASED ITEMS

      
Application Number 19218895
Status Pending
Filing Date 2025-05-27
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Vukich, Adam
  • Zarakas, James
  • Johnson, Molly

Abstract

A multi-function transaction card may receive, from shelf sensors, first data indicating that items have been removed from shelves by a customer of a merchant, and may receive, from shopping cart sensors, second data indicating that the items have been placed in a shopping cart. The multi-function transaction card may receive, based on the first data and the second data, item data identifying the items placed in the shopping cart, wherein the item data is received from price tags of the items. The multi-function transaction card may store the item data, and may provide, to a transaction terminal of the merchant, the item data identifying the items and customer data identifying the customer. The multi-function transaction card may receive, from the transaction terminal, transaction data identifying a transaction that charges the multi-function transaction card for a total cost of the items.

IPC Classes  ?

  • A47F 9/04 - Check-out counters, e.g. for self-service stores
  • B62B 5/00 - Accessories or details specially adapted for hand carts
  • G06Q 20/18 - Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
  • G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
  • G06Q 30/0207 - Discounts or incentives, e.g. coupons or rebates
  • G06Q 30/0234 - Rebates after completed purchase
  • G06Q 30/0279 - Fundraising management

27.

Entity Classification Using Cleansed Transactions

      
Application Number 19218918
Status Pending
Filing Date 2025-05-27
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Olsen, Sarah
  • Pai, Aditya
  • Elder, Brice

Abstract

Systems as described herein may classify entities based on cleansed transactions. An entity classification server may obtain transaction data indicating an entity name and an entity code in a non-standardized format. A recommended entity code in a standardized format may be determined from a remote data store. The entity classification server may generate a score indicating a likelihood that the recommended entity code correctly identifies the entity indicated in the transaction data using a machine classifier. The entity classification server may update the entity code in the transaction data with the recommended entity code based on the score exceeding a threshold value. Accordingly, a transaction summary comprising the transaction data may be generated and provided to a computing device.

IPC Classes  ?

  • G06F 16/215 - Improving data qualityData cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
  • G06F 16/23 - Updating
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

28.

TRANSPARENT AND FAST DATA REMEDIATION

      
Application Number 18595687
Status Pending
Filing Date 2024-03-05
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Meriam, Joseph
  • Mapadath, Sunita
  • Nath, Rahul
  • Murray, Maxwell

Abstract

In some implementations, a remediation system may receive, a tracking system, a set of tickets associated with at least one data record. The remediation system may search, in the at least one data record and using a set of contexts indicated in the set of tickets, for a set of sensitive data snippets. The remediation system may generate a set of proposed remediations corresponding to the set of sensitive data snippets. The remediation system ma6y output, for each sensitive data snippet in the set of sensitive data snippets, a corresponding proposed remediation in the set of proposed remediations. The remediation system may selectively apply the set of proposed remediations based on inputs from a user.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

29.

COMPUTER-BASED SYSTEMS CONFIGURED TO DETERMINE ELEMENT-LEVEL DATA LINEAGE AND METHODS OF USE THEREOF

      
Application Number 18595701
Status Pending
Filing Date 2024-03-05
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Cellucci, Christopher
  • Lehmann, Selwyn
  • Kantabathina, Saianirudh
  • Bennett, Samuel Joshua
  • Sokol, Alec

Abstract

In some embodiments, the present disclosure provides an exemplary technically improved computer-based method utilizing an element level mapping module that determines a correlative relationships of interconnected nodes and edges in relation to an output data element and an input data element, and determines an appropriate graph of the relationships.

IPC Classes  ?

  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

30.

CONNECTING TRAVEL DATA STRUCTURES WITH VEHICLE DATA STRUCTURES

      
Application Number 18595723
Status Pending
Filing Date 2024-03-05
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Nowak, Matthew Louis
  • Seck, Mohamed

Abstract

In some implementations, a connecting system may receive, from a first data source, event information associated with a travel itinerary and may receive, from a second data source, an indication of at least one destination location. The connecting system may further receive a preference associated with a user. The connecting system may provide the event information, the indication of the at least one destination location, and the preference to a machine learning model in order to receive an indication of a preferred vehicle option. The connecting system may output a representation of the preferred vehicle option to a user device associated with the user. The connecting system may receive, from the user device and in response to outputting the representation, a confirmation of the preferred vehicle option. The connecting system may communicate with an application programming interface function, in response to the confirmation, to secure the preferred vehicle option.

IPC Classes  ?

  • G06Q 10/02 - Reservations, e.g. for tickets, services or events
  • G06F 3/04842 - Selection of displayed objects or displayed text elements
  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06Q 50/40 - Business processes related to the transportation industry
  • H04L 9/40 - Network security protocols

31.

STRUCTURED DOCUMENT GENERATION USING DIFFERENT EMBEDDING SPACE REGIONS

      
Application Number 18596206
Status Pending
Filing Date 2024-03-05
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Farnan, Tyler
  • Goodsitt, Jeremy
  • Mullen, Justin

Abstract

A method and related system for generating a document using different portions of an embedding space includes obtaining a related document based on a first text, generating first vectors in an embedding space based on the first text and second vectors in the embedding space based on the related document, and determining a first region in the embedding space based on the first vectors and a second region in the embedding space based on the second vectors. The method further includes generating a first portion of a structured document based on the first vectors and third vectors in a third region within the first region but not within the second region. The method further includes generating a second portion of the structured document based on the first and second vectors and the first portion of the structured document.

IPC Classes  ?

  • G06F 16/383 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
  • G06F 16/332 - Query formulation
  • G06F 16/35 - ClusteringClassification
  • H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference

32.

SYSTEMS AND METHODS FOR MODIFICATION OF MACHINE LEARNING MODEL-GENERATED TEXT AND IMAGES BASED ON USER QUERIES AND PROFILES

      
Application Number 18596946
Status Pending
Filing Date 2024-03-06
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Adcock, Lee
  • Freshcorn, Bryce
  • Chakraborty, Arindam

Abstract

Systems and methods for generating user-specific textual and image-based outputs corresponding to existing items, in response to user queries, are disclosed herein. For example, the system may receive a query that includes a textual description. The system may retrieve a user profile for a user associated with the query. Based on the query, the system may obtain a description of an item. Based on the query, the user profile, and the description, the system may generate an output and an image using a machine learning model. Based on the output and the image, the system may generate a graphical representation of the item. The system may receive a selection of the graphical representation of the item. Based on the selection of the graphical representation, the system may enable access to the first item.

IPC Classes  ?

33.

SYSTEMS AND METHODS FOR USER SELECTION OF MACHINE LEARNING MODEL-BASED RESULTS BASED ON USER QUERIES AND PROFILES

      
Application Number 18596996
Status Pending
Filing Date 2024-03-06
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Adcock, Lee
  • Freshcorn, Bryce
  • Chakraborty, Arindam

Abstract

Systems and methods for generating user-specific textual and image-based outputs, in response to a user query, for provision of a matching item are disclosed herein. For example, the system may receive a query that includes a textual description. The system may retrieve a user profile for a user associated with the query. Based on the query and the user profile, the system may generate outputs and images using a machine learning model. Based on the outputs, the system may generate graphical representations. The system may receive a selection of a graphical representation. Based on the selection of the graphical representation, the system may enable access to an item that corresponds to the graphical representation.

IPC Classes  ?

  • G06F 16/9538 - Presentation of query results
  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06N 3/0455 - Auto-encoder networksEncoder-decoder networks

34.

AUTHENTICATION BASED ON MULTIPLE LOCATIONS

      
Application Number 18597507
Status Pending
Filing Date 2024-03-06
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Seck, Mohamed
  • Sivakolundhu, Rekha
  • Vishnubhotla, Gayatri

Abstract

In some implementations, a user device may receive, from an authentication system, a first request for a location associated with the user device. The user device may transmit, to the authentication system, an indication of the location associated with the user device, in response to the first request. The user device may receive, from the authentication system, a second request for a location associated with a physical card. The user device may transmit a sequence, using short-range electromagnetic waves, to the physical card. The user device may monitor for a response from the physical card to determine the location associated with the physical card. The user device may transmit, to the authentication system, an indication of the location associated with the physical card, in response to the second request.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists

35.

TEXT MESSAGES FOR INTERACTING WITH INTEGRATED APPLICATION PROGRAMMING INTERFACES

      
Application Number 18597522
Status Pending
Filing Date 2024-03-06
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Seck, Mohamed
  • Rodriguez, Judith
  • Bennings, Danielle

Abstract

In some implementations, a user device may transmit a first text message that includes a first codeword. Accordingly, the user device may receive an indication of a first confirmation of a first request associated with the first text message. The user device may transmit a second text message that includes a second codeword. Accordingly, the user device may receive an indication of a second confirmation of a second request associated with the second text message.

IPC Classes  ?

  • G06Q 30/0207 - Discounts or incentives, e.g. coupons or rebates
  • G06F 9/54 - Interprogram communication
  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices

36.

EMAIL MESSAGE PROCESSING FOR FORM AUTO-COMPLETION

      
Application Number 18597539
Status Pending
Filing Date 2024-03-06
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Seck, Mohamed
  • Rodriguez, Judith

Abstract

In some implementations, a processing system may receive a plurality of email messages from an email service. The processing system may provide the plurality of email messages to a classification model in order to receive an indication of at least one relevant email message in the plurality of email messages. The processing system may extract, from the at least one relevant email message, a snippet corresponding to a field in the form. The processing system may generate a draft copy of the form that includes the snippet in the field and may output, to a user device, an indication that the snippet was added to the form.

IPC Classes  ?

  • G06F 40/174 - Form fillingMerging
  • H04L 51/42 - Mailbox-related aspects, e.g. synchronisation of mailboxes

37.

AUTOMATED ASSESSMENT OF SOFTWARE-AS-A-SERVICE PLATFORMS

      
Application Number 18597552
Status Pending
Filing Date 2024-03-06
First Publication Date 2025-09-11
Owner Capital One Services LLC (USA)
Inventor
  • Hamayun, Azhar
  • Mustahseen, Rashique Mir
  • Ashok Kumar, Sreenarayan

Abstract

In some implementations, a user device may transmit, to an assessment system, a request to onboard a software-as-a-service (SaaS) platform. The user device may receive, from the assessment system, a set of responses to a set of questions associated with the SaaS platform. The user device may further receive, from the assessment system, a report including a set of risk scores. The set of risk scores may be calculated from the set of responses (e.g., by the assessment system). The user device may transmit a command to onboard the SaaS platform based on the set of risk scores.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

38.

SYSTEMS AND METHODS FOR CUSTOMIZING A MACHINE LEARNING MODEL

      
Application Number 18597577
Status Pending
Filing Date 2024-03-06
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Das, Anirban
  • Naphade, Milind
  • Chaturvedi, Isha
  • Savas, Nurtekin
  • Sorower, Mohammad
  • Chitsazan, Nima
  • Yu, Qi
  • Zhu, Chenyang
  • Huang, William

Abstract

Systems and methods for customizing a machine learning model for responding to a user query. The system receives a user query from a user of a conversational program. The system determines a set of model requirements for a first machine learning model. Based on the set of model requirements, the system determines first supplemental data corresponding to the required input data and a formatting requirement corresponding to an activation pattern. The system performs pre-processing to obtain the first supplemental data from a first supporting software program and generates the first response using the first machine learning model.

IPC Classes  ?

39.

LOADING CONTENT USING CONFIGURATION-BASED TEMPLATES

      
Application Number 18599621
Status Pending
Filing Date 2024-03-08
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor Dasa, Venkata Sudharsan

Abstract

In some implementations, a device may receive, from a user device associated with an entity, a request identifying a content unit that is to be loaded into an electronic document. The device may transmit, via a first service, a configuration request for configuration data for the content unit. The device may receive, via the first service, the configuration data. The device may transmit, via a second service, a data request for entity-specific data for the content unit. The device may receive, via the second service, the entity-specific data. The device may transmit, for the user device, a response indicating presentation data to cause insertion of the content unit, in accordance with the presentation data, into a document object model of the electronic document, where the presentation data is based on the configuration data and the entity-specific data.

IPC Classes  ?

40.

CONTENT STAGE TRANSITIONING BASED ON INACTIVE DISPLAY

      
Application Number 18599828
Status Pending
Filing Date 2024-03-08
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor Tamayo, Bryan

Abstract

In some implementations, a content stage transitioning system may receive content interaction data, associated with a content stage of a plurality of content stages, that satisfies one or more content interaction conditions. The content stage transitioning system may receive an indication that a display associated with the content stage is inactive. The content stage transitioning system may transmit, based on the one or more content interaction conditions being satisfied and the display being inactive, an indication to transition to another content stage of the plurality of content stages.

IPC Classes  ?

  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
  • G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance

41.

SINGLE OPERATION IDENTIFICATION

      
Application Number 18600307
Status Pending
Filing Date 2024-03-08
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Tamayo, Bryan
  • Iannuzzi, Dale

Abstract

In some implementations, a system may obtain operation data associated with a plurality of operations assigned to a user. The system may compute a plurality of operation metrics based on the operation data, each operation metric in the plurality of operation metrics corresponding to a respective operation in the plurality of operations. The system may identify a single operation of the plurality of operations based on the plurality of operation metrics. The system may cause a user interface to be displayed, wherein the user interface includes an indication of the single operation, wherein the user interface does not include an indication associated with any other operation from the plurality of operations.

IPC Classes  ?

  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations

42.

OPTIMIZING VIRTUALIZED NODE SELECTION

      
Application Number 18600565
Status Pending
Filing Date 2024-03-08
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Segner, Brent
  • Stern, Andrew
  • Schutt, Mark O.
  • Ely, John

Abstract

In some implementations, a device may obtain telemetry data associated with the cloud computing environment, wherein the telemetry data indicates one or more processing parameters of an application deployed in the cloud computing environment via a current virtualized node. The device may determine, for the application, a processing capacity utilization score of the application. The device may determine, based on the processing capacity utilization score and the one or more processing parameters, one or more recommended virtualized nodes from one or more virtualized nodes associated with the cloud computing environment. The device may perform an action associated with a selection of an operating virtualized node for the application from the current virtualized node and the one or more recommended virtualized nodes.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

43.

SYSTEMS AND METHODS FOR TESTING SOFTWARE PROGRAMS

      
Application Number 18601756
Status Pending
Filing Date 2024-03-11
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Rashid, Shahryar
  • Eringis, Alex

Abstract

Systems and methods for customizing the testing process of a software program. In some aspects, the system receives a set of requirements for a software program, including logical rules linking input values to output values of the software program. The system receives a set of failure types that correspond to previous deviations from the logical rules in the set of requirements. Based on the set of failure types and the set of requirements, the system generates a configuration file, including fixtures and validations, where the fixtures and validations describe logical relations between intermediate states of the software program during execution. Based on the configuration file, the system generates a plurality of test cases, including parameters and endpoints. Using the plurality of test cases, the system regulates the software program to produce output values from input values in accordance with the set of requirements.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

44.

CONTACTLESS CARD-BASED AUTHENTICATION VIA WEB-BROWSER

      
Application Number 19015976
Status Pending
Filing Date 2025-01-10
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Wieker, Jeffrey Carlyle
  • Moreton, Paul Y.

Abstract

A computer-implemented method to enable short-range wireless communication via a webpage on a computing device includes receiving, via a web-browser executing on the computing device, from the webpage, a first request to execute a computer-executable instruction, the computer-executable instruction requests data from an enterprise server. The method also includes triggering, in response to a second request from the enterprise server to authenticate the first request, the web-browser to execute a predetermined computer program. The method also includes scanning, by the predetermined computer program a cryptogram from a contactless card to authenticate the cryptogram and cause the enterprise server to send the data. The method also includes executing, via the web-browser, the computer-executable instruction from the first request in response to receiving the data sent by the enterprise server.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

45.

SYSTEM AND METHOD FOR MANAGING A NETWORK OF CASH SERVICE MACHINES

      
Application Number 19214535
Status Pending
Filing Date 2025-05-21
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Phillips, Jeremy
  • Joshi, Aditya

Abstract

In a method of processing a cash transaction, a transaction processing system receives an account transaction request identifying a user account and a cash transaction to be carried out using a cash service machine (CSM). A set of CSMs available for processing the account transaction request is determined and a list of available CSMs is transmitted to the requesting user device. A request to process the transaction including an identification of a selected CSM is received the user device or the selected CSM. A unique authentication code is generated and transmitted to the processing requester. The transaction processing system receives from the non-process requester, an authentication request including a purported authentication code. The system then verifies that the purported authentication code matches the unique authentication code. Upon positive verification, the system transmits an instruction to the CSM to carry out a cash exchange according to the requested account transaction.

IPC Classes  ?

  • G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 40/02 - Banking, e.g. interest calculation or account maintenance

46.

SYSTEMS AND METHODS FOR SCALABLE CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS

      
Application Number 19216299
Status Pending
Filing Date 2025-05-22
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Osborn, Kevin
  • Edwards, Samuel Patrick

Abstract

Systems and methods for authentication may include an authentication server. The authentication server may include a processor and a memory. The processor may be configured to transmit an authentication request. The processor may be configured to receive a first response that is responsive to the authentication request, the first response comprising a first cryptogram. The processor may be configured to generate a first challenge based on the first response. The processor may be configured to encrypt the first challenge with a symmetric key. The processor may be configured to transmit the first challenge receive a second response that is responsive to the first challenge, the second response comprising a second cryptogram. The processor may be configured to authenticate the second response.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/40 - Network security protocols

47.

SYSTEMS AND METHODS FOR AUTHENTICATION USING PARTITIONED AUTHENTICATION TOKENS

      
Application Number 19217163
Status Pending
Filing Date 2025-05-23
First Publication Date 2025-09-11
Owner Capital One Services, LLC (USA)
Inventor
  • Rafferty, Galen
  • Sharpe, Samuel
  • Barr, Brian
  • Goodsitt, Jeremy
  • Walters, Austin

Abstract

Disclosed embodiments may include a method for authentication using partitioned authentication tokens. The system can receive an indication of a first and second user device associated with a user. The indication can include a priority order of the first and second user device. The system can then receive an authentication request associated with the user from an application. The system can generate an authentication token to authenticate the user and partition the authentication token to create a first token portion and a second token portion. The system can determine which device of the first and second user device has a higher priority based on the priority order and can transmit the first token portion and the second token portion to the devices in order of priority. The system can receive a receipt of the token portions and transmit instructions to the application to authenticate the user.

IPC Classes  ?

48.

SYSTEMS AND METHODS FOR DETERMINING EFFECTIVENESS OF DATA LOSS PREVENTION TESTING

      
Application Number 18591019
Status Pending
Filing Date 2024-02-29
First Publication Date 2025-09-04
Owner Capital One Services, LLC (USA)
Inventor
  • Wolkiser, David
  • Kent, Alexander
  • Flaherty, Kyle

Abstract

Disclosed embodiments may include a method for determining effectiveness of data loss prevention testing. The system may include one or more processors, and memory in communication with the one or more processors and storing instructions that, when executed by the one or more processors, are configured to cause the system to receive data loss prevention (DLP) sample test data, run a plurality of DLP tests utilizing the DLP sample test data, and identify, for each data element type of a plurality of data element types, an inherent risk measure associated with the data type element. Then, after receiving DLP test results, determine a plurality of data element type-channel effectiveness measures and a plurality of residual risk measures, and output the plurality of residual risk measures for display via a graphical user interface of a user device.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

49.

SYSTEMS AND METHODS FOR AUTOMATED GENERATIVE DATA LOSS PREVENTION TESTING

      
Application Number 18591190
Status Pending
Filing Date 2024-02-29
First Publication Date 2025-09-04
Owner Capital One Services, LLC (USA)
Inventor
  • Flaherty, Kyle
  • Jaffri, Humza
  • Fox, John
  • Schenkein, Scott Jason
  • Hall, Katherine
  • Dasilva, David

Abstract

Disclosed embodiments may include a method for automated generative data loss prevention testing. The system may include one or more processors, and memory in communication with the one or more processors and storing instructions that, when executed by the one or more processors, are configured to cause the system to receive an instruction to perform data exfiltration prevention testing, select one or more data element types and one or more data channels, and select, based on the one or more data element types, one or more test data generation programs from a plurality of test data generation programs. In some embodiments, the memory can be further configured to cause the system to generate and utilize a set of test data to conduct data exfiltration prevention testing. The data exfiltration prevention testing can be conducted by executing one or more transfers and monitoring the one or more data channels.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

50.

SYSTEMS AND METHODS FOR MONITORING EXTERNAL DATA SHARING

      
Application Number 18592071
Status Pending
Filing Date 2024-02-29
First Publication Date 2025-09-04
Owner Capital One Services, LLC (USA)
Inventor
  • Kulshreshtha, Shitij
  • Beharry, Richard
  • Biswal, Biswajit
  • Ghosh, Abhishek
  • Weaver, David James
  • Jitta, Ramesh

Abstract

Systems and methods for monitoring external data sharing are provided and can be used to detect drift in metadata of a data share, volume and frequency anomalies, and/or drift in attribute level data. For example, some methods can include receiving baseline metadata and transmission details for a data transmission and determining whether there is conformity therebetween. Some methods can include receiving historical volume and frequency data, identifying a data transmission for external transmission, and determining whether a volume of the data transmission conforms with the historical volume and frequency data and whether a time at which the data transmission is transmitted or scheduled to be transmitted to a third party conforms with the historical volume and frequency data. Some methods can include receiving design time data, identifying a data transmission for external transmission, and determining whether runtime data for the data transmission conforms with the design time data.

IPC Classes  ?

  • H04L 67/53 - Network services using third party service providers
  • H04L 9/40 - Network security protocols
  • H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
  • H04L 67/561 - Adding application-functional data or data for application control, e.g. adding metadata

51.

SELECTIVE PRUNING OF CANDIDATE LOAD-BALANCING SERVERS

      
Application Number 18594705
Status Pending
Filing Date 2024-03-04
First Publication Date 2025-09-04
Owner Capital One Services, LLC (USA)
Inventor Everson, Richard

Abstract

In some implementations, a load-balancing system may identify one or more computational tasks. The load-balancing system may identify a plurality of candidate servers in a load-balancing server pool. The load-balancing system may identify one or more servers by selectively pruning the plurality of candidate servers. The load-balancing system may assign the one or more computational tasks to the one or more servers.

IPC Classes  ?

  • H04L 67/1012 - Server selection for load balancing based on compliance of requirements or conditions with available server resources
  • H04L 67/1008 - Server selection for load balancing based on parameters of servers, e.g. available memory or workload

52.

DYNAMIC TRANSACTION CARD PROTECTED BY MULTI-FACTOR AUTHENTICATION

      
Application Number 19209423
Status Pending
Filing Date 2025-05-15
First Publication Date 2025-09-04
Owner Capital One Services, LLC (USA)
Inventor
  • Locke, Tyler
  • Kelly, Kevin

Abstract

A dynamic transaction card comprising an outer surface, a sensor, and a display disposed on the outer surface is disclosed. The dynamic transaction card can include an antenna and a microcontroller controlling a dynamic transaction card application. The dynamic transaction card can also include a secure payment chip having a plurality of contact points and storing a passive tag associated with a user. The passive tag can include a unique identifier and one or more log-in credentials for the user. When making a purchase, the user can be authenticated via a connection between the dynamic transaction card and a user device. The unique identifier can be used as an authentication token and the one or more log-in credentials can be verified against log-in credentials associated with the user.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
  • G06Q 20/38 - Payment protocolsDetails thereof

53.

SEARCHABLE INDEX ENCRYPTION

      
Application Number 19210333
Status Pending
Filing Date 2025-05-16
First Publication Date 2025-09-04
Owner Capital One Services, LLC (USA)
Inventor Sundaram, Dinesh

Abstract

Auditing data containing sensitive data are stored in a data structure comprising data objects. Each data object comprises one or more pairs of a name and a value. Pairs that are flagged or identified as containing sensitive data are partially encrypted; the value is encrypted using an asymmetric key and the name corresponding to the encrypted value remains unencrypted. Some pairs that are not flagged or identified as containing sensitive data are left unencrypted. Unencrypted data may be stored in the partially encrypted auditing data as plain text. The auditing data may be analyzed to generate business metrics and identify application errors. The auditing data may also be queried, and data objects containing unencrypted pairs and/or partially encrypted pairs may be returned based on matching unencrypted names and/or values to the data query.

IPC Classes  ?

  • G06Q 10/10 - Office automationTime management
  • G06F 8/65 - Updates
  • G06F 8/71 - Version control Configuration management
  • G06F 9/445 - Program loading or initiating
  • G06F 9/54 - Interprogram communication
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
  • G06F 18/24 - Classification techniques
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/60 - Protecting data
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 40/103 - Formatting, i.e. changing of presentation of documents
  • G06F 40/174 - Form fillingMerging
  • G06F 40/18 - Editing, e.g. inserting or deleting of tablesEditing, e.g. inserting or deleting using ruled lines of spreadsheets
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • G06N 3/02 - Neural networks
  • G06N 5/025 - Extracting rules from data
  • G06N 20/00 - Machine learning
  • G06Q 20/38 - Payment protocolsDetails thereof
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 30/018 - Certifying business or products
  • G06Q 30/0201 - Market modellingMarket analysisCollecting market data
  • G06Q 30/0601 - Electronic shopping [e-shopping]
  • G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
  • G06Q 40/03 - CreditLoansProcessing thereof
  • G06Q 50/26 - Government or public services
  • H04L 9/08 - Key distribution
  • H04L 9/40 - Network security protocols

54.

ELECTRONIC PROFILE AND DATA SECURITY ENFORCEMENT WITH USER DEVICE DATA AND METHODS OF USE THEREOF

      
Application Number 19210956
Status Pending
Filing Date 2025-05-16
First Publication Date 2025-09-04
Owner Capital One Services, LLC (USA)
Inventor
  • Edwards, Joshua
  • Mossoba, Michael
  • Benkreira, Abdelkader M'Hamed

Abstract

Systems and methods of the present disclosure include computer systems for improving data security. To do so, an authorization request associated with a user profile is received, including a time-stamp for a profile activity, a profile identifier, and a value. Application analytics data for a software application on a user device associated with the user profile is accessed, including an open event indicator indicating a time of a loading, and a close event indicator indicating a time of a termination. An open period of the software application at the time-stamp is determined based on the application open event indicator and the application close event indicator. A reduced set of fraud checks is selected and executed when the time-stamp associated with the profile activity is within the open period of the software application. A fraud determination is generated, and an authorization notification is generated based on the fraud determination.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/20 - Point-of-sale [POS] network systems
  • G06Q 20/38 - Payment protocolsDetails thereof

55.

SYSTEMS AND METHODS FOR RECOMMENDED SORTING OF SEARCH RESULTS FOR ONLINE SEARCHING

      
Application Number 19211518
Status Pending
Filing Date 2025-05-19
First Publication Date 2025-09-04
Owner Capital One Services, LLC (USA)
Inventor
  • Raj, Rohan Vimal
  • Kidwai, Shamoon
  • Coen, Cole
  • Bothra, Aniketh Bothra Anoopchand

Abstract

A method may include receiving data related to a plurality of items and processing the data using a machine learning model. The machine learning model may have been trained to output a score for each of the plurality of items based on one or more target variables and to process the data using a grouped linear regression for groups of items based on sub-divisions of the groups. The method may include storing the output in a data store. Each entry in the data store may include at least an item identifier for an item, a group name, and the score. The method may include receiving search criteria for a search and identifying a set of search results in a group of items. The method may include determining an order of the set of search results and outputting the set of search results.

IPC Classes  ?

56.

FRONT-END MICRO-SERVICES THAT PROVIDE DATA CONSISTENCY

      
Application Number 18593475
Status Pending
Filing Date 2024-03-01
First Publication Date 2025-09-04
Owner Capital One Services, LLC (USA)
Inventor
  • Morrison, Mark
  • Vanderslice, Jason
  • Veeraraghavan, Preetha
  • Unal, Erol

Abstract

In some implementations, a user device may receive, from a web host, code associated with at least one webpage. The user device may initiate a plurality of instances of a micro-service using the code. The user device may perform a single application programming interface (API) call for a first instance in the plurality of instances. A response from the single API call is shared with remaining instances in the plurality of instances. The user device may render a plurality of web elements, corresponding to the plurality of instances, using the code and the response from the single API call. The user device may output the at least one webpage, including the plurality of web elements, to a user.

IPC Classes  ?

  • G06F 16/957 - Browsing optimisation, e.g. caching or content distillation

57.

STATELESS WEB ELEMENTS THAT DECODE OR DECRYPT DATA

      
Application Number 18593483
Status Pending
Filing Date 2024-03-01
First Publication Date 2025-09-04
Owner Capital One Services,, LLC (USA)
Inventor
  • Unal, Erol
  • Vanderslice, Jason
  • Morrison, Mark
  • Veeraraghavan, Preetha

Abstract

In some implementations, a user device may receive, from a web host, code associated with a webpage. The user device may perform, using a host application, at least one call to an application programming interface (API) function on behalf of a stateless web element in the webpage. The user device may receive, in response to the at least one call to the API function, encoded data. The user device may pass the encoded data to a stateless web element for decoding. The user device may output a rendered webpage with the stateless web element including a decoded version of the encoded data.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

58.

Transaction Card Assembly

      
Application Number 19202986
Status Pending
Filing Date 2025-05-08
First Publication Date 2025-09-04
Owner Capital One Services, LLC (USA)
Inventor
  • Atkins, Phoebe
  • Vadrevu, Vyjayanthi
  • Saia, Michael

Abstract

A modular transaction card assembly includes a card frame having the traditional dimensions of a credit card, and a transaction card that is smaller than a traditional card and that fits into a receptacle of the card frame. Each of the card frame and the transaction card may be capable of performing contactless data transactions individually. The combined assembly of the card frame with the transaction card secured in the receptacle is also capable of performing contact data transactions, and in some instances, with an identifier that is distinct from the card frame or the transaction card alone. The card frame may include a processor enabling it to perform data encryption and authentication of the smaller transaction card.

IPC Classes  ?

  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier

59.

REJECTION OF IMPERMISSIBLE DOCUMENTS

      
Application Number 18584393
Status Pending
Filing Date 2024-02-22
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Franklin, Keegan
  • Brighter, James
  • Obrien, Megan
  • Maillett, John
  • Justiz, Jane

Abstract

A computer implemented method, system and non-transitory computer-readable device for a remote deposit environment activating, on a client device, a financial application, wherein the financial application is configured to instantiate a customer interface (UI) on the client device. Upon receiving a customer request, based on interactions with the UI, the method implements an electronic deposit of a financial instrument by generating a live stream of image data of a field of view of at least one camera, wherein the live stream of image data includes imagery of at least a portion of the financial instrument, determining, based on the live stream of image data and a machine learning model (ML), an impermissibility score of the financial instrument and, based on exceeding a selectable threshold of the impermissibility score, modifying a status of the remote deposit to pause or terminate the remote deposit.

IPC Classes  ?

  • G06Q 20/04 - Payment circuits
  • G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06V 30/10 - Character recognition
  • G06V 30/40 - Document-oriented image-based pattern recognition

60.

SYSTEMS AND METHODS FOR GENERATING DIRECTIONAL INFORMATION

      
Application Number 18585239
Status Pending
Filing Date 2024-02-23
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Rapowitz, Samuel
  • Maiman, Tyler
  • Martinez Stone, Armando

Abstract

Systems and methods for generating directional information, including detecting an occurrence of a first trigger event, upon detecting the occurrence of the first trigger event, generating a first search query based on a predicted object, determining a target object based on the first search query, determining a recommended navigation path to the target object, generating a first graphical user interface (GUI) based on the recommended navigation path, and causing to display the first GUI.

IPC Classes  ?

  • G06F 16/954 - Navigation, e.g. using categorised browsing
  • G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

61.

SYSTEMS AND METHODS FOR AUTOMATED CREATION OF TRANSACTION CLEANSING OVERRIDES

      
Application Number 18589538
Status Pending
Filing Date 2024-02-28
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Pai, Aditya
  • Wang, Hao
  • Mcmillan, Allison Fenichel

Abstract

Disclosed embodiments may include a method for automated creation of transaction cleansing overrides. The system may include one or more processors, and memory in communication with the one or more processors and storing instructions that, when executed by the one or more processors, are configured to cause the system to receive a communication from a card holder via one of one or more communication channels and analyze the communication using a first machine learning model to determine an identity of the card holder, detect a mislabeled name, and detect a temporal indicator. In some embodiments, the mislabeled name and the temporal indicator are associated with a transaction. In some embodiments, the memory can be further configured to cause the system to detect card holder records and raw data associated with the transaction; generate a key based on the raw data; and alter an override list to add the key.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/38 - Payment protocolsDetails thereof

62.

SYSTEMS AND METHODS FOR AUTHENTICATING DATA

      
Application Number 18590328
Status Pending
Filing Date 2024-02-28
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Martinez Stone, Armando
  • Choi, Ashleigh
  • Yee, Bryant

Abstract

Disclosed is a method that may include receiving, at a remote device, a detection by a first electronic application operating on a user device, an interaction between a user of the user device and an entity via a second electronic application. The method may include determining that the interaction between the user and the entity is reviewable based on first interaction data. Upon determining that the interaction between the user and the entity is reviewable, the method may further include causing the first electronic application to prompt the user to enter second interaction data including a user review of the entity associated with the detected interaction. The method may include determining that the user review of the entity is authentic based on a classification model, the first interaction data and the second interaction data being input to the classification model.

IPC Classes  ?

  • G06Q 30/0282 - Rating or review of business operators or products

63.

SYSTEMS AND METHODS OF SECURE MERCHANT PAYMENT OVER MESSAGING PLATFORM USING A CONTACTLESS CARD

      
Application Number 19074031
Status Pending
Filing Date 2025-03-07
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Osborn, Kevin
  • Rule, Jeffrey
  • Ilincic, Rajko

Abstract

A method is provided including receiving, by a server from a user device, a cryptogram of a contactless card, wherein the user device receives a payment request message from a merchant device, and the user device receives the cryptogram from a contactless card upon tapping the contactless card to the user device. The method further includes validating and decrypting, by the server, the cryptogram, extracting, by the server, from the decrypted cryptogram a unique customer identifier associated with the user, and verifying, by the server, the unique customer identifier. The method further includes retrieving, by the server from a database, account information of the user, calling, by the server, one or more application programming interfaces (APIs) of the merchant device to make a payment in response to the payment request message, and provisioning, by the server, the account information to the merchant device via the APIs.

IPC Classes  ?

  • G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
  • G06F 9/54 - Interprogram communication
  • G06Q 20/38 - Payment protocolsDetails thereof
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists

64.

MANAGED VIDEO CAPTURE

      
Application Number 19075882
Status Pending
Filing Date 2025-03-11
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor Kinsey, Timothy

Abstract

A computer implemented method, system, and non-transitory computer-readable device that may be used in a remote deposit environment. Upon receiving a user request, based on interactions with the UI, the method implements an electronic deposit of a financial instrument by activating a camera on the client device to generate a live video stream of image data of a field of view of at least one camera, wherein the live video stream includes imagery of at least a portion of each side of the financial instrument. The method continues by extracting data fields based on the formation of image objects of each side of the financial instrument from the live video stream of image data. Based on a shape or a shape rate of change of the financial instrument, a flip detection pauses the forming of image objects during the flip.

IPC Classes  ?

  • G06V 30/10 - Character recognition
  • G01S 17/89 - Lidar systems, specially adapted for specific applications for mapping or imaging
  • G06T 7/20 - Analysis of motion
  • G06T 7/70 - Determining position or orientation of objects or cameras
  • H04N 21/2187 - Live feed

65.

INSTANT OPTICAL CHARACTER RECOGNITION DURING UPLOAD PROCESS

      
Application Number 19182749
Status Pending
Filing Date 2025-04-18
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Franklin, Keegan
  • Gregory, Christopher
  • Ellis, Keane
  • Brighter, James
  • Maillett, John
  • Schott, Suranya Jayan
  • Gonzalez, Karin
  • Dong, Xinfeng
  • Hung, Charlie

Abstract

Systems for performing instant optical character recognition (OCR) of documents to be uploaded to a server process for allowing mid-stream adjustments during the document upload process are disclosed. A system may include a mobile device with a document upload application and a backend system to which a document is to be uploaded. The backend system may initiate the OCR process automatically upon receiving images of documents to be uploaded and provide options to the document upload application for managing the upload process based on the results of the OCR process.

IPC Classes  ?

  • H04N 1/00 - Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmissionDetails thereof
  • G06V 10/94 - Hardware or software architectures specially adapted for image or video understanding
  • G06V 30/19 - Recognition using electronic means
  • H04N 1/32 - Circuits or arrangements for control or supervision between transmitter and receiver

66.

ENABLING A FUNCTION OF AN APPLICATION BASED ON A CHARACTERISTIC OF A USER DEVICE

      
Application Number 19205517
Status Pending
Filing Date 2025-05-12
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Aggarwal, Karn
  • Walker, Keith

Abstract

In some implementations, a user device may receive, from a user of the user device, a request to initiate an application session that is associated with an application. The user device may provide, to a server device based on receiving the request, an optical code associated with the server device establishing the application session. The user device may output the optical code via an output component. The user device may receive, from the server device, a notification that an agent device has joined the application session via a scan of the optical code from the output component. The user device may enable a function of the application based on the notification indicating that the agent device is capable of facilitating a service via the application session, wherein the service is associated with the function.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light

67.

RESTRICTING ACCESS BASED ON VOICE COMMUNICATION PARAMETERS

      
Application Number 19207323
Status Pending
Filing Date 2025-05-13
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Smith-Rose, Asher
  • Maiman, Tyler
  • Cheng, Lin Ni Lisa
  • Shah, Salik

Abstract

Methods and systems are described herein for manipulating a communication acceptance screen, manipulating an interactive communication acceptance icon, and restricting access to accounts based on voice communication parameters. In particular, when a communication is detected from one device to another device, that communication may be risky. Thus, the risk is mitigated by giving a user information about the source of the communication to give a user a chance to reject the communication. In addition, in instances where the user accepts the communication, the system enables monitoring the communication and restricting any accounts that are disclosed within the communication.

IPC Classes  ?

  • H04M 1/663 - Preventing unauthorised calls to a telephone set
  • G10L 15/26 - Speech to text systems
  • H04M 1/57 - Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
  • H04M 1/72469 - User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
  • H04M 3/42 - Systems providing special services or facilities to subscribers
  • H04M 3/436 - Arrangements for screening incoming calls

68.

MANAGED VIDEO CAPTURE

      
Application Number US2025013120
Publication Number 2025/178718
Status In Force
Filing Date 2025-01-27
Publication Date 2025-08-28
Owner CAPITAL ONE SERVICES, LLC (USA)
Inventor Kinsey, Timothy

Abstract

A computer implemented method, system, and non-transitory computer-readable device that may be used in a remote deposit environment. Upon receiving a user request, based on interactions with the UI, the method implements an electronic deposit of a financial instrument by activating a camera on the client device to generate a live video stream of image data of a field of view of at least one camera, wherein the live video stream includes imagery of at least a portion of each side of the financial instrument. The method continues by extracting data fields based on the formation of image objects of each side of the financial instrument from the live video stream of image data. A flip detection pauses the forming of image objects during the flip. The extracted data fields are communicated to a remote deposit server to complete the remote deposit.

IPC Classes  ?

  • G06Q 20/04 - Payment circuits
  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices

69.

DYNAMIC IDENTITY PROOFING

      
Application Number 18584066
Status Pending
Filing Date 2024-02-22
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Wieker, Jeffrey Carlyle
  • Delwar, Tariq

Abstract

Systems as described herein may implement a mechanism for dynamic identity proofing. A dynamic identity proofing system may receive first user input information and browser information from a user device conducting a transaction with an interaction entity. The system may determine a risk score indicating a likelihood the transaction is fraudulent. Based on the risk score exceeding a threshold value, the system may use a machine learning model to determine confirmative information to lower the risk score. The system may cause display of one or more web elements on the checkout page prompting for the confirmative information. The system may determine an updated risk score based on second user input information responsive to the confirmative information. Accordingly, if the updated risk score does not exceed the threshold value, the system may cause the checkout page to be automatically populated with additional secure information.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards

70.

Systems and Methods for Dynamically Manipulating Data

      
Application Number 18586724
Status Pending
Filing Date 2024-02-26
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Sidler, Kathryn Marie
  • Garrigan, Michael

Abstract

Disclosed embodiments may include a method for dynamically manipulating data. The method may include receiving, via a first graphical user interface, a first indication from the user device indicating a first selection of first input data and receiving or retrieving, using the input template, the first input data. Then the method may include receiving, via a second graphical user interface, a second indication from the user device indicating one or more selected assumption templates and receiving, via a third graphical user interface, a third indication from the user device indicating a selected output configuration. The method may then include calculating the data analysis using the one or more selected assumption templates and the first input data from the input template and outputting the data analysis according to the third indication from the user device using the selected output configuration.

IPC Classes  ?

  • G06F 9/451 - Execution arrangements for user interfaces
  • G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials

71.

SYSTEMS AND METHODS FOR DYNAMICALLY AUTOMATING SUBMISSIONS

      
Application Number 18586798
Status Pending
Filing Date 2024-02-26
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Danna, Russell
  • Dunnigan, Robert
  • Garner, Michael

Abstract

Disclosed embodiments may include a method for dynamically automating submissions. The method may include receiving tabular data and one or more associations of columns from the tabular data to fields on a webpage for one or more submissions, and extracting column data from the tabular data, determining, using a first machine learning model, one or more suggested associations for the fields on the webpage based on data types for the fields, and determining, using a second machine learning model, one or more suggested associations for the fields based on column names of the extracted column data. In response to determining one or more suggested associations, sending to a user device the one or more suggested associations, receiving, from the user device, accepted suggested associations; and transmitting one or more submissions for each row in the tabular data using the one or more suggested associations and the accepted suggested associations.

IPC Classes  ?

  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
  • G06F 40/18 - Editing, e.g. inserting or deleting of tablesEditing, e.g. inserting or deleting using ruled lines of spreadsheets

72.

SYSTEMS AND METHODS FOR REAL TIME MONITORING OF CLOUD RESOURCES

      
Application Number 18587776
Status Pending
Filing Date 2024-02-26
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Ceesay, Ebrima N.
  • Mansour, Nesreen
  • Xu, Tao
  • Koka, Siva Prasad

Abstract

Disclosed embodiments may include a method for systems and methods for real time monitoring of cloud resources. The system may include one or more processors, and memory in communication with the one or more processors and storing instructions that, when executed by the one or more processors, are configured to cause the system to receive an indication of a code update to source code at a source code repository and that the second set of source code has been deployed to a cloud infrastructure. In some embodiments, receive an alert associated with an event at an alerting resource, identify one or more interrelated resources, and communicate with the cloud infrastructure to obtain a snapshot of resource states. In other embodiments, the memory can be further configured to cause the system to identify a previous update to source code, generate aggregated alert information, and determine a rectification action.

IPC Classes  ?

  • H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
  • G06F 8/71 - Version control Configuration management
  • H04L 41/14 - Network analysis or design

73.

Machine Learning Framework for Human Data Detection

      
Application Number 18589013
Status Pending
Filing Date 2024-02-27
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Tan, Bozhao
  • Moghaddam, Mohammadamin Dashti
  • Mehrabadi, Milad Asgari
  • Ghaseri, Maryam
  • Li, Shiyong
  • Mosaliganti, Kishore
  • Anderson, Dave
  • Cassell, Brandi
  • Hudson, Robert
  • Borera, Eddy
  • Gupta, Ashish Prasad

Abstract

Methods, systems, and apparatuses are described herein for detecting human data. A machine learning model may be trained to predict, based on an input vector representing a column name, whether the column name corresponds to human data. A computing device may process, using a fuzzy string-matching algorithm, a column name to determine if the column name corresponds to one or more known human data categories. If the fuzzy string-matching algorithm does not find a match, an expanded column name might be generated by mapping the column name to a vector space using a transformer model. That expanded column name may be provided to one or more input nodes of the trained machine learning model and, based on output from the trained machine learning model, the computing device may store metadata, associated with the first column, that indicates whether the first column comprises human data.

IPC Classes  ?

  • G06N 3/0455 - Auto-encoder networksEncoder-decoder networks

74.

CLOUD SERVICE-BASED SECURED DATA WORKFLOW INTEGRATION AND METHODS THEREOF

      
Application Number 19061697
Status Pending
Filing Date 2025-02-24
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Chandra, Niharendu
  • Adams, Luke

Abstract

The present disclosure includes systems and methods enabling secure workflows by receiving an electronic event authentication message from an initiator device, where the electronic event authentication message comprises a user profile identifier, and an entity identifier. A first device-specific actions-sequence token is generated for an actions-sequence session to execute a device-specific instance of at least one automated processing actions-sequence. A workflow request message is received from the initiator device that includes the user profile identifier and the entity identifier, and a second device-specific actions-sequence token is generated. Where the first and second device-specific actions-sequence tokens match, the actions-sequence session is executed and a criterion update in response to the actions-sequence session is produced. The criterion update may then be transmitted to the initiator device.

IPC Classes  ?

75.

METHODS AND SYSTEMS FOR MOBILE BROWSER CODE TESTING

      
Application Number 19194854
Status Pending
Filing Date 2025-04-30
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Herren, Gregory
  • Giardina, Joseph
  • Jurkowski, Kevin

Abstract

Disclosed are methods, systems, and non-transitory computer-readable medium for mobile browser code testing. For instance, the method may include monitoring, using a mobile application, a user interaction with the mobile application to detect a mobile browser being launched; responsive to detecting the mobile browser being launched, launching, using the mobile application, a browser user interface within the mobile application and monitoring a mobile browser session to detect a user accessing a website from a plurality of websites; responsive to detecting the user accessing the website, injecting, using the mobile application, a script into a current web page of the website in the mobile browser; testing, using the mobile browser, codes using the script in the current web page; and updating, using the mobile application, the browser user interface with a result of testing.

IPC Classes  ?

  • G06F 11/3668 - Testing of software
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06Q 30/0207 - Discounts or incentives, e.g. coupons or rebates

76.

COMPUTER-BASED PLATFORMS AND SYSTEMS CONFIGURED TO ENHANCE A CALL SCREEN WITH USER-CONTROLLED NOTES ASSOCIATED WITH THE CALL AND METHODS OF USE THEREOF

      
Application Number 19197671
Status Pending
Filing Date 2025-05-02
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Maiman, Tyler
  • Cheng, Lin Ni Lisa
  • Smith-Rose, Asher
  • Kousha, Shabnam
  • Edwards, Joshua

Abstract

In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a permission from the user to monitor a plurality of activities executed within the computing device; continually monitoring the plurality of activities executed within the computing device for a predetermined period of time; identifying an indication of an incoming interaction session within the predetermined period of time; verifying at least one session interaction parameter associated with the incoming interaction session to identify the incoming interaction session as a repeat interaction session; dynamically retrieving at least one relation-specific notation from a plurality of relation-specific notations to display; instructing an input GUI element to display input data associated with the repeat interaction; automatically updating the plurality of relation-specific notations associated with the historical data relationship; and instructing at least one programmable output GUI to display a notification identifying the update of the plurality of relation-specific notations.

IPC Classes  ?

  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

77.

REMOTE CREATION OF VIRTUAL CREDENTIAL BOUND TO PHYSICAL LOCATION

      
Application Number 19203554
Status Pending
Filing Date 2025-05-09
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Pai, Aditya
  • Fenichel, Allison

Abstract

In some implementations, a credential system may create a virtual credential bound to a physical location associated with a transacting entity based on a request from a user device. The credential system may send information to a transaction terminal at the physical location bound to the virtual credential to register the virtual credential and identify a user that owns an account associated with the virtual credential. The credential system may provide, to the user device, tokenized information related to the virtual credential. The credential system may receive the tokenized information from a transaction terminal requesting authorization for the transaction. The credential system may send, to the transaction terminal requesting the authorization for the transaction, an authorization decision associated with the transaction based on whether the transaction terminal is present at the physical location bound to the virtual credential.

IPC Classes  ?

78.

SELF-SERVICE LENDER PORTAL

      
Application Number 19207520
Status Pending
Filing Date 2025-05-14
First Publication Date 2025-08-28
Owner Capital One Services, LLC (USA)
Inventor
  • Sundaram, Dinesh
  • Yajnik, Sanjiv
  • Bajaj, Raman
  • Morel, Jacques
  • Baird, Alex
  • Vijayaraghavan, Rajaboopathy

Abstract

A self-service lender portal provides lenders with a suite of tools for interacting with a multi-lender architecture configured to provide loan applicants with automated pre-qualification and eligibility evaluation for multiple candidate lenders. The lender portal provides lenders with an interface for uploading rule sets defining lending and eligibility criteria, downloading operational data generated from processing loan applicant information, generating and managing security keys for encryption and decryption of sensitive data, and managing access policies for providing single sign-on by interfacing with the lender's own identity management systems.

IPC Classes  ?

  • G06Q 10/10 - Office automationTime management
  • G06F 8/65 - Updates
  • G06F 8/71 - Version control Configuration management
  • G06F 9/445 - Program loading or initiating
  • G06F 9/54 - Interprogram communication
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
  • G06F 18/24 - Classification techniques
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/60 - Protecting data
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 40/103 - Formatting, i.e. changing of presentation of documents
  • G06F 40/174 - Form fillingMerging
  • G06F 40/18 - Editing, e.g. inserting or deleting of tablesEditing, e.g. inserting or deleting using ruled lines of spreadsheets
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • G06N 3/02 - Neural networks
  • G06N 5/025 - Extracting rules from data
  • G06N 20/00 - Machine learning
  • G06Q 20/38 - Payment protocolsDetails thereof
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 30/018 - Certifying business or products
  • G06Q 30/0201 - Market modellingMarket analysisCollecting market data
  • G06Q 30/0601 - Electronic shopping [e-shopping]
  • G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
  • G06Q 40/03 - CreditLoansProcessing thereof
  • G06Q 50/26 - Government or public services
  • H04L 9/08 - Key distribution
  • H04L 9/40 - Network security protocols

79.

REJECTION OF IMPERMISSIBLE DOCUMENTS

      
Application Number US2025015559
Publication Number 2025/178801
Status In Force
Filing Date 2025-02-12
Publication Date 2025-08-28
Owner CAPITAL ONE SERVICES, LLC (USA)
Inventor
  • Franklin, Keegan
  • Brighter, James
  • Obrien, Megan
  • Maillett, John
  • Justiz, Jane

Abstract

A computer implemented method, system and non-transitory computer-readable device for a remote deposit environment activating, on a client device, a financial application, wherein the financial application is configured to instantiate a customer interface (UI) on the client device. Upon receiving a customer request, based on interactions with the UI, the method implements an electronic deposit of a financial instrument by generating a live stream of image data of a field of view of at least one camera, wherein the live stream of image data includes imagery of at least a portion of the financial instrument, determining, based on the live stream of image data and a machine learning model (ML), an impermissibility score of the financial instrument and, based on exceeding a selectable threshold of the impermissibility score, modifying a status of the remote deposit to pause or terminate the remote deposit.

IPC Classes  ?

  • G06V 30/142 - Image acquisition using hand-held instrumentsConstructional details of the instruments
  • G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
  • G06Q 40/02 - Banking, e.g. interest calculation or account maintenance

80.

Display screen with animated graphical user interface for card communication

      
Application Number 29906184
Grant Number D1090579
Status In Force
Filing Date 2023-11-01
First Publication Date 2025-08-26
Grant Date 2025-08-26
Owner Capital One Services, LLC (USA)
Inventor
  • Cody, Lea
  • Smith, Emily
  • Hart, Colin
  • Newton, Lesley

81.

SOFTWARE DEVELOPMENT PROCESS CONTROLLER

      
Application Number 18582221
Status Pending
Filing Date 2024-02-20
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • Chen, Jonathan
  • De Bruyn, Carel
  • Anthonyraj, James
  • Leung, Alex
  • Duong, David
  • Gomez, Jose

Abstract

In some implementations, a device may receive via a form, a set of requirements associated with generation of program code. The device may generate a program code generation item based on the set of requirements. The device may store, via a first system, the program code generation item. The device may generate program code for the program code generation item based on the set of requirements. The device may receive information identifying a new requirement for the program code generation item. The device may obtain an approval of the new requirement. The device may generate updated program code for the program code generation item based on the new requirement and based on obtaining the approval. The device may store the updated program code in the first system in connection with the program code generation item.

IPC Classes  ?

  • G06Q 10/10 - Office automationTime management
  • G06F 8/10 - Requirements analysisSpecification techniques
  • G06F 8/30 - Creation or generation of source code
  • G06F 8/60 - Software deployment
  • G06Q 10/109 - Time management, e.g. calendars, reminders, meetings or time accounting

82.

SYSTEMS AND METHODS FOR RISK MANAGEMENT USING MACHINE LEARNING

      
Application Number 19056200
Status Pending
Filing Date 2025-02-18
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor Cline, Vishi

Abstract

A method may include receiving, from an external entity, information associated with a procedure that includes a control representing a security policy. The method may include transforming the information into transformed information. The method may include determining, using a first machine learning model, a plurality of features including an average reconciliation ratio and an indication of whether the security policy is accurate, based on the transformed information. The method may include determining, using a second machine learning model, a probability that the transformed information does not satisfy a plurality of criteria, based on the plurality of features. The method may include determining whether the probability is greater than a threshold value, and upon determining that the probability is greater than the threshold value, determining, using a third machine learning model, a recommendation to implement one or more actions associated with the control, based on the probability.

IPC Classes  ?

83.

CONTACTLESS CARD PERSONAL IDENTIFICATION SYSTEM

      
Application Number 19066317
Status Pending
Filing Date 2025-02-28
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • Osborn, Kevin
  • Chigurupati, Srinivasa
  • Rule, Jeffrey

Abstract

A dual-factor PIN based authentication system and method uses a cryptogram provided by a contactless card associated with the client in association with a PIN stored by the contactless card to authenticate the client. In some embodiments, cryptogram authentication may be preconditioned upon a PIN match determination by the contactless card. In other embodiments, the cryptogram may be formed at least in part using the personal identification number (PIN) stored on the contactless card encoded using a dynamic key stored by the contactless card and uniquely associated with the client. Authentication may be achieved by comparing the cryptogram formed using the PIN against an expected cryptogram generated an expected PIN and an expected dynamic key.

IPC Classes  ?

  • G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
  • G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier

84.

DEVICES AND TECHNIQUES TO PERFORM ENTROPY-BASED RANDOMNESS VIA A CONTACTLESS CARD

      
Application Number 19198829
Status Pending
Filing Date 2025-05-05
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • Vargas, Cruz
  • Yee, Bryant
  • Olsen, Sarah

Abstract

Embodiments are directed to systems and techniques to generate random numbers via contactless cards.

IPC Classes  ?

  • G06F 7/58 - Random or pseudo-random number generators
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06K 19/04 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the shape
  • G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
  • H04L 9/08 - Key distribution

85.

PRESENTATION AND CONTROL OF USER INTERACTIONS WITH A TIME-DEPENDENT USER INTERFACE ELEMENT

      
Application Number 19201055
Status Pending
Filing Date 2025-05-07
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • De Leon, Erik Jay Salazar
  • Dohan, Thomas
  • Hollins, Charles Richard
  • Wilkens, Jennifer
  • Berger, Albert
  • Heiner, John

Abstract

In some implementations, a user device may present, on a user interface (UI) associated with a user account, a first UI element. The user device may detect a user interaction, with the user device, indicating the first UI element. The user device may present, on the UI and based on the user interaction, a second UI element, which increases in length in a first direction from a start point, along a closed path around the first UI element and ending at the start point, while the user interaction is being detected. The second UI element completes the closed path when an interaction duration satisfies a duration threshold, which indicates a confirmation of a request for an action associated with the user account. The duration threshold is based on one or more parameters associated with one or more of the action, the user account, or the user interaction.

IPC Classes  ?

  • G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
  • G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
  • G06F 3/04883 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text

86.

SYSTEMS AND METHODS FOR INDEPENDENTLY SOURCED AUTHENTICATION DURING REMOTE NETWORK SESSIONS

      
Application Number 18443215
Status Pending
Filing Date 2024-02-15
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • Akkarakaran Jose, John
  • Gupta, Rajat

Abstract

Systems and methods use independently sourced authentication for a bifurcated authentication process. For example, in furtherance of authentication of devices in a first device session (e.g., between a user and an interface provider), the systems and methods create a second device session (e.g., between the interface provider and an independent authentication source). To do so, the interface provider may facilitate the transmission of information from the user to the independent authentication source. The independent authentication source may use information (e.g., information only accessible to the independent authentication source) to authenticate the information provided by the user. The independent authentication source may then authenticate the user. By doing so, the interface provider has relied on information known to the other parties (e.g., the user and the independent authentication source) to authenticate the user.

IPC Classes  ?

87.

SYSTEMS AND METHODS FOR EXECUTING CONTROLS ON NATURAL LANGUAGE GENERATION BASED ON PRE-PROCESSING INPUT DATA

      
Application Number 18444563
Status Pending
Filing Date 2024-02-16
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • Gasser, Keith
  • Caughey, Michael James
  • Dominguezmiller, Jesús
  • Tanski, Peter
  • Harris, James

Abstract

Systems and methods for executing domain-specific controls on large language model-generated data are disclosed herein. The system may receive a textual communication and provide the textual communication to a first model to generate an output. Based on the output and the textual communication, the system may generate a communication profile. The system may determine that the communication profile satisfies first or second criteria. Based on determining that the communication profile satisfies the first criteria, the system may determine rulesets corresponding to domains and provide the communication to a second model to generate a second output according to these rulesets. Based on determining that the communication profile satisfies the second criteria, the system may cause execution of a termination protocol in lieu of generating the second output.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 40/20 - Natural language analysis

88.

PROCESSING EVENT DATA AND/OR TABULAR DATA FOR INPUT TO ONE OR MORE MACHINE LEARNING MODELS

      
Application Number US2025013687
Publication Number 2025/174606
Status In Force
Filing Date 2025-01-30
Publication Date 2025-08-21
Owner CAPITAL ONE SERVICES, LLC (USA)
Inventor
  • Sharpe, Samuel
  • Bruss, Christopher Bayan

Abstract

Aspects described herein may relate to techniques and/or methods that process certain forms of event data and/or tabular data for input to one or more machine learning models, such as a large language model. Additional aspects may relate to using the output of a large language model as part of a process for detecting fraud based on the event data and/or tabular data. In some variations, the event data and/or tabular data may be processed into data tokens, embeddings, or other forms of data suitable for use as input to a large language model.

IPC Classes  ?

  • G06N 3/045 - Combinations of networks
  • G06N 20/00 - Machine learning
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists

89.

SYSTEMS AND METHODS FOR AUTHENTICATION AND CARD PROVISIONING IN DESKTOP MERCHANT CHECKOUTS

      
Application Number US2025015526
Publication Number 2025/174834
Status In Force
Filing Date 2025-02-12
Publication Date 2025-08-21
Owner CAPITAL ONE SERVICES, LLC (USA)
Inventor
  • Rule, Jeffrey
  • Lowe, Megan M.

Abstract

Systems and methods for user authentication and account provisioning involving scanning a QR code, authenticating a user, selecting a transaction account, and completing a transaction.

IPC Classes  ?

  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
  • G06Q 20/20 - Point-of-sale [POS] network systems
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment

90.

SYSTEMS AND METHODS FOR CLASSIFYING TOKEN SEQUENCE EMBEDDINGS

      
Application Number 18581556
Status Pending
Filing Date 2024-02-20
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • Sharpe, Samuel
  • Barr, Brian
  • Goodsitt, Jeremy

Abstract

Systems and methods for classifying token sequences using clustering. In some aspects, the system receives a first set of input sequences and generates a corresponding first plurality of embeddings using a first machine learning model. The system generate a plurality of clusters, each containing embeddings, using a clustering model. For each cluster in the plurality of clusters, the system generates a set of common components in the cluster. The system generates a set of universal components based on the plurality of clusters. For each cluster in the plurality of clusters, the system generates a set of unique components by removing the set of universal components from its associated set of common components. The system classifies a second plurality of embeddings using the sets of unique components.

IPC Classes  ?

91.

ACCOUNT AUTHENTICATION USING HANDWRITING SAMPLES

      
Application Number 19197370
Status Pending
Filing Date 2025-05-02
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • Martinez Stone, Armando
  • Maiman, Tyler
  • Rapowitz, Samuel

Abstract

In some implementations, a device may obtain registration information, associated with an account, including one or more training handwriting samples of a user. The device may detect an initiation of an event associated with the account. The device may provide, to a terminal device associated with the event, the one or more authentication prompts to cause the terminal device to provide the one or more authentication prompts while the event is pending. The device may obtain, from the terminal device, one or more handwriting samples in response to the one or more authentication prompts. The device may determine, using a machine learning model, whether the user is associated with the event based on whether the one or more handwriting samples are in a handwriting of the user. The device may authenticate the event based on determining whether the one or more handwriting samples are in the handwriting of the user.

IPC Classes  ?

  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • G06V 40/30 - Writer recognitionReading and verifying signatures

92.

EMV SECURE CHIP COMMUNICATIONS

      
Application Number 19198693
Status Pending
Filing Date 2025-05-05
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • Johnson, Molly
  • Zarakas, James
  • Vukich, Adam

Abstract

An EMV enabled terminal may communicate transaction related information to a user via a standard user interface of the terminal, for example, within a user interface displayed on a display screen of the terminal. The transaction related information may be spoken out loud to the user by the terminal. However, users with visual, audio, or other physical impairments may be unable to access the display of the terminal, view the displayed information, or hear the spoken information. Systems and methods disclosed herein communicate transaction related information via an alternate user interface. Instead of relying on the standard user interface related communications, information about the status of a transaction or transaction related information may be determined based on monitoring and evaluating the communications between an EMV secure element of a dynamic transaction card and the terminal via a contact connection.

IPC Classes  ?

  • G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
  • H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
  • H04W 12/06 - Authentication
  • H04W 76/10 - Connection setup

93.

SYSTEMS AND METHODS FOR USER PLATFORM BASED RECOMMENDATIONS

      
Application Number 19200222
Status Pending
Filing Date 2025-05-06
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • Huang, Jeremy
  • Emamdie, Michelle
  • Bumpas, Derek
  • Guo, Jiaxin
  • Tang, Qiaochu

Abstract

Computer-implemented methods and systems include determining vehicle grades for a user by accessing a plurality of user platforms, identifying user-related content linked to the user via the user platforms, extracting user attributes based on the user-related content, applying weights to vehicle attributes in a vehicle recommendation engine, based on the extracted user attributes, generating the vehicle grades based on the weights, and providing the vehicle grades to the user via a vehicle grading platform.

IPC Classes  ?

  • G06Q 30/0601 - Electronic shopping [e-shopping]
  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06F 16/9536 - Search customisation based on social or collaborative filtering
  • G06Q 30/0645 - Rental transactionsLeasing transactions

94.

SYSTEMS AND METHODS FOR DEVICE BINDING AUTHENTICATION

      
Application Number 19202221
Status Pending
Filing Date 2025-05-08
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • Rule, Jeffrey
  • Osborn, Kevin

Abstract

The disclosed systems and methods are directed to generating a GPU-based mobile device signature to enhance the strength of an OTP card authentication signal. The proposed implementation leverages the NFC read capability of contactless OTP cards and WebGL image rendering functionality of mobile browser. An image, or a URL pointing to one, is received, via NFC transmission from a contactless card, for processing by a mobile browser. The output of the mobile browser image processing buffer can then be hashed and used as a device identifier for the specific mobile device performing electronic authentication of a transmission source by verifying, with high degree of certainty, the identity of the reading mobile device.

IPC Classes  ?

95.

AGGREGATING UPDATES FOR A DISTRIBUTED DATABASE USING A QUEUE

      
Application Number 18442351
Status Pending
Filing Date 2024-02-15
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • Kiowski, Luke
  • Mannar, Babu
  • Parpelli, Venkateshwar
  • Chen, Yang

Abstract

In some implementations, a device may receive a set of update expressions associated with updating one or more items in the distributed database. The device may store the set of update expressions in an input queue. The device may aggregate, based on a value of a parameter satisfying a threshold, the set of update expressions to obtain aggerated update values for respective items of the one or more items, wherein the aggregated update values are summed values indicated by update expressions, of the set of update expressions, for the respective items of the one or more items. The device may generate, for each item, an aggregated update expression that indicates an aggregated update value, of the aggerated update values, for that item. The device may update the one or more items in the distributed database using the aggregated update expression for each item.

IPC Classes  ?

96.

SYSTEMS AND METHODS FOR MODIFYING A DATABASE OF CONTENT RESOURCES USING MACHINE LEARNING

      
Application Number 18443126
Status Pending
Filing Date 2024-02-15
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • Yin, Youbing
  • Tessler, Leeyat Bracha
  • Miller, Daniel E.
  • Rowlett, Claire M.
  • Mays, Robert

Abstract

Methods and systems for modifying a database of creative content resources using machine learning models. In some aspects, a system may be used to generate new resources and/or modify a subset of resources of the database. The system accesses the database and obtains data indicative of elements and (2) structural specifications for each resource. The system obtains and inputs (1) a user prompt for generating a new creative content resource and (2) a set of rules indicative of standardized assets and structural specifications into a machine learning model to obtain the new creative content resource. The system obtains an indication for replacing a recurring asset included in the new creative content resource with a replacement asset and replaces the recurring asset with the replacement asset in each creative content resource of a subset of creative content resources from the database.

IPC Classes  ?

  • G06N 3/0475 - Generative networks
  • G06N 5/01 - Dynamic search techniquesHeuristicsDynamic treesBranch-and-bound

97.

UPDATING TRANSFORMER MACHINE LEARNING MODELS TO ACCOUNT FOR RELATIVE TIMING

      
Application Number 18443165
Status Pending
Filing Date 2024-02-15
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor Sharpe, Samuel

Abstract

Methods and systems are described herein for updating transformer machine learning models to account for relative timing within data. The system may retrieve a transformer model trained based on events. The events may include a first event associated with a first time and second events associated with second times. The system may generate event embeddings for the events. The system may input, into the transformer model, the event embeddings to cause the transformer model to perform a transformation on the event embeddings. The system may determine respective time differences between the first time of the first event and each corresponding second time of the second events. The system may generate attention values by aggregating the transformation and the respective time differences. The system may then update the transformer model with the attention values.

IPC Classes  ?

98.

SYSTEMS AND METHODS FOR INDEPENDENTLY SOURCED AUTHENTICATION DURING REMOTE NETWORK SESSIONS

      
Application Number 18443224
Status Pending
Filing Date 2024-02-15
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • Akkarakaran Jose, John
  • Gupta, Rajat

Abstract

Systems and methods use independently sourced authentication for a bifurcated authentication process. For example, in furtherance of authentication of devices in a first device session (e.g., between a user and an interface provider), the systems and methods create a second device session (e.g., between the interface provider and an independent authentication source). To do so, the interface provider may facilitate the transmission of information from the user to the independent authentication source. The independent authentication source may use information (e.g., information only accessible to the independent authentication source) to authenticate the information provided by the user. The independent authentication source may then authenticate the user. By doing so, the interface provider has relied on information known to the other parties (e.g., the user and the independent authentication source) to authenticate the user.

IPC Classes  ?

99.

SYSTEMS AND METHODS FOR EXECUTING OPERATIONS ACROSS DATA EXCHANGES THAT COMPRISE NON-STANDARDIZED DATA DESCRIPTIONS USING DYNAMICALLY GENERATED VALIDATION RULES

      
Application Number 18171030
Status Pending
Filing Date 2023-02-17
First Publication Date 2025-08-21
Owner Capital One Services, LLC (USA)
Inventor
  • Subramanian, Singaram
  • Lemler, Christian
  • Hatwar, Saket
  • Talathi, Adwait Suresh
  • Soman, Sumod
  • Lom, Michael
  • Rajabi, Mariam
  • Patil, Snehal
  • Patel, Heena
  • Prout, John
  • Thompson, David

Abstract

Systems and methods use dynamically generated validation rules. These validation rules comprise a first validation rule portion that is generated using a standardized validation process (e.g., corresponding to a standardized schema) and a second validation rule portion that is generated using a validation process selected based on a non-standardized schema that is specific to a respective asset type of the plurality of respective asset types.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

100.

REAL-TIME IMAGE VALIDITY ASSESSMENT

      
Application Number US2025015608
Publication Number 2025/174899
Status In Force
Filing Date 2025-02-12
Publication Date 2025-08-21
Owner CAPITAL ONE SERVICES, LLC (USA)
Inventor
  • Yoshida, Shena
  • Thasanon, Namfon
  • Krishnan, Ashwath
  • Ramachandran, Amith Kumar

Abstract

A computer implemented method, system, and non-transitory computer-readable device for a remote deposit environment. In some embodiments, a predictive machine learning (ML) model may be trained to determine a likelihood an image will be successfully processed via OCR. The predictive ML model may determine the likelihood prior to the image being uploaded to a remote server and/or processed via OCR, allowing the image to be rejected and replaced in real time. In some embodiments, the predictive ML model may be implemented on a mobile device. Optionally, the predictive ML model may be supported by a deep learning model operating to refine the predictive ML model.

IPC Classes  ?

  • G06V 30/12 - Detection or correction of errors, e.g. by rescanning the pattern
  • G06V 30/142 - Image acquisition using hand-held instrumentsConstructional details of the instruments
  • G06Q 20/04 - Payment circuits
  1     2     3     ...     93        Next Page