Patents by Inventor Brandon Sloane
Brandon Sloane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240161038Abstract: Systems, apparatuses and methods provide technology that identifies first characteristics of a first risk associated with a system and applies a locality sensitive hashing process to the first characteristics to map the first characteristics to first buckets of a plurality of buckets. The technology further generates a first vector based on the first characteristics being mapped to the first buckets, and identifies a mitigation plan to at least partially mitigate the first risk based on the first vector.Type: ApplicationFiled: November 11, 2022Publication date: May 16, 2024Applicant: Meta Platforms, Inc.Inventor: Brandon Sloane
-
Patent number: 11985665Abstract: Embodiments of the present invention provide a secure edge device for contactless resource distribution and resource crediting from an automobile. In this way, the edge device may be affixed to or embedded within the side or the mirror of an automobile and be able to communicate with a third party device using near field communication. Upon authentication of a user, the edge device may communicate with the third party to transmit and present data about the resource distribution to the automobile display. The system allows for the user to select the resource distribution via the automobile display and provide a completion of resource distributions.Type: GrantFiled: June 11, 2021Date of Patent: May 14, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Joseph Benjamin Castinado, Naoll Addisu Merdassa, Lalit Dhawan, Robert Nyeland Huggins, Pratap Dande, Michael Joseph Carroll, Brandon Sloane, Vijaya L Vemireddy
-
Patent number: 11983254Abstract: Systems, computer program products, and methods are described herein for secure access control using dynamic resource replication. The present invention is configured to electronically receive, from a computing device of a user, a request to generate a resource access path to access a resource; determine one or more resource requirements associated with the resource; determine an authentication level associated with the user; initiate a resource replication engine on the one or more resource requirements and the authentication level associated with the user; determine, using the resource replication engine, that the one or more requirements and the authentication level associated with the user meets one or more conditions for a replication process; and generate, using the resource replication engine, the resource access path and a plurality of replicate resource access paths.Type: GrantFiled: August 1, 2023Date of Patent: May 14, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Brian Diederich, Levi Weldon McVay
-
Patent number: 11979484Abstract: A system is provided for electronic data encryption and decryption using a consensus draft process. In particular, the system may use a custom encryption algorithm that generates an array with a number of entries that is dependent on the number of computing devices that participate in the encryption process. The encryption algorithm may cause a first computing device to open and read the array, randomly select and remove an entry, and pass on the remaining entries to a second computing device. The second computing device may then open and read the array, randomly select and remove an entry, then pass the remaining entries to a third computing device. The process may be executed in a reiterative manner until the entire array is distributed among the participating computing devices. In this way, encryption of data may be performed without revealing shared information among the participating computing devices.Type: GrantFiled: July 21, 2021Date of Patent: May 7, 2024Assignee: BANK OF AMERICA CORPORATIONInventor: Brandon Sloane
-
Patent number: 11968215Abstract: Embodiments of the present invention provide a system for monitoring a cybersecurity mesh network comprising a distributed sensor grid and a plurality of devices for detection of one or more security incidents. In response to determining that one of the one or more security incidents has occurred, and in response to receiving the request from an identified device that requires the first level of authentication, transmitting to the identified device a request for authentication credentials that meet a second level of authentication, wherein the second level of authentication is more strict than the first level of authentication.Type: GrantFiled: December 16, 2021Date of Patent: April 23, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Richard Gar Bentley, Michael Ogrinz, John Howard Kling
-
Publication number: 20240113942Abstract: Disclosed technology herein provides a computer-implemented method for asset tracking in a network having a plurality of connected devices, comprising generating a network graph based on network data captured at least in part via peer-to-peer polling, the network data including data relating to tracked assets in a network, where the peer-to-peer polling is used to validate a presence of at least a portion of the tracked assets in the network, generating an estimated size of the network graph using a graph estimation algorithm, determining an estimate of the tracked assets based on the estimated size of the network graph, and determining one or more remediation actions in response to the estimate of the tracked assets, where at least a portion of the network graph can be stored in a decentralized manner. The graph estimation algorithm can include a random walk algorithm, a random sampling algorithm, and/or an induced edges algorithm.Type: ApplicationFiled: September 30, 2022Publication date: April 4, 2024Applicant: Meta Platforms, Inc.Inventor: Brandon Sloane
-
Patent number: 11947641Abstract: Systems, computer program products, and methods are described herein for implementing continuous authentication based on object location recognition. The present invention is configured to receive, from the computing device of a user, a request for primary authorized access; receive, via the augmented reality application, a real-time visual feed, wherein the real-time visual feed comprises one or more objects; determine one or more positional parameters associated with the one or more objects; determine that the one or more objects and the one or more positional parameters associated with the one or more objects meets one or more requirements for the primary authorized access; and transmit control signals configured to cause the computing device of the user to display a notification indicating that the user has been granted the primary authorized access.Type: GrantFiled: June 15, 2021Date of Patent: April 2, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Jesse Wiggins
-
Patent number: 11949792Abstract: A system for authorizing secured access using cryptographic hash value validations is provided. In particular, the system may receive requests from users and/or computing systems to obtain secured access a particular resource or to execute a certain process. In response, the system may require that the user and/or computing system complete additional required steps (e.g., a computation) before being granted access to the resources or processes. In this way, the system may prevent unauthorized or unintended access to the system's resources or processes.Type: GrantFiled: September 30, 2022Date of Patent: April 2, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Brian Diederich
-
Publication number: 20240098102Abstract: Disclosed technology herein provides for generating a network traffic map, using a social graph algorithm, based on a first set of network traffic data captured in a first time frame, storing map data from the network traffic map in a decentralized manner, generating a risk assessment based on comparing a second set of network traffic data captured in a second time frame to anticipated network traffic, wherein the anticipated network traffic is based on the network traffic map, and wherein the first time frame is prior to the second time frame, and determining one or more remediation actions in response to the risk assessment. Network traffic data can include data representing a transaction duration and/or a volume of data transferred. In embodiments, map data from the network traffic map is stored in individual nodes and aggregated centrally, and peer-to-peer validation is conducted on map data from the network traffic map.Type: ApplicationFiled: August 31, 2022Publication date: March 21, 2024Applicant: Meta Platforms, Inc.Inventor: Brandon Sloane
-
Patent number: 11935055Abstract: An Automated Teller Machine (ATM) terminal receives a transaction request from a user. The ATM terminal triggers a camera to capture a first image of the authentication media item presented by the user, where the first image of the authentication media item is embedded with a first unique code. The ATM terminal compares the first image of the authentication media item with a second image of the authentication media item that is associated with the user, where the second image of the authentication media item is embedded with a second unique code for verifying the user. The ATM terminal determines whether the first unique code corresponds to the second unique code. The ATM terminal conducts the transaction request if it is determined that the first unique code corresponds to the second unique code.Type: GrantFiled: March 22, 2021Date of Patent: March 19, 2024Assignee: Bank of America CorporationInventors: Srilekha Mudumbai Srinivasa, Brandon Sloane, Jinyoung Nathan Kim, Regina Yee Cadavid, Nia Mack, Ramkumar Korlepara, Elliott Leonard Lillard, Philip Lone Mintac, Michael Jacob Richardson, Gloria Youngsook Joo
-
System for quantification of cybersecurity module efficacy using Q-matrix based correlation analysis
Patent number: 11934532Abstract: A system is provided for quantification of cybersecurity module efficacy using Q-matrix based correlation analysis. In particular, the system may use Q-matrices to calculate adaptive correlation scores between cybersecurity module and expected and/or desired outcomes across one or more different dimensions. A first axis of the Q-matrix for a particular cybersecurity module may be populated with one or more key elements of the cybersecurity module, while a second axis of the Q-matrix may comprise the outputs or metrics that may be used to quantify the efficacy of the cybersecurity module with respect to the key elements as represented on the first axis. The correlation scores may then be used as inputs into a decisioning engine that may be used to drive entity-wide decisioning processes based on the outputs of the Q-matrix based analysis.Type: GrantFiled: June 9, 2021Date of Patent: March 19, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Jacob B. Dirr -
Publication number: 20240086987Abstract: The present disclosure provides systems and methods for applying machine learning modules to assess social networking relationships and generate recommendations. In various embodiments, user information, product information, social networking information may be gathered to generate a social networking graph. A first machine learning module may generate recommendations, such as a product recommendation based on information about a user and the social networking graph. Aspects include training the machine learning model based on product recommendations, previous purchases, and the like. A second machine learning module may generate a weighting characteristic associated with a user and a weighting characteristic associated with a product. The weightings may be applied to generate product recommendations.Type: ApplicationFiled: December 2, 2022Publication date: March 14, 2024Inventors: Brandon Sloane, Ryan Sloane
-
Publication number: 20240061869Abstract: Systems, computer program products, and methods are described herein for identification of obfuscated electronic data through placeholder indicators. The present invention is configured to electronically receive, from a computing device of a user, a request to obfuscate one or more data artifacts stored on a first database; retrieve, from a data obfuscation repository, one or more data obfuscation algorithms; implement the one or more data obfuscation algorithms on the one or more data artifacts; generate one or more placeholder indicators identifying the one or more data obfuscation algorithms implemented on the one or more data artifacts; create one or more data fields corresponding to the one or more masked data artifacts on the first database; store the one or more placeholder indicators in the one or more data fields; and update the first database with the one or more masked data artifacts and the one or more placeholder indicators.Type: ApplicationFiled: November 3, 2023Publication date: February 22, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Jinyoung Nathan Kim, Adriana Tache, Charles Edward Dudley
-
Patent number: 11907268Abstract: Systems, computer program products, and methods are described herein for identification of obfuscated electronic data through placeholder indicators. The present invention is configured to electronically receive, from a computing device of a user, a request to obfuscate one or more data artifacts stored on a first database; retrieve, from a data obfuscation repository, one or more data obfuscation algorithms; implement the one or more data obfuscation algorithms on the one or more data artifacts; generate one or more placeholder indicators identifying the one or more data obfuscation algorithms implemented on the one or more data artifacts; create one or more data fields corresponding to the one or more masked data artifacts on the first database; store the one or more placeholder indicators in the one or more data fields; and update the first database with the one or more masked data artifacts and the one or more placeholder indicators.Type: GrantFiled: February 10, 2021Date of Patent: February 20, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Jinyoung Nathan Kim, Adriana Tache, Charles Edward Dudley
-
Patent number: 11902273Abstract: Systems, computer program products, and methods are described herein for dynamic chaffing for log obfuscation based on shifting exposure portfolio. The present invention is configured to receive an event log from one or more sources associated with a resource, wherein the event log comprises one or more event records generated based on one or more action incidences; initiate a chaffing engine on the event log; generate, using the chaffing engine, one or more artificial records based on at least the one or more event records; tag the one or more artificial records and the one or more event records with one or more authentication codes; interleave, using the chaffing engine, the one or more artificial records and the one or more event records to generate an encrypted event log with one or more chaffed event records; and store the encrypted event log in an event database.Type: GrantFiled: March 30, 2021Date of Patent: February 13, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Nia Mack, Brandon Sloane
-
Publication number: 20240048392Abstract: Embodiments of the present invention provide a system for establishing permanent records based on micro-interactions. In particular, the system may be configured to identify initiation of an event based on receiving first set of interaction requests from user devices of one or more users, initiate a first set of micro-interactions, wherein initiation of the first set of micro-interactions comprises transferring resources to one or more resource pools associated with the one or more users, identify completion of the event based on receiving a second set of interaction requests from the user devices of the one or more users, revert the first set of micro-interactions, wherein reverting the first set of micro-interactions comprises transferring the resources back from the one or more resource pools associated with the one or more users, and create a permanent record associated with the initiation of the event and the completion of the event.Type: ApplicationFiled: October 17, 2023Publication date: February 8, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Vijaya L. Vemireddy
-
Patent number: 11893091Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for providing intelligent analysis of technical and non-technical data to validate instances of permitted use of such brand elements and generate alerts for instances of non-permitted use of such brand elements. The system provides a single portal view for upload of relevant data and transmission of analysis results. The invention utilizes a permissioned distributed register database architecture for the secure storage and tokenization of brand elements and retrieval of validation and ownership information. The invention further includes the capability to recommend and automate remedial measures to prevent continued unauthorized use of brand elements.Type: GrantFiled: April 26, 2021Date of Patent: February 6, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Elliott Leonard Lillard, Regina Yee Cadavid, Gloria Youngsook Joo, Jinyoung Nathan Kim, Ramkumar Korlepara, Nia Mack, Philip Lone Mintac, Srilekha Mudumbai Srinivasa, Michael Jacob Richardson, Brandon Sloane
-
Patent number: 11881939Abstract: A system provides for authorization of data access and processing functions within a distributed server network using a delegated proof-of-stake consensus mechanism. In particular, the system may use assign authorization levels to each node within the network environment. Certain actions or processes performed within the network (e.g., potentially damaging actions) may require that the node proposing the action meets a threshold authorization level before authorizing the action. The system may further increase or decrease authorization levels for each node depending on the outcomes of the proposed actions. In this way, the system may provide a secure way to authorize certain actions or processes taken within a computing environment.Type: GrantFiled: October 5, 2021Date of Patent: January 23, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Lydia Lambright
-
Publication number: 20240020222Abstract: A homomorphic encryption-based testing computing system provides a risk-based, automated, one-directional push of production data through a homomorphic encryption tool and distributes the encrypted data to use in testing of applications. Data elements and test requirements are considered when automatically selecting a homomorphic encryption algorithm. A decisioning component selects an algorithm to use to homomorphically encrypt the data set and a push mechanism performs one or both of the homomorphic encryption and distribution of the encrypted data set to at least one intended host. Once delivered, the testing software and/or testing procedures proceed using the encrypted data set, where results of the testing may be stored in a data store. A validation mechanism may validate the test data against production data and communicates whether testing was successful.Type: ApplicationFiled: September 28, 2023Publication date: January 18, 2024Applicant: Bank of America CorporationInventor: Brandon Sloane
-
Publication number: 20230403270Abstract: An apparatus for dynamic user authentication comprises a processor associated with a server. The processor is configured to receive session data associated with a first user, wherein the session data comprises user parameters for a session and to receive an interaction request to authorize an interaction of a first avatar associated with the first user in a virtual environment. The processor is further configured to compare the user parameters of the session data to user parameters of a stored user profile and to authorize the interaction in response to comparing the session data to the stored user profile if a confidence threshold is satisfied. The processor is further configured to train the machine learning algorithm with the received session data to update the user profile, wherein updating the user profile improves information security by authenticating that the first user is authorized to interact via the first avatar.Type: ApplicationFiled: June 13, 2022Publication date: December 14, 2023Inventors: Jinyoung N. Kim, James T. MacAulay, Lauren J. Alibey, Serge A. Neri, Brandon Sloane, Sophie M. Danielpour