Patents by Inventor Daniel Hardman
Daniel Hardman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11985124Abstract: Leveraging secure tokenization, such as a Non-Fungible Token (NFT), for purposes of multifactor and/or elevated user authentication. In this regard, an authentication NFT is generated based at least on a user's authentication credentials. Subsequently, the authentication NFT is verified/validated via a private distributed trust computing network and stored, in a deactivated state, on a distributed ledger. Once the user is confronted with an elevated and/or multifactored authentication process, the user may initiates use of the authentication NFT by checking-out the authentication NFT from the distributed ledger and moving the authentication NFT from the deactivated state to an activated state, in which the user credentials are accessible to the user for purposes of authentication.Type: GrantFiled: June 2, 2022Date of Patent: May 14, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Publication number: 20240106649Abstract: Multifactor user authentication leveraging secure tokenization, such as a Non-Fungible Token (NFT) and multiple passkeys (e.g., bifurcated passkey). One or more authentication NFTs are generated that use some form of a user's authentication credentials as the seed input for the NFT encryption/hash algorithm(s). In addition, passkeys are distributed to and/or made accessible to multiple passkey holders. In response to an event that requests multifactor authentication of the user, a plurality passkeys are requested, received and verified. Each of the passkeys being requested and received from, or at the directive of, one of the multiple passkey holders. In response to verifying the plurality of passkeys, at least one of the authentication NFTs is accessed and the cryptographic hash algorithm(s) is implemented to decrypt the authentication NFT(s) and identify the one or more user credentials.Type: ApplicationFiled: September 26, 2022Publication date: March 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Ravi Joshi, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Publication number: 20240048446Abstract: A method for determining third party network compliance with a host entity network is provided. The method may include generating a scanning file that includes host entity network compliance standards and transferring the scanning file to an intermediary entity network. The method may further include generating an executable file that may run a plug-in scanning file to scan hardware and software resident at the third-party network for compliance. The method may further include transferring the executable file from the intermediary entity network to the third party network. The method may further include executing the executable file, generating a log file upon the completion of the running of the plug-in scanning file and digitally signing the log file. The method may further include deciphering the log file at the intermediary entity network, generating a readable report based on the deciphering and transferring the readable report to the host entity network.Type: ApplicationFiled: October 12, 2023Publication date: February 8, 2024Inventors: Jeffrey Glasco, JR., Benjamin Daniel Hardman, Robert Brice
-
Patent number: 11893116Abstract: A method for determining third party network compliance with a host entity network is provided. The method may include generating a scanning file that includes host entity network compliance standards and transferring the scanning file to an intermediary entity network. The method may further include generating an executable file that may run a plug-in scanning file to scan hardware and software resident at the third-party network for compliance. The method may further include transferring the executable file from the intermediary entity network to the third party network. The method may further include executing the executable file, generating a log file upon the completion of the running of the plug-in scanning file and digitally signing the log file. The method may further include deciphering the log file at the intermediary entity network, generating a readable report based on the deciphering and transferring the readable report to the host entity network.Type: GrantFiled: August 19, 2021Date of Patent: February 6, 2024Assignee: Bank of America CorporationInventors: Jeffrey Glasco, Jr., Benjamin Daniel Hardman, Robert Brice
-
Publication number: 20240028777Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for audiovisual conferencing. The system comprising video input and output devices, which allow a user to be viewed by and view other conference attendees and audio input and output devices that allow the user to be heard by and hear other conference attendees. Further, the system includes a noise mitigation to ensure that a user has privacy when attending a remote meeting in a public or semi-public place.Type: ApplicationFiled: July 22, 2022Publication date: January 25, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Olga Kocharyan, Angela Ianni, Shweta Ambulkar, Luqman Sharief, Michael Wm. Whitaker, Benjamin Daniel Hardman
-
Publication number: 20230403247Abstract: Implementing artificial intelligence, specifically, machine learning techniques to identify malicious emails and, in response, identifying and conducting actions, including reporting the malicious emails to identified internal and/or external entities and preventing the malicious emails from being delivered to email client mailboxes. The machine learning techniques rely on malicious email patterns identified, at least, from previously identified malicious emails and data resulting from continuously crawling the Web and threat intelligence sources. Further, the email clients may be configured to include an add-on feature in which the user can provide a single input to report the email as being suspicious, which results in further analysis to determine whether the email is, in fact, a malicious email.Type: ApplicationFiled: June 13, 2022Publication date: December 14, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Publication number: 20230396610Abstract: Leveraging secure tokenization, such as a Non-Fungible Token (NFT), for purposes of multifactor and/or elevated user authentication. In this regard, an authentication NFT is generated based at least on a user's authentication credentials. Subsequently, the authentication NFT is verified/validated via a private distributed trust computing network and stored, in a deactivated state, on a distributed ledger. Once the user is confronted with an elevated and/or multifactored authentication process, the user may initiates use of the authentication NFT by checking-out the authentication NFT from the distributed ledger and moving the authentication NFT from the deactivated state to an activated state, in which the user credentials are accessible to the user for purposes of authentication.Type: ApplicationFiled: June 2, 2022Publication date: December 7, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Patent number: 11805017Abstract: A method for determining third party network compliance with a host entity network is provided. The method may include generating a scanning file that includes host entity network compliance standards and transferring the scanning file to an intermediary entity network. The method may further include generating an executable file that may run a plug-in scanning file to scan hardware and software resident at the third-party network for compliance. The method may further include transferring the executable file from the intermediary entity network to the third party network. The method may further include executing the executable file, generating a log file upon the completion of the running of the plug-in scanning file and digitally signing the log file. The method may further include deciphering the log file at the intermediary entity network, generating a readable report based on the deciphering and transferring the readable report to the host entity network.Type: GrantFiled: August 19, 2021Date of Patent: October 31, 2023Assignee: Bank of America CorporationInventors: Jeffrey Glasco, Jr., Benjamin Daniel Hardman, Robert Brice
-
Patent number: 11799640Abstract: Systems and methods for digitally encrypting sensitive, self-executing, digital content are provided. A method may include storing the digital content in an encrypted digital vault and generating a first password and a second password which together may unlock the digital vault. The method may include storing the first password on a first encrypted distributed ledger and the second password on a second encrypted distributed ledger. The method may include automatically updating the passwords periodically and storing the updated passwords as new entries on the distributed ledgers. When a document from a predetermined list of documents is digitally scanned and authenticated, the method may include unlocking access to the first password on the first distributed ledger for the designated entity. When the digital vault is unlocked with the first and the second passwords, the digital content may self-execute.Type: GrantFiled: August 27, 2021Date of Patent: October 24, 2023Assignee: Bank of America CorporationInventors: Anna Kristen Pingel Berry, Benjamin Daniel Hardman
-
Publication number: 20230069098Abstract: Systems and methods for providing a double-sided estate authentication via a distributed ledger are set forth herein. A method may include periodically generating, for display by a first physical token, a first random password. The generating may be in response to periodic receipt of a biometric signal from a first human. The method may also include periodically generating, for display by a second physical token, a second random password. The method further includes receiving and storing the first random password at a distributed ledger and receiving and storing the second random password at the distributed ledger. Following a cessation of the periodic receipt of the biometric signal, the first physical token may stop generating the first random password, and the second physical token may start generating the first random password. The first random password and the second random password together may form a dual-knowledge password.Type: ApplicationFiled: August 27, 2021Publication date: March 2, 2023Inventors: Anna Kristen Pingel Berry, Benjamin Daniel Hardman
-
Publication number: 20230065507Abstract: Systems and methods for digitally encrypting sensitive, self-executing, digital content are provided. A method may include storing the digital content in an encrypted digital vault and generating a first password and a second password which together may unlock the digital vault. The method may include storing the first password on a first encrypted distributed ledger and the second password on a second encrypted distributed ledger. The method may include automatically updating the passwords periodically and storing the updated passwords as new entries on the distributed ledgers. When a document from a predetermined list of documents is digitally scanned and authenticated, the method may include unlocking access to the first password on the first distributed ledger for the designated entity. When the digital vault is unlocked with the first and the second passwords, the digital content may self-execute.Type: ApplicationFiled: August 27, 2021Publication date: March 2, 2023Inventors: Anna Kristen Pingel Berry, Benjamin Daniel Hardman
-
Publication number: 20230055215Abstract: A method for determining third party network compliance with a host entity network is provided. The method may include generating a scanning file that includes host entity network compliance standards and transferring the scanning file to an intermediary entity network. The method may further include generating an executable file that may run a plug-in scanning file to scan hardware and software resident at the third-party network for compliance. The method may further include transferring the executable file from the intermediary entity network to the third party network. The method may further include executing the executable file, generating a log file upon the completion of the running of the plug-in scanning file and digitally signing the log file. The method may further include deciphering the log file at the intermediary entity network, generating a readable report based on the deciphering and transferring the readable report to the host entity network.Type: ApplicationFiled: August 19, 2021Publication date: February 23, 2023Inventors: Jeffrey Glasco, JR., Benjamin Daniel Hardman, Robert Brice
-
Publication number: 20230055463Abstract: A method for determining third party network compliance with a host entity network is provided. The method may include generating a scanning file that includes host entity network compliance standards and transferring the scanning file to an intermediary entity network. The method may further include generating an executable file that may run a plug-in scanning file to scan hardware and software resident at the third-party network for compliance. The method may further include transferring the executable file from the intermediary entity network to the third party network. The method may further include executing the executable file, generating a log file upon the completion of the running of the plug-in scanning file and digitally signing the log file. The method may further include deciphering the log file at the intermediary entity network, generating a readable report based on the deciphering and transferring the readable report to the host entity network.Type: ApplicationFiled: August 19, 2021Publication date: February 23, 2023Inventors: Jeffrey Glasco, Jr., Benjamin Daniel Hardman, Robert Brice
-
Patent number: 11546218Abstract: An ML-based method for conforming a target network to control requirements of a host network is provided. The method may include running a first digital scan of the host network and determining the host network's control requirements based on the first digital scan. The method may include identifying, based on the second digital scan, elements of the target network that violate the control requirements. The method may include generating a compliance report and/or an executable file. The compliance report may include a compatibility score of the target network vis-à-vis the host network, and a compatibility plan that includes steps which improve the compatibility score and conform the target network to the control requirements of the host network. The executable file, when executed at the target network, may execute the compatibility plan.Type: GrantFiled: August 30, 2021Date of Patent: January 3, 2023Assignee: Bank of America CorporationInventors: Jeffrey Glasco, Jr., Benjamin Daniel Hardman, Robert Brice
-
Patent number: 10339423Abstract: The disclosed computer-implemented method for generating training documents used by classification algorithms may include (i) identifying a set of training documents used by a classification system to classify documents written in a first language, (ii) generating a list of tokens from within the training documents that indicate critical terms representative of classes defined by the classification system, (iii) translating the list of tokens from the first language to a second language, (iv) creating, based on the translated tokens, a set of simulated training documents that enables the classification system to classify documents written in the second language, and (v) classifying an additional document written in the second language based on the set of simulated training documents. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: June 13, 2017Date of Patent: July 2, 2019Assignee: Symantec CorporationInventors: Jonathan J. Dinerstein, Christian Larsen, Daniel Hardman
-
Patent number: 10242318Abstract: According to one embodiment, a method for predicting the trustworthiness of a particular website comprising receiving information about a plurality of websites and constructing a hierarchy of groups from the received information, the hierarchy of groups comprising one or more tiers and each tier comprising one or more groups. The method further comprising receiving information about a particular website and predicting the trustworthiness of the particular website based on the hierarchy.Type: GrantFiled: September 1, 2016Date of Patent: March 26, 2019Assignee: SYMANTEC CORPORATIONInventors: Jonathan J. Dinerstein, Daniel Hardman, Christian E. Larsen
-
Publication number: 20170346845Abstract: According to one embodiment, a method for predicting the trustworthiness of a particular website comprising receiving information about a plurality of websites and constructing a hierarchy of groups from the received information, the hierarchy of groups comprising one or more tiers and each tier comprising one or more groups. The method further comprising receiving information about a particular website and predicting the trustworthiness of the particular website based on the hierarchy.Type: ApplicationFiled: September 1, 2016Publication date: November 30, 2017Inventors: Jonathan J. Dinerstein, Daniel Hardman, Christian E. Larsen
-
Patent number: 8225193Abstract: A computer-implemented method for providing workspace navigation with a tag cloud. The computer-implemented method may include identifying a set of launch items within a workspace. The computer-implemented method may also include displaying the tag cloud in a graphical user interface. Each tag in the tag cloud may be associated with one or more launch items from the set of launch items. The computer-implemented method may further include receiving, from the graphical user interface, a selection of a tag from the tag cloud. The computer-implemented method may include using the selected tag to identify a subset of launch items within the set of launch items. The computer-implemented method may also include identifying a request to launch at least one launch item in the subset of launch items and launching the at least one launch item. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: June 1, 2009Date of Patent: July 17, 2012Assignee: Symantec CorporationInventors: Donald Kleinschnitz, Daniel Hardman, James Kleinschnitz