Patents by Inventor Elizabeth R. Liuzzo

Elizabeth R. Liuzzo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210034741
    Abstract: Aspects of the disclosure relate to preventing unauthorized screen capture activity. A computing platform may detect, via an infrared sensor associated with a computing device, an infrared signal from a second device attempting an unauthorized image capture of contents being displayed by a display device of the computing device. Subsequently, the computing platform may determine, via the computing platform, the contents being displayed by the display device. Then, the computing platform may retrieve a record of the contents being displayed by the display device. Then, the computing platform may determine a risk level associated with the infrared signal. Subsequently, the computing platform may perform, via the computing platform and based on the risk level, a remediation task to prevent the unauthorized image capture.
    Type: Application
    Filed: July 30, 2019
    Publication date: February 4, 2021
    Inventors: Michael Beveridge, Elizabeth R. Liuzzo, Daniel Horne, Marci Landy
  • Publication number: 20210034727
    Abstract: Aspects of the disclosure relate to physiological sensor-based monitoring and control systems. A computing device may determine a physiological measurement. Then, the computing device may compare the physiological measurement with one or more baseline values to determine whether the physiological measurement is anomalous with respect to the one or more baseline values. When the physiological measurement is determined to be anomalous with respect to the one or more baseline values, the computing device may execute access control on a device to prevent access by a user to one or more systems, applications, resources, or the like.
    Type: Application
    Filed: August 1, 2019
    Publication date: February 4, 2021
    Inventors: Elizabeth R. Liuzzo, George Albero, Edward Lee Traywick, Elijah Clark
  • Publication number: 20210034792
    Abstract: Aspects of the disclosure relate to managing enterprise security by utilizing a smart keyboard and a smart mouse. The smart keyboard may include pressure sensitive keys, a physical sensor configurable to detect a user characteristic associated with a user of the smart keyboard, an image capturing device configurable to capture an image of an activity in a vicinity of the smart keyboard, and a switch, communicatively coupled to the pressure sensitive keys, the physical sensor, and the image capturing device, where the switch is configurable to activate or deactivate the pressure sensitive keys, the physical sensor, and the image capturing device. The smart mouse may include a wheel, one or more pressure sensitive clickable components, and at least one physical sensor configurable to detect a user characteristic associated with a user of the smart mouse. Systems and methods for utilizing a smart keyboard and a smart mouse are also disclosed.
    Type: Application
    Filed: August 1, 2019
    Publication date: February 4, 2021
    Inventors: Elijah Clark, Edward Lee Traywick, George Albero, Elizabeth R. Liuzzo
  • Publication number: 20210029164
    Abstract: Aspects of the disclosure relate to improving user responses to cyber security threats. A computing platform may generate a test communication to simulate a potential cyber threat activity. Then, the computing platform may send, via the communication interface, the test communication to a user device associated with a target user. Then, the computing platform may receive, via the communication interface and from the user device, a response to the test communication. Subsequently, the computing platform may determine, based on the response, a threat awareness level for the target user, where the threat awareness level is indicative of a susceptibility of the target user to the potential cyber threat activity. Then, the computing platform may send, to the target user and based on the threat awareness level, an alert notification to counter the cyber threat activity.
    Type: Application
    Filed: July 24, 2019
    Publication date: January 28, 2021
    Inventors: George Albero, Michael Beveridge, Edward Lee Traywick, Elizabeth R. Liuzzo, Caleb G. Mann, David Joseph Walsh, Daniel Martin, Cody Searl, Paul Swiencicki
  • Publication number: 20210014229
    Abstract: Aspects of the disclosure relate to protecting enterprise computing resources by implementing an optical air gap system. A computing platform may receive, from an external communications server, a message. The computing platform then may generate an image representation of the message received from the external communications server. Subsequently, the computing platform may execute an optical character recognition (OCR) process on the image representation of the message, which may produce a recreated message. Then, the computing platform may validate contents of the recreated message. Based on validating the contents of the recreated message, the computing platform may send, to an enterprise communications server, the recreated message, and sending the recreated message to the enterprise communications server may cause the enterprise communications server to deliver the recreated message to at least one enterprise user computing device.
    Type: Application
    Filed: July 8, 2019
    Publication date: January 14, 2021
    Inventors: Michael Beveridge, Jeffrey K. Johnson, George Albero, Elizabeth R. Liuzzo
  • Publication number: 20200410620
    Abstract: Arrangements for dynamical travel threat assessment and control are provided. In some examples, a system may receive a request to schedule travel. The request may include one or more aspects. Based on the aspects, threat data may be requested. The threat data may be requested from a plurality of data sources including internal data sources and external data sources. Machine learning may be used to evaluate the threat data to generate or identify one or more potential threats associated with the requested travel. Based on the generated one or more potential threats, one or more actions may be identified. The actions may include completion criteria used to determine whether an action has been completed. The actions may be transmitted to one or more devices for execution. After executing the actions, action response data may be received and compared to the completion criteria to determine whether the requested travel should be authorized or denied.
    Type: Application
    Filed: June 26, 2019
    Publication date: December 31, 2020
    Inventors: Elizabeth R. Liuzzo, Edward Lee Traywick, Christopher J. Stott, Jennifer Walsh, Michael Beveridge, Jeffrey Kyle Johnson, Brittney Katrice Spencer
  • Publication number: 20200356644
    Abstract: Aspects of the disclosure relate to multicomputer processing and dissemination of data files. A computing platform having at least one processor, a memory, and a communication interface may search one or more social media platforms for unauthorized dissemination of a data file. The computing platform may correlate a unique identifying feature(s) of the disseminated data file to that of a copy of the data file previously distributed to a linked user account. The computing platform may transmit, via the communication interface, to an administrative computing device, an unauthorized dissemination report which, when processed by the administrative computing device causes a notification to be displayed on the administrative computing device. The notification may identify the linked user account associated with the unauthorized dissemination, the name, content, or general nature of the data file, and/or the social media platform(s) on which the data file was discovered.
    Type: Application
    Filed: May 7, 2019
    Publication date: November 12, 2020
    Inventors: Elizabeth R. Liuzzo, Jennifer Walsh, Christopher Stott
  • Patent number: 10333974
    Abstract: Systems and methods for enterprise cybersecurity triaging of emails suspected of malicious content. Triaging may include analyzing threat level of email submitted for cybersecurity review. The systems and methods may deconstruct an email into components scorable for threat type and/or threat level. The systems and methods may include multiple dynamically selectable threat scoring modules. Email threat level may be based on component scores. Evaluated emails and scored components may be stored. Cybersecurity threat analysis may include comparison of the email and/or the scorable components against previously stored evaluated emails and previously stored scored components. Triaging may include identifying enterprise response teams experienced in the threat type and/or threat level of the email and/or of its components. Triaging may include preventing infiltration of an enterprise by malicious emails.
    Type: Grant
    Filed: August 3, 2017
    Date of Patent: June 25, 2019
    Assignee: Bank of America Corporation
    Inventors: Christopher P. Schafer, Eric R. Camarata, Michael Thomas Malarkey, Elizabeth R. Liuzzo
  • Publication number: 20190044975
    Abstract: Systems and methods for enterprise cybersecurity triaging of emails suspected of malicious content. Triaging may include analyzing threat level of email submitted for cybersecurity review. The systems and methods may deconstruct an email into components scorable for threat type and/or threat level. The systems and methods may include multiple dynamically selectable threat scoring modules. Email threat level may be based on component scores. Evaluated emails and scored components may be stored. Cybersecurity threat analysis may include comparison of the email and/or the scorable components against previously stored evaluated emails and previously stored scored components. Triaging may include identifying enterprise response teams experienced in the threat type and/or threat level of the email and/or of its components. Triaging may include preventing infiltration of an enterprise by malicious emails.
    Type: Application
    Filed: August 3, 2017
    Publication date: February 7, 2019
    Inventors: Christopher P. Schafer, Eric R. Camarata, Michael Thomas Malarkey, Elizabeth R. Liuzzo