Patents by Inventor Ivan LOZANO

Ivan LOZANO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240154959
    Abstract: Systems, computer program products, and methods are described herein for providing authentication across a distributed resource network. The method includes receiving an authentication request associated with a user. The authentication request includes one or more potential physical characteristics. The method also includes identifying a non-fungible token associated with the user. The non-fungible token associated with the user includes one or more stored physical characteristic of the user. The method further includes comparing the one or more potential physical characteristics of the authentication request with the one or more stored physical characteristics of the user. The method still further includes generating an access determination for the authentication request based on the comparison of the one or more potential physical characteristics of the authentication request with the one or more stored physical characteristics of the user.
    Type: Application
    Filed: November 4, 2022
    Publication date: May 9, 2024
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Rahul Kumar Mishra, Carl Frederick, Divya Ilango Arun, Ivan Michael Alvarez, Mohammad Reza Sahranavard, Jeanette Wiggins James, Utkarsh Raj, Victoria Lozano-Patrick
  • Publication number: 20210245143
    Abstract: The present invention relates to a method for removing dyes from textile effluents and other organic substances using nanocomposites based on zinc hydroxides and carboxylic acids capable of adsorbing and degrading. More specifically, the present invention consists of a method to generate new zinc hydroxide-based materials, which allows removal and degradation of methylene blue and other organic compounds from wastewater from industrial effluents, particularly those from textile industry.
    Type: Application
    Filed: April 27, 2021
    Publication date: August 12, 2021
    Inventors: Leslie Gabriela DIAZ JALAFF, Guillermo Antonio Alberto GONZALEZ MORAGA, Eglantina Javiera BENAVENTE ESPINOSA, Harold Ivan LOZANO ZARTO, Sindy Milagros DEVIS RUIZ
  • Patent number: 11080399
    Abstract: A system and method for implementing a software emulation environment is provided. In one example, a mobile application can interface with an emulation environment that can be used to test whether the mobile application includes malware that can compromise the security and integrity of an enterprise's computing infrastructure. When the mobile application issues a call for data, a device mimic module can intercept the call and determine if the call includes a call for one or more checkable artifacts that can reveal the existence of the emulation environment. If such a call for data occurs, the device mimic module can provide one or more spoofed checkable artifacts that have been recorded from a real-world mobile device. In this way, the existence of the emulation environment can be concealed so as to allow for a more thorough analysis of a mobile application for potential hidden malware.
    Type: Grant
    Filed: December 19, 2019
    Date of Patent: August 3, 2021
    Assignee: The MITRE Corporation
    Inventors: David Keppler, Ivan Lozano, Joseph Portner, Andrew Pyles, Christina L. Johns, David Bryson
  • Patent number: 10987663
    Abstract: The present invention relates to a method for removing dyes from textile effluents and other organic substances using nanocomposites based on zinc hydroxides and carboxylic acids capable of adsorbing and degrading. More specifically, the present invention consists of a method to generate new zinc hydroxide-based materials, which allows removal and degradation of methylene blue and other organic compounds from wastewater from industrial effluents, particularly those from textile industry.
    Type: Grant
    Filed: December 18, 2018
    Date of Patent: April 27, 2021
    Assignee: UNIVERSIDAD DE CHILE
    Inventors: Leslie Gabriela Diaz Jalaff, Guillermo Antonio Alberto Gonzalez Moraga, Eglantina Javiera Benavente Espinosa, Harold Ivan Lozano Zarto, Sindy Milagros Devis Ruiz
  • Publication number: 20200125730
    Abstract: A system and method for implementing a software emulation environment is provided. In one example, a mobile application can interface with an emulation environment that can be used to test whether the mobile application includes malware that can compromise the security and integrity of an enterprise's computing infrastructure. When the mobile application issues a call for data, a device mimic module can intercept the call and determine if the call includes a call for one or more checkable artifacts that can reveal the existence of the emulation environment. If such a call for data occurs, the device mimic module can provide one or more spoofed checkable artifacts that have been recorded from a real-world mobile device. In this way, the existence of the emulation environment can be concealed so as to allow for a more thorough analysis of a mobile application for potential hidden malware.
    Type: Application
    Filed: December 19, 2019
    Publication date: April 23, 2020
    Applicant: The MITRE Corporation
    Inventors: David KEPPLER, Ivan LOZANO, Joseph PORTNER, Andrew PYLES, Christina L. JOHNS, David BRYSON
  • Patent number: 10528734
    Abstract: A system and method for implementing a software emulation environment is provided. In one example, a mobile application can interface with an emulation environment that can be used to test whether the mobile application includes malware that can compromise the security and integrity of an enterprise's computing infrastructure. When the mobile application issues a call for data, a device mimic module can intercept the call and determine if the call includes a call for one or more checkable artifacts that can reveal the existence of the emulation environment. If such a call for data occurs, the device mimic module can provide one or more spoofed checkable artifacts that have been recorded from a real-world mobile device. In this way, the existence of the emulation environment can be concealed so as to allow for a more thorough analysis of a mobile application for potential hidden malware.
    Type: Grant
    Filed: March 25, 2016
    Date of Patent: January 7, 2020
    Assignee: The MITRE Corporation
    Inventors: David Keppler, Ivan Lozano, Joseph Portner, Andrew Pyles, Christina L. Johns, David Bryson
  • Publication number: 20190193061
    Abstract: The present invention relates to a method for removing dyes from textile effluents and other organic substances using nanocomposites based on zinc hydroxides and carboxylic acids capable of adsorbing and degrading. More specifically, the present invention consists of a method to generate new zinc hydroxide-based materials, which allows removal and degradation of methylene blue and other organic compounds from wastewater from industrial effluents, particularly those from textile industry.
    Type: Application
    Filed: December 18, 2018
    Publication date: June 27, 2019
    Inventors: Leslie Gabriela DIAZ JALAFF, Guillermo Antonio Alberto GONZALEZ MORAGA, Eglantina Javiera BENAVENTE ESPINOSA, Harold Ivan LOZANO ZARTO, Sindy Milagros DEVIS RUIZ
  • Patent number: 10262143
    Abstract: A system and method for systematically undertaking model-based security analysis of a cyber physical system (CPS) is provided. In one example, a cyber model simulation and a control system simulation are mapped using various methods to determine which portions of the cyber-model simulation and the control system simulation are correlated with one another. Using the determined correlation, when a cyber-attack is generated on the cyber model simulation, a corresponding attack hook can be generated for the control system model. The attack hook is configured to be integrated into the control system model so as to mimic the effect on the control system that a cyber-attack can engender. Once one or more attack hooks are generated, the user can place the hooks into the control system simulation schemas and run a series of simulations to determine the effects of a cyber event on the control system in a CPS.
    Type: Grant
    Filed: September 13, 2016
    Date of Patent: April 16, 2019
    Assignee: The MITRE Corporation
    Inventors: Roshan K. Thomas, Mary C. Hatfield, Ivan Lozano, Edward Overly, Joel G. Korb, Jimmy Vu
  • Publication number: 20180297121
    Abstract: The invention relates to copper nanoparticles and to a method for producing them, including the following steps: dissolving at least one copper salt, oxide or hydroxide in distilled water in a container; dissolving at least one stabilizer in distilled water in a container; mixing the two solutions in a reactor; adding a primary complexing agent; adding an alkali; adding an anti-foaming agent; adding at least one reducing agent, stopping the reaction by cooling to a temperature reaction between 0° C. and 25° C. while maintaining the stirring; adding at least one antioxidant; adding at least one secondary complexing agent; and maturing and washing the mixture; The invention also relates to the use of copper nanoparticles.
    Type: Application
    Filed: December 30, 2016
    Publication date: October 18, 2018
    Inventors: Harold Ivan LOZANO ZARTO, Eglantina Javiera BENAVENTE ESPINOSA, Fernando Javier MENDIZABAL EMALDIA, Guillermo Antonio Alberto GONZALEZ MORAGA
  • Publication number: 20180075243
    Abstract: A system and method for systematically undertaking model-based security analysis of a cyber physical system (CPS) is provided. In one example, a cyber model simulation and a control system simulation are mapped using various methods to determine which portions of the cyber-model simulation and the control system simulation are correlated with one another. Using the determined correlation, when a cyber-attack is generated on the cyber model simulation, a corresponding attack hook can be generated for the control system model. The attack hook is configured to be integrated into the control system model so as to mimic the effect on the control system that a cyber-attack can engender. Once one or more attack hooks are generated, the user can place the hooks into the control system simulation schemas and run a series of simulations to determine the effects of a cyber event on the control system in a CPS.
    Type: Application
    Filed: September 13, 2016
    Publication date: March 15, 2018
    Applicant: The MITRE Corporation
    Inventors: Roshan K. THOMAS, Mary C. HATFIELD, Ivan LOZANO, Edward OVERLY, Joel G. KORB, Jimmy VU
  • Publication number: 20170277891
    Abstract: A system and method for implementing a software emulation environment is provided. In one example, a mobile application can interface with an emulation environment that can be used to test whether the mobile application includes malware that can compromise the security and integrity of an enterprise's computing infrastructure. When the mobile application issues a call for data, a device mimic module can intercept the call and determine if the call includes a call for one or more checkable artifacts that can reveal the existence of the emulation environment. If such a call for data occurs, the device mimic module can provide one or more spoofed checkable artifacts that have been recorded from a real-world mobile device. In this way, the existence of the emulation environment can be concealed so as to allow for a more thorough analysis of a mobile application for potential hidden malware.
    Type: Application
    Filed: March 25, 2016
    Publication date: September 28, 2017
    Applicant: The MITRE Corporation
    Inventors: David KEPPLER, Ivan LOZANO, Joseph PORTNER, Andrew PYLES, Christina L. JOHNS, David BRYSON