Patents by Inventor Ivan LOZANO
Ivan LOZANO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240154959Abstract: Systems, computer program products, and methods are described herein for providing authentication across a distributed resource network. The method includes receiving an authentication request associated with a user. The authentication request includes one or more potential physical characteristics. The method also includes identifying a non-fungible token associated with the user. The non-fungible token associated with the user includes one or more stored physical characteristic of the user. The method further includes comparing the one or more potential physical characteristics of the authentication request with the one or more stored physical characteristics of the user. The method still further includes generating an access determination for the authentication request based on the comparison of the one or more potential physical characteristics of the authentication request with the one or more stored physical characteristics of the user.Type: ApplicationFiled: November 4, 2022Publication date: May 9, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Rahul Kumar Mishra, Carl Frederick, Divya Ilango Arun, Ivan Michael Alvarez, Mohammad Reza Sahranavard, Jeanette Wiggins James, Utkarsh Raj, Victoria Lozano-Patrick
-
Publication number: 20210245143Abstract: The present invention relates to a method for removing dyes from textile effluents and other organic substances using nanocomposites based on zinc hydroxides and carboxylic acids capable of adsorbing and degrading. More specifically, the present invention consists of a method to generate new zinc hydroxide-based materials, which allows removal and degradation of methylene blue and other organic compounds from wastewater from industrial effluents, particularly those from textile industry.Type: ApplicationFiled: April 27, 2021Publication date: August 12, 2021Inventors: Leslie Gabriela DIAZ JALAFF, Guillermo Antonio Alberto GONZALEZ MORAGA, Eglantina Javiera BENAVENTE ESPINOSA, Harold Ivan LOZANO ZARTO, Sindy Milagros DEVIS RUIZ
-
Patent number: 11080399Abstract: A system and method for implementing a software emulation environment is provided. In one example, a mobile application can interface with an emulation environment that can be used to test whether the mobile application includes malware that can compromise the security and integrity of an enterprise's computing infrastructure. When the mobile application issues a call for data, a device mimic module can intercept the call and determine if the call includes a call for one or more checkable artifacts that can reveal the existence of the emulation environment. If such a call for data occurs, the device mimic module can provide one or more spoofed checkable artifacts that have been recorded from a real-world mobile device. In this way, the existence of the emulation environment can be concealed so as to allow for a more thorough analysis of a mobile application for potential hidden malware.Type: GrantFiled: December 19, 2019Date of Patent: August 3, 2021Assignee: The MITRE CorporationInventors: David Keppler, Ivan Lozano, Joseph Portner, Andrew Pyles, Christina L. Johns, David Bryson
-
Patent number: 10987663Abstract: The present invention relates to a method for removing dyes from textile effluents and other organic substances using nanocomposites based on zinc hydroxides and carboxylic acids capable of adsorbing and degrading. More specifically, the present invention consists of a method to generate new zinc hydroxide-based materials, which allows removal and degradation of methylene blue and other organic compounds from wastewater from industrial effluents, particularly those from textile industry.Type: GrantFiled: December 18, 2018Date of Patent: April 27, 2021Assignee: UNIVERSIDAD DE CHILEInventors: Leslie Gabriela Diaz Jalaff, Guillermo Antonio Alberto Gonzalez Moraga, Eglantina Javiera Benavente Espinosa, Harold Ivan Lozano Zarto, Sindy Milagros Devis Ruiz
-
Publication number: 20200125730Abstract: A system and method for implementing a software emulation environment is provided. In one example, a mobile application can interface with an emulation environment that can be used to test whether the mobile application includes malware that can compromise the security and integrity of an enterprise's computing infrastructure. When the mobile application issues a call for data, a device mimic module can intercept the call and determine if the call includes a call for one or more checkable artifacts that can reveal the existence of the emulation environment. If such a call for data occurs, the device mimic module can provide one or more spoofed checkable artifacts that have been recorded from a real-world mobile device. In this way, the existence of the emulation environment can be concealed so as to allow for a more thorough analysis of a mobile application for potential hidden malware.Type: ApplicationFiled: December 19, 2019Publication date: April 23, 2020Applicant: The MITRE CorporationInventors: David KEPPLER, Ivan LOZANO, Joseph PORTNER, Andrew PYLES, Christina L. JOHNS, David BRYSON
-
Patent number: 10528734Abstract: A system and method for implementing a software emulation environment is provided. In one example, a mobile application can interface with an emulation environment that can be used to test whether the mobile application includes malware that can compromise the security and integrity of an enterprise's computing infrastructure. When the mobile application issues a call for data, a device mimic module can intercept the call and determine if the call includes a call for one or more checkable artifacts that can reveal the existence of the emulation environment. If such a call for data occurs, the device mimic module can provide one or more spoofed checkable artifacts that have been recorded from a real-world mobile device. In this way, the existence of the emulation environment can be concealed so as to allow for a more thorough analysis of a mobile application for potential hidden malware.Type: GrantFiled: March 25, 2016Date of Patent: January 7, 2020Assignee: The MITRE CorporationInventors: David Keppler, Ivan Lozano, Joseph Portner, Andrew Pyles, Christina L. Johns, David Bryson
-
Publication number: 20190193061Abstract: The present invention relates to a method for removing dyes from textile effluents and other organic substances using nanocomposites based on zinc hydroxides and carboxylic acids capable of adsorbing and degrading. More specifically, the present invention consists of a method to generate new zinc hydroxide-based materials, which allows removal and degradation of methylene blue and other organic compounds from wastewater from industrial effluents, particularly those from textile industry.Type: ApplicationFiled: December 18, 2018Publication date: June 27, 2019Inventors: Leslie Gabriela DIAZ JALAFF, Guillermo Antonio Alberto GONZALEZ MORAGA, Eglantina Javiera BENAVENTE ESPINOSA, Harold Ivan LOZANO ZARTO, Sindy Milagros DEVIS RUIZ
-
Patent number: 10262143Abstract: A system and method for systematically undertaking model-based security analysis of a cyber physical system (CPS) is provided. In one example, a cyber model simulation and a control system simulation are mapped using various methods to determine which portions of the cyber-model simulation and the control system simulation are correlated with one another. Using the determined correlation, when a cyber-attack is generated on the cyber model simulation, a corresponding attack hook can be generated for the control system model. The attack hook is configured to be integrated into the control system model so as to mimic the effect on the control system that a cyber-attack can engender. Once one or more attack hooks are generated, the user can place the hooks into the control system simulation schemas and run a series of simulations to determine the effects of a cyber event on the control system in a CPS.Type: GrantFiled: September 13, 2016Date of Patent: April 16, 2019Assignee: The MITRE CorporationInventors: Roshan K. Thomas, Mary C. Hatfield, Ivan Lozano, Edward Overly, Joel G. Korb, Jimmy Vu
-
Publication number: 20180297121Abstract: The invention relates to copper nanoparticles and to a method for producing them, including the following steps: dissolving at least one copper salt, oxide or hydroxide in distilled water in a container; dissolving at least one stabilizer in distilled water in a container; mixing the two solutions in a reactor; adding a primary complexing agent; adding an alkali; adding an anti-foaming agent; adding at least one reducing agent, stopping the reaction by cooling to a temperature reaction between 0° C. and 25° C. while maintaining the stirring; adding at least one antioxidant; adding at least one secondary complexing agent; and maturing and washing the mixture; The invention also relates to the use of copper nanoparticles.Type: ApplicationFiled: December 30, 2016Publication date: October 18, 2018Inventors: Harold Ivan LOZANO ZARTO, Eglantina Javiera BENAVENTE ESPINOSA, Fernando Javier MENDIZABAL EMALDIA, Guillermo Antonio Alberto GONZALEZ MORAGA
-
Publication number: 20180075243Abstract: A system and method for systematically undertaking model-based security analysis of a cyber physical system (CPS) is provided. In one example, a cyber model simulation and a control system simulation are mapped using various methods to determine which portions of the cyber-model simulation and the control system simulation are correlated with one another. Using the determined correlation, when a cyber-attack is generated on the cyber model simulation, a corresponding attack hook can be generated for the control system model. The attack hook is configured to be integrated into the control system model so as to mimic the effect on the control system that a cyber-attack can engender. Once one or more attack hooks are generated, the user can place the hooks into the control system simulation schemas and run a series of simulations to determine the effects of a cyber event on the control system in a CPS.Type: ApplicationFiled: September 13, 2016Publication date: March 15, 2018Applicant: The MITRE CorporationInventors: Roshan K. THOMAS, Mary C. HATFIELD, Ivan LOZANO, Edward OVERLY, Joel G. KORB, Jimmy VU
-
Publication number: 20170277891Abstract: A system and method for implementing a software emulation environment is provided. In one example, a mobile application can interface with an emulation environment that can be used to test whether the mobile application includes malware that can compromise the security and integrity of an enterprise's computing infrastructure. When the mobile application issues a call for data, a device mimic module can intercept the call and determine if the call includes a call for one or more checkable artifacts that can reveal the existence of the emulation environment. If such a call for data occurs, the device mimic module can provide one or more spoofed checkable artifacts that have been recorded from a real-world mobile device. In this way, the existence of the emulation environment can be concealed so as to allow for a more thorough analysis of a mobile application for potential hidden malware.Type: ApplicationFiled: March 25, 2016Publication date: September 28, 2017Applicant: The MITRE CorporationInventors: David KEPPLER, Ivan LOZANO, Joseph PORTNER, Andrew PYLES, Christina L. JOHNS, David BRYSON