Patents by Inventor Joseph Aguayo
Joseph Aguayo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240022570Abstract: Identification of an electronic communication containing specific information is provided. Content of the electronic communication may be evaluated by a machine-learning model, and based on an evaluation of the content, it may be determined that the electronic communication contains the specific information. The electronic communication may be tagged with tag information indicating that the electronic communication contains the specific information, and transmission of the electronic communication may be blocked based on the tag information.Type: ApplicationFiled: September 28, 2023Publication date: January 18, 2024Applicant: Truist BankInventors: Amy Rose, Justin Dubs, Joseph Aguayo
-
Patent number: 11811764Abstract: Identification of an electronic communication containing specific information is provided. Content of the electronic communication may be evaluated by a machine-learning model, and based on an evaluation of the content, it may be determined that the electronic communication contains the specific information. The electronic communication may be tagged with tag information indicating that the electronic communication contains the specific information, and transmission of the electronic communication may be blocked based on the tag information.Type: GrantFiled: January 17, 2020Date of Patent: November 7, 2023Assignee: Truist BankInventors: Amy Rose, Justin Dubs, Joseph Aguayo
-
Patent number: 11803647Abstract: Targeted lockdown of a computer system for an identified vulnerability is provided. The targeted lockdown includes configuring a vulnerability lockdown module implemented on a computer system to perform targeted actions to change a configuration of the computer system. The targeted actions may be configured based at least in part on a type of data stored on the computer system and a potential severity of an impact on the computer system if the vulnerability is exploited. The vulnerability lockdown module may implement a vulnerability lockdown mode by causing the computer system to perform the targeted actions to change the configuration of the computer system by restricting functionality of portions of the computer system affected by the identified vulnerability. The targeted actions performed by the computer system may include altering a way in which a user interacts with the computer system.Type: GrantFiled: January 25, 2023Date of Patent: October 31, 2023Assignee: Truist BankInventors: Amy Rose, Joseph Aguayo, Justin Dubs
-
Publication number: 20230325479Abstract: Account permissions and data accessibility can be modified based on level of confidence for a login attempt to the account. User activity observations corresponding to one or more login attempts to access a user account can be stored. A confidence score associated with a successful login attempt of the user account can be determined. The confidence score is based on the user activity observations. A level of access to an application with functions and data for the user account can be determined. The level of access is based on the confidence score. The level of access is associated with the functions and the data that are executable and accessible subsequent to the successful login attempt.Type: ApplicationFiled: June 12, 2023Publication date: October 12, 2023Applicant: Truist BankInventors: Amy Rose, Joseph Aguayo, David Stone
-
Publication number: 20230319052Abstract: A source of a login attempt to a user account can be classified using machine learning. For example, a computing system can input user activity observations associated with one or more login attempts to one or more user accounts into a trained machine learning model. One or more distinguishing factors for the one or more login attempts can be received from the trained machine learning model. The computing system can determine a source of a current login attempt by applying a clustering algorithm to current values of the one or more distinguishing factors. The current values may be derived from current user activity observations associated with the current login attempt. The computing system can determine an authentication level for the current login attempt to the user account based on the source of the current login attempt.Type: ApplicationFiled: March 31, 2022Publication date: October 5, 2023Inventors: JOSEPH AGUAYO, David Stone, Michael Lewis, Yasmin Martinez, Doyoung Park
-
Patent number: 11714886Abstract: Account permissions and data accessibility can be modified based on level of confidence for a login attempt to the account. User activity observations corresponding to one or more login attempts to access a user account can be stored. A confidence score associated with a successful login attempt of the user account can be determined. The confidence score is based on the user activity observations. A level of access to an application with functions and data for the user account can be determined. The level of access is based on the confidence score. The level of access is associated with the functions and the data that are executable and accessible subsequent to the successful login attempt.Type: GrantFiled: May 27, 2022Date of Patent: August 1, 2023Assignee: Truist BankInventors: Amy Rose, Joseph Aguayo, David Stone
-
Patent number: 11651057Abstract: Account permissions and data accessibility can be modified based on level of confidence for a login attempt to the account. User activity observations corresponding to one or more login attempts to access a user account can be stored. A confidence score associated with a successful login attempt of the user account can be determined. The confidence score is based on the user activity observations. A level of access to an application with functions and data for the user account can be determined. The level of access is based on the confidence score. The level of access is associated with the functions and the data that are executable and accessible subsequent to the successful login attempt.Type: GrantFiled: May 27, 2022Date of Patent: May 16, 2023Assignee: Truist BankInventors: Amy Rose, Joseph Aguayo, David Stone
-
Patent number: 11620388Abstract: Targeted lockdown of a computer system for an identified vulnerability is provided. The targeted lockdown includes configuring a vulnerability lockdown module implemented on a computer system to perform targeted actions to change a configuration of the computer system. The computer system may be scanned by a vulnerability scanner configured to identify vulnerabilities. In response to identifying a vulnerability, the vulnerability may be communicated to the vulnerability lockdown module and the vulnerability lockdown module may implement a vulnerability lockdown mode by causing the computer system to perform the targeted actions to change the configuration of the computer system by restricting functionality of portions of the computer system affected by the identified vulnerability.Type: GrantFiled: November 18, 2019Date of Patent: April 4, 2023Assignee: Truist BankInventors: Amy Rose, Joseph Aguayo, Justin Dubs
-
Publication number: 20220300588Abstract: Account permissions and data accessibility can be modified based on level of confidence for a login attempt to the account. User activity observations corresponding to one or more login attempts to access a user account can be stored. A confidence score associated with a successful login attempt of the user account can be determined. The confidence score is based on the user activity observations. A level of access to an application with functions and data for the user account can be determined. The level of access is based on the confidence score. The level of access is associated with the functions and the data that are executable and accessible subsequent to the successful login attempt.Type: ApplicationFiled: May 27, 2022Publication date: September 22, 2022Inventors: Amy Rose, Joseph Aguayo, David Stone
-
Publication number: 20220292169Abstract: Account permissions and data accessibility can be modified based on level of confidence for a login attempt to the account. User activity observations corresponding to one or more login attempts to access a user account can be stored. A confidence score associated with a successful login attempt of the user account can be determined. The confidence score is based on the user activity observations. A level of access to an application with functions and data for the user account can be determined. The level of access is based on the confidence score. The level of access is associated with the functions and the data that are executable and accessible subsequent to the successful login attempt.Type: ApplicationFiled: May 27, 2022Publication date: September 15, 2022Inventors: Amy Rose, Joseph Aguayo, David Stone
-
Patent number: 11392677Abstract: Account permissions and data accessibility can be modified based on level of confidence for a login attempt to the account. User activity observations corresponding to one or more login attempts to access a user account can be stored. A confidence score associated with a successful login attempt of the user account can be determined. The confidence score is based on the user activity observations. A level of access to an application with functions and data for the user account can be determined. The level of access is based on the confidence score. The level of access is associated with the functions and the data that are executable and accessible subsequent to the successful login attempt.Type: GrantFiled: March 14, 2019Date of Patent: July 19, 2022Assignee: Truist BankInventors: Amy Rose, Joseph Aguayo, David Stone
-
Publication number: 20210226953Abstract: Identification of an electronic communication containing specific information is provided. Content of the electronic communication may be evaluated by a machine-learning model, and based on an evaluation of the content, it may be determined that the electronic communication contains the specific information. The electronic communication may be tagged with tag information indicating that the electronic communication contains the specific information, and transmission of the electronic communication may be blocked based on the tag information.Type: ApplicationFiled: January 17, 2020Publication date: July 22, 2021Inventors: Amy Rose, Justin Dubs, Joseph Aguayo
-
Publication number: 20210150034Abstract: Targeted lockdown of a computer system for an identified vulnerability is provided. The targeted lockdown includes configuring a vulnerability lockdown module implemented on a computer system to perform targeted actions to change a configuration of the computer system. The computer system may be scanned by a vulnerability scanner configured to identify vulnerabilities. In response to identifying a vulnerability, the vulnerability may be communicated to the vulnerability lockdown module and the vulnerability lockdown module may implement a vulnerability lockdown mode by causing the computer system to perform the targeted actions to change the configuration of the computer system by restricting functionality of portions of the computer system affected by the identified vulnerability.Type: ApplicationFiled: November 18, 2019Publication date: May 20, 2021Inventors: AMY ROSE, JOSEPH AGUAYO, JUSTIN DUBS
-
Publication number: 20200293638Abstract: Account permissions and data accessibility can be modified based on level of confidence for a login attempt to the account. User activity observations corresponding to one or more login attempts to access a user account can be stored. A confidence score associated with a successful login attempt of the user account can be determined. The confidence score is based on the user activity observations. A level of access to an application with functions and data for the user account can be determined. The level of access is based on the confidence score. The level of access is associated with the functions and the data that are executable and accessible subsequent to the successful login attempt.Type: ApplicationFiled: March 14, 2019Publication date: September 17, 2020Inventors: Amy Rose, Joseph Aguayo, David Stone