Patents by Inventor Kapil Pruthi

Kapil Pruthi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160164921
    Abstract: A computer system receives a service request over a service channel from a user device, initiates a challenge to the user device to provide authentication information based on a set of authenticators, and determines an initial level of authentication. When the initial level of authentication is not sufficient for the service channel or protected resource, the apparatus generates a challenge to the user device with at least one additional authenticator and determines an achieved level of authentication based on the further authentication information. When the achieved level of authentication reaches a target authentication level for the service channel, the apparatus continues processing the service request by the service channel. The computer may transfer the service request to another service channel with the authentication token obtained on the original service channel and further challenges the user device with additional authenticators when a higher level of authentication is necessary.
    Type: Application
    Filed: February 12, 2016
    Publication date: June 9, 2016
    Inventors: Andrew T. Keys, Kapil Pruthi, Xianhong Zhang, Mark A. Pender, Daniel Lynn Carpenter
  • Publication number: 20160154961
    Abstract: Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a security dashboard computing platform, a request for a security score associated with a customer. In response to receiving the request for the security score associated with the customer, the computer system may request, from a customer portal computing platform, one or more security preferences associated with the customer. Subsequently, the computer system may receive, from the customer portal computing platform, the one or more security preferences associated with the customer. The computer system then may determine, based on at least one security score definition file and based on the one or more security preferences associated with the customer, a security score for the customer. Thereafter, the computer system may provide, to the security dashboard computing platform, the determined security score for the customer.
    Type: Application
    Filed: February 4, 2016
    Publication date: June 2, 2016
    Inventors: Kapil Pruthi, Xianhong Zhang, Tao Huang, Raghav Shenoy, Palash K. Shil, Andy Keys, Vikram Jalota, Arul Arasu Madavadiyan
  • Publication number: 20160117507
    Abstract: Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a customer portal computing platform, a request for a security dashboard user interface for a customer. In response to receiving the request for the security dashboard user interface, the computer system may request, from a security score computing platform, a security score for the customer. Subsequently, the computer system may receive, from the security score computing platform, the security score for the customer. The computer system then may generate, based on the security score for the customer, the security dashboard user interface for the customer. Thereafter, the computer system may provide, to the customer portal computing platform, the generated security dashboard user interface for the customer.
    Type: Application
    Filed: January 8, 2016
    Publication date: April 28, 2016
    Inventors: Kapil Pruthi, Xianhong Zhang, Tao Huang, Raghav Shenoy, Palash K. Shil, Andy Keys, Vikram Jalota, Arul Arasu Madavadiyan
  • Patent number: 9306930
    Abstract: A computer system receives a service request over a service channel from a user device, initiates a challenge to the user device to provide authentication information based on a set of authenticators, and determines an initial level of authentication. When the initial level of authentication is not sufficient for the service channel or protected resource, the apparatus generates a challenge to the user device with at least one additional authenticator and determines an achieved level of authentication based on the further authentication information. When the achieved level of authentication reaches a target authentication level for the service channel, the apparatus continues processing the service request by the service channel. The computer may transfer the service request to another service channel with the authentication token obtained on the original service channel and further challenges the user device with additional authenticators when a higher level of authentication is necessary.
    Type: Grant
    Filed: May 19, 2014
    Date of Patent: April 5, 2016
    Assignee: Bank of America Corporation
    Inventors: Andrew T. Keys, Kapil Pruthi, Xianhong Zhang, Mark A. Pender, Daniel Lynn Carpenter
  • Patent number: 9286467
    Abstract: Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a security dashboard computing platform, a request for a security score associated with a customer. In response to receiving the request for the security score associated with the customer, the computer system may request, from a customer portal computing platform, one or more security preferences associated with the customer. Subsequently, the computer system may receive, from the customer portal computing platform, the one or more security preferences associated with the customer. The computer system then may determine, based on at least one security score definition file and based on the one or more security preferences associated with the customer, a security score for the customer. Thereafter, the computer system may provide, to the security dashboard computing platform, the determined security score for the customer.
    Type: Grant
    Filed: April 25, 2014
    Date of Patent: March 15, 2016
    Assignee: Bank of America Corporation
    Inventors: Kapil Pruthi, Xianhong Zhang, Tao Huang, Raghav Shenoy, Palash K. Shil, Andy Keys, Vikram Jalota, Arul Arasu Madavadiyan
  • Patent number: 9251335
    Abstract: Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a customer portal computing platform, a request for a security dashboard user interface for a customer. In response to receiving the request for the security dashboard user interface, the computer system may request, from a security score computing platform, a security score for the customer. Subsequently, the computer system may receive, from the security score computing platform, the security score for the customer. The computer system then may generate, based on the security score for the customer, the security dashboard user interface for the customer. Thereafter, the computer system may provide, to the customer portal computing platform, the generated security dashboard user interface for the customer.
    Type: Grant
    Filed: April 25, 2014
    Date of Patent: February 2, 2016
    Assignee: Bank of America Corporation
    Inventors: Kapil Pruthi, Xianhong Zhang, Tao Huang, Raghav Shenoy, Palash K. Shil, Andy Keys, Vikram Jalota, Arul Arasu Madavadiyan
  • Publication number: 20150334099
    Abstract: A computer system receives an authentication request from a user device and determines a determined device identification from a set of received device attributes. When the device is properly authenticated, the computer system generates an authentication token that is signed by the determined device identification and returns the authentication token to the user device. When the computer system subsequently receives a service request with an authentication token and a plurality of device attributes for a protected resource from a user device, the computer system determines a derived device identification from some or all of the received device attributes. When a signed device identification of the authentication token and the derived device identification are equal, the apparatus continues processing the service request. Otherwise, the service request is rejected.
    Type: Application
    Filed: May 19, 2014
    Publication date: November 19, 2015
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Xianhong Zhang, Andrew T. Keys, Kapil Pruthi, Daniel Lynn Carpenter, Mark A. Pender, Spencer Yezo, Apeksh M. Dave
  • Publication number: 20150334098
    Abstract: A computer system receives a service request over a service channel from a user device, initiates a challenge to the user device to provide authentication information based on a set of authenticators, and determines an initial level of authentication. When the initial level of authentication is not sufficient for the service channel or protected resource, the apparatus generates a challenge to the user device with at least one additional authenticator and determines an achieved level of authentication based on the further authentication information. When the achieved level of authentication reaches a target authentication level for the service channel, the apparatus continues processing the service request by the service channel. The computer may transfer the service request to another service channel with the authentication token obtained on the original service channel and further challenges the user device with additional authenticators when a higher level of authentication is necessary.
    Type: Application
    Filed: May 19, 2014
    Publication date: November 19, 2015
    Applicant: Bank of America Corporation
    Inventors: Andrew T. Keys, Kapil Pruthi, Xianhong Zhang, Mark A. Pender, Daniel Lynn Carpenter
  • Publication number: 20150312248
    Abstract: A system for authenticating a mobile user's identity is disclosed. The user may be required to log in upon first launching a mobile application. Subsequent launches of the mobile application may not require the user to log in. Upon subsequently launching the mobile application, the mobile device may transmit a token validation request that includes a soft token stored at the mobile application. An authentication server may receive the request and transmit a one-time password to a device that has the phone number associated with the soft token. The authentication server may also transmit a session ID number. When the authentication server receives an identity validation response from the mobile device that includes the session ID number and the one-time password, the authentication server may output requested customer account information.
    Type: Application
    Filed: April 25, 2014
    Publication date: October 29, 2015
    Applicant: Bank of America Corporation
    Inventors: Kapil Pruthi, Pavan Chayanam, Andrew Keys, Arul Arasu A Madavadiyan
  • Publication number: 20150310194
    Abstract: A system for authenticating a customer is disclosed. The customer may attempt to access protected resources located at an authentication server. The customer may log in to the authentication server's website, thereby submitting an authentication request. The authentication request may comprise attributes of the device the customer uses to log in. The authentication server may generate a device ID using the received device attributes and generate an authentication token that is signed with the device ID. The authentication server may transmit the authentication token to the client device. Subsequent requests to access protected resources from the client device may include the authentication token that is signed with the device ID.
    Type: Application
    Filed: April 29, 2014
    Publication date: October 29, 2015
    Applicant: Bank of America Corporation
    Inventors: Xianhong Zhang, Andrew Keys, Kapil Pruthi
  • Publication number: 20150310204
    Abstract: Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a security dashboard computing platform, a request for a security score associated with a customer. In response to receiving the request for the security score associated with the customer, the computer system may request, from a customer portal computing platform, one or more security preferences associated with the customer. Subsequently, the computer system may receive, from the customer portal computing platform, the one or more security preferences associated with the customer. The computer system then may determine, based on at least one security score definition file and based on the one or more security preferences associated with the customer, a security score for the customer. Thereafter, the computer system may provide, to the security dashboard computing platform, the determined security score for the customer.
    Type: Application
    Filed: April 25, 2014
    Publication date: October 29, 2015
    Applicant: Bank of America Corporation
    Inventors: Kapil Pruthi, Xianhong Zhang, Tao Huang, Raghav Shenoy, Palash K. Shil, Andy Keys, Vikram Jalota, Arul Arasu Madavadiyan
  • Publication number: 20150310205
    Abstract: Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a customer portal computing platform, a request for a security dashboard user interface for a customer. In response to receiving the request for the security dashboard user interface, the computer system may request, from a security score computing platform, a security score for the customer. Subsequently, the computer system may receive, from the security score computing platform, the security score for the customer. The computer system then may generate, based on the security score for the customer, the security dashboard user interface for the customer. Thereafter, the computer system may provide, to the customer portal computing platform, the generated security dashboard user interface for the customer.
    Type: Application
    Filed: April 25, 2014
    Publication date: October 29, 2015
    Applicant: Bank of America Corporation
    Inventors: Kapil Pruthi, Xianhong Zhang, Tao Huang, Raghav Shenoy, Palash K. Shil, Andy Keys, Vikram Jalota, Arul Arasu Madavadiyan
  • Patent number: 9071618
    Abstract: Methods, systems, apparatuses, and computer-readable media for providing multiple access levels to a single user account using different login credentials are presented. In one or more embodiments, a computing platform may receive an access request to access a user account for which at least two valid passwords have been defined. The request may include one or more login credentials. Based on determining that a password included in the one or more login credentials matches a valid password for the user account, the computing platform may determine an access level to be provided. Subsequently, the computing platform may provide access to the user account based on the determined access level. For example, when a first password is received from a third-party system, read-only access may be provided to the user account, whereas when a second password is received from a user device, full access may be provided to the user account.
    Type: Grant
    Filed: August 4, 2014
    Date of Patent: June 30, 2015
    Assignee: Bank of America Corporation
    Inventor: Kapil Pruthi
  • Patent number: 8141134
    Abstract: Embodiments of the invention are generally directed to a system and method for enrolling a user into an authentication system. In some embodiments of the invention, a user completes a first portion of the enrollment or setup process using a first computer environment, but is not permitted to complete the enrollment or setup process from the first computer environment. The system permits the user to complete the enrollment or setup process only from a second computer environment different from the first computer environment. In one embodiment, the second computer environment is any computer environment outside of the first computer environment.
    Type: Grant
    Filed: October 30, 2009
    Date of Patent: March 20, 2012
    Assignee: Bank of America Corporation
    Inventors: Jessica Lynn Brandt, William Larry Grant, Jr., Linda Marie Dziedzic, Aaron Daniel Lewis, Duncan Converse Morrell, Kapil Pruthi, Nishant H. Shah, Justin McCord, Heather Dolan, Ronald C. Mitchell, Jr., Michael Dean Bridges, Craig T. Johnson, Xianhong Zhang, Tanuja Melkani, Debra Jean Lewis, Gail R. Davis, Karen Choy, David Shroyer, Joseph M. Hollmann, Kris Tullos, Sidney A. Winchester, Jr.
  • Publication number: 20100313245
    Abstract: Embodiments of the invention are generally directed to a system and method for enrolling a user into an authentication system. In some embodiments of the invention, a user completes a first portion of the enrollment or setup process using a first computer environment, but is not permitted to complete the enrollment or setup process from the first computer environment. The system permits the user to complete the enrollment or setup process only from a second computer environment different from the first computer environment. In one embodiment, the second computer environment is any computer environment outside of the first computer environment.
    Type: Application
    Filed: October 30, 2009
    Publication date: December 9, 2010
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Jessica Lynn Brandt, William Larry Grant, JR., Linda Marie Dziedzic, Aaron Daniel Lewis, Duncan Converse Morrell, Kapil Pruthi, Nishant H. Shah, Justin McCord, Heather Dolan, Ronald C. Mitchell, JR., Michael Dean Bridges, Craig T. Johnson, Xianhong Zhang, Tanuja Melkani, Debra Jean Lewis, Gail R. Davis, Karen Choy, David Shroyer, Joseph M. Hollmann, Kris Tullos, Sidney A. Winchester, JR.