Patents by Inventor Melissa Gordon Glenn

Melissa Gordon Glenn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11930005
    Abstract: Methods for securing an electronic communication is provided. Methods may include, in a registration process, creating and/or selecting an anti-phish, personalized, security token for a predetermined avatar. Methods may include, in the registration process, storing the token in a database. Methods may include, in an in-use process, generating an electronic communication at a virtual kiosk in a metaverse. Methods may include, in the in-use process, forwarding an electronic communication from the virtual kiosk to the avatar. The avatar may be associated with the account. Methods may include, in the in-use process, intercepting the communication at an edge interface. Methods may include, in the in-use process, selecting, from the database, the anti-phish, personalized, security token that is associated with the account. Methods may include, in the in-use process, injecting the selected token into the communication.
    Type: Grant
    Filed: April 5, 2022
    Date of Patent: March 12, 2024
    Assignee: Bank of America Corporation
    Inventors: Michael Young, Vinesh Patel, Melissa Gordon Glenn
  • Publication number: 20240054219
    Abstract: Apparatus and methods for providing an indicator of trustworthiness of a software application are provided. A program may receive information regarding the software application from a developer of the application. The program may analyze the application and determine that the application is trustworthy and secure. The program may then create a unique logo that may include various information to indicate to a user that the program has determined the application is trustworthy. The program may transmit the logo to the developer so the developer may incorporate the logo into the application. In an embodiment, the program may transmit the logo to a third-party application store for display on a page where the application is available.
    Type: Application
    Filed: August 11, 2022
    Publication date: February 15, 2024
    Inventors: Kelly Keiter, Cody Searl, Michael Young, Melissa Gordon Glenn, Sanjay Lohar
  • Publication number: 20230336587
    Abstract: Methods for securing an electronic communication is provided. In a registration process, an anti-phish, personalized, security token may be created and/or selected for a predetermined account. The token may be stored in a database at an enterprise location. An electronic communication may be generated at a third-party location on behalf of the enterprise. The communication may be forwarded from the third-party location to a recipient associated with the account. The communication may be intercepted at an edge server. The edge server may be located at the third-party location or the enterprise location. The edge server may be in communication with the database. The edge server may select, from the database, the anti-phish token that is associated with the account. The selected token may be injected into the communication. The communication with the token may be transmitted to the recipient.
    Type: Application
    Filed: April 18, 2022
    Publication date: October 19, 2023
    Inventors: Michael Young, Vinesh Patel, Melissa Gordon Glenn
  • Publication number: 20230336353
    Abstract: Methods for securing an electronic communication is provided. Methods may, in a registration process, create and/or select an anti-phish, personalized, security token for a predetermined account on a computing device. Methods may generate a hash of the token, store the token and the hash in a secure storage location within the computing device. Methods may, in an in-use process, generate an electronic communication at a channel. The database may be interposed along the channel. Methods may forward the communication to a recipient associated with the account. Methods may intercept the communication at the database. Methods may select the hash from the database. Methods may generate an injected hash by injecting the hash into the communication. Methods may transmit the communication with the hash to the recipient. Methods may receive the electronic communication with the injected hash at the recipient. Methods may compare the injected hash to the stored hash.
    Type: Application
    Filed: April 18, 2022
    Publication date: October 19, 2023
    Inventors: Michael Young, Vinesh Patel, Melissa Gordon Glenn
  • Publication number: 20230319030
    Abstract: Methods for securing an electronic communication is provided. Methods may include, in a registration process, creating and/or selecting an anti-phish, personalized, security token for a predetermined avatar. Methods may include, in the registration process, storing the token in a database. Methods may include, in an in-use process, generating an electronic communication at a virtual kiosk in a metaverse. Methods may include, in the in-use process, forwarding an electronic communication from the virtual kiosk to the avatar. The avatar may be associated with the account. Methods may include, in the in-use process, intercepting the communication at an edge interface. Methods may include, in the in-use process, selecting, from the database, the anti-phish, personalized, security token that is associated with the account. Methods may include, in the in-use process, injecting the selected token into the communication.
    Type: Application
    Filed: April 5, 2022
    Publication date: October 5, 2023
    Inventors: Michael Young, Vinesh Patel, Melissa Gordon Glenn
  • Publication number: 20230319029
    Abstract: A double anti-phish, personalized, security token for use with electronic communications is provided. The security token may be embedded in each electronic communication transmitted from an entity to a recipient. A first part of the token may be embedded in a body of the communication. A second part of the token may be embedded in a header of the communication. The second part of the security token may validate that the electronic communication is indeed from the entity. Upon validation, the second part may instruct the first part to display a validation symbol. Upon failure to validate, the second part may instruct the first part to display an alert symbol. The recipient receiving the electronic communication may use the first part of the validation symbol as a visual aid to determine a level of confidence of whether the electronic communication has been validated as being transmitted by the entity.
    Type: Application
    Filed: March 29, 2022
    Publication date: October 5, 2023
    Inventors: Michael Young, Vinesh Patel, Melissa Gordon Glenn
  • Publication number: 20230291765
    Abstract: Methods for securing an electronic communication is provided. Methods may include, in a registration process, creating and/or selecting an anti-phish, personalized, security token for a predetermined account. Methods may include, in the registration process, storing the token in a database. Methods may include, in an in-use process, generating an electronic communication at a channel. The database may be interposed along the channel. Methods may include, in the in-use process, forwarding the communication to a recipient. The recipient may be associated with the account. Methods may include, in the in-use process, intercepting the communication at the database. Methods may include, in the in-use process, selecting, from the database, the anti-phish, personalized, security token that is associated with the account. Methods may include, in the in-use process, injecting the selected token into the communication.
    Type: Application
    Filed: March 14, 2022
    Publication date: September 14, 2023
    Inventors: Michael Young, Vinesh Patel, Melissa Gordon Glenn
  • Publication number: 20230281641
    Abstract: Methods for increasing a data security of information shared and viewed within a social network platform is provided. Methods may include generating a social media impersonation score (“SMIS”) for a first user account on the social network platform. The SMIS may indicate a veracity of the user profile data associated with the first user account. Methods may include verifying the veracity of the user profile data by determining an authenticity of a corporate email address associated with the first user account. Methods may include determining that the corporate email address exists and verifying that a domain associated with the corporate email address is a trusted domain. Methods may include generating the SMIS based on results of the verifying and linking the SMIS to the first user account. Methods may further include displaying the first user account and the SMIS on a graphical user interface (“GUI”) of the social network platform.
    Type: Application
    Filed: March 1, 2022
    Publication date: September 7, 2023
    Inventors: Michael Young, Vinesh Patel, Melissa Gordon Glenn
  • Publication number: 20220222114
    Abstract: Embodiments of the present invention provide a system for performing communication-based authentication. In particular, the system may be configured to extract data from one or more communication channels associated with an entity, determine last activity timestamp associated with a user based on the data extracted from the one or more communication channels, determine that the user has accessed an entity application, via a user device, in response to determining that the user has accessed the entity application, transmit control signals to the user device to transform user interface of the entity application to display the last activity timestamp to the user, prompt the user to confirm the last activity timestamp, receive input associated with confirmation of the last activity timestamp from the user, via the user device, and perform one or more actions based on the input received from the user, via the user device.
    Type: Application
    Filed: January 12, 2021
    Publication date: July 14, 2022
    Applicant: BANK OF AMERICA CORPORATION
    Inventor: Melissa Gordon Glenn
  • Patent number: 11379765
    Abstract: An occupancy tracking device configured to receive an occupancy status request from a user device that includes a location identifier for a first physical location. The device is further configured to identify a local management system that is associated with the first physical location. The device is further configured to receive one or more images of an interior space of the first physical location in response to sending an occupancy information request. The device is further configured to determine a current occupancy level for the first physical location based at least in part on the number of people present in the images of the first physical location. The device is further configured to determine an occupancy status for the first physical location based on a comparison between the current occupancy level and an occupancy threshold value and to send the occupancy status to the user device.
    Type: Grant
    Filed: November 25, 2020
    Date of Patent: July 5, 2022
    Assignee: Bank of America Corporation
    Inventors: Rita Jean Winborne, Melissa Gordon Glenn, Daniel J. August
  • Publication number: 20220164740
    Abstract: An occupancy tracking device configured to receive an occupancy status request from a user device that includes a location identifier for a first physical location. The device is further configured to identify a local management system that is associated with the first physical location. The device is further configured to receive one or more images of an interior space of the first physical location in response to sending an occupancy information request. The device is further configured to determine a current occupancy level for the first physical location based at least in part on the number of people present in the images of the first physical location. The device is further configured to determine an occupancy status for the first physical location based on a comparison between the current occupancy level and an occupancy threshold value and to send the occupancy status to the user device.
    Type: Application
    Filed: November 25, 2020
    Publication date: May 26, 2022
    Inventors: Rita Jean Winborne, Melissa Gordon Glenn, Daniel J. August