Patents by Inventor Sophie Morgan
Sophie Morgan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240163283Abstract: Embodiments of the present invention provide a system for implementing authentication control protocols via components of entity device. In particular, the system may be configured to determine initiation of a resource interaction by a user at an entity device, control one or more components of the entity device to cause the entity device to capture a real-time image of the user, compare the real-time image captured via the entity device with an updated enhanced user image stored in a data file of the user, in response to comparing the real-time image with the updated enhanced user image, determine if the real-time image matches the updated enhanced user image, and implement one or more authentication control protocols based on determining if the real-time image matches the updated enhanced user image.Type: ApplicationFiled: November 10, 2022Publication date: May 16, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Christopher Daniel Birch, Sophie Morgan Danielpour, Susan R. Hart, Son Huynh, Tyler Keith Prothro, Shannon Sabina Rolinger, Amado Jose Martinez Suarez, Stephen Jack Williams
-
Publication number: 20240160722Abstract: Embodiments of the present invention provide a system for identifying and redirecting incoming unauthorized data access requests. The system is configured for continuously monitoring one or more incoming data access requests from one or more sources, identifying that a data access request of the one or more incoming data access requests is an unauthorized request, redirecting the data access request to a controlled environment, performing one or more actions in the controlled environment to capture one or more interactions associated with the data access request within the controlled environment, and automatically generating one or more controls to secure a real-time environment based on the one or more interactions captured within the controlled environment.Type: ApplicationFiled: November 10, 2022Publication date: May 16, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Christopher Daniel Birch, Sophie Morgan Danielpour, Susan R. Hart, Son Huynh, Tyler Keith Prothro, Shannon Sabina Rolinger, Amado Jose Martinez Suarez, Stephen Jack Williams
-
Publication number: 20240127241Abstract: Systems, computer program products, and methods are described herein for electronic resource transfer authentication via a user characteristic data verification engine. The system receives a request to transfer electronic resources from a first endpoint device of a merchant. The system then identifies a resource vehicle owner associated with the electronic resource transfer, identifies at least one second endpoint device, then transmits a request for verification from the entity to the at least one second endpoint device, utilizing an application programming interface. The user characteristic feedback hardware of the at least one second endpoint device collects identifier data from the user of the at least one second endpoint device, and a user characteristic data verification engine is initiated and thereafter determines a binary identification output. An entirety of the electronic resources are distributed to the merchant based on the binary identification output.Type: ApplicationFiled: October 12, 2022Publication date: April 18, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Christopher Daniel Birch, Sophie Morgan Danielpour, Susan R. Hart, Son Huynh, Tyler Keith Prothro, Shannon Sabina Rolinger, Amado Jose Martinez Suarez, Stephen Jack Williams
-
Publication number: 20230344812Abstract: Embodiments of the present invention provide a system for establishing a secure session to authenticate DNS requests via dynamically configurable trusted network interface controllers. The system is configured for receiving a DNS request from a first device, wherein the DNS request comprises a unique authentication package, wherein the unique authentication package comprises encrypted data, in response to receiving the DNS request, initiating a handshaking protocol with the first device, establishing a handshaking session with the first device based on the encrypted data using the handshaking protocol, receiving a query associated with the DNS request, wherein the query is generated using a handshaking algorithm associated with the handshaking protocol, and performing at least one action in response to receiving the query.Type: ApplicationFiled: April 20, 2022Publication date: October 26, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Lauren Jenae Alibey, Sophie Morgan Danielpour, Jinyoung Nathan Kim, James Thomas MacAulay, Serge Alejandro Neri
-
Publication number: 20230344828Abstract: The present invention is generally related to systems and methods for providing an improved authentication and verification system through the use of compiled user data and unique user action data collected by the system from a prompted movement analysis. The system may collect and analyze multiple instances of user actions using intelligent machine learning techniques in order to identify patterns unique to the user. The system may then use this information in conjunction with other known information in order to determine the veracity of attempted user authentication or authorization requests.Type: ApplicationFiled: April 21, 2022Publication date: October 26, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Lauren Jenae Alibey, Sophie Morgan Danielpour, Jinyoung Nathan Kim, James Thomas MacAulay, Serge Alejandro Neri
-
Publication number: 20230336564Abstract: Arrangements for detecting unauthorized activity using spatially aware devices are provided. In some aspects, a computing device including a spatially aware chip may be detected at a location. An indication of device detection, as well as additional data may be captured and received. Upon a second detection of the computing device, additional data for that visit (e.g., a second visit, subsequent to a first visit to the location) may be captured and received. Earlier stored data associated with the device and/or spatially aware chip may be retrieved and compared to the additional for the second visit to detect one or more anomalies, determine a risk score for the device, and the like. Based on the detected anomalies and/or risk score, one or more mitigating actions may be identified and executed to mitigate the risk. Further, one or more alerts or notifications may be transmitted to one or more devices.Type: ApplicationFiled: April 19, 2022Publication date: October 19, 2023Inventors: Sophie Morgan Danielpour, Michael Robert Young
-
Publication number: 20230336364Abstract: Systems, computer program products, and methods are described herein for generating and monitoring digital certificate rights in a distributed network. The present invention may be configured to receive a first request for certification of a first user, cause a first user device to display a first interface including one or more input fields for receiving information associated with the first user, receive data input by the first user to the one or more input fields of the first interface, and determine, based on the data, whether the first user satisfies requirements for the certification. The present invention may be configured to generate, based on determining that the first user satisfies the requirements for the certification, a non-fungible token certifying the first user, store the non-fungible token on a distributed ledger, and record, on the distributed ledger, the first user as owner of the non-fungible token.Type: ApplicationFiled: April 19, 2022Publication date: October 19, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Lauren Jenae Alibey, Sophie Morgan Danielpour, Jinyoung Nathan Kim, James Thomas MacAulay, Serge Alejandro Neri
-
Publication number: 20230334161Abstract: Various systems, methods, and computer program products are provided for complex data encryption. The method includes receiving a user input code from a computing device associated with a user. The user input code is one or more plaintext characters. The method also includes generating a first encrypted value using a first encryption algorithm based on the user input code. The method further includes decrypting the first encrypted value using one or more additional encryption algorithms. The one or more synthetic user input codes are generated by the decryption of the first encrypted value using each of the one or more additional encryption algorithms. The method still further includes determining a first encryption vulnerability score based on the value of the one or more synthetic user input codes. The method also includes causing a transmission of a user input code notification based on the first encryption vulnerability score.Type: ApplicationFiled: April 19, 2022Publication date: October 19, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Sophie Morgan Danielpour, Serge Alejandro Neri, Lauren Jenae Alibey, James Thomas MacAulay, Jinyoung Nathan Kim
-
Patent number: 11765100Abstract: Systems, computer program products, and methods are described herein for intelligent capacity planning for resources with high load variance. The present invention is configured to receive, from a user input device, an input to process a request at a first time; determine network resources required to process the request; determine a current capacity of the network resources at the first time; retrieve, from an internal repository, a first predefined threshold associated with the network resources, wherein the first predefined threshold is associated with the current capacity; retrieve, from the request, a resource requirement associated with processing the request; determine that the resource requirement is greater than the first predefined threshold; and in response, generate a dashboard report, wherein the dashboard report indicates that the network resources are at a peak load capacity at the first time; and display the dashboard report to the user input device.Type: GrantFiled: April 19, 2022Date of Patent: September 19, 2023Assignee: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, James Thomas MacAulay, Serge Alejandro Neri, Lauren Jenae Alibey, Sophie Morgan Danielpour, Jinyoung Nathan Kim
-
Publication number: 20230018722Abstract: Methods and systems are disclosed for modulating glycaemia in a patient in which an activating stimulation signal is applied at an activating location at the vagus nerve, the activating stimulation signal configured to evoke a neural response in the vagus nerve; and a blocking stimulation signal is applied at a blocking location at the vagus nerve, the blocking stimulation signal configured to inhibit transmission of the evoked neural response along the vagus nerve past the blocking location; to produce unidirectional vagal nerve stimulation, the unidirectional vagal nerve stimulation being effective to modulate glycaemia in the patient.Type: ApplicationFiled: December 16, 2020Publication date: January 19, 2023Inventors: Sophie Morgan, Joel Villalobos, James Fallon
-
Publication number: 20220358505Abstract: Aspects of this disclosure relate to use of a monitoring platform in an electronic fund transfer network for detection of fraudulent fund transfers. The monitoring platform may use a database of accounts known to be associated with malicious activity in combination with an ML engine for the detection. The ML engine may be trained, using supervised machine learning, to identify fraudulent fund transfers based on various parameters associated with fund transfer requests. The monitoring platform may review the requests in near real-time and cancel or recall fraudulent requests.Type: ApplicationFiled: May 4, 2021Publication date: November 10, 2022Inventors: Sophie Morgan Danielpour, Meaghan Welch, Sean Kowalski
-
Patent number: D661503Type: GrantFiled: May 13, 2010Date of Patent: June 12, 2012Inventor: Sophie Morgan