Patents by Inventor William August
William August has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200402338Abstract: Apparatus and methods are provided for a system for tracking a movement of a dollar bill. The apparatus may include a dollar bill. The dollar bill may include an embedded sensor. The sensor may be embedded in a thickness of the bill. The sensor may have a thickness of less than 0.0043 inches. The sensor may include a memory for storing data and a transmitter. The apparatus may also include a receiver positioned on a brick and mortar banking center. The receiver may be configured to detect data transmitted from the bill and a direction of movement of the bill.Type: ApplicationFiled: June 21, 2019Publication date: December 24, 2020Inventors: Heather Dolan, Stephen T. Shannon, William August Stahlhut, Siten Sanghvi, Crystal M. Sundaramoorthy, Kevin A. Delson, Ryan Davis
-
Patent number: 10666752Abstract: Aspects of the disclosure relate to implementing and using a data processing system to provide real-time data to improve event delivery timing. A computing platform may establish respective connections with and receive, via a communication interface, (i) from collection of subordinate user computing devices, information defining a first event; (ii) from collection of supervisory user computing devices, supervisory information associated with the first event; and (iii) from a first participant computing device, first participant information associated with delivery of the first event. The computing platform may execute an algorithm for aggregating the information defining the first event and the supervisory information, and generating a formatted alert based thereon. The formatted alert may be transmitted for display on the first participant computing device.Type: GrantFiled: October 6, 2017Date of Patent: May 26, 2020Assignee: Bank of America CorporationInventors: Susan Varghese, William August Stahlhut, Mohamed A. Gahnoog, Katherine Dintenfass, Minh N. Vuong, Cameron Darnell Wadley
-
Patent number: 10664847Abstract: Aspects of the disclosure relate to implementing and using a data processing system to provide real-time data to improve event delivery timing. A computing platform may establish respective connections with and receive, via a communication interface, (i) from a subordinate user computing device, information defining a first event; (ii) from a supervisory user computing device, supervisory information associated with the first event; and (iii) from a first participant computing device, first participant information associated with delivery of the first event. The computing platform may execute an algorithm for comparing the information defining the first event, the supervisory information, and the first participant information, and generating a formatted alert based thereon. The formatted alert may be transmitted for display on the subordinate user computing device and/or the supervisory user computing device.Type: GrantFiled: October 6, 2017Date of Patent: May 26, 2020Assignee: Bank of America CorporationInventors: Susan Varghese, William August Stahlhut, Mohamed A. Gahnoog, Katherine Dintenfass, Minh N. Vuong, Cameron Darnell Wadley
-
Patent number: 10578219Abstract: A bite valve (100) comprises an outer barrel (105) of low-friction, soft but durable, laterally-compressible material and a rigid axially moveable inner stem (110). Closing the valve urges the distal face of a stem-mounted gasket (115) distally against the sharpened tubular proximal end of a barrel-embedded flanged rigid sleeve (120) through which fluid passes. The stem is continually urged distally by captive compression spring (140) which pushes proximally against sleeve (120) and distally against a cap (135) mounted on the stem's distal end. When a user bites the barrel's indented exterior bite zone (150), two opposing sides of a conical surface (155) inside the barrel contact and slidably urge the stem proximally, pulling the gasket away from the sleeve end, thereby opening the valve. After drinking, a user releases their bite, allowing the spring to again move the stem distally, pushing the gasket back into a (default) sealing condition pressed against the sleeve's sharpened proximal end.Type: GrantFiled: April 10, 2018Date of Patent: March 3, 2020Inventor: William August Holmes
-
Publication number: 20200045121Abstract: Aspects of the disclosure relate to multicomputer processing of data from social media service computing platforms and other sources with centralized event control. An event control computing platform may receive information from one or more social media service computing platforms. Subsequently, the event control computing platform may identify, based on the received information, whether a change should be made to user data associated with a user identifiable by the received information. If the information indicates that a change should be made to the user data, then the event control computing platform may extract metadata from the received information to verify the accuracy of the received information. When the metadata verifies the accuracy of the received information, the event control computing platform may generate a command configured to cause a change to the user data and then may transmit the generated command to an event validation computing platform.Type: ApplicationFiled: October 11, 2019Publication date: February 6, 2020Inventors: Minh Vuong, Cameron Wadley, Susan Varghese, Anna Hollifield, Mohamed A. Gahnoog, Katherine Dintenfass, William August Stahlhut
-
Publication number: 20200045059Abstract: Embodiments of the invention are directed to systems, methods and computer program products for enhanced detection of polymorphic malicious content within an entity. In this regard, the present invention receives information associated with an incidence of an electronic file; receives an first hash value of the electronic file from a first network device and a second hash value of the electronic file from a second network device; compares the first hash value with the second hash value; determines that the electronic file is polymorphic based on at least the match; initiates an execution of a quantum optimization algorithm using a quantum optimizer to determine one or more hash value states; receive information associated with an incidence of the electronic file at the third network device; determine that the electronic file is malware; and initiate an intrusion detection protocol configured to deny the electronic file access to the third network device.Type: ApplicationFiled: October 7, 2019Publication date: February 6, 2020Applicant: Bank of America CorporationInventors: Eric Eugene Sifford, William August Stahlhut
-
Publication number: 20200034533Abstract: A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat. In this regard, parties to a communication that are unaware of the actual context of the communication held by another party are made aware of that actual context poses a security threat and, in some embodiments, notifies the parties while the communication is still occurring.Type: ApplicationFiled: October 7, 2019Publication date: January 30, 2020Applicant: BANK OF AMERICA CORPORATIONInventors: Joseph Benjamin Castinado, Jeffrey B. Schroeder, William August Stahlhut
-
Publication number: 20200027085Abstract: Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.Type: ApplicationFiled: September 27, 2019Publication date: January 23, 2020Inventors: Jisoo Lee, John C. Checco, William August Stahlhut, Joseph Castinado, Brad Romano, Suki Ramasamy, Patrick Nicholas Lawrence, Lekha Ananthakrishnan
-
Publication number: 20200021598Abstract: Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.Type: ApplicationFiled: September 25, 2019Publication date: January 16, 2020Inventors: Jisoo Lee, John C. Checco, William August Stahlhut, Joseph Castinado, Brad Romano, Suki Ramasamy, Patrick Nicholas Lawrence, Lekha Ananthakrishnan
-
Publication number: 20200014700Abstract: Aspects of the disclosure relate to multicomputer processing of data from social media service computing platforms and other sources with centralized event control. A first computing platform may receive a request to authorize an event from a first device as well as information from one or more social media service computing platforms. The first computing platform may determine whether or not to authorize the event and may request authorization for the event from a second device. Subsequently, the first computing platform may command a second computing platform to authorize or not authorize the event accordingly. The rules and conditions evaluated by the first computing platform in determining whether or not to authorize the event may be determined or altered by a machine learning engine of the first computing platform.Type: ApplicationFiled: September 18, 2019Publication date: January 9, 2020Inventors: Mohamed A. Gahnoog, Cameron Darnell Wadley, Minh N. Vuong, Gail R. Davis, Victoria L. Dravneek, Susan Varghese, William August Stahlhut, Katherine Dintenfass
-
Patent number: 10484490Abstract: Aspects of the disclosure relate to multicomputer processing of data from social media service computing platforms and other sources with centralized event control. An event control computing platform may receive information from one or more social media service computing platforms. Subsequently, the event control computing platform may identify, based on the received information, whether a change should be made to user data associated with a user identifiable by the received information. If the information indicates that a change should be made to the user data, then the event control computing platform may extract metadata from the received information to verify the accuracy of the received information. When the metadata verifies the accuracy of the received information, the event control computing platform may generate a command configured to cause a change to the user data and then may transmit the generated command to an event validation computing platform.Type: GrantFiled: October 5, 2017Date of Patent: November 19, 2019Assignee: Bank of America CorporationInventors: Minh N. Vuong, Cameron Darnell Wadley, Susan Varghese, Anna Hollifield, Mohamed A. Gahnoog, Katherine Dintenfass, William August Stahlhut
-
Patent number: 10462150Abstract: Aspects of the disclosure relate to multicomputer processing of data from social media service computing platforms and other sources with centralized event control. A first computing platform may receive a request to authorize an event from a first device as well as information from one or more social media service computing platforms. The first computing platform may determine whether or not to authorize the event and may request authorization for the event from a second device. Subsequently, the first computing platform may command a second computing platform to authorize or not authorize the event accordingly. The rules and conditions evaluated by the first computing platform in determining whether or not to authorize the event may be determined or altered by a machine learning engine of the first computing platform.Type: GrantFiled: October 13, 2017Date of Patent: October 29, 2019Assignee: Bank of America CorporationInventors: Mohamed A. Gahnoog, Cameron Darnell Wadley, Minh N. Vuong, Gail R. Davis, Victoria L. Dravneek, Susan Varghese, William August Stahlhut, Katherine Dintenfass
-
Patent number: 10440051Abstract: Embodiments of the invention are directed to systems, methods and computer program products for enhanced detection of polymorphic malicious content within an entity. In this regard, the present invention receives information associated with an incidence of an electronic file; receives an first hash value of the electronic file from a first network device and a second hash value of the electronic file from a second network device; compares the first hash value with the second hash value; determines that the electronic file is polymorphic based on at least the match; initiates an execution of a quantum optimization algorithm using a quantum optimizer to determine one or more hash value states associated with the electronic file for a third network device; and initiates a control signal configured to store the one or more hash value states in a database associated with the third network device.Type: GrantFiled: March 3, 2017Date of Patent: October 8, 2019Assignee: Bank of America CorporationInventors: Eric Eugene Sifford, William August Stahlhut
-
Patent number: 10437991Abstract: A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat. In this regard, parties to a communication that are unaware of the actual context of the communication held by another party are made aware of that actual context poses a security threat and, in some embodiments, notifies the parties while the communication is still occurring.Type: GrantFiled: March 6, 2017Date of Patent: October 8, 2019Assignee: BANK OF AMERICA CORPORATIONInventors: Joseph Benjamin Castinado, Jeffery B. Schroeder, William August Stahlhut
-
Patent number: 10412082Abstract: Embodiments of the present invention provide a system for providing real-time multi-faceted authentication of a user before or during the user's interaction with a channel. The system uses authentication devices to acquire large amounts of authentication level information data, then makes a determination that at least a portion of the acquired authentication level information data cannot be efficiently processed by a conventional computer apparatus due to the complexity of a required analysis process and/or the quantity of data that must be processed. The system then formats and transmits this authentication data to a special quantum optimizer that is configured to perform the complex analysis and/or process extremely large volumes of data substantially in real-time. The quantum optimizer performs the analysis and returns a confirmed identity of the user that is then used by the conventional computer apparatus to authenticate the user for the interaction with the channel.Type: GrantFiled: March 9, 2017Date of Patent: September 10, 2019Assignee: BANK OF AMERICA CORPORATIONInventors: Cameron Darnell Wadley, William August Stahlhut, Elizabeth S. Votaw, Jeffery B. Schroeder
-
Publication number: 20190182257Abstract: Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.Type: ApplicationFiled: December 7, 2017Publication date: June 13, 2019Inventors: Jisoo Lee, John C. Checco, William August Stahlhut, Joseph Castinado, Brad Romano, Suki Ramasamy, Patrick Nicholas Lawrence, Lekha Ananthakrishnan
-
Publication number: 20190180276Abstract: Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.Type: ApplicationFiled: December 7, 2017Publication date: June 13, 2019Inventors: Jisoo Lee, John C. Checco, William August Stahlhut, Joseph Castinado, Brad Romano, Suki Ramasamy, Patrick Nicholas Lawrence, Lekha Ananthakrishnan
-
Publication number: 20190164150Abstract: Aspects of the disclosure relate to implementing and using a data processing system to allocate transactions to one or more linked user accounts. A computing platform having at least one processor, a memory, and a communication interface may read, from a blockchain, transaction information pertaining to a transaction between a user and a participant. The computing platform may identify the user and a plurality of linked user accounts, and then execute an algorithm for generating allocation information for allocating the transaction to one or more of the linked user accounts. The computing platform may establish, via the communication interface, a first connection with a user computing device and, while the first connection is established, transmit to the user computing device the allocation information which, when executed by the user computing device, causes a notification to be displayed on the user computing device.Type: ApplicationFiled: November 29, 2017Publication date: May 30, 2019Inventors: Jisoo Lee, Christopher S. Vale, Sean M. Gutman, William August Stahlhut
-
Patent number: 10284496Abstract: A system for providing resource distribution channels based on predicting future resource distributions typically includes a classical computer apparatus and a quantum optimizer in communication with the classical computer apparatus. The classical computer apparatus identifies resource transfer information related to a resource transfer of a user, wherein the user receives a resource collection as a result of the resource transfer. The quantum optimizer analyzes the resource transfer information to predict a future resource distribution of the resource collection.Type: GrantFiled: March 3, 2017Date of Patent: May 7, 2019Assignee: Bank of America CorporationInventors: Joseph Benjamin Castinado, William August Stahlhut
-
Publication number: 20190126162Abstract: A miniature magnetic theater apparatus provides an elevated surface supporting on its upper face (stage) one or more magnetic characters. The characters utilize magnets positioned under the stage for manipulation by a user in accordance with a stage play. Scenery elements may utilize magnets to attach to magnetically receptive drops, wings and a back wall. The drops and wings may be positioned in slotted side beams for positioning and support.Type: ApplicationFiled: October 30, 2018Publication date: May 2, 2019Inventor: William August Barrios