Patents Assigned to Bank of America Corporation
-
Publication number: 20230297689Abstract: Systems, computer program products, and methods are described herein for deployable software vulnerability testing platform. The present invention is configured to receive, from a user input device, an initial request from a user to generate a deployable software vulnerability testing (SVT) engine; prompt an SVT dashboard for display on the user input device to receive one or more input parameters associated with the first vulnerability in response to receiving the initial request; receive, via the SVT dashboard, the one or more input parameters; generate the SVT engine based on at least the one or more input parameters; receive, from the user input device, one or more deployment parameters associated with a deployment of the SVT engine; and deploy the SVT engine within the distributed technology infrastructure to identify the one or more instances of the first vulnerability based on at least the one or more deployment parameters.Type: ApplicationFiled: March 21, 2022Publication date: September 21, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Manu Jacob Kurian, Tomas M. Castrejon, III, Michael Robert Young, David Nardoni, Joel Townsend
-
Publication number: 20230300619Abstract: Systems, computer program products, and methods are described herein for dynamic communication channel switching for secure message propagation. The present invention may be configured to receive wireless signals from a plurality of devices and identify, from the plurality of devices and based on the wireless signals, a trusted device. The present invention may be configured to receive, from another device, a secure message, where the secure message includes information identifying a vulnerability in a network to which the trusted device is connected. The present invention may be configured to establish, based on receiving the secure message and using a first wireless communication interface, a communication link with a second wireless communication interface of the trusted device to establish a wireless data channel with the trusted device and transmit, via the wireless data channel, the secure message to the trusted device.Type: ApplicationFiled: March 21, 2022Publication date: September 21, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, Manu Jacob Kurian, David Nardoni, Joel Townsend, Michael Robert Young
-
Publication number: 20230291718Abstract: Embodiments of the present invention provide a centralized for allowing communication and transmission of data between entities and third party entities to securely provide requisitions to users. The system is configured for receiving a requisition request from an entity system, wherein the requisition request is associated with a user, in response to receiving the requisition request, performing one or more data transformations to transform at least a part of data associated with the requisition request, transmitting transformed data associated with the requisition request to an intermediary system, transmitting one or more control signals to the intermediary system to cause the intermediary system to transmit the transformed data associated with the requisition request to one or more third party entities, and determining that the intermediary system received one or more requisitions from the one or more third party entities.Type: ApplicationFiled: March 9, 2022Publication date: September 14, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Karen Lea MacQueen, Jill Marie Moser, Kimberly C. Turner
-
Publication number: 20230281609Abstract: Systems, computer program products, and methods are described herein for an electronic resource transfer platform utilizing a multi-path recommendation engine in blockchain. The present invention may be configured to receive a request from a user to transfer resources, generate a first block comprising the user request, and record the first block on a distributed ledger. The present invention may also be configured to receive resource transfer quotes from an entity or entities. The present invention may also be configured to utilize a recursive auto-recommendation engine to provide recommended resource transfer quotes to the user. Further, the present invention may be configured to generate a smart contract, establish a consensus, and settle the resource transfer after receiving a selection of a resource transfer quote from the user. The present invention may be further configured to generate a second block comprising resource transfer data and store the second block on the distributed ledger.Type: ApplicationFiled: March 1, 2022Publication date: September 7, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Prashant Khare, Raman Natarajan, Bhaskar Pratap Swain
-
Publication number: 20230281048Abstract: Reverse linkage of auxiliary resources to both a resource-receiving entity and a resource storage location associated with a resource-providing entity. The reverse nature of the linkage is realized, in that, the linkage occurs in response to one or more resource events occurring between the resource-providing entity and the resource-receiving entity. As a result of the linkage, the present invention provides for the auxiliary resources to be automatically applied to an incurring subsequent, typically next-in-time, resource event conducted between the resource-providing entity and the resource-receiving entity using the linked resource storage location.Type: ApplicationFiled: March 1, 2022Publication date: September 7, 2023Applicant: BANK OF AMERICA CORPORATIONInventor: Jill Marie Moser
-
Publication number: 20230281303Abstract: Aspects of the disclosure relate to preventing unauthorized screen capture activity. A computing platform may detect, via an infrared sensor associated with a computing device, an infrared signal from a second device attempting an unauthorized image capture of contents being displayed by a display device of the computing device. Subsequently, the computing platform may determine, via the computing platform, the contents being displayed by the display device. Then, the computing platform may retrieve a record of the contents being displayed by the display device. Then, the computing platform may determine a risk level associated with the infrared signal. Subsequently, the computing platform may perform, via the computing platform and based on the risk level, a remediation task to prevent the unauthorized image capture.Type: ApplicationFiled: May 16, 2023Publication date: September 7, 2023Applicant: Bank of America CorporationInventors: Michael Beveridge, Elizabeth R. Liuzzo, Daniel Horne, Marci Landy
-
Publication number: 20230274260Abstract: Intelligent assessment of the resource volume associated with physical objects stored in a secure container. Digital images of the contents/physical objects and evidentiary artifacts associated with the objects are captured and used to assess an initial resource volume. In specific embodiments, Non-Fungible Token(s) are generated using the digital image and the initial resource volume as inputs. Subsequently, nodes of a distributed trusts computing network are tasked with determining a current resource advancement volume for the NFT(s) based on the current demand, current resource advancement providers assessment and the initial resource volume. As a result of the present invention, a secure container holder or entity having an interest in the contents of the secure container is able to take otherwise idle property (i.e., the contents/objects in the secure container) and use them to create a tradeable commodity in the form of an NFT and/or leverage resource liquidity.Type: ApplicationFiled: February 25, 2022Publication date: August 31, 2023Applicant: BANK OF AMERICA CORPORATIONInventor: Saurabh Uprit
-
Publication number: 20230274266Abstract: Systems, computer program products, and methods are described herein for electronic tokenization of resource distribution instruments. The present invention may be configured to receive, from a first entity channel, a request for a secure credential for a resource distribution instrument, where the first entity channel received the request from a user device associated with a user. The present invention may be configured to generate, in response to receiving the request, the secure credential and provide, to a resource distribution instrument network, the secure credential and instructions to configure the resource distribution instrument network. The instructions may configure the resource distribution instrument network to provide, in response to receiving a token request using the secure credential from a second entity system, a token for use by the second entity system during distributions between the user and the second entity system.Type: ApplicationFiled: February 25, 2022Publication date: August 31, 2023Applicant: BANK OF AMERICA CORPORATIONInventor: Jeetendra Hukmichand Jain
-
Publication number: 20230273847Abstract: Systems, computer program products, and methods are described herein for evaluating, validating, correcting, and loading data feeds based on artificial intelligence input. The present invention may be configured to receive a data feed from a source for loading to a target data structure, analyze, based on historical feed data, metadata of the data feed to determine a likelihood of the data feed failing to load, and determine whether the likelihood of the data feed failing to load satisfies a threshold. The present invention may be configured to load the data feed to the target data structure, determine, after loading the data feed to the target data structure, whether the data feed failed to load, and either correct errors in the data feed or add error-containing portions of the data feed to a failed data log.Type: ApplicationFiled: February 25, 2022Publication date: August 31, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Vijaya Kumar Vegulla, Rama Venkata S. Kavali, Venugopala Rao Randhi, Damodarrao Thakkalapelli
-
Publication number: 20230266949Abstract: Systems, computer program products, and methods are described herein for continuous cognitive code logic detection and prediction using machine learning techniques. The present invention is configured to receive, from a user input device, source code scripts and target code scripts for functional code logic components of a full stack, wherein the source code scripts and the target code scripts are associated with one or more tiers; generate a training dataset based on at least the source code scripts, the target code scripts, and the functional code logic components of the full stack; train, using a machine learning algorithm, a machine learning model using the training dataset; determine a prediction accuracy associated with the machine learning model; determine that the prediction accuracy is greater than a predetermined threshold; and deploy the machine learning model on unseen source code scripts.Type: ApplicationFiled: February 23, 2022Publication date: August 24, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Namrata Kurmi, Samir Kiranbhai Desai, Pragyan Paramita Hembram, Srikanth Vemula
-
Publication number: 20230269138Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for determining if a given network component falls under the scope of dynamic host configuration protocol (DHCP) and automatically provisioning the network component accordingly. The invention is directed to a specific device, communication process, and backend processing approach which provides a tool for analyzing network component qualities and automating server provisioning.Type: ApplicationFiled: February 21, 2022Publication date: August 24, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Pradip Bachaspati, Rahul Arora, Suresh Chappa, Sunil Reddy Gaddam
-
Publication number: 20230267021Abstract: Systems and methods for routing information management system (IMS) messages to support multiple levels in an information management system environment. In some cases, a transaction code routing and classification scheme may be used to achieve isolation within an information management system for multiple development efforts occurring in one test system. An IMS router may intercept all transactions to determine a test level desired to process the transactions. At interception time, a destination is changed by the IMS router. The re-routed transactions are processed in separate data containers using unique programs, databases, user interfaces and formatting, based on requirements for a particular testing level.Type: ApplicationFiled: April 28, 2023Publication date: August 24, 2023Applicant: Bank of America CorporationInventors: Richard D. Rodecker, Mark A. Frazier
-
Publication number: 20230269197Abstract: Systems, computer program products, and methods are described herein for real-time distributed communication channel and multiple data processing channel selection. The present invention is configured to receive, from a first user input device via a first communication channel, a request to access resources; retrieve connectivity and routing parameters associated with the first communication channel; determine communication channel requirements associated with the request to access the resources; determine that the connectivity and routing parameters associated with the first communication channel does not meet the communication channel requirements associated with the request to access the resources; capture geographic information associated with the first user input device; determine a second communication channel available to the first user input device to access the resources; and authorize the first user input device to access the resources via the second communication channel.Type: ApplicationFiled: February 27, 2023Publication date: August 24, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Joseph Benjamin Castinado, Therese Humburg Willis, Christopher J. Smith, Kathleen Hanko Trombley, Kevin Graham Robberts, Lee Ann Proud, Adam Frederick Perrigo, Ann Ta, Naoll Addisu Merdassa
-
Publication number: 20230267525Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for a situationally aware mobile device which can provide a user with intelligent recommendations and information regarding nearby products based on a number of data points, including, but not limited to, neural network image analysis determinations, user resource account parameters, merchant offers, resource institution offers, and device comparison statistics.Type: ApplicationFiled: February 21, 2022Publication date: August 24, 2023Applicant: BANK OF AMERICA CORPORATIONInventor: Shailendra Singh
-
Publication number: 20230267030Abstract: Various aspects of the disclosure relate to automated route testing for application programming interfaces (APIs). An API route testing systems is configured to use classes and methods to identify API routes called by APIs and routes made available by application services. The class methods are customizable based on a programming language, testing or development framework, and the application type. Instances of classes are provided to detect routes similarly to API functions incorporated into a client application. Classes also detect routes in use by client services. A separate class is provided to compare the lists of API called routes and routes used by client services to return a listing of duplicate routes, unused API routes and client calls to invalid API routes (e.g., missing routes). For found duplicate routes and missing routes, the API route testing system generates an indication of the error and lists routes causing the error.Type: ApplicationFiled: April 28, 2023Publication date: August 24, 2023Applicant: Bank of America CorporationInventor: Melissa Goad
-
Publication number: 20230267018Abstract: Various systems, methods, and computer program products are provided for dynamically generating an API. The method includes extracting metadata from a command recording of a system API. The command recording of the system includes a starting breakpoint and an ending breakpoint for one or more repetitive processes. The method also includes determining one or more API parameters for an API to be generated based on the extracted metadata. The method further includes dynamically generating the API based on the API parameters. The method still further includes causing an authentication of the credentials relating to the API via robotic process automation.Type: ApplicationFiled: February 21, 2022Publication date: August 24, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Sakshi Bakshi, Siva Kumar Paini, Sudhakar Balu, Srinivasa Jitendra Dhanwada
-
Publication number: 20230267444Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for convenient resource transfer initiation and execution. The invention is directed to a specific device, communication process, and backend processing approach which allows users to communicate through one or more channels of communication in order to send and receive information relevant to available resource transfer recipients or senders. Via voice communication, the invention allows the user to conduct a hands-free resource transfer initiation to nearby eligible users and devices which are intelligently and automatically identified and verified by the system described herein.Type: ApplicationFiled: February 18, 2022Publication date: August 24, 2023Applicant: BANK OF AMERICA CORPORATIONInventor: Saurabh Gupta
-
Publication number: 20230267034Abstract: A system is provided for code base sharing during computing application failure using a distributed register network. In particular, the system may comprise a plurality of computing application systems that are associated with one another and stored on a distributed register. In this regard, the distributed register may share a code base as well as processing logs for each application. The system may use a deep learning based machine learning process for identifying the dependencies, input data sources for each application, and expected data outputs. Accordingly, if an application experiences a failure, the payload of the failed application may be read and/or processed by another application to maintain the workflow. Furthermore, the system may use AI/ML processes to analyze the code base and/or system logs associated with application failures and generate recommendations for remediating failures.Type: ApplicationFiled: February 24, 2022Publication date: August 24, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Rajalakshmi Arumugam, Mahesh Ganesan
-
Publication number: 20230267069Abstract: Various systems, methods, and computer program products are provided for dynamically monitoring of changes in coding data. The method includes receiving an execution plan of a data model. The execution plan includes code including one or more processing steps of how data is transformed by the data model. The method also includes retrieving at least one stored code for the data model. The method further includes determining a code change determination value indicating the differences between the code of the data model received in the execution plan and the at least one stored code for the data model. The method further includes generating a code action based upon the code change determination value. The method also includes replacing the stored code for the data model with the code of the data model received in the execution plan in an instance the code change determination value is below a predetermined threshold.Type: ApplicationFiled: February 23, 2022Publication date: August 24, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Nevetha Jeyarajaboopathy, Vinotha Ayyakkannu, Ramesh Reddi
-
Publication number: 20230269246Abstract: Secure user authentication is provided by leveraging the use of quantum keys, steganography and random user keys/passcodes. Random user passcodes limit both the entity’s control over the user and potential exposure of the passcode to wrongdoers. From a security standpoint, use of quantum keys and quantum communication channels heightens security during transmission of keys, such that if a wrongdoer would attempt to hack the transmission, the quantum sequence would break, which would not only prevent the hack but also result in remedial actions, such as preventing the authentication-requiring event, providing alerts and the like. Further, use of steganography also heightens security by preventing exposure to the keys during transmission and/or while the authentication process is occurring on the display of the user’s mobile device.Type: ApplicationFiled: February 23, 2022Publication date: August 24, 2023Applicant: BANK OF AMERICA CORPORATIONInventor: Swetapadma Mohanty