Patents Assigned to Bank of America Corporation
-
Publication number: 20240378324Abstract: A system for real-time authenticated obfuscation of electronic data provides real-time visual obfuscation of the data by transforming displayed data into undecipherable data when viewed by an unauthorized user while maintaining access for an authorized user. The system may further provide application-level obfuscation of electronic data via cryptographic keys such that only authorized applications may decrypt the encrypted data. In this way, the system provides secure access control of electronic data within a networked environment.Type: ApplicationFiled: July 23, 2024Publication date: November 14, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Michael Robert Young, Manu Jacob Kurian, Jo-Ann Taylor
-
Publication number: 20240380776Abstract: Embodiments of the present invention relate to apparatuses, systems, methods and computer program products for network resource component tracking and analysis across a distributed network and construction of a dynamic validated network resource library. Specifically, the system is typically structured for constructing an itemized hierarchical network resource structure database having integral granular technology element specific categorical data structures associated with determined plurality of network program resource components, denormalizing for enhancing data retrieval and processing performance, and providing network security by analyzing and validating the security of the composition of plurality of network program resource components, and detecting and remediating vulnerabilities.Type: ApplicationFiled: July 23, 2024Publication date: November 14, 2024Applicant: BANK OF AMERICA CORPORATIONInventor: Pierre Jacques Bouchard
-
Publication number: 20240380765Abstract: Embodiments of the present invention relate to apparatuses, systems, methods and computer program products for a dynamic quarantine engine integration with a validated network resource component library for network security. Specifically, the system typically is structured for real time deconstruction of incoming data and dynamic analysis of deconstructed components, and preventing unsuccessfully validated network resource components in a distributed network. In some aspects, in response to a successful first dynamic deconstructed validation of the first network program resource component, the system constructs a first categorical network program resource component record associated with the first network component at network resource structure database. The system then typically initiates a second dynamic deconstructed validation of the first categorical network program resource component record associated with the first network component.Type: ApplicationFiled: July 23, 2024Publication date: November 14, 2024Applicant: BANK OF AMERICA CORPORATIONInventor: Pierre Jacques Bouchard
-
Publication number: 20240378078Abstract: Aspects of the disclosure relate to monitoring, evaluating, and repairing bots in a hashchain-based distributed bot hub that process a workflow. In some embodiments, a computing platform may receive workflow information associated with performing a first workflow that includes executing one or more tasks using a plurality of virtual bots, identify a plurality of bots to process the first workflow, and determine, using a machine learning model, an arrangement of bot hubs in which each bot hub includes at least one bot and bots within a common bot hub share metadata while executing the first workflow process. Thereafter, the computing platform may send the determined arrangement of bot hubs to a bot orchestrator on a virtual bot host server to cause the bot orchestrator to instantiate the bots to form the determined arrangement of bot hubs and to process tasks from the first workflow using the at least one bot.Type: ApplicationFiled: May 8, 2023Publication date: November 14, 2024Applicant: Bank of America CorporationInventors: Sakshi Bakshi, Sudhakar Balu, Siva Paini
-
Publication number: 20240380740Abstract: Systems, computer program products, and methods are described herein for partial pool credentialing and authentication. The present invention is configured to receive a user request to access an account within a virtual environment using minimal authentication input from the user. Next, the system determines a set of contacts of the account comprising other accounts within the virtual environment that have a relationship with the user's account. The system may then transmit a request to the contacts for partial authentication credentials associated with the first account. The system then receives submitted partial authentication credentials from the contacts, determines that the submitted partial authentication credentials match the partial authentication credentials associated with the user's account, and authenticates the user to access the first account within the virtual environment. The authentication pool of the user and contacts can be monitored over time for improved security.Type: ApplicationFiled: May 8, 2023Publication date: November 14, 2024Applicant: BANK OF AMERICA CORPORATIONInventor: Olga Kocharyan
-
Publication number: 20240378280Abstract: Systems, methods, and computer program products are provided herein for continual device authentication in virtual environments. An example method includes receiving a request for authentication of a first user device associated with a first user where the first user device is associated with a virtual reality environment for the first user. The method further includes receiving authentication credentials associated with the first user and authenticating the first user device for accessing the virtual reality environment based on the authentication credentials. The received authentication credentials may include one or more unique device identifiers associated with the first user device. The method may further include causing presentation of a plurality of virtual input objects in the virtual reality environment and receiving one or more user inputs via the plurality of virtual input objects in the virtual reality environment for determining the authentication credentials associated with the first user.Type: ApplicationFiled: May 10, 2023Publication date: November 14, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Stephen Brown, George Anthony Albero, Winsome Donaldson, Olga Kocharyan, Elizabeth Rhodes Kral
-
Patent number: 12142268Abstract: Arrangements for voice enabled event processing are provided. In some aspects, a self-service kiosk may detect a mobile device of a user and a connection may be established between the self-service kiosk and the mobile device. The user may request, via natural language data input, processing of an event, such as a transaction. The natural language data input may be captured by the mobile device of the user and transmitted to the self-service kiosk or other processing device. The natural language input may be processed to identify the requested event. Based on the processed natural language data, an event processing request may be generated. Based on processing the event, one or more event processing commands may be generated. The event processing commands may be executed to perform one or more functions associated with completion of the event processing (e.g., distributing funds, activating a deposit receptacle, or the like).Type: GrantFiled: June 17, 2021Date of Patent: November 12, 2024Assignee: Bank of America CorporationInventors: Sandeep Kumar Chauhan, Udaya Kumar Raju Ratnakaram, Nandini Rathaur, Vibhu Srivastava, Puneetha Polasa
-
Patent number: 12142119Abstract: A method and system are provided for autonomously controlling and monitoring automatic teller machines (“ATMs”), leveraging a network of low-orbit satellites, during an ATM distress event. The method and system may include creating, using an ATM distress program in a first ATM, a distress message payload (“DMP”) associated with the first ATM. The method and system may include creating, using a data recovery and purge program in one or more ATMs (“the ATMs”), data recovery and purge payloads (“DRAPPs”) associated with the ATMs. The method and system may further include storing the DRAPPs in low-orbit satellites in a network of low-orbit satellites. The method and system may include running a recovery/purge orchestration engine to identify an optimal pathway for transporting the DRAPPs. The pathway may include low-orbit satellites in the network of low-orbit satellites as carriers for the DRAPPs to a centralized server.Type: GrantFiled: January 1, 2024Date of Patent: November 12, 2024Assignee: Bank of America CorporationInventor: Shailendra Singh
-
Patent number: 12141023Abstract: A system is provided for monitoring computing server performance using an artificial intelligence-based plugin. In particular, the system may be configured to continuously aggregate computing performance metric data of a computing device in the network, such as a server. The system may analyze the performance metric data using an artificial intelligence-based process to identify the hardware and/or software layers affected by computing workloads. Based on identifying the affected layers, the system may predict the impact of future workloads on the server and, based on the predictions, generate one or more recommendations for remediating server outages or downtime which may be caused by unanticipated volumes of network traffic, system calls, and the like. In this way, the system may provide an efficient way to optimize the use of computing resources within the network environment.Type: GrantFiled: June 1, 2022Date of Patent: November 12, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Avinash Basavant Nigudkar, Piedad Burnside, Sanjay Pillay, Anton Sumin, Silvano Valle
-
Patent number: 12141292Abstract: Aspects of the disclosure relate to tracking and mitigating security threats and vulnerabilities in browser extension engines. A computing platform may receive, via the communication interface, an indication of a user request to use a first browser extension at a first user computing device. The computing platform may then analyze the first browser extension to identify one or more potential vulnerabilities in the first browser extension, including performing an examination process on code associated with the first browser extension. Based on identifying one or more potential vulnerabilities, the computing platform may thereafter determine whether the user has an exception associated with each potential vulnerability. Upon detecting no exception for the user, the computing platform may then identify at least one corrective action associated with each potential vulnerability and transmit, to the first user computing device, instructions to perform the at least one corrective action.Type: GrantFiled: August 6, 2021Date of Patent: November 12, 2024Assignee: Bank of America CorporationInventors: Charles Philip, Priya Birendra Yadav
-
Patent number: 12143375Abstract: The present invention is configured to track a resource input distribution to a first user account; receive a third party distribution request from the first user account, the third party distribution request comprising at least a portion of the resource input distribution; and authenticate a third party associated with the third party distribution request, the authentication of the third party comprising a comparison of the third party against a trusted third party distribution set, wherein, in an instance where the third party matches at least one trusted third party of the trusted third party distribution set, allow a third party distribution associated with the third party distribution request.Type: GrantFiled: August 15, 2022Date of Patent: November 12, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Katherine Kei-Zen Dintenfass, Sandra Ann Breece
-
Patent number: 12141560Abstract: Various aspects of the disclosure relate to bi-directional hybrid-feedback driven self-healing and self-scaling language transpiler system may include bi-directional hopping to support multi language transpilation, automatic conversion of a mapping into a transformation specification, a hybrid feedback mechanism to update the transformation mappings, automatic scaling and/or creation of enterprise wide mapping and token (e.g., grammar) vocabulary, and/or a self-healing and/or corrective translation capability to perform automatic correction of any partial transpilations over time from a learned mapping.Type: GrantFiled: November 15, 2022Date of Patent: November 12, 2024Assignee: Bank of America CorporationInventors: Utkarsh Raj, Paul Jacob Abernathy, Vijaya Rudraraju, William Cruise
-
Patent number: 12141221Abstract: Content transfers over the network may be monitored by various systems in order to prevent malicious activity, viruses, other possible risks to computing devices, to confirm the integrity of the transfer, and/or to enforce policies implemented by an organization or user or other entity. To provide accurate and granular information about the content being transferred, an application extension, such as a browser extension, may be implemented to detect content transfers and to determine and store associated data. This data may include redirects, hashes, content file characteristics (name, size, creation date, extension, etc.), user identifier, source and destination information, and the like and/or combinations thereof. Using this information, an analysis system may evaluate the content transfer and the content and determine whether any actions are to be taken with respect to the user, the content, and/or the device.Type: GrantFiled: July 18, 2022Date of Patent: November 12, 2024Assignee: BANK OF AMERICA CORPORATIONInventor: Nicholas Walter O'Reilly
-
Patent number: 12141780Abstract: Transactions may be performed using a mobile device such as a user-wearable device using LoRaWAN protocol to minimize power consumption while maximizing communication range. Transaction information may be stored in the user-wearable device and transmitted to a transaction processing device using LoRaWAN communications. Transaction information may include user-specific information, payment information, merchant information, product information, user preference information and the like. In some instances, the only communication interface (or wireless communication interface) provided in the mobile device is a LoRaWAN communication interface.Type: GrantFiled: September 7, 2022Date of Patent: November 12, 2024Assignee: Bank of America CorporationInventors: Prashant Anna Bidkar, Ankit Upadhyaya, Prashant Khare, Suman Boroi Tamuly, Harmeet Singh, Bharat Indrakanti
-
Patent number: 12141695Abstract: Apparatus and methods for a pattern identification transformer neural network is provided. The pattern identification transformer neural network may be able to learn from relatively small numbers of data elements. The pattern identification transformer neural network may function in similar method to the way humans transform data points. As such, the pattern identification transformer neural network may be able to learn patterns from a small number of examples and determine what attributes are helpful from a single experience. The pattern identification transformer neural networks may include a multi-head attention module, a normalize module and a feed forward neural network. The multi-head attention module may receive vectors that correspond to experiences. The normalize module may normalize the received vectors. The feed forward neural network may incorporate the received vectors into the neural network.Type: GrantFiled: August 15, 2022Date of Patent: November 12, 2024Assignee: Bank of America CorporationInventors: Melissa Podrazka, Justin Horowitz
-
Publication number: 20240370554Abstract: Systems, computer program products, and methods are described herein for threat indexing and implementing artificial intelligence (AI) to detect malfeasant user activity in an electronic network. The present invention is configured to identify a resource transmission request associated with a user account; collect resource account data of the user account; collect resource transmission request data associated with the resource transmission request; apply a malfeasant identification artificial intelligence (AI) engine to the resource account data and the resource transmission request data; and determine, by the malfeasant identification AI engine, a malfeasant attribute of the resource transmission request, wherein the malfeasant attribute comprises at least one of a positive malfeasant attribute or a negative malfeasant attribute.Type: ApplicationFiled: May 5, 2023Publication date: November 7, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Elaina A. Williams, Anuja Mishra, Tomas M. Castrejon, III, Mark Alan Odiorne
-
Publication number: 20240372877Abstract: Systems, computer program products, and methods are described herein for detecting synthetic activity in a network via use of interactive artificial intelligence are provided. The method includes receiving a first account communication from an end-point device. The first account communication is associated with a user. The method also includes causing a transmission of a first reply communication based on the first account communication to be provided to the end-point device. The method further includes receiving a second account communication. The method still further includes determining a synthetic likelihood value based on the first account communication and/or the second account communication. The synthetic likelihood value indicates the likelihood that the first account communication and/or second account communication are synthetic.Type: ApplicationFiled: May 4, 2023Publication date: November 7, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Cody Dean Searl, Sanjay Arjun Lohar, Kyle Mayers, Karen Stanek McFeeters
-
Publication number: 20240370304Abstract: Tracking digital resources used in resource exchange events conducted in virtual reality computing environments. Digital resources used in resource exchange events conducted in virtual reality computing environments are tagged with data that at least identifies the location of the resource exchange event in terms of virtual reality computing environment and/or sub-environments. In response, machine-learning algorithm(s) are implemented that analyze the tags to determine resource exchange event movement patterns for specific digital resources. The resource exchange event movement patterns may include digital resource movement across multiple different virtual computing environments.Type: ApplicationFiled: May 1, 2023Publication date: November 7, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: George Anthony Albero, Olga Kocharyan, Elizabeth Rhodes Kral
-
Publication number: 20240372711Abstract: Systems, computer program products, and methods are described herein for dynamic folding and compression of data using quantum computing. The present disclosure is configured to determine a list of similarities through a comparison of a dataset with a historical record associated with previous datasets; recreate, in response to the list of similarities of the dataset, the dataset through a process map table; compress the dataset based on similarities found in the historical record; determine a folding type for folding of the compressed dataset; and encrypting the folded and compressed dataset, the dynamic hash table, and the key value data pair through quantum computing utilizing linear compression.Type: ApplicationFiled: May 2, 2023Publication date: November 7, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Radhika Vinaikrishnan Nair, Dalydas Karanath, Syed Najumudeen
-
Publication number: 20240372863Abstract: Systems, computer program products, and methods are described herein for monitoring and restricting electronic communication in a network based on communication characteristics. The method includes receiving an electronic communication from an end-point device. The method also includes identifying a potential user identity associated with the electronic communication. The potential user identity is based on one or more user identifiers associated with the electronic communication. The method further includes determining one or more restriction tags relating to the potential user identity. Each of the one or more restriction tags include a restriction to communication between the end-point device and one or more entity users. The method still further includes causing a restriction action to be executed based on determining the potential user identity has one or more restriction tags.Type: ApplicationFiled: May 4, 2023Publication date: November 7, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, Kyle Mayers, Karen Stanek McFeeters, James J. Siekman, Anna Rose Burchman