Patents Assigned to Bank of America Corporation
-
Publication number: 20250150536Abstract: Arrangements for intelligent call routing are provided. Audio data from a call between an agent device and a user device may be received and a topic of the call and metadata may be extracted from the audio data. The extracted topic and metadata may be compared to an alert signals database to output whether an alert will be attached to the call. Agent parameters associated with the agent who is part of the call may be identified. A machine learning model may be executed by inputting, to the model, the extracted topic, extracted metadata, the output of whether the alert will be attached to the call, and the agent parameters, to output a routing signal. Based on the routing signal, a second call communication session may be initiated between the agent computing device and a computing device of at least one of another agent or a supervisor.Type: ApplicationFiled: November 8, 2023Publication date: May 8, 2025Applicant: Bank of America CorporationInventors: Nipun Mahajan, Amit Mishra, Yogesh Raghuvanshi, S. B. Pravin Kumar, Balaji Sugumar, Yaksh Kumar Singh
-
Publication number: 20250150436Abstract: Systems, computer program products, and methods are described herein for advanced network traffic analysis in a computing environment. The present disclosure is configured to retrieve, from a traffic data log of a Web Application Firewall (WAF), information associated with a blocked traffic instance; implement, using a code analysis subsystem, a security testing protocol on a host application associated with the blocked traffic instance; determine an exposure associated with the host application based on at least implementing the security testing protocol; generate a notification comprising information associated with the exposure; and transmit a signal configured to cause a computing device associated with the host application to display the notification.Type: ApplicationFiled: July 18, 2023Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventor: Charles Philip
-
Publication number: 20250150484Abstract: Embodiments of the present invention relate to apparatuses, systems, methods and computer program products for dynamic adapted security analysis of network resource components. Specifically, the system is typically structured for providing proactive network security by dynamically analyzing entering network resource components for vulnerabilities, establishing adapted validation thresholds and mitigation actions, and preventing unsuccessfully validated network resource components in a distributed network. In some aspects, in response to determining that a file attribute data element of the first network program resource component is of a predetermined file type, the system blocks the incoming file transfer associated with the first network program resource component.Type: ApplicationFiled: January 13, 2025Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventor: Pierre Jacques Bouchard
-
Publication number: 20250150465Abstract: Systems, computer program products, and methods are described herein for detecting data leaks via a distributed data orchestration apparatus and transmitted fabricated data responses. The present disclosure is configured to: create a plurality of fabricated data accounts within a set of network servers, where the plurality of fabricated data accounts are connected to an account monitoring engine; collect a set of transmitted fabricated data responses from the plurality of fabricated data accounts; analyze the collected set of transmitted fabricated data responses via an orchestration apparatus; determine the root cause of the data leak associated with the plurality of fabricated data accounts via the orchestration apparatus; and locate a geographic source of the data leak associated with the plurality of fabricated data accounts via a breach engine, where the geographic source of the data leak is located through the root cause of the data leak.Type: ApplicationFiled: November 8, 2023Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Saurabh Gupta, Amit Bhandari
-
Publication number: 20250148435Abstract: Systems and methods to enable green mining for centralized and/or decentralized financial systems are discussed. In some cases, the green mining methodologies are incorporated in distributed quantum ledger-based decentralized finance ecosystems, in decentralized financial systems and/or centralized financial systems. A proof of influence algorithm enables miners to accumulate and use reputation points to reduce computational power requirements on their systems and/or reduce energy consumptionInfluence points is an indicator of trustworthiness of the miner established based utilizing a predictive algorithm that analyzes the past mining behavior. Higher reputational scores result in lesser computationally intensive activities, which reduce energy consumption. The proof of influence algorithm rewards miners to encourage participation as validators of new blocks and/or other activities on the decentralized or centralized ledger-based systems.Type: ApplicationFiled: November 6, 2023Publication date: May 8, 2025Applicant: Bank of America CorporationInventors: Priyanka K, Durga Prasad Kutthumolu, Abhishek Arya, Subburathinam Krishnan
-
Publication number: 20250148722Abstract: Systems, computer program products, and methods are described herein for generating an interactive 3D environment using spatial computing for validation of data.Type: ApplicationFiled: November 8, 2023Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Chetan Singh Naruka, Suresh P. Jolhapuram, Abirami V B, Shailendra Singh
-
Publication number: 20250150277Abstract: A system and process for generating synthetic fingerprints for metadata security and document verification using generative artificial intelligence (AI), generating smart contracts for electronic notarization using synthetically generated invisible fingerprint metadata, and/or automatic tagging of smart contracts for electronic notarization.Type: ApplicationFiled: January 14, 2025Publication date: May 8, 2025Applicant: Bank of America CorporationInventors: Sakshi Bakshi, Durga Prasad Kutthumolu
-
Publication number: 20250150835Abstract: An intelligent system for resource exchange event verification/authentication based on a comparison between the known Subscriber Identity Module (SIM) card features and the real-time extracted SIM card features. SIM card features are initially extracted from the SIM card of a user's mobile communication device and stored in a SIM card feature file that is associated with the user's mobile communication device. Subsequently, when the mobile communication device initiates a resource exchange event, the current SIM card features are extracted from the SIM card currently residing in the mobile communication device and compared to those SIM card features in the SIM card feature file. The comparison is an intelligent comparison that takes into account, normal changes that may have occurred between the generation of the SIM card feature file and time of the resource exchange event.Type: ApplicationFiled: January 11, 2025Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventor: Shailendra Singh
-
Publication number: 20250148733Abstract: Systems, computer program products, and methods are described herein for generating an interactive 3D environment using spatial computing to generate historical digital components.Type: ApplicationFiled: November 8, 2023Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Chetan Singh Naruka, Suresh P. Jolhapuram, Abirami V B, Shailendra Singh
-
Publication number: 20250148347Abstract: Systems, computer program products, and methods are described herein for detecting manipulation of training data used for machine learning models. The present disclosure is configured to receive an interaction originating from an end-point device; validate the interaction via a primary model; identify a set of triggers within a backdoor model, where the backdoor model is modeled off the primary model capable of undergoing stress testing associated with a set of triggers; pause the interaction upon identification of the set of triggers within the backdoor model; transmit the identified set of triggers to an autonomous artificial general intelligence (AGI) agent, generate a set of synthetic data via the autonomous AGI agent, where the set of synthetic data removes the set of triggers from the primary model; and distribute the set of synthetic data to the primary model to correct the set of triggers within the primary model.Type: ApplicationFiled: November 6, 2023Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Saurabh Arora, Srija Reddy Kallu, Durga Prasad Kutthumolu
-
Publication number: 20250148100Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for identifying sensitive, or non-publicly available, information, reclassifying identified sensitive information, and managing access to identified sensitive information in an intelligent and dynamic manner. In some embodiments, the systems and methods described herein utilize a pattern recognition engine designed to analyze and detect identifying characteristics of sensitive data or private data characteristics. The system may also employ an automated response and reporting capability to automatically re-classify sensitive data and apply appropriate protection measures in a multi-platform approach.Type: ApplicationFiled: January 13, 2025Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Prashant Ranjan Srivastava, Michelle Andrea Boston, Kamalanathan Jeganathan, Aravind Chandramohan Kumar, Miriam Levinsohn, Annabelle Williamson McLemore, Catharina Rabie, Ananth Rajagopalan, Parthiban Tiruvayur Shanmugam, Durga P. Turaga
-
Publication number: 20250148788Abstract: Various aspects of the disclosure relate to automated monitoring of content associated with an individual for indicators that the content may be a deepfake. A deepfake analysis training device trains artificial intelligence-based models based on validated content associated with one or more profiles. Each profile is associated with an individual. A deepfake analysis engine may be installed on computing devices to monitor access to content (e.g., multimedia content) for deepfakes associated with the one or more profiles, as configured. The deepfake analysis engine may be stand-alone application, an application extension, or may be integrated into third-party applications via application programming interface functions. Analyzed content is assigned a likelihood score that is compared to threshold values that indicates a likelihood that the content is a deepfake. When identified, deepfake content initiates an alert generation and/or blocking of the content otherwise the content is presented to a user.Type: ApplicationFiled: November 7, 2023Publication date: May 8, 2025Applicant: Bank of America CorporationInventors: Dylan Bellinger, Sanjay Lohar, Kyle Mayers, Amado Martinez Suarez, Cody Searl, Rachel Howze
-
Publication number: 20250148109Abstract: Systems, computer program products, and methods are described herein for enhanced encryption orchestration and application integration frameworks. The system performs steps of initializing a broker application to act as a data security broker within a computing environment; providing an application programming interface (API) for external application interaction; receiving and processing requests via the API for access to encrypted code and data; containerizing the code and data within an isolated environment, subject to predefined rules; monitoring usage to ensure adherence to these rules; initiating self-destruction of the container upon reaching a predetermined usage limit or condition; and securely erasing all sensitive data and code after usage completion.Type: ApplicationFiled: November 8, 2023Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Maharaj Mukherjee, Dihong Qiu, Sanjeeb Kumar Sahoo, Venkat P. Ravula, Veerandra S. Srivastava, Riazuddin Khaja, Swetha Guddannagari, Mayank Sharma, Esada Qazi
-
Publication number: 20250147949Abstract: Systems, computer program products, and methods are described herein for dynamic visual graph structure providing multi-stream data integrity and analysis. The present disclosure is configured to provide a reactive system aimed to trace the root cause of incidents and uncover potential gaps in security of an enterprise system. Maintaining accurate and meaningful information related to incidents is the key for success of data security protocols. The integrity of message data is kept intact for improved forensic investigation, as each database may keep varying information related to a single global session.Type: ApplicationFiled: January 13, 2025Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Vijay Kumar Yarabolu, Gowthaman Sundararaj
-
Publication number: 20250147965Abstract: A system is provided for intelligent and integrated preservation of multiple electronic data records within a distributed electronic data register. In particular, the system may use a stacked data structure within the distributed electronic data register that allows data records or blocks within the distributed electronic data register to include multiple links or pointers (e.g., hash values) to previous blocks, where such previous blocks may be linked to a single parent block. By using such a multi-link data structure, the system may prevent the waste of energy and/or computing resources associated with the computational work of the nodes for submitting blocks to be appended to the distributed electronic data register. The system may further use a two-pointer algorithm for traversing the multi-link distributed electronic data register, thereby providing for an efficient way to search for specific data records.Type: ApplicationFiled: January 13, 2025Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Saravanan Balasubramanian, Shouryan Sharma
-
Publication number: 20250147978Abstract: Systems, computer program products, and methods are described herein for a system for combining, interpreting, and distributing non-uniform datasets into structured datasets, the system comprising: a memory device with computer-readable program code stored thereon, a communication device, and a processing device operatively coupled to the memory device and the communication device. The processing device identifies a configuration file with location information for at least one dataset or script file, retrieves the dataset, builds a tree of execution comprising at least one node wherein each node comprises data, executes the script file on two or more datasets in parallel on a computational cluster comprising at least one computing component, wherein the at least one computing component comprises an at least one node and generates an output comprising as a structured dataset, wherein the structured dataset comprises a standardized format associated with the at least one instruction of the script file.Type: ApplicationFiled: November 7, 2023Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Natalia Bakholdina, Andrew Stellman, Alexander James Diestler, Joseph Eric Pringle, Mayer Crystal
-
Publication number: 20250147809Abstract: Embodiments of the invention provide a system for performing dynamic execution of data processes in distributed server systems. The system is configured for identifying initiation of at least one data process to be executed on at least one server of distributed server systems associated with an entity, communicating with a metrics node comprising a metrics machine learning model to gather information associated with the at least one server, determining that the at least one server will experience degradation of performance while performing at least one step of the at least one data process based on communicating with the metrics node, and routing the at least one step of the at least one data process to at least one new server and execute the at least one step on the at least one new server.Type: ApplicationFiled: January 11, 2025Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Mohan Krishna Mylavaram, Raja Arumugam Maharaja
-
Publication number: 20250147979Abstract: Systems, methods, and computer program products are provided herein for data synchronization and replication in distributed networks. An example method includes monitoring performance of operations on a source computing cluster that are associated with one or more applications and replicating data entries associated with the operations on a data recovery computing cluster communicably coupled with the source computing cluster. The method further includes determining an outage condition associated with the source computing cluster and determining a first operation whose execution is pending on the source computing cluster. The first operation also include first execution characteristics defining instructions for performance of the first operation as related to at least a first application. The method also include executing the first operation on the data recovery computing cluster based on the one or more first execution characteristics.Type: ApplicationFiled: November 8, 2023Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Vinit Shah, Pratap Dande
-
Publication number: 20250148072Abstract: A system is provided for detection of unauthorized computer code using an artificial intelligence-based analyzer. The system may include an artificial intelligence-based analyzer configured to receive various data and metadata from a user computing device when the user computing device is used to capture a scannable code using an image capture device. The system may, using the AI-based engine, compare the scanned code with a pool or repository of previously scanned code to determine whether the code has been scanned before. The repository may further comprise various types of metadata regarding the scanned code, such as success rate, usual scanning location, embedded resources or links within the code, timestamps for when the code was previously scanned, and/or the like. Based on the analysis of the scanned code, the system may present a notification on the user computing device that indicates whether the scanned code is potentially unsafe to execute.Type: ApplicationFiled: November 8, 2023Publication date: May 8, 2025Applicant: BANK OF AMERICA CORPORATIONInventor: Manoj Kumar C M
-
Patent number: 12292784Abstract: Systems, computer program products, and methods are described herein for evaluating, validating, correcting, and loading data feeds based on artificial intelligence input. The present invention may be configured to receive a data feed from a source for loading to a target data structure, analyze, based on historical feed data, metadata of the data feed to determine a likelihood of the data feed failing to load, and determine whether the likelihood of the data feed failing to load satisfies a threshold. The present invention may be configured to load the data feed to the target data structure, determine, after loading the data feed to the target data structure, whether the data feed failed to load, and either correct errors in the data feed or add error-containing portions of the data feed to a failed data log.Type: GrantFiled: January 22, 2024Date of Patent: May 6, 2025Assignee: BANK OF AMERICA CORPORATIONInventors: Vijaya Kumar Vegulla, Rama Venkata S. Kavali, Venugopala Rao Randhi, Damodarrao Thakkalapelli