Patents by Inventor Alicia C. Jones-McFadden

Alicia C. Jones-McFadden has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170195307
    Abstract: Embodiments of the invention are directed to a system, method, or computer program product for assessing network authentication requirements based on situational instance. In this regard, the invention dynamically determines specific user authentication requirements for accessing a service or executing an activity based on the determining the user's network connections, geographic location, and applications, in real-time. The invention provides a novel method for employing activity data provided by a plurality of users associated with historical activity information to vary the authentication requirements dynamically. Another aspect of the invention is directed to constructing geographic maps with predefined physical areas and overlaying graphical representations of activity data on the maps, in real-time.
    Type: Application
    Filed: January 4, 2016
    Publication date: July 6, 2017
    Inventors: Alicia C. Jones-McFadden, Joseph Neil Johansen
  • Publication number: 20170195477
    Abstract: Systems, computer program products, and methods are described herein for remotely controlling access to a mobile device. The present invention is configured to receive an indication that a transaction executed by a user is misappropriate, wherein the transaction is executed by the user using a mobile device; transmit control signals configured to cause the misappropriation application to begin running in the background of the mobile device; initiate, via the misappropriation application, one or more actions to be executed on the mobile device of the user based on at least receiving the indication that the transaction executed by the user is misappropriate; determine an alternative communication form associated with the user; transmit a notification to the user via the alternate communication form, when the notification further comprises an indication that one or more functionalities of the mobile device has been limited.
    Type: Application
    Filed: January 4, 2016
    Publication date: July 6, 2017
    Inventor: Alicia C. Jones-McFadden
  • Publication number: 20170187754
    Abstract: Embodiments of the invention are directed to a system, method, or computer program product for a passive based security escalation to shut off of applications on a mobile device based on rules. As such, the system may identify, via extraction of data, time periods correlating to events that the user may be offline or inactive with respect to his/her mobile device. Once the time periods are identified, rules are created for the level of security escalation required based on the event. Subsequently, a trigger is identified at a time leading up to the event, where the system integrates with the mobile device and requires additional authentication to access one or more applications. Once the offline event starts, the system initiates a shutdown of the functions of one or more applications on the user's mobile device. The system then reinstates the application functionality after the offline event has ended.
    Type: Application
    Filed: March 16, 2017
    Publication date: June 29, 2017
    Inventors: Elizabeth S. Votaw, Alicia C. Jones-McFadden
  • Patent number: 9692897
    Abstract: Embodiments are directed to routing customer calls to preferred agents. Embodiments receive a call from a customer using a user device; determine an identity of the customer; retrieve information associated with the matching entry; based at least in part on the retrieved information, select one or more agents; and route the call to one of the selected agents. Some embodiments determine a telephone number from which the call was received; comparing the telephone number with a plurality of entries in a customer information database; and determining that the telephone number matches an entry in the database. Other embodiments receive a communication from the user device indicating that the customer has placed the call; determine that the customer is currently authenticated through an online banking session or a mobile application on the user device; and receive a communication from the user device indicating the customer's identity.
    Type: Grant
    Filed: October 31, 2014
    Date of Patent: June 27, 2017
    Assignee: Bank of America Corporation
    Inventors: Carrie Anne Hanson, Alicia C. Jones-McFadden, Craig Sobol, Brent Alan Shelkey, Kimberly Ya-chin Chang, Sarah Beth Gottfried, Wang Liang, Neha Rani Rathi, Anthony Scott Wong
  • Patent number: 9679426
    Abstract: Systems, methods, and computer program products are described herein that provide for notifying a malfeasance specialist of a malfeasance detection based on identification of a device signature. Monitoring devices may monitor devices in a location for device signatures that are known to be associated with malfeasance. Upon detecting the presence of a device signature associated with malfeasance, a specialist may be notified of the detection so that the specialist may take appropriate actions in response to the detection.
    Type: Grant
    Filed: January 4, 2016
    Date of Patent: June 13, 2017
    Assignee: Bank of America Corporation
    Inventors: Alicia C. Jones-McFadden, Matthew Hsieh, Gail Mohr, Linda Yoon Lentz
  • Publication number: 20170153919
    Abstract: Systems, computer program products, and methods are described herein for analyzing resource capacity based on associated dependencies. The present invention is configured to determine a resource capacity associated with an entity; determine one or more dependencies associated with the entity, wherein the one or more dependencies are associated with a resource value; receive a user input, wherein the user input comprises a dynamic allocation of the one or more dependencies to the entity; determine an aggregated resource value based on at least receiving the user input, wherein the aggregated resource value comprises an aggregate of the resource values associated with the one or more dependencies dynamically allocated to the entity; and initiate a presentation of a dynamic display, wherein the dynamic display comprises an indication of the resource capacity associated with the entity and an aggregated resource value associated with the one or more dependencies dynamically allocated to the entity.
    Type: Application
    Filed: November 30, 2015
    Publication date: June 1, 2017
    Inventors: Alicia C. Jones-McFadden, Katherine Dintenfass, Alexander C. Wittkowski, Damon C. Missouri, Cameron Darnell Wadley
  • Publication number: 20170126649
    Abstract: The present disclosure describes a tiered identification federated authentication network system. Embodiments compile one or more authentication credentials required for access to each of a plurality of applications to generate an authentication set for each application. The system may aggregate the plurality of authentication sets to form a tiered federated authentication module having multiple rankings, wherein each rank is associated with an authentication set; wherein a higher ranked authentication set corresponds to more stringent authentication credentials and a lower ranked authentication set corresponds to less stringent authentication credentials. The system may receive a request from a user for access to a current application, determine if the user has previously authenticated to a higher ranked application and, if so, enable access to the current application, without requiring the user to authenticate again.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Inventors: Elizabeth S. Votaw, Alicia C. Jones-McFadden
  • Publication number: 20170123602
    Abstract: Systems, computer program products, and methods are described herein for active selection management system with suggested actions. The present invention is configured to determine one or more additional devices and/or one or more additional applications associated with the user based on at least determining that the one or more additional devices when combined with the one or more devices aids the user to accomplish the target; initiate a presentation of the one or more additional devices and/or the one or more additional applications on a user interface for display on the user device; receive a user selection of at least one of the one or more additional devices and/or one or more additional applications; and establish a communication link with the at least one of the one or more additional devices and/or the one or more additional applications selected by the user.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Inventors: Alicia C. Jones-McFadden, Caitlin Chrisman Bullock, Matthew Hsieh, Jaydev Ajit Kumar, Yaakov Lyubetsky, Yun Suk Paik, Heng Xu, Jimin Zheng
  • Publication number: 20170123600
    Abstract: Systems, computer products, and methods are described herein for determining the applications and/or devices that a user users, or has used in the past, through a user computer system. The system categorizes the applications and/or devices related to one or more potential targets in which the user maybe interested and presents the targets to the user for selection by the user. The system monitors and aggregates information from the applications and/or devices related to the one or more desired targets and provides suggestions to aid in achieving the desired targets. The system allows the user to control, or may automatically control, the applications and/or devices related to the one or more desired targets in a central location. The aggregated information and/or one or more desired targets may be pushed to systems, applications, and devices, in order to act as filters or additional information for providing additional output to the user.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Inventors: Alicia C. Jones-McFadden, Caitlin Chrisman Bullock, Matthew Hsieh, Jaydev Ajit Kumar, Yaakov Lyubetsky, Yun Suk Paik, Heng Xu, Jimin Zheng
  • Publication number: 20170126693
    Abstract: Embodiments of the invention are directed to a system, method, or computer program product for a passive based security escalation to shut off of applications on a mobile device based on rules. As such, the system may identify, via extraction of data, time periods correlating to events that the user may be offline or inactive with respect to his/her mobile device. Once the time periods are identified, rules are created for the level of security escalation required based on the event. Subsequently, a trigger is identified at a time leading up to the event, where the system integrates with the mobile device and requires additional authentication to access one or more applications. Once the offline event starts, the system initiates a shutdown of the functions of one or more applications on the user's mobile device. The system then reinstates the application functionality after the offline event has ended.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Inventors: Elizabeth S. Votaw, Alicia C. Jones-McFadden
  • Publication number: 20170123778
    Abstract: Systems, computer program products, and methods are described herein for discovery of software operable on a computing device. Embodiments access a computing device to determine at least one tool or application downloaded or installed on the computing device; determine, based on the determined at least one tool or application downloaded or installed on the computing device, at least one new tool or application to download or install on the computing device; and present the at least one new tool or application to a user of the computing device.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Inventors: Alicia C. Jones-McFadden, Caitlin Chrisman Bullock, Matthew Hsieh, Jaydev Ajit Kumar, Yaakov Lyubetsky, Yun Suk Paik, Heng Xu, Jimin Zheng
  • Publication number: 20170126749
    Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for active, real-time control of a plurality of devices and associated applications for monitoring and completing one or more targets through an interactive integrated interface. In this regard, the system determines one or more targets associated with the user. The system then identifies the target devices having control factors that are configured to be modified to aid in the completion of the targets. The system may initiate a presentation of the targets on the interactive integrated interface. Following the selection of targets by the user, the system configures applications and devices associated with the targets to provide information and feedback associated with the selected targets. The system transmits control instructions to a plurality of target devices, the instructions configured to control the devices by modifying one or more control factors associated with the devices.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Inventors: Alicia C. Jones-McFadden, Caitlin Chrisman Bullock, Matthew Hsieh, Jaydev Ajit Kumar, Yaakov Lyubetsky, Yun Suk Paik, Heng Xu, Jimin Zheng
  • Publication number: 20170126688
    Abstract: Systems, computer program products, and methods are described herein for discovery of devices and connections associated with a device. Embodiments access a computing device to determine at least one device or connection associated with the device; determine, based on the determined at least device or connection, at least one new tool or application to download or install on the computing device; and present the at least one new tool or application to a user of the computing device.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Inventors: Alicia C. Jones-McFadden, Caitlin Chrisman Bullock, Matthew Hsieh, Jaydev Ajit Kumar, Yaakov Lyubetsky, Yun Suk Paik, Heng Xu, Jimin Zheng
  • Publication number: 20170126509
    Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for active, real-time control of a plurality of devices and associated applications for monitoring and completing one or more targets through an interactive integrated interface. In this regard, the system determines a plurality of devices and applications associated with the user. The system then determines one or more targets of the user based on analyzing device information, application information and user information. The one or more targets are configured to be completed by modifying control factors associated with the devices. The system may then initiate a display of the targets on the interactive integrated interface and enable the user to select suitable targets. Following the selection of targets by the user, the system configures applications and devices associated with the targets to provide information and feedback associated with the selected targets.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Inventors: Alicia C. Jones-McFadden, Caitlin Chrisman Bullock, Matthew Hsieh, Jaydev Ajit Kumar, Yaakov Lyubetsky, Yun Suk Paik, Heng Xu, Jimin Zheng
  • Publication number: 20170126510
    Abstract: Systems, computer program products, and methods are described herein for active management of devices based on user selection. The present invention is configured to initiate a control interface, wherein the control interface comprises one or more features associated with the one or more devices; receive a user selection of at least one of the one or more features associated with the one or more devices, thereby allowing one or more control factors associated with the one or more features to be modified; determine an optimum value for the one or more selected features, wherein the optimum value aids the user in accomplishing the selected target; and modify a value associated with the one or more selected features to reflect the optimum value.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Inventors: Alicia C. Jones-McFadden, Caitlin Chrisman Bullock, Matthew Hsieh, Jaydev Ajit Kumar, Yaakov Lyubetsky, Yun Suk Paik, Heng Xu, Jimin Zheng
  • Publication number: 20170127275
    Abstract: The present disclosure describes an integrated full and partial shutdown application programming interface. Embodiments herein disclosed include receiving an indication that a mobile device of a user is compromised. Further embodiments identify one or more applications associated with the mobile device and remotely access the mobile device to perform a switch-off of the one or more applications. The switch-off may include logging the user out of the one or more applications before removing the one or more applications from the mobile device.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Inventors: Alicia C. Jones-McFadden, Elizabeth S. Votaw
  • Publication number: 20170126639
    Abstract: Embodiments of the invention are directed to a system, method, or computer program product for providing a permanently affixed un-decryptable coded identifier onto a mobile device. The identifier may be one or more applications, pictures, widgets, tokens, or the like that may be transformed into an identifier to include the objects original functionality plus additional coding. The identifier, once selected by the user may be coded to include a tracker, beacon, and coded with remote access abilities. The identifier may then be permanently installed onto the user's mobile device. As such providing a trackable code associated with a mobile device, if the mobile device is misplaced. Furthermore, the identifier may be permanently stored within the mobile device preventing complete erasing of the identifier upon complete data deletion of the user device.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Inventors: Alicia C. Jones-McFadden, Elizabeth S. Votaw
  • Publication number: 20170123599
    Abstract: Systems, computer products, and methods are described herein for determining the applications and/or devices that a user users, or has used in the past, through a user computer system. The system categorizes the applications and/or devices related to one or more potential targets in which the user maybe interested and presents the targets to the user for selection by the user. The system monitors and aggregates information from the applications and/or devices related to the one or more desired targets and provides suggestions to aid in achieving the desired targets. The system allows the user to control, or may automatically control, the applications and/or devices related to the one or more desired targets in a central location. The aggregated information and/or one or more desired targets may be pushed to systems, applications, and devices, in order to act as filters or additional information for providing additional output to the user.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Inventors: Alicia C. Jones-McFadden, Caitlin Chrisman Bullock, Matthew Hsieh, Jaydev Ajit Kumar, Yaakov Lyubetsky, Yun Suk Paik, Heng Xu, Jimin Zheng
  • Patent number: 9641539
    Abstract: Embodiments of the invention are directed to a system, method, or computer program product for a passive based security escalation to shut off of applications on a mobile device based on rules. As such, the system may identify, via extraction of data, time periods correlating to events that the user may be offline or inactive with respect to his/her mobile device. Once the time periods are identified, rules are created for the level of security escalation required based on the event. Subsequently, a trigger is identified at a time leading up to the event, where the system integrates with the mobile device and requires additional authentication to access one or more applications. Once the offline event starts, the system initiates a shutdown of the functions of one or more applications on the user's mobile device. The system then reinstates the application functionality after the offline event has ended.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: May 2, 2017
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Elizabeth S. Votaw, Alicia C. Jones-McFadden
  • Patent number: D784403
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: April 18, 2017
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Alicia C. Jones-McFadden, Caitlin Chrisman Bullock, Matthew Hsieh, Jaydev Ajit Kumar, Yaakov Lyubetsky, Yun Suk Paik, Heng Xu, Jimin Zheng