Patents by Inventor Amijo Bearley

Amijo Bearley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11394735
    Abstract: Aspects of the disclosure relate to deploying and utilizing a dynamic record identification and analysis computer system with event monitoring components. A computing device may receive account reconnaissance data identifying a first plurality of user accounts that have experienced at least one event associated with account security concern characteristics. The computing platform may analyze event history data associated with the first plurality of user accounts to identify one or more common interactions associated with a subset of the first plurality of user accounts. The computing platform may identify a point of compromise among the subset of the first plurality of user accounts. Subsequently, the computing platform may search enterprise user account records to identify a second plurality of user accounts that have at least one event associated with the point of compromise. The computing platform may add the second plurality of user accounts to an alert table.
    Type: Grant
    Filed: July 15, 2020
    Date of Patent: July 19, 2022
    Assignee: Bank of America Corporation
    Inventors: Amijo Bearley, Robert D. Jones, Kolt Bell, Craig Widmann
  • Publication number: 20200344255
    Abstract: Aspects of the disclosure relate to deploying and utilizing a dynamic record identification and analysis computer system with event monitoring components. A computing device may receive account reconnaissance data identifying a first plurality of user accounts that have experienced at least one event associated with account security concern characteristics. The computing platform may analyze event history data associated with the first plurality of user accounts to identify one or more common interactions associated with a subset of the first plurality of user accounts. The computing platform may identify a point of compromise among the subset of the first plurality of user accounts. Subsequently, the computing platform may search enterprise user account records to identify a second plurality of user accounts that have at least one event associated with the point of compromise. The computing platform may add the second plurality of user accounts to an alert table.
    Type: Application
    Filed: July 15, 2020
    Publication date: October 29, 2020
    Inventors: Amijo Bearley, Robert D. Jones, Kolt Bell, Craig Widmann
  • Patent number: 10757123
    Abstract: Aspects of the disclosure relate to deploying and utilizing a dynamic record identification and analysis computer system with event monitoring components. A computing device may receive account reconnaissance data identifying a first plurality of user accounts that have experienced at least one event associated with account security concern characteristics. The computing platform may analyze event history data associated with the first plurality of user accounts to identify one or more common interactions associated with a subset of the first plurality of user accounts. The computing platform may identify a point of compromise among the subset of the first plurality of user accounts. Subsequently, the computing platform may search enterprise user account records to identify a second plurality of user accounts that have at least one event associated with the point of compromise. The computing platform may add the second plurality of user accounts to an alert table.
    Type: Grant
    Filed: April 4, 2018
    Date of Patent: August 25, 2020
    Assignee: Bank of America Corporation
    Inventors: Amijo Bearley, Robert D. Jones, Kolt Bell, Craig Widmann
  • Publication number: 20190230104
    Abstract: Aspects of the disclosure relate to deploying and utilizing a dynamic record identification and analysis computer system with event monitoring components. A computing device may receive account reconnaissance data identifying a first plurality of user accounts that have experienced at least one event associated with account security concern characteristics. The computing platform may analyze event history data associated with the first plurality of user accounts to identify one or more common interactions associated with a subset of the first plurality of user accounts. The computing platform may identify a point of compromise among the subset of the first plurality of user accounts. Subsequently, the computing platform may search enterprise user account records to identify a second plurality of user accounts that have at least one event associated with the point of compromise. The computing platform may add the second plurality of user accounts to an alert table.
    Type: Application
    Filed: April 4, 2018
    Publication date: July 25, 2019
    Inventors: Amijo Bearley, Robert D. Jones, Kolt Bell, Craig Widmann
  • Patent number: 10346903
    Abstract: An illustrative method for identifying information associated with a ring of individuals performing improper financial activities may include combining a list of user identifiers with one or more attributes tables corresponding to the financial transactions. A computer device may analyze a first list of identifiers in relation to an attribute table, where the identifiers may be associated with one or more suspected improper financial activities and the attribute table may include attributes of one or more financial transactions performed over a specified duration. The computer device may then link the first list of identifiers with one or more attributes included in the attribute table to determine a second list of identifiers and the process may be repeated until a stopping condition has been reached. After the stopping condition has been met, the computer device may communicate a report to a user.
    Type: Grant
    Filed: March 12, 2018
    Date of Patent: July 9, 2019
    Assignee: Bank of America Corporation
    Inventors: Kolt Bell, David Barnhardt, Amijo Bearley, Robert J. Dominguez, David Kerman, Daniel Van Vliet
  • Publication number: 20180204278
    Abstract: An illustrative method for identifying information associated with a ring of individuals performing improper financial activities may include combining a list of user identifiers with one or more attributes tables corresponding to the financial transactions. A computer device may analyze a first list of identifiers in relation to an attribute table, where the identifiers may be associated with one or more suspected improper financial activities and the attribute table may include attributes of one or more financial transactions performed over a specified duration. The computer device may then link the first list of identifiers with one or more attributes included in the attribute table to determine a second list of identifiers and the process may be repeated until a stopping condition has been reached. After the stopping condition has been met, the computer device may communicate a report to a user.
    Type: Application
    Filed: March 12, 2018
    Publication date: July 19, 2018
    Inventors: Kolt Bell, David Barnhardt, Amijo Bearley, Robert J. Dominguez, David Kerman, Daniel Van Vliet
  • Publication number: 20180191712
    Abstract: Systems and arrangements for detecting unauthorized activity and implementing proactive controls to avoid future occurrences of unauthorized activity are provided. The system may receive one or more occurrences of unauthorized activity and may identify similar pairs of occurrences. The pairs of occurrences may then be compared to generate occurrence clusters. The occurrence clusters may be analyzed to determine a common merchant or other attribute. This common merchant or other attribute may be used to query a database to identify one or more devices also associated with the merchant or attribute. One or more proactive controls may then be implemented on the identified devices.
    Type: Application
    Filed: January 3, 2017
    Publication date: July 5, 2018
    Inventors: Eduardo J. Ramirez, Craig Widmann, Amijo Bearley, Robert D. Jones, Aron Megyeri
  • Publication number: 20180165681
    Abstract: Aspects of the disclosure relate to detection of unauthorized usage in debit card transactions using a transaction management computing platform and an analytics computing platform. A computing platform may monitor a plurality of transactions at an automated teller machine. Subsequently, the computing platform may identify at least one unusual activity in the plurality of transactions at the automated teller machine. In response to identifying the at least one unusual activity in the plurality of transactions, the computing may analyze each account corresponding to the plurality of transactions to identify a common point of purchase for a subset of accounts. Thereafter, the computing platform may flag the subset of accounts for unauthorized usage.
    Type: Application
    Filed: December 12, 2016
    Publication date: June 14, 2018
    Applicant: Bank of America Corporation
    Inventors: Aron Megyeri, Craig Douglas Widmann, Eduardo J. Ramirez, Amijo Bearley, Robert D. Jones
  • Patent number: 9998486
    Abstract: Systems and computer-readable media are disclosed for utilizing one or more databases to detect a point of compromise (“POC”). A POC detection computing platform may receive data associated with a potential point of compromise from a first computing system. The POC detection computing platform may extract data associated with the potential point of compromise from one or more central servers and/or databases. The extracted data may then be analyzed to determine if a point of compromise has been detected. The POC detection computing platform may transmit the results of the analysis to a second computing system.
    Type: Grant
    Filed: February 11, 2016
    Date of Patent: June 12, 2018
    Assignee: Bank of America Corporation
    Inventors: Kolt Bell, Brandon Weeks, Alvino Sarran, Michael Ayers-Morris, Alex Stapleton, Craig D. Widmann, John Tuders, Amijo Bearley
  • Patent number: 9947044
    Abstract: An illustrative method for identifying information associated with a ring of individuals performing improper financial activities may include combining a list of user identifiers with one or more attributes tables corresponding to the financial transactions. A computer device may analyze a first list of identifiers in relation to an attribute table, where the identifiers may be associated with one or more suspected improper financial activities and the attribute table may include attributes of one or more financial transactions performed over a specified duration. The computer device may then link the first list of identifiers with one or more attributes included in the attribute table to determine a second list of identifiers and the process may be repeated until a stopping condition has been reached. After the stopping condition has been met, the computer device may communicate a report to a user.
    Type: Grant
    Filed: January 6, 2014
    Date of Patent: April 17, 2018
    Assignee: Bank of America Corporation
    Inventors: Kolt Bell, David Barnhardt, Amijo Bearley, Robert J Dominguez, David Kerman, Daniel Van Vliet
  • Publication number: 20170237759
    Abstract: Systems and computer-readable media are disclosed for utilizing one or more databases to detect a point of compromise (“POC”). A POC detection computing platform may receive data associated with a potential point of compromise from a first computing system. The POC detection computing platform may extract data associated with the potential point of compromise from one or more central servers and/or databases. The extracted data may then be analyzed to determine if a point of compromise has been detected. The POC detection computing platform may transmit the results of the analysis to a second computing system.
    Type: Application
    Filed: February 11, 2016
    Publication date: August 17, 2017
    Inventors: Kolt Bell, Brandon Weeks, Alvino Sarran, Michael Ayers-Morris, Alex Stapleton, Craig D. Widmann, John Tuders, Amijo Bearley
  • Publication number: 20170221167
    Abstract: Methods, systems, and computer-readable media for identifying unauthorized activity events, assessing the unauthorized activity event and evaluating a potential impact of the unauthorized activity event are provided. In some examples, upon detection of an unauthorized activity event, merchant data may be received for a first evaluation time period. If a sufficient number of events has occurred in the first evaluation time period, additional data may be retrieved and analyzed to determine a control limit related to an expected rate of events. The number of events in the first evaluation time period may then be compared to the control limit and, if the number exceeds the control limit, a priority score for the merchant may be generated. Additional data, such as merchant category, particular state, and/or particular city data, may be analyzed in order to provide a more granular evaluation of a merchant.
    Type: Application
    Filed: January 28, 2016
    Publication date: August 3, 2017
    Inventors: Brandon Weeks, Craig Widmann, John Tuders, Aron Megyeri, Robert D. Jones, Shuang Lu, Amijo Bearley
  • Publication number: 20150193865
    Abstract: An illustrative method for identifying information associated with a ring of individuals performing improper financial activities may include combining a list of user identifiers with one or more attributes tables corresponding to the financial transactions. A computer device may analyze a first list of identifiers in relation to an attribute table, where the identifiers may be associated with one or more suspected improper financial activities and the attribute table may include attributes of one or more financial transactions performed over a specified duration. The computer device may then link the first list of identifiers with one or more attributes included in the attribute table to determine a second list of identifiers and the process may be repeated until a stopping condition has been reached. After the stopping condition has been met, the computer device may communicate a report to a user.
    Type: Application
    Filed: January 6, 2014
    Publication date: July 9, 2015
    Applicant: Bank of America Corporation
    Inventors: Kolt Bell, David Barnhardt, Amijo Bearley, Robert J. Dominguez, David Kerman, Daniel Van Vliet