Patents by Inventor Benjamin Daniel
Benjamin Daniel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12293848Abstract: An elution generator including an elution column having a container defining an interior volume and a septum, a radiation shield having an upper shield portion defining a central recess and a coaxial flow needle extending downwardly into the central recess, and a lower shield portion having body portion defining a central recess, wherein the elution column is disposed in the central recess of the lower shield portion, the body portion of the lower shield portion is disposed in the central recess of the upper shield portion, and the coaxial flow needle extends downwardly through the septum into the internal volume of the elution column.Type: GrantFiled: December 28, 2021Date of Patent: May 6, 2025Assignee: BWXT Isotope Technology Group, Inc.Inventors: Thomas Alan Artman, Christopher Sean Fewox, Benjamin Daniel Fisher, Bryan Blake Wiggins
-
Patent number: 12294576Abstract: Leveraging secure tokenization, such as a Non-Fungible Token (NFT), for purposes of multifactor and/or elevated user authentication. In this regard, an authentication NFT is generated based at least on a user's authentication credentials. Subsequently, the authentication NFT is verified/validated via a private distributed trust computing network and stored, in a deactivated state, on a distributed ledger. Once the user is confronted with an elevated and/or multifactored authentication process, the user may initiates use of the authentication NFT by checking-out the authentication NFT from the distributed ledger and moving the authentication NFT from the deactivated state to an activated state, in which the user credentials are accessible to the user for purposes of authentication.Type: GrantFiled: March 14, 2024Date of Patent: May 6, 2025Assignee: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Patent number: 12294653Abstract: Adaptation/alteration of the digital file referenced to an underlying Non-Fungible Token (NFT). Adaptation/alteration of the digital file occurs via NFT metadata-defined adaptation rules and criteria, i.e., predefined conditions or events that trigger the occurrence of digital file adaptation. The adapted digital file may be presented to users to indicate a change in a state associated with a specific type of NFT. For example, the NFT may be an authentication NFT used to verify the identity of a user/users and the digital file may be presented within computing networks or applications as a means of conveying user authenticity to other users within the computing network or application. The predefined conditions are security events that have a positive/negative impact on the authenticity of the user or group of users.Type: GrantFiled: January 20, 2023Date of Patent: May 6, 2025Assignee: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Ravi Joshi, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Publication number: 20250119423Abstract: A method includes receiving a hash of a static password and a hash of a lot-one authentication string from a user device of a user. After an initial validation, an authentication matrix is generated. A block selection process is performed to select spurious and authentication blocks from the authentication matrix. The authentication blocks are selected based on a lot-two authentication string associated with the lot-one authentication string. In response to determining that the spurious and authentication blocks are selected according to a block selection sequence stored in a user profile of the user, a dynamic password is generated by combining the static password, the lot-one authentication string, and the authentication blocks. A hash of the dynamic password is generated. In response to determining that the hash of the dynamic password matches a hash of a dynamic password that is stored in the user profile, the user is authenticated.Type: ApplicationFiled: October 10, 2023Publication date: April 10, 2025Inventors: Ravi Joshi, Anna Kristen Pingel Berry, Olga Caroline Kocharyan, Luqman Abdul Hakeem Sharief, Shweta Ambulkar, Angela F. Ianni, Michael William Whitaker, Benjamin Daniel Hardman
-
Publication number: 20250117463Abstract: A method includes receiving hashes of a static password and a lot-one authentication string from a user device of a user. After an initial validation, a first authentication matrix (AM) is generated. A block selection process is performed to select spurious and authentication blocks. While performing the block selection process, the first AM is replaced by a second AM, such that a first authentication block is selected from the first AM based on a first lot-two authentication string and a second authentication block is selected from the second AM based on a second lot-two authentication string. A dynamic password is generated by combining the static password, the lot-one authentication string, and the authentication blocks. A hash of the dynamic password is generated. In response to determining that the hash of the dynamic password matches a hash of a dynamic password stored in a user profile, the user is authenticated.Type: ApplicationFiled: October 10, 2023Publication date: April 10, 2025Inventors: Ravi Joshi, Anna Kristen Pingel Berry, Olga Caroline Kocharyan, Luqman Abdul Hakeem Sharief, Shweta Ambulkar, Angela F. Ianni, Michael William Whitaker, Benjamin Daniel Hardman
-
Patent number: 12244553Abstract: Implementing artificial intelligence, specifically, machine learning techniques to identify malicious emails and, in response, identifying and conducting actions, including reporting the malicious emails to identified internal and/or external entities and preventing the malicious emails from being delivered to email client mailboxes. The machine learning techniques rely on malicious email patterns identified, at least, from previously identified malicious emails and data resulting from continuously crawling the Web and threat intelligence sources. Further, the email clients may be configured to include an add-on feature in which the user can provide a single input to report the email as being suspicious, which results in further analysis to determine whether the email is, in fact, a malicious email.Type: GrantFiled: June 13, 2022Date of Patent: March 4, 2025Assignee: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Publication number: 20250068612Abstract: A database system is operable to generate an IO pipeline that includes a primary cluster key pipeline element serially after a secondary index pipeline element. The IO pipeline is executed based on applying the secondary index pipeline element of the IO pipeline to generate row list output, and applying the primary cluster key pipeline element to determine a first set of row ranges, determine a second set of row ranges of row list output generated by the secondary index pipeline element, and generate, from the first set of row ranges and the second set of row ranges, a result set having a plurality of outputs, each indicating a cluster key and a row range for the cluster key.Type: ApplicationFiled: November 13, 2024Publication date: February 27, 2025Applicant: Ocient Holdings LLCInventors: Richard George Wendel, III, Greg R. Dhuse, Hassan Farahani, Matthew Ashbeck, Anna Veselova, Benjamin Daniel Rabe
-
Patent number: 12234972Abstract: The light stand includes a frame having a offset base with upper and lower legs that to allow for the nesting of adjacent light stands for more compact transport and storage. The light stand includes a dual-mast design with a top beam that allows a light fixture to be connected thereto. So that the light stand can be readily used in inclement weather and to protected the light fixture from knocking damage if it were to fall over or be accidently hit, the preferred embodiment of the light fixture includes a socket assembly with a flange having an elongated sidewall such that the fastening portion of the bulb extends into the flange of the socket and is protected from the elements. The light stand also includes an outlet to provide power to other lights or items used therewith.Type: GrantFiled: December 6, 2023Date of Patent: February 25, 2025Assignee: LuxTech, LLCInventors: Benjamin Daniel Ketterer, Rebecca Renei Ketterer
-
Publication number: 20250036622Abstract: A database system is operable to generate an addendum part indicating deletion of a set of rows of a plurality of rows of a dataset based on generating a row list based on identifying the set of rows for deletion from the dataset and compressing the row list in a set of compressed blocks written to disk memory resources. Based on determining to process the addendum part, the addendum part is read based on decompressing the row list based on access in the set of compressed block in the disk memory resources and emitting the row list for processing.Type: ApplicationFiled: August 3, 2023Publication date: January 30, 2025Applicant: Ocient Holdings LLCInventors: Greg R. Dhuse, Anna Veselova, Benjamin Daniel Rabe, Matthew Ashbeck, Pieter Charles Jas Svenson, Richard Wang
-
Publication number: 20250028700Abstract: A database system operates by: executing a query against a relational database table indicating a predicate applied to geospatial data of a geospatial data column, based on: applying an inner predicate to internal level nodes when traversing a set of internal levels of the each tree-based index structure to identify a first subset of leaf nodes in a plurality of leaf nodes of the each tree-based index structure based on identifying internal nodes having internal node bounding boxes meeting the inner predicate; and applying a leaf predicate to only leaf nodes included in the first subset of leaf nodes of the tree-based index structure to identify a second subset of leaf nodes of the first subset of leaf nodes corresponding to only leaf nodes of the first subset of leaf nodes having corresponding leaf node bounding boxes meeting the leaf predicate; wherein a query resultant of the query is generated based on geospatial objects of the geospatial data column for ones of a plurality of rows of the relational databType: ApplicationFiled: August 13, 2024Publication date: January 23, 2025Applicant: Ocient Holdings LLCInventors: Anna Veselova, Greg R. Dhuse, Richard George Wendel, III, Benjamin Daniel Rabe
-
Applying range-based filtering during query execution based on utilizing an inverted index structure
Patent number: 12182093Abstract: A method includes performing a search of an inverted index structure indexing values of a column to generate an in-range indexed value set by identifying all indexed values of the inverted index structure falling within a range corresponding to a range-based filter. A set of characteristics of the in-range indexed value set are identified based on performing the search of an inverted index structure. When the set of characteristics compare favorably to the set of index-usage requirements, output is generated based on performing a plurality of searches to the inverted index structure based on the in-range indexed value set. When the set of characteristics compare unfavorably to the set of index-usage requirements, the output is generated without performing any searches to the inverted index structure.Type: GrantFiled: September 15, 2023Date of Patent: December 31, 2024Assignee: Ocient Holdings LLCInventors: Richard George Wendel, III, Greg R. Dhuse, Hassan Farahani, Matthew Ashbeck, Anna Veselova, Benjamin Daniel Rabe -
Publication number: 20240414155Abstract: Leveraging secure tokenization, such as a Non-Fungible Token (NFT), for purposes of multifactor and/or elevated user authentication. In this regard, an authentication NFT is generated based at least on a user's authentication credentials. Subsequently, the authentication NFT is verified/validated via a private distributed trust computing network and stored, in a deactivated state, on a distributed ledger. Once the user is confronted with an elevated and/or multifactored authentication process, the user may initiates use of the authentication NFT by checking-out the authentication NFT from the distributed ledger and moving the authentication NFT from the deactivated state to an activated state, in which the user credentials are accessible to the user for purposes of authentication.Type: ApplicationFiled: March 14, 2024Publication date: December 12, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Patent number: 12137032Abstract: A method for determining third party network compliance with a host entity network is provided. The method may include generating a scanning file that includes host entity network compliance standards and transferring the scanning file to an intermediary entity network. The method may further include generating an executable file that may run a plug-in scanning file to scan hardware and software resident at the third-party network for compliance. The method may further include transferring the executable file from the intermediary entity network to the third party network. The method may further include executing the executable file, generating a log file upon the completion of the running of the plug-in scanning file and digitally signing the log file. The method may further include deciphering the log file at the intermediary entity network, generating a readable report based on the deciphering and transferring the readable report to the host entity network.Type: GrantFiled: October 12, 2023Date of Patent: November 5, 2024Assignee: Bank of America CorporationInventors: Jeffrey Glasco, Jr., Benjamin Daniel Hardman, Robert Brice
-
Patent number: 12117986Abstract: A database system is operable to write to a file buffer corresponding to geospatial index data for a plurality of rows based on processing each given row of the plurality of rows. A new leaf node of a set of leaf nodes in a temporary leaf node buffer when the given row includes a geospatial object. When the temporary leaf node buffer is determined to have a number of leaf nodes meeting a predetermined threshold number of leaf nodes, a new tree-based index structure of a set of tree-based index structures of the geospatial index data is built via processing the temporary leaf node buffer. The geospatial index data is stored based on writing the file buffer to disk memory resources. A query is executed against a relational database table based on accessing the geospatial index data in the disk memory resources.Type: GrantFiled: July 20, 2023Date of Patent: October 15, 2024Assignee: Ocient Holdings LLCInventors: Anna Veselova, Greg R. Dhuse, Richard George Wendel, III, Benjamin Daniel Rabe
-
Patent number: 12099641Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for audiovisual conferencing. The system comprising video input and output devices, which allow a user to be viewed by and view other conference attendees and audio input and output devices that allow the user to be heard by and hear other conference attendees. Further, the system includes a noise mitigation to ensure that a user has privacy when attending a remote meeting in a public or semi-public place.Type: GrantFiled: July 22, 2022Date of Patent: September 24, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Olga Kocharyan, Angela Ianni, Shweta Ambulkar, Luqman Sharief, Michael Wm. Whitaker, Benjamin Daniel Hardman
-
Publication number: 20240311803Abstract: Generation of an NFT digital wallet that stores an NFT that serves as verified identity for the user. Both a private side/portion of the wallet having a private address and public side/portion of the wallet having a public address are generated. Additionally, a set of rules are configured that provide gateway functionality for receiving resource-related events using the private address. The public address is used for transmitting outgoing resource-related events and receiving incoming resource-related events, while the private address is used to validate at least some of the incoming resource-related events. The incoming resource-related events requiring validation is defined by the set of rules. In use, launching of the NFT digital wallet and user authentication via NFT presentation prompts presentation of the private side and outstanding incoming resource-related events awaiting validation.Type: ApplicationFiled: March 17, 2023Publication date: September 19, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Ravi Joshi, Shweta Ambulkar, Anna Kristen Pingel Berry, Benjamin Daniel Hardman, Angela Ianni, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Publication number: 20240311453Abstract: Systems, computer program products, and methods are described herein for implementing a multi-component authentication using pre-determined sequences and indicators in an electronic network.Type: ApplicationFiled: March 17, 2023Publication date: September 19, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Olga Kocharyan, Ravi Joshi, Luqman Sharief, Michael Wm. Whitaker, Benjamin Daniel Hardman, Shweta Ambulkar, Angela Ianni
-
Publication number: 20240314127Abstract: Systems, computer program products, and methods are described herein for implementing a single point multi-component authentication using a pre-determined sequence in an electronic network.Type: ApplicationFiled: March 17, 2023Publication date: September 19, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Olga Kocharyan, Ravi Joshi, Luqman Sharief, Michael Wm. Whitaker, Benjamin Daniel Hardman, Shweta Ambulkar, Angela Ianni
-
Patent number: 12072759Abstract: Techniques are disclosed relating to software failover across multiple computing regions. Software entities in a first computing region implement failure recovery routines on an as-needed basis, which can include utilizing code in a recovery API. These software entities can subscribe to receive failure notifications for that region. When an indication of a regional failure is received (e.g., indicating that some specified threshold of servers in the first computing region have failed or are likely to fail), a failure notification can be published. The computing region can then use a list of subscribing software entities to initiate recovery routines for those entities to failover to a different one of the computing regions. In some implementations, software entities can handle failover for dependent components. Thus, when failover is initiated for a particular software product, the product can initiate failover for any constituent components (e.g., services that make up the software product).Type: GrantFiled: January 20, 2023Date of Patent: August 27, 2024Assignee: Salesforce, Inc.Inventors: Bohan Chen, Donald Tam, Benjamin Daniel Hoyt
-
Publication number: 20240248789Abstract: Techniques are disclosed relating to software failover across multiple computing regions. Software entities in a first computing region implement failure recovery routines on an as-needed basis, which can include utilizing code in a recovery API. These software entities can subscribe to receive failure notifications for that region. When an indication of a regional failure is received (e.g., indicating that some specified threshold of servers in the first computing region have failed or are likely to fail), a failure notification can be published. The computing region can then use a list of subscribing software entities to initiate recovery routines for those entities to failover to a different one of the computing regions. In some implementations, software entities can handle failover for dependent components. Thus, when failover is initiated for a particular software product, the product can initiate failover for any constituent components (e.g., services that make up the software product).Type: ApplicationFiled: January 20, 2023Publication date: July 25, 2024Inventors: Bohan Chen, Donald Tam, Benjamin Daniel Hoyt