Patents by Inventor Benjamin F. Tweel

Benjamin F. Tweel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240004968
    Abstract: In a public setting, an audio/visual (A/V) obfuscation device can be used to provide privacy during a conversation occurring either in-person or via an electronic device. The A/V obfuscation device is configured to provide one or both of an electronic or physical barrier to ensure privacy for at least part of the conversation. The A/V obfuscation device provides audio masking and/or an optical block to impede third-parties from overhearing or observing the conversation. The A/V obfuscation device includes devices capable of capturing audio and/or video information of conversation participants and/or electronic devices. The captured audio and/or video information may be analyzed and processed to generate obfuscation audio and/or video signals to obscure at least a portion of aspects of the conversation.
    Type: Application
    Filed: June 30, 2022
    Publication date: January 4, 2024
    Inventors: Tomas M. Castrejon, III, Benjamin F. Tweel, James Siekman
  • Publication number: 20230385795
    Abstract: Arrangements for haptic feedback control are provided. In some aspects, registration data may be received from a user. For instance, a user may identify one or more devices (e.g., payment devices such as credit or debit cards, mobile devices, or the like) associated with the user. In some examples, the user may also select customized haptic feedback associated with different feedback outputs. After receiving registration data, the computing platform may receive a request to process a transaction. The transaction may be initiated at a point-of-sale system of an entity via the payment device or card of the user. Transaction details may be analyzed to determine or identify a feedback output (e.g., approved, denied, request additional information or the like). Based on the identified feedback output, a feedback output command or instruction may be generated and transmitted to the payment device for execution.
    Type: Application
    Filed: May 24, 2022
    Publication date: November 30, 2023
    Inventors: Benjamin F. Tweel, Neal Aaron Slensker, Chanda Joyner
  • Publication number: 20230362174
    Abstract: Arrangements for comprehensive threat mitigation are provided. In some aspects, an indication of threat or potential threat may be received from an external entity. In some examples, the threat may include a cybersecurity threat. In response to receiving the indication of threat, identifying data associated with the external entity may be extracted from the indication and used to retrieve pre-stored customizations associated with the desired mitigating actions of the external entity. The one or more mitigating actions may be identified and instructions to execute the one or more mitigating actions may be generated and transmitted to one or more computing devices for execution.
    Type: Application
    Filed: May 9, 2022
    Publication date: November 9, 2023
    Inventors: Benjamin F. Tweel, Neal Aaron Slensker, James Siekman, Shannon Sabina Rolinger, John Raymond Omernik, Rebecca Lynn Pietro
  • Patent number: 11323473
    Abstract: An information security system that includes an information security engine configured to detect an attack by a malicious software element in a network. The information security engine is further configured to transfer the malicious software element from the network to the emulated network in response to detecting an attack. The information security engine is further configured to select defense strategies for restricting communications using different port configurations and to implement each defense strategy within the emulated network. The information security engine is further configured to execute a duplicate of the malicious software element in the emulated network and to determine a performance level for each of the defense strategies against the duplicate of the malicious software element. The information security engine is further configured to select a defense strategy with a highest performance level and to implement the selected defense strategy within the network.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: May 3, 2022
    Assignee: Bank of America Corporation
    Inventors: Jo-Ann Taylor, Benjamin F. Tweel, Michael R. Young, Michael J. Sbandi
  • Patent number: 11303653
    Abstract: An information security system that includes an information security engine configured to monitor data transmissions within a network and to detect a first attack by a malicious software element. The information security engine is further configured to detect a second attack by the malicious software element within a predetermined time interval from the first attack and to transfer the malicious software element from the network to an emulated network in response to detecting the second attack. The information security engine is further configured to generate an attack log comprising behavior characteristics for attacks performed by the malicious software element in the emulated network and to train a machine learning model based on behavior characteristics from the attack log.
    Type: Grant
    Filed: August 12, 2019
    Date of Patent: April 12, 2022
    Assignee: Bank of America Corporation
    Inventors: Jo-Ann Taylor, Michael J. Sbandi, Benjamin F. Tweel
  • Publication number: 20210243204
    Abstract: An information security system that includes an information security engine configured to detect an attack by a malicious software element in a network. The information security engine is further configured to transfer the malicious software element from the network to the emulated network in response to detecting an attack. The information security engine is further configured to select defense strategies for restricting communications using different port configurations and to implement each defense strategy within the emulated network. The information security engine is further configured to execute a duplicate of the malicious software element in the emulated network and to determine a performance level for each of the defense strategies against the duplicate of the malicious software element. The information security engine is further configured to select a defense strategy with a highest performance level and to implement the selected defense strategy within the network.
    Type: Application
    Filed: January 31, 2020
    Publication date: August 5, 2021
    Inventors: Jo-Ann Taylor, Benjamin F. Tweel, Michael R. Young, Michael J. Sbandi
  • Publication number: 20210051162
    Abstract: An information security system that includes an information security engine configured to monitor data transmissions within a network and to detect a first attack by a malicious software element. The information security engine is further configured to detect a second attack by the malicious software element within a predetermined time interval from the first attack and to transfer the malicious software element from the network to an emulated network in response to detecting the second attack. The information security engine is further configured to generate an attack log comprising behavior characteristics for attacks performed by the malicious software element in the emulated network and to train a machine learning model based on behavior characteristics from the attack log.
    Type: Application
    Filed: August 12, 2019
    Publication date: February 18, 2021
    Inventors: Jo-Ann Taylor, Michael J. Sbandi, Benjamin F. Tweel