Patents by Inventor Benjamin F. Tweel
Benjamin F. Tweel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250086635Abstract: Arrangements for dynamic generation of interactive mapping interfaces are provided. Transaction data may be received by a computing platform and analyzed to extract user and location information for each transaction. The computing platform may generate, based on the extracted user and location data, an interactive mapping interface providing a visual display of transactions within a geographic area. The interactive mapping interface may include a plurality of interactive icons that identify a physical location of a transaction. The interactive mapping interface may be transmitted to a user computing device for display by a display of the user computing device. The computing platform may receive user input associated with user interaction with one of the interactive icons and may generate and transmit, to the user computing device for display, an additional user interface that may include transaction details and a selectable option to report the respective transaction as fraudulent.Type: ApplicationFiled: September 11, 2023Publication date: March 13, 2025Inventors: Jack Franklin Price, Jr., Basil C. Doyle, Allison M. Glenn, Benjamin F. Tweel, Sara B. Roper, Susan Hart, Christopher Cooley
-
Publication number: 20250086655Abstract: Arrangements for dynamic generation of interactive fraud mapping interfaces are provided. In some examples, fraud reporting data may be received by a computing platform. The fraud reporting data may include incidents of potentially fraudulent activity reported by a plurality of users. If at least a threshold volume of fraud reporting data is received, the fraud reporting data may be analyzed using a machine learning engine. For instance, the fraud reporting data may be input to the machine learning engine to output one or more compromised or potentially compromised payment terminals, vendor or retail locations, or the like. In some examples, the computing platform may generate an interactive fraud mapping interface that includes an interactive icon associated with each compromised location of the one or more compromised locations. The interactive fraud mapping interface may be transmitted or sent to a user computing device for display.Type: ApplicationFiled: September 11, 2023Publication date: March 13, 2025Inventors: Jack Franklin Price, JR., Allison M. Glenn, Susan Hart, Benjamin F. Tweel, Anna Burchman
-
Patent number: 12205096Abstract: Arrangements for haptic feedback control are provided. In some aspects, registration data may be received from a user. For instance, a user may identify one or more devices (e.g., payment devices such as credit or debit cards, mobile devices, or the like) associated with the user. In some examples, the user may also select customized haptic feedback associated with different feedback outputs. After receiving registration data, the computing platform may receive a request to process a transaction. The transaction may be initiated at a point-of-sale system of an entity via the payment device or card of the user. Transaction details may be analyzed to determine or identify a feedback output (e.g., approved, denied, request additional information or the like). Based on the identified feedback output, a feedback output command or instruction may be generated and transmitted to the payment device for execution.Type: GrantFiled: May 24, 2022Date of Patent: January 21, 2025Assignee: Bank of America CorporationInventors: Benjamin F. Tweel, Neal Aaron Slensker, Chanda Joyner
-
Publication number: 20240427862Abstract: Arrangements for detecting unauthorized activity based on input method analysis and monitoring are provided. In some aspects, identity information associated with a user may be received and be stored. An input may be received from a computing device of the user. An input pattern of the received input may be determined. Using a machine learning model, the input pattern of the received input may be compared to input patterns of humans and input patterns of machines. Based on the comparison, it may be determined whether the user is a human user or a non-human user. Responsive to determining that the user is a non-human user, a request may be transmitted to the user to provide increased authentication credentials. Responsive to determining that the user is a human user, an identity of the user may be verified by comparing the input pattern of the received input to the stored identity information.Type: ApplicationFiled: June 26, 2023Publication date: December 26, 2024Inventors: Dinesh Kumar Agrawal, Gilbert M. Gatchalian, Steven Greene, Richard Scot, Sanjay Lohar, Benjamin F. Tweel, James Siekman, Erik Dahl, Vijaya L. Vemireddy
-
Publication number: 20240380764Abstract: Arrangements for comprehensive threat mitigation are provided. In some aspects, an indication of threat or potential threat may be received from an external entity. In some examples, the threat may include a cybersecurity threat. In response to receiving the indication of threat, identifying data associated with the external entity may be extracted from the indication and used to retrieve pre-stored customizations associated with the desired mitigating actions of the external entity. The one or more mitigating actions may be identified and instructions to execute the one or more mitigating actions may be generated and transmitted to one or more computing devices for execution.Type: ApplicationFiled: July 23, 2024Publication date: November 14, 2024Inventors: Benjamin F. Tweel, Neal Aaron Slensker, James Siekman, Shannon Sabina Rolinger, John Raymond Omernik, Rebecca Lynn Pietro
-
Patent number: 12088603Abstract: Arrangements for comprehensive threat mitigation are provided. In some aspects, an indication of threat or potential threat may be received from an external entity. In some examples, the threat may include a cybersecurity threat. In response to receiving the indication of threat, identifying data associated with the external entity may be extracted from the indication and used to retrieve pre-stored customizations associated with the desired mitigating actions of the external entity. The one or more mitigating actions may be identified and instructions to execute the one or more mitigating actions may be generated and transmitted to one or more computing devices for execution.Type: GrantFiled: May 9, 2022Date of Patent: September 10, 2024Assignee: Bank of America CorporationInventors: Benjamin F. Tweel, Neal Aaron Slensker, James Siekman, Shannon Sabina Rolinger, John Raymond Omernik, Rebecca Lynn Pietro
-
Publication number: 20240004968Abstract: In a public setting, an audio/visual (A/V) obfuscation device can be used to provide privacy during a conversation occurring either in-person or via an electronic device. The A/V obfuscation device is configured to provide one or both of an electronic or physical barrier to ensure privacy for at least part of the conversation. The A/V obfuscation device provides audio masking and/or an optical block to impede third-parties from overhearing or observing the conversation. The A/V obfuscation device includes devices capable of capturing audio and/or video information of conversation participants and/or electronic devices. The captured audio and/or video information may be analyzed and processed to generate obfuscation audio and/or video signals to obscure at least a portion of aspects of the conversation.Type: ApplicationFiled: June 30, 2022Publication date: January 4, 2024Inventors: Tomas M. Castrejon, III, Benjamin F. Tweel, James Siekman
-
Publication number: 20230385795Abstract: Arrangements for haptic feedback control are provided. In some aspects, registration data may be received from a user. For instance, a user may identify one or more devices (e.g., payment devices such as credit or debit cards, mobile devices, or the like) associated with the user. In some examples, the user may also select customized haptic feedback associated with different feedback outputs. After receiving registration data, the computing platform may receive a request to process a transaction. The transaction may be initiated at a point-of-sale system of an entity via the payment device or card of the user. Transaction details may be analyzed to determine or identify a feedback output (e.g., approved, denied, request additional information or the like). Based on the identified feedback output, a feedback output command or instruction may be generated and transmitted to the payment device for execution.Type: ApplicationFiled: May 24, 2022Publication date: November 30, 2023Inventors: Benjamin F. Tweel, Neal Aaron Slensker, Chanda Joyner
-
Publication number: 20230362174Abstract: Arrangements for comprehensive threat mitigation are provided. In some aspects, an indication of threat or potential threat may be received from an external entity. In some examples, the threat may include a cybersecurity threat. In response to receiving the indication of threat, identifying data associated with the external entity may be extracted from the indication and used to retrieve pre-stored customizations associated with the desired mitigating actions of the external entity. The one or more mitigating actions may be identified and instructions to execute the one or more mitigating actions may be generated and transmitted to one or more computing devices for execution.Type: ApplicationFiled: May 9, 2022Publication date: November 9, 2023Inventors: Benjamin F. Tweel, Neal Aaron Slensker, James Siekman, Shannon Sabina Rolinger, John Raymond Omernik, Rebecca Lynn Pietro
-
Patent number: 11323473Abstract: An information security system that includes an information security engine configured to detect an attack by a malicious software element in a network. The information security engine is further configured to transfer the malicious software element from the network to the emulated network in response to detecting an attack. The information security engine is further configured to select defense strategies for restricting communications using different port configurations and to implement each defense strategy within the emulated network. The information security engine is further configured to execute a duplicate of the malicious software element in the emulated network and to determine a performance level for each of the defense strategies against the duplicate of the malicious software element. The information security engine is further configured to select a defense strategy with a highest performance level and to implement the selected defense strategy within the network.Type: GrantFiled: January 31, 2020Date of Patent: May 3, 2022Assignee: Bank of America CorporationInventors: Jo-Ann Taylor, Benjamin F. Tweel, Michael R. Young, Michael J. Sbandi
-
Patent number: 11303653Abstract: An information security system that includes an information security engine configured to monitor data transmissions within a network and to detect a first attack by a malicious software element. The information security engine is further configured to detect a second attack by the malicious software element within a predetermined time interval from the first attack and to transfer the malicious software element from the network to an emulated network in response to detecting the second attack. The information security engine is further configured to generate an attack log comprising behavior characteristics for attacks performed by the malicious software element in the emulated network and to train a machine learning model based on behavior characteristics from the attack log.Type: GrantFiled: August 12, 2019Date of Patent: April 12, 2022Assignee: Bank of America CorporationInventors: Jo-Ann Taylor, Michael J. Sbandi, Benjamin F. Tweel
-
Publication number: 20210243204Abstract: An information security system that includes an information security engine configured to detect an attack by a malicious software element in a network. The information security engine is further configured to transfer the malicious software element from the network to the emulated network in response to detecting an attack. The information security engine is further configured to select defense strategies for restricting communications using different port configurations and to implement each defense strategy within the emulated network. The information security engine is further configured to execute a duplicate of the malicious software element in the emulated network and to determine a performance level for each of the defense strategies against the duplicate of the malicious software element. The information security engine is further configured to select a defense strategy with a highest performance level and to implement the selected defense strategy within the network.Type: ApplicationFiled: January 31, 2020Publication date: August 5, 2021Inventors: Jo-Ann Taylor, Benjamin F. Tweel, Michael R. Young, Michael J. Sbandi
-
Publication number: 20210051162Abstract: An information security system that includes an information security engine configured to monitor data transmissions within a network and to detect a first attack by a malicious software element. The information security engine is further configured to detect a second attack by the malicious software element within a predetermined time interval from the first attack and to transfer the malicious software element from the network to an emulated network in response to detecting the second attack. The information security engine is further configured to generate an attack log comprising behavior characteristics for attacks performed by the malicious software element in the emulated network and to train a machine learning model based on behavior characteristics from the attack log.Type: ApplicationFiled: August 12, 2019Publication date: February 18, 2021Inventors: Jo-Ann Taylor, Michael J. Sbandi, Benjamin F. Tweel