Patents by Inventor Brady Prentice Merkel
Brady Prentice Merkel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250037154Abstract: User interactions are tracked within a Graphical User Interface (GUI) configured for user consent/authorization, specifically user interactions that indicate that the user has abandoned the consent/authorization process. As a result of such tracking/recordation, abandonment metrics are determined, such as volume of abandonments over a given time period, rate of abandonment, time to abandonment and the like. In specific embodiments of the invention, the abandonment metrics are used to intelligently determine, in some instances on a per-user basis, whether a need exists to reconfigure the GUI and, if a need exists, what sensory alterations to the GUI should be implemented.Type: ApplicationFiled: October 9, 2024Publication date: January 30, 2025Applicant: BANK OF AMERICA CORPORATIONInventor: Brady Prentice Merkel
-
Patent number: 12159291Abstract: User interactions are tracked within a Graphical User Interface (GUI) configured for user consent/authorization, specifically user interactions that indicate that the user has abandoned the consent/authorization process. As a result of such tracking/recordation, abandonment metrics are determined, such as volume of abandonments over a given time period, rate of abandonment, time to abandonment and the like. In specific embodiments of the invention, the abandonment metrics are used to intelligently determine, in some instances on a per-user basis, whether a need exists to reconfigure the GUI and, if a need exists, what sensory alterations to the GUI should be implemented.Type: GrantFiled: September 29, 2022Date of Patent: December 3, 2024Assignee: BANK OF AMERICA CORPORATIONInventor: Brady Prentice Merkel
-
Publication number: 20240152633Abstract: Point-in-Time data access authorization is realized by a data access broker and data access security manager that provide for a data owner/authorizer to provide access consent at the point in time at which a specific data access request is made, without the need for the data owner to share their service-specific access credentials with the third-party entity/data requester. As a result, the data owner has control over the authorization of each data access request and has knowledge as to when the third-party entity is accessing the data. Further, by not having to share access credentials with the third-party entity/data requester security issues related to exposure and/or misuse of the access credentials are avoided.Type: ApplicationFiled: November 4, 2022Publication date: May 9, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Gregory Allen Burkett, Brady Prentice Merkel, David E. Strommer
-
Publication number: 20240112206Abstract: User interactions are tracked within a Graphical User Interface (GUI) configured for user consent/authorization, specifically user interactions that indicate that the user has abandoned the consent/authorization process. As a result of such tracking/recordation, abandonment metrics are determined, such as volume of abandonments over a given time period, rate of abandonment, time to abandonment and the like. In specific embodiments of the invention, the abandonment metrics are used to intelligently determine, in some instances on a per-user basis, whether a need exists to reconfigure the GUI and, if a need exists, what sensory alterations to the GUI should be implemented.Type: ApplicationFiled: September 29, 2022Publication date: April 4, 2024Applicant: BANK OF AMERICA CORPORATIONInventor: Brady Prentice Merkel
-
Publication number: 20240106661Abstract: Embodiments of the present invention provide a system for securely electronically transmitting cryptographic certificates in high data transmission volume. The system is configured for initiating setup of an external secure hardware device, storing one or more digital keys and one or more cryptographic certificates associated with the digital keys on the external secure hardware device, determining initialization of an entity application, storing copies of at least the one or more cryptographic certificates in a cache memory of the entity application, generating a request for transmitting to a third party entity, extracting a cryptographic certificate from the cache memory associated with the third party entity, and transmitting the request and the cryptographic certificate to the third party entity.Type: ApplicationFiled: September 22, 2022Publication date: March 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Jason David Parrish, Brady Prentice Merkel
-
Publication number: 20240106817Abstract: The present invention provides for implementing an internal entity intermediate certificate authority via a mutual transport layer security conversation to allow an entity-specific certificate authority to generate its own certificate which is transmitted to a second point in the internal transmission for sending of the external certificate authority generated certificate to the external entity for mutual authentication. Further, in this way, the first point of internal transmission does not have to store the certificate in its own hardware security module.Type: ApplicationFiled: September 22, 2022Publication date: March 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Jason David Parrish, Brady Prentice Merkel
-
SYSTEM AND METHOD FOR IDENTIFYING AND PREVENTING MISAPPROPRIATION USING NORMALIZED REQUEST SEQUENCES
Publication number: 20240106840Abstract: Systems, computer program products, and methods are described herein for identifying and preventing misappropriation using normalized request sequences. The method includes receiving a sequence of two or more requests associated with a user. The method also includes comparing the sequence of two or more requests with one or more past sequence of two or more past requests. The method further includes determining whether the sequence of two or more requests were carried out by the user or the malfeasant actor. The determination is made based on a comparison of the sequence of two or more requests with at least one of the one or more past sequence of two or more past requests. The method also includes causing an escalation action to be executed in an instance in which the sequence of two or more requests was carried out by the malfeasant actor.Type: ApplicationFiled: September 28, 2022Publication date: March 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Brady Prentice Merkel, Wayne Georges -
Publication number: 20240104459Abstract: Systems, computer program products, and methods are described herein for implementing resource ownership verifications in a federated distributed ledger. The present invention is configured to receive a query, wherein the query comprises a resource identifier; identify a federated distributed ledger associated with the resource identifier, the federated distributed ledger comprising data associated with an ownership of a resource associated with the resource identifier; query at least one entity associated with the resource, the query of the at least one entity associated with the resource comprising an update request of the resource, wherein the update request comprises a request to the at least one entity associated with the resource to determine a current owner of the resource; and update the federated distributed ledger with the current owner of the resource.Type: ApplicationFiled: September 22, 2022Publication date: March 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Brady Prentice Merkel, Mardochee Macxis, Richard Huw Thomas
-
Publication number: 20240086911Abstract: Systems, computer program products, and methods are described herein for tracking and logging resource transfers in a distributed network. The present invention is configured to generate a distributed ledger associated with a resource identifier; receive a resource transfer associated with the resource identifier, the resource transfer comprising a resource transfer between a sender account and a recipient account; update the distributed ledger based on the resource transfer; and generate a resource token based on the distributed ledger.Type: ApplicationFiled: September 12, 2022Publication date: March 14, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Brady Prentice Merkel, Terrence Williamson, Mardochee Macxis, Anup Philip, Richard Huw Thomas
-
Patent number: 11895147Abstract: A system for suspending a computing device suspected of being infected by a malicious code is configured to receive a signal to initiate a suspension procedure of the computing device. The system captures states of instructions that are being executed by a processor of the computing device, where the instructions comprise the malicious code. The system prioritizes the operation of a kill switch button over the instructions being executed by the processor. The system sends notification signals to servers managing a user account associated with a user currently logged in at the computing device, indicating that the computing device is suspected of having been infected by the malicious code. In response to sending the notification signals to the servers, the user account is suspended. The system terminates network connections of the computing device such that the computing device is disconnected from other devices.Type: GrantFiled: November 29, 2022Date of Patent: February 6, 2024Assignee: Bank of America CorporationInventors: Adam B. Richman, William Thomas Stranathan, Anusha Ravulapati, Kenneth Aaron Kaye, Nikhil Harish Sanil, Alice Yali Chang, Brady Prentice Merkel
-
Publication number: 20230087631Abstract: A system for suspending a computing device suspected of being infected by a malicious code is configured to receive a signal to initiate a suspension procedure of the computing device. The system captures states of instructions that are being executed by a processor of the computing device, where the instructions comprise the malicious code. The system prioritizes the operation of a kill switch button over the instructions being executed by the processor. The system sends notification signals to servers managing a user account associated with a user currently logged in at the computing device, indicating that the computing device is suspected of having been infected by the malicious code. In response to sending the notification signals to the servers, the user account is suspended. The system terminates network connections of the computing device such that the computing device is disconnected from other devices.Type: ApplicationFiled: November 29, 2022Publication date: March 23, 2023Inventors: Adam B. Richman, William Thomas Stranathan, Anusha Ravulapati, Kenneth Aaron Kaye, Nikhil Harish Sanil, Alice Yali Chang, Brady Prentice Merkel
-
Patent number: 11588848Abstract: A system for suspending a computing device suspected of being infected by a malicious code is configured to receive a signal to initiate a suspension procedure of the computing device. The system captures states of instructions that are being executed by a processor of the computing device, where the instructions comprise the malicious code. The system prioritizes the operation of a kill switch button over the instructions being executed by the processor. The system sends notification signals to servers managing a user account associated with a user currently logged in at the computing device, indicating that the computing device is suspected of having been infected by the malicious code. In response to sending the notification signals to the servers, the user account is suspended. The system terminates network connections of the computing device such that the computing device is disconnected from other devices.Type: GrantFiled: January 5, 2021Date of Patent: February 21, 2023Assignee: Bank of America CorporationInventors: Adam B. Richman, William Thomas Stranathan, Anusha Ravulapati, Kenneth Aaron Kaye, Nikhil Harish Sanil, Alice Yali Chang, Brady Prentice Merkel
-
Publication number: 20220217155Abstract: A system for suspending a computing device suspected of being infected by a malicious code is configured to receive a signal to initiate a suspension procedure of the computing device. The system captures states of instructions that are being executed by a processor of the computing device, where the instructions comprise the malicious code. The system prioritizes the operation of a kill switch button over the instructions being executed by the processor. The system sends notification signals to servers managing a user account associated with a user currently logged in at the computing device, indicating that the computing device is suspected of having been infected by the malicious code. In response to sending the notification signals to the servers, the user account is suspended. The system terminates network connections of the computing device such that the computing device is disconnected from other devices.Type: ApplicationFiled: January 5, 2021Publication date: July 7, 2022Inventors: Adam B. Richman, William Thomas Stranathan, Anusha Ravulapati, Kenneth Aaron Kaye, Nikhil Harish Sanil, Alice Yali Chang, Brady Prentice Merkel