Patents by Inventor Charles Philip
Charles Philip has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250007940Abstract: Systems, computer program products, and methods are described herein for the identification and monitoring of endpoint activity response. The present disclosure is configured to intercept a message via an input engine, forward the intercepted message data to an intelligence engine, train the intelligence engine to identify one or more security issues in the intercepted message data, generate a template of the message which emulates the message by removing one or more links or attached files, analyze the intercepted message data to determine one or more message characteristics related to a user, and trigger the dispatch of the message template and a gamification link to the intended recipient of the message via a new message.Type: ApplicationFiled: June 30, 2023Publication date: January 2, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Charles Philip, Vaibhav Bansal, Alkesh Gupta, Smit Sawant, Osheen Pandita, Devansh Upadhyay, Ashley Peter Oliveira
-
SYSTEM AND METHOD FOR DETECTING AND PREVENTING MALFEASANT TARGETING OF INDIVIDUAL USERS IN A NETWORK
Publication number: 20240414188Abstract: Systems, computer program products, and methods for detecting and preventing malfeasant targeting of individual users in a network are provided. The method includes identifying a malfeasant communication data packet directed to a target user in a network. The method also includes causing a transmission of a malfeasant report for the target user. The malfeasant report includes information relating to previous malfeasant communication data packet(s) directed to the target user and one or more user access attributes including an access level to the network for the target user. Based on the malfeasant report and the malfeasant communication data packet, the method further includes determining a malfeasant threat level. The malfeasant threat level indicates a threat of a malfeasant communication to the target user. The method further includes causing a transmission of a malfeasant threat level alert in an instance in which the malfeasant threat level meets or exceeds a predetermined threat threshold.Type: ApplicationFiled: June 7, 2023Publication date: December 12, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Charles Philip, Vaibhav Bansal -
Patent number: 12141292Abstract: Aspects of the disclosure relate to tracking and mitigating security threats and vulnerabilities in browser extension engines. A computing platform may receive, via the communication interface, an indication of a user request to use a first browser extension at a first user computing device. The computing platform may then analyze the first browser extension to identify one or more potential vulnerabilities in the first browser extension, including performing an examination process on code associated with the first browser extension. Based on identifying one or more potential vulnerabilities, the computing platform may thereafter determine whether the user has an exception associated with each potential vulnerability. Upon detecting no exception for the user, the computing platform may then identify at least one corrective action associated with each potential vulnerability and transmit, to the first user computing device, instructions to perform the at least one corrective action.Type: GrantFiled: August 6, 2021Date of Patent: November 12, 2024Assignee: Bank of America CorporationInventors: Charles Philip, Priya Birendra Yadav
-
Patent number: 12120130Abstract: Aspects of the disclosure relate to traffic routing. The computing platform may receive a first web request, requesting access to a first website. The computing platform may identify that the first website is associated with multiple categorizations. Based on identifying that the first website is associated with the multiple categorizations, the computing platform may redirect the first web request to a threat analysis database engine, which may be configured to output a first network action rule for the first website. The computing platform may access, from the proxy content filtering engine, the first network action rule. The computing platform may execute the first network action, which may include blocking or allowing traffic to the first website.Type: GrantFiled: August 8, 2022Date of Patent: October 15, 2024Assignee: Bank of America CorporationInventor: Charles Philip
-
Publication number: 20240259407Abstract: Systems, computer program products, and methods are described herein for identification and analysis of suspicious data in an electronic network environment. For instance, the system may include a processing device configured to: receive a transmission of an electronic communication through a communication gateway; determining if the electronic communication contains one or more extraneous characteristics; and, in response to determining that the electronic communication contains one or more extraneous characteristics, initiating at least one of a behavioral analysis, a static analysis, or a metadata analysis. The system may further configure the processor to create, in response to initiating at least one of the behavioral analysis, the static analysis, or the metadata analysis, an analytics log associated with the electronic communication.Type: ApplicationFiled: January 27, 2023Publication date: August 1, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Charles Philip, Tanmay Devangnbhai Shelat
-
Publication number: 20240126873Abstract: Various aspects of the disclosure relate to automated monitoring and remediation of computing threats at an endpoint computing device. An endpoint monitoring tool is configured to monitor for security threats on the local host computing device. An identified threat causes the endpoint monitoring tool to automatically quarantine the local device and any associated user accounts. During a pre-defined time period the endpoint monitoring tool analyzes an impact of the threat and any user activities from the time a suspect file was created. The endpoint monitoring tool attempts to automatically mitigate the security threat during the pre-defined time period. If the threat was cleared, the local computing device and the user accounts are released for normal use. If the threat was unable to be cleared within the time period, additional mitigation processes are triggered.Type: ApplicationFiled: October 17, 2022Publication date: April 18, 2024Inventors: Charles Philip, Bhaarggavee P
-
Publication number: 20240048567Abstract: Aspects of the disclosure relate to traffic routing. The computing platform may receive a first web request, requesting access to a first website. The computing platform may identify that the first website is associated with multiple categorizations. Based on identifying that the first website is associated with the multiple categorizations, the computing platform may redirect the first web request to a threat analysis database engine, which may be configured to output a first network action rule for the first website. The computing platform may access, from the proxy content filtering engine, the first network action rule. The computing platform may execute the first network action, which may include blocking or allowing traffic to the first website.Type: ApplicationFiled: August 8, 2022Publication date: February 8, 2024Inventor: Charles Philip
-
Patent number: 11822916Abstract: Aspects of the disclosure relate to monitoring and detecting security vulnerabilities in software code to be executed in a continuous integration and continuous delivery (CI/CD) environment. A computing platform may receive, via the communication interface, an indication of a user request to deploy a code in a CI/CD environment, in which the user request includes user account information and the code. The computing platform may then analyze the code to identify a presence of one or more potential vulnerabilities in the code, including executing a security process on the code. Based on identifying one or more potential vulnerabilities, the computing platform may thereafter determine an alert action and send, via the communication interface, to the developer computing platform, the alert action.Type: GrantFiled: January 6, 2022Date of Patent: November 21, 2023Assignee: Bank of America CorporationInventor: Charles Philip
-
Patent number: 11763014Abstract: Aspects of the disclosure relate to a production protection correlation engine. In some embodiments, a computing platform may acquire access permission data aggregated from a plurality of data sources and normalize the access permission data. Then, the computing platform may identify user-specific entitlements and classify user roles. Next, the computing platform may tag the normalized permission data based on user role classification data. Based on the tagging, the computing platform may identify at least one enterprise user having one or more toxic access permissions and, in response, trigger an access review process. In turn, the computing platform may revoke one or more incompatible access permissions. Then, the computing platform may transmit updated access permission data to a system of record, causing the system of record to store the updated access permission data in a database and limit access to enterprise resources based on the updated access permission data.Type: GrantFiled: June 30, 2020Date of Patent: September 19, 2023Assignee: Bank of America CorporationInventors: Charles Philip, Richard John Woodward, Souradeep Chakroborty
-
Patent number: 11714070Abstract: A permeative amine/acid introduction device (PAID) is placed after a conventional KOH eluent suppressed conductometric anion chromatography (SCAC) system. The PAID converts the suppressed eluites from the acid form to the corresponding salt. For example, when the analytes are acids, they are converted to the corresponding ammonium salt (NR2H+HX?NR2H2++X?) and allows very weak acids HX (pKa?7.0) that cannot normally be detected by SCAC to be measured by a second conductivity detector following the PAID. Permeative reagent introduction is dilutionless, can be operated without pumps and provides good mixing with low band dispersion (as small as 30 ?L). An exemplary amine is diethylamine (DEA), which was chosen as the amine source due to its low pKb value (pKb 3.0), high vapor pressure, and low toxicity and low odor.Type: GrantFiled: June 3, 2020Date of Patent: August 1, 2023Assignee: Board of Regents, The University of Texas SystemInventors: Purnendu K. Dasgupta, Charles Philip Shelor, Hongzhu Liao
-
Publication number: 20230214209Abstract: Aspects of the disclosure relate to monitoring and detecting security vulnerabilities in software code to be executed in a continuous integration and continuous delivery (CI/CD) environment. A computing platform may receive, via the communication interface, an indication of a user request to deploy a code in a CI/CD environment, in which the user request includes user account information and the code. The computing platform may then analyze the code to identify a presence of one or more potential vulnerabilities in the code, including executing a security process on the code. Based on identifying one or more potential vulnerabilities, the computing platform may thereafter determine an alert action and send, via the communication interface, to the developer computing platform, the alert action.Type: ApplicationFiled: January 6, 2022Publication date: July 6, 2023Applicant: Bank of America CorporationInventor: Charles Philip
-
Publication number: 20230039079Abstract: Aspects of the disclosure relate to tracking and mitigating security threats and vulnerabilities in browser extension engines. A computing platform may receive, via the communication interface, an indication of a user request to use a first browser extension at a first user computing device. The computing platform may then analyze the first browser extension to identify one or more potential vulnerabilities in the first browser extension, including performing an examination process on code associated with the first browser extension. Based on identifying one or more potential vulnerabilities, the computing platform may thereafter determine whether the user has an exception associated with each potential vulnerability. Upon detecting no exception for the user, the computing platform may then identify at least one corrective action associated with each potential vulnerability and transmit, to the first user computing device, instructions to perform the at least one corrective action.Type: ApplicationFiled: August 6, 2021Publication date: February 9, 2023Inventors: Charles Philip, Priya Birendra Yadav
-
Publication number: 20210406391Abstract: Aspects of the disclosure relate to a production protection correlation engine. In some embodiments, a computing platform may acquire access permission data aggregated from a plurality of data sources and normalize the access permission data. Then, the computing platform may identify user-specific entitlements and classify user roles. Next, the computing platform may tag the normalized permission data based on user role classification data. Based on the tagging, the computing platform may identify at least one enterprise user having one or more toxic access permissions and, in response, trigger an access review process. In turn, the computing platform may revoke one or more incompatible access permissions. Then, the computing platform may transmit updated access permission data to a system of record, causing the system of record to store the updated access permission data in a database and limit access to enterprise resources based on the updated access permission data.Type: ApplicationFiled: June 30, 2020Publication date: December 30, 2021Inventors: Charles Philip, Richard John Woodward, Souradeep Chakroborty
-
Publication number: 20200292511Abstract: A permeative amine/acid introduction device (PAID) is placed after a conventional KOH eluent suppressed conductometric anion chromatography (SCAC) system. The PAID converts the suppressed eluites from the acid form to the corresponding salt. For example, when the analytes are acids, they are converted to the corresponding ammonium salt (NR2H+HX?NR2H2++X?) and allows very weak acids HX (pKa?7.0) that cannot normally be detected by SCAC to be measured by a second conductivity detector following the PAID. Permeative reagent introduction is dilutionless, can be operated without pumps and provides good mixing with low band dispersion (as small as 30 ?L). An exemplary amine is diethylamine (DEA), which was chosen as the amine source due to its low pKb value (pKb 3.0), high vapor pressure, and low toxicity and low odor.Type: ApplicationFiled: June 3, 2020Publication date: September 17, 2020Inventors: Purnendu K. Dasgupta, Charles Philip Shelor, Hongzhu Liao
-
Patent number: 10706679Abstract: An electronic wagering system may include a wager selection station, a server, and a software application executed by a mobile communication device. At least one processor of the wager selection station may accept user input specifying parameters of an event on which to place a wager, generate a unique reference from which the specified event parameters are derivable, encode the unique reference in a machine-readable optical code, and display the generated optical code. The software application may operate the user's mobile communication device to scan the displayed optical code, retrieve the unique reference by decoding the scanned optical code, transmit the unique reference to the server for deriving the specified event parameters from the unique reference at the server, receive user input to place a wager on the event with the specified parameters, and transmit a request to the server to place the wager on behalf of the user.Type: GrantFiled: May 27, 2016Date of Patent: July 7, 2020Assignee: IGTInventors: Charles Philip Cohen, Christian Mario Bugno
-
Patent number: 10312969Abstract: A system for controlling a subsea device comprises a complimentary set of data communication interfaces operatively coupled to an electronically interrogatable component of a subsea device and a remotely disposed device controller via a power conductor which defined data pathway between the subsea device and the remotely disposed device controller. A data transceiver is operatively coupled to the electronically interrogatable component and the remotely disposed device controller via the complimentary set of data communication interfaces over the power conductor. In configurations, control and/or telemetry or other data may be unidirectionally and/or bidirectionally transmitted between the electronically interrogatable component of a subsea device and a remotely disposed device controller.Type: GrantFiled: January 7, 2015Date of Patent: June 4, 2019Assignee: Oceaneering International, Inc.Inventors: Kevin Frances Kerins, Mark Charles Philip
-
Publication number: 20180188028Abstract: An inertial measurement apparatus has a movable proof mass and at least one electrode with a plurality of fingers that extend at non-right angles relative to an axis of motion of the proof mass. Multiple electrodes may be utilized with the same proof mass, with each of the electrodes having electrode fingers that extend at non-right angles relative to the axis of motion of the proof mass. A single-gap shock stop structure improves vibration immunity of micro-machined in-plane sensors. The angle of the electrode fingers creates a different effective gap to reduce the probability of contact between the proof mass and the electrode during extreme operational conditions.Type: ApplicationFiled: October 25, 2016Publication date: July 5, 2018Inventors: Yaesuk Jeong, Michael John Foster, Peter Charles Philip Hrudey
-
Patent number: 9859647Abstract: A two-part subsea bulkhead connector may be replaced and/or re-purposed of without draining an enclosure or disconnecting hard wiring therein, the two-part subsea bulkhead connector a first bulkhead connector, a second bulkhead connector, and a substantially water tight mechanical seal disposed intermediate the first bulkhead connector. When mated, first and second bulkhead connectors are aligned and contacts received into a corresponding contact. The first bulkhead connector is secured to the second bulkhead connector sufficiently to allow the mechanical seal to prevent water ingress. If a first contact becomes damaged or if a differing functionality set is needed, the second bulkhead connector may be removed from the first bulkhead connector and replaced.Type: GrantFiled: December 9, 2015Date of Patent: January 2, 2018Assignee: OCEANEERING INTERNATIONAL, INC.Inventor: Mark Charles Philip
-
Publication number: 20170345256Abstract: An electronic wagering system may include a wager selection station, a server, and a software application executed by a mobile communication device. At least one processor of the wager selection station may accept user input specifying parameters of an event on which to place a wager, generate a unique reference from which the specified event parameters are derivable, encode the unique reference in a machine-readable optical code, and display the generated optical code. The software application may operate the user's mobile communication device to scan the displayed optical code, retrieve the unique reference by decoding the scanned optical code, transmit the unique reference to the server for deriving the specified event parameters from the unique reference at the server, receive user input to place a wager on the event with the specified parameters, and transmit a request to the server to place the wager on behalf of the user.Type: ApplicationFiled: May 27, 2016Publication date: November 30, 2017Inventors: Charles Philip Cohen, Christian Mario Bugno
-
Patent number: D814047Type: GrantFiled: February 11, 2016Date of Patent: March 27, 2018Assignee: FIAMMA S.P.A.Inventors: John-David Pozzi, Charles Philip Pozzi