Patents by Inventor Christopher Stephen Littrell

Christopher Stephen Littrell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240244048
    Abstract: Arrangements for providing dynamic passive authentication are provided. In some aspects, registration data may be received for a plurality of users. The registration data may include biometric data of each user of the plurality of users, and identification of one or more user computing devices that each user is authorize to access. In response to receiving an indication of login to a user computing device by a first user, one or more passive authentication functions may be activated and biometric data may be received from devices associated with the user computing device. The computing platform may compare the received biometric data to registration biometric data associated with the first user. If the received data matches the registration data, the system may capture additional biometric data at a subsequent time. If the received data does not match the registration data, one or more mitigation actions may be identified and executed.
    Type: Application
    Filed: January 17, 2023
    Publication date: July 18, 2024
    Inventors: Edward Lee Traywick, Christopher D. Nobile, Joshua R. Johnson, Christopher Stephen Littrell
  • Publication number: 20240242219
    Abstract: Arrangements for providing dynamic passive authentication at self-service kiosks are provided. In some aspects, registration data may be received for a plurality of users. The registration data may include biometric data of each user of the plurality of users. In response to receiving an indication of authentication of a user and a request for transaction processing, one or more passive authentication functions may be activated and biometric data may be received from devices associated with the self-service kiosk. The computing platform may compare the received biometric data to registration biometric data associated with the first user. If the received data matches the registration data, the system may capture additional biometric data at a subsequent time. If the received data does not match the registration data, one or more mitigation actions may be identified and executed.
    Type: Application
    Filed: January 17, 2023
    Publication date: July 18, 2024
    Inventors: Edward Lee Traywick, Christopher D. Nobile, Joshua R. Johnson, Christopher Stephen Littrell
  • Publication number: 20240244050
    Abstract: Embodiments of the invention are directed to systems, computer program products, and methods for electronic authentication of electronic distributed network traffic via enriched data. An authorization request is provided from a user of a first endpoint device to send or receive data with a second endpoint device. A request for a first authentication credential to the first endpoint device is transmitted, and an authentication transmission is received by the system. An enhanced authentication engine is initialized, which collects, by a middleware, data flow from an identity database to the enhanced authentication engine. A metadata source is combined with the data flow to form a combined data, which is transmitted to an alert engine.
    Type: Application
    Filed: January 17, 2023
    Publication date: July 18, 2024
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Barry Gregory Jude Walsh, Tomas M. Castrejon, III, Christopher Stephen Littrell, Edward Lee Traywick
  • Publication number: 20240236687
    Abstract: Aspects of the disclosure are directed to a supporting authentication between a computing platform and a computer that has an attached geolocation dongle. The attached geolocation dongle provides location information to the computer that is indicative of a current location of the computer, where the location information is obtained from RF signals generated from neighboring cell towers or the Global Positioning System. The computing platform may utilize the location information for authenticating the computer. Moreover, the location information may be encrypted by the geolocation dongle based on an encryption key known by the geolocation dongle and the computing platform. With another aspect, authentication is supported by a computer and an associated communication device that provides location information to the computer via a short-range communication channel.
    Type: Application
    Filed: January 5, 2023
    Publication date: July 11, 2024
    Inventors: Edward Lee Traywick, Barry Walsh, Joshua Johnson, Christopher Stephen Littrell, Christopher D. Nobile
  • Patent number: 12010003
    Abstract: Systems, computer program products, and methods are described herein for identifying network control gaps in an automated fashion. The present disclosure is configured to execute instructions to deploy one or more autonomous programs on a network infrastructure; continually monitor feedback data received from the one or more autonomous programs; based on the feedback data received from the one or more autonomous programs, determine that the one or more autonomous programs has circumvented one or more network control policies; analyze the feedback data to determine how the one or more autonomous programs has circumvented the one or more network control policies; and execute instructions to pause access to one or more systems or elevate one or more security requirements in response to determining that the one or more autonomous programs has circumvented one or more network control policies.
    Type: Grant
    Filed: January 26, 2023
    Date of Patent: June 11, 2024
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, Christopher Stephen Littrell, Trina Perraut, Kara M. Schlageter
  • Publication number: 20230096182
    Abstract: Systems, methods, and computer program products are provided for identifying a potential malicious event. The method includes receiving a plurality of program actions comprising at least a first program action and a second program action. The first program action is initiated before the second program action. The method also includes comparing the plurality of program actions with at least one known malicious event pattern of actions. The at least one malicious event pattern of actions includes a sequence of program actions in a known malicious event. The method further includes determining a potential malicious event is occurring based on the comparison of the plurality of program actions with at least one known malicious event pattern of actions. The method still further includes determining a preventative response based on the potential malicious event.
    Type: Application
    Filed: September 30, 2021
    Publication date: March 30, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, Christopher Daniel Birch, Christopher Stephen Littrell