Patents by Inventor Daniel Birch
Daniel Birch has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240127241Abstract: Systems, computer program products, and methods are described herein for electronic resource transfer authentication via a user characteristic data verification engine. The system receives a request to transfer electronic resources from a first endpoint device of a merchant. The system then identifies a resource vehicle owner associated with the electronic resource transfer, identifies at least one second endpoint device, then transmits a request for verification from the entity to the at least one second endpoint device, utilizing an application programming interface. The user characteristic feedback hardware of the at least one second endpoint device collects identifier data from the user of the at least one second endpoint device, and a user characteristic data verification engine is initiated and thereafter determines a binary identification output. An entirety of the electronic resources are distributed to the merchant based on the binary identification output.Type: ApplicationFiled: October 12, 2022Publication date: April 18, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Christopher Daniel Birch, Sophie Morgan Danielpour, Susan R. Hart, Son Huynh, Tyler Keith Prothro, Shannon Sabina Rolinger, Amado Jose Martinez Suarez, Stephen Jack Williams
-
Patent number: 11949804Abstract: Voice communication network defense security which allows for managing and/or preventing voice calls based on which telecommunication carrier provided the calling number. By managing calls based on telecommunication carrier as opposed to the calling number, the present invention seeks to prevent intrusion by wrongdoers who may otherwise be in possession with an unlimited supply of calling numbers. Further, by implementing the security measures at the voice communication network perimeter, voice calls can be managed and/or prevented/block in real-time while the call is in a pre-answer state. As a result, the present invention provides the capability to prevent/block wrongdoers from accessing the intra-voice communication network or, at a minimum ensures that potential wrongdoers are properly vetted through an investigative process.Type: GrantFiled: March 11, 2021Date of Patent: April 2, 2024Assignee: BANK OF AMERICA CORPORATIONInventor: Christopher Daniel Birch
-
Publication number: 20230319069Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for utilizing machine learning to predict future deceitful domain names and determine preferred security responses. As such, the system allows for use of a machine learning engine to collect new domain name registration information from a plurality of sources and predict future name registrations associated with said sources. A single user may register deceitful domain names through a plurality of domain name registration systems. By collecting data from multiple servers, the system may identify data trends and generate predictions of future domain names independently of any individual server. Thus, the system may benefit a number of entities, by providing real-time data analysis that would not be obtainable by any one entity operating alone.Type: ApplicationFiled: April 5, 2022Publication date: October 5, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Christopher Daniel Birch, Jennie Kathleen Egbert, Jeffrey Wayne Texada
-
Patent number: 11706259Abstract: Embodiments of the present invention provide a system for providing selective security regulations associated with network communications to users. The system is configured for extracting user data associated with a user, identifying one or more characteristics based on the extracted user data, generating a custom security package for the user based on the one or more characteristics, displaying one or more options associated with the custom security package on a user device of the user, prompting the user to select at least one option from the one or more options, receiving the at least one option from the user, and deploying a functionality associated with the at least one option from the custom security package.Type: GrantFiled: September 29, 2022Date of Patent: July 18, 2023Assignee: BANK OF AMERICA CORPORATIONInventors: Kelly Renee-Drop Keiter, Christopher Daniel Birch, Susan R. Hart, Lisa Matthews, Cody Dean Searl
-
Patent number: 11630888Abstract: Timed-based credential access to computer networks, applications and/or data files. A multi-factor authentication process in which time is an intrinsic part of the authentication/log-in process. Time periods are defined that coincide with a user's expected periods of use, such as standard work hours, and the user's credentials are only valid during the defined time period. This means that the user can only gain access to the computer network and/or the secure application(s) or data file(s) during those defined time periods. As a result, nefarious actors, in wrongful possession of a user's credentials, that attempt to access the computer network, application and/or data file outside of the defined period of time will be prevented from doing so.Type: GrantFiled: March 9, 2021Date of Patent: April 18, 2023Assignee: BANK OF AMERICA CORPORATIONInventor: Christopher Daniel Birch
-
Publication number: 20230099241Abstract: Systems, methods, and computer program products are provided for identifying a potential malicious event. The method includes receiving one or more user actions over a user session associated with a user. The method also includes comparing the one or more user actions with one or more previous user actions over at least one previous user session associated with the user. The method further includes determining an occurrence of a potential malicious event based on the comparison of the one or more user actions with one or more previous user actions over at least one previous user session associated with the user. The method still further includes determining a remedial action based on the determination of the occurrence of the potential malicious event.Type: ApplicationFiled: September 27, 2021Publication date: March 30, 2023Applicant: BANK OF AMERICA CORPORATIONInventor: Christopher Daniel Birch
-
Publication number: 20230096182Abstract: Systems, methods, and computer program products are provided for identifying a potential malicious event. The method includes receiving a plurality of program actions comprising at least a first program action and a second program action. The first program action is initiated before the second program action. The method also includes comparing the plurality of program actions with at least one known malicious event pattern of actions. The at least one malicious event pattern of actions includes a sequence of program actions in a known malicious event. The method further includes determining a potential malicious event is occurring based on the comparison of the plurality of program actions with at least one known malicious event pattern of actions. The method still further includes determining a preventative response based on the potential malicious event.Type: ApplicationFiled: September 30, 2021Publication date: March 30, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, Christopher Daniel Birch, Christopher Stephen Littrell
-
Publication number: 20230079139Abstract: Methods and systems for capturing fine-grained workflow performance data, and generating user interfaces for analyzing such fine-grained workflow performance data to adjust operational parameters and assumptions within one or more nodes of an enterprise supply chain, are disclosed. A dataset including the time period spent on each scan-level event, a volume processed by the user during a particular task at the enterprise node, a total time spend on the plurality of events at the enterprise node, and a volume processed by enterprise node, is generated and used in such analyses.Type: ApplicationFiled: September 13, 2022Publication date: March 16, 2023Inventors: BRIAN JONES, DANIEL HANSON, DANIEL BIRCH, ADITYA SINGH
-
Publication number: 20230039302Abstract: Systems, computer program products, and methods are described herein for active detection and mitigation of unauthorized activity within a technology infrastructure. The present invention is configured to continuously monitor one or more incoming messages in one or more computing devices; detect one or more assessment vectors embedded in the one or more incoming messages; initiate an isolated virtual environment; redirect the one or more incoming messages associated with the one or more assessment vectors from the one or more computing devices to the isolated virtual environment; trigger an access routine to emulate, within the isolated virtual environment, an action of accessing the one or more incoming messages; determine, based on at least the access routine, whether the one or more incoming messages is associated with malware; and display a notification to the user indicating whether the one or more incoming messages is associated with malware.Type: ApplicationFiled: August 3, 2021Publication date: February 9, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, David Nardoni, Christopher Daniel Birch
-
Publication number: 20230028692Abstract: Embodiments of the present invention provide a system for providing selective security regulations associated with network communications to users. The system is configured for extracting user data associated with a user, identifying one or more characteristics based on the extracted user data, generating a custom security package for the user based on the one or more characteristics, displaying one or more options associated with the custom security package on a user device of the user, prompting the user to select at least one option from the one or more options, receiving the at least one option from the user, and deploying a functionality associated with the at least one option from the custom security package.Type: ApplicationFiled: September 29, 2022Publication date: January 26, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Kelly Renee-Drop Keiter, Christopher Daniel Birch, Susan R. Hart, Lisa Matthews, Cody Dean Searl
-
Patent number: 11556635Abstract: Embodiments of the present invention provide systems and methods for evaluating and weighting resource usage activity data. The system may establish a communicable link to a user device via a user application to receive resource activity data and historical data from one or more users or systems via multiple communication channels. The system may evaluate the historical data and determine evaluation criteria based on perceived chance of loss associated with particular metadata characteristics, and use the evaluation criteria as weighted metrics for determining an overall evaluation score for the user based on indication from resource activity data that the user has conducted resource transfers with entities or channels identified in the historical data.Type: GrantFiled: April 28, 2020Date of Patent: January 17, 2023Assignee: BANK OF AMERICA CORPORATIONInventors: Kelly Renee-Drop Keiter, Christopher Daniel Birch, Susan R. Hart, Lisa Matthews, Cody Dean Searl
-
Patent number: 11539752Abstract: Embodiments of the present invention provide a system for providing selective security regulations associated with network communications to users. The system is configured for extracting user data associated with a user, identifying one or more characteristics based on the extracted user data, generating a custom security package for the user based on the one or more characteristics, displaying one or more options associated with the custom security package on a user device of the user, prompting the user to select at least one option from the one or more options, receiving the at least one option from the user, and deploying a functionality associated with the at least one option from the custom security package.Type: GrantFiled: April 28, 2020Date of Patent: December 27, 2022Assignee: BANK OF AMERICA CORPORATIONInventors: Kelly Renee-Drop Keiter, Christopher Daniel Birch, Susan R. Hart, Lisa Matthews, Cody Dean Searl
-
Publication number: 20220364395Abstract: An electronic latch includes a housing, a motor having an output shaft, a gear arrangement comprising at least one gear that is configured to be driven by the output shaft of the motor, a rack coupled to the gear arrangement and configured to move in response to motion of the gear arrangement, and at least one pawl or pawl connector that is connected to the rack. Motion of the rack causes or permits the at least one pawl or pawl connector to move between (i) a withdrawn position and (ii) a deployed position in which the pawl or pawl connector is extended further from the housing as compared with the withdrawn position.Type: ApplicationFiled: October 8, 2020Publication date: November 17, 2022Applicant: Southco, Inc.Inventor: Henry Daniel Birch
-
Publication number: 20220325563Abstract: An electronic striker for releasing a door or access panel includes a housing defining an opening and a passageway extending from the opening for receiving a pawl on the door or access panel. A plunger is coupled to the housing and is mounted for movement within the passageway. A motor is configured for moving the plunger between a withdrawn position, in which the plunger is withdrawn within the passageway, and a deployed position, in which the plunger is extended within the passageway relative to the withdrawn position. The plunger is configured to move the pawl out of the passageway upon moving the plunger from the withdrawn position to the deployed position, thereby releasing the door or access panel from the passageway.Type: ApplicationFiled: June 18, 2020Publication date: October 13, 2022Applicant: Southco, Inc.Inventors: Paul Kleister, Henry Daniel Birch
-
Publication number: 20220292168Abstract: Timed-based credential access to computer networks, applications and/or data files. A multi-factor authentication process in which time is an intrinsic part of the authentication/log-in process. Time periods are defined that coincide with a user's expected periods of use, such as standard work hours, and the user's credentials are only valid during the defined time period. This means that the user can only gain access to the computer network and/or the secure application(s) or data file(s) during those defined time periods. As a result, nefarious actors, in wrongful possession of a user's credentials, that attempt to access the computer network, application and/or data file outside of the defined period of time will be prevented from doing so.Type: ApplicationFiled: March 9, 2021Publication date: September 15, 2022Applicant: BANK OF AMERICA CORPORATIONInventor: Christopher Daniel Birch
-
Publication number: 20220294890Abstract: Voice communication network defense security which allows for managing and/or preventing voice calls based on which telecommunication carrier provided the calling number. By managing calls based on telecommunication carrier as opposed to the calling number, the present invention seeks to prevent intrusion by wrongdoers who may otherwise be in possession with an unlimited supply of calling numbers. Further, by implementing the security measures at the voice communication network perimeter, voice calls can be managed and/or prevented/block in real-time while the call is in a pre-answer state. As a result, the present invention provides the capability to prevent/block wrongdoers from accessing the intra-voice communication network or, at a minimum ensures that potential wrongdoers are properly vetted through an investigative process.Type: ApplicationFiled: March 11, 2021Publication date: September 15, 2022Applicant: BANK OF AMERICA CORPORATIONInventor: Christopher Daniel Birch
-
Publication number: 20220272099Abstract: Systems, computer program products, and methods are described herein for enhanced reconfiguration of access management protocols. The present invention is configured to electronically receive, via a first communication channel, a user request from a user to reconfigure an access management protocol; initiate, via the first communication channel, an access identifier request to the user; electronically receive, via the first communication channel, an access identifier in response to the access identifier request; initiate, via a preferred communication channel, an access reconfiguration protocol to the user to confirm the user request to reconfigure the access management protocol; electronically receive, via the preferred communication channel, a user confirmation to reconfigure the access management protocol in response to the access reconfiguration protocol; and implement one or more actions to initiate the reconfiguration of the access management protocol in response to receiving the user confirmation.Type: ApplicationFiled: February 19, 2021Publication date: August 25, 2022Applicant: BANK OF AMERICA CORPORATIONInventors: Christopher Daniel Birch, Cody Dean Searl
-
Patent number: 11386902Abstract: Embodiments of the present invention provide systems and methods for generation and maintenance of verified data records. The system may receive a data submission from a user device over one or more communication channels and convert the data submission into a normalized text format for processing and analysis. The data submission may then be analyzed using one or more trained machined learning models in order to identify factual statements and modifiers within the data submission, and generate a confidence score of verified factual information based on corroboration with one or more additional data sources. Additionally, identified modifiers may be analyzed to determine positive or negative sentiment.Type: GrantFiled: April 28, 2020Date of Patent: July 12, 2022Assignee: BANK OF AMERICA CORPORATIONInventors: Kelly Renee-Drop Keiter, Christopher Daniel Birch, Susan R. Hart, Lisa Matthews, Cody Dean Searl
-
Publication number: 20220217122Abstract: Embodiments of the invention are directed to a system that performs virtual private network authentication with a read only sandbox integration for virtual private network security. In this way, the invention matches an internet protocol address to a user portrait of user internet protocol addresses to confirm that the connecting device is the authentic user for accessing the virtual private network. If there is a discrepancy between the user portrait and the internet protocol address of the connecting device, the system launches a read only sandbox for connecting device interaction. The read only sandbox allows for bilateral communication with the connecting device where the system has full access to the connection device at a file level to interrogate file level data for confirmation.Type: ApplicationFiled: January 4, 2021Publication date: July 7, 2022Applicant: BANK OF AMERICA CORPORATIONInventor: Christopher Daniel Birch
-
Patent number: 11363000Abstract: Embodiments of the invention are directed to a system that performs virtual private network authentication with a read only sandbox integration for virtual private network security. In this way, the invention matches an internet protocol address to a user portrait of user internet protocol addresses to confirm that the connecting device is the authentic user for accessing the virtual private network. If there is a discrepancy between the user portrait and the internet protocol address of the connecting device, the system launches a read only sandbox for connecting device interaction. The read only sandbox allows for bilateral communication with the connecting device where the system has full access to the connection device at a file level to interrogate file level data for confirmation.Type: GrantFiled: January 4, 2021Date of Patent: June 14, 2022Assignee: BANK OF AMERICA CORPORATIONInventor: Christopher Daniel Birch