Patents by Inventor Daniel Hardman
Daniel Hardman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250245648Abstract: A method includes receiving a first NFT from a first user. The first NFT is associated with a first digital folder of the first user. A second NFT is received from a second user. The second NFT is associated with a second digital folder of the second user. The second NFT represents a first interaction request from the second user. A blockchain is searched to identify the first digital folder associated with the first NFT. The blockchain is searched to identify the second digital folder associated with the second NFT. A first interaction corresponding to the first interaction request is performed between the first digital folder and the second digital folder. The first interaction is recorded in a distributed ledger.Type: ApplicationFiled: January 26, 2024Publication date: July 31, 2025Inventors: Ravi Joshi, Anna Kristen Pingel Berry, Olga Caroline Kocharyan, Luqman Abdul Hakeem Sharief, Shweta Ambulkar, Angela F. Ianni, Michael William Whitaker, Benjamin Daniel Hardman
-
Patent number: 12335262Abstract: Systems, computer program products, and methods are described herein for implementing a single point multi-component authentication using a pre-determined sequence in an electronic network.Type: GrantFiled: March 17, 2023Date of Patent: June 17, 2025Assignee: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Olga Kocharyan, Ravi Joshi, Luqman Sharief, Michael Wm. Whitaker, Benjamin Daniel Hardman, Shweta Ambulkar, Angela Ianni
-
Patent number: 12294653Abstract: Adaptation/alteration of the digital file referenced to an underlying Non-Fungible Token (NFT). Adaptation/alteration of the digital file occurs via NFT metadata-defined adaptation rules and criteria, i.e., predefined conditions or events that trigger the occurrence of digital file adaptation. The adapted digital file may be presented to users to indicate a change in a state associated with a specific type of NFT. For example, the NFT may be an authentication NFT used to verify the identity of a user/users and the digital file may be presented within computing networks or applications as a means of conveying user authenticity to other users within the computing network or application. The predefined conditions are security events that have a positive/negative impact on the authenticity of the user or group of users.Type: GrantFiled: January 20, 2023Date of Patent: May 6, 2025Assignee: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Ravi Joshi, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Patent number: 12294576Abstract: Leveraging secure tokenization, such as a Non-Fungible Token (NFT), for purposes of multifactor and/or elevated user authentication. In this regard, an authentication NFT is generated based at least on a user's authentication credentials. Subsequently, the authentication NFT is verified/validated via a private distributed trust computing network and stored, in a deactivated state, on a distributed ledger. Once the user is confronted with an elevated and/or multifactored authentication process, the user may initiates use of the authentication NFT by checking-out the authentication NFT from the distributed ledger and moving the authentication NFT from the deactivated state to an activated state, in which the user credentials are accessible to the user for purposes of authentication.Type: GrantFiled: March 14, 2024Date of Patent: May 6, 2025Assignee: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Publication number: 20250119423Abstract: A method includes receiving a hash of a static password and a hash of a lot-one authentication string from a user device of a user. After an initial validation, an authentication matrix is generated. A block selection process is performed to select spurious and authentication blocks from the authentication matrix. The authentication blocks are selected based on a lot-two authentication string associated with the lot-one authentication string. In response to determining that the spurious and authentication blocks are selected according to a block selection sequence stored in a user profile of the user, a dynamic password is generated by combining the static password, the lot-one authentication string, and the authentication blocks. A hash of the dynamic password is generated. In response to determining that the hash of the dynamic password matches a hash of a dynamic password that is stored in the user profile, the user is authenticated.Type: ApplicationFiled: October 10, 2023Publication date: April 10, 2025Inventors: Ravi Joshi, Anna Kristen Pingel Berry, Olga Caroline Kocharyan, Luqman Abdul Hakeem Sharief, Shweta Ambulkar, Angela F. Ianni, Michael William Whitaker, Benjamin Daniel Hardman
-
Publication number: 20250117463Abstract: A method includes receiving hashes of a static password and a lot-one authentication string from a user device of a user. After an initial validation, a first authentication matrix (AM) is generated. A block selection process is performed to select spurious and authentication blocks. While performing the block selection process, the first AM is replaced by a second AM, such that a first authentication block is selected from the first AM based on a first lot-two authentication string and a second authentication block is selected from the second AM based on a second lot-two authentication string. A dynamic password is generated by combining the static password, the lot-one authentication string, and the authentication blocks. A hash of the dynamic password is generated. In response to determining that the hash of the dynamic password matches a hash of a dynamic password stored in a user profile, the user is authenticated.Type: ApplicationFiled: October 10, 2023Publication date: April 10, 2025Inventors: Ravi Joshi, Anna Kristen Pingel Berry, Olga Caroline Kocharyan, Luqman Abdul Hakeem Sharief, Shweta Ambulkar, Angela F. Ianni, Michael William Whitaker, Benjamin Daniel Hardman
-
Patent number: 12244553Abstract: Implementing artificial intelligence, specifically, machine learning techniques to identify malicious emails and, in response, identifying and conducting actions, including reporting the malicious emails to identified internal and/or external entities and preventing the malicious emails from being delivered to email client mailboxes. The machine learning techniques rely on malicious email patterns identified, at least, from previously identified malicious emails and data resulting from continuously crawling the Web and threat intelligence sources. Further, the email clients may be configured to include an add-on feature in which the user can provide a single input to report the email as being suspicious, which results in further analysis to determine whether the email is, in fact, a malicious email.Type: GrantFiled: June 13, 2022Date of Patent: March 4, 2025Assignee: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Publication number: 20250070983Abstract: The present invention relates to the technical field of the transfer of data, such as, for example, between Internet of Things (IoT) devices. Particularly, the invention relates to the technical field of the transfer of data between a first and a second communication devices in an untrusted environment.Type: ApplicationFiled: December 16, 2022Publication date: February 27, 2025Inventors: Daniel HARDMAN, Bart SUICHIES, Kalin NICOLOV
-
Publication number: 20240414155Abstract: Leveraging secure tokenization, such as a Non-Fungible Token (NFT), for purposes of multifactor and/or elevated user authentication. In this regard, an authentication NFT is generated based at least on a user's authentication credentials. Subsequently, the authentication NFT is verified/validated via a private distributed trust computing network and stored, in a deactivated state, on a distributed ledger. Once the user is confronted with an elevated and/or multifactored authentication process, the user may initiates use of the authentication NFT by checking-out the authentication NFT from the distributed ledger and moving the authentication NFT from the deactivated state to an activated state, in which the user credentials are accessible to the user for purposes of authentication.Type: ApplicationFiled: March 14, 2024Publication date: December 12, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Patent number: 12137032Abstract: A method for determining third party network compliance with a host entity network is provided. The method may include generating a scanning file that includes host entity network compliance standards and transferring the scanning file to an intermediary entity network. The method may further include generating an executable file that may run a plug-in scanning file to scan hardware and software resident at the third-party network for compliance. The method may further include transferring the executable file from the intermediary entity network to the third party network. The method may further include executing the executable file, generating a log file upon the completion of the running of the plug-in scanning file and digitally signing the log file. The method may further include deciphering the log file at the intermediary entity network, generating a readable report based on the deciphering and transferring the readable report to the host entity network.Type: GrantFiled: October 12, 2023Date of Patent: November 5, 2024Assignee: Bank of America CorporationInventors: Jeffrey Glasco, Jr., Benjamin Daniel Hardman, Robert Brice
-
Patent number: 12099641Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for audiovisual conferencing. The system comprising video input and output devices, which allow a user to be viewed by and view other conference attendees and audio input and output devices that allow the user to be heard by and hear other conference attendees. Further, the system includes a noise mitigation to ensure that a user has privacy when attending a remote meeting in a public or semi-public place.Type: GrantFiled: July 22, 2022Date of Patent: September 24, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Olga Kocharyan, Angela Ianni, Shweta Ambulkar, Luqman Sharief, Michael Wm. Whitaker, Benjamin Daniel Hardman
-
Publication number: 20240311453Abstract: Systems, computer program products, and methods are described herein for implementing a multi-component authentication using pre-determined sequences and indicators in an electronic network.Type: ApplicationFiled: March 17, 2023Publication date: September 19, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Olga Kocharyan, Ravi Joshi, Luqman Sharief, Michael Wm. Whitaker, Benjamin Daniel Hardman, Shweta Ambulkar, Angela Ianni
-
Publication number: 20240311803Abstract: Generation of an NFT digital wallet that stores an NFT that serves as verified identity for the user. Both a private side/portion of the wallet having a private address and public side/portion of the wallet having a public address are generated. Additionally, a set of rules are configured that provide gateway functionality for receiving resource-related events using the private address. The public address is used for transmitting outgoing resource-related events and receiving incoming resource-related events, while the private address is used to validate at least some of the incoming resource-related events. The incoming resource-related events requiring validation is defined by the set of rules. In use, launching of the NFT digital wallet and user authentication via NFT presentation prompts presentation of the private side and outstanding incoming resource-related events awaiting validation.Type: ApplicationFiled: March 17, 2023Publication date: September 19, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Ravi Joshi, Shweta Ambulkar, Anna Kristen Pingel Berry, Benjamin Daniel Hardman, Angela Ianni, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Publication number: 20240314127Abstract: Systems, computer program products, and methods are described herein for implementing a single point multi-component authentication using a pre-determined sequence in an electronic network.Type: ApplicationFiled: March 17, 2023Publication date: September 19, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Olga Kocharyan, Ravi Joshi, Luqman Sharief, Michael Wm. Whitaker, Benjamin Daniel Hardman, Shweta Ambulkar, Angela Ianni
-
Publication number: 20240250818Abstract: Adaptation/alteration of the digital file referenced to an underlying Non-Fungible Token (NFT). Adaptation/alteration of the digital file occurs via NFT metadata-defined adaptation rules and criteria, i.e., predefined conditions or events that trigger the occurrence of digital file adaptation. The adapted digital file may be presented to users to indicate a change in a state associated with a specific type of NFT. For example, the NFT may be an authentication NFT used to verify the identity of a user/users and the digital file may be presented within computing networks or applications as a means of conveying user authenticity to other users within the computing network or application. The predefined conditions are security events that have a positive/negative impact on the authenticity of the user or group of users.Type: ApplicationFiled: January 20, 2023Publication date: July 25, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Ravi Joshi, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Patent number: 11985124Abstract: Leveraging secure tokenization, such as a Non-Fungible Token (NFT), for purposes of multifactor and/or elevated user authentication. In this regard, an authentication NFT is generated based at least on a user's authentication credentials. Subsequently, the authentication NFT is verified/validated via a private distributed trust computing network and stored, in a deactivated state, on a distributed ledger. Once the user is confronted with an elevated and/or multifactored authentication process, the user may initiates use of the authentication NFT by checking-out the authentication NFT from the distributed ledger and moving the authentication NFT from the deactivated state to an activated state, in which the user credentials are accessible to the user for purposes of authentication.Type: GrantFiled: June 2, 2022Date of Patent: May 14, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Publication number: 20240106649Abstract: Multifactor user authentication leveraging secure tokenization, such as a Non-Fungible Token (NFT) and multiple passkeys (e.g., bifurcated passkey). One or more authentication NFTs are generated that use some form of a user's authentication credentials as the seed input for the NFT encryption/hash algorithm(s). In addition, passkeys are distributed to and/or made accessible to multiple passkey holders. In response to an event that requests multifactor authentication of the user, a plurality passkeys are requested, received and verified. Each of the passkeys being requested and received from, or at the directive of, one of the multiple passkey holders. In response to verifying the plurality of passkeys, at least one of the authentication NFTs is accessed and the cryptographic hash algorithm(s) is implemented to decrypt the authentication NFT(s) and identify the one or more user credentials.Type: ApplicationFiled: September 26, 2022Publication date: March 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Shweta Ambulkar, Benjamin Daniel Hardman, Angela Ianni, Ravi Joshi, Olga Kocharyan, Luqman Sharief, Michael Wm. Whitaker
-
Publication number: 20240048446Abstract: A method for determining third party network compliance with a host entity network is provided. The method may include generating a scanning file that includes host entity network compliance standards and transferring the scanning file to an intermediary entity network. The method may further include generating an executable file that may run a plug-in scanning file to scan hardware and software resident at the third-party network for compliance. The method may further include transferring the executable file from the intermediary entity network to the third party network. The method may further include executing the executable file, generating a log file upon the completion of the running of the plug-in scanning file and digitally signing the log file. The method may further include deciphering the log file at the intermediary entity network, generating a readable report based on the deciphering and transferring the readable report to the host entity network.Type: ApplicationFiled: October 12, 2023Publication date: February 8, 2024Inventors: Jeffrey Glasco, JR., Benjamin Daniel Hardman, Robert Brice
-
Patent number: 11893116Abstract: A method for determining third party network compliance with a host entity network is provided. The method may include generating a scanning file that includes host entity network compliance standards and transferring the scanning file to an intermediary entity network. The method may further include generating an executable file that may run a plug-in scanning file to scan hardware and software resident at the third-party network for compliance. The method may further include transferring the executable file from the intermediary entity network to the third party network. The method may further include executing the executable file, generating a log file upon the completion of the running of the plug-in scanning file and digitally signing the log file. The method may further include deciphering the log file at the intermediary entity network, generating a readable report based on the deciphering and transferring the readable report to the host entity network.Type: GrantFiled: August 19, 2021Date of Patent: February 6, 2024Assignee: Bank of America CorporationInventors: Jeffrey Glasco, Jr., Benjamin Daniel Hardman, Robert Brice
-
Publication number: 20240028777Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for audiovisual conferencing. The system comprising video input and output devices, which allow a user to be viewed by and view other conference attendees and audio input and output devices that allow the user to be heard by and hear other conference attendees. Further, the system includes a noise mitigation to ensure that a user has privacy when attending a remote meeting in a public or semi-public place.Type: ApplicationFiled: July 22, 2022Publication date: January 25, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Anna Kristen Pingel Berry, Olga Kocharyan, Angela Ianni, Shweta Ambulkar, Luqman Sharief, Michael Wm. Whitaker, Benjamin Daniel Hardman