Patents by Inventor Jack Lawson
Jack Lawson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12229277Abstract: A system includes a memory and processor. The memory stores code segment vulnerability findings that were generated through static application security testing (SAST). For a first code segment, a first vulnerability finding has been classified as a real vulnerability, and a second vulnerability finding has been classified as a false positive by external review. The processor generates a code fingerprint for each code segment, which corresponds to an abstract syntax tree that has been augmented by data flow information and flattened. The processor determines that the fingerprint for the first code segment matches the fingerprint for a second code segment and that the vulnerability findings for the first code segment match those for the second. In response, the processor automatically classifies a matching first vulnerability finding for the second code segment as the real vulnerability, and a matching second vulnerability finding for the second code segment as the false positive.Type: GrantFiled: January 10, 2024Date of Patent: February 18, 2025Assignee: Bank of America CorporationInventors: Jack Lawson Bishop, III, Anthony Herron, Yao Houkpati, Carrie E. Gates
-
Publication number: 20250053446Abstract: A system includes a computing infrastructure and an application prioritization system. The computing infrastructure includes a plurality of computing devices configured to implement computing applications. The application prioritization system receives application data associated with the computing applications. A request is received for a priority of a first computing application of the computing applications compared to a second computing application of the computing applications. The application prioritization system determines, using a feedback-based machine learning model, a first priority of the first computing application and a second priority of the second computing application and an explanation of the first and second priorities. A response is provided with an indication of the larger of the first priority and second priority.Type: ApplicationFiled: October 31, 2024Publication date: February 13, 2025Inventors: Jack Lawson Bishop, III, Jason Conrad Starin, Carrie E. Gates
-
Publication number: 20250005168Abstract: A code repository stores source code. An insider threat detection system stores instructions for detecting code defects and criteria indicating predetermined types of code defects that, when present, are associated with intentional obfuscation of one or more functions of the source code. The insider threat detection system receives an entry of source code and detects, using the model, a set of code defects in the entry of source code. A defect type is determined for each code defect, thereby determining a set of defect types included in the entry of source code. If it is determined that each of the predetermined types of code defects indicated by the criteria is included in the determined set of defect types, the entry of source code is determined to include an insider threat.Type: ApplicationFiled: September 16, 2024Publication date: January 2, 2025Inventors: Jason Conrad Starin, Jack Lawson Bishop, III
-
Patent number: 12175286Abstract: A system includes a computing infrastructure and an application prioritization system. The computing infrastructure includes a plurality of computing devices configured to implement computing applications. The application prioritization system receives application data associated with the computing applications. A request is received for a priority of a first computing application of the computing applications compared to a second computing application of the computing applications. The application prioritization system determines, using a feedback-based machine learning model, a first priority of the first computing application and a second priority of the second computing application and an explanation of the first and second priorities. A response is provided with an indication of the larger of the first priority and second priority and the explanation.Type: GrantFiled: June 10, 2021Date of Patent: December 24, 2024Assignee: Bank of America CorporationInventors: Jack Lawson Bishop, III, Jason Conrad Starin, Carrie E. Gates
-
Patent number: 12164672Abstract: Systems, computer program products, and methods are described herein for analyzing micro-anomalies in anonymized electronic data. The present disclosure is configured to import or retrieve a first data set, process the first data set to develop at least one event-outcome projection, define an outcome projection data set, import or receive a monitored user data set, anonymize the monitored user data set, define an avatar data set process the avatar data set, wherein the steps of import or receive a monitored user data set, anonymize the monitored user data set, and define an avatar data set are repeated one or more times.Type: GrantFiled: December 1, 2022Date of Patent: December 10, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Jennifer Tiffany Renckert, Daniel Joseph Serna, Frank J. Yanan, Jeffrey Kyle Johnson, Benjamin Tweel, Jake Michael Yara, Robert Cain Durbin, Jr., Sheng Tang Hsiang, Jack Lawson Bishop, III, James J. Siekman
-
Patent number: 12124584Abstract: A code repository stores source code. An insider threat detection system stores instructions for detecting code defects and criteria indicating predetermined types of code defects that, when present, are associated with intentional obfuscation of one or more functions of the source code. The insider threat detection system receives an entry of source code and detects, using the model, a set of code defects in the entry of source code. A defect type is determined for each code defect, thereby determining a set of defect types included in the entry of source code. If it is determined that each of the predetermined types of code defects indicated by the criteria is included in the determined set of defect types, the entry of source code is determined to include an insider threat.Type: GrantFiled: August 5, 2021Date of Patent: October 22, 2024Assignee: Bank of America CorporationInventors: Jason Conrad Starin, Jack Lawson Bishop, III
-
Patent number: 12111933Abstract: A system includes a database, a memory, and a processor. The database stores data associated with a known security threat. The memory includes a threat model associated with a software application. The processor identifies, based on natural language processing of the data associated with the known security threat, one or more attributes of software susceptible to the known security threat. The processor also identifies, based on natural language processing of the threat model, one or more attributes of the software application. The processor additionally determines, based on a comparison between the one or more attributes of software susceptible to the known security threat and the one or more attributes of the software application, that the software application is susceptible to the known security threat. In response, the processor updates the threat model to reflect the susceptibility of the software application to the known security threat.Type: GrantFiled: February 7, 2022Date of Patent: October 8, 2024Assignee: Bank of America CorporationInventors: Jack Lawson Bishop, III, Robert Hurlbut, Jason Conrad Starin
-
Patent number: 12086273Abstract: Systems, computer program products, and methods are described herein for dynamically generating linked security tests. The present invention may be configured to perform security tests on an application, generate, based on the results of the security tests, security test sequences that include at least one security test that the application failed, perform the security test sequences on the application, and, iteratively and until the application passes each security test sequence in an iteration, generate additional security test sequences. The present invention may be further configured to provide results of the security tests and security test sequences to one or more machine learning models to generate supplementary security test sequences and determine probabilities of the application failing the supplementary security test sequences.Type: GrantFiled: November 3, 2023Date of Patent: September 10, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Jack Lawson Bishop, III, Timothy Andrew Wright, Robert Riley Zink
-
Publication number: 20240220229Abstract: Systems, computer program products, and methods are described herein for code revision impact analysis. The present disclosure is configured to generate a system map based on data received from a plurality of network devices; receive a data transmission including a text file; process the text file via a natural language processing engine, where an output of the natural language processing engine comprises a plurality of expected updates; determine, based on the system map, at least one downstream effect of the plurality of expected updates; and perform a remedial action.Type: ApplicationFiled: January 3, 2023Publication date: July 4, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Marcus Raphael Matos, Jack Lawson Bishop, III, Robert Cain Durbin, Jr., Daniel Joseph Serna, Benjamin Tweel, Jake Michael Yara
-
Publication number: 20240220393Abstract: Systems, computer program products, and methods are described herein for automated detection of source code discrepancies. The present disclosure is configured to receive a data transmission including a text file and a source code file; process the source code file via a machine learning engine, where an output of the machine learning engine includes a plurality of identified updates; process the text file via a natural language processing engine, where an output of the natural language processing engine includes a plurality of expected updates; identify a difference between the plurality of identified updates and the plurality of expected updates; and perform a remedial action.Type: ApplicationFiled: January 3, 2023Publication date: July 4, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Marcus Raphael Matos, Jack Lawson Bishop, III, Robert Cain Durbin, JR., Daniel Joseph Serna, Benjamin Tweel, Jake Michael Yara
-
Patent number: 12026554Abstract: A resource management system receives a set of application priorities. The resource management system determines, based at least in part on the received set of application priorities, a resource allocation corresponding to a proposed distribution of the computing applications and the users amongst the computing devices of a computing infrastructure. The resource management system determines, using the resource allocation, a recommended device configuration for each of the computing devices. The resource management system automatically implements the determined resource allocation using the device configuration determined for each of the computing devices.Type: GrantFiled: July 27, 2021Date of Patent: July 2, 2024Assignee: Bank of America CorporationInventors: Jack Lawson Bishop, III, Jason Conrad Starin, Carrie E. Gates
-
Patent number: 12014210Abstract: A prioritization system includes a memory that stores an access record with, for each of the users, an indication of a previous usage of computing applications. The memory stores a permission record with, for each of the users, an indication of the computing applications that the user is permitted to access. The memory stores user affinities that include, for each of the users, an affinity score corresponding to a predetermined ability level of the user to engage in an activity associated with one or more of the computing applications. The prioritization system determines a priority score for each of the users. In response to receiving a request for a priority of a first user of the users, the prioritization system provides a response with the priority score determined for the first user of the users.Type: GrantFiled: July 27, 2021Date of Patent: June 18, 2024Assignee: Bank of America CorporationInventors: Jack Lawson Bishop, III, Jason Conrad Starin, Carrie E. Gates
-
Publication number: 20240184920Abstract: Systems, computer program products, and methods are described herein for analyzing micro-anomalies in anonymized electronic data. The present disclosure is configured to import or retrieve a first data set, process the first data set to develop at least one event-outcome projection, define an outcome projection data set, import or receive a monitored user data set, anonymize the monitored user data set, define an avatar data set process the avatar data set, wherein the steps of import or receive a monitored user data set, anonymize the monitored user data set, and define an avatar data set are repeated one or more times.Type: ApplicationFiled: December 1, 2022Publication date: June 6, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Jennifer Tiffany Renckert, Daniel Joseph Serna, Frank J. Yanan, Jeffrey Kyle Johnson, Benjamin Tweel, Jake Michael Yara, Robert Cain Durbin, JR., Sheng Tang Hsiang, Jack Lawson Bishop, III, James J. Siekman
-
Publication number: 20240143786Abstract: A system includes a memory and processor. The memory stores code segment vulnerability findings that were generated through static application security testing (SAST). For a first code segment, a first vulnerability finding has been classified as a real vulnerability, and a second vulnerability finding has been classified as a false positive by external review. The processor generates a code fingerprint for each code segment, which corresponds to an abstract syntax tree that has been augmented by data flow information and flattened. The processor determines that the fingerprint for the first code segment matches the fingerprint for a second code segment and that the vulnerability findings for the first code segment match those for the second. In response, the processor automatically classifies a matching first vulnerability finding for the second code segment as the real vulnerability, and a matching second vulnerability finding for the second code segment as the false positive.Type: ApplicationFiled: January 10, 2024Publication date: May 2, 2024Inventors: Jack Lawson Bishop, III, Anthony Herron, Yao Houkpati, Carrie E. Gates
-
Patent number: 11941115Abstract: A system includes a memory and processor. The memory stores code segment vulnerability findings that were generated through static application security testing (SAST). The processor generates a code fingerprint for each code segment, which corresponds to an abstract syntax tree that has been augmented by data flow information and flattened. The processor applies a machine learning clustering algorithm to group the code fingerprints into clusters of fingerprints that share one or more features. The processor additionally determines that both the fingerprint corresponding to the first source code segment and the fingerprint corresponding to a second source code segment belong to the same cluster. In response, the processor transmits an alert to a device of an administrator, identifying the second code segment as vulnerable to a real vulnerability, where a vulnerability finding for the first code segment has been classified as the real vulnerability through external review.Type: GrantFiled: November 29, 2021Date of Patent: March 26, 2024Assignee: Bank of America CorporationInventors: Jack Lawson Bishop, III, Anthony Herron, Yao Houkpati, Carrie E. Gates
-
Patent number: 11928221Abstract: A system includes a memory and processor. The memory stores code segment vulnerability findings that were generated through static application security testing (SAST). For a first code segment, a first vulnerability finding has been classified as a real vulnerability, and a second vulnerability finding has been classified as a false positive by external review. The processor generates a code fingerprint for each code segment, which corresponds to an abstract syntax tree that has been augmented by data flow information and flattened. The processor determines that the fingerprint for the first code segment matches the fingerprint for a second code segment and that the vulnerability findings for the first code segment match those for the second. In response, the processor automatically classifies a matching first vulnerability finding for the second code segment as the real vulnerability, and a matching second vulnerability finding for the second code segment as the false positive.Type: GrantFiled: November 29, 2021Date of Patent: March 12, 2024Assignee: Bank of America CorporationInventors: Jack Lawson Bishop, III, Anthony Herron, Yao Houkpati, Carrie E. Gates
-
Publication number: 20240070293Abstract: Systems, computer program products, and methods are described herein for dynamically generating linked security tests. The present invention may be configured to perform security tests on an application, generate, based on the results of the security tests, security test sequences that include at least one security test that the application failed, perform the security test sequences on the application, and, iteratively and until the application passes each security test sequence in an iteration, generate additional security test sequences. The present invention may be further configured to provide results of the security tests and security test sequences to one or more machine learning models to generate supplementary security test sequences and determine probabilities of the application failing the supplementary security test sequences.Type: ApplicationFiled: November 3, 2023Publication date: February 29, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Jack Lawson Bishop, III, Timothy Andrew Wright, Robert Riley Zink
-
Patent number: 11874931Abstract: Systems, computer program products, and methods are described herein for dynamically generating linked security tests. The present invention may be configured to perform security tests on an application, generate, based on the results of the security tests, security test sequences that include at least one security test that the application failed, perform the security test sequences on the application, and, iteratively and until the application passes each security test sequence in an iteration, generate additional security test sequences. The present invention may be further configured to provide results of the security tests and security test sequences to one or more machine learning models to generate supplementary security test sequences and determine probabilities of the application failing the supplementary security test sequences.Type: GrantFiled: February 11, 2021Date of Patent: January 16, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Jack Lawson Bishop, III, Timothy Andrew Wright, Robert Riley Zink
-
Patent number: 11765165Abstract: Enhancement of web browser extension analysis capabilities, such as security application analysis, is realized by encapsulating the extension with a wrapper function that defines entry and exits points within the source code of the extension. By wrapping the web browser extension in a function that defines entry and exit points, the present invention enables the use of commercial SAST tools/engines and any other application which desires to analyze the web browser extension and/or extract data therefrom. The web browser extension is programmatically analyzed to identify the entry and exit points and, in response, the wrapper function is generated that defines the entry and exits points and the web browser extension is encapsulated with the wrapper function.Type: GrantFiled: September 22, 2020Date of Patent: September 19, 2023Assignee: BANK OF AMERICA CORPORATIONInventors: Jack Lawson Bishop, III, Timothy Andrew Wright
-
Publication number: 20230252158Abstract: A system includes a database, a memory, and a processor. The database stores data associated with a known security threat. The memory includes a threat model associated with a software application. The processor identifies, based on natural language processing of the data associated with the known security threat, one or more attributes of software susceptible to the known security threat. The processor also identifies, based on natural language processing of the threat model, one or more attributes of the software application. The processor additionally determines, based on a comparison between the one or more attributes of software susceptible to the known security threat and the one or more attributes of the software application, that the software application is susceptible to the known security threat. In response, the processor updates the threat model to reflect the susceptibility of the software application to the known security threat.Type: ApplicationFiled: February 7, 2022Publication date: August 10, 2023Inventors: Jack Lawson Bishop, III, Robert Hurlbut, Jason Conrad Starin