Patents by Inventor James J. Siekman
James J. Siekman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250016158Abstract: Systems, computer program products, and methods are described herein for secure network access management using a dynamic constraint specification matrix. The method includes receiving an application access log associated with a user of a network. The application access log includes one or more approved applications for which the user has access. The method also includes determining a potential malfeasance indication for the user based on the application access log. The potential malfeasance indication is based on a first application of the one or more approved applications and a second application of the one or more approved applications that correspond to one of one or more potential malfeasant approval combinations. Each of the one or more potential malfeasant approval combinations includes two or more applications that one or more users on the network should not be authorized for access simultaneously. The method further includes causing an execution of an investigation action.Type: ApplicationFiled: July 7, 2023Publication date: January 9, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, James J. Siekman, Margaret Elaine Eichorn Thaman
-
Publication number: 20250013767Abstract: Systems, computer program products, and methods are described herein for predicting and detecting network and data vulnerability. The method includes receiving an audit request for a user activity. The method also includes determining activity characteristic(s) relating to the user activity with each activity characteristic including information relating to the user activity. The method further includes comparing the activity characteristic(s) with previous activity characteristic(s). The method still further includes determining an activity loss indicator based on the comparison of the activity characteristic(s) with the previous activity characteristic(s). The activity loss indicator includes a likelihood of the user activity causing a loss to an entity associated with the network. The method also includes determining an audit resolution action for the audit request based on the activity loss indicator and causing a transmission of at least one of the activity loss indicator or the audit resolution action.Type: ApplicationFiled: July 6, 2023Publication date: January 9, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, James J. Siekman
-
Publication number: 20250013742Abstract: Systems, computer program products, and methods are described herein for detecting cybersecurity events using centralized data aggregation and dynamic constraint specification templates in an electronic environment. The present disclosure is configured to identify at least one of a malfeasant event or a potential malfeasant event; parse the data of the malfeasant event or the potential malfeasant event; generate a primary dynamic constraint specification template comprising a base set of parameters; identify at least one secondary malfeasant event or at least one secondary potential malfeasant event; parse the secondary data of the least one secondary malfeasant event or the at least one secondary potential malfeasant event; and generate at least one secondary dynamic constraint specification template comprising a secondary set of parameters, wherein the at least one secondary dynamic constraint specification template is a modification of the primary dynamic constraint specification template.Type: ApplicationFiled: July 7, 2023Publication date: January 9, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, James J. Siekman, David Nardoni
-
Publication number: 20250013741Abstract: The present invention encompasses systems, computer program products, and methods for machine interpretation of security data. It identifies various data sources providing metrics and parameters, which include system logs, network traffic data, user activity records, and application logs. The system retrieves these metrics and parameters through an application programming interface and transforms them from unstructured to structured data. This structured data is then featured and stored. A dynamic consolidated matrix, known as the Constraint Specification Matrix (CSM), is generated from these features. A machine learning model is trained to discern correlations and patterns within the CSM's features. Lastly, the system transmits instructions to present these correlations and patterns via a user interface on a user device, allowing for user-friendly visualization and interpretation of the analyzed security data.Type: ApplicationFiled: July 6, 2023Publication date: January 9, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, Christopher Daniel Birch, James J. Siekman
-
Patent number: 12164672Abstract: Systems, computer program products, and methods are described herein for analyzing micro-anomalies in anonymized electronic data. The present disclosure is configured to import or retrieve a first data set, process the first data set to develop at least one event-outcome projection, define an outcome projection data set, import or receive a monitored user data set, anonymize the monitored user data set, define an avatar data set process the avatar data set, wherein the steps of import or receive a monitored user data set, anonymize the monitored user data set, and define an avatar data set are repeated one or more times.Type: GrantFiled: December 1, 2022Date of Patent: December 10, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Jennifer Tiffany Renckert, Daniel Joseph Serna, Frank J. Yanan, Jeffrey Kyle Johnson, Benjamin Tweel, Jake Michael Yara, Robert Cain Durbin, Jr., Sheng Tang Hsiang, Jack Lawson Bishop, III, James J. Siekman
-
Publication number: 20240403415Abstract: Systems, methods, and computer program products are provided for detecting a synthetic identity. The method includes receiving an identity verification request relating to an individual. The identity verification request includes one or more individual identifiers of the individual. The method also includes comparing at least one of the one or more individual identifiers to one or more known synthetic indicators. The one or more known synthetic indicators including at least one of a synthetic identifier type or a synthetic identifier value that correspond to one or more known synthetic identities. The method further includes determining a synthetic identity determination based on the comparison of the at least one of the one or more individual identifiers to the one or more known synthetic indicators. The synthetic identity determination indicates whether an identity verification request is a potential synthetic identity.Type: ApplicationFiled: August 13, 2024Publication date: December 5, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Nathan Alexander Dalpini, Tomas M. Castrejon, III, James J. Siekman
-
Publication number: 20240394678Abstract: Systems and methods are described herein for recording and verifying digital actions that support or coincide with actions taken in real environments. This technology can help mitigate the chance of malfeasance, as each action is recorded in a public, tamper-proof ledger, accessible by all participants of an action. Non-fungible tokens (NFTs) can further enhance the authentication of digital goods in simulated environments by providing unique, verifiable digital resources. Each NFT represents a distinct, indivisible, and scarce digital item, making it easy to authenticate and trace the ownership and provenance of the good.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240396791Abstract: Systems, computer program products, and methods are described herein for anomaly recognition in network topologies using interactive visualization. The present disclosure is configured to determine that an end-point device is associated with anomalous activity; capture, using a virtual reality application installed on a user input device, real-time network traffic associated with the end-point device; isolate, using the virtual reality application, network traffic associated with the anomalous activity; initiate spatial and temporal traffic analysis on the anomalous activity; determine a remedial action based on the spatial and temporal traffic analysis to mitigate effects of the anomalous activity; and implement the remedial action on the end-point device.Type: ApplicationFiled: July 16, 2024Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, James J. Siekman
-
Publication number: 20240394726Abstract: Systems and methods of the present invention include the ability to physically embed certain data within the physical characteristics of a product which aid in verifying the product's authenticity. From a technical perspective, creating a system that validates the authenticity of a physical product using an embedded unique code involves several steps. In some embodiments, this may include unique code embedding. The unique code can be embedded into the product during its manufacturing process. This could be a barcode, QR code, RFID tag, unique set of threads or rivet patterns, or any other type of physical marker that can be uniquely associated with the product.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240394692Abstract: A system is provided for authentication of a resource transfer target after resource allocation. In particular, the system may generate a secure token associated with the target of the resource transfer as part of a registration process. In this regard, the token may comprise various types of information regarding the target, which may include a cryptographic address associated with the target. Upon receiving a request to transfer a resource, the system may prompt the target to input information associated with the target and/or the resource transfer, and subsequently prompt the target to digitally sign a data record associated with the resource transfer using a private key associated with the target. Based on comparing the information provided by the user with the information obtained by the system in decrypting the data record, the system may perform authentication of the target.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240394390Abstract: A system is provided for authentication using tokenization of a resource prior to resource allocation. In particular, the system may generate a resource token associated with a target resource to be transferred through a virtual environment. The resource token may be stored on a distributed ledger and may comprise an ownership identifier such as a cryptographic address associated with an entity that has ownership over the resource. The resource token may further comprise a resource identifier associated with the resource. Accordingly, the system may validate the resource identifier against an authorized resource database. If a match is detected, the system may publish an authentication data record to the distributed ledger indicating that the resource is authentic. In this way, the system provides a secure, efficient way to validate resources within a virtual environment.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240394708Abstract: A system is provided for authentication of resource transfers using tokenization as indicator of authorized resource distribution. In particular, the system may be configured to generate a secure transferor token on a distributed register, where each transferor token may be associated with a resource transferor within a virtual environment. The transferor token may be digitally signed using a transferor private key such that the transferor may be authenticated by entities using the corresponding public key. The system may further generate a secure token associated with the resource to be transferred, where the token associated with the resource may specify a list of authorized transferors as one of its parameters. Accordingly, the system may ensure that resources are transferred by authorized transferors.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240396792Abstract: Systems, computer program products, and methods are described herein for anomaly recognition in network topologies using interactive visualization. The present disclosure is configured to determine that an end-point device is associated with anomalous activity; capture, using a virtual reality application installed on a user input device, real-time network traffic associated with the end-point device; isolate, using the virtual reality application, network traffic associated with the anomalous activity; initiate spatial and temporal traffic analysis on the anomalous activity; determine a remedial action based on the spatial and temporal traffic analysis to mitigate effects of the anomalous activity; and implement the remedial action on the end-point device.Type: ApplicationFiled: July 16, 2024Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, James J. Siekman
-
Publication number: 20240394707Abstract: Systems, computer program products, and methods are described herein for self-authenticating a resource transfer request within an electronic network. The present disclosure is configured to receive a resource transfer request within the electronic network between a transferor and a transferee; generate a self-authenticating smart contract comprised of a transferor NFT and a transferee NFT; authenticate the transferor and the transferee through the transferor NFT and the transferee NFT respectively; authenticate the resource transfer request upon authentication of the transferor and transferee; and trigger a resource transfer between the transferor and the transferee.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, Pamela Elizabeth Barnes, Nicholas Stephen Rose, James J. Siekman, Marabella Youkhaneh White
-
Publication number: 20240372863Abstract: Systems, computer program products, and methods are described herein for monitoring and restricting electronic communication in a network based on communication characteristics. The method includes receiving an electronic communication from an end-point device. The method also includes identifying a potential user identity associated with the electronic communication. The potential user identity is based on one or more user identifiers associated with the electronic communication. The method further includes determining one or more restriction tags relating to the potential user identity. Each of the one or more restriction tags include a restriction to communication between the end-point device and one or more entity users. The method still further includes causing a restriction action to be executed based on determining the potential user identity has one or more restriction tags.Type: ApplicationFiled: May 4, 2023Publication date: November 7, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, Kyle Mayers, Karen Stanek McFeeters, James J. Siekman, Anna Rose Burchman
-
Patent number: 12111920Abstract: Systems, methods, and computer program products are provided for detecting a synthetic identity. The method includes receiving an identity verification request relating to an individual. The identity verification request includes one or more individual identifiers of the individual. The method also includes comparing at least one of the one or more individual identifiers to one or more known synthetic indicators. The one or more known synthetic indicators including at least one of a synthetic identifier type or a synthetic identifier value that correspond to one or more known synthetic identities. The method further includes determining a synthetic identity determination based on the comparison of the at least one of the one or more individual identifiers to the one or more known synthetic indicators. The synthetic identity determination indicates whether an identity verification request is a potential synthetic identity.Type: GrantFiled: September 14, 2021Date of Patent: October 8, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Nathan Alexander Dalpini, Tomas M. Castrejon, III, James J. Siekman
-
Publication number: 20240331707Abstract: Systems, computer program products, and methods are described herein for digital voice data processing and authentication. The present invention is configured to receive a user interaction comprising a digital audio signal and capture a first audio segment and a second audio segment of the digital audio signal. The first audio segment and the second audio segment are plotted into corresponding first and second plots. The first and second plots are compared, wherein comparing comprises subtracting the first plot from the second plot to form a difference plot. A quantity of outlier peaks is determined, then an artificial user probability is assigned to the user interaction, wherein the artificial user probability is low if the quantity of outlier peaks is greater than a predetermined outlier peak threshold. The artificial user probability is then displayed on a user interface of an endpoint device.Type: ApplicationFiled: April 3, 2023Publication date: October 3, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: James J. Siekman, Tomas M. Castrejon, III, Sanjay Arjun Lohar, Kyle Mayers, Karen Stanek McFeeters
-
Patent number: 12095607Abstract: Systems, computer program products, and methods are described herein for anomaly recognition in network topologies using interactive visualization. The present disclosure is configured to determine that an end-point device is associated with anomalous activity; capture, using a virtual reality application installed on a user input device, real-time network traffic associated with the end-point device; isolate, using the virtual reality application, network traffic associated with the anomalous activity; initiate spatial and temporal traffic analysis on the anomalous activity; determine a remedial action based on the spatial and temporal traffic analysis to mitigate effects of the anomalous activity; and implement the remedial action on the end-point device.Type: GrantFiled: May 22, 2023Date of Patent: September 17, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, James J. Siekman
-
Publication number: 20240184920Abstract: Systems, computer program products, and methods are described herein for analyzing micro-anomalies in anonymized electronic data. The present disclosure is configured to import or retrieve a first data set, process the first data set to develop at least one event-outcome projection, define an outcome projection data set, import or receive a monitored user data set, anonymize the monitored user data set, define an avatar data set process the avatar data set, wherein the steps of import or receive a monitored user data set, anonymize the monitored user data set, and define an avatar data set are repeated one or more times.Type: ApplicationFiled: December 1, 2022Publication date: June 6, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Jennifer Tiffany Renckert, Daniel Joseph Serna, Frank J. Yanan, Jeffrey Kyle Johnson, Benjamin Tweel, Jake Michael Yara, Robert Cain Durbin, JR., Sheng Tang Hsiang, Jack Lawson Bishop, III, James J. Siekman
-
Publication number: 20240187250Abstract: Systems, computer program products, and methods are described herein for tracking resources using non-fungible tokens. The present invention is configured to receive a request for a non-fungible token (NFT) for a resource, wherein the resource is a physical object; initiate a non-fungible token (NFT) generator on the resource; generate a unique digital signature for the resource by generating a scanned image of the resource and identifying one or more features of the resource from the image; generate an NFT comprising a unique digital signature for the resource; determine a physical condition of the resource; store the physical condition of the resource in a first metadata layer associated with the NFT; and record the NFT for the resource on a distributed ledger.Type: ApplicationFiled: February 14, 2024Publication date: June 6, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Michael Robert Young, James J. Siekman, Richard Seymour Scot