Patents by Inventor James J. Siekman
James J. Siekman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240394708Abstract: A system is provided for authentication of resource transfers using tokenization as indicator of authorized resource distribution. In particular, the system may be configured to generate a secure transferor token on a distributed register, where each transferor token may be associated with a resource transferor within a virtual environment. The transferor token may be digitally signed using a transferor private key such that the transferor may be authenticated by entities using the corresponding public key. The system may further generate a secure token associated with the resource to be transferred, where the token associated with the resource may specify a list of authorized transferors as one of its parameters. Accordingly, the system may ensure that resources are transferred by authorized transferors.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240394692Abstract: A system is provided for authentication of a resource transfer target after resource allocation. In particular, the system may generate a secure token associated with the target of the resource transfer as part of a registration process. In this regard, the token may comprise various types of information regarding the target, which may include a cryptographic address associated with the target. Upon receiving a request to transfer a resource, the system may prompt the target to input information associated with the target and/or the resource transfer, and subsequently prompt the target to digitally sign a data record associated with the resource transfer using a private key associated with the target. Based on comparing the information provided by the user with the information obtained by the system in decrypting the data record, the system may perform authentication of the target.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240396792Abstract: Systems, computer program products, and methods are described herein for anomaly recognition in network topologies using interactive visualization. The present disclosure is configured to determine that an end-point device is associated with anomalous activity; capture, using a virtual reality application installed on a user input device, real-time network traffic associated with the end-point device; isolate, using the virtual reality application, network traffic associated with the anomalous activity; initiate spatial and temporal traffic analysis on the anomalous activity; determine a remedial action based on the spatial and temporal traffic analysis to mitigate effects of the anomalous activity; and implement the remedial action on the end-point device.Type: ApplicationFiled: July 16, 2024Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, James J. Siekman
-
Publication number: 20240394390Abstract: A system is provided for authentication using tokenization of a resource prior to resource allocation. In particular, the system may generate a resource token associated with a target resource to be transferred through a virtual environment. The resource token may be stored on a distributed ledger and may comprise an ownership identifier such as a cryptographic address associated with an entity that has ownership over the resource. The resource token may further comprise a resource identifier associated with the resource. Accordingly, the system may validate the resource identifier against an authorized resource database. If a match is detected, the system may publish an authentication data record to the distributed ledger indicating that the resource is authentic. In this way, the system provides a secure, efficient way to validate resources within a virtual environment.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240394726Abstract: Systems and methods of the present invention include the ability to physically embed certain data within the physical characteristics of a product which aid in verifying the product's authenticity. From a technical perspective, creating a system that validates the authenticity of a physical product using an embedded unique code involves several steps. In some embodiments, this may include unique code embedding. The unique code can be embedded into the product during its manufacturing process. This could be a barcode, QR code, RFID tag, unique set of threads or rivet patterns, or any other type of physical marker that can be uniquely associated with the product.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240394707Abstract: Systems, computer program products, and methods are described herein for self-authenticating a resource transfer request within an electronic network. The present disclosure is configured to receive a resource transfer request within the electronic network between a transferor and a transferee; generate a self-authenticating smart contract comprised of a transferor NFT and a transferee NFT; authenticate the transferor and the transferee through the transferor NFT and the transferee NFT respectively; authenticate the resource transfer request upon authentication of the transferor and transferee; and trigger a resource transfer between the transferor and the transferee.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, Pamela Elizabeth Barnes, Nicholas Stephen Rose, James J. Siekman, Marabella Youkhaneh White
-
Publication number: 20240396791Abstract: Systems, computer program products, and methods are described herein for anomaly recognition in network topologies using interactive visualization. The present disclosure is configured to determine that an end-point device is associated with anomalous activity; capture, using a virtual reality application installed on a user input device, real-time network traffic associated with the end-point device; isolate, using the virtual reality application, network traffic associated with the anomalous activity; initiate spatial and temporal traffic analysis on the anomalous activity; determine a remedial action based on the spatial and temporal traffic analysis to mitigate effects of the anomalous activity; and implement the remedial action on the end-point device.Type: ApplicationFiled: July 16, 2024Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, James J. Siekman
-
Publication number: 20240394678Abstract: Systems and methods are described herein for recording and verifying digital actions that support or coincide with actions taken in real environments. This technology can help mitigate the chance of malfeasance, as each action is recorded in a public, tamper-proof ledger, accessible by all participants of an action. Non-fungible tokens (NFTs) can further enhance the authentication of digital goods in simulated environments by providing unique, verifiable digital resources. Each NFT represents a distinct, indivisible, and scarce digital item, making it easy to authenticate and trace the ownership and provenance of the good.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240372863Abstract: Systems, computer program products, and methods are described herein for monitoring and restricting electronic communication in a network based on communication characteristics. The method includes receiving an electronic communication from an end-point device. The method also includes identifying a potential user identity associated with the electronic communication. The potential user identity is based on one or more user identifiers associated with the electronic communication. The method further includes determining one or more restriction tags relating to the potential user identity. Each of the one or more restriction tags include a restriction to communication between the end-point device and one or more entity users. The method still further includes causing a restriction action to be executed based on determining the potential user identity has one or more restriction tags.Type: ApplicationFiled: May 4, 2023Publication date: November 7, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, Kyle Mayers, Karen Stanek McFeeters, James J. Siekman, Anna Rose Burchman
-
Patent number: 12111920Abstract: Systems, methods, and computer program products are provided for detecting a synthetic identity. The method includes receiving an identity verification request relating to an individual. The identity verification request includes one or more individual identifiers of the individual. The method also includes comparing at least one of the one or more individual identifiers to one or more known synthetic indicators. The one or more known synthetic indicators including at least one of a synthetic identifier type or a synthetic identifier value that correspond to one or more known synthetic identities. The method further includes determining a synthetic identity determination based on the comparison of the at least one of the one or more individual identifiers to the one or more known synthetic indicators. The synthetic identity determination indicates whether an identity verification request is a potential synthetic identity.Type: GrantFiled: September 14, 2021Date of Patent: October 8, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Nathan Alexander Dalpini, Tomas M. Castrejon, III, James J. Siekman
-
Publication number: 20240331707Abstract: Systems, computer program products, and methods are described herein for digital voice data processing and authentication. The present invention is configured to receive a user interaction comprising a digital audio signal and capture a first audio segment and a second audio segment of the digital audio signal. The first audio segment and the second audio segment are plotted into corresponding first and second plots. The first and second plots are compared, wherein comparing comprises subtracting the first plot from the second plot to form a difference plot. A quantity of outlier peaks is determined, then an artificial user probability is assigned to the user interaction, wherein the artificial user probability is low if the quantity of outlier peaks is greater than a predetermined outlier peak threshold. The artificial user probability is then displayed on a user interface of an endpoint device.Type: ApplicationFiled: April 3, 2023Publication date: October 3, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: James J. Siekman, Tomas M. Castrejon, III, Sanjay Arjun Lohar, Kyle Mayers, Karen Stanek McFeeters
-
Patent number: 12095607Abstract: Systems, computer program products, and methods are described herein for anomaly recognition in network topologies using interactive visualization. The present disclosure is configured to determine that an end-point device is associated with anomalous activity; capture, using a virtual reality application installed on a user input device, real-time network traffic associated with the end-point device; isolate, using the virtual reality application, network traffic associated with the anomalous activity; initiate spatial and temporal traffic analysis on the anomalous activity; determine a remedial action based on the spatial and temporal traffic analysis to mitigate effects of the anomalous activity; and implement the remedial action on the end-point device.Type: GrantFiled: May 22, 2023Date of Patent: September 17, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, James J. Siekman
-
Publication number: 20240187250Abstract: Systems, computer program products, and methods are described herein for tracking resources using non-fungible tokens. The present invention is configured to receive a request for a non-fungible token (NFT) for a resource, wherein the resource is a physical object; initiate a non-fungible token (NFT) generator on the resource; generate a unique digital signature for the resource by generating a scanned image of the resource and identifying one or more features of the resource from the image; generate an NFT comprising a unique digital signature for the resource; determine a physical condition of the resource; store the physical condition of the resource in a first metadata layer associated with the NFT; and record the NFT for the resource on a distributed ledger.Type: ApplicationFiled: February 14, 2024Publication date: June 6, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Michael Robert Young, James J. Siekman, Richard Seymour Scot
-
Publication number: 20240184920Abstract: Systems, computer program products, and methods are described herein for analyzing micro-anomalies in anonymized electronic data. The present disclosure is configured to import or retrieve a first data set, process the first data set to develop at least one event-outcome projection, define an outcome projection data set, import or receive a monitored user data set, anonymize the monitored user data set, define an avatar data set process the avatar data set, wherein the steps of import or receive a monitored user data set, anonymize the monitored user data set, and define an avatar data set are repeated one or more times.Type: ApplicationFiled: December 1, 2022Publication date: June 6, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Jennifer Tiffany Renckert, Daniel Joseph Serna, Frank J. Yanan, Jeffrey Kyle Johnson, Benjamin Tweel, Jake Michael Yara, Robert Cain Durbin, JR., Sheng Tang Hsiang, Jack Lawson Bishop, III, James J. Siekman
-
Patent number: 11949795Abstract: Systems, computer program products, and methods are described herein for tracking resources using non-fungible tokens. The present invention is configured to electronically receiving, over a distributed computing network from a computing device of a user, a request for a non-fungible token (NFT) for a resource; initiating a non-fungible token (NFT) generator on the resource in response to receiving the request; generating a unique digital signature for the resource; generating, using the NFT generator, the NFT, wherein the NFT comprises at least the unique digital signature for the resource; and record the NFT for the resource on a distributed ledger.Type: GrantFiled: August 27, 2021Date of Patent: April 2, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Michael Robert Young, James J. Siekman, Richard Seymour Scot
-
Publication number: 20230231832Abstract: A device configured to receive a data transfer initiation request from a first user and to identify a user profile that is associated with a first user identifier for the first user. The device is further configured to obtain an account number and a routing number for the first user from the user profile. The device is further configured to obtain routing instructions for a service provider based on a service provider identifier. The device is further configured to generate a data transfer request that includes the account number for the first user, the routing number for the first user, a second user identifier for a second user, a data type identifier, and a data transfer type identifier. The device is further configured to send the data transfer request to the service provider in accordance with the routing instructions for the service provider.Type: ApplicationFiled: January 14, 2022Publication date: July 20, 2023Inventors: Richard S. Scot, James J. Siekman, Neal Aaron Slensker, Basil C. Doyle
-
Publication number: 20230080885Abstract: Systems, methods, and computer program products are provided for detecting a synthetic identity. The method includes receiving an identity verification request relating to an individual. The identity verification request includes one or more individual identifiers of the individual. The method also includes comparing at least one of the one or more individual identifiers to one or more known synthetic indicators. The one or more known synthetic indicators including at least one of a synthetic identifier type or a synthetic identifier value that correspond to one or more known synthetic identities. The method further includes determining a synthetic identity determination based on the comparison of the at least one of the one or more individual identifiers to the one or more known synthetic indicators. The synthetic identity determination indicates whether an identity verification request is a potential synthetic identity.Type: ApplicationFiled: September 14, 2021Publication date: March 16, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Nathan Alexander Dalpini, Tomas M. Castrejon III, James J. Siekman
-
Publication number: 20230063245Abstract: Systems, computer program products, and methods are described herein for tracking resources using non-fungible tokens. The present invention is configured to electronically receiving, over a distributed computing network from a computing device of a user, a request for a non-fungible token (NFT) for a resource; initiating a non-fungible token (NFT) generator on the resource in response to receiving the request; generating a unique digital signature for the resource; generating, using the NFT generator, the NFT, wherein the NFT comprises at least the unique digital signature for the resource; and record the NFT for the resource on a distributed ledger.Type: ApplicationFiled: August 27, 2021Publication date: March 2, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Michael Robert Young, James J. Siekman, Richard Seymour Scot
-
Patent number: 8510221Abstract: Systems and methods for recognizing a check deposit received in a self-service financial transaction device are described. A check is received from a customer associated with an entity for deposit into an account of the entity. Upon determining a that an amount of the check received for deposit cannot be determined from a scanned image of the check, deposit transaction data for the customer is collected and analyzed, including the frequency and timing of the customer's previous check deposits, the amount of the customer's previous check deposits, the payor of such deposits, and the like, to predict the amount of the currently received check.Type: GrantFiled: July 22, 2010Date of Patent: August 13, 2013Assignee: Bank of AmericaInventors: Elizabeth S. Votaw, James J. Siekman
-
Publication number: 20120023017Abstract: Systems and methods for recognizing a check deposit received in a self-service financial transaction device are described. A check is received from a customer associated with an entity for deposit into an account of the entity. Upon determining a that an amount of the check received for deposit cannot be determined from a scanned image of the check, deposit transaction data for the customer is collected and analyzed, including the frequency and timing of the customer's previous check deposits, the amount of the customer's previous check deposits, the payor of such deposits, etc., to predict the amount of the currently received check.Type: ApplicationFiled: July 22, 2010Publication date: January 26, 2012Applicant: BANK OF AMERICA CORPORATIONInventors: Elizabeth S. Votaw, James J. Siekman