Patents by Inventor Jinna Zevulun Kim

Jinna Zevulun Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11269991
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The suspicious information may first be hashed before being analyzed by the analyst. The hash for the suspicious information may be compared to stored hashes. When the hash meets a stored harmful hash the suspicious information may be determined to include harmful information without having to be further analyzed. When the hash meets a stored acceptable hash the suspicious information may be determined to be acceptable information without having to be further analyzed. Should the hash for the suspicious information fail to meet any stored hashes, then the suspicious information may be analyzed for harmful information within the virtual container.
    Type: Grant
    Filed: June 22, 2020
    Date of Patent: March 8, 2022
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Dustin Paul Stocks, George Albero, Jinna Zevulun Kim
  • Publication number: 20210406372
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The suspicious information may first be checked for signatures or patterns before being analyzed by the analyst or the isolation system. The identified signatures or patterns are then compared with the stored signatures or patterns to determine whether the suspicious information comprises harmful information or not. When the identified signatures or patterns are matched with stored signatures or patterns, the system may determine that the suspicious information comprises harmful information and performs one or more mitigation actions.
    Type: Application
    Filed: June 26, 2020
    Publication date: December 30, 2021
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: George Albero, Jinna Zevulun Kim, Dustin Paul Stocks
  • Publication number: 20210397989
    Abstract: Embodiments of the present invention provide a system monitoring and identifying real-time indicators and patterns to predict occurrence of real-time events. The system is configured for continuously gathering and monitoring real-time data from one or more monitoring devices associated with the entity, identifying that at least one user device is within a predetermined distance and automatically transmit a prompt to the user device to connect to a beacon, identifying that at least one user associated with the at least one user device has connected to the beacon, continuously monitoring the at least one user device in real-time, identifying occurrence of a potential real-time event based on continuously monitoring the at least one user device and the real-time data from the one or more monitoring devices, via an artificial intelligence engine.
    Type: Application
    Filed: June 22, 2020
    Publication date: December 23, 2021
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Kyle Mayers, George Albero, Jinna Zevulun Kim, Philip Lone Mintac, Dustin Paul Stocks
  • Publication number: 20210397699
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The suspicious information may first be hashed before being analyzed by the analyst. The hash for the suspicious information may be compared to stored hashes. When the hash meets a stored harmful hash the suspicious information may be determined to include harmful information without having to be further analyzed. When the hash meets a stored acceptable hash the suspicious information may be determined to be acceptable information without having to be further analyzed. Should the hash for the suspicious information fail to meet any stored hashes, then the suspicious information may be analyzed for harmful information within the virtual container.
    Type: Application
    Filed: June 22, 2020
    Publication date: December 23, 2021
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Dustin Paul Stocks, George Albero, Jinna Zevulun Kim
  • Publication number: 20210397707
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. The isolation systems are physically and/or logically separated from other systems on the network. A plurality of virtual containers, which may be disposable and specific to each analyst, may be utilized to analyze the suspicious information within the isolation systems. The isolation system automatically performs analysis of the suspicious information in parallel, via an automated intelligent engine to identify presence of harmful information in the suspicious information. In response to identifying the at least harmful information in the suspicious information, the isolation system determines a type of the harmful information and transmits one or more notifications to one or more users based on the type of the harmful information.
    Type: Application
    Filed: June 22, 2020
    Publication date: December 23, 2021
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Jinna Zevulun Kim, George Albero, Kyle Mayers, Dustin Paul Stocks
  • Publication number: 20210397704
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in a way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The analyst may set the virtual environment configurations (e.g., applications, programs, settings, etc.) of the virtual container. The analyst may determine how the suspicious information effects the virtual environment configuration and/or use tools to analyze the suspicious information. When harmful information is identified the virtual container may be discarded (e.g., folded up and deleted), and a new virtual container may be provided to the analyst to continue to analyze the suspicious information and/or new suspicious information.
    Type: Application
    Filed: June 22, 2020
    Publication date: December 23, 2021
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Kyle Mayers, George Albero, Jon Codispoti, Jinna Zevulun Kim, Dustin Paul Stocks
  • Publication number: 20200302038
    Abstract: Embodiments of the present invention provide a specified graphical user interface providing a unified enterprise digital desktop platform. The system may include the identification of two or more enterprise applications associated with a particular enterprise. The system can then identify a user associated with the enterprise. Next, the system may determine a relevancy value for each of the two or more enterprise applications with respect to the identified user. At least one computing device associated with the user may be caused to display information in the specified graphical user interface associated with the two or more enterprise applications as a unified digital desktop application. The system can then determine that a triggering event associated with one of the enterprise applications is occurring and, in response, cause the computing device to display an alert notification in the specified graphical user interface.
    Type: Application
    Filed: March 18, 2020
    Publication date: September 24, 2020
    Applicant: Bank of America Corporation
    Inventors: Julie S. Harris, Sidhartha Kaw, Jinna Zevulun Kim, Eileen Donlevy Bridges, Vishwas Korde, Ashley Nicole Camack, Karli Kuhn, John George Ingham
  • Publication number: 20200051104
    Abstract: Embodiments of the present invention provide a system for providing an interactive real-time digital hub for processing supplemental resources. The present invention is configured to determine resource opportunities for a user as well as one or more customized supplemental resources associated with the resource opportunities. Next, a user interface of a computing device of the user is caused to display the resource opportunities and the user's activity is monitored to determine when the user has completed a resource opportunity. The associated supplemental resource is then provided to the user, and certain events related to the amount of the aggregate amount of supplemental resources can be executed in response to receiving a request for such execution by the user.
    Type: Application
    Filed: April 1, 2019
    Publication date: February 13, 2020
    Applicant: Bank of America Corporation
    Inventors: Victoria L. Dravneek, Melissa Anne Almond, Jinna Zevulun Kim, Katherine Dintenfass, John Allen Sellers, Matthew Murphy, David A. Stetler, Lisa D. Curry