Patents by Inventor John C. Checco

John C. Checco has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10817829
    Abstract: A method for executing a smart recall of a plurality of manufactured units is provided. The method may include, inter alia, using a database architecture to administer a supply chain for the units, assigning each component of the units a distributed ledger (blockchain) identification (ID), and additional pieces of information such as a serial number of the component, a date of manufacture of the component, a location of manufacture of the component, an ID associated with the source of the component, and/or the ID(s) of one or more subcomponent unit(s) of the component. The assigned information is stored in the database architecture. The method may also include generating a private database supplier key and a manufacturer key. The method further includes: transmitting a notice to downstream manufacturers, transmitting a notice to a regulatory agency to implement safety procedures and/or unit and transmitting a recall notice.
    Type: Grant
    Filed: February 23, 2018
    Date of Patent: October 27, 2020
    Assignee: Bank of America Corporation
    Inventors: William P. Jacobson, John C. Checco
  • Patent number: 10771502
    Abstract: A method is provided for preventing an IoT device within a trusted system from being harnessed in a malicious DDOS attack. The method may include bombarding the IoT device. The bombardment may originate from within the system, and may inundate the IoT device with harmless packets in a manner mimicking a traditional DOS attack. The inundating may utilize the resources of the IoT device to respond to the bombardment, and may thereby render the IoT device unavailable for fraudulent uses.
    Type: Grant
    Filed: February 27, 2020
    Date of Patent: September 8, 2020
    Assignee: Bank of America Corporation
    Inventors: Michael Ogrinz, David Hsiang, John C. Checco
  • Publication number: 20200195685
    Abstract: A method is provided for preventing an IoT device within a trusted system from being harnessed in a malicious DDOS attack. The method may include bombarding the IoT device. The bombardment may originate from within the system, and may inundate the IoT device with harmless packets in a manner mimicking a traditional DOS attack. The inundating may utilize the resources of the IoT device to respond to the bombardment, and may thereby render the IoT device unavailable for fraudulent uses.
    Type: Application
    Filed: February 27, 2020
    Publication date: June 18, 2020
    Inventors: Michael Ogrinz, David Hsiang, John C. Checco
  • Patent number: 10609069
    Abstract: A method is provided for preventing an IoT device within a trusted system from being harnessed in a malicious DDOS attack. The method may include bombarding the IoT device. The bombardment may originate from within the system, and may inundate the IoT device with harmless packets in a manner mimicking a traditional DOS attack. The inundating may utilize the resources of the IoT device to respond to the bombardment, and may thereby render the IoT device unavailable for fraudulent uses.
    Type: Grant
    Filed: February 23, 2018
    Date of Patent: March 31, 2020
    Assignee: Bank of America Corporation
    Inventors: Michael Ogrinz, David Hsiang, John C. Checco
  • Patent number: 10567156
    Abstract: Methods, systems, and apparatuses for blockchain-based unexpected data detection are described herein. In some arrangements, a node within a decentralized peer-to-peer (e.g., P2P) network may receive a plurality of network function requests corresponding to the decentralized network. The node may analyze the plurality of network function requests to identify whether the requests included unexpected data and/or irregular data, and/or are associated with flagged wallets and/or smart contracts.
    Type: Grant
    Filed: November 30, 2017
    Date of Patent: February 18, 2020
    Assignee: Bank of America Corporation
    Inventors: Joseph Castinado, John C. Checco, Patrick Nicholas Lawrence
  • Publication number: 20200027085
    Abstract: Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.
    Type: Application
    Filed: September 27, 2019
    Publication date: January 23, 2020
    Inventors: Jisoo Lee, John C. Checco, William August Stahlhut, Joseph Castinado, Brad Romano, Suki Ramasamy, Patrick Nicholas Lawrence, Lekha Ananthakrishnan
  • Publication number: 20200028667
    Abstract: Methods, systems, and apparatuses for blockchain-based unexpected data detection are described herein. In some arrangements, a node within a decentralized peer-to-peer (e.g., P2P) network may receive a plurality of network function requests corresponding to the decentralized network. The node may analyze the plurality of network function requests to identify whether the requests included unexpected data and/or irregular data, and/or are associated with flagged wallets and/or smart contracts.
    Type: Application
    Filed: September 27, 2019
    Publication date: January 23, 2020
    Inventors: Joseph Castinado, John C. Checco, Patrick Nicholas Lawrence
  • Publication number: 20200021598
    Abstract: Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.
    Type: Application
    Filed: September 25, 2019
    Publication date: January 16, 2020
    Inventors: Jisoo Lee, John C. Checco, William August Stahlhut, Joseph Castinado, Brad Romano, Suki Ramasamy, Patrick Nicholas Lawrence, Lekha Ananthakrishnan
  • Publication number: 20190306267
    Abstract: Apparatus and methods for a reverse proxy server are provided. The reverse proxy server may provide compatibility and security for nodes on an IoT network. A reverse proxy server may normalize inter-node communications. A reverse proxy server may identify an IoT node and upon identification of the node, determine native communication protocol(s) specific to the node. The reverse proxy server may encapsulate data transmitted via the native communication protocol. The reverse proxy server may impose a master-slave relationship. For example, the reverse proxy server may be a master of one or more nodes (slaves) on the IoT. The reverse proxy server may enforce security protocols on all slaves. A slave (e.g., node) may be required to route all communications to other IoT devices through the master (e.g., reverse proxy server). An IoT network may include more than one reverse proxy server. Each slave may have one or more masters.
    Type: Application
    Filed: March 27, 2018
    Publication date: October 3, 2019
    Inventors: Jisoo Lee, John C. Checco, John Ryan Bowling
  • Publication number: 20190266563
    Abstract: A method for executing a smart recall of a plurality of manufactured units is provided. The method may include, inter alia, using a database architecture to administer a supply chain for the units, assigning each component of the units a distributed ledger (blockchain) identification (ID), and additional pieces of information such as a serial number of the component, a date of manufacture of the component, a location of manufacture of the component, an ID associated with the source of the component, and/or the ID(s) of one or more subcomponent unit(s) of the component. The assigned information is stored in the database architecture. The method may also include generating a private database supplier key and a manufacturer key. The method further includes: transmitting a notice to downstream manufacturers, transmitting a notice to a regulatory agency to implement safety procedures and/or unit and transmitting a recall notice.
    Type: Application
    Filed: February 23, 2018
    Publication date: August 29, 2019
    Inventors: William P. Jacobson, John C. Checco
  • Publication number: 20190268370
    Abstract: A method is provided for preventing an IoT device within a trusted system from being harnessed in a malicious DDOS attack. The method may include bombarding the IoT device. The bombardment may originate from within the system, and may inundate the IoT device with harmless packets in a manner mimicking a traditional DOS attack. The inundating may utilize the resources of the IoT device to respond to the bombardment, and may thereby render the IoT device unavailable for fraudulent uses.
    Type: Application
    Filed: February 23, 2018
    Publication date: August 29, 2019
    Inventors: Michael Ogrinz, David Hsiang, John C. Checco
  • Publication number: 20190266553
    Abstract: A supply chain for a batch of identical units is provided. The supply chain includes database architecture. The batch of units may include a distributed ledger (blockchain) identification (ID), and at least two additional pieces of information. The information includes a serial number of the batch, a location of manufacture of the batch, an ID associated with the source of the batch, and/or the ID(s) of one or more components of each unit in the batch. The supply chain may include a private database supplier key. The supplier key enables publishing of batch transaction information onto a blockchain. The information may include a transfer of control of the batch from the supplier to a receiver-manufacturer. The supply chain may further include a private database receiver-manufacturer key associated with each batch associated with the receiver-manufacturer. The private database manufacturer key enables the receiver-manufacturer to review transactions associated with each batch.
    Type: Application
    Filed: February 23, 2018
    Publication date: August 29, 2019
    Inventors: William P. Jacobson, John C. Checco
  • Publication number: 20190180276
    Abstract: Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.
    Type: Application
    Filed: December 7, 2017
    Publication date: June 13, 2019
    Inventors: Jisoo Lee, John C. Checco, William August Stahlhut, Joseph Castinado, Brad Romano, Suki Ramasamy, Patrick Nicholas Lawrence, Lekha Ananthakrishnan
  • Publication number: 20190182257
    Abstract: Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.
    Type: Application
    Filed: December 7, 2017
    Publication date: June 13, 2019
    Inventors: Jisoo Lee, John C. Checco, William August Stahlhut, Joseph Castinado, Brad Romano, Suki Ramasamy, Patrick Nicholas Lawrence, Lekha Ananthakrishnan
  • Publication number: 20190165930
    Abstract: Methods, systems, and apparatuses for blockchain-based unexpected data detection are described herein. In some arrangements, a node within a decentralized peer-to-peer (e.g., P2P) network may receive a plurality of network function requests corresponding to the decentralized network. The node may analyze the plurality of network function requests to identify whether the requests included unexpected data and/or irregular data, and/or are associated with flagged wallets and/or smart contracts.
    Type: Application
    Filed: November 30, 2017
    Publication date: May 30, 2019
    Inventors: Joseph Castinado, John C. Checco, Patrick Nicholas Lawrence
  • Publication number: 20130111580
    Abstract: A method and system looks for patterns in a series of gesture data samples to determine consistency or inconsistency within the data sample. One embodiment includes device authentication using a unique biometric algorithm that provides biometrically enhanced gesture-based authentication using a software only solution. In this embodiment, the system and method provides a mechanism to gather user gesture timing data, and to analyze and abstract the data into a non-repudiated template against which future gesture timings can be verified.
    Type: Application
    Filed: November 1, 2011
    Publication date: May 2, 2013
    Applicant: Checco Services, Inc.
    Inventor: John C. Checco
  • Patent number: 7509686
    Abstract: A method and system looks for patterns in a series of data samples to determine consistency or inconsistency within the data sample. One embodiment includes computer authentication using a unique biometric algorithm that provides biometrically enhanced computer-based authentication using a software only solution. In this embodiment, the system and method provides a mechanism to gather user keystroke timing data, and to analyze and abstract the data into a non-repudiated template against which future keystroke timings can be verified.
    Type: Grant
    Filed: January 30, 2004
    Date of Patent: March 24, 2009
    Inventor: John C. Checco
  • Publication number: 20040187037
    Abstract: A method and system looks for patterns in a series of data samples to determine consistency or inconsistency within the data sample. One embodiment includes computer authentication using a unique biometric algorithm that provides biometrically enhanced computer-based authentication using a software only solution. In this embodiment, the system and method provides a mechanism to gather user keystroke timing data, and to analyze and abstract the data into a non-repudiated template against which future keystroke timings can be verified.
    Type: Application
    Filed: January 30, 2004
    Publication date: September 23, 2004
    Inventor: John C. Checco