Patents by Inventor Konata Stinson
Konata Stinson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11973762Abstract: When a system tries to access a network (e.g., another system, an application, data, or the like) at least two-factor authentication may be used to validate the system. At least one authentication factor may include utilizing authentication credentials of the entity or system accessing the network. At least a second authentication factor may include using an environment hash of the system, which is a representation of the configuration (e.g., hardware, software, or the like) on the system trying to access the network. The environment hash may be compared to hash requirements (e.g., authorized environment hashes, unauthorized environment hashes, or the like) to aid in the validation. The system may only access the network when both the authentication credentials and the environment hashes meet requirements.Type: GrantFiled: October 28, 2022Date of Patent: April 30, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: George Albero, Elijah Clark, Scot Lincoln Daniels, Emanuel David Guller, Konata Stinson, Rick Wayne Sumrall, Jake Michael Yara
-
Publication number: 20230052790Abstract: When a system tries to access a network (e.g., another system, an application, data, or the like) at least two-factor authentication may be used to validate the system. At least one authentication factor may include utilizing authentication credentials of the entity or system accessing the network. At least a second authentication factor may include using an environment hash of the system, which is a representation of the configuration (e.g., hardware, software, or the like) on the system trying to access the network. The environment hash may be compared to hash requirements (e.g., authorized environment hashes, unauthorized environment hashes, or the like) to aid in the validation. The system may only access the network when both the authentication credentials and the environment hashes meet requirements.Type: ApplicationFiled: October 28, 2022Publication date: February 16, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: George Albero, Elijah Clark, Scot Lincoln Daniels, Emanuel David Guller, Konata Stinson, Rick Wayne Sumrall, Jake Michael Yara
-
Patent number: 11528276Abstract: When a system tries to access a network (e.g., another system, an application, data, or the like) at least two-factor authentication may be used to validate the system. At least one authentication factor may include utilizing authentication credentials of the entity or system accessing the network. At least a second authentication factor may include using an environment hash of the system, which is a representation of the configuration (e.g., hardware, software, or the like) on the system trying to access the network. The environment hash may be compared to hash requirements (e.g., authorized environment hashes, unauthorized environment hashes, or the like) to aid in the validation. The system may only access the network when both the authentication credentials and the environment hashes meet requirements.Type: GrantFiled: April 16, 2020Date of Patent: December 13, 2022Assignee: BANK OF AMERICA CORPORATIONInventors: George Albero, Elijah Clark, Scot Lincoln Daniels, Emanuel David Guller, Konata Stinson, Rick Wayne Sumrall, Jake Michael Yara
-
Patent number: 11481484Abstract: A virtual environment system for validating executable data using authorized hash outputs is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. If the system determines that the executable data is safe to run, the system may generate a hash output of the executable data and store the hash output in a database of approved executable data. In this way, the system may securely generate a repository of authorized hashes such that the system may ensure that only safely executable code is processed by the computing systems within the network environment.Type: GrantFiled: April 16, 2020Date of Patent: October 25, 2022Assignee: BANK OF AMERICA CORPORATIONInventors: George Albero, Emanuel David Guller, Edward Lee Traywick, Scot Lincoln Daniels, Rick Wayne Sumrall, Elijah Clark, Konata Stinson
-
Patent number: 11425123Abstract: A system already on a network may be analyzed when the system takes an action or may be periodically reviewed. The analysis of the system may include the creation of an environment hash for the system, which is a representation of the configuration (e.g., hardware, software, or the like) of the system, and a comparison with hash requirements. The hash requirements may be stored authorized hashes, stored unauthorized hashes, past hashes for the same system, hashes for other systems with the same or similar configurations, or the like. When the environment hash of the system meets hash requirements, the system may be allowed to continue to operate on the system or may be allowed to take the action on the network. When the hash of the system fails to meet a hash requirement, the system may be isolated from the network and investigated for a non-compliant configuration.Type: GrantFiled: April 16, 2020Date of Patent: August 23, 2022Assignee: BANK OF AMERICA CORPORATIONInventors: George Albero, Elijah Clark, Scot Lincoln Daniels, Emanuel David Guller, Konata Stinson, Rick Wayne Sumrall, Edward Lee Traywick, Jake Michael Yara
-
Patent number: 11423160Abstract: A virtual environment system for validating executable data using authorized hash outputs is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. If the system determines that the executable data is unsafe to run, the system may generate a hash output of the executable data and store the hash output in a database of unauthorized executable data. In this way, the system may securely generate a repository of authorized and unauthorized hashes such that the system may ensure that unsafe executable data is blocked from being processed within a network environment.Type: GrantFiled: April 16, 2020Date of Patent: August 23, 2022Assignee: BANK OF AMERICA CORPORATIONInventors: George Albero, Emanuel David Guller, Edward Lee Traywick, Scot Lincoln Daniels, Rick Wayne Sumrall, Elijah Clark, Konata Stinson, Jake Michael Yara
-
Patent number: 11372982Abstract: A centralized network environment is provided for processing validated executable data based on authorized hash outputs. In particular, the system may generate cryptographic hash outputs of code or software that has been evaluated (e.g., within a virtual environment). The system may then store the hash outputs within a hash database which may be accessible by multiple entity networks, where multiple entities may upload hash output values to and/or retrieve hash output values from the hash database. Based on the data within the hash database, each entity may efficiently identify code that may be safe or unsafe to execute on certain computing systems within its network environment. The system may further comprise an artificial intelligence-powered component which may be configured to detect patterns within code that has been identified by the system as unsafe and provide notifications containing systems likely to be affected and recommended countermeasures.Type: GrantFiled: July 2, 2020Date of Patent: June 28, 2022Assignee: BANK OF AMERICA CORPORATIONInventors: George Albero, Jake Michael Yara, Edward Lee Traywick, Konata Stinson, Emanuel David Guller, Scot Lincoln Daniels, Rick Wayne Sumrall, Carrie Elaine Gates
-
Patent number: 11263109Abstract: A virtual environment system for validating using accelerated time-based process execution is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. The set of commands or processes may be executed on an accelerated-time basis such that processes that would be executed on a longer timeline may be executed at a greater speed (e.g., a shorter timeline). In this way, the system may securely detect the presence of latent defects or issues that may arise from executing the code on a long-term basis.Type: GrantFiled: April 16, 2020Date of Patent: March 1, 2022Assignee: BANK OF AMERICA CORPORATIONInventors: George Albero, Emanuel David Guller, Edward Lee Traywick, Scot Lincoln Daniels, Rick Wayne Sumrall, Elijah Clark, Konata Stinson, Jake Michael Yara
-
Publication number: 20220004644Abstract: A centralized network environment is provided for processing validated executable data based on authorized hash outputs. In particular, the system may generate cryptographic hash outputs of code or software that has been evaluated (e.g., within a virtual environment). The system may then store the hash outputs within a hash database which may be accessible by multiple entity networks, where multiple entities may upload hash output values to and/or retrieve hash output values from the hash database. Based on the data within the hash database, each entity may efficiently identify code that may be safe or unsafe to execute on certain computing systems within its network environment. The system may further comprise an artificial intelligence-powered component which may be configured to detect patterns within code that has been identified by the system as unsafe and provide notifications containing systems likely to be affected and recommended countermeasures.Type: ApplicationFiled: July 2, 2020Publication date: January 6, 2022Applicant: Bank of America CorporationInventors: George Albero, Jake Michael Yara, Edward Lee Traywick, Konata Stinson, Emanuel David Guller, Scot Lincoln Daniels, Rick Wayne Sumrall, Carrie Elaine Gates
-
Publication number: 20210328985Abstract: A system already on a network may be analyzed when the system takes an action or may be periodically reviewed. The analysis of the system may include the creation of an environment hash for the system, which is a representation of the configuration (e.g., hardware, software, or the like) of the system, and a comparison with hash requirements. The hash requirements may be stored authorized hashes, stored unauthorized hashes, past hashes for the same system, hashes for other systems with the same or similar configurations, or the like. When the environment hash of the system meets hash requirements, the system may be allowed to continue to operate on the system or may be allowed to take the action on the network. When the hash of the system fails to meet a hash requirement, the system may be isolated from the network and investigated for a non-compliant configuration.Type: ApplicationFiled: April 16, 2020Publication date: October 21, 2021Applicant: BANK OF AMERICA CORPORATIONInventors: George Albero, Elijah Clark, Scot Lincoln Daniels, Emanuel David Guller, Konata Stinson, Rick Wayne Sumrall, Edward Lee Traywick, Jake Michael Yara
-
Publication number: 20210326455Abstract: A virtual environment system for validating executable data using authorized hash outputs is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. If the system determines that the executable data is unsafe to run, the system may generate a hash output of the executable data and store the hash output in a database of unauthorized executable data. In this way, the system may securely generate a repository of authorized and unauthorized hashes such that the system may ensure that unsafe executable data is blocked from being processed within a network environment.Type: ApplicationFiled: April 16, 2020Publication date: October 21, 2021Applicant: Bank of America CorporationInventors: George Albero, Emanuel David Guller, Edward Lee Traywick, Scot Lincoln Daniels, Rick Wayne Sumrall, Elijah Clark, Konata Stinson, Jake Michael Yara
-
Publication number: 20210326234Abstract: A virtual environment system for validating using accelerated time-based process execution is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. The set of commands or processes may be executed on an accelerated-time basis such that processes that would be executed on a longer timeline may be executed at a greater speed (e.g., a shorter timeline). In this way, the system may securely detect the presence of latent defects or issues that may arise from executing the code on a long-term basis.Type: ApplicationFiled: April 16, 2020Publication date: October 21, 2021Applicant: Bank of America CorporationInventors: George Albero, Emanuel David Guller, Edward Lee Traywick, Scot Lincoln Daniels, Rick Wayne Sumrall, Elijah Clark, Konata Stinson, Jake Michael Yara
-
Publication number: 20210328995Abstract: When a system tries to access a network (e.g., another system, an application, data, or the like) at least two-factor authentication may be used to validate the system. At least one authentication factor may include utilizing authentication credentials of the entity or system accessing the network. At least a second authentication factor may include using an environment hash of the system, which is a representation of the configuration (e.g., hardware, software, or the like) on the system trying to access the network. The environment hash may be compared to hash requirements (e.g., authorized environment hashes, unauthorized environment hashes, or the like) to aid in the validation. The system may only access the network when both the authentication credentials and the environment hashes meet requirements.Type: ApplicationFiled: April 16, 2020Publication date: October 21, 2021Applicant: BANK OF AMERICA CORPORATIONInventors: George Albero, Elijah Clark, Scot Lincoln Daniels, Emanuel David Guller, Konata Stinson, Rick Wayne Sumrall, Jake Michael Yara
-
Publication number: 20210326434Abstract: A virtual environment system for validating executable data using authorized hash outputs is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. If the system determines that the executable data is safe to run, the system may generate a hash output of the executable data and store the hash output in a database of approved executable data. In this way, the system may securely generate a repository of authorized hashes such that the system may ensure that only safely executable code is processed by the computing systems within the network environment.Type: ApplicationFiled: April 16, 2020Publication date: October 21, 2021Applicant: Bank of America CorporationInventors: George Albero, Emanuel David Guller, Edward Lee Traywick, Scot Lincoln Daniels, Rick Wayne Sumrall, Elijah Clark, Konata Stinson
-
Publication number: 20010034742Abstract: The present invention is a method, apparatus, and system for improving the ability to access, map, search, navigate, and visualize complicated bodies of related information, for example, bodies such as the World Wide Web. A temporal user interface allows users to visualize complex data sets. In one embodiment, this is done by viewing data set representations as raindrops in a pool of water across the time span of a rain storm. Also, the present invention dynamically analyzes and maps information to provide relevant information for a user to view. In one embodiment, the dynamic analysis mapping of information is displayed over time in the temporal user interface. The present invention further provides a mechanism allowing a user to perform directed searches. This allows the user to provide a relevant starting point, subject matter, and a number of other criteria to the search facility that results in search results that are more meaningful. Finally, the present invention provides an interpretive help facility.Type: ApplicationFiled: January 16, 2001Publication date: October 25, 2001Inventor: Konata Stinson