Patents by Inventor Manu Kurian
Manu Kurian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250039149Abstract: A personal artificial intelligence (AI) system may be used to conduct business with one or more entities. The personal AI system may automatically replicate security rules from another AI system to provide initial security rules and may adjust the initial security rules based on information about the user to generate revised security rules. The rules adjustments may also be based on the entities with which the user does business. An AI firewall may be generated to control access to the personal AI system by a second AI system, with which business may be conducted. To permit interactions with the second AI system, the AI firewall may require that the second AI system provide the personal AI system with data relating to previous transactions between the user and the operator of the second AI system. The data may include the monetary amount of each of multiple recent transactions.Type: ApplicationFiled: July 25, 2023Publication date: January 30, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Young Patel, Michael Young
-
Publication number: 20250039170Abstract: Apparatus and methods to verify human interaction through an encrypted channel are provided. A human verification program may create an encrypted channel between two or more devices when a communication between users of the devices is started. Data may be transferred over the encrypted channel when a user performs a verifiably human action. The data may be analyzed to determine whether the user is more likely than not a bot. The channel may be collapsed when a pre-determined condition is satisfied.Type: ApplicationFiled: July 24, 2023Publication date: January 30, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Patel, Michael Young
-
Publication number: 20250039166Abstract: Apparatus and methods to verify human interaction through digital tokens are provided. A human verification program may create a principal digital token and assign it to the profiles of a plurality of users. When a first user of the plurality of users requests verification that a second user of the plurality of users is human and not a bot, the program may transmit the principal token to the second user. The second user may perform a verifiably human action and create a secondary token. The secondary token may be transmitted to the program. The program may analyze the secondary token and create a limited verification token when the second user is human and not a bot. The verification token may be transmitted to the first user.Type: ApplicationFiled: July 24, 2023Publication date: January 30, 2025Inventors: Manu Kurian, Ana Maxim, Michael Young, Vinesh Patel
-
Publication number: 20250036754Abstract: Apparatus and methods for an artificial intelligence implemented termination by an auditor artificial intelligence (“aAI”) of a malicious artificial intelligence (“mAI”) are provided. The aAI may detect a mAI on a network and determine which data the mAI can access on the network. The aAI may then degrade all or part of the data in various ways to prevent the mAI from producing valid content based on the data. The aAI may also create code and inject the code into the mAI to degrade the mAI's operations. As the mAI may rely on valid data to produce valid output, degrading the data may degrade the mAI.Type: ApplicationFiled: July 24, 2023Publication date: January 30, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Young Patel, Michael Young
-
Publication number: 20250037003Abstract: Artificial intelligence (AI) systems may manipulate search results about an entity to inject a predetermined bias into the search results. A bias reduction artificial intelligence (AI) system and method may perform the same automated search about the entity on open source and closed source AI systems. The AI-generated search results for the open and closed source AI systems may be compared to determine differences in results. The differences may be analyzed to determine attempts by the AI systems to manipulate search results about the entity to inject predetermined bias. If an attempt at predetermined bias is identified, the bias reduction AI system may reduce the predetermined bias by sharing data about the entity between the open source AI system and the closed source AI system to cause the system to use machine learning to update the algorithms and the first and second data sets. Incentives may also be provided to the open and closed source AI systems to reduce biases.Type: ApplicationFiled: July 24, 2023Publication date: January 30, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Young Patel, Michael Young
-
Publication number: 20250028851Abstract: Methods and system are provided for tuning an artificial intelligence (“AI”) system. The methods and system may include training the AI system to identify distinct users their distinct interactions. The training may include receiving datatsets related to a plurality of distinct users and their plurality of distinct interactions. The AI system may parse the datasets to arrive at a plurality of sets of distinct interactions performed by respective distinct users, each distinct interaction may be associated with a level of security clearance. The AI system may receive a request from a user to access information. The methods and system may include the AI system initiating a communication with the user. The communication may be compared with the each set of distinct interactions until a user and level of security can be identified. The AI system may prompt the user to access information on the level of security clearance identified.Type: ApplicationFiled: July 17, 2023Publication date: January 23, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Patel, Michael Young
-
Publication number: 20250028798Abstract: Artificial intelligence (AI) impersonation detection using an AI model is provided. Methods may train an AI model. The training may provide the AI model with a first dataset including a communication between two or more human users, a second and third dataset including an impersonation of the communication by a public AI model and a private AI model respectively. Methods may identify a first identifier set in the first dataset, a second identifier set in the second dataset and a third identifier set in the third dataset. Methods may create a parameter range for the first, second and third identifier set. The methods may include monitoring a production communication using the AI model. The AI model may compare the production communication with the parameter ranges. Methods may identify a smallest comparison value. Methods may, based on the identified smallest comparison value, identify the origin of the production communication.Type: ApplicationFiled: July 20, 2023Publication date: January 23, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Young Patel, Michael Young
-
Publication number: 20250028799Abstract: Apparatus, methods and systems for continual biometric authentication of a user on a user device is provided. Methods may create, for the user, a biometric authentication reference model. Methods may store the biometric authentication reference model at a database associated with the user device. In response to an instantiation of a session by the user on the user device, methods may execute a continual biometric scan. The scanning may be executed until the session is terminated. Methods may identify a number of comparison points between the scanned and stored biometric identifiers. In response to determining that the number of identified comparison points is below a predetermined threshold number of comparison points, methods may initiate a passcode request. The passcode request may request a confirmation of a preset user-selected passcode. In response to determining that the passcode response does not match the preset user-selected passcode, methods may terminate the session.Type: ApplicationFiled: July 20, 2023Publication date: January 23, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Patel, Michael Young
-
Publication number: 20250028704Abstract: Systems and methods for an artificial intelligence-based auditor of artificial intelligence may be provided. The artificial-intelligence-based auditor may operate on one or more hardware processors. The artificial intelligence-based auditor may continually scan one or more operating artificial intelligence systems for productivity and operability. The scan may identify a data source powering the one or more operating artificial intelligence systems. The scan may measure a delta between an output from each of the one or more operating artificial intelligence systems. The scan may identify trends in quality of the one or more operating artificial intelligence systems. The scan may analyze instances where the one or more operating artificial intelligence systems outputted data outside of a parameter range. Based on the scan, the auditor may label each of the one or more operating artificial intelligence systems as positive, neutral or negative.Type: ApplicationFiled: July 20, 2023Publication date: January 23, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Patel, Michael Young
-
Publication number: 20250030701Abstract: A method for securing communications received at an automated chatbot within an entity network is provided. The method may enable securing the communications by monitoring inputs received at the automated chatbot in order to identify whether there may be a probability that the input is generated by an artificial intelligence (“AI”) program. The method may include receiving a request to initiate a chat session at the automated chatbot. Each input received at the automated chatbot may be simultaneously retrieved by a processor associated with the chatbot for verifying. Each input may be analyzed by an AI auditor application in comparison to trained data stored in an AI model. The trained data may include characteristics that may be associated with input generated by the AI program. When any inputs correspond to the trained data, the AI auditor may pause the chat session at the automated chatbot and/or terminate the chat session.Type: ApplicationFiled: July 17, 2023Publication date: January 23, 2025Inventors: Manu Kurian, Ana Maxim, Michael Young, Vinesh Patel
-
Publication number: 20250028977Abstract: Systems and methods for an artificial intelligence-based auditor of artificial intelligence may be provided. The artificial-intelligence-based auditor may operate on one or more hardware processors. The artificial intelligence-based auditor may continually scan one or more operating artificial intelligence systems for productivity and operability. The scan may identify a data source powering the one or more operating artificial intelligence systems. The scan may measure a delta between an output from each of the one or more operating artificial intelligence systems. The scan may identify trends in quality of the one or more operating artificial intelligence systems. The scan may analyze instances where the one or more operating artificial intelligence systems outputted data outside of a parameter range. Based on the scan, the auditor may label each of the one or more operating artificial intelligence systems as positive, neutral or negative.Type: ApplicationFiled: July 20, 2023Publication date: January 23, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Patel, Michael Young
-
Publication number: 20250028797Abstract: Systems and Method are provided for an Anti-Pattern Captcha. Methods may include AI software receiving a request from a user to access a system or website, the request comprising user credentials. Methods may include the AI software identifying a human user associated with the user credentials. Methods may include the AI software compiling data related to a plurality of unique behavior patterns associated with the human user when interacting online. Methods may include the AI software analyzing the compiled data to establish the unique behavior patterns. Methods may include the AI software presenting a challenge to the user. Methods may include the AI software verifying that the user is the human user upon a response to the challenge that deviates from at least one of the unique behavior patterns. Methods may include the AI software prompting the user to interact with the system or website upon verification.Type: ApplicationFiled: July 17, 2023Publication date: January 23, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Patel, Michael Young
-
Patent number: 12182129Abstract: A method for facilitating transfer of a new dataset across a network may include the following steps: (a) querying the global dataset via a computer processor to identify an existing dataset having data points corresponding to the new dataset; (b) identifying historical data rules previously used for a set of data transfers relating to the existing dataset; and (c) using the historical data rules to assist a machine learning engine in generating data rules for use with a data transfer relating to the new dataset.Type: GrantFiled: May 18, 2023Date of Patent: December 31, 2024Assignee: Bank of America CorporationInventors: Nupur Gupta, Harinath Meedinti Bhaskara Reddy, Manu Kurian, Jayachandra Varma, Erica Perkins
-
Publication number: 20240403462Abstract: Provided herein is a method for enabling continuity of access to a primary dataset stored in a computer network, the method utilizing a node, a computer processor, and non-transitory computer-readable media storing computer-executable instructions, the node being connected to the computer network; the method including the steps of: configuring the mobile device for wireless connection to the computer network; configuring the mobile device to receive indication that the node is disconnected from the computer network, and transmit a copy of the primary dataset or a portion thereof from the computer network to the node; configuring the node to enable operations on the dataset copy and keep a record of them; and configuring the node to receive indication that the node is connected to the computer network and transmit the record to the computer network.Type: ApplicationFiled: June 1, 2023Publication date: December 5, 2024Inventors: Ion Freeman, Manu Kurian, Ganesh Bonda, Aeric Solow, Sasikumar Purushothaman
-
Publication number: 20240406139Abstract: Apparatus and methods to automatically filter data at an edge of a network are provided. An edge data filter may intercept incoming data before the data is downloaded onto the network. The edge data filter may analyze the data and metadata of the data through one or more artificial intelligence/machine learning (“AI/ML”) algorithms to determine if any of the data is relevant to the network. When any of the data is relevant to the network, the edge data filter may release the relevant data to the network.Type: ApplicationFiled: May 29, 2023Publication date: December 5, 2024Inventors: Jayachandra Varma, Manu Kurian
-
Publication number: 20240403326Abstract: Provided herein is a method of storing an incoming dataset in a data mesh. The method may include a plurality of steps. The steps may include associating a metadata tag with a classifying feature and a storage instruction in a (first) relational database. The steps may include scanning incoming datasets to identify datasets characterized by the classifying feature. The steps may include tagging an incoming dataset to generate a tagged dataset. The steps may include storing the tagged dataset in the data mesh, according to the storage instruction. The steps may include associating, in a second relational database, the metadata tag with the initial storage location. The steps may include modifying the storage instruction. The steps may include storing the incoming dataset an additional time in the data mesh, according to the modified storage instruction.Type: ApplicationFiled: June 5, 2023Publication date: December 5, 2024Inventors: Harinath Meedinti Bhaskara Reddy, Manu Kurian, Jayachandra Varma, Erica Perkins, Aeric Solow
-
Publication number: 20240395166Abstract: A financial institution may provide a client with a computer program product that may be used to train minor children on investing in financial instruments. An electronic interface may enable the client to delegate control over a portion of the client's investment portfolio to minor children. The delegated control may allow a minor child, using a second electronic interface, to make investment decisions for the assets delegated to the minor child under the supervision of the client. The investments by the minor child may be simulated or may be actual investments. A rules engine may specify client, financial institution, or AI/ML generated rules that govern use of the product. ESG criteria may be used to aid in investment decisions. Statistical graphics, like a pie chart, may be used to display to the client and to the minor children a breakdown of assets held, such as by category.Type: ApplicationFiled: May 23, 2023Publication date: November 28, 2024Inventors: Sasikumar Purushothaman, Manu Kurian
-
Publication number: 20240396901Abstract: Methods, systems and apparatus for controlled data transmission within leveled data environments is provided. Methods may include transmitting a dataset, using a data driver, from a first data environment to a second data environment. Methods may include intercepting the dataset at a reception gateway. Methods may include transmitting an identification. The identification request may request an original data environment from which the data originated; and a destination data environment to which the data is being transmitted. Methods may include in response to receiving a reply to the identification request, authenticating the reply. Methods may include initiating a security level compatibility check. Methods may include determining whether the first data environment is compatible with the second data environment. Methods may include transmitting the dataset through an auto-sanitization engine. Methods may include fragmenting the data into a plurality of data segments.Type: ApplicationFiled: May 23, 2023Publication date: November 28, 2024Inventors: Ion Freeman, Manu Kurian
-
Publication number: 20240394233Abstract: A system for administering regionally-based data storage and control is provided. The system may include a computer processor and a distributed memory. The distributed memory may be distributed across a plurality of regions. The distributed memory may provide data storage. The system may build a plurality of artificial intelligence (AI) models. Each of the models may correspond to a set of data rules. Each of the data rules governs the storage of data in each of the plurality of regions. The system may further create, or otherwise access, a plurality of data keys. Each of the data keys preferably corresponds to one of the regions. The system preferably centralizes the location of the plurality of data keys in a central location such that control of the data in the plurality of regions can be administered by the processor, via the plurality of data keys, from the central location.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Inventors: Nupur Gupta, Harinath Meedinti Bhaskara Reddy, Manu Kurian, Jayachandra Varma, Erica Perkins
-
Publication number: 20240394391Abstract: Apparatus, methods and systems for securely trade data from one node by another node is provided. Methods may include receiving raw data at a node. Methods may include categorizing the data. Methods may include classifying the data. Methods may include assigning data grades to the data. Methods may include assigning security levels to the data. Methods may include storing the data at a data mesh. Methods may include determining a resource consumption metric (“RCM”) for the data. Methods may include transmitting the data. The dataset may be acquired for a value specified by the RCM. Methods may include improving the data. Methods may include recategorizing, reclassifying and reassigning a security level to the data. Methods may include storing the improved data in the data mesh. Methods may include determining a new RCM for the improved data. Methods may include transmitting the improved data. Methods may include managing the transmission of the data with a third node.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Inventors: Manu Kurian, Ganesh Bonda