Patents by Inventor Michael R Young
Michael R Young has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240126135Abstract: A beam delivery system is provided that includes a beam delivery photonic integrated circuit. The beam delivery photonic integrated circuit includes one or more optical inputs; a plurality of waveguide outputs; and a plurality of beam paths. Each beam path connects one of the plurality of waveguide outputs to at least one of the optical inputs. The plurality of waveguide outputs are configured to emit a plurality of parallel beams. The beam delivery photonic integrated circuit is on a chip. The beam delivery system further includes a telecentric optical relay assembly. The telecentric optical relay assembly is configured to receive the plurality of parallel beams provided by the waveguide outputs and focus each received beam on a corresponding one of a plurality of positions of an atomic object confinement apparatus in a telecentric manner.Type: ApplicationFiled: December 15, 2023Publication date: April 18, 2024Inventors: Mary A. Rowe, Michael Belt, Bryan T. Spann, Molly R. Krogstad, Robert D. Horning, David A. Deen, Michael D. Young, Nathan Worts
-
Publication number: 20240109851Abstract: The present disclosure provides methods for preparing MCL1 inhibitors or a salt thereof and related key intermediates.Type: ApplicationFiled: August 1, 2023Publication date: April 4, 2024Inventors: Katrien Brak, Kae M. Bullock, Greg Cizio, Kathy Dao, Darryl D. Dixon, Joshua R. Dunetz, Luke D. Humphreys, Valerie Huynh, Michael A. Ischay, Trevor C. Johnson, Jeffrey E. Merit, Christopher S. Regens, Eric A. Standley, Dietrich P. Steinhuebel, Justin Y. Su, Tao Wu, Marshall D. Young
-
Publication number: 20240037972Abstract: A device configured to receive a request for processing a digital document that identifies a target data structure. The device is further configured to obtain the digital document and to process the digital document to identify objects within the digital document. The device is further configured to input the digital document into a machine learning model that is configured to output contextual metadata for the digital document based on the digital document. The contextual metadata describes attributes of the identified objects within the digital document. The device is further configured to populate a first subset of entries in the target data structure with identifiers for the objects identified within the digital document and to populate a second subset of entries in the target data structure with the contextual metadata. The device is further configured to send the populated target data structure to the network device.Type: ApplicationFiled: October 10, 2023Publication date: February 1, 2024Inventor: Michael R. Young
-
Patent number: 11823476Abstract: A device configured to receive a request for processing a digital document that identifies a target data structure. The device is further configured to obtain the digital document and to process the digital document to identify objects within the digital document. The device is further configured to input the digital document into a machine learning model that is configured to output contextual metadata for the digital document based on the digital document. The contextual metadata describes attributes of the identified objects within the digital document. The device is further configured to populate a first subset of entries in the target data structure with identifiers for the objects identified within the digital document and to populate a second subset of entries in the target data structure with the contextual metadata. The device is further configured to send the populated target data structure to the network device.Type: GrantFiled: May 25, 2021Date of Patent: November 21, 2023Assignee: Bank of America CorporationInventor: Michael R. Young
-
Publication number: 20230360006Abstract: An apparatus for transferring virtual resources comprises a processor associated with a server. The processor is configured to conduct an interaction between a first user and an entity to transfer a physical object and a non-fungible token (NFT) to the first user, wherein the NFT is associated with the physical object. The processor is further configured to receive the NFT for storage in a first digital folder and to receive a request to establish an interaction session between a first avatar in a virtual environment and a second avatar associated with a second user. The processor is further configured to authorize the interaction session in response to authenticating the NFT and to conduct the interaction. The interaction includes initiating a transfer of the physical object from the first user to the second user and transmitting the NFT to a second digital folder associated with the second user.Type: ApplicationFiled: May 6, 2022Publication date: November 9, 2023Inventors: VINESH PREMJI PATEL, Michael R. Young, Manu J. Kurian
-
Publication number: 20230360044Abstract: An apparatus for transferring virtual resources comprises a processor associated with a server. The processor is configured to receive a request from a second user device associated with a second user to establish an interaction session between a first avatar associated with a first user in a virtual environment and a second avatar associated with the second user in the virtual environment. The processor is further configured to authenticate a non-fungible token (NFT) based on data stored in the NFT, wherein the data stored in the NFT is associated with a physical object. The processor is further configured to authorize the interaction session between the first avatar and the second avatar in response to authenticating the NFT and to conduct an interaction between the first avatar and the second avatar to transfer the NFT to a second digital folder associated with the second user.Type: ApplicationFiled: May 6, 2022Publication date: November 9, 2023Inventors: Vinesh Premji Patel, Michael R. Young, Manu J. Kurian
-
Publication number: 20230353579Abstract: An apparatus for geotagging users for authentication comprises a processor associated with a server. The processor is configured to generate a first geotag based on residence information associated with a first user and to transmit the first geotag to a first user device for assignment to a first avatar associated with the first user in a virtual environment. The processor is further configured to receive an interaction request to authorize an interaction between the first avatar and a second avatar associated with a second user. The processor is further configured to compare a first historical log to a second historical log to determine that the first avatar is associated with the first user. In response to determining that the first avatar is associated with the first user, the processor is further configured to conduct a first step in authorizing the interaction between the first avatar and the second avatar.Type: ApplicationFiled: April 29, 2022Publication date: November 2, 2023Inventors: Vinesh Premji Patel, Michael R. Young, Manu J. Kurian
-
Patent number: 11790120Abstract: A system for producing and transmitting encrypted data from data encoded on a storage medium comprises an apparatus configured to receive the storage medium and an encryption chip communicatively coupled to the apparatus. The apparatus comprises a processor, a memory, and a network interface. The processor is configured to receive data encoded into the storage medium, and to decode the received data as the storage medium is at least partially inserted into the apparatus. The processor is further configured to transmit the received data to the memory for storage. The encryption chip comprises an encryption processor configured to access the received data stored in the memory of the apparatus and encrypt the received data with an algorithm to produce the encrypted data. The processor then transmits the encrypted data to an external server communicatively connected to a communication network.Type: GrantFiled: March 26, 2021Date of Patent: October 17, 2023Assignee: Bank of America CorporationInventors: Amy L. Arnott, Sarah G. Troxler, Allison Dolores Baker, Michael R. Young
-
Patent number: 11741248Abstract: An information security system that includes a data control engine configured to receive a data file and to segment the data file into a set of data blocks that each contain a portion of data from the data file. The data control engine is further configured to associate the set of data blocks with a reference tag and to store an association between the set of data blocks and the reference tag. The data control engine is further configured to identify an access key for encrypting each data block, to encrypt each data block with a corresponding access key, and to store an association between each data block and each corresponding access key. The data control engine is further configured to store each data block in a memory and to store location information identifying the location of each data block in the memory.Type: GrantFiled: August 20, 2019Date of Patent: August 29, 2023Assignee: Bank of America CorporationInventors: Manu J. Kurian, Michael R. Young, Jo-Ann Taylor
-
Patent number: 11645427Abstract: A system includes a device including one or more sensors that generate one or more signals used to detect whether an unauthorized activity has occurred at the device. The device is configured to transmit the one or more signals generated by the one or more sensors. The central monitoring device is configured to receive the one or more signals and compare the one or more signals with a baseline signal for the device. The baseline signal includes an expected signal for each of the one or more sensors when the unauthorized activity has not occurred. The monitoring device determines whether the unauthorized activity has occurred based on a result of the comparison.Type: GrantFiled: November 29, 2020Date of Patent: May 9, 2023Assignee: Bank of America CorporationInventors: Michael R. Young, Daniel J August, Tomas M. Castrejon, III, Richard Martin Seymour Scot, Neal Aaron Slensker
-
Publication number: 20220383022Abstract: A device configured to receive a request for processing a digital document that identifies a target data structure. The device is further configured to obtain the digital document and to process the digital document to identify objects within the digital document. The device is further configured to input the digital document into a machine learning model that is configured to output contextual metadata for the digital document based on the digital document. The contextual metadata describes attributes of the identified objects within the digital document. The device is further configured to populate a first subset of entries in the target data structure with identifiers for the objects identified within the digital document and to populate a second subset of entries in the target data structure with the contextual metadata. The device is further configured to send the populated target data structure to the network device.Type: ApplicationFiled: May 25, 2021Publication date: December 1, 2022Inventor: Michael R. Young
-
Patent number: 11463438Abstract: An authentication device that is configured to receive an authentication request that includes a device identifier from a user device. The authentication device is further configured to identify a first device that is associated with the device identifier and to send a device fingerprint request to the first device. The authentication device is further configured to receive a first device fingerprint for the first device. The first device fingerprint is uniquely associated with the first device and includes a unique bit string that is generated based on a configuration of the first device. The authentication device is further configured to identify a second device fingerprint that is associated with the first device from among a plurality of device fingerprints stored in a memory, to compare the first device fingerprint to the second device fingerprint, and to send an authentication response to the user device based on the comparison.Type: GrantFiled: November 11, 2020Date of Patent: October 4, 2022Assignee: Bank of America CorporationInventors: Daniel J. August, Neal Aaron Slensker, Michael R. Young
-
Publication number: 20220309189Abstract: A system for producing and transmitting encrypted data from data encoded on a storage medium comprises an apparatus configured to receive the storage medium and an encryption chip communicatively coupled to the apparatus. The apparatus comprises a processor, a memory, and a network interface. The processor is configured to receive data encoded into the storage medium, and to decode the received data as the storage medium is at least partially inserted into the apparatus. The processor is further configured to transmit the received data to the memory for storage. The encryption chip comprises an encryption processor configured to access the received data stored in the memory of the apparatus and encrypt the received data with an algorithm to produce the encrypted data. The processor then transmits the encrypted data to an external server communicatively connected to a communication network.Type: ApplicationFiled: March 26, 2021Publication date: September 29, 2022Inventors: Amy L. Arnott, Sarah G. Troxler, Allison Dolores Baker, Michael R. Young
-
Publication number: 20220171882Abstract: A system includes a device including one or more sensors that generate one or more signals used to detect whether an unauthorized activity has occurred at the device. The device is configured to transmit the one or more signals generated by the one or more sensors. The central monitoring device is configured to receive the one or more signals and compare the one or more signals with a baseline signal for the device. The baseline signal includes an expected signal for each of the one or more sensors when the unauthorized activity has not occurred. The monitoring device determines whether the unauthorized activity has occurred based on a result of the comparison.Type: ApplicationFiled: November 29, 2020Publication date: June 2, 2022Inventors: Michael R. Young, Daniel J. August, Tomas M. Castrejon, III, Richard Martin Seymour Scot, Neal Aaron Slensker
-
Publication number: 20220150245Abstract: An authentication device that is configured to receive an authentication request that includes a device identifier from a user device. The authentication device is further configured to identify a first device that is associated with the device identifier and to send a device fingerprint request to the first device. The authentication device is further configured to receive a first device fingerprint for the first device. The first device fingerprint is uniquely associated with the first device and includes a unique bit string that is generated based on a configuration of the first device. The authentication device is further configured to identify a second device fingerprint that is associated with the first device from among a plurality of device fingerprints stored in a memory, to compare the first device fingerprint to the second device fingerprint, and to send an authentication response to the user device based on the comparison.Type: ApplicationFiled: November 11, 2020Publication date: May 12, 2022Inventors: Daniel J. August, Neal Aaron Slensker, Michael R. Young
-
Patent number: 11323473Abstract: An information security system that includes an information security engine configured to detect an attack by a malicious software element in a network. The information security engine is further configured to transfer the malicious software element from the network to the emulated network in response to detecting an attack. The information security engine is further configured to select defense strategies for restricting communications using different port configurations and to implement each defense strategy within the emulated network. The information security engine is further configured to execute a duplicate of the malicious software element in the emulated network and to determine a performance level for each of the defense strategies against the duplicate of the malicious software element. The information security engine is further configured to select a defense strategy with a highest performance level and to implement the selected defense strategy within the network.Type: GrantFiled: January 31, 2020Date of Patent: May 3, 2022Assignee: Bank of America CorporationInventors: Jo-Ann Taylor, Benjamin F. Tweel, Michael R. Young, Michael J. Sbandi
-
Patent number: 11320897Abstract: A device is configured to establish a network connection with a virtual reality device and to identify a user account that is associated with the virtual reality device. The device is further configured to send a virtual simulation survey to the virtual reality device. The virtual simulation survey includes a list of virtual simulations that can be rendered by the virtual reality device. The device is further configured to receive a survey response from the virtual reality device. The survey response identifies one or more virtual simulations from the list of virtual simulations. The device is further configured to determine a cumulative user preference settings value based on the virtual simulations identified in the survey response and to modify user preference settings within the user account based on the cumulative user preference settings value.Type: GrantFiled: September 28, 2020Date of Patent: May 3, 2022Assignee: Bank of America CorporationInventors: Jo-Ann Taylor, Michael J. Sbandi, Michael R. Young
-
Publication number: 20220100262Abstract: A device is configured to establish a network connection with a virtual reality device and to identify a user account that is associated with the virtual reality device. The device is further configured to send a virtual simulation survey to the virtual reality device. The virtual simulation survey includes a list of virtual simulations that can be rendered by the virtual reality device. The device is further configured to receive a survey response from the virtual reality device. The survey response identifies one or more virtual simulations from the list of virtual simulations. The device is further configured to determine a cumulative user preference settings value based on the virtual simulations identified in the survey response and to modify user preference settings within the user account based on the cumulative user preference settings value.Type: ApplicationFiled: September 28, 2020Publication date: March 31, 2022Inventors: Jo-Ann Taylor, Michael J. Sbandi, Michael R. Young
-
Patent number: 11176264Abstract: An information security system that includes a data control engine configured to receive a data request identifying a first reference tag that is associated with a data file. The data control engine is further configured to identify a first set of encrypted data blocks that are linked with the reference tag and location information for the first set of encrypted data blocks from a data information table. The data control engine is further configured to extract the first set of data blocks from a memory based on the location information. The data control engine is further configured to identify access keys associated with the first set of encrypted data blocks from the data information table and to decrypt the first set of encrypted data blocks using the identified access keys. The data control engine is further configured to reconstruct the data file using the decrypted first set of data blocks.Type: GrantFiled: August 20, 2019Date of Patent: November 16, 2021Assignee: Bank of America CorporationInventors: Manu J. Kurian, Michael R. Young, Jo-Ann Taylor
-
Publication number: 20210243204Abstract: An information security system that includes an information security engine configured to detect an attack by a malicious software element in a network. The information security engine is further configured to transfer the malicious software element from the network to the emulated network in response to detecting an attack. The information security engine is further configured to select defense strategies for restricting communications using different port configurations and to implement each defense strategy within the emulated network. The information security engine is further configured to execute a duplicate of the malicious software element in the emulated network and to determine a performance level for each of the defense strategies against the duplicate of the malicious software element. The information security engine is further configured to select a defense strategy with a highest performance level and to implement the selected defense strategy within the network.Type: ApplicationFiled: January 31, 2020Publication date: August 5, 2021Inventors: Jo-Ann Taylor, Benjamin F. Tweel, Michael R. Young, Michael J. Sbandi