Patents by Inventor Michael Robert Young

Michael Robert Young has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230344634
    Abstract: A device is configured to receive a user input from a user device indicating a first gesture performed by a user in a real-world environment and to identify a first token within a gesture map corresponding with the first gesture. The device is further configured to identify a second gesture performed by an avatar within a virtual environment that is associated with the user and to identify a second token within the gesture map corresponding with the second gesture. The device is further configured to combine the first token and the second token to generate an authentication token and to verify an identity of the user based on the authentication token.
    Type: Application
    Filed: April 26, 2022
    Publication date: October 26, 2023
    Inventors: VINESH PREMJI PATEL, Manu J. Kurian, Michael Robert Young
  • Publication number: 20230336564
    Abstract: Arrangements for detecting unauthorized activity using spatially aware devices are provided. In some aspects, a computing device including a spatially aware chip may be detected at a location. An indication of device detection, as well as additional data may be captured and received. Upon a second detection of the computing device, additional data for that visit (e.g., a second visit, subsequent to a first visit to the location) may be captured and received. Earlier stored data associated with the device and/or spatially aware chip may be retrieved and compared to the additional for the second visit to detect one or more anomalies, determine a risk score for the device, and the like. Based on the detected anomalies and/or risk score, one or more mitigating actions may be identified and executed to mitigate the risk. Further, one or more alerts or notifications may be transmitted to one or more devices.
    Type: Application
    Filed: April 19, 2022
    Publication date: October 19, 2023
    Inventors: Sophie Morgan Danielpour, Michael Robert Young
  • Publication number: 20230333835
    Abstract: Various systems, methods, and computer program products are provided for dynamic code patch deployment within a distributed network. The method includes identifying one or more potential vulnerabilities within a software library that is associated with a first application within a decentralized network. The method also includes receiving a code update relating to the identified software library associated with the first application within the decentralized network. The method further includes identifying a second applications within the decentralized network that is also associated with the identified software library. The method still further includes causing a transmission of the code update to the second application within the decentralized network.
    Type: Application
    Filed: April 19, 2022
    Publication date: October 19, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, Michael Robert Young, David Nardoni, Joel Townsend, Manu Jacob Kurian
  • Patent number: 11792224
    Abstract: A system for identifying email messages associated with phishing threats accesses an email message sent to a receiving computing device, where the email message is associated with a sender's email address. The system determines whether the sender's email address is associated with a token from a plurality of tokens stored in a token-email address mapping table. The system determines that the email message is associated with a phishing threat, in response to determining that the sender's email address is not associated with a token from a plurality of tokens from among a token-email mapping table.
    Type: Grant
    Filed: May 26, 2021
    Date of Patent: October 17, 2023
    Assignee: Bank of America Corporation
    Inventors: Kelly Renee-Drop Keiter, Michael Robert Young, Tomas Mata Castrejon, III, Rick Wayne Sumrall
  • Publication number: 20230319079
    Abstract: A system is provided for detecting and remediating computing system breaches using computing network traffic monitoring. In particular, the system may identify one or more technology elements within a network as well as relationships between computing systems associated with said elements to determine a network topology. Based on the network topology, the system may use historical network traffic data associated with the technology elements in the network to generate predicted entry points and lateral pathways of a security breach that may take place within particular computing systems. Then, based on the technology elements affected as well as entry points and path traversals of the breach, the system may generate and/or implement one or more remediation steps to address existing and/or future breaches. In this way, the system may provide an intelligent method of augmenting the security of a computing network.
    Type: Application
    Filed: March 30, 2022
    Publication date: October 5, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, Manu Jacob Kurian, David Nardoni, Joel Townsend, Michael Robert Young
  • Publication number: 20230315439
    Abstract: Systems, computer program products, and methods are described herein for enhanced component-level detection in software applications. The present invention is configured to receive, from a client device, one or more data packets with payload containing a request to onboard a first application into a computing environment; determine, using an application ingestion subsystem, information associated with the first application; deploy, using a machine learning subsystem, a trained machine learning model on the information associated with the first application; determine, using the trained machine learning model, one or more components associated with the first application and one or more component scanning parameters for each of the one or more components; and build a software bill of materials (SBOM) for the first application based on at least the one or more components.
    Type: Application
    Filed: March 29, 2022
    Publication date: October 5, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, Manu Jacob Kurian, David Nardoni, Joel Townsend, Michael Robert Young
  • Publication number: 20230300619
    Abstract: Systems, computer program products, and methods are described herein for dynamic communication channel switching for secure message propagation. The present invention may be configured to receive wireless signals from a plurality of devices and identify, from the plurality of devices and based on the wireless signals, a trusted device. The present invention may be configured to receive, from another device, a secure message, where the secure message includes information identifying a vulnerability in a network to which the trusted device is connected. The present invention may be configured to establish, based on receiving the secure message and using a first wireless communication interface, a communication link with a second wireless communication interface of the trusted device to establish a wireless data channel with the trusted device and transmit, via the wireless data channel, the secure message to the trusted device.
    Type: Application
    Filed: March 21, 2022
    Publication date: September 21, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, Manu Jacob Kurian, David Nardoni, Joel Townsend, Michael Robert Young
  • Publication number: 20230297689
    Abstract: Systems, computer program products, and methods are described herein for deployable software vulnerability testing platform. The present invention is configured to receive, from a user input device, an initial request from a user to generate a deployable software vulnerability testing (SVT) engine; prompt an SVT dashboard for display on the user input device to receive one or more input parameters associated with the first vulnerability in response to receiving the initial request; receive, via the SVT dashboard, the one or more input parameters; generate the SVT engine based on at least the one or more input parameters; receive, from the user input device, one or more deployment parameters associated with a deployment of the SVT engine; and deploy the SVT engine within the distributed technology infrastructure to identify the one or more instances of the first vulnerability based on at least the one or more deployment parameters.
    Type: Application
    Filed: March 21, 2022
    Publication date: September 21, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Manu Jacob Kurian, Tomas M. Castrejon, III, Michael Robert Young, David Nardoni, Joel Townsend
  • Patent number: 11736511
    Abstract: Information technology/cyber security for computer-related processes in which vulnerabilities are identified and, those vulnerabilities which are technology-related are automatically remediated by determining and executing network-based tasks. The most granular level of computer-related process assessment in made possible by reliance on a critical function/process taxonomy this is automatically generated and, as such, the present invention, identifies both technology and non-technology-related vulnerabilities.
    Type: Grant
    Filed: October 8, 2021
    Date of Patent: August 22, 2023
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Casey L. Flaherty, Michael Sbandi, Jo-Ann Taylor, Michael Robert Young, Zarna Arun Patel
  • Publication number: 20230179422
    Abstract: A comprehensive system for chain-of-custody for hardware devices and their components. Specifically, as the components, assemblies and the hardware device are manufactured and/or assembled, non-fungible tokens (NFTs) are generated for each component, assembly and the overall hardware device that indicate that the component, assembly or hardware device is in a certified/verified good state (i.e., have not been tampered with). The NFTs are generated using measured authenticity characteristics (e.g., electro-magnetic, heat, weight, dimensions and the like) of a corresponding component, assembly or hardware device as at least a portion of the input to the hash algorithm. The NFTs are subsequently communicated to a distributed trust computing network at which the nodes converge to verify an authenticity and certifiable state of the NFT, and blocks of data are generated within distributed ledgers that store the verified NFT.
    Type: Application
    Filed: December 2, 2021
    Publication date: June 8, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventor: Michael Robert Young
  • Publication number: 20230138797
    Abstract: A system for generating an identity-based Non-Fungible Token (NFT) that uses, as a least a portion of the input file, a verified identity of the user. Once generated, the identity-based NFT is stored within a distributed trust computing network, which provides for verifying the authenticity and unalerted state of the NFT. Subsequently, the identity-based NFT can be accessed via the distributed trust computing network to verify the identity of the user. Additionally, the NFT may use other verified data as a portion of the input file, such as verified identity of users having a familial relationship with the user, verified life events, and/or verified user preferences. Further, the NFT may include one or more markers that identify a familial relationship and are configured to link the NFT to other NFTs associated with the related users.
    Type: Application
    Filed: November 1, 2021
    Publication date: May 4, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Manu Jacob Kurian, Michael Robert Young
  • Publication number: 20230102889
    Abstract: A non-fungible token (NFT)-based platform is provided for validating the authenticity of software and providing software traceability on a device and/or user-level. Software is configured by the developer with logic that detects installation and, in some embodiments, change (i.e., upgrades, patches or the like) and, in response generates a non-fungible token (NFT) that is subsequently verified via a distributed trust computing network. The NFT may be linked to one or more of the device, the user(s), IP address(es), licensee, such that a distributed ledger storing the linked NFTs can be accessed to readily determine which devices the software is installed on and the users of the software.
    Type: Application
    Filed: September 20, 2021
    Publication date: March 30, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Kelly Renee-Drop Keiter, Michael Robert Young
  • Publication number: 20230088102
    Abstract: Systems, computer program products, and methods are described herein for the real-time assessment of electronic digital certificates. The present invention is configured to generate an electronic digital certificate associated with a resource, record the electronic digital certificate on a distributed ledger, generate a metadata layer for the electronic digital certificate that has values describing specific attributes of the resource, determine, based on the values describing the specific attributes, and record the valuation in the metadata layer of the electronic digital certificate, an estimated value of the electronic digital certificate. In some embodiments, the predetermined values describing specific attributes of the resource are used to assign an insurance policy to the resource.
    Type: Application
    Filed: September 21, 2021
    Publication date: March 23, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Manu Jacob Kurian, Michael Robert Young
  • Publication number: 20230093520
    Abstract: Systems, computer program products, and methods are described herein for containerization of non-fungible tokens (NFTs). The present invention is configured to electronically receive, from a computing device of a first user, a request for a containerized non-fungible token (NFT) for at least two resources; initiate a non-fungible token (NFT) generator on the at least two resources in response to receiving the request; extract resource information from the at least two resources; generate, using the NFT generator, the containerized NFT for the at least two resources, wherein the NFT comprises at least the resource information extracted from the at least two resources; and record the containerized NFT on a distributed ledger.
    Type: Application
    Filed: September 20, 2021
    Publication date: March 23, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Michael Robert Young, Manu Jacob Kurian
  • Publication number: 20230080833
    Abstract: Systems, computer program products, and methods are described herein for real-time assessment of authenticity of a resource using non-fungible tokens (NFTs). The present invention is configured to receive, from a computing device of a user, an indication that a resource has been restored using a first resource portion, wherein the resource is associated with a first NFT; retrieve an NFT associated with the first resource portion; retrieve a value of the NFT associated with the first resource portion; generate, using the NFT generator, a second NFT for the resource; link the NFT associated with the first resource portion with the second NFT; determine, using an NFT valuation engine, a value for the second NFT based on at least a value of the NFT associated with the first resource portion; and record the second NFT on a distributed ledger.
    Type: Application
    Filed: September 15, 2021
    Publication date: March 16, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Michael Robert Young, Manu Jacob Kurian
  • Publication number: 20230073545
    Abstract: Systems, computer program products, and methods are described herein for linking and partitioning non-fungible tokens. The present invention is configured to receive, from a computing device of a first user, a first request to transfer ownership of a resource from a first user to a second user; retrieve, from the computing device of the first user, a first non-fungible token (NFT) for the resource; determine, using an NFT valuation engine, a first value of the first NFT; initiate an NFT generator on the resource based on at least receiving the first request; generate, using the NFT generator, a second NFT for the resource, wherein the second NFT comprises at least an indication of transfer of ownership of the resource from the first user to the second user and the first value of the NFT; and record the second NFT on a distributed ledger.
    Type: Application
    Filed: September 8, 2021
    Publication date: March 9, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Manu Jacob Kurian, Michael Robert Young
  • Patent number: 11599886
    Abstract: Embodiments of the invention are directed to a system, method, or computer program product for integration with a wearable device for impetus resource distribution process confirmation and authentication. In this way, the invention coordinates with a wearable device and resource distribution vehicles of a user. Upon activation of a resource distribution vehicle, the system reviews metrics from the wearable device to identify discrepancies between the real-time metrics and a baseline for the user. The invention triggers tiered confirmation requests for authentication prior to allowing processing of the resource distribution for impetus distribution prevention.
    Type: Grant
    Filed: January 17, 2020
    Date of Patent: March 7, 2023
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Michael Sbandi, Jo-Ann Taylor, Michael Robert Young
  • Publication number: 20230063408
    Abstract: Systems, computer program products, and methods are described herein for dynamically tracking resources using non-fungible tokens. The present invention is configured to electronically receive, over a distributed computing network from a computing device of a user, a request for a non-fungible token (NFT) for a resource, wherein the resource is a physical object; initiate a non-fungible token (NFT) generator on the resource in response to receiving the request; extract resource information from the resource; generate, using the NFT generator, the NFT, wherein the NFT comprises at least the resource information; and record the NFT for the resource on a distributed ledger.
    Type: Application
    Filed: September 2, 2021
    Publication date: March 2, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Michael Robert Young, Manu Jacob Kurian
  • Publication number: 20230063245
    Abstract: Systems, computer program products, and methods are described herein for tracking resources using non-fungible tokens. The present invention is configured to electronically receiving, over a distributed computing network from a computing device of a user, a request for a non-fungible token (NFT) for a resource; initiating a non-fungible token (NFT) generator on the resource in response to receiving the request; generating a unique digital signature for the resource; generating, using the NFT generator, the NFT, wherein the NFT comprises at least the unique digital signature for the resource; and record the NFT for the resource on a distributed ledger.
    Type: Application
    Filed: August 27, 2021
    Publication date: March 2, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Michael Robert Young, James J. Siekman, Richard Seymour Scot
  • Publication number: 20220398315
    Abstract: According to certain embodiments, a network security device comprises a memory operable to store testing options for testing malware behavior and a processor operably coupled to the memory. The processor is configured to intercept probes sent by a malware application and to test a set of test responses, each test response corresponds to a respective one of the testing options that comprises information that the probe seeks to obtain. For each test response, the test determines a test result indicating whether the test response resulted in stopping detonation of the malware application. Information indicating the test result and the test response that yielded the test result is input into a machine learning model configured to determine a malware defense profile based on the test information and to output the malware defense profile.
    Type: Application
    Filed: June 11, 2021
    Publication date: December 15, 2022
    Inventors: Michael Robert Young, Tomas Mata Castrejon, III, Rick Wayne Sumrall