Patents by Inventor Michael Sbandi
Michael Sbandi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11736511Abstract: Information technology/cyber security for computer-related processes in which vulnerabilities are identified and, those vulnerabilities which are technology-related are automatically remediated by determining and executing network-based tasks. The most granular level of computer-related process assessment in made possible by reliance on a critical function/process taxonomy this is automatically generated and, as such, the present invention, identifies both technology and non-technology-related vulnerabilities.Type: GrantFiled: October 8, 2021Date of Patent: August 22, 2023Assignee: BANK OF AMERICA CORPORATIONInventors: Casey L. Flaherty, Michael Sbandi, Jo-Ann Taylor, Michael Robert Young, Zarna Arun Patel
-
Patent number: 11599886Abstract: Embodiments of the invention are directed to a system, method, or computer program product for integration with a wearable device for impetus resource distribution process confirmation and authentication. In this way, the invention coordinates with a wearable device and resource distribution vehicles of a user. Upon activation of a resource distribution vehicle, the system reviews metrics from the wearable device to identify discrepancies between the real-time metrics and a baseline for the user. The invention triggers tiered confirmation requests for authentication prior to allowing processing of the resource distribution for impetus distribution prevention.Type: GrantFiled: January 17, 2020Date of Patent: March 7, 2023Assignee: BANK OF AMERICA CORPORATIONInventors: Michael Sbandi, Jo-Ann Taylor, Michael Robert Young
-
Patent number: 11429474Abstract: Apparatus and methods for establishing a user Internet of Things (“IoT”) system is provided. The method may be performed by a central IoT hub run on a user's personal computing device. The method may include detecting user devices in electronic communication with the central IoT hub and onboarding, to the user IoT system, user devices determined to be in conformance with baseline security protocols and performance characteristics. The onboarded user device may be IoT nodes. The method may include monitoring enterprise data to pre-emptively identify and address probable failures of the IoT nodes prior to failure of the IoT nodes. The method may also include addressing known failures for each IoT node on the user IoT system.Type: GrantFiled: August 3, 2020Date of Patent: August 30, 2022Assignee: Bank of America CorporationInventors: Rebbecca Nelson, Robert Cain Durbin, Jr., Chiamaka Azih, Jo-Ann Taylor, Vicky Kivuti, Angelica Barrera, Michael Robert Young, Michael Sbandi, Son Huynh, Adam Kristian King
-
Patent number: 11310259Abstract: A system for using artificial intelligence to generate a computing network architecture diagram based on user inputs, applicable vulnerability/cyber threat data and internal/external compliance/audit regulation data. In addition, machine-learning techniques may be used that leverage previously implemented computing network architectures. The computing network architecture diagram may be generated absent a baseline diagram or the user inputs may define at least a portion of an initial/baseline network architecture diagram that is modified based on the vulnerability/cyber threat data, the internal/external compliance/audit regulation data and/or the previously implemented computing network architectures. In additional embodiments of the invention, new/emerging vulnerabilities and cyber threats are detected, and in real-time response, adjustments to the computing network infrastructure and determined and implemented.Type: GrantFiled: October 25, 2019Date of Patent: April 19, 2022Assignee: BANK OF AMERICA CORPORATIONInventors: Joshua Nathanael Jenkins, Michael Sbandi, Michael Robert Young
-
Publication number: 20220084112Abstract: Systems, computer program products, and methods are described herein for tracking user eye focus for adjusting interactions with a user. The present invention may be configured to receive, from a user device, image data associated with an item and receive, from the user device, eye-tracking data associated with eye movements of a user while the user is viewing the item. The present invention may be further configured to determine, based on the eye-tracking data, whether the user focused on the item and receive outcome data comprising an action, performed by the user, regarding the item. The present invention may be further configured to determine, based on the outcome data and based on whether the user focused on the item, an attribute of the action by determining whether the user understood the item, whether the user took the action regarding the item impulsively, and/or the like.Type: ApplicationFiled: September 17, 2020Publication date: March 17, 2022Applicant: BANK OF AMERICA CORPORATIONInventors: Jo-Ann Taylor, Daniel John Nunn, Michael Sbandi, Michael Robert Young
-
Publication number: 20220037041Abstract: Apparatus and methods for establishing a user Internet of Things (“IoT”) system is provided. The method may be performed by a central IoT hub run on a user's personal computing device. The method may include detecting user devices in electronic communication with the central IoT hub and onboarding, to the user IoT system, user devices determined to be in conformance with baseline security protocols and performance characteristics. The onboarded user device may be IoT nodes. The method may include monitoring enterprise data to pre-emptively identify and address probable failures of the IoT nodes prior to failure of the IoT nodes. The method may also include addressing known failures for each IoT node on the user IoT system.Type: ApplicationFiled: August 3, 2020Publication date: February 3, 2022Applicant: Bank of America CorporationInventors: Rebbecca Nelson, Robert Cain Durbin, JR., Chiamaka Azih, Jo-Ann Taylor, Vicky Kivuti, Angelica Barrera, Michael Robert Young, Michael Sbandi, Son Huynh, Adam Kristian King
-
Publication number: 20220030025Abstract: Information technology/cyber security for computer-related processes in which vulnerabilities are identified and, those vulnerabilities which are technology-related are automatically remediated by determining and executing network-based tasks. The most granular level of computer-related process assessment in made possible by reliance on a critical function/process taxonomy this is automatically generated and, as such, the present invention, identifies both technology and non-technology-related vulnerabilities.Type: ApplicationFiled: October 8, 2021Publication date: January 27, 2022Applicant: BANK OF AMERICA CORPORATIONInventors: Casey L. Flaherty, Michael Sbandi, Jo-Ann Taylor, Michael Robert Young, Zarna Arun Patel
-
Patent number: 11184384Abstract: Information technology/cyber security for computer-related processes in which vulnerabilities are identified and, those vulnerabilities which are technology-related are automatically remediated by determining and executing network-based tasks. The most granular level of computer-related process assessment in made possible by reliance on a critical function/process taxonomy this is automatically generated and, as such, the present invention, identifies both technology and non-technology-related vulnerabilities.Type: GrantFiled: June 13, 2019Date of Patent: November 23, 2021Assignee: BANK OF AMERICA CORPORATIONInventors: Casey L. Flaherty, Michael Sbandi, Jo-Ann Taylor, Michael Robert Young, Zarna Arun Patel
-
Publication number: 20210224804Abstract: Embodiments of the invention are directed to a system, method, or computer program product for integration with a wearable device for impetus resource distribution process confirmation and authentication. In this way, the invention coordinates with a wearable device and resource distribution vehicles of a user. Upon activation of a resource distribution vehicle, the system reviews metrics from the wearable device to identify discrepancies between the real-time metrics and a baseline for the user. The invention triggers tiered confirmation requests for authentication prior to allowing processing of the resource distribution for impetus distribution prevention.Type: ApplicationFiled: January 17, 2020Publication date: July 22, 2021Applicant: BANK OF AMERICA CORPORATIONInventors: Michael Sbandi, Jo-Ann Taylor, Michael Robert Young
-
Publication number: 20210126934Abstract: A system for using artificial intelligence to generate a computing network architecture diagram based on user inputs, applicable vulnerability/cyber threat data and internal/external compliance/audit regulation data. In addition, machine-learning techniques may be used that leverage previously implemented computing network architectures. The computing network architecture diagram may be generated absent a baseline diagram or the user inputs may define at least a portion of an initial/baseline network architecture diagram that is modified based on the vulnerability/cyber threat data, the internal/external compliance/audit regulation data and/or the previously implemented computing network architectures. In additional embodiments of the invention, new/emerging vulnerabilities and cyber threats are detected, and in real-time response, adjustments to the computing network infrastructure and determined and implemented.Type: ApplicationFiled: October 25, 2019Publication date: April 29, 2021Applicant: BANK OF AMERICA CORPORATIONInventors: Joshua Nathanael Jenkins, Michael Sbandi, Michael Robert Young
-
Publication number: 20200396240Abstract: Information technology/cyber security for computer-related processes in which vulnerabilities are identified and, those vulnerabilities which are technology-related are automatically remediated by determining and executing network-based tasks. The most granular level of computer-related process assessment in made possible by reliance on a critical function/process taxonomy this is automatically generated and, as such, the present invention, identifies both technology and non-technology-related vulnerabilities.Type: ApplicationFiled: June 13, 2019Publication date: December 17, 2020Inventors: Casey L. Flaherty, Michael Sbandi, Jo-Ann Taylor, Michael Robert Young, Zarna Arun Patel