Patents by Inventor Paul Stocks

Paul Stocks has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11974206
    Abstract: A mobile communication device leash is provided which communicates via short-range-wireless communication (e.g., Near-Field Communication (NFC), BLUETOOTH®, ZIGBEE® or the like) with an associated mobile communication device. Once the mobile communication device is outside of the short-range wireless communication range (or outside of a predetermined range within the short-range wireless communication range) an action is triggered to control access to the mobile communication device itself and/or access functionality provided by the mobile communication device. The leash may be a simplistic wireless device, such as a wristband, card device or smart tag device having the sole function of controlling access to the mobile communication device itself (e.g., shutdown or locking the device) and/or access functionality provided by the mobile communication device (e.g., locking certain application or limiting access to data within certain applications).
    Type: Grant
    Filed: April 20, 2022
    Date of Patent: April 30, 2024
    Assignee: BANK OF AMERICA CORPORATION
    Inventor: Dustin Paul Stocks
  • Publication number: 20240061950
    Abstract: A system is provided for monitoring real-time data inputs across multiple channels, determining potential impacts to a network or entity policy taxonomy, and taking one or more automated, responsive actions based on determined impacts. In this way, the system described herein is able to optimize system processes and system protections on an enterprise-wide scale in response to current events, policy or regulation changes, or predicted measures taken by private or public entities that may necessitate adaptation of one or more workflow processes or technology taxonomies, either upstream or downstream of the system itself.
    Type: Application
    Filed: August 16, 2022
    Publication date: February 22, 2024
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: George Anthony Albero, Michael Robert Young, Dustin Paul Stocks
  • Patent number: 11880461
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze the suspicious information. The analyst may utilize a non-native application to analyze the suspicious information within the virtual container. The non-native application may be used to analyze the suspicious information in an analysis format instead of an original format for which the suspicious information, and any harmful information therein, were intended to be accessed. Additionally, the virtual containers may be accessed through the use of an API that allows an analyst to analyze the suspicious information in the virtual container without transferring information from the virtual container back to the analyst user computer system.
    Type: Grant
    Filed: June 22, 2020
    Date of Patent: January 23, 2024
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Dustin Paul Stocks, Jon Codispoti
  • Publication number: 20230418949
    Abstract: Arrangements for providing software vulnerability analysis and monitoring are provided. In some aspects, software bill of materials (SBOM) data may be received and software attributes may be extracted from the SBOM data. Author data may be received and analyzed using natural language processing and/or machine learning to identify author attributes. Current event or vulnerability data may be received. In some examples, one or more machine learning models may be executed to determine a confidence score associated with the software being analyzed. For instance, software attributes, author attributes, and current event data may be used as inputs in the machine learning model and a confidence score may be output. Based on the confidence score, one or more alerts may be generated and transmitted to one or more enterprise organization computing devices.
    Type: Application
    Filed: June 23, 2022
    Publication date: December 28, 2023
    Inventors: Dustin Paul Stocks, Kayla Ashley Rux, Viswanathan Venkatasubramanian, Ramkumar Korlepara, Sanjay Lohar, Eric Eugene Sifford, Ashley L. Jones, David Cuka
  • Publication number: 20230359716
    Abstract: A security feature within an apparatus that includes a fingerprint scanner used for purposes of authentication. Specifically, a first indicator is detected that is a user input to a fingerprint scanner and indicates the occurrence of a duress-inducing event. In response to detecting the first indicator, (i) access to the apparatus is controlled, and (ii) access to functionality provided by the apparatus is controlled. As such, if the user is being forced to input their fingerprint by a nefarious entity desiring access to the apparatus, the present invention provides a means by which the user can covertly activate certain features on the apparatus that prevent the nefarious entity from access to the apparatus and/or functionality provided by the apparatus.
    Type: Application
    Filed: May 4, 2022
    Publication date: November 9, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: George Anthony Albero, Dustin Paul Stocks, Edward Lee Traywick, Jake Michael Yara
  • Publication number: 20230360048
    Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for fraud detection based on changes in resource transmissions. The invention is configured to identify unauthorized resource transmission by importing or retrieving data known to have been associated with unauthorized resource transmissions to project one or more patterns of unauthorized resource transmission that can be compared with resource transmission data of a user to identify a potentially misappropriated transaction.
    Type: Application
    Filed: May 4, 2022
    Publication date: November 9, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: George Anthony Albero, Jake Michael Yara, Dustin Paul Stocks, Edward Lee Traywick
  • Publication number: 20230344930
    Abstract: Automatically and covertly activating audio/video mechanisms within a mobile communication device when a user is confronted with a duress-inducing event or a situation based on receipt of a duress indicator. The duress indicator is a subtle user input, such as a personal gesture, personal audible code or device input that triggers the covert activation of audio/video recording mechanisms on a mobile communication device. As a result, audio and/or video data of a duress-inducing event can be captured absent other parties to the duress-inducing event being aware that audio/video data is being captured.
    Type: Application
    Filed: April 20, 2022
    Publication date: October 26, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: George Anthony Albero, Dustin Paul Stocks, Edward Lee Traywick, Jake Michael Yara
  • Publication number: 20230345220
    Abstract: A mobile communication device leash is provided which communicates via short-range-wireless communication (e.g., Near-Field Communication (NFC), BLUETOOTH®, ZIGBEE® or the like) with an associated mobile communication device. Once the mobile communication device is outside of the short-range wireless communication range (or outside of a predetermined range within the short-range wireless communication range) an action is triggered to control access to the mobile communication device itself and/or access functionality provided by the mobile communication device. The leash may be a simplistic wireless device, such as a wristband, card device or smart tag device having the sole function of controlling access to the mobile communication device itself (e.g., shutdown or locking the device) and/or access functionality provided by the mobile communication device (e.g., locking certain application or limiting access to data within certain applications).
    Type: Application
    Filed: April 20, 2022
    Publication date: October 26, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventor: Dustin Paul Stocks
  • Patent number: 11797669
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing any harmful information from spreading to other applications and systems on a network. The isolation systems are physically and/or logically separated from other systems on the network. A plurality of virtual containers, which may be disposable and specific to each analyst, may be utilized to analyze the suspicious information within the isolation systems. Should a virtual container be infected with harmful information it may be discarded a new virtual container may be used to review the suspicious information. A non-native application may be used to transform the format of the suspicious information into a non-native format in order to aid preventing the harmful information from infecting the other systems on the network.
    Type: Grant
    Filed: June 22, 2020
    Date of Patent: October 24, 2023
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Dustin Paul Stocks, Jon Codispoti, Kyle Mayers
  • Publication number: 20230319032
    Abstract: Systems, computer program products, and methods are described herein for implementing device manipulation for counteracting facial recognition authentication security malfeasance. The present invention is configured to receive a request from a user via a client device to access an authentication subsystem to execute a facial recognition authentication for access to an application; initiate the facial recognition authentication on the client device in response to receiving the request; receive, from the client device, one or more external inputs in response to one or more authentication prompts; determine, using a machine learning subsystem, that at least one of the one or more external inputs is associated with a first preconfigured duress code; trigger, using a breach detection subsystem, a first set of security protocols; and execute, using the breach detection subsystem, a first set of predefined actions associated with the first set of security protocols.
    Type: Application
    Filed: April 4, 2022
    Publication date: October 5, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: George Anthony Albero, Edward Lee Traywick, Ariel Fontaine Hill, Jake Michael Yara, Dustin Paul Stocks
  • Patent number: 11636203
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in a way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The analyst may set the virtual environment configurations (e.g., applications, programs, settings, etc.) of the virtual container. The analyst may determine how the suspicious information effects the virtual environment configuration and/or use tools to analyze the suspicious information. When harmful information is identified the virtual container may be discarded (e.g., folded up and deleted), and a new virtual container may be provided to the analyst to continue to analyze the suspicious information and/or new suspicious information.
    Type: Grant
    Filed: June 22, 2020
    Date of Patent: April 25, 2023
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Kyle Mayers, George Albero, Jon Codispoti, Jinna Zevulun Kim, Dustin Paul Stocks
  • Patent number: 11574056
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The suspicious information may first be checked for signatures or patterns before being analyzed by the analyst or the isolation system. The identified signatures or patterns are then compared with the stored signatures or patterns to determine whether the suspicious information comprises harmful information or not. When the identified signatures or patterns are matched with stored signatures or patterns, the system may determine that the suspicious information comprises harmful information and performs one or more mitigation actions.
    Type: Grant
    Filed: June 26, 2020
    Date of Patent: February 7, 2023
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: George Albero, Jinna Zevulun Kim, Dustin Paul Stocks
  • Publication number: 20220407921
    Abstract: A system is provided including a host processor, a plurality of service processors, a universal processor associated with the host processor and capable of exchanging data with each service processor, a first user device of the first user and a second user device of a second user. The universal processor receives a request from the first user device for a data transaction between the host processor and a service processor, and in response generates a code that can be interpreted by the service processor. Universal processor transmits the code to the first user device, which transmits the code to the second user device. The second user device transmits the code to the service processor. The service processor decodes the code and requests the universal processor to perform the data transaction with the host processor. In response, the universal processor sets up the data transaction.
    Type: Application
    Filed: June 18, 2021
    Publication date: December 22, 2022
    Inventors: Dustin Paul Stocks, Jinna Zevulun Kim, Robert Nyeland Huggins, Pratap Dande, George Anthony Albero
  • Patent number: 11269991
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The suspicious information may first be hashed before being analyzed by the analyst. The hash for the suspicious information may be compared to stored hashes. When the hash meets a stored harmful hash the suspicious information may be determined to include harmful information without having to be further analyzed. When the hash meets a stored acceptable hash the suspicious information may be determined to be acceptable information without having to be further analyzed. Should the hash for the suspicious information fail to meet any stored hashes, then the suspicious information may be analyzed for harmful information within the virtual container.
    Type: Grant
    Filed: June 22, 2020
    Date of Patent: March 8, 2022
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Dustin Paul Stocks, George Albero, Jinna Zevulun Kim
  • Publication number: 20210406372
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The suspicious information may first be checked for signatures or patterns before being analyzed by the analyst or the isolation system. The identified signatures or patterns are then compared with the stored signatures or patterns to determine whether the suspicious information comprises harmful information or not. When the identified signatures or patterns are matched with stored signatures or patterns, the system may determine that the suspicious information comprises harmful information and performs one or more mitigation actions.
    Type: Application
    Filed: June 26, 2020
    Publication date: December 30, 2021
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: George Albero, Jinna Zevulun Kim, Dustin Paul Stocks
  • Publication number: 20210397989
    Abstract: Embodiments of the present invention provide a system monitoring and identifying real-time indicators and patterns to predict occurrence of real-time events. The system is configured for continuously gathering and monitoring real-time data from one or more monitoring devices associated with the entity, identifying that at least one user device is within a predetermined distance and automatically transmit a prompt to the user device to connect to a beacon, identifying that at least one user associated with the at least one user device has connected to the beacon, continuously monitoring the at least one user device in real-time, identifying occurrence of a potential real-time event based on continuously monitoring the at least one user device and the real-time data from the one or more monitoring devices, via an artificial intelligence engine.
    Type: Application
    Filed: June 22, 2020
    Publication date: December 23, 2021
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Kyle Mayers, George Albero, Jinna Zevulun Kim, Philip Lone Mintac, Dustin Paul Stocks
  • Publication number: 20210397703
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing any harmful information from spreading to other applications and systems on a network. The isolation systems are physically and/or logically separated from other systems on the network. A plurality of virtual containers, which may be disposable and specific to each analyst, may be utilized to analyze the suspicious information within the isolation systems. Should a virtual container be infected with harmful information it may be discarded a new virtual container may be used to review the suspicious information. A non-native application may be used to transform the format of the suspicious information into a non-native format in order to aid preventing the harmful information from infecting the other systems on the network.
    Type: Application
    Filed: June 22, 2020
    Publication date: December 23, 2021
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Dustin Paul Stocks, Jon Codispoti, Kyle Mayers
  • Publication number: 20210397699
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The suspicious information may first be hashed before being analyzed by the analyst. The hash for the suspicious information may be compared to stored hashes. When the hash meets a stored harmful hash the suspicious information may be determined to include harmful information without having to be further analyzed. When the hash meets a stored acceptable hash the suspicious information may be determined to be acceptable information without having to be further analyzed. Should the hash for the suspicious information fail to meet any stored hashes, then the suspicious information may be analyzed for harmful information within the virtual container.
    Type: Application
    Filed: June 22, 2020
    Publication date: December 23, 2021
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Dustin Paul Stocks, George Albero, Jinna Zevulun Kim
  • Publication number: 20210397706
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze the suspicious information. The analyst may utilize a non-native application to analyze the suspicious information within the virtual container. The non-native application may be used to analyze the suspicious information in an analysis format instead of an original format for which the suspicious information, and any harmful information therein, were intended to be accessed. Additionally, the virtual containers may be accessed through the use of an API that allows an analyst to analyze the suspicious information in the virtual container without transferring information from the virtual container back to the analyst user computer system.
    Type: Application
    Filed: June 22, 2020
    Publication date: December 23, 2021
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Dustin Paul Stocks, Jon Codispoti
  • Publication number: 20210397707
    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. The isolation systems are physically and/or logically separated from other systems on the network. A plurality of virtual containers, which may be disposable and specific to each analyst, may be utilized to analyze the suspicious information within the isolation systems. The isolation system automatically performs analysis of the suspicious information in parallel, via an automated intelligent engine to identify presence of harmful information in the suspicious information. In response to identifying the at least harmful information in the suspicious information, the isolation system determines a type of the harmful information and transmits one or more notifications to one or more users based on the type of the harmful information.
    Type: Application
    Filed: June 22, 2020
    Publication date: December 23, 2021
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Jinna Zevulun Kim, George Albero, Kyle Mayers, Dustin Paul Stocks