Patents by Inventor Rahul Yaksh
Rahul Yaksh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250131073Abstract: Embodiments of the present invention provide a system for generating on-demand single-use biometric authentication credentials. The system is configured for determining initiation of an authentication request to access a resource from a user device of a user, prompting the user to select a type of authentication credential from one or more types of authentication credentials, receiving a selection of the type of the authentication credential, instantaneously generating a single-use unique authentication credential associated with the type of the authentication credential, via one or more machine learning models, and transmitting the single-use unique authentication credential to the user device for use in authentication of the user in gaining accessing to the resource.Type: ApplicationFiled: October 23, 2023Publication date: April 24, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Elvis Nyamwange, Sailesh Vezzu, Amer Ali, Rahul Shashidhar Phadnis, Rahul Yaksh, Hari Vuppala, Pratap Dande, Brian Neal Jacobson, Erik Dahl
-
Publication number: 20250103848Abstract: Intelligent autonomous software (i.e., a “bot”) configured to compile and present resource advancement requestor-specific dashboards that summarize the results of analysis of resource advancement data related to the resource advancement request/requestor. In compiling a dashboard presentation for a specific resource advancement requestor, the intelligent autonomous software executes a set of predetermined queries directed to a database that stores the results of the data analysis. In response to receiving the responses to the queries, the intelligent autonomous software is configured to identify data omissions/anomalies in the data that will prevent approval of the resource advancement request and identify, and in some instances generate, corrective action(s) that will rectify the data omissions/anomalies.Type: ApplicationFiled: September 25, 2023Publication date: March 27, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Pratap Dande, Amer Ali, Erik Dahl, Brian Neal Jacobson, Elvis Nyamwange, Rahul Shashidhar Phadnis, Sailesh Vezzu, Hari Vuppala, Rahul Yaksh
-
Publication number: 20250086623Abstract: Systems, computer program products, and methods for collecting and storing digital transfer records are provided. The method includes receiving a data transfer request for a data transfer associated with a user. The method also includes causing an execution of the data transfer associated with the user. An executed data transfer record is created for the data transfer. The method further includes receiving a detailed data transfer record associated with the data transfer. The detailed data transfer record indicates one or more transfer items associated with the data transfer. The method still further includes generating a combined data transfer record based on the detailed data transfer record and the executed data transfer record on a digital ledger that includes information relating to the data transfer. The method also includes causing a rendering of a user interface configured to display the combined data transfer record.Type: ApplicationFiled: September 7, 2023Publication date: March 13, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Elvis Nyamwange, Sailesh Vezzu, Amer Ali, Rahul Shashidhar Phadnis, Rahul Yaksh, Hari Vuppala, Pratap Dande, Brian Neal Jacobson, Erik Dahl
-
Publication number: 20250086634Abstract: Systems, computer program products, and methods for determining data transfer freezes are provided. The method includes receiving a freeze request from an end-point device associated with a user. The freeze request is associated with one or more connected data transfer entities and with a first account associated with the user. The freeze request is a request for a freeze of data transfers between the first account and any of the one or more connected data transfer entities. The method also includes cause a transmission of a decoy account information to a first connected data transfer entity. The decoy account information is different than an account information for the first account. The method further includes receiving a first data transfer request including the decoy account information. The method still further includes causing a rejection of the first data transfer request due to the decoy account information.Type: ApplicationFiled: September 7, 2023Publication date: March 13, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Rahul Yaksh, Sailesh Vezzu, Amer Ali, Rahul Shashidhar Phadnis, Elvis Nyamwange, Hari Vuppala, Pratap Dande, Brian Neal Jacobson, Erik Dahl
-
Patent number: 12250225Abstract: Systems, computer program products, and methods are described herein for validation of electronic data transfers in a distributed network via self-directed image data. The present invention is configured to receive a request for a transfer of electronic data from a first repository associated with a first user to a second repository associated with a second user, transfer the electronic data, generate and apply a first identifier to the electronic data, collect a geolocation of a second endpoint device, transmit the geolocation and a request for a verification of the geolocation to the first endpoint device, receive the verification of the geolocation, generate and apply a second identifier to the electronic data, transmit control signals to the second endpoint device to prompt collection of self-directed image data, and collect, using the second endpoint device, the self-directed image data.Type: GrantFiled: July 18, 2023Date of Patent: March 11, 2025Assignee: BANK OF AMERICA CORPORATIONInventors: Elvis Nyamwange, Amer Ali, Erik Dahl, Pratap Dande, Brian Neal Jacobson, Rahul Shashidhar Phadnis, Sailesh Vezzu, Hari Vuppala, Rahul Yaksh
-
Publication number: 20250077938Abstract: Systems, computer program products, and methods are described herein for determining process compliance using advanced computational models for data analysis and automated decision-making. The present disclosure is configured to generate one or more intermediate control layers, wherein the one or more intermediate control layers comprises one or more artificial intelligence models; generate one or more control objectives, wherein each of the one or more control objectives are associated with one or more governance processes; generate, in response to the one or more control objectives, one or more manifests; receive, in response to the one or more manifests, one or more artifacts, wherein the one or more artifacts comprise data associated with the one or more governance processes; capture data from the one or more artifacts; compare the captured data from the one or more artifacts with the one or more intermediate control layers; and approve the one or more artifacts.Type: ApplicationFiled: August 31, 2023Publication date: March 6, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Brian Neal Jacobson, Pratap Dande, Erik Dahl, Elvis Nyamwange, Rahul Yaksh, Amer Ali, Rahul Shashidhar Phadnis, Sailesh Vezzu, Hari Vuppala
-
Publication number: 20250068461Abstract: Systems, computer program products, and methods are described herein for determining data migration using an automated query analyzer tool. The present disclosure is configured to identify at least one input data set associated with at least one application; analyze, by an automated query analyzer tool, the at least one input data set; classify data of the at least one data set as at least one of a standard classification or a non-standard classification; determine at least one metric for the data of the at least one data set; generate a query complexity score for the at least one application; generate an application migration complexity report and an application migration complexity report interface component; and transmit the application migration complexity report interface component to a user device and configure a graphical user interface of the user device with the application migration complexity report interface component.Type: ApplicationFiled: August 23, 2023Publication date: February 27, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Hari Vuppala, Rahul Shashidhar Phadnis, Pratap Dande, Sailesh Vezzu, Amer Ali, Rahul Yaksh, Elvis Nyamwange, Brian Neal Jacobson, Erik Dahl
-
Publication number: 20250061469Abstract: Systems and methods for alerting an organization about activity that may be fraudulent. Systems may include a computer processor, a storage module, a cleaning module, a preprocessing module, a features extraction module, and a machine learning module. The computer processor may be configured to run a fraud detection engine by collecting publicly available electronic forms every 36 hours, using the modules to store the forms, clean the data, preprocess the data, and run a machine learning model to extract features and to determine if a threshold indicating a risk of fraud has been exceeded. The machine learning models include a liquid, solvency, and profitability ratio classification model, a disclosure classification model, a sentiment analysis model, an anomaly detection classification model, an ownership analysis classification model, and an ESG disclosure classification model. When exceeding a threshold, the computer processor may notify an administrator of the exceeded threshold's identity.Type: ApplicationFiled: August 17, 2023Publication date: February 20, 2025Inventors: Rahul Yaksh, Amer Ali, Brian Jacobson, Elvis Nyamwange, Erik Dahl, Hari Vuppala, Pratap Dande, Rahul Phadnis, Sailesh Vezzu
-
Publication number: 20250062908Abstract: Systems, computer program products, and methods are described herein for dynamic, secure, token-based snapshot generation. The present disclosure is configured to receive, via an alternative access point, a user request to receive a snapshot of one or more resource repositories associated with a user; generate, using a token generator, a token based on at least the user request; authenticate, using an authentication subsystem, the user using the token to confirm legitimacy of the user request; generate, using a snapshot generator, the snapshot of the one or more resource repositories based on at least confirming the legitimacy of the user request, wherein the snapshot is generated based on pre-defined user preferences; embed, using a digital signature subsystem, the snapshot with a digital signature serving as an attestation; and display the snapshot on the user input device.Type: ApplicationFiled: August 15, 2023Publication date: February 20, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Elvis Nyamwange, Sailesh Vezzu, Amer Ali, Rahul Yaksh, Hari Vuppala, Pratap Dande, Brian Neal Jacobson, Erik Dahl, Rahul Shashidhar Phadnis
-
Publication number: 20250053307Abstract: A computing platform may train, using historical information migration error information, an information reconciliation engine to predict information migration errors. The computing platform may detect migration of information from a source information system to a target information system. The computing platform may generate, by inputting the information into the information reconciliation engine, a list of predicted migration errors. The computing platform may sample the migrated information to identify a list of real time migration errors. The computing platform may identify corrective actions to address the list of predicted migration errors and the list of real time migration errors. The computing platform may generate, based on the corrective actions, a configuration file.Type: ApplicationFiled: August 8, 2023Publication date: February 13, 2025Inventors: Rahul Phadnis, Hari Vuppala, Rahul Yaksh, Pratap Dande, Elvis Nyamwange, Erik Dahl, Brian Jacobson, Sailesh Vezzu, Amer Ali
-
Publication number: 20250055752Abstract: Systems, computer program products, and methods for automated node failure detection across a multi-node network. The method includes receiving one or more node metrics. Each of the one or more node metrics are associated with a node of a distributed network with a plurality of nodes. The method also includes determining a potential failure node of the plurality of nodes based on at least one of the one or more node metrics. The potential failure node is the node associated with the at least one of the one or more node metrics. The at least one of the one or more node metrics is different than an expected node metric for the node. The method further includes determining one or more replacement nodes for the potential failure node. The one or more replacement nodes are capable of performing one or more operations being performed by the potential failure node. The method still further includes causing the one or more replacement nodes to replace one or more operations of the potential failure node.Type: ApplicationFiled: August 8, 2023Publication date: February 13, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Elvis Nyamwange, Sailesh Vezzu, Amer Ali, Rahul Shashidhar Phadnis, Rahul Yaksh, Hari Vuppala, Pratap Dande, Brian Neal Jacobson, Erik Dahl
-
Publication number: 20250037447Abstract: An apparatus may include conduction of a secure transfer at a point of identification using image recognition and blockchain authentication. The apparatus may include a computer processor, a camera, an image capturing machine, a reference database, an XGBoost image recognition machine learning model, and a blockchain. The computer processor may be an edge computing device. The computer processor may be configured to identify a user at a point of identification by capturing an image, running the Features detection engine to identify sets of features, running the XGBoost image recognition machine learning model to identify labels in the sets of features, and matching the sets of features and labels to a record in the reference database. The computer processor may further be configured to seek user approval on the user's portable device before providing the transfer. Once the user has approved the transfer, the transfer may be recorded in the blockchain.Type: ApplicationFiled: July 28, 2023Publication date: January 30, 2025Inventors: Elvis Nyamwange, Sailesh Vezzu, Amer Ali, Rahul Phadnis, Rahul Yaksh, Hari Vuppala, Pratap Dande, Brian Jacobson, Erik Dahl
-
Publication number: 20250037548Abstract: Aspects of the disclosure relate to detecting attempts to violate the security of an ATM. A computing system may determine whether an ATM is being used to perform a transaction. Based on the ATM not being used to perform a transaction, images of portions of the ATM may be generated. Estimated dimensions of the ATM may be determined. Digital twin data may be retrieved. The digital twin data may comprise a digital twin representation of the ATM and measured dimensions of the ATM. There may be a determination of whether the estimated dimensions of the ATM match the measured dimensions of the ATM. Based on the estimated dimensions of the ATM not matching the measured dimensions of the ATM, the ATM may be deactivated. Furthermore, a message indicating that the ATM was deactivated may be sent to a validation computing system.Type: ApplicationFiled: July 27, 2023Publication date: January 30, 2025Inventors: Elvis Nyamwange, Sailesh Vezzu, Amer Ali, Rahul Phadnis, Rahul Yaksh, Hari Vuppala, Pratap Dande, Brian Jacobson, Erik Dahl
-
Publication number: 20250036739Abstract: A video QR code may be used to authenticate a user using a user device. The video QR code may include a video in which a QR code is shown in motion over a time interval. The movement may be, for example, a change in position or orientation of the QR code. The authentication process may include generating the video QR code, causing a display of the video QR code, capturing, with the user device from the display, images of the QR code at specified times during the video, and determining whether there is a match between the captured images on the user device and the displayed images at the specified times. The authentication may also confirm the geolocation of the user device and the display match. The QR code may be extracted from the images. User access to a system may be granted upon verification of the QR code.Type: ApplicationFiled: July 26, 2023Publication date: January 30, 2025Inventors: Elvis Nyamwange, Sailesh Vezzu, Amer Ali, Rahul Phadnis, Rahul Yaksh, Hari Vuppala, Pratap Dande, Brian Jacobson, Erik Dahl
-
Publication number: 20250037005Abstract: Systems, computer program products, and methods are described herein for dynamic allocation of computational resources for optimized performance of ML models. The present disclosure is configured to receive a request to execute a ML model; determine computational requirements associated with the ML model; determine a subset of computational resources from a pool of computational resources to execute the ML model based on the computational requirements associated with the ML model; allocate the subset of computational resources to the ML model; and execute the ML model using the subset of computational resources.Type: ApplicationFiled: July 25, 2023Publication date: January 30, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Elvis Nyamwange, Erik Dahl, Brian Neal Jacobson, Pratap Dande, Hari Vuppala, Rahul Yaksh, Rahul Shashidhar Phadnis, Amer Ali, Sailesh Vezzu
-
Publication number: 20250036506Abstract: Systems, computer program products, and methods are described herein for using advanced computation models for data analysis and automated decision-making for root cause analysis within software. The present disclosure is configured to receive a set of file extensions associated with an error generated from an at least one piece of software; analyzing the set of file extensions using an advanced computation model for data analysis and automated decision-making; determining a set of root cause analysis from the analyzed set of file extensions using a root cause database; summarizing the set of root cause analysis using the advanced computation model for data analysis and automated decision making and a predetermined database of identifiers; and transmitting the summarized set of root cause analysis associated with the error generated from the at least one piece of software to an end-point device.Type: ApplicationFiled: July 28, 2023Publication date: January 30, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Brian Neal Jacobson, Amer Ali, Erik Dahl, Pratap Dande, Elvis Nyamwange, Rahul Shashidhar Phadnis, Sailesh Vezzu, Hari Vuppala, Rahul Yaksh
-
Publication number: 20250030625Abstract: Systems, computer program products, and methods are described herein for selective data routing in a distributed network via data throughput analysis in a distributed ledger network. The present invention is configured to receive a request for a data transmission from an endpoint device of a network, determine, via a routing module, a throughput of data associated with the data transmission, determine a classification of the data transmission, and assign the data transmission to an assigned routing channel. The assigned routing channel may include either a first routing channel or a second routing channel based on the classification, wherein the first routing channel is a light load network, and wherein the second routing channel is a heavy load network comprising a first multicore optical fiber.Type: ApplicationFiled: March 21, 2024Publication date: January 23, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Elvis Nyamwange, Amer Ali, Erik Dahl, Pratap Dande, Brian Neal Jacobson, Rahul Shashidhar Phadnis, Sailesh Vezzu, Hari Vuppala, Rahul Yaksh
-
Publication number: 20250028621Abstract: An apparatus may include a computer processor operating in a data center and running an AI/ML model. The apparatus may include a trace log agent and a telemetry agent. The computer processor may be configured to train and run the AI/ML model to determine if a resource in the data center is being utilized or is idle by using data provided by the trace log agent and a telemetry agent. The apparatus may include a status check engine, a discovery engine, and an analytics engine. The computer processor may be configured to run each of these engines to confirm a prediction by the AI/ML model that the resource is idle. The computer processor may be configured to notify an administrator of the data center if the AI/ML model predicts the resource is idle and the engines provide increased confidence to the prediction.Type: ApplicationFiled: July 20, 2023Publication date: January 23, 2025Inventors: Elvis Nyamwange, Erik Dahl, Brian Jacobson, Pratap Dande, Hari Vuppala, Rahul Yaksh, Rahul Phadnis, Amer Ali, Sailesh Vezzu
-
Publication number: 20250030717Abstract: Arrangements for detecting polymorphic botnets using a pattern matching engine are provided. The platform may train a pattern matching engine to generate image pattern statuses based on a training set of historical image patterns. The platform may automatically generate real-time interaction information based on monitoring interactions between user devices and cloud platforms. The platform may generate a potentially malicious image pattern based on the real-time interaction information. The platform may then input the image pattern into the pattern matching engine to generate an image pattern status for the image pattern. The platform may store the image pattern to a pattern storage repository. Based on identifying the image pattern as malicious, the platform may initiate a security action. The platform may update the pattern matching engine based on the image pattern and its image pattern status to detect future polymorphic botnet attacks.Type: ApplicationFiled: July 21, 2023Publication date: January 23, 2025Inventors: Elvis Nyamwange, Erik Dahl, Brian Jacobson, Pratap Dande, Hari Vuppala, Rahul Yaksh, Rahul Phadnis, Amer Ali, Sailesh Vezzu
-
Publication number: 20250030697Abstract: Systems, computer program products, and methods are described herein for validation of electronic data transfers in a distributed network via self-directed image data. The present invention is configured to receive a request for a transfer of electronic data from a first repository associated with a first user to a second repository associated with a second user, transfer the electronic data, generate and apply a first identifier to the electronic data, collect a geolocation of a second endpoint device, transmit the geolocation and a request for a verification of the geolocation to the first endpoint device, receive the verification of the geolocation, generate and apply a second identifier to the electronic data, transmit control signals to the second endpoint device to prompt collection of self-directed image data, and collect, using the second endpoint device, the self-directed image data.Type: ApplicationFiled: July 18, 2023Publication date: January 23, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Elvis Nyamwange, Amer Ali, Erik Dahl, Pratap Dande, Brian Neal Jacobson, Rahul Shashidhar Phadnis, Sailesh Vezzu, Hari Vuppala, Rahul Yaksh