Patents by Inventor Sanjay Arjun Lohar
Sanjay Arjun Lohar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240394726Abstract: Systems and methods of the present invention include the ability to physically embed certain data within the physical characteristics of a product which aid in verifying the product's authenticity. From a technical perspective, creating a system that validates the authenticity of a physical product using an embedded unique code involves several steps. In some embodiments, this may include unique code embedding. The unique code can be embedded into the product during its manufacturing process. This could be a barcode, QR code, RFID tag, unique set of threads or rivet patterns, or any other type of physical marker that can be uniquely associated with the product.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240394390Abstract: A system is provided for authentication using tokenization of a resource prior to resource allocation. In particular, the system may generate a resource token associated with a target resource to be transferred through a virtual environment. The resource token may be stored on a distributed ledger and may comprise an ownership identifier such as a cryptographic address associated with an entity that has ownership over the resource. The resource token may further comprise a resource identifier associated with the resource. Accordingly, the system may validate the resource identifier against an authorized resource database. If a match is detected, the system may publish an authentication data record to the distributed ledger indicating that the resource is authentic. In this way, the system provides a secure, efficient way to validate resources within a virtual environment.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240394708Abstract: A system is provided for authentication of resource transfers using tokenization as indicator of authorized resource distribution. In particular, the system may be configured to generate a secure transferor token on a distributed register, where each transferor token may be associated with a resource transferor within a virtual environment. The transferor token may be digitally signed using a transferor private key such that the transferor may be authenticated by entities using the corresponding public key. The system may further generate a secure token associated with the resource to be transferred, where the token associated with the resource may specify a list of authorized transferors as one of its parameters. Accordingly, the system may ensure that resources are transferred by authorized transferors.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240394692Abstract: A system is provided for authentication of a resource transfer target after resource allocation. In particular, the system may generate a secure token associated with the target of the resource transfer as part of a registration process. In this regard, the token may comprise various types of information regarding the target, which may include a cryptographic address associated with the target. Upon receiving a request to transfer a resource, the system may prompt the target to input information associated with the target and/or the resource transfer, and subsequently prompt the target to digitally sign a data record associated with the resource transfer using a private key associated with the target. Based on comparing the information provided by the user with the information obtained by the system in decrypting the data record, the system may perform authentication of the target.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240394707Abstract: Systems, computer program products, and methods are described herein for self-authenticating a resource transfer request within an electronic network. The present disclosure is configured to receive a resource transfer request within the electronic network between a transferor and a transferee; generate a self-authenticating smart contract comprised of a transferor NFT and a transferee NFT; authenticate the transferor and the transferee through the transferor NFT and the transferee NFT respectively; authenticate the resource transfer request upon authentication of the transferor and transferee; and trigger a resource transfer between the transferor and the transferee.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, Pamela Elizabeth Barnes, Nicholas Stephen Rose, James J. Siekman, Marabella Youkhaneh White
-
Publication number: 20240394678Abstract: Systems and methods are described herein for recording and verifying digital actions that support or coincide with actions taken in real environments. This technology can help mitigate the chance of malfeasance, as each action is recorded in a public, tamper-proof ledger, accessible by all participants of an action. Non-fungible tokens (NFTs) can further enhance the authentication of digital goods in simulated environments by providing unique, verifiable digital resources. Each NFT represents a distinct, indivisible, and scarce digital item, making it easy to authenticate and trace the ownership and provenance of the good.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, James J. Siekman, Marabella Youkhaneh White, Pamela Elizabeth Barnes, Nicholas Stephen Rose
-
Publication number: 20240372863Abstract: Systems, computer program products, and methods are described herein for monitoring and restricting electronic communication in a network based on communication characteristics. The method includes receiving an electronic communication from an end-point device. The method also includes identifying a potential user identity associated with the electronic communication. The potential user identity is based on one or more user identifiers associated with the electronic communication. The method further includes determining one or more restriction tags relating to the potential user identity. Each of the one or more restriction tags include a restriction to communication between the end-point device and one or more entity users. The method still further includes causing a restriction action to be executed based on determining the potential user identity has one or more restriction tags.Type: ApplicationFiled: May 4, 2023Publication date: November 7, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, Kyle Mayers, Karen Stanek McFeeters, James J. Siekman, Anna Rose Burchman
-
Publication number: 20240372877Abstract: Systems, computer program products, and methods are described herein for detecting synthetic activity in a network via use of interactive artificial intelligence are provided. The method includes receiving a first account communication from an end-point device. The first account communication is associated with a user. The method also includes causing a transmission of a first reply communication based on the first account communication to be provided to the end-point device. The method further includes receiving a second account communication. The method still further includes determining a synthetic likelihood value based on the first account communication and/or the second account communication. The synthetic likelihood value indicates the likelihood that the first account communication and/or second account communication are synthetic.Type: ApplicationFiled: May 4, 2023Publication date: November 7, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Cody Dean Searl, Sanjay Arjun Lohar, Kyle Mayers, Karen Stanek McFeeters
-
Publication number: 20240331707Abstract: Systems, computer program products, and methods are described herein for digital voice data processing and authentication. The present invention is configured to receive a user interaction comprising a digital audio signal and capture a first audio segment and a second audio segment of the digital audio signal. The first audio segment and the second audio segment are plotted into corresponding first and second plots. The first and second plots are compared, wherein comparing comprises subtracting the first plot from the second plot to form a difference plot. A quantity of outlier peaks is determined, then an artificial user probability is assigned to the user interaction, wherein the artificial user probability is low if the quantity of outlier peaks is greater than a predetermined outlier peak threshold. The artificial user probability is then displayed on a user interface of an endpoint device.Type: ApplicationFiled: April 3, 2023Publication date: October 3, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: James J. Siekman, Tomas M. Castrejon, III, Sanjay Arjun Lohar, Kyle Mayers, Karen Stanek McFeeters
-
Publication number: 20240267410Abstract: A method for analyzing messages for malicious content is provided. The method includes intercepting a message comprising a quick response (QR) code or a uniform resource locator (URL). The QR code corresponds to the URL. A status of the message is determined by determining a source of the message. The source of the message is compared to known malicious sources. In response to the source of the message not matching any of the known malicious sources, the source of the message is compared to known safe sources. In response to the source of the message not matching any of the known safe sources, the URL is compared to known malicious URLs. In response to the URL matching a respective one of the known malicious URLs, the status of the message is determined as malicious. The message is released to be displayed along with the status.Type: ApplicationFiled: February 3, 2023Publication date: August 8, 2024Inventors: Charlene Moss Gorter, Kyle Andrew Mayers, Sanjay Arjun Lohar, James Siekman, Connor Thomas McCormick
-
Publication number: 20240221349Abstract: Detecting targeted images, as well as variations thereof within computing networks, such as the Internet and the Metaverse. Navigation to predetermined websites and accessing the HTML code to search for image file extensions and, in some instances video file extensions within the listing of URLs. In response to finding URLs with image or video file extensions, the hyperlink is activated to navigate to the webpage containing the associated image or video and the image or video is downloaded for purposes of target image detection analysis. A virtual surveillance drone is deployed within virtual reality computing systems to navigate the entirety of the environment to search for images or, in some instances videos that may be displayed and, more specifically, images that appear to match or resemble the targeted image. The drone is capable of capturing the images and communicating the images to non-virtual computing systems for purposes of target image detection analysis.Type: ApplicationFiled: January 3, 2023Publication date: July 4, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Sanjay Arjun Lohar, Kyle Mayers, Karen Stanek McFeeters, Elias J. Risola
-
Patent number: 11769324Abstract: A system includes a plurality of sensors distributed about a space. Each sensor generates sensor data associated with properties of one or more people in the space. A gateway device receives the sensor data from each of the plurality of sensors and provides the sensor data to an automated response subsystem over a network. The automated response subsystem receives the sensor data. A first feature value is determined based on the received sensor data. An event score is determined based on the first feature value. The event score is compared to predefined response criteria. Based on the comparison of the event score to the predefined response criteria, an actionable event is detected, and an automated response to initiate for the detected actionable event is identified. One or both of an alert and instructions are provided in order to initiate the automated response.Type: GrantFiled: April 19, 2021Date of Patent: September 26, 2023Assignee: Bank of America CorporationInventors: Daniel Mercado, Andrew Thomas Boyd, Sanjay Arjun Lohar, Michael James Sbandi
-
Patent number: 11620888Abstract: A system includes a plurality of sensors distributed about a space. Each sensor generates sensor data associated with properties of one or more people in the space. An automated response subsystem receives the sensor data. An unauthorized activity performed by a first person in the space is detected based on at least a portion of the received sensor data. In response to detecting the unauthorized activity, tracking instructions are transmitted that identify the first person associated with the unauthorized activity. A tracking device receives the tracking instructions. A device associated with the first person is detected. Over a period of time, the tracking device sends queries to the device and receives corresponding responses from the device. The tracking device determines positions of the device within the space over the period of time.Type: GrantFiled: April 19, 2021Date of Patent: April 4, 2023Assignee: Bank of America CorporationInventors: Daniel Mercado, Andrew Thomas Boyd, Sanjay Arjun Lohar, Michael James Sbandi
-
Publication number: 20220335241Abstract: A system includes a plurality of sensors distributed about a space. Each sensor generates sensor data associated with properties of one or more people in the space. A gateway device receives the sensor data from each of the plurality of sensors and provides the sensor data to an automated response subsystem over a network. The automated response subsystem receives the sensor data. A first feature value is determined based on the received sensor data. An event score is determined based on the first feature value. The event score is compared to predefined response criteria. Based on the comparison of the event score to the predefined response criteria, an actionable event is detected, and an automated response to initiate for the detected actionable event is identified. One or both of an alert and instructions are provided in order to initiate the automated response.Type: ApplicationFiled: April 19, 2021Publication date: October 20, 2022Inventors: Daniel Mercado, Andrew Thomas Boyd, Sanjay Arjun Lohar, Michael James Sbandi
-
Publication number: 20220335791Abstract: A system includes a plurality of sensors distributed about a space. Each sensor generates sensor data associated with properties of one or more people in the space. An automated response subsystem receives the sensor data. An unauthorized event is detected associated with an adaptive-security device operating within the space and operating instructions are transmitted that identify security protocols to increase security of devices during the unauthorized event. An adaptive-security device operates within the space and receives the operating instructions. After receiving the operating instructions, the adaptive-security device determines whether a user is currently accessing secure information in the adaptive-security device. If the user is currently accessing the secure information, display of at least a portion of the secure information is prevented. If the user is not currently accessing the secure information, authentication requirements are increased for accessing the secure information.Type: ApplicationFiled: April 19, 2021Publication date: October 20, 2022Inventors: Daniel Mercado, Andrew Thomas Boyd, Sanjay Arjun Lohar, Michael James Sbandi
-
Publication number: 20220335796Abstract: A system includes a plurality of sensors distributed about a space. Each sensor generates sensor data associated with properties of one or more people in the space. An automated response subsystem receives the sensor data. An unauthorized activity performed by a first person in the space is detected based on at least a portion of the received sensor data. In response to detecting the unauthorized activity, tracking instructions are transmitted that identify the first person associated with the unauthorized activity. A tracking device receives the tracking instructions. A device associated with the first person is detected. Over a period of time, the tracking device sends queries to the device and receives corresponding responses from the device. The tracking device determines positions of the device within the space over the period of time.Type: ApplicationFiled: April 19, 2021Publication date: October 20, 2022Inventors: Daniel Mercado, Andrew Thomas Boyd, Sanjay Arjun Lohar, Michael James Sbandi