Patents by Inventor Sounil Yu

Sounil Yu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150248555
    Abstract: A method is disclosed, where some embodiments of the method include installing at least one benign malware indicator on one or more computing devices, monitoring the one or more computing devices for the presence of the at least one benign malware indicator, and responsive to determining the benign malware indicator is no longer present, sending a notification indicating the benign malware indicator is no longer detected as present on the one or more computing devices. Other embodiments include performing an antivirus scan or identifying unauthorized software programs. An apparatus and one or more non-transitory computer-readable media storing computer-readable instructions capable of performing similar actions, the latter in conjunction with a computer executing instructions stored on the media, are also disclosed.
    Type: Application
    Filed: May 11, 2015
    Publication date: September 3, 2015
    Inventor: Sounil Yu
  • Patent number: 9058488
    Abstract: A method is disclosed, where some embodiments of the method include installing at least one benign malware indicator on one or more computing devices, monitoring the one or more computing devices for the presence of the at least one benign malware indicator, and responsive to determining the benign malware indicator is no longer present, sending a notification indicating the benign malware indicator is no longer detected as present on the one or more computing devices. Other embodiments include performing an antivirus scan or identifying unauthorized software programs. An apparatus and one or more non-transitory computer-readable media storing computer-readable instructions capable of performing similar actions, the latter in conjunction with a computer executing instructions stored on the media, are also disclosed.
    Type: Grant
    Filed: August 14, 2013
    Date of Patent: June 16, 2015
    Assignee: Bank of America Corporation
    Inventor: Sounil Yu
  • Publication number: 20150154722
    Abstract: A method and system of deterring crime by analyzing short-range signals broadcast by mobile wireless personal communication devices. Business places have sensors that are used to detect the short-range broadcast signals. The device signatures are identified by the short-range broadcast signals. When there is a crime event at the business place, a suspect device signature is identified.
    Type: Application
    Filed: November 29, 2014
    Publication date: June 4, 2015
    Inventors: Sounil Yu, Steven Sounyoung Yu
  • Publication number: 20150143537
    Abstract: Systems, methods, computer-readable media, and apparatuses for identifying a source of an unauthorized disclosure of information are provided. For instance, a document may be generated and transmitted to a plurality of users. The document transmitted may be the same document (e.g., no additional documents are created for different users). Upon accessing the document, users in different groups of users may view different data items in a data item field in the document. If a disclosure is made, the data item disclosed may aid in identifying the group of users who viewed that data item and may be the source of the disclosure. That identified group may then be further sorted or divided into two or more subgroups and another document may be transmitted to the plurality of users. The process may continue in this manner until a source of the disclosure is identified.
    Type: Application
    Filed: November 20, 2013
    Publication date: May 21, 2015
    Applicant: BANK OF AMERICA CORPORATION
    Inventor: Sounil Yu
  • Patent number: 9027106
    Abstract: A login request to access information associated with a website may be received from a user device accessing the website via a browser. A determination may be made as to whether a browser attribute of the browser, font type, or service set identifier (SSID) information is located within a database. A further determination may be made as to whether to grant access to the information associated with the website. The determination as to whether to grant access to the information associated with the website may be based at least in part on the browser attribute font type, or service set identifier (SSID) information.
    Type: Grant
    Filed: August 14, 2013
    Date of Patent: May 5, 2015
    Assignee: Bank of America Corporation
    Inventor: Sounil Yu
  • Publication number: 20150101050
    Abstract: Methods, systems, computer-readable media, and apparatuses for detecting and measuring malware threats are presented. In some embodiments, a computing device may collect malware detection data from one or more monitored applications. Subsequently, the computing device may aggregate the collected malware detection data. Then, the computing device may generate a heat map based on the aggregation of the collected malware detection data, where the heat map is configured to identify one or more malware threats associated with one or more monitored applications. In some arrangements, collecting the malware detection data may include monitoring various aspects of a client computing device and/or the client computing device's communications with one or more servers and/or other devices that may be configured to provide the one or more monitored applications.
    Type: Application
    Filed: October 7, 2013
    Publication date: April 9, 2015
    Applicant: Bank of America Corporation
    Inventors: Brett Nielson, Sounil Yu
  • Publication number: 20150089643
    Abstract: Methods, apparatuses, and computer readable media for malicious request attribution are presented. For example, according to one aspect, requests for one or more records may be received from a requesting computing device. A determination may be made that the requests are of a malicious nature. Responsive to determining that the requests are of a malicious nature, one or more requests for obtaining information about the requesting computing device may be generated, and communicated to the requesting computing device. In some embodiments, at least one of the one or more requests for obtaining information about the requesting computing device may be configured to cause the requesting computing device to fail to properly render at least a portion of a web page comprising at least one of the one or more records.
    Type: Application
    Filed: November 26, 2014
    Publication date: March 26, 2015
    Inventor: Sounil Yu
  • Publication number: 20150066989
    Abstract: Data specifying a new edge of a graph database may be received. A data store for storing the new edge may be identified from amongst a plurality of data stores utilized to store one or more portions of the graph database. Each of the plurality of data stores may be associated with a set of values corresponding to an aspect of edges of the graph database. The data store for storing the new edge may be identified based on the new edge being associated with a value corresponding to the aspect of edges of the graph database that is within a set of values corresponding to the aspect of edges of the graph database associated with the data store for storing the new edge.
    Type: Application
    Filed: August 28, 2013
    Publication date: March 5, 2015
    Applicant: Bank of America Corporation
    Inventor: Sounil Yu
  • Publication number: 20150067862
    Abstract: Methods of analyzing malware and other suspicious files are presented, where some embodiments include analyzing the behavior of a first malware sample on both a virtual machine and a physical computing device, the physical device having been booted from a secondary boot source, and determining whether the behavior of the malware sample was different on the virtual machine and the physical computing device. In certain embodiments, a notification indicating that the behavior was different may be generated. In other embodiments, a malware analysis computing device that is configured to receive a base hard drive image may be networked booted, and the behavior of the malware sample on the malware analysis computing device may be analyzed. In certain embodiments, a malware-infected hard drive image may then be copied off the malware analysis computing device for further forensic analysis.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 5, 2015
    Applicant: Bank of America Corporation
    Inventors: Sounil Yu, Christopher Schafer
  • Publication number: 20150066763
    Abstract: Methods and apparatuses for detecting nefarious activity by providing to others false information and tracking the use of the false information to determine in what way unlawfully taken information is used across several banking channels are presented. An example system can be configured to introduce certain predetermined markers into account data when it is determined that a user's account has been compromised, for example, during an online banking session. In this way, when a party unlawfully takes the user's account information, that party will also copy the markers from the user's account data. Therefore, when the party attempts to use the user's account data, the party will also include the markers added to the user's account. The markers can be information that is added that does not affect the transaction so the transaction can be conducted, and the system can recognize that the transaction may be nefarious.
    Type: Application
    Filed: August 29, 2013
    Publication date: March 5, 2015
    Applicant: Bank of America Corporation
    Inventor: Sounil Yu
  • Publication number: 20150052579
    Abstract: A login request to access information associated with a website may be received from a user device accessing the website via a browser. A determination may be made as to whether a browser attribute of the browser, font type, or service set identifier (SSID) information is located within a database. A further determination may be made as to whether to grant access to the information associated with the website. The determination as to whether to grant access to the information associated with the website may be based at least in part on the browser attribute font type, or service set identifier (SSID) information.
    Type: Application
    Filed: August 14, 2013
    Publication date: February 19, 2015
    Applicant: Bank of America Corporation
    Inventor: Sounil Yu
  • Publication number: 20150052519
    Abstract: Aspects of the present disclosure are directed to methods and systems of hypervisor driven embedded endpoint security monitoring. A computer implemented method may include providing one or more computer processors configured to operate a bare-metal hypervisor; launching a user OS virtual machine operatively connected to the hypervisor; launching a security virtual machine operatively connected to the hypervisor and receiving data from the security virtual machine via the hypervisor; and receiving data representative of security information from the computer processor processed by the security virtual machine. The hypervisor may include using a virtual switch for providing communications between the user OS virtual machine and the security virtual machine. The method may include using the security virtual machine to monitor malware on the user OS virtual machine.
    Type: Application
    Filed: August 14, 2013
    Publication date: February 19, 2015
    Applicant: Bank of America Corporation
    Inventor: Sounil Yu
  • Publication number: 20150052605
    Abstract: A method is disclosed, where some embodiments of the method include installing at least one benign malware indicator on one or more computing devices, monitoring the one or more computing devices for the presence of the at least one benign malware indicator, and responsive to determining the benign malware indicator is no longer present, sending a notification indicating the benign malware indicator is no longer detected as present on the one or more computing devices. Other embodiments include performing an antivirus scan or identifying unauthorized software programs. An apparatus and one or more non-transitory computer-readable media storing computer-readable instructions capable of performing similar actions, the latter in conjunction with a computer executing instructions stored on the media, are also disclosed.
    Type: Application
    Filed: August 14, 2013
    Publication date: February 19, 2015
    Applicant: Bank of America Corporation
    Inventor: Sounil Yu
  • Publication number: 20150052453
    Abstract: Systems, methods and apparatuses for identifying and/or displaying an availability or virtual position of a user are provided. In some examples, a virtual position display may be provided and may include a plurality of user indicators. The user indicators may include an availability of the user. In some examples, a user may adjust a position of a user indicator. Adjustment of the user indicator closer to another user indicator may indicate an increased availability status of the user, while adjustment of the indicator away from another user indicator may indicate a decreased availability of the user. In some examples, the user indicator may include a level of activity indication received from one or more sensing devices associated with the user.
    Type: Application
    Filed: August 13, 2013
    Publication date: February 19, 2015
    Applicant: Bank of America Corporation
    Inventors: Sounil Yu, Dale Binder
  • Patent number: 8931093
    Abstract: Methods, apparatuses, and computer readable media for malicious request attribution are presented. For example, according to one aspect, requests for one or more records may be received from a requesting computing device. A determination may be made that the requests are of a malicious nature. Responsive to determining that the requests are of a malicious nature, one or more requests for obtaining information about the requesting computing device may be generated, and communicated to the requesting computing device. In some embodiments, at least one of the one or more requests for obtaining information about the requesting computing device may be configured to cause the requesting computing device to fail to properly render at least a portion of a web page comprising at least one of the one or more records.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: January 6, 2015
    Assignee: Bank of America Corporation
    Inventor: Sounil Yu
  • Publication number: 20150006005
    Abstract: An autonomous unmanned road vehicle and how it can be used to make deliveries. The unmanned vehicle is capable of operating autonomously on paved roadways. The vehicle has a control system for autonomous driving and a perception system for detecting objects in its surroundings. The vehicle also has one or more cargo compartments for carrying the delivery items. The vehicle may have a flashing light beacon to increase the conspicuousness of the vehicle. In consideration that the vehicle does not carry passengers, the size and/or motor power of the vehicle may be reduced as compared to conventional passenger vehicles.
    Type: Application
    Filed: June 29, 2014
    Publication date: January 1, 2015
    Inventors: Steven Sounyoung Yu, Sounil Yu
  • Publication number: 20140283028
    Abstract: Methods, apparatuses, and computer readable media for malicious request attribution are presented. For example, according to one aspect, requests for one or more records may be received from a requesting computing device. A determination may be made that the requests are of a malicious nature. Responsive to determining that the requests are of a malicious nature, one or more requests for obtaining information about the requesting computing device may be generated, and communicated to the requesting computing device. In some embodiments, at least one of the one or more requests for obtaining information about the requesting computing device may be configured to cause the requesting computing device to fail to properly render at least a portion of a web page comprising at least one of the one or more records.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: BANK OF AMERICA CORPORATION
    Inventor: Sounil Yu