Patents by Inventor Tomas M. Castrejon, III
Tomas M. Castrejon, III has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240004968Abstract: In a public setting, an audio/visual (A/V) obfuscation device can be used to provide privacy during a conversation occurring either in-person or via an electronic device. The A/V obfuscation device is configured to provide one or both of an electronic or physical barrier to ensure privacy for at least part of the conversation. The A/V obfuscation device provides audio masking and/or an optical block to impede third-parties from overhearing or observing the conversation. The A/V obfuscation device includes devices capable of capturing audio and/or video information of conversation participants and/or electronic devices. The captured audio and/or video information may be analyzed and processed to generate obfuscation audio and/or video signals to obscure at least a portion of aspects of the conversation.Type: ApplicationFiled: June 30, 2022Publication date: January 4, 2024Inventors: Tomas M. Castrejon, III, Benjamin F. Tweel, James Siekman
-
Publication number: 20230351023Abstract: A system is provided for remediation of security vulnerabilities in computing devices using continuous device-level scanning and monitoring. In particular, the system may perform a deep scan of the hardware and software elements of a computing device and/or application and compile the information from the deep scan into a hardware metadata list and a software metadata list associated with the computing device and/or application. The system may then, through a machine learning-based process, continuously scan the elements within the hardware metadata list and the software metadata list to identify the elements that are not involved in the operation of the computing device and/or application. The system may flag such elements for inspection to evaluate the safety of the elements and subsequently execute one or more remediation processes in response to detecting an unsafe element.Type: ApplicationFiled: May 2, 2022Publication date: November 2, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Manu Jacob Kurian, Joel Townsend, Tomas M. Castrejon, III, Michael Robert Young, David Nardoni
-
Publication number: 20230351012Abstract: Various systems, methods, and computer program products for providing data security using software library containers are provided. The method includes identifying a software library used by a first application with a potential vulnerability. The method also includes determining a software library permission for the software library used by the first application based on the potential vulnerability. The software library permission for the software library defines a level of functionality of at least a portion of the software library. The method further includes identifying one or more additional applications that use the software library. The method still further includes causing the software library permission to be applied to the software library installed on the first application and at least one of the one or more additional applications.Type: ApplicationFiled: April 27, 2022Publication date: November 2, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, Michael Robert Young, David Nardoni, Joel Townsend, Manu Jacob Kurian
-
Publication number: 20230333835Abstract: Various systems, methods, and computer program products are provided for dynamic code patch deployment within a distributed network. The method includes identifying one or more potential vulnerabilities within a software library that is associated with a first application within a decentralized network. The method also includes receiving a code update relating to the identified software library associated with the first application within the decentralized network. The method further includes identifying a second applications within the decentralized network that is also associated with the identified software library. The method still further includes causing a transmission of the code update to the second application within the decentralized network.Type: ApplicationFiled: April 19, 2022Publication date: October 19, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, Michael Robert Young, David Nardoni, Joel Townsend, Manu Jacob Kurian
-
Publication number: 20230319079Abstract: A system is provided for detecting and remediating computing system breaches using computing network traffic monitoring. In particular, the system may identify one or more technology elements within a network as well as relationships between computing systems associated with said elements to determine a network topology. Based on the network topology, the system may use historical network traffic data associated with the technology elements in the network to generate predicted entry points and lateral pathways of a security breach that may take place within particular computing systems. Then, based on the technology elements affected as well as entry points and path traversals of the breach, the system may generate and/or implement one or more remediation steps to address existing and/or future breaches. In this way, the system may provide an intelligent method of augmenting the security of a computing network.Type: ApplicationFiled: March 30, 2022Publication date: October 5, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, Manu Jacob Kurian, David Nardoni, Joel Townsend, Michael Robert Young
-
Publication number: 20230315439Abstract: Systems, computer program products, and methods are described herein for enhanced component-level detection in software applications. The present invention is configured to receive, from a client device, one or more data packets with payload containing a request to onboard a first application into a computing environment; determine, using an application ingestion subsystem, information associated with the first application; deploy, using a machine learning subsystem, a trained machine learning model on the information associated with the first application; determine, using the trained machine learning model, one or more components associated with the first application and one or more component scanning parameters for each of the one or more components; and build a software bill of materials (SBOM) for the first application based on at least the one or more components.Type: ApplicationFiled: March 29, 2022Publication date: October 5, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, Manu Jacob Kurian, David Nardoni, Joel Townsend, Michael Robert Young
-
Publication number: 20230300619Abstract: Systems, computer program products, and methods are described herein for dynamic communication channel switching for secure message propagation. The present invention may be configured to receive wireless signals from a plurality of devices and identify, from the plurality of devices and based on the wireless signals, a trusted device. The present invention may be configured to receive, from another device, a secure message, where the secure message includes information identifying a vulnerability in a network to which the trusted device is connected. The present invention may be configured to establish, based on receiving the secure message and using a first wireless communication interface, a communication link with a second wireless communication interface of the trusted device to establish a wireless data channel with the trusted device and transmit, via the wireless data channel, the secure message to the trusted device.Type: ApplicationFiled: March 21, 2022Publication date: September 21, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, Manu Jacob Kurian, David Nardoni, Joel Townsend, Michael Robert Young
-
Publication number: 20230297689Abstract: Systems, computer program products, and methods are described herein for deployable software vulnerability testing platform. The present invention is configured to receive, from a user input device, an initial request from a user to generate a deployable software vulnerability testing (SVT) engine; prompt an SVT dashboard for display on the user input device to receive one or more input parameters associated with the first vulnerability in response to receiving the initial request; receive, via the SVT dashboard, the one or more input parameters; generate the SVT engine based on at least the one or more input parameters; receive, from the user input device, one or more deployment parameters associated with a deployment of the SVT engine; and deploy the SVT engine within the distributed technology infrastructure to identify the one or more instances of the first vulnerability based on at least the one or more deployment parameters.Type: ApplicationFiled: March 21, 2022Publication date: September 21, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Manu Jacob Kurian, Tomas M. Castrejon, III, Michael Robert Young, David Nardoni, Joel Townsend
-
Patent number: 11645427Abstract: A system includes a device including one or more sensors that generate one or more signals used to detect whether an unauthorized activity has occurred at the device. The device is configured to transmit the one or more signals generated by the one or more sensors. The central monitoring device is configured to receive the one or more signals and compare the one or more signals with a baseline signal for the device. The baseline signal includes an expected signal for each of the one or more sensors when the unauthorized activity has not occurred. The monitoring device determines whether the unauthorized activity has occurred based on a result of the comparison.Type: GrantFiled: November 29, 2020Date of Patent: May 9, 2023Assignee: Bank of America CorporationInventors: Michael R. Young, Daniel J August, Tomas M. Castrejon, III, Richard Martin Seymour Scot, Neal Aaron Slensker
-
Publication number: 20230096182Abstract: Systems, methods, and computer program products are provided for identifying a potential malicious event. The method includes receiving a plurality of program actions comprising at least a first program action and a second program action. The first program action is initiated before the second program action. The method also includes comparing the plurality of program actions with at least one known malicious event pattern of actions. The at least one malicious event pattern of actions includes a sequence of program actions in a known malicious event. The method further includes determining a potential malicious event is occurring based on the comparison of the plurality of program actions with at least one known malicious event pattern of actions. The method still further includes determining a preventative response based on the potential malicious event.Type: ApplicationFiled: September 30, 2021Publication date: March 30, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, Christopher Daniel Birch, Christopher Stephen Littrell
-
Publication number: 20230101995Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for providing intelligent proactive identification of, and protection against, malfeasant data collection, user device control, or user account access. The invention utilizes a continuous data analysis technique in order to recognize patterns in device data and network communications indicative of remote device control requests, and responds to these identified data points by implemented an automated solution to protect users against unauthorized access of their devices or accounts.Type: ApplicationFiled: September 29, 2021Publication date: March 30, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, Peter Kurrasch, John Raymond Omernik, Richard Seymour Scot, Kevin Patrick Thomsen
-
Publication number: 20230080885Abstract: Systems, methods, and computer program products are provided for detecting a synthetic identity. The method includes receiving an identity verification request relating to an individual. The identity verification request includes one or more individual identifiers of the individual. The method also includes comparing at least one of the one or more individual identifiers to one or more known synthetic indicators. The one or more known synthetic indicators including at least one of a synthetic identifier type or a synthetic identifier value that correspond to one or more known synthetic identities. The method further includes determining a synthetic identity determination based on the comparison of the at least one of the one or more individual identifiers to the one or more known synthetic indicators. The synthetic identity determination indicates whether an identity verification request is a potential synthetic identity.Type: ApplicationFiled: September 14, 2021Publication date: March 16, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Nathan Alexander Dalpini, Tomas M. Castrejon III, James J. Siekman
-
Publication number: 20230039302Abstract: Systems, computer program products, and methods are described herein for active detection and mitigation of unauthorized activity within a technology infrastructure. The present invention is configured to continuously monitor one or more incoming messages in one or more computing devices; detect one or more assessment vectors embedded in the one or more incoming messages; initiate an isolated virtual environment; redirect the one or more incoming messages associated with the one or more assessment vectors from the one or more computing devices to the isolated virtual environment; trigger an access routine to emulate, within the isolated virtual environment, an action of accessing the one or more incoming messages; determine, based on at least the access routine, whether the one or more incoming messages is associated with malware; and display a notification to the user indicating whether the one or more incoming messages is associated with malware.Type: ApplicationFiled: August 3, 2021Publication date: February 9, 2023Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, David Nardoni, Christopher Daniel Birch
-
Publication number: 20220398316Abstract: Artificial Intelligence (AI)-based detection of malware, and, specifically, ransomware, based on observing behaviors that occur in the computing system in the presence of the malware and training the AI to monitor for such behaviors. Once the behaviors are detected, they are compared to acceptable baseline level of occurrence of the behaviors (i.e., normal computing system behaviors) and if determined to exceed the baseline level, one or more actions are triggered to mitigate or prevent the malware/ransomware attack. By basing the detection of malware on behaviors, such as computing system events and/or configurations, as opposed to solely based on indicators (e.g., digital signatures), the ability of wrongdoers circumventing the detection mechanisms is lessened and the likelihood that malware is detected prior to detonation greatly increases.Type: ApplicationFiled: June 10, 2022Publication date: December 15, 2022Applicant: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, David Nardoni, Bradley P. Welch
-
Publication number: 20220171882Abstract: A system includes a device including one or more sensors that generate one or more signals used to detect whether an unauthorized activity has occurred at the device. The device is configured to transmit the one or more signals generated by the one or more sensors. The central monitoring device is configured to receive the one or more signals and compare the one or more signals with a baseline signal for the device. The baseline signal includes an expected signal for each of the one or more sensors when the unauthorized activity has not occurred. The monitoring device determines whether the unauthorized activity has occurred based on a result of the comparison.Type: ApplicationFiled: November 29, 2020Publication date: June 2, 2022Inventors: Michael R. Young, Daniel J. August, Tomas M. Castrejon, III, Richard Martin Seymour Scot, Neal Aaron Slensker