Patents by Inventor Tomas M. Castrejon, III

Tomas M. Castrejon, III has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240004968
    Abstract: In a public setting, an audio/visual (A/V) obfuscation device can be used to provide privacy during a conversation occurring either in-person or via an electronic device. The A/V obfuscation device is configured to provide one or both of an electronic or physical barrier to ensure privacy for at least part of the conversation. The A/V obfuscation device provides audio masking and/or an optical block to impede third-parties from overhearing or observing the conversation. The A/V obfuscation device includes devices capable of capturing audio and/or video information of conversation participants and/or electronic devices. The captured audio and/or video information may be analyzed and processed to generate obfuscation audio and/or video signals to obscure at least a portion of aspects of the conversation.
    Type: Application
    Filed: June 30, 2022
    Publication date: January 4, 2024
    Inventors: Tomas M. Castrejon, III, Benjamin F. Tweel, James Siekman
  • Publication number: 20230351023
    Abstract: A system is provided for remediation of security vulnerabilities in computing devices using continuous device-level scanning and monitoring. In particular, the system may perform a deep scan of the hardware and software elements of a computing device and/or application and compile the information from the deep scan into a hardware metadata list and a software metadata list associated with the computing device and/or application. The system may then, through a machine learning-based process, continuously scan the elements within the hardware metadata list and the software metadata list to identify the elements that are not involved in the operation of the computing device and/or application. The system may flag such elements for inspection to evaluate the safety of the elements and subsequently execute one or more remediation processes in response to detecting an unsafe element.
    Type: Application
    Filed: May 2, 2022
    Publication date: November 2, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Manu Jacob Kurian, Joel Townsend, Tomas M. Castrejon, III, Michael Robert Young, David Nardoni
  • Publication number: 20230351012
    Abstract: Various systems, methods, and computer program products for providing data security using software library containers are provided. The method includes identifying a software library used by a first application with a potential vulnerability. The method also includes determining a software library permission for the software library used by the first application based on the potential vulnerability. The software library permission for the software library defines a level of functionality of at least a portion of the software library. The method further includes identifying one or more additional applications that use the software library. The method still further includes causing the software library permission to be applied to the software library installed on the first application and at least one of the one or more additional applications.
    Type: Application
    Filed: April 27, 2022
    Publication date: November 2, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, Michael Robert Young, David Nardoni, Joel Townsend, Manu Jacob Kurian
  • Publication number: 20230333835
    Abstract: Various systems, methods, and computer program products are provided for dynamic code patch deployment within a distributed network. The method includes identifying one or more potential vulnerabilities within a software library that is associated with a first application within a decentralized network. The method also includes receiving a code update relating to the identified software library associated with the first application within the decentralized network. The method further includes identifying a second applications within the decentralized network that is also associated with the identified software library. The method still further includes causing a transmission of the code update to the second application within the decentralized network.
    Type: Application
    Filed: April 19, 2022
    Publication date: October 19, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, Michael Robert Young, David Nardoni, Joel Townsend, Manu Jacob Kurian
  • Publication number: 20230319079
    Abstract: A system is provided for detecting and remediating computing system breaches using computing network traffic monitoring. In particular, the system may identify one or more technology elements within a network as well as relationships between computing systems associated with said elements to determine a network topology. Based on the network topology, the system may use historical network traffic data associated with the technology elements in the network to generate predicted entry points and lateral pathways of a security breach that may take place within particular computing systems. Then, based on the technology elements affected as well as entry points and path traversals of the breach, the system may generate and/or implement one or more remediation steps to address existing and/or future breaches. In this way, the system may provide an intelligent method of augmenting the security of a computing network.
    Type: Application
    Filed: March 30, 2022
    Publication date: October 5, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, Manu Jacob Kurian, David Nardoni, Joel Townsend, Michael Robert Young
  • Publication number: 20230315439
    Abstract: Systems, computer program products, and methods are described herein for enhanced component-level detection in software applications. The present invention is configured to receive, from a client device, one or more data packets with payload containing a request to onboard a first application into a computing environment; determine, using an application ingestion subsystem, information associated with the first application; deploy, using a machine learning subsystem, a trained machine learning model on the information associated with the first application; determine, using the trained machine learning model, one or more components associated with the first application and one or more component scanning parameters for each of the one or more components; and build a software bill of materials (SBOM) for the first application based on at least the one or more components.
    Type: Application
    Filed: March 29, 2022
    Publication date: October 5, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, Manu Jacob Kurian, David Nardoni, Joel Townsend, Michael Robert Young
  • Publication number: 20230300619
    Abstract: Systems, computer program products, and methods are described herein for dynamic communication channel switching for secure message propagation. The present invention may be configured to receive wireless signals from a plurality of devices and identify, from the plurality of devices and based on the wireless signals, a trusted device. The present invention may be configured to receive, from another device, a secure message, where the secure message includes information identifying a vulnerability in a network to which the trusted device is connected. The present invention may be configured to establish, based on receiving the secure message and using a first wireless communication interface, a communication link with a second wireless communication interface of the trusted device to establish a wireless data channel with the trusted device and transmit, via the wireless data channel, the secure message to the trusted device.
    Type: Application
    Filed: March 21, 2022
    Publication date: September 21, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, Manu Jacob Kurian, David Nardoni, Joel Townsend, Michael Robert Young
  • Publication number: 20230297689
    Abstract: Systems, computer program products, and methods are described herein for deployable software vulnerability testing platform. The present invention is configured to receive, from a user input device, an initial request from a user to generate a deployable software vulnerability testing (SVT) engine; prompt an SVT dashboard for display on the user input device to receive one or more input parameters associated with the first vulnerability in response to receiving the initial request; receive, via the SVT dashboard, the one or more input parameters; generate the SVT engine based on at least the one or more input parameters; receive, from the user input device, one or more deployment parameters associated with a deployment of the SVT engine; and deploy the SVT engine within the distributed technology infrastructure to identify the one or more instances of the first vulnerability based on at least the one or more deployment parameters.
    Type: Application
    Filed: March 21, 2022
    Publication date: September 21, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Manu Jacob Kurian, Tomas M. Castrejon, III, Michael Robert Young, David Nardoni, Joel Townsend
  • Patent number: 11645427
    Abstract: A system includes a device including one or more sensors that generate one or more signals used to detect whether an unauthorized activity has occurred at the device. The device is configured to transmit the one or more signals generated by the one or more sensors. The central monitoring device is configured to receive the one or more signals and compare the one or more signals with a baseline signal for the device. The baseline signal includes an expected signal for each of the one or more sensors when the unauthorized activity has not occurred. The monitoring device determines whether the unauthorized activity has occurred based on a result of the comparison.
    Type: Grant
    Filed: November 29, 2020
    Date of Patent: May 9, 2023
    Assignee: Bank of America Corporation
    Inventors: Michael R. Young, Daniel J August, Tomas M. Castrejon, III, Richard Martin Seymour Scot, Neal Aaron Slensker
  • Publication number: 20230096182
    Abstract: Systems, methods, and computer program products are provided for identifying a potential malicious event. The method includes receiving a plurality of program actions comprising at least a first program action and a second program action. The first program action is initiated before the second program action. The method also includes comparing the plurality of program actions with at least one known malicious event pattern of actions. The at least one malicious event pattern of actions includes a sequence of program actions in a known malicious event. The method further includes determining a potential malicious event is occurring based on the comparison of the plurality of program actions with at least one known malicious event pattern of actions. The method still further includes determining a preventative response based on the potential malicious event.
    Type: Application
    Filed: September 30, 2021
    Publication date: March 30, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, Christopher Daniel Birch, Christopher Stephen Littrell
  • Publication number: 20230101995
    Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for providing intelligent proactive identification of, and protection against, malfeasant data collection, user device control, or user account access. The invention utilizes a continuous data analysis technique in order to recognize patterns in device data and network communications indicative of remote device control requests, and responds to these identified data points by implemented an automated solution to protect users against unauthorized access of their devices or accounts.
    Type: Application
    Filed: September 29, 2021
    Publication date: March 30, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, Peter Kurrasch, John Raymond Omernik, Richard Seymour Scot, Kevin Patrick Thomsen
  • Publication number: 20230080885
    Abstract: Systems, methods, and computer program products are provided for detecting a synthetic identity. The method includes receiving an identity verification request relating to an individual. The identity verification request includes one or more individual identifiers of the individual. The method also includes comparing at least one of the one or more individual identifiers to one or more known synthetic indicators. The one or more known synthetic indicators including at least one of a synthetic identifier type or a synthetic identifier value that correspond to one or more known synthetic identities. The method further includes determining a synthetic identity determination based on the comparison of the at least one of the one or more individual identifiers to the one or more known synthetic indicators. The synthetic identity determination indicates whether an identity verification request is a potential synthetic identity.
    Type: Application
    Filed: September 14, 2021
    Publication date: March 16, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Nathan Alexander Dalpini, Tomas M. Castrejon III, James J. Siekman
  • Publication number: 20230039302
    Abstract: Systems, computer program products, and methods are described herein for active detection and mitigation of unauthorized activity within a technology infrastructure. The present invention is configured to continuously monitor one or more incoming messages in one or more computing devices; detect one or more assessment vectors embedded in the one or more incoming messages; initiate an isolated virtual environment; redirect the one or more incoming messages associated with the one or more assessment vectors from the one or more computing devices to the isolated virtual environment; trigger an access routine to emulate, within the isolated virtual environment, an action of accessing the one or more incoming messages; determine, based on at least the access routine, whether the one or more incoming messages is associated with malware; and display a notification to the user indicating whether the one or more incoming messages is associated with malware.
    Type: Application
    Filed: August 3, 2021
    Publication date: February 9, 2023
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, David Nardoni, Christopher Daniel Birch
  • Publication number: 20220398316
    Abstract: Artificial Intelligence (AI)-based detection of malware, and, specifically, ransomware, based on observing behaviors that occur in the computing system in the presence of the malware and training the AI to monitor for such behaviors. Once the behaviors are detected, they are compared to acceptable baseline level of occurrence of the behaviors (i.e., normal computing system behaviors) and if determined to exceed the baseline level, one or more actions are triggered to mitigate or prevent the malware/ransomware attack. By basing the detection of malware on behaviors, such as computing system events and/or configurations, as opposed to solely based on indicators (e.g., digital signatures), the ability of wrongdoers circumventing the detection mechanisms is lessened and the likelihood that malware is detected prior to detonation greatly increases.
    Type: Application
    Filed: June 10, 2022
    Publication date: December 15, 2022
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Tomas M. Castrejon, III, David Nardoni, Bradley P. Welch
  • Publication number: 20220171882
    Abstract: A system includes a device including one or more sensors that generate one or more signals used to detect whether an unauthorized activity has occurred at the device. The device is configured to transmit the one or more signals generated by the one or more sensors. The central monitoring device is configured to receive the one or more signals and compare the one or more signals with a baseline signal for the device. The baseline signal includes an expected signal for each of the one or more sensors when the unauthorized activity has not occurred. The monitoring device determines whether the unauthorized activity has occurred based on a result of the comparison.
    Type: Application
    Filed: November 29, 2020
    Publication date: June 2, 2022
    Inventors: Michael R. Young, Daniel J. August, Tomas M. Castrejon, III, Richard Martin Seymour Scot, Neal Aaron Slensker