Patents by Inventor Vijay Kumar Yarabolu
Vijay Kumar Yarabolu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240403422Abstract: Computer-implemented cyber-security processes and machines provide proactive anti-forensics activity detection and prevention to safeguard the integrity of transactions and their associated log details or other data using artificial intelligence and/or machine learning, thereby ensuring that all transactions and logs within the system are complaint for cyber forensics, and helping to make reactive forensic tasks more robust by adding proactive monitoring and compliance activity.Type: ApplicationFiled: June 28, 2024Publication date: December 5, 2024Inventor: Vijay Kumar Yarabolu
-
Publication number: 20240403423Abstract: Computer-implemented cyber-security processes and machines provide proactive anti-forensics activity detection and prevention to safeguard the integrity of transactions and their associated log details or other data using artificial intelligence and/or machine learning, thereby ensuring that all transactions and logs within the system are complaint for cyber forensics, and helping to make reactive forensic tasks more robust by adding proactive monitoring and compliance activity.Type: ApplicationFiled: June 28, 2024Publication date: December 5, 2024Inventor: Vijay Kumar Yarabolu
-
Publication number: 20240386696Abstract: A computing platform may train, using historical telemetry state images, an image comparison model to identify matches between telemetry state images. The computing platform may generate a plurality of system alerts corresponding to a period of time. The computing platform may access telemetry data corresponding to the period of time. The computing platform may generate, based on the telemetry data and for a time corresponding to each of the plurality of system alerts, a telemetry state image. The computing platform may input, into the image comparison model, the telemetry state images to identify whether or not any of the plurality of telemetry state images match. Based on detecting a match, the computing platform may consolidate system alerts corresponding to the matching telemetry state images, which may produce a single system alert and may send, to a user device, the single system alert.Type: ApplicationFiled: May 16, 2023Publication date: November 21, 2024Inventors: Maharaj Mukherjee, Utkarsh Raj, Colin Murphy, Carl Benda, Elvis Nyamwange, Vijay Kumar Yarabolu, Suman Roy Choudhury
-
Publication number: 20240385917Abstract: A computing platform may train a hybrid deep learning model, including a CNN and RNN, to predict system failure for a system based on telemetry state images and transitions between the telemetry state images. The computing platform may receive initial telemetry data, and may generate an initial telemetry state image. The computing platform may receive additional telemetry data, and may generate an additional telemetry state image. The computing platform may classify, using the CNN and based on historical telemetry state images, the initial telemetry state image and the additional telemetry state image. The computing platform may identify, using the RNN and based on the classified telemetry state images and transitions between the classified telemetry state images, a matching pattern. The computing platform may identify, using the identified matching pattern, a likelihood of failure for the system, and may cause modification of operations at the system to prevent a predicted failure.Type: ApplicationFiled: May 17, 2023Publication date: November 21, 2024Inventors: Maharaj Mukherjee, Utkarsh Raj, Colin Murphy, Elvis Nyamwange, Suman Roy Choudhury, Vijay Kumar Yarabolu, Carl Benda
-
Publication number: 20240385612Abstract: A computing platform may configure a rules-based state machine to predict system failure for a system based on telemetry state images and transitions between the telemetry state images. The computing platform may receive initial telemetry data. The computing platform may generate, based on the initial telemetry data, an initial telemetry state image. The computing platform may receive additional telemetry data, and may generate, based on the additional telemetry data, an additional telemetry state image. The computing platform may compare a pattern, corresponding to the initial telemetry state image, the additional telemetry state image, and a corresponding transition, to historical patterns to identify a match. The computing platform may identify, using the identified matching pattern, a likelihood of failure for the system, and may send, based on the likelihood of failure for the system, preemptive resolution commands causing modification of operations at the system to prevent a predicted failure.Type: ApplicationFiled: May 17, 2023Publication date: November 21, 2024Inventors: Maharaj Mukherjee, Utkarsh Raj, Colin Murphy, Elvis Nyamwange, Carl Benda, Suman Roy Choudhury, Vijay Kumar Yarabolu
-
Publication number: 20240346118Abstract: Systems, computer program products, and methods are described herein for identification and verification of brute force attacks using hash signature segmentation and behavior clustering analysis. The present invention is configured to receive a plurality of access attempts and an associated plurality of hash values; determine a failure request load based on the plurality of access attempts; determine whether the failure request load meets a failure threshold, wherein, in an instance where the failure request load meets the failure threshold, separating the plurality of access attempts associated with the failure request load into a plurality of hash clusters; generate a behavior cluster for each hash cluster based on shared behavior data of the plurality of access attempts; and determine, based on the behavior cluster for each hash cluster, a likelihood of misappropriation for each access attempt of the plurality of access attempts.Type: ApplicationFiled: June 26, 2024Publication date: October 17, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Vijay Kumar Yarabolu, Ravi Prasad Challagulla, Usha Kiran Maddela
-
Publication number: 20240338592Abstract: Systems, computer program products, and methods are described herein for generating a digital twin or a resource using partial sensor data and artificial intelligence. The present invention is configured to receive resource sensor data from a plurality of sensors, wherein the plurality of sensors is associated with a resource; apply a sensor data analyzer engine to the resource sensor data; determine, by the sensor data analyzer engine, whether at least one sensor anomaly of the resource sensor data is present; apply an on-demand synthetic data generator to the at least one sensor anomaly; generate synthetic sensor data associated with the resource, wherein the synthetic sensor data is based on a real-time pattern of the resource sensor data from the plurality of sensors; and generate, based on the resource sensor data from the plurality of sensors and the synthetic sensor data, a digital twin of the resource.Type: ApplicationFiled: April 6, 2023Publication date: October 10, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Vijay Kumar Yarabolu, Gowthaman Sundararaj
-
Patent number: 12072961Abstract: Systems, computer program products, and methods are described herein for identification and verification of brute force attacks using hash signature segmentation and behavior clustering analysis. The present invention is configured to receive a plurality of access attempts and an associated plurality of hash values; determine a failure request load based on the plurality of access attempts; determine whether the failure request load meets a failure threshold, wherein, in an instance where the failure request load meets the failure threshold, separating the plurality of access attempts associated with the failure request load into a plurality of hash clusters; generate a behavior cluster for each hash cluster based on shared behavior data of the plurality of access attempts; and determine, based on the behavior cluster for each hash cluster, a likelihood of misappropriation for each access attempt of the plurality of access attempts.Type: GrantFiled: July 29, 2022Date of Patent: August 27, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Vijay Kumar Yarabolu, Ravi Prasad Challagulla, Usha Kiran Maddela
-
Patent number: 12067113Abstract: Computer-implemented cyber-security processes and machines provide proactive anti-forensics activity detection and prevention to safeguard the integrity of transactions and their associated log details or other data using artificial intelligence and/or machine learning, thereby ensuring that all transactions and logs within the system are complaint for cyber forensics, and helping to make reactive forensic tasks more robust by adding proactive monitoring and compliance activity.Type: GrantFiled: April 26, 2022Date of Patent: August 20, 2024Assignee: Bank of America CorporationInventor: Vijay Kumar Yarabolu
-
Publication number: 20240273184Abstract: A data poisoning and model drift prevention computing system may feed trusted historical data to one or more generative adversarial networks (GAN) and cause the GANs to generate simulated data. Curated simulated data is clustered and the data characteristics are captured, such as number of clusters, data density, and the like. The data poisoning and model drift prevention computing system sanitizes the model data and merges the sanitized data with trusted data. The data poisoning and model drift prevention computing system may then cluster the resultant data again and compare the similarities with trusted data clusters. No change in cluster characteristics indicate the data is not tampered and in expected condition. The data poisoning and model drift prevention computing system identifies a deviation in cluster characteristics corresponding to poisoned data and trigger remedial actions.Type: ApplicationFiled: February 14, 2023Publication date: August 15, 2024Applicant: Bank of America CorporationInventors: Vijay Kumar Yarabolu, Gowthaman Sundararaj
-
Publication number: 20240273083Abstract: Systems, computer program products, and methods are described herein for dynamic visual graph structure providing multi-stream data integrity and analysis. The present disclosure is configured to provide a reactive system aimed to trace the root cause of incidents and uncover potential gaps in security of an enterprise system. Maintaining accurate and meaningful information related to incidents is the key for success of data security protocols. The integrity of message data is kept intact for improved forensic investigation, as each database may keep varying information related to a single global session.Type: ApplicationFiled: February 15, 2023Publication date: August 15, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Vijay Kumar Yarabolu, Gowthaman Sundararaj
-
Publication number: 20240275607Abstract: A simplified IoT network validation process includes improvements to enrollment of IoT devices onto the IoT network and authentication of active IoT devices during IoT network operation. A random cipher text is created upon device enrollment and shared to each device in the network. Additionally, a random peer-to-peer cross reference communication pattern is established among the devices. Using a device pairing sequence an iterated (e.g., chained) hash value is generated and stored at the server. During the device authentication, upon basic authentication of the request, a server shares a random point to the network (e.g., a randomly selected IoT device) to trigger the hash token generation process. The network devices perform hash token iteration as a ring. Each IoT device uses the previous hash when generating the next hash. The final hash is sent to the server for validation and comparison against stored keys.Type: ApplicationFiled: February 15, 2023Publication date: August 15, 2024Applicant: Bank of America CorporationInventors: Vijay Kumar Yarabolu, Gowthaman Sundararaj
-
Publication number: 20240244075Abstract: Aspects of the disclosure relate to a network traffic monitoring platform. The platform may train an attack pattern analysis model to output a behavior profile and a cumulative attack score. The platform may identify a password failure rate spike. The platform may extract a password hash from the network traffic. The platform may generate the behavior profile based on the password hash. The platform may generate the cumulative attack score based on the behavior profile. The platform may compare the cumulative attack score to a threshold. Based on identifying that the cumulative attack score is below the threshold, the platform may identify the password hash as a secure hash. Based on identifying that the cumulative attack score meets or exceeds the threshold, the platform may and generate password complexity rules. The platform may refine the attack pattern analysis model based on the attacked hash and the cumulative attack score.Type: ApplicationFiled: January 18, 2023Publication date: July 18, 2024Applicant: Bank of America CorporationInventors: Vijay Kumar Yarabolu, Gowthaman Sundararaj
-
Publication number: 20240242093Abstract: Systems, computer program products, and methods are described herein for predictive generation of data puddles. The present disclosure is configured to capture data ingestion information associated with an end-point device over a period of time; determine, using a machine learning (ML) subsystem, data ingestion pattern for the end-point device based on at least the data ingestion information; generate a query sequence for predictive extraction of data from a data lake based on at least the data ingestion pattern; trigger the predictive extraction of the data from the data lake based on at least the query sequence; and store the data in a data puddle associated with the end-point device in response to the predictive extraction.Type: ApplicationFiled: January 18, 2023Publication date: July 18, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Vijay Kumar Yarabolu, Gowthaman Sundararaj
-
Patent number: 12039079Abstract: A method of securing a data set using encryption and scaling. The data set comprises a modeling and validation section with each section having text and numeric data. For each section, the method encrypts text data using a public key and scales numeric data using a scaling factor. The method builds a model by applying the encrypted modeling section to the algorithm to generate modeling text data, numeric data, and patterns derived therefrom. The method generates validation text data, numeric data, and patterns derived therefrom by applying the encrypted validation section to the model. The method compares the patterns from each section and validates the model based on the comparison. The method decrypts the generated modeling text data and validation text data using a private key and descales the modeling numeric data and validation numeric data using the scaling factor. The method verifies the model by comparing the decrypted text data and descaled numeric data to the same in the data set.Type: GrantFiled: April 8, 2022Date of Patent: July 16, 2024Assignee: Bank of America CorporationInventor: Vijay Kumar Yarabolu
-
Publication number: 20240223549Abstract: Aspects of the disclosure relate to authentication. A computing platform may send, to a wearable device, an internet of things (IOT) vector key. The computing platform may receive an application access request from the wearable device, which may include authentication credentials. The computing platform may send, to the wearable device, a reference key comprising a sequence of row-column combinations corresponding to the IoT vector key, and the wearable device may be configured to identify a hash salt value using the reference key and the IoT. The computing platform may receive, from the wearable device, the hash salt value. The computing platform may generate, based on the hash salt value and the authentication credentials, a password. The computing platform may hash the password to produce a password hash, and may send the password hash to an application server for validation.Type: ApplicationFiled: January 4, 2023Publication date: July 4, 2024Applicant: Bank of America CorporationInventors: Vijay Kumar Yarabolu, Gowthaman Sundararaj
-
Publication number: 20240195802Abstract: A system is provided for user-initiated authentication of an electronic communication channel using a secure computing application token. In particular, the system may comprise a token generation application installed on an endpoint device of a user, where the application may be configured to perform authentication of communication channels based on receiving user input. Upon receiving a request to establish a secure communication channel from a remote device, the endpoint device may receive a voice sample from the user. Based on the attributes of the voice sample and of the application session, the endpoint device may generate an alphanumeric character string that may serve as a secure token to be verified against a second character string received from the remote device. If a match is detected, the endpoint device may authenticate and generate the communication channel.Type: ApplicationFiled: December 13, 2022Publication date: June 13, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Amit Bhandari, Nipun Mahajan, Vijay Kumar Yarabolu, Amit Mishra, Yogesh Raghuvanshi
-
Patent number: 11991188Abstract: Aspects of the disclosure relate to cognitive auditing of client bound data. A computing platform may intercept a request from a user device to an application server. The computing platform may identify content requested by the user device and generate predicted response data based on the requested content. The computing platform may transmit the request to the application server. The computing platform may receive, from the application server, actual response data. The computing platform may validate the actual response data by comparing the actual response data with the predicted response data. Based on comparing the actual response data with the predicted response data, the computing platform may identify whether the actual response data matches the predicted response data. Based on identifying that the actual response data matches the predicted response data, the computing platform may send the actual response data to the user device.Type: GrantFiled: June 11, 2021Date of Patent: May 21, 2024Assignee: Bank of America CorporationInventor: Vijay Kumar Yarabolu
-
Patent number: 11973663Abstract: Cognitive analysis, including artificial intelligence, is implemented to dynamically determine service discovery and service binding. Specifically, cognitive analysis is used to determine a client's capabilities and based on the capabilities, a service version is selected and coupled/bound to the client. As a result of such loose coupling/binding with service signatures, service version upgrade at the client is not mandatory in the event of a server-side service version upgrade.Type: GrantFiled: March 30, 2022Date of Patent: April 30, 2024Assignee: BANK OF AMERICA CORPORATIONInventor: Vijay Kumar Yarabolu
-
Publication number: 20240070674Abstract: Computer-implemented cyber-security, behavior-generated, event-type signed processes and machines provide for authentication and immutable transactions to overcome security risks. Clients submit requests for an immutable transactions and interactions responsive to the request are sent by the server to the client. The server generates behavioral expectations for the interactions, stores them for future comparison purposes, and transmits those to the client. The client executes user events for the interactions. The client behaviorally analyzes the user events and generates behavioral vectors corresponding to the user events. Intermediate client hashes that culminate in a final client hash are generated. User events are sent to the server. The server generates a server hash based on the behavioral expectations and the user events. The server compares the final client hash to the server hash to determine if the transaction is authentic and should be stored as immutable.Type: ApplicationFiled: August 31, 2022Publication date: February 29, 2024Inventors: Geeta Bora, Vijay Kumar Yarabolu