Bank of America Corporation

États‑Unis d’Amérique

Retour au propriétaire

1-100 de 6 834 pour Bank of America Corporation et 2 filiales Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 6 312
        Marque 522
Juridiction
        États-Unis 6 365
        International 346
        Canada 74
        Europe 49
Propriétaire / Filiale
[Owner] Bank of America Corporation 6 828
Merrill Lynch & Co., Inc. 3
Bank of America, National Association 3
Date
Nouveautés (dernières 4 semaines) 65
2024 septembre (MACJ) 57
2024 août 61
2024 juillet 99
2024 juin 58
Voir plus
Classe IPC
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 967
G06Q 40/00 - Finance; Assurance; Stratégies fiscales; Traitement des impôts sur les sociétés ou sur le revenu 580
G06N 20/00 - Apprentissage automatique 569
H04L 9/40 - Protocoles réseaux de sécurité 532
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives 491
Voir plus
Classe NICE
36 - Services financiers, assurances et affaires immobilières 437
09 - Appareils et instruments scientifiques et électriques 82
42 - Services scientifiques, technologiques et industriels, recherche et conception 67
35 - Publicité; Affaires commerciales 61
41 - Éducation, divertissements, activités sportives et culturelles 41
Voir plus
Statut
En Instance 994
Enregistré / En vigueur 5 840
  1     2     3     ...     69        Prochaine page

1.

Dynamic Event Parameter Modification Based on Contextual Data

      
Numéro d'application 18125927
Statut En instance
Date de dépôt 2023-03-24
Date de la première publication 2024-09-26
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Nt, Gopalakrishnan

Abrégé

Arrangements for product security control are provided. In some aspects, user product data, such as accounts, payment devices, and the like, may be received. The user product data may be aggregated to generate ringfenced user products. As a user anticipates a change in risk of unauthorized access to a product, the user may request to modify a security level associated with the ringfenced user products. For instance, the user may request to modify a first security level to a second security level. In response, if the user is authenticated, the security level of the ringfenced user products may be modified from the first security level to the second security level and one or more parameters associated with each product of the ringfenced products may be modified to apply parameters associated with the second security level.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives

2.

Altering card device attributes in response to detecting a proximity intrusion

      
Numéro d'application 18188898
Statut En instance
Date de dépôt 2023-03-23
Date de la première publication 2024-09-26
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Singh, Shailendra
  • Gupta, Saurabh

Abrégé

A card device receives a first sensor data from sensors associated with the card device and extracts a set of user features from the first sensor data, where the user features indicate physical attributes of the user. The card device receives a second sensor data from the sensors. The card device extracts a set of viewer features from the second sensor data, where the viewer features indicate physical attributes of the viewer. The card device compares at least one of the user features with a counterpart feature from among the viewer features. The card device determines that the user is not the viewer. The card device determines a distance between the viewer and the card device. The card device determines that the distance between the viewer and the card device is less than a threshold distance. In response, the card device dynamically masks the information displayed on the card device.

Classes IPC  ?

  • G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
  • G06T 7/73 - Détermination de la position ou de l'orientation des objets ou des caméras utilisant des procédés basés sur les caractéristiques
  • H04L 9/40 - Protocoles réseaux de sécurité

3.

DYNAMIC COMPUTING PLATFORM FOR REAL-TIME DATA CONTAINER GENERATION, AUTHORIZATION, AND THROTTLING MANAGEMENT

      
Numéro d'application 18125256
Statut En instance
Date de dépôt 2023-03-23
Date de la première publication 2024-09-26
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Kurian, Manu
  • Roscoe, Paul
  • Iyer, Padmanabhan
  • Bhashetty, Mahesh

Abrégé

Aspects of the disclosure relate to real-time management of data container generation, authorization, and throttling. In some embodiments, a computing platform may receive a first data container and retrieve a first data container management file associated with the first data container. The computing platform may then perform a first preliminary analysis of the first data container, including analyzing the first data container and the first data container management file to determine whether a first predetermined communication path requires additional throttling analysis. If additional throttling analysis is required, the computing platform may send analysis messages to a data container throttling module to extract a first communication entity listed in the first predetermined communication path. Thereafter, the computing platform may retrieve real-time operating conditions for the first communication entity to determine that the first data container requires additional throttling processing, and queue, by the data container throttling module, the first data container.

Classes IPC  ?

  • H04L 47/12 - Prévention de la congestion; Récupération de la congestion
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/06 - Protocoles spécialement adaptés au transfert de fichiers, p.ex. protocole de transfert de fichier [FTP]

4.

SYSTEMS AND METHODS FOR COMBINED PROCESSING OF DISPARATE RESOURCE TYPES

      
Numéro d'application 18611382
Statut En instance
Date de dépôt 2024-03-20
Date de la première publication 2024-09-26
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Sellers, John Allen
  • Jackson, Milton Antonio
  • Grant, Amber J.
  • Baker, Kelly
  • Hefney, Kriscinda M.

Abrégé

Systems, computer program products, and methods are described herein for combined processing of disparate resource types. The present disclosure is configured to receive user resource account data for one or more disparate accounts; generate a consolidated resource accrual account for the one or more disparate accounts; calculate a conversion rate of resource denominations for each of the one or more disparate accounts to a common resource point value; generate a total resource point value for the one or more disparate accounts; transmit instructions to user device to display an account landing page including the total resource point value; update the account landing page based on additional user resource account data; organize user resource account data and additional user resource account data based on disparate account source; and display an itemized resource point value breakdown via the account landing page.

Classes IPC  ?

  • G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte

5.

QUANTUM METADATA LINEAGE TRACING USING QUANTUM MULTIPART ENTANGLED TWIN TECHNOLOGY

      
Numéro d'application 18123411
Statut En instance
Date de dépôt 2023-03-20
Date de la première publication 2024-09-26
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Bakshi, Sakshi

Abrégé

Apparatus for quantum data lineage tracing using a quantum multipart entangled twin is provided. The apparatus may include an enterprise system, a quantum data lineage tracing system and a quantum twinning simulation engine. The enterprise system may include a plurality of subsystems. A first subsystem may receive data components. The tracing system may extract metadata, including data component properties, from data components. The tracing system may assign each property to a qubit. Each qubit may identify an entry location of the associated data component. The simulation engine may receive the qubits, process the qubits and entangle each qubit with one or more other qubits. The simulation engine may replicate a wave function for each qubit as the qubit is replicated to trace changes made to each data component as the data component is replicated. The simulation engine may use the replicated wave functions to identify changes made to data components.

Classes IPC  ?

  • G06N 10/20 - Modèles d’informatique quantique, p.ex. circuits quantiques ou ordinateurs quantiques universels

6.

OBJECT RECOGNITION SUBJECT TO A THROTTLING EFFECT

      
Numéro d'application 18663933
Statut En instance
Date de dépôt 2024-05-14
Date de la première publication 2024-09-26
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Serna, Daniel J.

Abrégé

Apparatus and methods for dynamically controlling application of a graphic processing unit (“GPU”) based on the current processing needs is described. A number of objects in each image may be detected. A machine learning model may be utilized to detect and classify objects in each image. Based on the number of detected objects, the GPU could be switched on to provide increased image processing performance. Dynamically turning the GPU on/off may reduce power consumption. When the GPU is turned off, a central processing unit (“CPU”) may be used to perform image processing.

Classes IPC  ?

  • G07F 19/00 - Systèmes bancaires complets; Dispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p.ex. guichets automatiques
  • G06T 7/00 - Analyse d'image

7.

SECURE CROSS-BLOCKCHAIN ASSET MOVEMENT USING PHOTONIC QUANTUM COMPUTING

      
Numéro d'application 18124063
Statut En instance
Date de dépôt 2023-03-21
Date de la première publication 2024-09-26
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Singh, Shailendra

Abrégé

Systems and methods for securing a cryptocurrency asset transfer via a cross-blockchain bridge. Methods may include detecting a request to transfer the asset between blockchains and extracting a set of features such as smart contract bytecode from event logs associated with the blockchains and a blockchain bridge. Methods may include using a photonic quantum processor to use i) a long short-term neural network and ii) a neural network to generate machine learning models based on the extracted features to output i) a security risk threshold and ii) a security risk percentage, respectively. When the security risk percentage is below the security risk threshold, the method may permit the execution of a smart contract to allow transfer of the cryptocurrency asset over the blockchain bridge. When the security risk percentage is above the security risk threshold, the method may involve blocking an execution of a smart contract on the blockchain bridge.

Classes IPC  ?

  • G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
  • G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
  • G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails

8.

ENHANCING HYBRID TRADITIONAL NEURAL NETWORKS WITH LIQUID NEURAL NETWORK UNITS FOR CYBER SECURITY AND OFFENSE PROTECTION

      
Numéro d'application 18678016
Statut En instance
Date de dépôt 2024-05-30
Date de la première publication 2024-09-26
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Nyamwange, Elvis

Abrégé

Aspects of the disclosure relate to enhancing hybrid traditional neural networks with liquid neural networks for cyber security and offense protection. A computing platform may receive a request to access enterprise organization data. The computing platform may compare the current request to previous requests to determine whether a similar request was previously processed. If a similar request was not previously processed, the computing platform may flag the request as a threat and may analyze the request. The computing platform may extract data from the request and may use the extracted data to generate rules, threat detection algorithms, and training models. The computing platform may use the rules, threat detection algorithms, and training models to train a deep learning neural network to identify and handle threats to an enterprise organization.

Classes IPC  ?

9.

Altering card device attributes in response to detecting an anomalous location of the card device

      
Numéro d'application 18188877
Statut En instance
Date de dépôt 2023-03-23
Date de la première publication 2024-09-26
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Singh, Shailendra
  • Gupta, Saurabh

Abrégé

A card device receives a first sensor data from sensors associated with the card device and extracts a set of user features from the first sensor data, where the user features indicate physical attributes of the user. The card device receives a second sensor data from the sensors. The card device extracts a set of viewer features from the second sensor data, where the viewer features indicate physical attributes of the viewer. The card device compares at least one of the user features with a counterpart feature from among the viewer features. The card device determines that the user is not the viewer. The card device determines a distance between the viewer and the card device. The card device determines that the distance between the viewer and the card device is less than a threshold distance. In response, the card device dynamically masks the information displayed on the card device.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06T 7/73 - Détermination de la position ou de l'orientation des objets ou des caméras utilisant des procédés basés sur les caractéristiques

10.

DYNAMIC COMPUTING PLATFORM FOR REAL-TIME DATA CONTAINER GENERATION, AUTHORIZATION, AND THROTTLING MANAGEMENT

      
Numéro d'application 18125240
Statut En instance
Date de dépôt 2023-03-23
Date de la première publication 2024-09-26
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Kurian, Manu
  • Roscoe, Paul
  • Iyer, Padmanabhan
  • Bhashetty, Mahesh

Abrégé

Aspects of the disclosure relate to real-time management of data container generation, authorization, and throttling. In some embodiments, a computing platform may receive and store data container management files, each associated with a different data container. The computing platform may thereafter receive a first data container and retrieve a first data container management file associated with the first data container. The computing platform may perform a preliminary analysis of the first data container to determine whether the first data container is complete. If the first data container is incomplete, the computing platform may send one or more analysis messages to a data container generation module to queue the first data container and retrieve an identification element associated with a missing data set. The computing platform may then retrieve the missing data set and generate an updated first data container by supplementing the first data container with the missing data set.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]

11.

Proactive and Real-Time Anomaly Identification and Resolution for Automated Teller Machines (ATMs)

      
Numéro d'application 18124135
Statut En instance
Date de dépôt 2023-03-21
Date de la première publication 2024-09-26
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Mattison, Paul
  • Smiddy, David
  • Gruesbeck, Ii, Charles H.
  • Loth, Kurt A.
  • Williams, Matthew E.
  • Mckinnon, Nathaniel
  • Nixon, Melvin Gregory
  • Smith, Frazier
  • Catalano, Nicholas F.
  • Buchanan, Aaron L.
  • Chinske, Iv, Frederick Louis

Abrégé

Aspects of the disclosure related to identifying and resolving anomalies associated with an ATM processing a check that has been deposited by a customer. The computing platform may receive a digital representation of the check that has been deposited. The computing platform may compare parameters associated with the check to expected parameters. The computing platform may generate a validation report comprising an anomaly, an event code associated with the anomaly, and an action to resolve the anomaly based on the event code. The computing platform may input results and feedback into a machine learning model to further refine the accuracy and reliability of the computing platform over time.

Classes IPC  ?

  • G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile

12.

DYNAMIC COMPUTING PLATFORM FOR REAL-TIME DATA CONTAINER GENERATION, AUTHORIZATION, AND THROTTLING MANAGEMENT

      
Numéro d'application 18125223
Statut En instance
Date de dépôt 2023-03-23
Date de la première publication 2024-09-26
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Kurian, Manu
  • Roscoe, Paul
  • Iyer, Padmanabhan
  • Bhashetty, Mahesh

Abrégé

Aspects of the disclosure relate to real-time management of data container generation, authorization, and throttling. In some embodiments, a computing platform may receive a first data container and retrieve a first data container management file associated with the first data container. The computing platform may then perform a first preliminary analysis of the first data container, including analyzing the first data container and the first data container management file to determine whether a first predetermined communication path requires additional throttling analysis. If additional throttling analysis is required, the computing platform may send analysis messages to a data container throttling module to extract a first communication entity listed in the first predetermined communication path. Thereafter, the computing platform may retrieve real-time operating conditions for the first communication entity to determine that the first data container requires additional throttling processing, and queue, by the data container throttling module, the first data container.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]

13.

MACHINE LEARNING BASED SYSTEM FOR PROCESSING DEVICE TELEMETRY IN A DISTRIBUTED COMPUTING ENVIRONMENT

      
Numéro d'application 18125295
Statut En instance
Date de dépôt 2023-03-23
Date de la première publication 2024-09-26
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Balaji, Sujatha
  • Anbazhagan, Mullaikani

Abrégé

Real-time transmission of IoT telemetry data to a third-party and use of such data by the third-party for purposes of determining IoT device-related recommendations specific to the IoT device user. Machine learning models receive the IoT telemetry data, as a least a part of the inputs, to determine recommendations that are tied to the IoT device and specific to the IoT device user. Non Fungible Tokens (NFTs) are minted by the IoT device manufacturer/distributor and hold a link to an IoT device identifier and an IoT device user identifier and include a smart contract formed between the third-party and the IoT device user that defines the criteria for the telemetry data that is to be acquired by the third-party. Use of the NFT allows for IoT gateways/data listeners to determine which IoT telemetry data is to be transmitted to the third-party and allows for the transmission to occur without identifying the IoT user in the transmissions.

Classes IPC  ?

  • G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques

14.

Multi-dimensional extrasensory deciphering of human gestures for digital authentication and related events

      
Numéro d'application 18243292
Numéro de brevet 12099661
Statut Délivré - en vigueur
Date de dépôt 2023-09-07
Date de la première publication 2024-09-24
Date d'octroi 2024-09-24
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Krishnan, Subburathinam
  • Arya, Abhishek
  • Balasubramanian, Prabhakaran
  • Khuttumolu, Durga Prasad P.

Abrégé

Virtual assistant devices and related methods are described that allow users having special needs to communicate with the virtual assistant device. The virtual assistant devices are augmented with additional intelligent sensors, including, but not limited to, three-dimensional optical sensors that are used to capture optical signals of user's non-verbal communication (e.g., sign language, lip movements, gestures or the like). Additionally, the virtual assistant device includes an Artificial Intelligence (AI)-based engine that includes one or more Machine Learning (ML) models trained on user-specific data and used to determine the non-verbal communication of the user (i.e., sign language, lip movements or other gestures) based on inputs derived from the sensors. Moreover, the virtual assistant devices may be configured to generate and display visual information, such as three-dimensional floating avatars of the user and/or the virtual assistant.

Classes IPC  ?

  • G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
  • G06F 21/31 - Authentification de l’utilisateur
  • G06T 13/40 - Animation tridimensionnelle [3D] de personnages, p.ex. d’êtres humains, d’animaux ou d’êtres virtuels

15.

SYSTEM AND METHOD FOR AUTHENTICATING INTERACTIONS WITH DYNAMICALLY VARYING DIGITAL RESOURCES LINKED TO RESOURCE DISTRIBUTION DEVICES

      
Numéro d'application 18675004
Statut En instance
Date de dépôt 2024-05-27
Date de la première publication 2024-09-19
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Polasa, Puneetha
  • Chauhan, Sandeep Kumar
  • Lavanya Mallidi, Bhagya Lakshmi Sudha
  • Ratnakaram, Udaya Kumar Raju

Abrégé

Embodiments of the present invention provide a system for authenticating interactions with dynamically varying digital resources linked to resource distribution devices. In particular, the system may be configured to identify initiation of an interaction by a user, via a resource distribution device, receive a request to verify a digital resource from an entity device, wherein the digital resource is captured by the entity device from a display of the resource distribution device, verify that the digital resource matches a stored digital resource linked with the user and transmit a confirmation to the entity device, receive a completion request from an interaction server to complete the interaction, validate that the digital resource is registered to the user, determine that the validation is successful, perform multi-level authentication to authorize completion of the interaction, and complete the interaction in response to performing the multi-level authentication.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

16.

REMOTE VALIDATION OF AUTOMATED TELLER MACHINES (ATMs) USING MACHINE LEARNING

      
Numéro d'application 18120461
Statut En instance
Date de dépôt 2023-03-13
Date de la première publication 2024-09-19
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Mattison, Paul
  • Williams, Matthew
  • Simpson, Tanikia V.
  • Duncan, Kristi Kae
  • Beacham, Jeffrey A.

Abrégé

Aspects of the disclosure relate to a remote validation platform for ATMs. The platform may train a reconfiguration model to output sets of configuration instructions. The platform may receive a first information stream from a first ATM. The platform may receive one or more additional information streams from sources associated with the first ATM. The platform may generate, using the reconfiguration model, a first set of configuration instructions based on the first information stream and the one or more additional information streams. The platform may cause reconfiguration of the first ATM based on the first set of configuration instructions. The platform may refine the reconfiguration model based on the first set of configuration instructions.

Classes IPC  ?

  • G07F 19/00 - Systèmes bancaires complets; Dispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p.ex. guichets automatiques
  • G06N 5/022 - Ingénierie de la connaissance; Acquisition de la connaissance
  • G06Q 10/20 - Administration de la réparation ou de la maintenance des produits

17.

Zero Trust Enable Intelligent Apparatus To Register IoT Devices For Payment Leveraging Non Fungible Token

      
Numéro d'application 18121463
Statut En instance
Date de dépôt 2023-03-14
Date de la première publication 2024-09-19
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Singh, Shailendra

Abrégé

Systems and methods are disclosed for validating transactions executed by Internet of Things (IoT) devices leveraging non fungible tokens (NFTs) stored on a blockchain. The system generates a first NFT paired with metadata associated with an IoT device, a second NFT paired with metadata associated with a transaction requested by the IoT device, and a third NFT merging the first and second NFTs together. The NFTs are used in validation processes to ensure an IoT device and/or a transaction requested by an IoT device are valid. The NFTs are bound to smart contracts assigned one or more rules related to validating an IoT device and/or transaction requested by an IoT device. A transaction requested by an IoT device executes based on the validation processes.

Classes IPC  ?

  • G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
  • G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives

18.

Zero Trust Enable Intelligent Apparatus To Register IoT Devices For Payment Leveraging Non Fungible Token

      
Numéro d'application 18121514
Statut En instance
Date de dépôt 2023-03-14
Date de la première publication 2024-09-19
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Singh, Shailendra

Abrégé

Systems and methods are disclosed for validating transactions executed by Internet of Things (IoT) devices leveraging non fungible tokens (NFTs) stored on a blockchain. The system generates a first NFT paired with metadata associated with an IoT device, a second NFT paired with metadata associated with a transaction requested by the IoT device, and a third NFT merging the first and second NFTs together. The NFTs are used in validation processes to ensure an IoT device and/or a transaction requested by an IoT device are valid. The NFTs are bound to smart contracts assigned one or more rules related to validating an IoT device and/or transaction requested by an IoT device. A transaction requested by an IoT device executes based on the validation processes.

Classes IPC  ?

  • G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
  • G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails

19.

Detecting Malicious Email Campaigns with Unique but Similarly-Spelled Attachments

      
Numéro d'application 18121885
Statut En instance
Date de dépôt 2023-03-15
Date de la première publication 2024-09-19
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Schaaf, Mark

Abrégé

Processes and machines are disclosed for detecting malicious email campaigns based on unique but similarly spelled attachments. Email log(s) from network appliances are retrieved, filtered, normalized, and converted into field-based organized data for comprehensive analysis. Cluster analysis is performed. Filenames of email attachments are transformed into numerical vectors and a cosine similarity termset analysis is performed on the numerical vectors. Data is organized into time bins for burst detection. Statistical analysis is performed on the time bins. Pattern recognition is performed to identify alphanumeric similarities in the filenames of the attached files in order to detect malicious email campaigns. Machine learning may be used to optimize the cosine similarity threshold and other query variables, and to update existing cybersecurity filters and firewalls. Mitigation can be performed to remove malicious emails that were delivered to recipient mailboxes.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
  • H04L 51/08 - Informations annexes, p.ex. pièces jointes

20.

STAND-ALONE IOT DEVICE FOR REPAIRING FAILURES ON A COMPUTING DEVICE

      
Numéro d'application 18122204
Statut En instance
Date de dépôt 2023-03-16
Date de la première publication 2024-09-19
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Meenakshisundaram, Meenakshi
  • C, Nithya
  • Vijayvergiya, Rajaram
  • S, Madhumitha
  • Iruvanti, John

Abrégé

A stand-alone embedded internet of things edge artificial intelligence device (“EIEAC”) may be provided. The EIEAC may be configured to operate independent of the computing device and may be configured to monitor and repair failures occurring at the computing device. The EIEAC may receive computer health data from a client agent application running on the computing device. The EIEAC may include a memory configured to store the computer health data and a battery configured to charge the EIEAC. The EIEAC may include a processor configured to process the computer health data to identify one or more failures using tiny machine learning (“tinyML”). When one or more failures are identified by the processor, the tinyML may be configured to execute instructions on the computer health data for repairing the one or more failures. When unsuccessful, the EIEAC may establish an electronic connection with a remote cloud lookup tower for repairing.

Classes IPC  ?

  • G06F 11/07 - Réaction à l'apparition d'un défaut, p.ex. tolérance de certains défauts

21.

SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING A SINGLE POINT MULTI-COMPONENT AUTHENTICATION USING A PRE-DETERMINED SEQUENCE IN AN ELECTRONIC NETWORK

      
Numéro d'application 18123063
Statut En instance
Date de dépôt 2023-03-17
Date de la première publication 2024-09-19
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Berry, Anna Kristen Pingel
  • Kocharyan, Olga
  • Joshi, Ravi
  • Sharief, Luqman
  • Whitaker, Michael Wm.
  • Hardman, Benjamin Daniel
  • Ambulkar, Shweta
  • Ianni, Angela

Abrégé

Systems, computer program products, and methods are described herein for implementing a single point multi-component authentication using a pre-determined sequence in an electronic network. The present disclosure is configured to identify a pre-determined sequence associated with a user account; identify a plurality of valid authentication credentials associated with the user account; generate a multi-component authentication graphical user interface, wherein the multi-component authentication graphical user interface comprises a plurality of input locations; receive a first authentication credential at a first unverified location of the plurality of input locations; determine whether the first authentication credential is valid; receive a second authentication credential at a second unverified location of the plurality of input locations; determine whether the second authentication credential is valid; and allow, in an instance where the first authentication credential is valid and the second authentication credential is valid, access to the user account.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

22.

SYSTEM AND METHOD FOR GENERATING AND TRANSMITTING VISUALIZED SOFTWARE CODE RELEASE AND DEPLOYMENT FUNCTIONS TO A MIXED REALITY ENVIRONMENT

      
Numéro d'application 18123124
Statut En instance
Date de dépôt 2023-03-17
Date de la première publication 2024-09-19
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Bakshi, Sakshi
  • Kutthumolu, Durga Prasad

Abrégé

Embodiments of the present invention provide a system for generating and transmitting visualized software code release and deployment functions to a mixed reality environment. The system is configured for determining that a user has submitted a software code associated with a software code release of a software application, identifying, one or more components in the software code, generating a release file comprising at least information associated with the one or more components, generating a summary file comprising a summary of the release file, transmitting the summary file to a distributed computing environment, converting the summary file to an immersive visualized file in the distributed computing environment, and displaying the immersive visualized file to one or more users comprising the user in the distributed computing environment, wherein the distributed computing environment is integrated with a mixed reality environment for displaying the immersive visualized file to the one or more users.

Classes IPC  ?

23.

System and method for detecting radio-frequency-based attacks in a predetermined area

      
Numéro d'application 18183777
Statut En instance
Date de dépôt 2023-03-14
Date de la première publication 2024-09-19
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Singh, Shailendra

Abrégé

An apparatus may be configured to detect radio-frequency (RF)-based attacks in a predetermined area. The server may include a memory and a processor. The memory may be configured to store a baseline RF signature corresponding to an electric component located in a predetermined area. The baseline RF signature may comprise an expected RF signature tracked from the electric component during a predetermined amount of time. The processor may be configured to monitor electronic operations of the electric component over the predetermined amount of time. The electric component may be located in the predetermined area. The processor may be configured to track an RF signature associated with the electric component. The processor may be configured to determine that the RF signature comprises an anomaly during the predetermined amount of time based at least in part upon the RF signature being different from the baseline RF signature corresponding to the electric component.

Classes IPC  ?

  • G01S 5/02 - Localisation par coordination de plusieurs déterminations de direction ou de ligne de position; Localisation par coordination de plusieurs déterminations de distance utilisant les ondes radioélectriques
  • H04W 12/104 - Intégrité de la localisation, p.ex. géolocalisation sécurisée
  • H04W 12/121 - Système de détection d’intrusions sans fil [WIDS]; Système de prévention d’intrusions sans fil [WIPS]

24.

System and method for detecting radio-frequency-based attackers in a predetermined area

      
Numéro d'application 18183793
Statut En instance
Date de dépôt 2023-03-14
Date de la première publication 2024-09-19
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Singh, Shailendra

Abrégé

An apparatus may be configured to detect radio-frequency (RF)-based attackers in a predetermined area. The apparatus may include a memory and a processor. The memory may be configured to store a baseline RF signature corresponding to an electric component located in the predetermined area. The processor may be configured to monitor first electronic operations of the electric component; and track a first RF signature corresponding to the first plurality of electronic operations of the electric component. The processor may be configured to determine that a new device is in the predetermined area; monitor a second plurality of electronic operations of the new device; and track a second RF signature corresponding to the second plurality of electronic operations of the new device. The processor may be configured to determine that the first RF signature comprises an anomaly in response to the first RF signature being different from the baseline RF.

Classes IPC  ?

  • H04W 12/122 - Contre-mesures pour parer aux attaques; Protection contre les dispositifs malveillants
  • G01S 5/02 - Localisation par coordination de plusieurs déterminations de direction ou de ligne de position; Localisation par coordination de plusieurs déterminations de distance utilisant les ondes radioélectriques

25.

Self-Service Kiosk Inventory Control

      
Numéro d'application 18120480
Statut En instance
Date de dépôt 2023-03-13
Date de la première publication 2024-09-19
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Mattison, Paul
  • Williams, Matthew E.

Abrégé

Arrangements for self-service kiosk inventory control are provided. In some aspects, note data may be received by a computing platform from a self-service kiosk and may include note identifiers. The computing platform may monitor the self-service kiosk for a triggering event. Responsive to detecting the triggering event, the computing platform may generate and send an instruction to the self-service kiosk causing the self-service kiosk to initiate a rescan function. The the rescan function may cause the self-service kiosk to recapture a note identifier associated with each note of currency currently within the self-service kiosk. The results of the rescan may be compared to the received note data to determine whether all expected notes are within the self-service kiosk. If not, a service instruction may be generated and sent, an instruction causing the self-service kiosk to modify functionality may be generated and sent, or the like.

Classes IPC  ?

  • G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
  • G06Q 20/18 - Architectures de paiement impliquant des terminaux en libre-service, des distributeurs automatiques, des bornes ou des terminaux multimédia

26.

SYSTEM AND METHOD FOR CENTRALIZED ANALYSIS AND MONITORING OF PROCESS DATA VIA BASELINE DATA MAPPING

      
Numéro d'application 18121734
Statut En instance
Date de dépôt 2023-03-15
Date de la première publication 2024-09-19
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Ranjan, Prabhat
  • Banerjee, Shilpa
  • Daliparthi, Venkateswara Rao
  • Gorantla, Sireesha K.
  • Melvin, Sean Edward
  • Negi, Karan Singh
  • Roy, Rajsekhar Singha
  • Vijayan, Pradeep Kalarickakudy

Abrégé

Systems, computer program products, and methods are described herein for centralized analysis and monitoring of process data via baseline data mapping. The system is configured to retrieve a plurality of backend processes and store baseline data, wherein the baseline data comprises data from a database indicating a status of each of a plurality of enabled backend processes. The system is further configured to monitor the plurality of backend processes at a predetermined interval, and in response to monitoring, store, in a database, monitoring data, wherein the monitoring data comprises data indicating a status for each of the plurality of backend processes. The system is further configured to access the database, at the predetermined interval, to compare the status for each of the plurality of backend processes to the corresponding baseline data and generate at least one of a report and an update to a process status portal.

Classes IPC  ?

  • G06F 9/48 - Lancement de programmes; Commutation de programmes, p.ex. par interruption
  • G06F 9/54 - Communication interprogramme
  • G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données

27.

SYSTEM AND METHOD FOR GENERATING INDIVIDUAL RECORDS ACROSS MULTIPLE DEVICES VIA AN ULTRA-WIDEBAND CONNECTION

      
Numéro d'application 18122856
Statut En instance
Date de dépôt 2023-03-17
Date de la première publication 2024-09-19
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Sethia, Maneesh
  • Singh, Shailendra

Abrégé

Systems, computer program products, and methods are described herein for generating individual records across multiple devices via an ultra-wideband connection. The method includes receiving a transfer request associated with a user. The method also includes determining a first transfer device. In an instance in which a first transfer device amount of the resource is less than the one or more units of the resource indicated by the transfer request, the method also includes determining a second transfer device. The method further includes creating a first transfer device non-fungible token for the first transfer device and a second transfer device non-fungible token for the second transfer device. A cumulative of the resource indicated by the first transfer device non-fungible token and the second transfer device non-fungible token are less than or equal to the one or more units of the resource indicated by the transfer request.

Classes IPC  ?

  • G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails

28.

SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING A MULTI-COMPONENT AUTHENTICATION USING PRE-DETERMINED SEQUENCES AND INDICATORS IN AN ELECTRONIC ENVIRONMENT

      
Numéro d'application 18123088
Statut En instance
Date de dépôt 2023-03-17
Date de la première publication 2024-09-19
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Berry, Anna Kristen Pingel
  • Kocharyan, Olga
  • Joshi, Ravi
  • Sharief, Luqman
  • Whitaker, Michael Wm.
  • Hardman, Benjamin Daniel
  • Ambulkar, Shweta
  • Ianni, Angela

Abrégé

Systems, computer program products, and methods are described herein for implementing a multi-component authentication using pre-determined sequences and indicators in an electronic network. The present disclosure is configured to identify a pre-determined sequence; configure a multi-component authentication graphical user interface; determine whether a first authentication credential is valid when it matches the first valid authentication credential, the first input location matches the first authenticated input location, and the first authentication credential is received in the first pre-determined indicator period; configure the multi-component authentication graphical user interface with at least one second indicator; determine whether at least one second authentication credential is valid when the at least one second authentication credential matches the at least one second valid authentication credential, the second input location matches the at least one second authenticated input location, and the at least one second authentication credential is received in the second pre-determined indicator period.

Classes IPC  ?

  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
  • G06F 21/45 - Structures ou outils d’administration de l’authentification
  • H04L 9/40 - Protocoles réseaux de sécurité

29.

NON-FUNGIBLE TOKEN DIGITAL WALLET AS A GATEWAYFOR CONDUCTING RESOURCE-RELATED EVENTS/TRANSACTIONS

      
Numéro d'application 18123169
Statut En instance
Date de dépôt 2023-03-17
Date de la première publication 2024-09-19
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Joshi, Ravi
  • Ambulkar, Shweta
  • Berry, Anna Kristen Pingel
  • Hardman, Benjamin Daniel
  • Ianni, Angela
  • Kocharyan, Olga
  • Sharief, Luqman
  • Whitaker, Michael Wm.

Abrégé

Generation of an NFT digital wallet that stores an NFT that serves as verified identity for the user. Both a private side/portion of the wallet having a private address and public side/portion of the wallet having a public address are generated. Additionally, a set of rules are configured that provide gateway functionality for receiving resource-related events using the private address. The public address is used for transmitting outgoing resource-related events and receiving incoming resource-related events, while the private address is used to validate at least some of the incoming resource-related events. The incoming resource-related events requiring validation is defined by the set of rules. In use, launching of the NFT digital wallet and user authentication via NFT presentation prompts presentation of the private side and outstanding incoming resource-related events awaiting validation. Once incoming resource-related events are validated and the user is re-authenticated, the public side is presented along with validated incoming resource-related events.

Classes IPC  ?

  • G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques

30.

System and method for generating a virtual experience in a virtual environment

      
Numéro d'application 18183613
Statut En instance
Date de dépôt 2023-03-14
Date de la première publication 2024-09-19
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Pandey, Anushka
  • Singla, Rajat
  • Kesava, Siva
  • Parsa, Praveen Kumar
  • Vasudevan, Murugan
  • Viswanathan, Krithika
  • Mishra, Amit

Abrégé

A system includes a memory and a processor coupled to the memory. The processor receives a first user credential associated with a first user and authorizes an avatar of the first user to enter a virtual environment. The processor receives a first selection of an experience theme and a second selection of at least one product type from the selected experience theme. The processor determines a first data file that provides a first benefit count to the first user when a first amount of data objects is transferred from a first data file of the first user to a second data file. The processor indicates to the first user that the first data file provides the first benefit count to the first user, receives a command to obtain the first data file, and initiates a registration process to register the first user to obtain the first data file.

Classes IPC  ?

  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès

31.

Data reconciliation system and method

      
Numéro d'application 18184865
Statut En instance
Date de dépôt 2023-03-16
Date de la première publication 2024-09-19
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Marker, Richard William
  • Gupta, Amit
  • Mehta, Kripsa Mahesh
  • Albert, Selvakumar

Abrégé

A system assigns a unique prefix to a data table. The system generates a set of document identifications (IDs) for a set of data records included in the data table. The system generates a data key that corresponds to a combination of two or more columns of the data table. The system identifies one or more data records that share a key value with each other, where the key value is associated with the data key. The system determines that the one or more data records belong to a user based at least on identifying that the one or more data records share the key value with each other. The system assigns an entity ID to the identified one or more data records in response to determining that the one or more data records belong to the user.

Classes IPC  ?

  • G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet

32.

Relay-Switch with Sandbox Communication Connections

      
Numéro d'application 18677073
Statut En instance
Date de dépôt 2024-05-29
Date de la première publication 2024-09-19
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Haletky, Edward L.

Abrégé

A network connection device may include at least one sandbox to detect, isolate, and remove any discovered malware or cyber threat. The device may be configured to receive, save, and inspect data. A control layer may manage network connectivity so that only home organization network connections or external party network connections are connected at given moment in time.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée
  • H04W 12/37 - Gestion des politiques de sécurité pour des dispositifs mobiles ou pour le contrôle d’applications mobiles

33.

System for enhanced anomaly recognition in network topologies using interactive visualization

      
Numéro d'application 18200389
Numéro de brevet 12095607
Statut Délivré - en vigueur
Date de dépôt 2023-05-22
Date de la première publication 2024-09-17
Date d'octroi 2024-09-17
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Castrejon, Iii, Tomas M.
  • Siekman, James J.

Abrégé

Systems, computer program products, and methods are described herein for anomaly recognition in network topologies using interactive visualization. The present disclosure is configured to determine that an end-point device is associated with anomalous activity; capture, using a virtual reality application installed on a user input device, real-time network traffic associated with the end-point device; isolate, using the virtual reality application, network traffic associated with the anomalous activity; initiate spatial and temporal traffic analysis on the anomalous activity; determine a remedial action based on the spatial and temporal traffic analysis to mitigate effects of the anomalous activity; and implement the remedial action on the end-point device.

Classes IPC  ?

  • H04L 41/0659 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau en isolant ou en reconfigurant les entités défectueuses
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]

34.

SYSTEM AND METHOD FOR PERFORMING INTERACTIONS ACROSS GEOGRAPHICAL REGIONS WITHIN A METAVERSE

      
Numéro d'application 18664144
Statut En instance
Date de dépôt 2024-05-14
Date de la première publication 2024-09-12
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Varma, Jayachandra
  • Kurian, Manu
  • Dhawan, Lalit

Abrégé

A processor is configured to access a virtual environment comprising a plurality of virtual locations. The processor is configured to generate a primary avatar in a first virtual location based on a superset of the user data associated with a first set of the interaction criteria objects. The processor is configured to receive an interaction request from a user device for an interaction with the entity in a second virtual location. The processor is configured to generate a secondary set of user data based on the superset of the user data and the second set of the interaction criteria objects. The processor is configured to generate a secondary avatar associated with the user device in the second virtual location. The processor is further configured to conduct the interaction between the secondary avatar and the entity in the second virtual location based on the second set of the interaction criteria objects.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/31 - Authentification de l’utilisateur
  • G06T 11/00 - Génération d'images bidimensionnelles [2D]
  • H04L 67/131 - Protocoles pour jeux, simulations en réseau ou réalité virtuelle
  • H04L 67/306 - Profils des utilisateurs
  • H04L 67/52 - Services réseau spécialement adaptés à l'emplacement du terminal utilisateur

35.

BIO-MESH NETWORK LEVERAGING NATURAL SELECTION OPTIMIZATION FOR INTELLIGENT AUTO-HEALING

      
Numéro d'application 18666998
Statut En instance
Date de dépôt 2024-05-17
Date de la première publication 2024-09-12
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Muthukrishnan, Ramaswamy
  • Reddy, Palamakula Satyanarayana
  • Maringanti, Sreekanth Raghuveer

Abrégé

Apparatus and methods for accelerating the remediation of broken transactions using parallel machine learning processing and optimization is provided. The methods may include a network access point receiving, from an application programming interface, a broken transaction. The methods may also include a network access point selecting a bionic element within a bio-mesh network for processing the broken transaction and routing the broken transaction to the bionic element. The bio-mesh network may include a plurality of bionic elements. The methods may further include the bionic element receiving the broken transaction and extracting, from the broken transaction, a set of features, transmitting the set of features to a policy bank, and, in response to the policy bank failing to identify a stored routine associated with the set of features for fixing the broken transaction, running in parallel two machine-learning algorithms to identify an optimal routine for fixing the broken transaction.

Classes IPC  ?

  • G06Q 20/26 - Schémas de débit, c. à d. de "paiement immédiat"
  • G06N 20/00 - Apprentissage automatique
  • G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
  • H04W 84/18 - Réseaux auto-organisés, p.ex. réseaux ad hoc ou réseaux de détection

36.

SECURE USER AUTHENTICATION LEVERAGING QUANTUM KEY AND STEGANOGRAPHY

      
Numéro d'application 18668209
Statut En instance
Date de dépôt 2024-05-19
Date de la première publication 2024-09-12
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s) Mohanty, Swetapadma

Abrégé

Secure user authentication is provided by leveraging the use of quantum keys, steganography and random user keys/passcodes. Random user passcodes limit both the entity's control over the user and potential exposure of the passcode to wrongdoers. From a security standpoint, use of quantum keys and quantum communication channels heightens security during transmission of keys, such that if a wrongdoer would attempt to hack the transmission, the quantum sequence would break, which would not only prevent the hack but also result in remedial actions, such as preventing the authentication-requiring event, providing alerts and the like. Further, use of steganography also heightens security by preventing exposure to the keys during transmission and/or while the authentication process is occurring on the display of the user's mobile device.

Classes IPC  ?

37.

SYSTEMS AND METHODS FOR DYNAMIC COMMUNICATION CHANNEL SWITCHING FOR SECURE MESSAGE PROPAGATION

      
Numéro d'application 18668215
Statut En instance
Date de dépôt 2024-05-19
Date de la première publication 2024-09-12
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Castrejon, Iii, Tomas M.
  • Kurian, Manu Jacob
  • Nardoni, David
  • Townsend, Joel
  • Young, Michael Robert

Abrégé

Systems, computer program products, and methods are described herein for dynamic communication channel switching for secure message propagation. The present invention may be configured to receive wireless signals from a plurality of devices and identify, from the plurality of devices and based on the wireless signals, a trusted device. The present invention may be configured to receive, from another device, a secure message, where the secure message includes information identifying a vulnerability in a network to which the trusted device is connected. The present invention may be configured to establish, based on receiving the secure message and using a first wireless communication interface, a communication link with a second wireless communication interface of the trusted device to establish a wireless data channel with the trusted device and transmit, via the wireless data channel, the secure message to the trusted device.

Classes IPC  ?

  • H04W 12/50 - Appariement sécurisé de dispositifs
  • H04W 12/102 - Intégrité des routes, p.ex. en utilisant des chemins sécurisés
  • H04W 12/60 - Sécurité dépendant du contexte
  • H04W 76/15 - Gestion de la connexion Établissement de la connexion Établissement de connexions à liens multiples sans fil

38.

SYSTEM FOR CONTAINERIZATION-BASED COUNTERMEASURES TO CYBERSECURITY VULNERABILITIES

      
Numéro d'application 18119109
Statut En instance
Date de dépôt 2023-03-08
Date de la première publication 2024-09-12
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Albero, George Anthony
  • Bertsch, Kristoffer Matthew
  • Kim, Jinna Zevulun
  • Mukherjee, Maharaj
  • Murphy, Timothy Scott

Abrégé

A system is provided for containerization-based countermeasures to cybersecurity vulnerabilities. In particular, the system may generate one or more containers (e.g., virtual environments), where each container may be configured to execute one or more tasks. At least a portion of the containers may be decoy containers that may be executing one or more decoy tasks. The system may then use a randomized process to change which containers are decoy and/or which tasks or jobs are executed within each container. Each container may be associated with a cryptographic key such that each container may be hashed by the system and compared against a reference hash associated with the container. If the hash has changed, the system may determine that the container has been modified and subsequently implement one or more intelligent remediation processes.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

39.

Processing data interactions performed by an Internet of Things (IoT) device

      
Numéro d'application 18181240
Statut En instance
Date de dépôt 2023-03-09
Date de la première publication 2024-09-12
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Krishnan, Subburathinam
  • Balasubramanian, Prabhakaran
  • Khuttumolu, Durga Prasad P
  • Jaini, Yugandhar

Abrégé

A processor detects that a first data interaction has been initiated by a first user device associated with a first user. The processor determines whether the first data interaction is to be processed in a first computing network or a second computing network and processes the first data interaction in the determined computing network. After processing the first data interaction, the processor obtains an interaction log associated with the first data interaction, extracts information related to the first data interaction from the interaction log, and transmits the information associated with the first data interaction to a non-fungible token (NFT) blockchain network for recording in a first NFT associated with the first user device.

Classes IPC  ?

  • G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
  • G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
  • G06Q 20/30 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques
  • G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
  • G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives

40.

Resolving failed data interactions performed by an Internet of Things (IoT) device

      
Numéro d'application 18181298
Statut En instance
Date de dépôt 2023-03-09
Date de la première publication 2024-09-12
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Krishnan, Subburathinam
  • Balasubramanian, Prabhakaran
  • Khuttumolu, Durga Prasad P
  • Jaini, Yugandhar

Abrégé

A processor detects a first failure incident associated with a failure of a data interaction relating to a transfer initiated by a user device of data objects from a source data file associated with the user device to a target data file. The processor obtains a first interaction log associated with the data interaction, compares it with a plurality of second interaction logs associated with a plurality of known failure incidents, and determines a correlation probability. If the correlation probability equals or exceeds a threshold probability, the processor determines a first known failure incident that is associated with the first failure incident. The processor obtains a first known solution that corresponds to the first known failure incident and processes the data interaction based on the first known solution by performing at least one corrective action specified in the first known solution.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

41.

SYSTEM FOR SECURE INFORMATION TRANSFER IN A VIRTUAL ENVIRONMENT

      
Numéro d'application 18117812
Statut En instance
Date de dépôt 2023-03-06
Date de la première publication 2024-09-12
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Subramanian, Sruthi
  • Pallapolu, Kalyan Chakravarthy
  • Sreenivas, Gali Mohan
  • Mahesh, Gondi

Abrégé

Systems, computer program products, and methods are described herein for secure information transfer in a virtual environment. The present disclosure is configured to receive, using a first user input device, real-time communication from a first user during a virtual interaction session with a second user in the virtual environment; determine that at least a portion of the real-time communication comprises sensitive information; initiate a temporary sub-session within the virtual interaction session in response to determining that the real-time communication comprises sensitive information, thereby temporarily pausing the virtual interaction session; record the sensitive information within the temporary sub-session; terminate the temporary sub-session in response to recording the sensitive information; and resume the virtual interaction session to continue receiving the real-time communication.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
  • G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
  • G06T 15/00 - Rendu d'images tridimensionnelles [3D]
  • G10L 15/18 - Classement ou recherche de la parole utilisant une modélisation du langage naturel
  • G10L 15/22 - Procédures utilisées pendant le processus de reconnaissance de la parole, p.ex. dialogue homme-machine 

42.

SYSTEM AND METHOD FOR ASSESSING ENTITY SECURITY USING AGGREGATED DATA SOURCES

      
Numéro d'application 18117889
Statut En instance
Date de dépôt 2023-03-06
Date de la première publication 2024-09-12
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Nanduri, Pradheepa Raghunaathan
  • Agosa, Sedonami Oluwadamilola
  • Doherty, Daniel James
  • Fay, Zachary David
  • Mcnab, Andrew Braden
  • Mendoza, Katalina Lucia
  • Miniati, Margaret Lee
  • Schultz, Andrew Franklin
  • Williams, Amy Marie

Abrégé

Systems, computer program products, and methods are described herein for assessing entity strategic impact using aggregated data sources. The method includes receiving at least one strategic impact indicator from each of at least two strategic impact data sources. The at least one strategic impact indicator relates to an entity strategic impact of an entity. The method also includes determining, via a machine learning model, a strategic impact confidence level for the entity. The strategic impact confidence level indicates a likelihood of an emerging strategic impact relating to the entity. The method further includes generating a strategic impact assessment report. The strategic impact assessment report indicates at least the strategic impact confidence level for the entity. The strategic impact assessment report also includes a strategic impact alert in an instance in which the strategic impact confidence level is below a threshold strategic impact level.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

43.

SYSTEM FOR VALIDATION AND AUTHENTICATION OF RESOURCES IN A VIRTUAL ENVIRONMENT

      
Numéro d'application 18119168
Statut En instance
Date de dépôt 2023-03-08
Date de la première publication 2024-09-12
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Albero, George Anthony
  • Mukherjee, Maharaj

Abrégé

A system is provided for validation and authentication of resources in a virtual environment. In particular, the system may embed a digital source identifier into a digital or virtual resource within the virtual environment. For instance, in some embodiments, the digital source identifier may be an image file that may be stored within one or more pre-defined areas or regions of the virtual resource, where the image file serves as an indicator of authenticity and validity of the virtual resource. Accordingly, the system may comprise a scanner that may be configured to scan the one or more pre-defined areas or regions to detect the presence of the digital source identifier. If the digital source identifier is found, the system may determine that the virtual resource has been validated and authenticated.

Classes IPC  ?

  • G06F 21/44 - Authentification de programme ou de dispositif
  • G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]

44.

METHOD FOR RESOURCE TRANSFER MODE EVALUATION IN DISTRIBUTED NETWORK USING SEMI-DYNAMIC TOKENIZED GRAPH NODE PROCESSING

      
Numéro d'application 18119958
Statut En instance
Date de dépôt 2023-03-10
Date de la première publication 2024-09-12
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Bakshi, Sakshi
  • Jha, Amod
  • Kedia, Anup Kumar
  • Paini, Siva Kumar
  • Juneja, Sachin
  • Agarwal, Amit

Abrégé

Systems, computer program products, and methods are described herein for resource transfer mode evaluation in distributed network using semi-dynamic tokenized graph node processing. The present disclosure is configured to receive resource data from one or more resource transfer channels; extract metadata from the resource data and determine one or more resource transfer processing requests; generate a dynamic hash value for the one or more resource transfer processing requests; tokenize the dynamic hash value to generate a semi-dynamic token; select a resource gateway and a resource mode for the one or more resource transfer processing requests; generate a key value pair for the selected resource gateway and the resource mode; tokenize the key value pair and store the tokenized key value pair on a distributed ledger; and flag one or more non-selected resource gateways and resource nodes.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

45.

SYSTEM AND METHOD FOR INTELLIGENT PREDICTION AND IMPLEMENTATION OF DYNAMICALLY CHANGING REQUIREMENTS RELATING TO INCOMING NETWORK REQUESTS

      
Numéro d'application 18120179
Statut En instance
Date de dépôt 2023-03-10
Date de la première publication 2024-09-12
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Mishra, Amit
  • Pandey, Anushka
  • Pani, Suvendu Ranjan
  • Viswanathan, Krithika

Abrégé

Embodiments of the present invention provide a system for intelligent prediction and implementation of dynamically changing requirements relating to incoming network requests. The system is configured for determining that the entity system associated with an entity received a user request from a user, establishing a secure communication link with the entity system, extracting, via a requirement evaluator, through the secure communication link, at least a part of the user request that requires a requirement evaluation, predicting, via a requirement predictor, one or more requirements that are associated with the part of the user request, evaluating the one or more requirements and cataloged requirements stored in a requirement catalog, determining a real-time deviation between the one or more requirements and the cataloged requirements, and providing a solution for the real-time deviation.

Classes IPC  ?

46.

Selecting data interactions to be performed by an Internet of Things (IoT) device

      
Numéro d'application 18181269
Statut En instance
Date de dépôt 2023-03-09
Date de la première publication 2024-09-12
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Krishnan, Subburathinam
  • Balasubramanian, Prabhakaran
  • Khuttumolu, Durga Prasad P
  • Jaini, Yugandhar

Abrégé

A processor records in a memory a plurality of data interactions conducted using a first user device associated with a first user and determines a behavior log associated with the first user, wherein the behavior log stores events associated with the plurality of data interactions conducted using the first user device. The processor monitors a computing network for future events that are to occur in the computing network and determines based on the monitoring that a first future event is to occur in the computing network. The processor compares the first future event with the behavior log and determines that a first data interaction was previously conducted using the first device in relation to a second event that is associated with the first future event. The processor initiates the first data interaction in relation to the first future event using the first user device.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

47.

Uninterrupted Virtual Reality Experience During Customer & Virtual Agent Interaction

      
Numéro d'application 18372478
Statut En instance
Date de dépôt 2023-09-25
Date de la première publication 2024-09-12
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Kammara, Sanjeeva Karna
  • Meenavalli, Venkatrao
  • Iruvanti, John Dinakar

Abrégé

A real-time process for establishing and reestablishing virtual reality (VR) sessions between automated agent and a customer with customer VR equipment without losing session context after a connection loss is disclosed. VR sessions are dynamically created/recreated using artificial intelligence/machine learning (AI/ML) for engaging virtual agents and customers. Real-time capturing and processing of the VR interaction is captured for session context and stored via blockchain ledgers for secure tracking. VR session connectivity is monitored in real-time. If any anomaly or interruption occurs, retry notifications are sent to establish a second session. Prior session context is used for the second VR session to allow the virtual agent and customer interaction to continue without loss of context.

Classes IPC  ?

48.

DEFENSIVE DEEPFAKE FOR DETECTING SPOOFED ACCOUNTS

      
Numéro d'application 18665672
Statut En instance
Date de dépôt 2024-05-16
Date de la première publication 2024-09-12
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Keiter, Kelly Renee-Drop
  • Young, Michael
  • Mayers, Kyle
  • Lohar, Sanjay

Abrégé

Apparatus and methods for using deepfakes defensively to detect fake, spoofed, and hoax accounts and posts on social media and elsewhere are provided. A program may gather verified images or writings of a target individual. The program may analyze the verified images and writings to create a baseline. The program may use deepfake algorithms to create exemplar deepfake images or writings. The program may store the data in a database. The program may search a network for social media accounts or posts that may meet the baseline and determine whether they are legitimate or illegitimate by comparing the contents of the accounts or posts with the exemplar deepfakes. When the program determines the accounts or posts are illegitimate, the program may initiate a takedown of those accounts or posts. The program may use machine learning algorithms to refine itself and become more accurate.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
  • G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
  • G06V 40/30 - Reconnaissance d’auteur; Lecture et vérification des signatures
  • G06V 40/40 - Détection d’usurpation, p.ex. détection d’activité
  • G06V 40/50 - Traitement de données biométriques ou leur maintenance

49.

Voice Biometric Authentication in a Virtual Assistant

      
Numéro d'application 18667281
Statut En instance
Date de dépôt 2024-05-17
Date de la première publication 2024-09-12
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Mavani, Saurabh

Abrégé

Aspects of the disclosure relate to voice biometric authentication in a virtual assistant. In some embodiments, a computing platform may receive, from a user device, an audio file comprising a voice command to access information related to a user account. The computing platform may retrieve one or more voice biometric signatures from a voice biometric database associated with the user account, and apply a voice biometric matching algorithm to compare the voice command of the audio file to the one or more voice biometric signatures to determine if a match exists between the voice command and one of the one or more voice biometric signatures. In response to determining that a match exists, the computing platform may retrieve information associated with the user account, and then send, via the communication interface, the information associated with the user account to the user device.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
  • G06F 16/683 - Recherche de données caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
  • G10L 17/00 - Identification ou vérification du locuteur

50.

INTELLIGENT FEATURE CONTROLLER

      
Numéro d'application 18115814
Statut En instance
Date de dépôt 2023-03-01
Date de la première publication 2024-09-05
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Bonam, Sandeep Kumar
  • Joseph, Mary
  • Sambaraju, Lavanya
  • Gupta, Aditi

Abrégé

An intelligent feature controller is provided. The intelligent feature controller identifies failures to various features within a network. The intelligent feature controller identifies features that are dependent on the failed features within the network. The intelligent feature controller turns off the features that are dependent on the failed features within the network. As such, the network may continue operating with certain features being turned off. This limits the failures within the network to the affected features, instead of entire systems failing because of a failed feature.

Classes IPC  ?

  • G06F 11/07 - Réaction à l'apparition d'un défaut, p.ex. tolérance de certains défauts

51.

PRE-FETCH ENGINE FOR MESH DATA NETWORK HAVING DATE MICRO SILOS

      
Numéro d'application 18115823
Statut En instance
Date de dépôt 2023-03-01
Date de la première publication 2024-09-05
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Kurian, Manu
  • Iyer, Padmanabhan
  • Roscoe, Paul
  • Bhashetty, Mahesh

Abrégé

Arrangements for controlling data retrieval are provided. In some aspects, a data request may be received by a computing platform. A pre-fetch engine may be executed to analyze the data request and generate, using a machine learning model, a pre-fetch template identifying data sets responsive to the request. The pre-fetch template may be transmitted to one or more data repositories and at least one data repository may transmit response data sets to the computing platform. An issue in the mesh network through which the data sets are transmitted may be detected and the data sets may be stored at a data silo associated with a node of the mesh network. An alternate transmission path may be generated and the data may be transmitted from the data silo of the node to another node in the mesh network based on the alternate transmission path.

Classes IPC  ?

52.

PRE-FETCH ENGINE WITH OUTSIDE SOURCE SECURITY FOR MESH DATA NETWORK

      
Numéro d'application 18115830
Statut En instance
Date de dépôt 2023-03-01
Date de la première publication 2024-09-05
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Kurian, Manu
  • Iyer, Padmanabhan
  • Roscoe, Paul
  • Bhashetty, Mahesh

Abrégé

Arrangements for controlling data retrieval are provided. In some aspects, a data request may be received by a computing platform. A pre-fetch engine may be executed to analyze the data request and generate, using a machine learning model, a pre-fetch template identifying data sets responsive to the request. The pre-fetch template may be transmitted to one or more data repositories and response data including one or more of the identified data sets may be received. The source of the data sets may be evaluated to determine whether it is a trusted source. If the data repository is a trusted source, the data may be processed. If the data repository is not a trusted source, the data may be analyzed to validate the data and determine whether any anomalies exist. If the data is validated, the data may be processed. If the data is not validated, the data may be quarantined.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p.ex. dispositions anti-virus
  • G06F 11/07 - Réaction à l'apparition d'un défaut, p.ex. tolérance de certains défauts
  • G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée

53.

CONTROLLING ATM SURFACE ATTACKS LEVERAGING DECENTRALIZED SWARM INTELLIGENCE USING ATMS

      
Numéro d'application 18115858
Statut En instance
Date de dépôt 2023-03-01
Date de la première publication 2024-09-05
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Singh, Shailendra
  • Sethia, Maneesh Kumar

Abrégé

A decentralized swarm intelligence algorithm over a network of paired ATMs to prevent or control surface attacks on ATMs. The ATMs may be seeded with an initial swarm intelligence model to identify suspicious activity. An ATM may relay alerts about suspicious activity at that ATM to other paired ATMs. The ATMs use machine learning to update the model and perform swarm intelligence autonomously at the paired ATMs. A bank may provide the initial swarm intelligence model, receive alerts about and analyze the attacks, and provide updated swarm intelligence models to prevent or limit future attacks. Smart contracts may be used to specify rules for performing swarm intelligence using the paired ATMs. Records regarding swarm intelligence models, attempted suspicious attacks including payment instruments that may have been used, actions taken in response to the attacks, and smart contracts may be recorded on a blockchain distributed ledger.

Classes IPC  ?

  • G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
  • G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
  • G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails

54.

PRE-FETCH ENGINE WITH DATA EXPIRATION FUNCTIONALITY FOR MESH DATA NETWORK

      
Numéro d'application 18115827
Statut En instance
Date de dépôt 2023-03-01
Date de la première publication 2024-09-05
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Kurian, Manu
  • Iyer, Padmanabhan
  • Roscoe, Paul
  • Bhashetty, Mahesh

Abrégé

Arrangements for controlling data retrieval are provided. In some aspects, a data request may be received by a computing platform. A pre-fetch engine may be executed to analyze the data request and generate, using a machine learning model, a pre-fetch template identifying data sets responsive to the request. The pre-fetch template may be transmitted to one or more data repositories and response data sets including data use parameters may be received. The received plurality of data sets may be analyzed to determine whether a triggering action has occurred. If a triggering action has occurred, one or more data modification functions may be performed. For instance, data may be deleted, prevented from further processing, or the like, in response to detection of a triggering action.

Classes IPC  ?

  • G06F 16/23 - Mise à jour
  • G06F 12/0862 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p.ex. mémoires cache avec pré-lecture

55.

SYSTEMS AND METHODS FOR REAL-TIME PERMISSIONING FOR DIGITAL RESOURCES IN A DISTRIBUTED COMPUTING SYSTEM

      
Numéro d'application 18116400
Statut En instance
Date de dépôt 2023-03-02
Date de la première publication 2024-09-05
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Ismail, Suzanna Binte
  • Nielsen, Ryan

Abrégé

Embodiments of the invention are directed to systems, methods, and computer program products for generation of dynamic authentication tokens for use in system-to-system access authorization and user identity verification. The system includes receiving, from a user device associated with a user, a first data transmission, wherein the first data transmission comprises one or more first datasets associated with the user; applying an encryption algorithm to each first dataset to generate an encrypted dataset; configuring the encrypted dataset into an authentication token; transferring the authentication token to one or more entity systems; and receiving, from the user device, a second data transmission, wherein the second data transmission comprises a request to access a resource and a second dataset associated with the user.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/16 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes qui sont changés pendant l'opération

56.

Information security system and method for secure data transmission among user profiles using a blockchain network

      
Numéro d'application 18648125
Statut En instance
Date de dépôt 2024-04-26
Date de la première publication 2024-09-05
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Chandran, Sidhartha

Abrégé

A system for transmitting data objects among user profiles receives a request to transmit a particular number of a first type of data object to a receiver profile. The system determines whether a sender profile is associated with the particular number of the first type of data object. In response to determining that the sender profile is not associated with the particular number of the first type of data object, the system identifies one or more other types of data objects that correspond to the particular number of the first type of data object. The system initiates a user interaction session. The system generates a block within a blockchain network to store user interaction session metadata. The system transmits the identified one or more other types of data objects to the receiver profile. The system stores, in the block, a completion token that indicates the user interaction session is completed.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 16/22 - Indexation; Structures de données à cet effet; Structures de stockage

57.

Systems, methods, and apparatuses for auto-scaling volatile memory allocation in an electronic network

      
Numéro d'application 18122342
Numéro de brevet 12079119
Statut Délivré - en vigueur
Date de dépôt 2023-03-16
Date de la première publication 2024-09-03
Date d'octroi 2024-09-03
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • M, Karthee
  • Sharma, Abhishek
  • Sridharan, Sudarshan

Abrégé

Systems, computer program products, and methods are described herein for auto-scaling volatile memory allocation in an electronic network. The present invention is configured to access metadata of at least one volatile memory component, wherein the metadata is associated with at least one application; determine a current volatile memory allocation for the metadata; determine a current metadata format of the metadata; apply the metadata to a volatile memory allocation machine learning model; generate, based on the application of the metadata to the volatile memory allocation machine learning model, a new volatile memory allocation for the metadata; and apply the new volatile memory allocation to the metadata of the at least one volatile memory component, wherein the application of the new volatile memory allocation to the metadata comprises at least one of an upscaling, a downscaling, or a constant.

Classes IPC  ?

  • G06F 12/00 - Accès à, adressage ou affectation dans des systèmes ou des architectures de mémoires
  • G06F 12/02 - Adressage ou affectation; Réadressage
  • G06N 5/022 - Ingénierie de la connaissance; Acquisition de la connaissance

58.

DYNAMIC, HIDDEN, NON-FUNGIBLE TOKEN ("NFT") PLACEHOLDERS FOR USE WITH QUICK-RESPONSE ("QR") CODE FRAUD PREVENTION TECHNOLOGY

      
Numéro d'application 18434649
Statut En instance
Date de dépôt 2024-02-06
Date de la première publication 2024-08-29
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Singh, Shailendra
  • Gupta, Saurabh

Abrégé

A method for increasing the security of quick response (“QR”) code processing may include creating an inactive QR code. The inactive code may include an algorithmic code and a plurality of dynamic placeholders. The method may retrieve a scan of the inactive QR code using a QR code scanning device and also prevent the scan of the inactive QR code from being processed at the QR code scanning device. The method may receive the scan of the inactive QR code at a central server and interpret the algorithmic code to identify a plurality of non-fungible tokens (“NFTs”) for filling the plurality of dynamic placeholders. The method may fetch the plurality of NFTs and complete the incomplete QR code to form a complete QR code. The completing may include filling the plurality of dynamic placeholders with the plurality of NFTs and interpreting the complete QR code.

Classes IPC  ?

  • G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p.ex. forme, nature, code
  • G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p.ex. lecture de la lumière blanche réfléchie

59.

ELECTRONIC SYSTEM FOR GENERATING AND TRACKING LINKED ELECTRONIC DIGITAL CERTIFICATES

      
Numéro d'application 18649916
Statut En instance
Date de dépôt 2024-04-29
Date de la première publication 2024-08-29
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s) Kurian, Manu Jacob

Abrégé

Systems, computer program products, and methods are described herein for the generating and tracking linked electronic digital certificates. The present invention may be configured to generate a first electronic digital certificate having first properties and being associated with a first artifact owned by a first group of users, store the first electronic digital certificate, and record first interests of the first group of users in the first electronic digital certificate. The present invention may be configured to receive a request from a second group of users to generate a second electronic digital certificate, where the request includes a subset of the first properties for generation in the second electronic digital certificate. The present invention may be configured to generate the second electronic digital certificate, record second interests of the second group of users in the second electronic digital certificate, and link the first interests and the second interests.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • G06Q 40/08 - Assurance
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité

60.

SYSTEM AND METHOD FOR SECURING INFORMATION IN A DISTRIBUTED NETWORK VIA A DISTRIBUTED IDENTIFIER

      
Numéro d'application 18653736
Statut En instance
Date de dépôt 2024-05-02
Date de la première publication 2024-08-29
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Madiya, Tirupathirao
  • Brahadeeswaran, Archana
  • Ponnameni, Yellaiah

Abrégé

Embodiments of the invention are directed to a system, method, or computer program product for an approach to securing information stored in a distributed network. The system allows for generating distributed identifiers for information entries, wherein the distributed identifiers mask the information entries using a hash function and the distributed identifiers are dispersed across distributed ledgers. The system also allows for originating nodes to access the information entries within the distributed identifiers, while permitting other nodes and domains to reference the distributed identifiers themselves instead of referencing the information entries.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
  • G06F 16/18 - Types de systèmes de fichiers
  • G06F 16/182 - Systèmes de fichiers distribués

61.

SYSTEM FOR MONITORING ACCESS TO A VIRTUAL ENVIRONMENT USING DEVICE TAGGING

      
Numéro d'application 18113211
Statut En instance
Date de dépôt 2023-02-23
Date de la première publication 2024-08-29
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Mamadapur, Krishna Rangarao
  • Safary, Jigesh Rajendra

Abrégé

Systems, computer program products, and methods are described herein for monitoring access to a virtual environment using device tagging. The present disclosure is configured to receive, from a user input device, a request from a user to establish a first virtual object to access a virtual environment; receive parameters associated with the first virtual object; determine device information associated with the user input device; generate a first unique key based on at least the parameters and the device information; link the user input device and the first virtual object with the first unique key; store the first unique key in a key repository; and establish the first virtual object for the user to access the virtual environment, wherein the first virtual object is established to access the virtual environment exclusively with the user input device.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • G06N 3/04 - Architecture, p.ex. topologie d'interconnexion

62.

HIERARCHICAL SOFTWARE PROCESSING USING FEDERATED NODES

      
Numéro d'application 18113112
Statut En instance
Date de dépôt 2023-02-23
Date de la première publication 2024-08-29
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Goswami, Debraj
  • Rao, Srikanth Janardhan
  • Pulla, Kiran

Abrégé

An architecture for writing software programs is provided. The architecture allows programmers to focus on writing software and shifts definition of entities, creation of processing rules and business logic to a special visual programming language. The special visual programming language onscreen visual cues for use by personnel without technical programming expertise. The special visual programming language may be utilized to define an entity. The defined entities may be utilized by programmers to create products that are governed by the definitions of the constituent entities included in each product. The architecture also includes a Universal Central Engine that processes products created by the programmers, identifies the constituent entities included in each product and processes those constituent entities in accordance with their definitions.

Classes IPC  ?

63.

AUTOMATED TELLER MACHINE (ATM) TRANSACTION RESLIENCY USING A LONG RANGE WIDE AREA NETWORK

      
Numéro d'application 18113189
Statut En instance
Date de dépôt 2023-02-23
Date de la première publication 2024-08-29
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Sethia, Maneesh Kumar
  • Chauhan, Sandeep Kumar
  • Arora, Saurabh
  • Dhanraj, Shyam K

Abrégé

An ATM includes a long range WAN module that provides the ATM with a low power WAN (LPWAN) capability for increased resiliency. The ATM and bank application servers generally communicate over an ATM communications network to allow customers to perform banking transactions. When this connection is not functioning, the ATM may continue to be used to perform banking transactions, without interruption, by communicating over a LoRaWAN network with another nearby LPWAN-enabled ATM that is in communication with the bank application servers. The LoRaWAN network may also be used to automatically obtain software to fix an error at the ATM when the software is obtainable via a nearby LPWAN-enabled ATM. The LoRaWAN module may be further used to record a state of operations at the ATM and to use the record to resume the transaction where the transaction was interrupted while in progress due to an ATM outage.

Classes IPC  ?

  • G07F 19/00 - Systèmes bancaires complets; Dispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p.ex. guichets automatiques
  • G06Q 20/18 - Architectures de paiement impliquant des terminaux en libre-service, des distributeurs automatiques, des bornes ou des terminaux multimédia

64.

SYSTEM AND METHOD FOR PROCESSING OF EVENT DATA REAL TIME IN AN ELECTRONIC COMMUNICATION VIA AN ARTIFICIAL INTELLIGENCE ENGINE

      
Numéro d'application 18649838
Statut En instance
Date de dépôt 2024-04-29
Date de la première publication 2024-08-29
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Dintenfass, Katherine Kei-Zen
  • Black, Christine D.
  • Kim, Jinna Zevulun
  • Robinette, Andrea
  • Taylor, Jo-Ann
  • Vemireddy, Vijaya L.

Abrégé

Systems, computer program products, and methods are described herein for processing of event data real time in an electronic communication via an artificial intelligence engine. The present invention is configured to electronically receive an electronic communication from a user to an entity, identify event data associated with the user, identify an inflection level and a language attribution level from the electronic communication by processing the electronic communication with an input recognition engine, form a categorization level by categorizing the electronic communication comprising the inflection level and the language attribution level using an artificial intelligence engine, and route the electronic communication to a designated group containing users associated with the entity and/or an artificial intelligence-based dialogue resolution.

Classes IPC  ?

  • G06F 9/54 - Communication interprogramme
  • G06F 9/38 - Exécution simultanée d'instructions
  • G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]

65.

System And Method For Managing Exception Request Blocks In A Blockchain Network

      
Numéro d'application 18657350
Statut En instance
Date de dépôt 2024-05-07
Date de la première publication 2024-08-29
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Khare, Prashant
  • Trivedi, Abhishek
  • Dadhich, Gaurav
  • Dutta, Saurabh
  • Thakur, Shruti Nandini
  • Gujral, Parneet Kaur
  • Anthony, Zeno Valerian

Abrégé

A system for resolving exceptions in requests determines that a request comprises an exception. The exception impeded processing the request. The system generates a block in a blockchain network. Based on the stored details in the block, the type of exception is identified. Accordingly, the block is segregated for exception processing based on its exception type. The system stores the exception in the block. The system compares the request with user information previously provided by the user. The system determines a similarity score between the request and the user information. The system compares the similarity score with a threshold percentage. In response to determining that the similarity score exceeds the threshold percentage, the system determines that the exception can be resolved and resolves the exception.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
  • G10L 17/04 - Entraînement, enrôlement ou construction de modèle
  • G10L 17/06 - Techniques de prise de décision; Stratégies d’alignement de motifs
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

66.

SYSTEM FOR SECURED ELECTRONIC DATA ACCESS THROUGH MACHINE-LEARNING BASED ANALYSIS OF COMBINED ACCESS AUTHORIZATIONS

      
Numéro d'application 18648419
Statut En instance
Date de dépôt 2024-04-28
Date de la première publication 2024-08-22
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Sloane, Brandon
  • Macaulay, James Thomas

Abrégé

A system is provided for secured electronic data access through machine-learning based analysis of combined access authorizations. In particular, the system may maintain an access provisioning database which stores data regarding the data access authorizations that have been granted to one or more third party computing systems or entities. The system may further continuously monitor and aggregate electronic data from one or more electronic data streams and analyze the electronic data to intelligently generate probabilities for future events that create certain combinations of access authorizations that affect the security of the electronic data to which the third party computing systems have authorized access. In this way, the system may provide an effective way to manage access authorizations.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

67.

Insight Generation Using Personal Identifiable Information (PII) Footprint Modeling

      
Numéro d'application 18650200
Statut En instance
Date de dépôt 2024-04-30
Date de la première publication 2024-08-22
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Zimmer, Allison
  • Corr, Brian H.
  • Ramsue, Charlene L.
  • Nielsen, Scott
  • Frost, Thomas G.
  • Scott, Youshika C.

Abrégé

Aspects of the disclosure relate to information masking. A user device may receive a request to access information that includes personal identifiable information (PII) and retrieve source data comprising the PII. The user device may mask, within the source data and based on a data management policy, the PII, resulting in masked information. The user device may display the masked information. The user device may receive a request to unmask the masked information and unmask the PII, resulting in unmasked PII. The user device may display the unmasked PII and send unmasking event information to a PII footprint modeling platform, which may cause the PIT footprint modeling platform to: log the request to unmask the masked information in an unmasking event log, 2) apply a machine learning model to the unmasking event log to identify malicious events, and 3) trigger remediation actions based on identification of the malicious events.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/60 - Protection de données
  • G06N 20/00 - Apprentissage automatique

68.

PREDICTIVE VALUE ENGINE FOR LOGICAL MAP GENERATION AND INJECTION

      
Numéro d'application 18650248
Statut En instance
Date de dépôt 2024-04-30
Date de la première publication 2024-08-22
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Kurian, Manu
  • Fairchild, Albena N.

Abrégé

Aspects of the disclosure relate to logical map generation and injection. A computing platform may train a key value engine to assign logical map data priority values based on data use cases. The computing platform may receive first data and a first use case, which the computing platform may input into the key value engine to produce the logical map data priority values for the first data. The computing platform may generate, based on the logical map data priority values, a logical map for the first data. The computing platform may modify the first data by embedding, into a header of the first data, the logical map. The computing platform may send, to a recipient computing device, a portion of the modified first data and one or more commands to re-assemble the first data using the logical map stored in the portion of the modified first data.

Classes IPC  ?

  • G06F 16/21 - Conception, administration ou maintenance des bases de données

69.

INTELLIGENT ORCHESTRATION OF QUANTUM PROGRAMS USING SMART CONTRACTS LINKED TO QUANTUM PROGRAM NON-FUNGIBLE TOKENS

      
Numéro d'application 18111664
Statut En instance
Date de dépôt 2023-02-20
Date de la première publication 2024-08-22
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Singh, Shailendra

Abrégé

Arrangements for intelligent orchestration of quantum programs using smart contracts linked to quantum program non-fungible tokens (NFTs) are provided. A plurality of quantum programs to be executed on target quantum hardware may be received from a digital computing device. NFTs representing each of the plurality of quantum programs may be created and linked to a corresponding quantum program. The NFTs may be stored on a distributed ledger and controlled by smart contracts storing predefined acceptance rules based on which a quantum processing output is deployed to the digital computing device. A quantum program may be validated for respective target quantum hardware by validating the NFT associated with the quantum program. The respective target quantum hardware may ingest the validated quantum program and perform quantum processing. Responsive the output of quantum processing meeting the predefined acceptance criterion, the output of the quantum processing may be deployed in the digital computing device.

Classes IPC  ?

  • G06N 10/20 - Modèles d’informatique quantique, p.ex. circuits quantiques ou ordinateurs quantiques universels
  • G06N 10/60 - Algorithmes quantiques, p.ex. fondés sur l'optimisation quantique ou les transformées quantiques de Fourier ou de Hadamard
  • G06Q 40/04 - Transactions; Opérations boursières, p.ex. actions, marchandises, produits dérivés ou change de devises

70.

REAL-TIME CROSS-CHANNEL VERIFICATION

      
Numéro d'application 18110461
Statut En instance
Date de dépôt 2023-02-16
Date de la première publication 2024-08-22
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Dantuluri, Indradeep
  • Chayanam, Pavan

Abrégé

Systems, methods, and apparatus are provided for verification of a communication across communication channel technologies. A secure mobile device application may authenticate a user and launch a background application. The background application may interact with multiple different communication channels, such as an email application and an SMS application. The background application may scan a communication received at one of these channels for a security marker. When the security marker is not present, the mobile device application may display an alert associated with the communication. The scan may be limited to ensure the privacy of the communication content. The scan parameters may be configured at the mobile device application.

Classes IPC  ?

  • G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
  • G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil

71.

OPTIMIZING QUBIT CONSUMPTION OF QUANTUM PROGRAMS

      
Numéro d'application 18111644
Statut En instance
Date de dépôt 2023-02-20
Date de la première publication 2024-08-22
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Singh, Shailendra

Abrégé

Arrangements for optimizing quantum bit consumption of quantum programs are provided. In some aspects, a quantum program of a plurality of quantum programs to be executed on target quantum hardware may be received from a digital computing device. The quantum program may be scanned and metadata associated with the quantum program may be parsed using machine learning. In some examples, the quantum program may be optimized by modifying quantum program code for minimum quantum bit consumption using machine learning. A criticality level of the quantum program may be determined based on contextual logic associated with the quantum program. Based on the determined criticality level, a priority sequence may be determined, indicating an order in which the plurality of quantum programs are to be deployed to the target quantum hardware. The quantum program may be transmitted to the target quantum hardware according to the priority sequence.

Classes IPC  ?

  • G06N 10/20 - Modèles d’informatique quantique, p.ex. circuits quantiques ou ordinateurs quantiques universels
  • G06N 20/00 - Apprentissage automatique

72.

SYSTEMS, METHODS, AND APPARATUSES FOR DETERMINING AND APPLYING A BACKUP FILE ATTRIBUTION TO FILES IN AN ELECTRONIC NETWORK

      
Numéro d'application 18112700
Statut En instance
Date de dépôt 2023-02-22
Date de la première publication 2024-08-22
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Regen, Samuel Martin
  • Troxell, Gary Eugene
  • Witthoeft, Heidi Renea
  • Jain, Gaurav
  • Mansell, Troy

Abrégé

Systems, computer program products, and methods are described herein for determining and applying a backup file attribution to files in an electronic network. The present invention is configured to receive data associated with at least one file, wherein the file is stored in at least one data store; and generate at least one file attribute for the file, wherein, in an instance where the file is a tape file type, generate a backup file attribute, wherein, in an instance where the file is not a tape file type, generate a non-backup file attribute, wherein, in an instance where the file is not a type file type and the file comprises a backup feature in the data, generate the backup file attribute, or wherein, in an instance where the file is a tape file type and the file comprises a non-backup feature in the data, generate the non-backup file attribute.

Classes IPC  ?

  • G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat

73.

System and method for implementing intelligent interactions in a metaverse

      
Numéro d'application 18171623
Statut En instance
Date de dépôt 2023-02-20
Date de la première publication 2024-08-22
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Agarwal, Ankit Chandra
  • Sreepalli, Srilaxmi
  • Balaji, Sujatha

Abrégé

A system for implementing intelligent interactions in a metaverse comprises a metaverse server in communication with an entity server. A metaverse server receives an interaction request for an interaction session from a first user avatar to obtain a digital item in a virtual environment. The metaverse server determines an item value of the digital item is greater than the first asset value, determines a supplement asset required for the first user to obtain the digital item, and sends an asset request with the supplement asset to an entity avatar. The entity server determines that the supplement asset in a first asset pool in a database. The entity server generates digital contracts to receive the supplement asset and send the supplement asset to the metaverse server. The metaverse server completes the interaction session with the first asset and the supplement asset to obtain the digital item for the first user avatar.

Classes IPC  ?

74.

System and method for creating multiple asset pools to implement intelligent interactions in a metaverse

      
Numéro d'application 18171627
Statut En instance
Date de dépôt 2023-02-20
Date de la première publication 2024-08-22
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Agarwal, Ankit Chandra
  • Sreepalli, Srilaxmi
  • Balaji, Sujatha

Abrégé

A system for creating multiple asset pools comprises a metaverse server in communication with an entity server. A metaverse server receives a request for an interaction session from a first user avatar to obtain a digital item in a virtual environment. The metaverse server determines a supplement asset required to obtain the digital item. The metaverse server sends an asset request to an entity avatar associated with the entity server to obtain the supplement asset. The metaverse server receives and approves a request from a second user avatar with a second asset to enroll in an asset pool associated with an entity. The metaverse server receives the supplement asset corresponding to the second asset from the entity avatar associated with the entity server and completes the interaction session with a combination of a first asset of the first user avatar and the supplement asset to obtain the digital item.

Classes IPC  ?

  • G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
  • G06T 13/40 - Animation tridimensionnelle [3D] de personnages, p.ex. d’êtres humains, d’animaux ou d’êtres virtuels

75.

System and method for increasing a resolution of a three-dimension (3D) image

      
Numéro d'application 18171921
Statut En instance
Date de dépôt 2023-02-21
Date de la première publication 2024-08-22
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Padmanaban, Ravindran
  • Selvaraj, Srinivasan

Abrégé

A system for increasing a resolution of a three-dimension (3D) image determines contours of a 3D image. The system determines a mesh image vector, where the mesh image vector indicates location coordinates of feature points on a surface of an object in the 3D image. The system compares the mesh image vector with each contour. The system determines an intersecting feature point where the mesh image vector meets a contour. The system determines that a baseline dataset includes a first feature point that corresponds to the intersecting feature point. In response, the system generates a structural vector by populating the structural vector with the intersecting feature point. The system determines a color code associated with the intersecting feature point and generates a textural vector by populating the textural vector with the color code. The system generates an image vector by combining the structural vector and the textural vector.

Classes IPC  ?

  • G06V 20/64 - Objets tridimensionnels
  • G06T 7/73 - Détermination de la position ou de l'orientation des objets ou des caméras utilisant des procédés basés sur les caractéristiques
  • G06T 19/20 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie Édition d'images tridimensionnelles [3D], p.ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties
  • G06V 10/44 - Extraction de caractéristiques locales par analyse des parties du motif, p.ex. par détection d’arêtes, de contours, de boucles, d’angles, de barres ou d’intersections; Analyse de connectivité, p.ex. de composantes connectées
  • G06V 10/77 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant l’intégration et la réduction de données, p.ex. analyse en composantes principales [PCA] ou analyse en composantes indépendantes [ ICA] ou cartes auto-organisatrices [SOM]; Séparation aveugle de source

76.

SYSTEM AND METHOD FOR VALIDATING A RESPONSE BASED ON CONTEXT INFORMATION

      
Numéro d'application 18649598
Statut En instance
Date de dépôt 2024-04-29
Date de la première publication 2024-08-22
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Trivedi, Abhishek
  • Thakur, Shruti Nandini
  • Deshpande, Nimish Ravindra
  • Khane, Prashant

Abrégé

A system for validating a response based on context information receives a first message that indicates that a data object is removed from a memory resource via a third party device without authorization by a user. The system communicates a second response that indicates whether a third party confirms the removal of the data object without the authorization by the user to the third party device. The system receives a response from the third party device. The system extracts context information from the response. The system determines whether the response is valid based on the context information. In response to determining that the response is valid, the system recommends one or more actions to be performed with respect to the memory resource.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès

77.

SYSTEM AND METHOD FOR MULTIFACTOR AUTHENTICATION FOR ACCESS TO A RESOURCE BASED ON CO-CONNECTED DEVICE PRESENCE

      
Numéro d'application 18649766
Statut En instance
Date de dépôt 2024-04-29
Date de la première publication 2024-08-22
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Dupont, Justin
  • Hodges, William Anderson

Abrégé

Systems, computer program products, and methods are described herein for multifactor authentication system that determines co-connected device presence for added security. The system utilizes a device fingerprint for each device. The device fingerprint may contain a library of interconnected devices, as well as ambient noise from the device. The device fingerprint will be used to determine confidence levels indicating whether the devices are in the same location and thus in operation by the same user during multifactor authentication.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/63 - Sécurité dépendant du contexte dépendant de la proximité

78.

Custom Patching Automation with Machine Learning Integration

      
Numéro d'application 18651009
Statut En instance
Date de dépôt 2024-04-30
Date de la première publication 2024-08-22
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Ahmed, Syed Luqman
  • Garaga, Adi Narayana Rao

Abrégé

A machine learning computing system identifies a vulnerability associated with a server. Based on information associated with the server and a knowledge base, the computing system schedules an interval for patching the server in a centralized tracking module. Based on the knowledge base and the vulnerability, the computing system creates, validates, and deploys the patch job. During patch job execution, the computing system monitors the status of the patch job at the server and transmits status updates to a user interface module. After expiration of the interval, the computing system generates an assessment report for the executed patch job. The computing system updates the knowledge base based on the assessment report to improve future decisioning processes. Based on the success or failure of the patch job, the computing system, upon a failure indication, automatically reschedules an interval for patching the server.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 8/65 - Mises à jour
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 20/00 - Apprentissage automatique

79.

Intelligent webpage UI optimization leveraging UI and viewer extraction telemetry

      
Numéro d'application 18230230
Numéro de brevet 12067348
Statut Délivré - en vigueur
Date de dépôt 2023-08-04
Date de la première publication 2024-08-20
Date d'octroi 2024-08-20
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Verma, Sandeep
  • Rathaur, Nandini
  • Chayanam, Pavan
  • Dundigalla, Srinivas

Abrégé

Smart glasses may be used for intelligent UI webpage optimization leveraging UI and viewer extraction telemetry. The smart glasses may include an eyeball tracking device. Methods may include tracking the movement of the eye of a user on the UI webpage. Methods may further include capturing a segment of data within the movement of the eye of a user on a UI webpage and storing the segment of data in memory on the smart glasses. Methods may also include updating the UI webpage based on an instruction in the data segment transmitted to the UI. Additionally, methods may include autofilling the data segment at the point of user eye movement on the UI webpage. Eyeball movement data may transfer from the smart glasses to UI webpage code.

Classes IPC  ?

  • G06F 40/151 - Transformation
  • G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
  • G06F 40/14 - Documents en configuration arborescente

80.

INTELLIGENT APPARATUS TO MONITOR AND AUTO DEPLOY SECURITY POLICY RULES ON CONTAINER BASED CLOUD INFRASTRUCTURE LEVERAGING NFT & QUANTUM KNOWLEDGE GRAPH

      
Numéro d'application 18109353
Statut En instance
Date de dépôt 2023-02-14
Date de la première publication 2024-08-15
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Singh, Shailendra

Abrégé

Aspects of the disclosure relate to monitoring and deploying security policy rules in in a container-based computing infrastructure. A computing platform may train a quantum knowledge graph based on interactions in a container-based computing infrastructure. The computing platform may generate and deploy, to the container-based computing infrastructure, one or more security rules associated with interactions in the container-based computing infrastructure based on the quantum knowledge graph les. Subsequently, the computing platform may monitor interactions between containers in the container-based computing infrastructure and identify, using the quantum knowledge graph, an anomaly in a first interaction between a first container and a second container. Based on identifying the anomaly, the computing platform may thereafter perform a verification analysis of the first interaction to determine a potential security risk and send, to an administrator computing platform, an alert action configured to be displayed on an interface of the administrator computing platform.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06N 10/80 - Programmation quantique, p.ex. interfaces, langages ou boîtes à outils de développement logiciel pour la création ou la manipulation de programmes capables de fonctionner sur des ordinateurs quantiques; Plate-formes pour la simulation ou l’accès aux ordinateurs quantiques, p.ex. informatique quantique en nuage

81.

SECURITY VULNERABILITY DETECTION FOR IMAGE FILES

      
Numéro d'application 18109409
Statut En instance
Date de dépôt 2023-02-14
Date de la première publication 2024-08-15
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Philip, Charles C.
  • Suresh, Tejshree
  • Siddiqui, Ilma

Abrégé

An image analysis security apparatus includes a content delivery network, an image analyzer and a scan engine. The content delivery network receives an image file, quarantines the file and classifies the file with an operating system. The image analyzer receives the file and classifies the file with an image type. The scan engine loads security modules based on the operating system and the image type, communicates with a vulnerability database to receive vulnerability updates, communicates with a cyber threat intelligence database to receive collection analysis relating to unauthorized accesses to data that occurred within a predetermined time period and communicates with an open-source intelligence database to receive public data for intelligence objectives. The scan engine scans and labels the image file using the security modules in tandem with the information received from the databases.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p.ex. dispositions anti-virus

82.

SYSTEMS, METHODS, AND APPARATUSES FOR ACTIVATING A DECOY RESOURCE BASED ON DURESS TRIGGERS IN AN ELECTRONIC NETWORK

      
Numéro d'application 18109431
Statut En instance
Date de dépôt 2023-02-14
Date de la première publication 2024-08-15
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Albero, George Anthony
  • Traywick, Edward Lee
  • Mukherjee, Maharaj
  • Moores, Benjamin

Abrégé

Systems, computer program products, and methods are described herein for activating a decoy resource based on duress triggers in an electronic network. The present invention is configured to receive a resource distribution request, wherein the resource distribution request comprises a resource account identifier; determine a verified unique identifier sequence associated with the resource account identifier; receive an unverified unique identifier sequence associated with the resource distribution request; compare the unverified unique identifier sequence with the verified unique identifier sequence; and determine, based on the comparison of the unverified unique identifier sequence with the verified unique identifier sequence, a duress trigger; and activate, in an instance where the duress trigger is positive, a decoy resource container, wherein the decoy resource container comprises at least one decoy resource.

Classes IPC  ?

83.

SCENARIO-BASED ACCESS ENTITLEMENT ENGINE AND CONTROLLER

      
Numéro d'application 18110035
Statut En instance
Date de dépôt 2023-02-15
Date de la première publication 2024-08-15
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s) Cao, Min

Abrégé

Access entitlement decisioning for a network-based application occurs dynamically at the time of access request based on current scenario indicators. In addition to determining whether a user should be granted access/entitlement, in certain instances, the current scenario indicators are relied upon to determine the level of entitlement/access (i.e., less or more than standard access) and the period for enforcing the determined access/entitlement. The current scenario indicators may be associated with the user, the application and/or the computing environment and are indicative of a heightened awareness for the occurrence of potential deceptive events or the likelihood for inefficiencies in use of the application and/or computing environment.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/31 - Authentification de l’utilisateur

84.

Data Poisoning and Model Drift Prevention System

      
Numéro d'application 18168879
Statut En instance
Date de dépôt 2023-02-14
Date de la première publication 2024-08-15
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Yarabolu, Vijay Kumar
  • Sundararaj, Gowthaman

Abrégé

A data poisoning and model drift prevention computing system may feed trusted historical data to one or more generative adversarial networks (GAN) and cause the GANs to generate simulated data. Curated simulated data is clustered and the data characteristics are captured, such as number of clusters, data density, and the like. The data poisoning and model drift prevention computing system sanitizes the model data and merges the sanitized data with trusted data. The data poisoning and model drift prevention computing system may then cluster the resultant data again and compare the similarities with trusted data clusters. No change in cluster characteristics indicate the data is not tampered and in expected condition. The data poisoning and model drift prevention computing system identifies a deviation in cluster characteristics corresponding to poisoned data and trigger remedial actions.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

85.

Cross Chained Aggregated Hash Token Validation System

      
Numéro d'application 18169362
Statut En instance
Date de dépôt 2023-02-15
Date de la première publication 2024-08-15
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Yarabolu, Vijay Kumar
  • Sundararaj, Gowthaman

Abrégé

A simplified IoT network validation process includes improvements to enrollment of IoT devices onto the IoT network and authentication of active IoT devices during IoT network operation. A random cipher text is created upon device enrollment and shared to each device in the network. Additionally, a random peer-to-peer cross reference communication pattern is established among the devices. Using a device pairing sequence an iterated (e.g., chained) hash value is generated and stored at the server. During the device authentication, upon basic authentication of the request, a server shares a random point to the network (e.g., a randomly selected IoT device) to trigger the hash token generation process. The network devices perform hash token iteration as a ring. Each IoT device uses the previous hash when generating the next hash. The final hash is sent to the server for validation and comparison against stored keys.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES

86.

Domain Specific Tokens for Reduced Token Generation

      
Numéro d'application 18107710
Statut En instance
Date de dépôt 2023-02-09
Date de la première publication 2024-08-15
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Jain, Jeetendra Hukmichand
  • Holland, Bradley
  • Loney, James
  • Agarwal, Vineet

Abrégé

Aspects of the disclosure relate to virtual tokens. A computing platform may generate a domain specific token, corresponding to a card number and having an approved users list. The computing platform may receive, from a first enterprise device corresponding to a first enterprise, card information of a card. The computing platform may identify that tokenization of the card information is approved by a second enterprise corresponding to the card. Based on identifying that the tokenization is approved, the computing platform may modify the approved users list to include the first enterprise. The computing platform may send, to the first enterprise device, the first domain specific token, where the computing platform is configured to validate an event processing request based on receipt of the first domain specific token from the first enterprise device.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

87.

SATELLITE DATA NFT TRANSFER LEVERAGING BLOCKCHAIN AND SMART CONTRACT CAPABILITIES

      
Numéro d'application 18108759
Statut En instance
Date de dépôt 2023-02-13
Date de la première publication 2024-08-15
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Singh, Shailendra

Abrégé

A method for establishing an alternative transaction gateway when a default transaction network is down leveraging a network of low-orbit satellites is provided. The method may include creating, using an internet of things (“IoT”) device, a non-fungible token (“NFT”) associated with a transaction executed at the IoT device. The method may include storing the NFT at the IoT device pending proximity to a low-orbit satellite. The method may further include transmitting the NFT to a first low-orbit satellite when the first low-orbit satellite is within a first pre-determined proximity to the IoT device. The method may include, in response to receiving the NFT at the first low-orbit satellite, running a smart contract to identify an optimal pathway for transporting the NFT. The pathway may include the first low-orbit satellite and one or more additional low-orbit satellites from the network operating as carriers for the NFT to a centralized server.

Classes IPC  ?

  • G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
  • G06Q 20/30 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques
  • G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
  • G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
  • G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails

88.

SYSTEM AND METHODS FOR DYNAMIC VISUAL GRAPH STRUCTURE PROVIDING MULTI-STREAM DATA INTEGRITY AND ANALYSIS

      
Numéro d'application 18110235
Statut En instance
Date de dépôt 2023-02-15
Date de la première publication 2024-08-15
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Yarabolu, Vijay Kumar
  • Sundararaj, Gowthaman

Abrégé

Systems, computer program products, and methods are described herein for dynamic visual graph structure providing multi-stream data integrity and analysis. The present disclosure is configured to provide a reactive system aimed to trace the root cause of incidents and uncover potential gaps in security of an enterprise system. Maintaining accurate and meaningful information related to incidents is the key for success of data security protocols. The integrity of message data is kept intact for improved forensic investigation, as each database may keep varying information related to a single global session.

Classes IPC  ?

89.

Transitioning interactions of an interaction session initiated within a metaverse to a real-world environment to complete the interaction session

      
Numéro d'application 18169370
Statut En instance
Date de dépôt 2023-02-15
Date de la première publication 2024-08-15
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Agrawal, Jatin
  • Dolan, Heather
  • Gadwale, Adithya
  • Enciso, Catalina
  • Perez, Akeem

Abrégé

A system for transitioning an interaction session initiated within a metaverse to a real-world environment to complete the interaction session comprises a metaverse server in communication with an entity server. The metaverse server receives an interaction request from an avatar to initiate an interaction session with an entity within a virtual environment. The metaverse server generates an instruction token for a user instruction and a session identifier for the interaction session. The metaverse server obtains a user identity token from the entity and authorizes the avatar to interact with the entity. The metaverse server conducts the first interaction between the avatar and the entity and generates a first interaction token for the first interaction. The entity server validates the user identity token and the first interaction token from the user device in the real-world environment. The entity server conducts a second interaction with the user to complete the interaction session.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

90.

Testing a metaverse application for rendering errors across multiple devices

      
Numéro d'application 18169805
Numéro de brevet 12072794
Statut Délivré - en vigueur
Date de dépôt 2023-02-15
Date de la première publication 2024-08-15
Date d'octroi 2024-08-27
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Bussa, Swathi

Abrégé

A system includes a memory and a processor coupled to the memory. The processor runs a software application on a simulated user device to render a virtual environment on the simulated user device. The processor detects that a first view of the virtual environment has been rendered and accesses from the memory a first expected view pattern that corresponds to the first view. The processor compares the first view to the first expected view pattern and detects that a pattern of one or more visual elements in the first view does not match with an expected pattern of visual elements in the first expected view pattern. In response, the processor determines that an error has occurred relating to rendering the virtual environment by the software application. The processor obtains a solution corresponding to the error and applies the solution to the software application to resolve the detected error.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreurs; Correction d'erreurs; Contrôle de fonctionnement
  • G06F 11/07 - Réaction à l'apparition d'un défaut, p.ex. tolérance de certains défauts
  • G06F 11/36 - Prévention d'erreurs en effectuant des tests ou par débogage de logiciel
  • G06T 7/00 - Analyse d'image

91.

Detecting and resolving video and audio errors in a metaverse application

      
Numéro d'application 18169814
Statut En instance
Date de dépôt 2023-02-15
Date de la première publication 2024-08-15
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Bussa, Swathi

Abrégé

A system includes a memory and a processor coupled to the memory. The processor runs a software application on a simulated user device to render a virtual environment on the simulated user device. In response to detecting that the software application has rendered a video clip in the virtual environment, the processor converts the video clip into metadata. The processor compares a first metadata associated with a first frame of the video clip with a second metadata associated with at least one second frame of the video clip before or after the first frame. In response to determining that the first frame and the second frame do not conform to a pre-configured transition, the processor determines that an error has occurred in relation to rendering the video clip. The processor obtains a solution corresponding to the error and applies the solution to the software application to resolve the detected error.

Classes IPC  ?

  • G06F 11/36 - Prévention d'erreurs en effectuant des tests ou par débogage de logiciel
  • G06F 16/783 - Recherche de données caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
  • G06V 20/40 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène dans le contenu vidéo

92.

Identifying and resolving rendering errors associated with a metaverse environment across devices

      
Numéro d'application 18169820
Statut En instance
Date de dépôt 2023-02-15
Date de la première publication 2024-08-15
Propriétaire Bank of America Corporation (USA)
Inventeur(s) Bussa, Swathi

Abrégé

A system includes a memory and a processor coupled to the memory. The processor runs a software application on a simulated user device to render a virtual environment on the simulated user device. In response to detecting an error associated with generation of the virtual environment by the software application, the processor searches a list of solutions based on the detected error, wherein each solution in the list corresponds to a known error associated with generation of the virtual environment on the real-world user device. The processor obtains a solution corresponding to the detected error from the list, wherein the solution comprises a revised source code or instructions to revise a source code of the software application to resolve the respective error. The processor determines and revises a portion of the source code of the software application relating to the error based on the revised source code in the solution.

Classes IPC  ?

  • G06F 11/36 - Prévention d'erreurs en effectuant des tests ou par débogage de logiciel
  • G06T 17/00 - Modélisation tridimensionnelle [3D] pour infographie

93.

System and method for detecting and obfuscating confidential information in task logs

      
Numéro d'application 18620470
Statut En instance
Date de dépôt 2024-03-28
Date de la première publication 2024-08-08
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Dande, Pratap
  • Mylaram, Akkhila
  • Dos Santos, Gilberto R.
  • Murugan, Jayabalaji

Abrégé

A system accesses a task log comprising text that is confidential information. The system selects a first portion of the task log. The system compares each word in the first portion with keywords that are known to be confidential information. The system determines that a word in the first portion is among the keywords. The system determines a hierarchical relationship between the word and neighboring words. The system determines that the word is associated with the neighboring words based on the hierarchical relationship. The system generates a template pattern comprising the word and one or more words associated with the word. The system obfuscates the template pattern.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
  • G06F 16/31 - Indexation; Structures de données à cet effet; Structures de stockage

94.

SYSTEMS FOR CAPTURING MESSAGING VOLUME AND UTILIZATION METRICS WITHIN A MULTICAST MESSAGING SERVICE

      
Numéro d'application 18636598
Statut En instance
Date de dépôt 2024-04-16
Date de la première publication 2024-08-08
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s) Patel, Milan Bansilal

Abrégé

A comprehensive system for capturing multicast messaging traffic volume and performance metrics across a global inventory of hosts. A single instance of the data capturing and extraction tool may be configured to be implemented across an enterprise's entire inventory of multicast messaging-configured hosts. The data capturing and extraction tool dynamically extracts multicast group addresses and corresponding metrics during the scanning of the captured traffic volume and performance data, thus eliminating the need for manual input of specified multicast group addresses. As a result, presentation of metrics on a per multicast group address basis is made possible for all multicast group addresses extracted during the scanning process. In addition, an efficient means for polling the hosts for traffic volume and performance data is realized by only polling those non-primary and workstation hosts that are currently transmitting or receiving multicast messages.

Classes IPC  ?

  • H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
  • H04L 43/10 - Surveillance active, p.ex. battement de cœur, utilitaire Ping ou trace-route

95.

Security Enabled False Desktop Computing Environment

      
Numéro d'application 18636665
Statut En instance
Date de dépôt 2024-04-16
Date de la première publication 2024-08-08
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Horne, Daniel
  • Albero, George
  • Lang, Robert A.

Abrégé

A computing system for securely managing access to resources of a computing device receives an input at a secure login of a user interface. The computing system compares the input to a plurality of stored security measures and activates one of an operating system or a configuration of a false desktop system. A user interface of the false desktop system shares characteristics with a user interface of an operating system and restricts access to specified files, data stores, applications, networking functions, and/or ports associated with the computing system. When configured, the false desktop system or the operating system is enabled based on the location of the computing system. When configured, the false desktop system deletes files, data stores, and applications of the operating system.

Classes IPC  ?

  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès

96.

MOBILITY PROTOCOL FOR NARROW-BAND INTERNET OF THINGS (NB-IOT) NETWORKS

      
Numéro d'application 18106090
Statut En instance
Date de dépôt 2023-02-06
Date de la première publication 2024-08-08
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Selvaraj, Srinivasan
  • Singh, Prabha Bagavath

Abrégé

Aspects of the disclosure relate to a mobility protocol for NB-IoT networks. A mobility protocol device may monitor a wireless data connection between the device and a first NB-IoT node. The device may compare a connection strength of the wireless data connection to a threshold value. Based on identifying that the connection strength is below the threshold value, the device may generate a connection transfer request packet. The device may send the connection transfer request packet to one or more NB-IoT nodes based on a preferred connections list. The device may generate, based on receiving a determination result from a second NB-IoT node indicating the second NB-IoT node will accept a connection, an acknowledgment packet. The acknowledgment packet may be configured to establish the connection with the second NB-IoT node. Based on the acknowledgment packet, the device may cause the first NB-IoT node to transfer the wireless data connection to the second NB-IoT node.

Classes IPC  ?

  • H04W 36/00 - Dispositions pour le transfert ou la resélection
  • H04B 17/309 - Mesure ou estimation des paramètres de qualité d’un canal
  • H04L 1/00 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue
  • H04M 1/72448 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens permettant d’adapter la fonctionnalité du dispositif dans des circonstances spécifiques
  • H04W 24/08 - Réalisation de tests en trafic réel

97.

SYSTEMS AND METHODS FOR AUTHENTICATING A RESOURCE TRANSFER IN A PEER-TO-PEER RESOURCE SHARING ELECTRONIC NETWORK

      
Numéro d'application 18106574
Statut En instance
Date de dépôt 2023-02-07
Date de la première publication 2024-08-08
Propriétaire BANK OF AMERICA CORPORATION (USA)
Inventeur(s)
  • Patangia, Vishal
  • Theodore, Joehinth Danishkumar Samuel

Abrégé

A system is provided for authenticating a resource transfer in a peer-to-peer resource sharing electronic network. In particular, the system may receive a request from a first endpoint device to execute a resource transfer with a second endpoint device. The request from the first endpoint device may comprise a selection or designation of an authentication credential associated with the resource transfer. The system may prompt the second endpoint device for an authentication input. Upon receiving the authentication input from the second endpoint device, the system may validate the authentication input using the authentication credential provided using the first endpoint device. Once the authentication input from the second endpoint device has been validated, the system may execute the resource transfer according to the parameters defined by the first endpoint device. In this way, the system may provide a secure way to execute peer-to-peer resource transfers over a network.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/1074 - Réseaux de pairs [P2P] pour la prise en charge des mécanismes de transmission de blocs de données

98.

System and method for servicing requests in a decentralized network

      
Numéro d'application 18163476
Statut En instance
Date de dépôt 2023-02-02
Date de la première publication 2024-08-08
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Balasubramanian, Saravanan
  • Benjamin, Arul Victor
  • Uprit, Saurabh
  • Singh, Shailendra

Abrégé

A system is configured to determine multiple sub-requests from one of service requests received from a user device. The system associates each sub-request to at least one knowledge domain. The sub-requests are transmitted to a decentralized network. In turn, the decentralized network generates one or more responses associated with each knowledge domain in each sub-request. At this stage, the system relates multiple responses corresponding to the received service request to a same identifier (i.e., a common identifier) and provide the responses related to the identifier to the user device as a single service request response.

Classes IPC  ?

  • H04L 41/5074 - Traitement des plaintes des utilisateurs ou des tickets d’incident
  • H04L 41/507 - Filtrage des clients affectés par des problèmes de service

99.

Reducing a number of units in a data population based on predefined constraints

      
Numéro d'application 18163784
Statut En instance
Date de dépôt 2023-02-02
Date de la première publication 2024-08-08
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Tamizhmani, Aravinthane
  • Pai, Sandeep

Abrégé

A method includes receiving a data population and a plurality of constraints. The data population includes a plurality of units. Each unit includes a plurality of respective values. Each value corresponds to a respective parameter. Each constraint corresponds to a respective parameter. A holistic feature of the data population is determined. A volume is defined in the parameter space based on the plurality of constraints. For each unit of a current data population, a first vector representing a respective unit is subtracted from a second vector representing a current holistic feature to determine a third vector. For each third vector, a distance between a point defined by a respective third vector and the volume is determined. A minimum distance is determined from determined distances. The current data population is transformed into an updated data population by removing a unit that corresponds to the minimum distance from the current data population.

Classes IPC  ?

  • G06F 16/215 - Amélioration de la qualité des données; Nettoyage des données, p.ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques

100.

Intelligent issue identifier for auto-detecting dynamic issue changes in a distributed network

      
Numéro d'application 18163791
Statut En instance
Date de dépôt 2023-02-02
Date de la première publication 2024-08-08
Propriétaire Bank of America Corporation (USA)
Inventeur(s)
  • Madiya, Tirupathirao
  • Poosa, Vishalakshi Nagasai
  • Ponnameni, Yellaiah
  • Mohite, Gourav
  • Babu, Vinothkumar

Abrégé

A system for auto-detecting dynamic issue changes in a distributed network comprises a processor associated with a server. The processor detects an application issue at a network node receives a first set of data objects associated with the application issue occurring at the first timestamp. The processor receives a second set of data objects associated with the application issue occurring at the second timestamp. The processor determines a change between a first set of the data objects and a second set of data objects. The processor identifies an issue pattern represents an operation change of the application by a machine learning model. The processor processes the issue pattern with application information through a neural network to determine a series of executable operations associated with the application issue. The processor deploys the series of the executable operations to solve the application issue to prevent a failure operation of the application.

Classes IPC  ?

  • G06F 11/07 - Réaction à l'apparition d'un défaut, p.ex. tolérance de certains défauts
  • G06N 3/08 - Méthodes d'apprentissage
  1     2     3     ...     69        Prochaine page