-
21.
公开(公告)号:US20240061869A1
公开(公告)日:2024-02-22
申请号:US18386794
申请日:2023-11-03
Applicant: BANK OF AMERICA CORPORATION
Inventor: Brandon Sloane , Jinyoung Nathan Kim , Adriana Tache , Charles Edward Dudley
IPC: G06F16/28 , G06F16/22 , G06F21/62 , G06F21/31 , G06F16/2455 , G06F16/18 , G06F16/21 , G06F16/23
CPC classification number: G06F16/287 , G06F16/22 , G06F21/6218 , G06F21/31 , G06F21/6227 , G06F16/24556 , G06F16/1805 , G06F16/213 , G06F16/235
Abstract: Systems, computer program products, and methods are described herein for identification of obfuscated electronic data through placeholder indicators. The present invention is configured to electronically receive, from a computing device of a user, a request to obfuscate one or more data artifacts stored on a first database; retrieve, from a data obfuscation repository, one or more data obfuscation algorithms; implement the one or more data obfuscation algorithms on the one or more data artifacts; generate one or more placeholder indicators identifying the one or more data obfuscation algorithms implemented on the one or more data artifacts; create one or more data fields corresponding to the one or more masked data artifacts on the first database; store the one or more placeholder indicators in the one or more data fields; and update the first database with the one or more masked data artifacts and the one or more placeholder indicators.
-
公开(公告)号:US20230334161A1
公开(公告)日:2023-10-19
申请号:US17723884
申请日:2022-04-19
Applicant: BANK OF AMERICA CORPORATION
Inventor: Brandon Sloane , Sophie Morgan Danielpour , Serge Alejandro Neri , Lauren Jenae Alibey , James Thomas MacAulay , Jinyoung Nathan Kim
CPC classification number: G06F21/602 , G06F21/31 , G06F21/577
Abstract: Various systems, methods, and computer program products are provided for complex data encryption. The method includes receiving a user input code from a computing device associated with a user. The user input code is one or more plaintext characters. The method also includes generating a first encrypted value using a first encryption algorithm based on the user input code. The method further includes decrypting the first encrypted value using one or more additional encryption algorithms. The one or more synthetic user input codes are generated by the decryption of the first encrypted value using each of the one or more additional encryption algorithms. The method still further includes determining a first encryption vulnerability score based on the value of the one or more synthetic user input codes. The method also includes causing a transmission of a user input code notification based on the first encryption vulnerability score.
-
公开(公告)号:US11580249B2
公开(公告)日:2023-02-14
申请号:US17173027
申请日:2021-02-10
Applicant: BANK OF AMERICA CORPORATION
Inventor: Brandon Sloane , Jinyoung Nathan Kim , Adriana Tache , Charles Edward Dudley
Abstract: Systems, computer program products, and methods are described herein for implementing multi-dimensional data obfuscation. The present invention is configured to electronically receive, from a computing device of a user, a request to implement a multi-dimensional data obfuscation on a first database; initiate a data obfuscation engine on the first database based on at least receiving the request, wherein initiating further comprises: determining one or more data types associated with the one or more data artifacts; determining one or more exposure levels of the one or more data artifacts; retrieving, from a data obfuscation repository, one or more data obfuscation algorithms; and implementing the one or more data obfuscation algorithms on the one or more data artifacts based on at least the one or more data types; and generate an obfuscated first database based on at least initiating the data obfuscation engine on the first database.
-
24.
公开(公告)号:US20220294793A1
公开(公告)日:2022-09-15
申请号:US17199021
申请日:2021-03-11
Applicant: BANK OF AMERICA CORPORATION
Inventor: Elliott Leonard Lillard , Regina Yee Cadavid , Gloria Youngsook Joo , Jinyoung Nathan Kim , Ramkumar Korlepara , Nia Mack , Philip Lone Mintac , Michael Jacob Richardson , Brandon Sloane , Srilekha Mudumbai Srinivasa
Abstract: Embodiments of the present invention provide a system for authorizing entity users based on augmented reality and LiDAR technology. In particular, the system may be configured to determine that a user has accessed an entity application provided by an entity via a user device, receive a unique identifier from the user device of the user, via the entity application, where the unique identifier is scanned using LiDAR technology present in the user device of the user, determine location of the user based on the unique identifier, determine an entity device associated with the unique identifier and location of the user, perform authentication of the user using at least one authentication method, determine that the authentication is successful, and in response to determining that the authentication is successful, provide access to an entity device.
-
公开(公告)号:US20220255747A1
公开(公告)日:2022-08-11
申请号:US17725445
申请日:2022-04-20
Applicant: BANK OF AMERICA CORPORATION
Inventor: Brandon Sloane , Regina Yee Cadavid , Gloria Joo , Jinyoung Nathan Kim , Nia Mack
Abstract: Dynamic segmentation of network traffic through the use of Pre-Shared Keys (PSKs). Each defined network segment uses a different pre-shared key and a message authentication code (MAC)-signing algorithm to sign data packets with segment-specific MACs. As such, only those computer hosts/nodes that are in the network segment (i.e., have been assigned the same pre-shared key for generating and decoding the MAC signed data packets) are capable or reading the segment's network traffic. By implementing segment-specific MAC signed data packets, the present invention allows for confidential data transmission absent the need to encrypt the actual contents/data being transmitted.
-
公开(公告)号:US20220253541A1
公开(公告)日:2022-08-11
申请号:US17172494
申请日:2021-02-10
Applicant: BANK OF AMERICA CORPORATION
Inventor: Brandon Sloane , Charles Edward Dudley , Jinyoung Nathan Kim , Adriana Tache
Abstract: Embodiments of the present invention provide a system for performing obfuscation of electronic data through alteration of data formats. The system is configured for extracting data from one or more data sources associated with an entity, determining data format associated with the data extracted from the one or more data sources, calculating, via a central decisioning engine, an exposure score associated with the data based on one or more factors, determining, via the central decisioning engine, an obfuscation algorithm from one or more obfuscation algorithms for obfuscating the data based on the exposure score and the data format associated with the data, and obfuscating the data using the obfuscation algorithm.
-
公开(公告)号:US11343097B2
公开(公告)日:2022-05-24
申请号:US16889945
申请日:2020-06-02
Applicant: BANK OF AMERICA CORPORATION
Inventor: Brandon Sloane , Regina Yee Cadavid , Gloria Joo , Jinyoung Nathan Kim , Nia Mack
Abstract: Dynamic segmentation of network traffic through the use of Pre-Shared Keys (PSKs). Each defined network segment uses a different pre-shared key and a message authentication code (MAC)-signing algorithm to sign data packets with segment-specific MACs. As such, only those computer hosts/nodes that are in the network segment (i.e., have been assigned the same pre-shared key for generating and decoding the MAC signed data packets) are capable or reading the segment's network traffic. By implementing segment-specific MAC signed data packets, the present invention allows for confidential data transmission absent the need to encrypt the actual contents/data being transmitted.
-
公开(公告)号:US20210377238A1
公开(公告)日:2021-12-02
申请号:US16890565
申请日:2020-06-02
Applicant: BANK OF AMERICA CORPORATION
Inventor: Brandon Sloane , Regina Yee Cadavid , Gloria Joo , Jinyoung Nathan Kim , Nia Mack
Abstract: A security system that provides for secure communication from a remote system operating on an unsecure network without the need for encrypting the packets related to the communication. The packets for the communications are sent over the network in clear text, which are readable by any systems on the network, however, only the systems that are authorized are able to determine what packets are the correct packets and what packets are the imitation packets. Moreover, a remote secure network may be utilized such that any system operating on an unsecure network may send packets through the remote secure network in a randomized routing in order to aid in hiding the systems sending and receiving the packets and the relays through which the packets are being sent.
-
公开(公告)号:US20210377029A1
公开(公告)日:2021-12-02
申请号:US16889945
申请日:2020-06-02
Applicant: BANK OF AMERICA CORPORATION
Inventor: Brandon Sloane , Regina Yee Cadavid , Gloria Joo , Jinyoung Nathan Kim , Nia Mack
IPC: H04L9/32 , H04L12/801 , H04L9/06 , H04L29/06
Abstract: Dynamic segmentation of network traffic through the use of Pre-Shared Keys (PSKs). Each defined network segment uses a different pre-shared key and a message authentication code (MAC)-signing algorithm to sign data packets with segment-specific MACs. As such, only those computer hosts/nodes that are in the network segment (i.e., have been assigned the same pre-shared key for generating and decoding the MAC signed data packets) are capable or reading the segment's network traffic. By implementing segment-specific MAC signed data packets, the present invention allows for confidential data transmission absent the need to encrypt the actual contents/data being transmitted.
-
公开(公告)号:US20240394385A1
公开(公告)日:2024-11-28
申请号:US18795484
申请日:2024-08-06
Applicant: BANK OF AMERICA CORPORATION
Inventor: Brandon Sloane , Sophie Morgan Danielpour , Serge Alejandro Neri , Lauren Jenae Alibey , James Thomas MacAulay , Jinyoung Nathan Kim
Abstract: Various systems, methods, and computer program products are provided for complex data encryption. The method includes receiving a user input code from a computing device associated with a user. The user input code is one or more plaintext characters. The method also includes generating a first encrypted value using a first encryption algorithm based on the user input code. The method further includes decrypting the first encrypted value using one or more additional encryption algorithms. The one or more synthetic user input codes are generated by the decryption of the first encrypted value using each of the one or more additional encryption algorithms. The method still further includes determining a first encryption vulnerability score based on the value of the one or more synthetic user input codes. The method also includes causing a transmission of a user input code notification based on the first encryption vulnerability score.
-
-
-
-
-
-
-
-
-