-
公开(公告)号:US20220253744A1
公开(公告)日:2022-08-11
申请号:US17172959
申请日:2021-02-10
Applicant: BANK OF AMERICA CORPORATION
Inventor: Brandon Sloane , Jinyoung Nathan Kim , Adriana Tache , Charles Edward Dudley
Abstract: Systems, computer program products, and methods are described herein for implementing dynamic data obfuscation using pattern recognition techniques. The present invention is configured to electronically receive one or more data artifacts; electronically receive one or more masked data artifacts; initiate one or more machine learning algorithms on the one or more data artifacts and the one or more masked data artifacts; determine, using the one or more machine learning algorithms, a first set of patterns associated with the one or more data artifacts and a second set of patterns associated with the one or more masked data artifacts; determine a similarity index between the first set of patterns and the second set of patterns; and compare the similarity index with a predetermined threshold; determine one or more alternate data obfuscation algorithms; and implement the one or more alternate data obfuscation algorithms on the one or more data artifacts.
-
公开(公告)号:US20220253544A1
公开(公告)日:2022-08-11
申请号:US17172517
申请日:2021-02-10
Applicant: BANK OF AMERICA CORPORATION
Inventor: Brandon Sloane , Charles Edward Dudley , Jinyoung Nathan Kim , Adriana Tache
Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for utilizing machine learning to identify data which is to be obfuscated in a format-preserving manner, which allows the obfuscated or masked data to appear as though it is original data. Because this type of obfuscation technique may require a higher degree of computational power than other techniques, there is a need to be able to dynamically choose when to implement format preservation based on a variety of factors. By using machine learning techniques, the present invention provides the functional benefit of analyzing both the data to be obfuscated, as well as available computational resources, to determine when it is appropriate to apply a format-preserving masking algorithm to the data. Accordingly, the present invention may ensure that organizational data is appropriately masked while preventing the resource strain associated with preserving the format of all original data.
-
公开(公告)号:US20220245651A1
公开(公告)日:2022-08-04
申请号:US17165102
申请日:2021-02-02
Applicant: BANK OF AMERICA CORPORATION
Inventor: Elliott Leonard Lillard , Regina Yee Cadavid , Gloria Youngsook Joo , Jinyoung Nathan Kim , Ram Korlepara , Nia Mack , Philip Lone Mintac , Srilekha Mudumbai Srinivasa , Michael Jacob Richardson , Brandon Sloane
Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for providing intelligent analysis of technical and non-technical data to identify and categorize use of entity brand elements as authorized or unauthorized. The system provides a single portal view of aggregated information and usage information for brand elements of the entity. The invention further includes the capability to recommend and automate remedial measures to prevent continued unauthorized use of brand elements.
-
公开(公告)号:US20220229898A1
公开(公告)日:2022-07-21
申请号:US17715191
申请日:2022-04-07
Applicant: Bank of America Corporation
Inventor: Vijaya L. Vemireddy , Brandon Sloane , Harvey Summers , Eileen D. Bridges
Abstract: A method of enhancing travel security features associated with a mobile device is provided. The method may include operating a time clock to store a start device confiscation time in a memory and to store an end device confiscation time in the memory, monitoring the mobile device to detect tampering occurring between the start device confiscation time and the end device confiscation time, and in response to the detecting of tampering, prompting the user for a secure identifier. Upon receipt of the secure identifier, the method may include opening a secure i/o pathway to a re-image file. The secure i/o pathway preferably enables execution of an executable re-image file. The re-image file may be used to re-image a software image of the mobile device. The re-image file may contain a pre-tampered image of the mobile device.
-
公开(公告)号:US20220215078A1
公开(公告)日:2022-07-07
申请号:US17140934
申请日:2021-01-04
Applicant: BANK OF AMERICA CORPORATION
Inventor: Brandon Sloane , Brian Diederich , Levi Weldon McVay
Abstract: Systems, computer program products, and methods are described herein for secure access control using dynamic resource replication. The present invention is configured to electronically receive, from a computing device of a user, a request to generate a resource access path to access a resource; determine one or more resource requirements associated with the resource; determine an authentication level associated with the user; initiate a resource replication engine on the one or more resource requirements and the authentication level associated with the user; determine, using the resource replication engine, that the one or more requirements and the authentication level associated with the user meets one or more conditions for a replication process; and generate, using the resource replication engine, the resource access path and a plurality of replicate resource access paths.
-
公开(公告)号:US11290475B2
公开(公告)日:2022-03-29
申请号:US16681067
申请日:2019-11-12
Applicant: Bank of America Corporation
Inventor: Brandon Sloane , Lydia Lambright , Regina Yee Cadavid , Gloria Joo
Abstract: A system provides for technology resource centric rapid resiliency modeling. In particular, the system may generate a model for securing technology resources based on compromise vectors that may affect the integrity or security of the resources, along with resiliency controls which may be used by the system to protect the resources. Based on the above information, the system may determine the impact that certain vectors may have on certain resources and assess the resistance of the resources to the impacts. In this way, the system may provide an efficient way to assess resiliency of resources and implement resiliency controls to protect such resources.
-
公开(公告)号:US11252255B2
公开(公告)日:2022-02-15
申请号:US16448081
申请日:2019-06-21
Applicant: Bank of America Corporation
Inventor: Ryan Davis , Crystal M. Sundaramoorthy , Kevin A. Delson , Brandon Sloane
IPC: H04L29/08
Abstract: A method for aggregating outage data via an edge computing system is provided. The method may include transmitting, by each edge-node included in a network, a self-identifying, self-locating, communication. The method may include receiving, at each edge-node included in the network, self-identifying, self-locating, communications from one or more edge-nodes included in the network. The method may include detecting an outage relating to a first edge-node included in the network. The outage may be detected by at least one edge-node included in the network. The at least one edge-node may not be the first edge-node. The at least one edge-node may be the first edge-node operating in limited capacity. The method may include identifying a most-recently confirmed location of an entity co-located with the first edge-node. The method may include dispatching outage-restoration-assistance to the most-recently confirmed real-time location of the entity co-located with the first edge-node.
-
公开(公告)号:US20220038890A1
公开(公告)日:2022-02-03
申请号:US16940518
申请日:2020-07-28
Applicant: Bank of America Corporation
Inventor: Nancy T. Carrier , Brandon Sloane
Abstract: A proxy-based method for improving digital security during a user's travel is provided. The method may include determining a bundle of merchant category classification (MCC) codes. This bundle preferably reflects a baseline travel condition. The baseline travel condition is associated with a user mobile device. The method may also include dynamically updating a characteristic associated with the bundle of MCC codes based on updated travel conditions. The method may also include determining an occurrence of an anomalous user mobile device activity. The determination may be based on a comparison of the updated characteristic associated with the bundle of MCC codes and the baseline travel conditions; and in response to a determination of anomalous user mobile device activity, increasing a security level associated with the mobile device associated with the user.
-
公开(公告)号:US20220021693A1
公开(公告)日:2022-01-20
申请号:US16928797
申请日:2020-07-14
Applicant: Bank of America Corporation
Inventor: Harvey Summers , Vijaya L. Vemireddy , Brandon Sloane , Eileen D. Bridges
Abstract: A method for enhancing travel security features associated with a mobile device is provided. The method may include operating a time clock on the mobile device to determine a start device confiscation time in the memory and to determine an end device confiscation time in the memory. The method may also include monitoring the operation of the mobile device between the start device confiscation time and the end device confiscation time to determine the existence of an anomalous device condition. The monitoring may include using a network traffic monitor device, a bandwidth usage monitor device, a battery performance monitor device, a website presentation monitor device, and/or central processing usage monitor device. The monitoring may record a device activity between the start time and the end time and flag the anomalous device condition that occurred between the start time and the end time.
-
公开(公告)号:US20220019654A1
公开(公告)日:2022-01-20
申请号:US16928843
申请日:2020-07-14
Applicant: Bank of America Corporation
Inventor: Vijaya L. Vemireddy , Brandon Sloane , Harvey Summers , Eileen D. Bridges
Abstract: A method of enhancing travel security features associated with a mobile device is provided. The method may include operating a time clock to store a start device confiscation time in a memory and to store an end device confiscation time in the memory, monitoring the mobile device to detect tampering occurring between the start device confiscation time and the end device confiscation time, and in response to the detecting of tampering, prompting the user for a secure identifier. Upon receipt of the secure identifier, the method may include opening a secure i/o pathway to a re-image file. The secure i/o pathway preferably enables execution of an executable re-image file. The re-image file may be used to re-image a software image of the mobile device. The re-image file may contain a pre-tampered image of the mobile device.
-
-
-
-
-
-
-
-
-