-
公开(公告)号:US20240388436A1
公开(公告)日:2024-11-21
申请号:US18198866
申请日:2023-05-18
Applicant: Bank of America Corporation
Inventor: Aeric Solow , Manu Kurian , Ganesh Bonda
Abstract: A method for determining whether an existing customer is eligible for a zero-knowledge proof (“ZKP”) application is provided. The method may include determining that the existing customer possesses a private key linked to an account profile associated with the existing customer absent provision of the private key. The determining may also include executing a behavior-scan on the account profile to confirm that a score of the behavior-scan is equal to or greater than a pre-determined score. In response to the determining that the existing customer is eligible for the ZKP application, the method may include generating the ZKP application by executing an encryption algorithm on the sensitive data of the account profile to output a digital zero-knowledge token for each of the sensitive data and auto-filling each input field in the ZKP application that is associated with sensitive data with the digital zero-knowledge token.
-
公开(公告)号:US20240386482A1
公开(公告)日:2024-11-21
申请号:US18669974
申请日:2024-05-21
Applicant: Bank of America Corporation
Inventor: Daralyn M. Nicholson , Anna Hollifield , Shaun G. Hunter
IPC: G06Q40/02 , G06Q20/32 , G06Q20/40 , G16H10/00 , H04B1/3827
Abstract: Computer implemented systems and methods are disclosed involving technological advancements in the processing of electronic transaction processing. A system may comprise a networked environment including heterogeneous or homogenous payment processing systems. A centrally accessible server machine storing an automatic savings program module and rules controls the generation and dissemination of new transactions derived from incoming transactions. Moreover, the networked system may be used to control authorization of electronic transactions in a near real-time manner. The networked system may be used to distribute a financial health of a user in a user-friendly, mobile form factor.
-
公开(公告)号:US20240386310A1
公开(公告)日:2024-11-21
申请号:US18199073
申请日:2023-05-18
Applicant: Bank of America Corporation
Inventor: Emad Noorizadeh , Emmanuel Dibia , Jennifer Russell , Rajan Jhaveri
IPC: G06N20/00
Abstract: A method for training a model is provided. Methods may, at a first pre-step, receive a base model. Methods may, at a first step, create a label using the base model to be applied to unlabeled data, label a first set of unlabeled data with the label and generate a first set of labeled data from the first set of unlabeled data. Methods may, at a second step, receive a second set of labeled data, separate the second set into a first group and a second group, classify the first group and the first set as training data. Methods may, at a third step, train a deep learning model using the training data, validate the deep learning model using the second group and generate a set of model parameters. Methods may, at a fourth step, save the model parameters. Methods may, at a fifth step, train the deep learning, initialized from the parameters, using the first group. Methods may, at a sixth step, replace the base model with the deep learning model and repeat steps one through six.
-
公开(公告)号:US20240386106A1
公开(公告)日:2024-11-21
申请号:US18197164
申请日:2023-05-15
Applicant: Bank of America Corporation
Inventor: Maneesh Kumar Sethia , Vibhu Srivastava , Ashok Reddy Buthukuri , Ankit Jain Bohra
Abstract: Aspects of this disclosure relate to systems and methods to determine whether an application is misconfigured or malicious using smart contracts stored on a distributed ledger and a transferred deep learning system. A smart contract is generated and assigned rules for monitoring an application session on a user computing device when an application session associated with the application is initiated. The smart contract denies or grants the application session permission to access user data and shuts down the application session when a malicious indication is detected in configuration data associated with the application based on rules assigned to the smart contract. The malicious indication is output by a deep learning module trained on historical configuration data associated with the application. The deep learning module transfers layers to an enterprise deep learning module on an enterprise platform to determine a misconfiguration indication indicating the configuration data is misconfigured.
-
公开(公告)号:US20240386031A1
公开(公告)日:2024-11-21
申请号:US18319099
申请日:2023-05-17
Applicant: Bank of America Corporation
Inventor: Arunkumar Somasundaram , Udhayan M , Lalitha Rajeswari Karanam , Balamurali Lakshminarayanan , Shwethaa S , Lakka Manju
Abstract: A method includes receiving production data items from a data warehouse. New data items are received and converted to structured new data items. The production data items are converted from classical to quantum bits to determine converted production data items. The structured new data items are converted from classical to quantum bits to determine converted structured new data items. The converted production data items are entangled with the converted structured new data items one or more times until a correlation score is greater than a correlation threshold to obtain correlated data items. The correlated data items are converted from quantum to classical bits to determine converted correlated data items. Data dictionary is created for the structured new data items based on the converted correlated data items. Data objects are created for the structured new data items based on the data dictionary. The data objects are deployed to the data warehouse.
-
公开(公告)号:US20240386021A1
公开(公告)日:2024-11-21
申请号:US18198863
申请日:2023-05-18
Applicant: Bank of America Corporation
Inventor: Nupur Gupta , Harinath Meedinti Bhaskara Reddy , Manu Kurian , Jayachandra Varma , Erica Perkins
IPC: G06F16/2455 , G06F16/2453 , G06N5/022 , G06N10/60
Abstract: A method for facilitating transfer of a new dataset across a network may include the following steps: (a) querying the global dataset via a computer processor to identify an existing dataset having data points corresponding to the new dataset; (b) identifying historical data rules previously used for a set of data transfers relating to the existing dataset; and (c) using the historical data rules to assist a machine learning engine in generating data rules for use with a data transfer relating to the new dataset.
-
公开(公告)号:US12149624B2
公开(公告)日:2024-11-19
申请号:US17929353
申请日:2022-09-02
Applicant: Bank of America Corporation
Inventor: Naga Vamsi Krishna Akkapeddi , Manu J. Kurian
IPC: H04L9/32 , G06T11/00 , H04L9/40 , H04L67/131 , H04L67/306 , H04L67/52
Abstract: A system for pre-authenticating a user device to navigate through virtual operation areas comprises a processor associated with a server. The processor accesses a virtual environment and receives an interaction request from the user device for an interaction session. The processor determines a set of virtual operation areas in a virtual environment based on the interaction request. The processor generates a corresponding meta-profile associated with a user profile by mapping each pre-authentication token associated with the user device from a corresponding physical location to a corresponding virtual operation area. The processor generates an avatar associated with the user device and associates the avatar to the meta-profile and a set of pre-authentication tokens for the avatar to access the virtual operation areas. The processor identifies a first pre-authentication token associated with the user device and a first level virtual operation area and dynamically grants a first level authentication to the avatar.
-
公开(公告)号:US12147967B2
公开(公告)日:2024-11-19
申请号:US17875166
申请日:2022-07-27
Applicant: Bank of America Corporation
Inventor: Maneesh Sethia
Abstract: A wearable computing device, such as a smart glass device, may be used to facilitate touchless and/or frictionless transactions at computing devices in the vicinity of the wearable computing device based on a dynamic non-fungible token (NFT). The smart glass device captures biometric information of a user, such as an iris image, and generates the NFT based on the biometric information, a geographic location and a time. The NFT is authenticated via a blockchain by an authentication system at a remote network. Upon validation, the smart glass device presents user interface screens to initiate the transaction. A computing device receives a request message to complete the transaction based on the NFT.
-
公开(公告)号:US12147790B2
公开(公告)日:2024-11-19
申请号:US18135271
申请日:2023-04-17
Applicant: BANK OF AMERICA CORPORATION
Inventor: Shailendra Singh
IPC: G06F3/048 , G06F3/0482 , G06F3/0484 , G06F8/38 , G06F11/36 , G06T11/20
Abstract: Embodiments of the present invention provide a system for automatically generating and deploying graphical user interface components based on real-time sketches. The system is configured for determining that a user has accessed a sketch application via a user computing device, allowing the user to create one or more sketches in real-time via a user interface of the sketch application, determining that the user has created at least a first sketch, wherein the first sketch is associated with an application, extracting data from the first sketch, mapping the first sketch with a first user interface component based on the data extracted from the first sketch, generating the first user interface component, integrating a first source code of the first user interface component, testing the first user interface component, determining that testing of the first user interface component is successful, and deploying the first user interface component to a real-time environment.
-
公开(公告)号:US12147538B2
公开(公告)日:2024-11-19
申请号:US17872354
申请日:2022-07-25
Applicant: Bank of America Corporation
Inventor: Matthew Murray , Garrett Botkin , Dustin Stocks
Abstract: Aspects of the disclosure relate to mitigation and detection of steganographic modifications embedded in images. A computing platform may receive an image embedded with steganographic modifications. The computing platform may change or modify any number of bits of one or more color components of one or more pixels of an image, rendering the steganographic modifications ineffective. The computing platform may cause at an isolation zone system, execution of an image, including steganographic modifications, to identify images embedded with steganographic modifications. The computing platform may also compare an image with image stored in an image storage module. The computing platform may store an image from the image storage module with a highest visual comparison score rather than the image.
-
-
-
-
-
-
-
-
-