-
1.
公开(公告)号:US12192291B2
公开(公告)日:2025-01-07
申请号:US18223286
申请日:2023-07-18
Applicant: Bank of America Corporation
Inventor: George Anthony Albero , Edward Lee Traywick , Scot L. Daniels
IPC: G06F16/00 , G06F16/23 , G06Q40/02 , H04L67/306
Abstract: Aspects of the disclosure relate to account lineage tracking and automatically executing responsive actions upon detecting an incomplete lineage chain. A computing platform may receive an account-change message from a database-level interceptor. The account-change message may include information identifying a first target account as a database-level source account and identifying a second target account associated with one or more target databases. The first target account may be associated with a target application configured to access the target database. After receiving the account-change message, the computing platform may determine, based on a failure to detect a source account associated with the first target account, that an account lineage chain associated with the account-change message is incomplete. In response to determining that the account lineage chain is incomplete, the computing platform may generate and send one or more commands to limit access of the first target account to the target database.
-
2.
公开(公告)号:US12160422B2
公开(公告)日:2024-12-03
申请号:US17712360
申请日:2022-04-04
Applicant: BANK OF AMERICA CORPORATION
Inventor: George Anthony Albero , Edward Lee Traywick , Ariel Fontaine Hill , Jake Michael Yara , Dustin Paul Stocks
Abstract: Systems, computer program products, and methods are described herein for implementing device manipulation for counteracting facial recognition authentication security malfeasance. The present invention is configured to receive a request from a user via a client device to access an authentication subsystem to execute a facial recognition authentication for access to an application; initiate the facial recognition authentication on the client device in response to receiving the request; receive, from the client device, one or more external inputs in response to one or more authentication prompts; determine, using a machine learning subsystem, that at least one of the one or more external inputs is associated with a first preconfigured duress code; trigger, using a breach detection subsystem, a first set of security protocols; and execute, using the breach detection subsystem, a first set of predefined actions associated with the first set of security protocols.
-
公开(公告)号:US20240244048A1
公开(公告)日:2024-07-18
申请号:US18097729
申请日:2023-01-17
Applicant: Bank of America Corporation
Inventor: Edward Lee Traywick , Christopher D. Nobile , Joshua R. Johnson , Christopher Stephen Littrell
IPC: H04L9/40
CPC classification number: H04L63/0861 , H04L63/102
Abstract: Arrangements for providing dynamic passive authentication are provided. In some aspects, registration data may be received for a plurality of users. The registration data may include biometric data of each user of the plurality of users, and identification of one or more user computing devices that each user is authorize to access. In response to receiving an indication of login to a user computing device by a first user, one or more passive authentication functions may be activated and biometric data may be received from devices associated with the user computing device. The computing platform may compare the received biometric data to registration biometric data associated with the first user. If the received data matches the registration data, the system may capture additional biometric data at a subsequent time. If the received data does not match the registration data, one or more mitigation actions may be identified and executed.
-
4.
公开(公告)号:US20230362263A1
公开(公告)日:2023-11-09
申请号:US18223286
申请日:2023-07-18
Applicant: Bank of America Corporation
Inventor: George Anthony Albero , Edward Lee Traywick , Scot L. Daniels
IPC: H04L67/306 , G06F16/23 , G06Q40/02
CPC classification number: H04L67/306 , G06F16/235 , G06Q40/02
Abstract: Aspects of the disclosure relate to account lineage tracking and automatically executing responsive actions upon detecting an incomplete lineage chain. A computing platform may receive an account-change message from a database-level interceptor. The account-change message may include information identifying a first target account as a database-level source account and identifying a second target account associated with one or more target databases. The first target account may be associated with a target application configured to access the target database. After receiving the account-change message, the computing platform may determine, based on a failure to detect a source account associated with the first target account, that an account lineage chain associated with the account-change message is incomplete. In response to determining that the account lineage chain is incomplete, the computing platform may generate and send one or more commands to limit access of the first target account to the target database.
-
5.
公开(公告)号:US11425123B2
公开(公告)日:2022-08-23
申请号:US16850797
申请日:2020-04-16
Applicant: BANK OF AMERICA CORPORATION
Inventor: George Albero , Elijah Clark , Scot Lincoln Daniels , Emanuel David Guller , Konata Stinson , Rick Wayne Sumrall , Edward Lee Traywick , Jake Michael Yara
Abstract: A system already on a network may be analyzed when the system takes an action or may be periodically reviewed. The analysis of the system may include the creation of an environment hash for the system, which is a representation of the configuration (e.g., hardware, software, or the like) of the system, and a comparison with hash requirements. The hash requirements may be stored authorized hashes, stored unauthorized hashes, past hashes for the same system, hashes for other systems with the same or similar configurations, or the like. When the environment hash of the system meets hash requirements, the system may be allowed to continue to operate on the system or may be allowed to take the action on the network. When the hash of the system fails to meet a hash requirement, the system may be isolated from the network and investigated for a non-compliant configuration.
-
公开(公告)号:US11372982B2
公开(公告)日:2022-06-28
申请号:US16919918
申请日:2020-07-02
Applicant: Bank of America Corporation
Inventor: George Albero , Jake Michael Yara , Edward Lee Traywick , Konata Stinson , Emanuel David Guller , Scot Lincoln Daniels , Rick Wayne Sumrall , Carrie Elaine Gates
Abstract: A centralized network environment is provided for processing validated executable data based on authorized hash outputs. In particular, the system may generate cryptographic hash outputs of code or software that has been evaluated (e.g., within a virtual environment). The system may then store the hash outputs within a hash database which may be accessible by multiple entity networks, where multiple entities may upload hash output values to and/or retrieve hash output values from the hash database. Based on the data within the hash database, each entity may efficiently identify code that may be safe or unsafe to execute on certain computing systems within its network environment. The system may further comprise an artificial intelligence-powered component which may be configured to detect patterns within code that has been identified by the system as unsafe and provide notifications containing systems likely to be affected and recommended countermeasures.
-
公开(公告)号:US20210029164A1
公开(公告)日:2021-01-28
申请号:US16520971
申请日:2019-07-24
Applicant: Bank of America Corporation
Inventor: George Albero , Michael Beveridge , Edward Lee Traywick , Elizabeth R. Liuzzo , Caleb G. Mann , David Joseph Walsh , Daniel Martin , Cody Searl , Paul Swiencicki
IPC: H04L29/06
Abstract: Aspects of the disclosure relate to improving user responses to cyber security threats. A computing platform may generate a test communication to simulate a potential cyber threat activity. Then, the computing platform may send, via the communication interface, the test communication to a user device associated with a target user. Then, the computing platform may receive, via the communication interface and from the user device, a response to the test communication. Subsequently, the computing platform may determine, based on the response, a threat awareness level for the target user, where the threat awareness level is indicative of a susceptibility of the target user to the potential cyber threat activity. Then, the computing platform may send, to the target user and based on the threat awareness level, an alert notification to counter the cyber threat activity.
-
8.
公开(公告)号:US20250071181A1
公开(公告)日:2025-02-27
申请号:US18944168
申请日:2024-11-12
Applicant: Bank of America Corporation
Inventor: George Anthony Albero , Edward Lee Traywick , Scot L. Daniels
IPC: H04L67/306 , G06F16/23 , G06Q40/02
Abstract: Aspects of the disclosure relate to account lineage tracking and automatically executing responsive actions upon detecting an incomplete lineage chain. A computing platform may receive an account-change message from a database-level interceptor. The account-change message may include information identifying a first target account as a database-level source account and identifying a second target account associated with one or more target databases. The first target account may be associated with a target application configured to access the target database. After receiving the account-change message, the computing platform may determine, based on a failure to detect a source account associated with the first target account, that an account lineage chain associated with the account-change message is incomplete. In response to determining that the account lineage chain is incomplete, the computing platform may generate and send one or more commands to limit access of the first target account to the target database.
-
公开(公告)号:US20240242219A1
公开(公告)日:2024-07-18
申请号:US18097739
申请日:2023-01-17
Applicant: Bank of America Corporation
Inventor: Edward Lee Traywick , Christopher D. Nobile , Joshua R. Johnson , Christopher Stephen Littrell
CPC classification number: G06Q20/40145 , G06Q20/18
Abstract: Arrangements for providing dynamic passive authentication at self-service kiosks are provided. In some aspects, registration data may be received for a plurality of users. The registration data may include biometric data of each user of the plurality of users. In response to receiving an indication of authentication of a user and a request for transaction processing, one or more passive authentication functions may be activated and biometric data may be received from devices associated with the self-service kiosk. The computing platform may compare the received biometric data to registration biometric data associated with the first user. If the received data matches the registration data, the system may capture additional biometric data at a subsequent time. If the received data does not match the registration data, one or more mitigation actions may be identified and executed.
-
公开(公告)号:US20240236086A1
公开(公告)日:2024-07-11
申请号:US18094102
申请日:2023-01-06
Applicant: Bank of America Corporation
Inventor: Edward Lee Traywick , Ava Elizabeth Wallace , Christopher D. Nobile
CPC classification number: H04L63/0861 , G10L17/04 , G10L17/06 , G10L17/22
Abstract: Aspects of the disclosure relate to a voice authentication platform. The voice authentication platform may monitor remote communications to identify a first voice sample. The voice authentication platform may train a voice authentication model to output similarity scores, based on the first voice sample. The voice authentication platform may identify a second voice sample. The voice authentication platform may generate a similarity score by inputting the second voice sample into the model. The voice authentication platform may compare the similarity score to a threshold value. If the similarity score meets or exceeds the threshold value, the voice authentication platform may update a user profile. If the similarity score is below the threshold value, the voice authentication platform may initiate a security action. The voice authentication platform may create an iterative feedback loop to update the voice authentication model.
-
-
-
-
-
-
-
-
-