-
1.
公开(公告)号:US20250112758A1
公开(公告)日:2025-04-03
申请号:US18376138
申请日:2023-10-03
Applicant: Bank of America Corporation
Inventor: Saurabh Garg , Bhagat Allugubelly , Maneesh Sethia
Abstract: A computing platform may train, using smart contract and file type information, a homomorphic encryption model, which may configure the homomorphic encryption model to identify, for a given input file, a corresponding smart contract defining a corresponding set of parameters, included in the given input file, for display. The computing platform may receive an unencrypted file, and may identify, by inputting the unencrypted file into the homomorphic encryption model, a smart contract defining one or more parameters for display. The computing platform may encrypt, using homomorphic encryption, the unencrypted file to produce an encrypted file, and may store the encrypted file. The computing platform may receive, via an application programming interface (API) at a user device, a request to access the encrypted file. The computing platform may send, based on the smart contract and for display at the user device via the API, the parameters for display.
-
公开(公告)号:US20250110823A1
公开(公告)日:2025-04-03
申请号:US18479497
申请日:2023-10-02
Applicant: Bank of America Corporation
Inventor: Saurabh Garg , Maneesh Kumar Sethia , Shailendra Singh
Abstract: An error message is received from a first computing node indicating a malfunction associated with the first computing node. Based on a first error code received in the error message, a first software program is determined that is to be installed at the first computing node to resolve the malfunction. A geographically nearest second computing node to the first computing node is determined that includes the first software program. The second computing node is instructed to transmit the first software program to the first computing node. The second computing node transmits the first software program to the first computing node. The first computing node receives and installs the first software program at the first computing node.
-
3.
公开(公告)号:US20250068772A1
公开(公告)日:2025-02-27
申请号:US18455849
申请日:2023-08-25
Applicant: Bank of America Corporation
Inventor: Ngoc Tran , Maneesh Kumar Sethia , Saurabh Garg
IPC: G06F21/62
Abstract: A system that includes a memory and a processor that determines whether to authorize an action. The processor receives a plurality of authorization messages that are requests for authorizing actions. The processor then extracts data from the plurality of authorization messages and analyzes the data with a trained neural network to group the plurality of authorization messages. The resulting plurality of message groupings are then analyzed by a long-short-term-memory algorithm (LSTM) to determine a plurality of patterns that indicate that a particular authorization message may be authorized. The processor then receives one or more new authorization messages from an external device and compares these to the plurality of patterns. If the one or more new authorization messages correspond to any of the patterns, then the external device is notified by the processor that it should deny the action associated with the new authorization messages.
-
公开(公告)号:US20250016163A1
公开(公告)日:2025-01-09
申请号:US18349035
申请日:2023-07-07
Applicant: Bank of America Corporation
Inventor: Saurabh Garg , Maneesh Kumar Sethia , Sandeep Kumar Chauhan , Saurabh Arora , Prakash Thatipamula
IPC: H04L9/40
Abstract: An apparatus comprises a memory communicatively coupled to a processor. The memory is configured to store network interchange parameters and user profiles. The processor is configured to receive a data exchange request triggered by a user device. Further, the processor is configured to request, to a decentralized network, a token indicating that a user profile associated with the user device is entitled to access an entitlement, determine whether a data exchange network is available to exchange data in accordance with the network interchange parameters, identify a second data exchange network that is available in accordance with second network interchange parameters in response to determine that the data exchange network is unavailable, and request a data exchange output from the second data exchange network via the token. The processor is configured to receive the data exchange output from the second data exchange network.
-
公开(公告)号:US12058005B1
公开(公告)日:2024-08-06
申请号:US18243901
申请日:2023-09-08
Applicant: Bank of America Corporation
Inventor: Shailendra Singh , Maneesh Sethia , Saurabh Garg
Abstract: Aspects of the disclosure relate to using machine learning models to automatically generate spine-leaf network topologies. A computing system may receive one or more prompts to generate a spine-leaf network topology based on a non-spine-leaf network topology of a non-spine-leaf network. Based on inputting the prompts into a natural language processing model, network criteria for generating the spine-leaf network topology may be generated. Non-spine-leaf network topology data comprising network metadata, network dependency parameters, and network constraint parameters, may be retrieved. Based on inputting the network criteria and the non-spine-leaf network data into a generative adversarial network implemented on a quantum computing device, candidate spine-leaf topologies comprising a qualified candidate spine-leaf network topology that meets the network criteria may be generated. A block of a blockchain may be generated and may comprise the qualified candidate spine-leaf network topology that meets the network criteria.
-
公开(公告)号:US20240419789A1
公开(公告)日:2024-12-19
申请号:US18210312
申请日:2023-06-15
Applicant: BANK OF AMERICA CORPORATION
Inventor: Saurabh Garg , Abhijit Behera , Paul Martin Mattison , Maneesh Sethia
IPC: G06F21/55
Abstract: Artificial intelligence, in the form of machine-learning models, are implemented to dynamically detect when an online or mobile app application is being filled-out/submitted by an autonomous software program/bot (e.g., an invalid application submission), as opposed to a human (i.e., a valid application submission). Telemetry data is captured from the mobile application or web/online application that is indicative as to whether the application forms are being filled-out by a human or an autonomous software program. The telemetry data is applied to machine learning models to determine if the telemetry data results in a recognized pattern that indicates autonomous software program data entry or, conversely, human data entry. In the event that an application submission is determined to be filled-out by an autonomous software program/bot, subsequent submission and/or further processing of the application is denied.
-
公开(公告)号:US12051307B1
公开(公告)日:2024-07-30
申请号:US18203682
申请日:2023-05-31
Applicant: Bank of America Corporation
Inventor: Saurabh Garg , Maneesh Sethia , Shailendra Singh
CPC classification number: G07F19/206 , H04L9/3239
Abstract: Aspects of the disclosure relate to reimaging an ATM using an extended reality interface and machine learning models that are configured to reimage the ATM. A computing system may send a request for authorization to access an ATM. Based on the request being granted the ATM may be accessed via an extended reality interface. Reimaging the ATM may be based on inputting ATM data associated with a state of the ATM into machine learning models that are configured to generate instructions to reimage the ATM and then execute threads based on processes that were determined based on the instructions. The threads may be executed in a RAM of the ATM in accordance with machine learning model determined priorities of the threads.
-
8.
公开(公告)号:US20250080359A1
公开(公告)日:2025-03-06
申请号:US18241306
申请日:2023-09-01
Applicant: BANK OF AMERICA CORPORATION
Inventor: Saurabh Garg , Maneesh Sethia
Abstract: Systems, computer program products, and methods are described herein for cryptographic data transfer and authentication in a distributed network. The present invention is configured to receive credentials on an interface of an endpoint device, receive a request from the endpoint device to access a portal, authenticate the credentials via an authentication engine, receive specifications, wherein the specifications are input into the interface of the endpoint device, select, via a configuration engine comprising pre-existing configurations in a configuration database of a first storage device, a selected pre-existing configuration, determine a verification of the selected pre-existing configuration, and access the portal.
-
公开(公告)号:US12160346B1
公开(公告)日:2024-12-03
申请号:US18319897
申请日:2023-05-18
Applicant: Bank of America Corporation
Inventor: Ngoc Tran , Saurabh Garg , Maneesh Kumar Sethia
IPC: H04L41/12 , H04L43/0811 , H04L45/02
Abstract: A system for reestablishing network connectivity for particular network equipment in a failed network zone comprises a processor associated with a server. The processor receives a flag that identifies the failed network zone including particular network equipment that have lost network connectivity in a network. The processor generates a first non-fungible token using the configuration information associated with each of the particular network equipment. The processor determines routing information based at least in part upon the configuration information and a network topology. The processor generates a second non-fungible token based at least in part upon the routing information. The processor aggregates the first non-fungible token and the second non-fungible token to generate a primary non-fungible token. The processor reestablishes network connectivity for at least a portion of the particular network equipment based at least in part upon information associated with the primary non-fungible token.
-
公开(公告)号:US20250168022A1
公开(公告)日:2025-05-22
申请号:US18512404
申请日:2023-11-17
Applicant: Bank of America Corporation
Inventor: Saurabh Garg , Maneesh Kumar Sethia , Shailendra Singh
IPC: H04L9/00
Abstract: A method includes analyzing a first block of a blockchain stored in a blockchain network. The first block is associated with an interaction between computing systems. Upon determining that the interaction is illegitimate, a first instruction is sent to the blockchain network to create and add a dispute block associated with a dispute of the interaction to the blockchain. Upon determining that the blockchain includes an intermediate block between the first block and the dispute block that is associated with a subsequent interaction that is performed after the interaction, source and destination computing systems for the interaction and the subsequent interaction are determined. Upon approving reversals of the interaction and the subsequent interaction, a second instruction is sent to each destination computing system to initiate a reversal of a respective interaction. A notification is sent to each source computing system that the reversal of the respective interaction is approved.
-
-
-
-
-
-
-
-
-