-
1.
公开(公告)号:US11379815B2
公开(公告)日:2022-07-05
申请号:US16595012
申请日:2019-10-07
Applicant: BANK OF AMERICA CORPORATION
Inventor: Craig D. Widmann , Eren Kursun
Abstract: A system for event-based peer-to-peer resource transfers. The system comprising: a controller configured for tracking and confirming resource transfers, the controller being further configured to: generate a resource transfer for transferring a resource from a first user device to a second user device, wherein the resource transfer comprises a conditional event for triggering a transfer of the resource, and wherein the conditional event is accepted by the first user device and the second user device; receive the resource from the first user device, wherein the resource is held separate from the first user device and the second user device; determine that the conditional event has been executed by at least one of the first user device and the second user device; and based on the determining that the conditional event has been executed, trigger the transfer of the resource to the second user device.
-
公开(公告)号:US20190372974A1
公开(公告)日:2019-12-05
申请号:US15995830
申请日:2018-06-01
Applicant: BANK OF AMERICA CORPORATION
Inventor: Dharmender Kumar Satija , Eren Kursun , Andrew DongHo Kim , Scott Anderson Sims , Craig D. Widmann
IPC: H04L29/06
Abstract: A system and methods for alternate user communication routing are described. Unauthorized users are identified and alternate treatments are provided in order to deter unauthorized access and create opportunities for data collection. The use of a varied set of alternate treatments provides an enhanced view of unauthorized user behavior and an increased ability to track future unauthorized user actions by recording various user identity/communication characteristics specific to known unauthorized users. Alternate treatments may be provided randomly based on a set of alternate treatments previously provided to a specific user, or may be varied based on an identified group of unauthorized users presumed to be acting in concert.
-
公开(公告)号:US20190289025A1
公开(公告)日:2019-09-19
申请号:US15921395
申请日:2018-03-14
Applicant: BANK OF AMERICA CORPORATION
Inventor: Eren Kursun , Craig D. Widmann , Dharmender Kumar Satija , Andrew DongHo Kim , Shawn Parris Bench , Kolt Arthur Bell , Scott Anderson Sims
Abstract: The invention describes a system and method employing machine learning and artificial intelligence engines to monitor data streams in real-time across multiple channels in order to detect anomalies and generate prioritized alerts. In particular, the invention may continuously collect data across multiple channels. The obtained data may be compared with reference data to continuously update a confidence level associated with the user, channel, entity, or other identifying factor. Based on the confidence level, profile the user to detect any inconsistencies in the data collected over time and generate an alert to the user in question and potentially to other downstream users or entities. In this way, the invention not only provides a way to detect anomalies in a cross-channel fashion, but also creates a mechanism for feedback wherein the system may incorporate user feedback to resolve alerts and detected anomalies.
-
公开(公告)号:US20170237759A1
公开(公告)日:2017-08-17
申请号:US15041792
申请日:2016-02-11
Applicant: Bank of America Corporation
Inventor: Kolt Bell , Brandon Weeks , Alvino Sarran , Michael Ayers-Morris , Alex Stapleton , Craig D. Widmann , John Tuders , Amijo Bearley
CPC classification number: H04L63/1425 , G06Q40/02
Abstract: Systems and computer-readable media are disclosed for utilizing one or more databases to detect a point of compromise (“POC”). A POC detection computing platform may receive data associated with a potential point of compromise from a first computing system. The POC detection computing platform may extract data associated with the potential point of compromise from one or more central servers and/or databases. The extracted data may then be analyzed to determine if a point of compromise has been detected. The POC detection computing platform may transmit the results of the analysis to a second computing system.
-
5.
公开(公告)号:US20170237741A1
公开(公告)日:2017-08-17
申请号:US15041802
申请日:2016-02-11
Applicant: Bank of America Corporation
Inventor: Kolt Bell , John Tuders , Alvino Sarran , Michael Ayers-Morris , Alex Stapleton , Craig D. Widmann , Paulette Price
CPC classification number: H04L63/101 , G06Q20/40 , H04L63/1416
Abstract: Aspects of the disclosure relate to deploying and utilizing a dynamic record identification and analysis computer system with event monitoring components. In some embodiments, a computing platform may receive, from a contact feed generation computer system, one or more contact feeds comprising contact data identifying one or more contacts associated with one or more user accounts. The computing platform may analyze the one or more contact feeds to identify a first subset of user accounts of the one or more user accounts having one or more attributes associated with one or more predetermined account security concern characteristics. Subsequently, the computing platform may add the first subset of user accounts of the one or more user accounts to an alert table maintained by the computing platform, and may send, to an analyst computer system, alert table listing information identifying contents of the alert table maintained by the computing platform.
-
6.
公开(公告)号:US12136078B2
公开(公告)日:2024-11-05
申请号:US17826463
申请日:2022-05-27
Applicant: BANK OF AMERICA CORPORATION
Inventor: Craig D. Widmann , Eren Kursun
Abstract: A system for event-based peer-to-peer resource transfers. The system may include a controller configured for tracking and confirming resource transfers, the controller being further configured to: generate a resource transfer for transferring a resource from a first user device to a second user device, where the resource transfer includes a conditional event for triggering a transfer of the resource, and where the conditional event is accepted by the first user device and the second user device; receive the resource from the first user device, where the resource is held separate from the first user device and the second user device; determine that the conditional event has been executed by at least one of the first user device and the second user device; and based on the determining that the conditional event has been executed, trigger the transfer of the resource to the second user device.
-
公开(公告)号:US11962617B2
公开(公告)日:2024-04-16
申请号:US17191377
申请日:2021-03-03
Applicant: BANK OF AMERICA CORPORATION
Inventor: Michael Joseph Carroll , Jeffrey Brian Bashore , Joel Filliben , Andrew DongHo Kim , Akhilendra Reddy Kotha , Pavan Kumar Reddy Kotlo , Ronnie Joe Morris, Jr. , Dharmender Kumar Satija , Michael Shih , Scott Anderson Sims , Craig D. Widmann
CPC classification number: H04L63/1466 , H04L63/105 , H04L63/1416 , H04L63/1425 , H04L63/20
Abstract: Embodiments of the invention are directed to a system, method, or computer program product for cross-channel network security with tiered adaptive mitigation operations. In this regard, the invention is structured for dynamic detection of security events associated with network devices and resources, and triggering real-time mitigation operations across a plurality of resource channels. The invention provides a novel method for employing activity data to construct and implement mitigation actions for de-escalating authorization tiers that are adapted to the specific attributes of the activity data, in order to prevent security exposure associated with the activity. Another aspect of the invention is directed to determining whether to continue the tiered adaptive mitigation actions and/or trigger a security proceed signal.
-
8.
公开(公告)号:US20220292480A1
公开(公告)日:2022-09-15
申请号:US17826463
申请日:2022-05-27
Applicant: BANK OF AMERICA CORPORATION
Inventor: Craig D. Widmann , Eren Kursun
Abstract: A system for event-based peer-to-peer resource transfers. The system may include a controller configured for tracking and confirming resource transfers, the controller being further configured to: generate a resource transfer for transferring a resource from a first user device to a second user device, where the resource transfer includes a conditional event for triggering a transfer of the resource, and where the conditional event is accepted by the first user device and the second user device; receive the resource from the first user device, where the resource is held separate from the first user device and the second user device; determine that the conditional event has been executed by at least one of the first user device and the second user device; and based on the determining that the conditional event has been executed, trigger the transfer of the resource to the second user device.
-
公开(公告)号:US20200329043A1
公开(公告)日:2020-10-15
申请号:US16915371
申请日:2020-06-29
Applicant: BANK OF AMERICA CORPORATION
Inventor: Dharmender Kumar Satija , Eren Kursun , Andrew DongHo Kim , Scott Anderson Sims , Craig D. Widmann
IPC: H04L29/06
Abstract: A system and methods for alternate user communication routing are described. Unauthorized users are identified and alternate treatments are provided in order to deter unauthorized access and create opportunities for data collection. The use of a varied set of alternate treatments provides an enhanced view of unauthorized user behavior and an increased ability to track future unauthorized user actions by recording various user identity/communication characteristics specific to known unauthorized users. Alternate treatments may be provided randomly based on a set of alternate treatments previously provided to a specific user, or may be varied based on an identified group of unauthorized users presumed to be acting in concert.
-
公开(公告)号:US20200329042A1
公开(公告)日:2020-10-15
申请号:US16915356
申请日:2020-06-29
Applicant: BANK OF AMERICA CORPORATION
Inventor: Dharmender Kumar Satija , Eren Kursun , Andrew DongHo Kim , Scott Anderson Sims , Craig D. Widmann
IPC: H04L29/06
Abstract: A system and methods for alternate user communication routing are described. Unauthorized users are identified and alternate treatments are provided in order to deter unauthorized access and create opportunities for data collection. The use of a varied set of alternate treatments provides an enhanced view of unauthorized user behavior and an increased ability to track future unauthorized user actions by recording various user identity/communication characteristics specific to known unauthorized users. Alternate treatments may be provided randomly based on a set of alternate treatments previously provided to a specific user, or may be varied based on an identified group of unauthorized users presumed to be acting in concert.
-
-
-
-
-
-
-
-
-