Bank of America Corporation

United States of America

Back to Profile

1-100 of 7,357 for Bank of America Corporation Sort by
Query
Excluding Subsidiaries
Aggregations Reset Report
IP Type
        Patent 6,850
        Trademark 507
Jurisdiction
        United States 6,900
        World 336
        Canada 73
        Europe 48
Date
New (last 4 weeks) 93
2025 April (MTD) 70
2025 March 87
2025 February 66
2025 January 102
See more
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 967
H04L 9/40 - Network security protocols 656
G06N 20/00 - Machine learning 608
G06Q 40/00 - FinanceInsuranceTax strategiesProcessing of corporate or income taxes 577
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists 525
See more
NICE Class
36 - Financial, insurance and real estate services 423
09 - Scientific and electric apparatus and instruments 83
42 - Scientific, technological and industrial services, research and design 71
35 - Advertising and business services 58
41 - Education, entertainment, sporting and cultural services 40
See more
Status
Pending 1,197
Registered / In Force 6,160
  1     2     3     ...     74        Next Page

1.

SYSTEM FOR ENABLING MODIFICATION OF DATA AND ENDORSEMENTS OF SMART CONTRACTS WITHIN A DISTRIBUTED TRUST COMPUTING NETWORK

      
Application Number 18381740
Status Pending
Filing Date 2023-10-19
First Publication Date 2025-04-24
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Deshpande, Nimish Ravindra
  • Indrakanti, Bharat
  • Ravi, Gautam

Abstract

Enabling modifications to smart contracts within a distributed trust computing network platform. Enablement of smart contract modifications is made possible by generating a smart contract and an associated hash value and storing such in an intermediate data block held within a staging area. The intermediate data block is held in the staging area until (i) all the parties accept the smart contract and (ii) the conditions are met and the smart contract self-executes. As long as the intermediate data block remains in the staging area, the data stored therein is subject to modification. Once the parties to the smart contract accept the smart contract (and/or modifications to the smart contact) and the conditions are met, such that the smart contact self-executes, the intermediate data block is synthesized/transformed into an immutable data block which is stored within a distributed ledger of the corresponding distributed trust computing network.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

2.

SYSTEM AND METHOD FOR GENERATING ALTERNATIVE INFORMATION FORMATS USING ADVANCED COMPUTATIONAL MODELS FOR DATA ANALYSIS AND AUTOMATED PROCESSING

      
Application Number 18383275
Status Pending
Filing Date 2023-10-24
First Publication Date 2025-04-24
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Kieffer, Malinda
  • Wilson, Tanya A.
  • Moss, Susan J.
  • Grabski, Andrzej
  • Boosetty, Kiran
  • Phillips, Donna Lee
  • Gay, Gerard P.
  • Rosseland, Jr., Robert Ronald
  • Sodhi, Ravinder Kaur
  • Mishra, Rahul Kumar
  • Moiyallah, Jr., Samuel M.

Abstract

Systems, computer program products, and methods are described herein for generating alternative information formats using advanced computational models for data analysis and automated processing. The present disclosure is configured to receive a message, wherein the message comprises one or more content components; transmit the message to an alternative information module, wherein the alternative information module comprises an alternative information database and an artificial intelligence module; determine, using the artificial intelligence module, an alternative information format, wherein the alternative information format is based on the message, and wherein the alternative information format comprises a natural language that uses the visual-manual modality to convey meaning; transmit the message to a sequencing module, wherein the sequencing module integrates the alternative information format into appropriate segments of the message; and create an overlayed communication, wherein the overlayed communication comprises the message and the alternative information format.

IPC Classes  ?

  • H04L 51/066 - Format adaptation, e.g. format conversion or compression
  • H04L 51/10 - Multimedia information

3.

SYSTEM FOR REDUCING WORK DUPLICATION IN PARALLEL AND CONCURRENT SOFTWARE DEVELOPMENT ENVIRONMENTS

      
Application Number 18381246
Status Pending
Filing Date 2023-10-18
First Publication Date 2025-04-24
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Gaddam, Jyothi
  • Ghosh, Shantonu
  • Randhi, Venugopala Rao
  • Kavali, Rama Venkata S.

Abstract

Embodiments of the invention provide a comprehensive system for monitoring, evaluating, and managing code changes in a software development environment. The system comprises a Code Monitoring Subsystem (CMS) that continuously scans servers to identify active jobs and issues alerts based on various conditions. A Code Resolution Subsystem (CRS) aids developers in resolving issues and may include a machine learning (ML) subsystem for suggesting code options. The system also features a Parallel Code Monitoring Subsystem (PCMS) that generates atomic versions of code changes for real-time collaboration among developers. Containers corresponding to code changes are created and subjected to specific tests, with quality assessed through smart contracts. A composite value, serving as a metric for assessing a container's susceptibility to errors, is determined for each container. The system enhances code quality, reduces duplication, and facilitates efficient development.

IPC Classes  ?

4.

SYSTEM FOR STEGANALYSIS DETECTION OF METADATA IN A VIDEO STREAM FOR PROVIDING REAL-TIME DATA

      
Application Number 18382129
Status Pending
Filing Date 2023-10-20
First Publication Date 2025-04-24
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Deshpande, Nimish Ravindra
  • Chopra, Jatin
  • Gaur, Nitin
  • Miranda, Roshan
  • Singh, Balwant

Abstract

Systems, computer program products, and methods are described herein for steganalysis detection of metadata in a video stream for providing real-time data. An encrypted steganalysis marker is positioned within a boarder of a video stream and, upon user device scanning and identification provides a communication channel for real-time data display on the user device. The data displayed on the user device is transmitted via narrowband internet-of-things communication linkage displaying product or service data associated with the video stream. Using a combination of NB-IoT and computational memory computing creates a unique, in user device computing structure with various variable inputs to provide specified data and recommendations to the user.

IPC Classes  ?

  • H04N 21/2389 - Multiplex stream processing, e.g. multiplex stream encrypting
  • H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
  • H04N 21/8358 - Generation of protective data, e.g. certificates involving watermark

5.

SYSTEM AND METHOD FOR DETERMINING AND PREVENTING MALFEASANT ACTIVITY IN A PRIVATE DISTRIBUTED NETWORK

      
Application Number 18381839
Status Pending
Filing Date 2023-10-19
First Publication Date 2025-04-24
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Albero, George Anthony
  • Mukherjee, Maharaj
  • Thakur, Prashant

Abstract

Systems, computer program products, and methods for determining and preventing malfeasant activity in a private distributed network. The method includes generating one or more executed data transfer records for each of one or more executed data transfers across a distributed network. Each of the one or more executed data transfer records includes one or more data transfer information fields. The method also includes generating one or more decoy executed data transfer records. The decoy executed data transfer record(s) includes the data transfer information field(s). The method further includes providing a portal that contains each of the records associated with the distributed network. The method still further includes detecting a record access for one or more of the decoy executed data transfer records by an end-point device associated with a user. The method also includes causing an escalation action to be executed based on the detection of the record access.

IPC Classes  ?

6.

SYSTEM AND METHOD FOR GENERATING ON-DEMAND SINGLE-USE BIOMETRIC AUTHENTICATION CREDENTIALS

      
Application Number 18382879
Status Pending
Filing Date 2023-10-23
First Publication Date 2025-04-24
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Nyamwange, Elvis
  • Vezzu, Sailesh
  • Ali, Amer
  • Phadnis, Rahul Shashidhar
  • Yaksh, Rahul
  • Vuppala, Hari
  • Dande, Pratap
  • Jacobson, Brian Neal
  • Dahl, Erik

Abstract

Embodiments of the present invention provide a system for generating on-demand single-use biometric authentication credentials. The system is configured for determining initiation of an authentication request to access a resource from a user device of a user, prompting the user to select a type of authentication credential from one or more types of authentication credentials, receiving a selection of the type of the authentication credential, instantaneously generating a single-use unique authentication credential associated with the type of the authentication credential, via one or more machine learning models, and transmitting the single-use unique authentication credential to the user device for use in authentication of the user in gaining accessing to the resource.

IPC Classes  ?

  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • G06N 20/00 - Machine learning

7.

Account Virtualization System

      
Application Number 18382821
Status Pending
Filing Date 2023-10-23
First Publication Date 2025-04-24
Owner Bank of America Corporation (USA)
Inventor Iley, Dean

Abstract

Various aspects of the disclosure relate to creation and management of virtualized accounts. A virtualized account framework implemented on a computing platform provides an interface for real-time user configuration and account creation, deletion, and management actions. A core account may be linked to an existing account managed by an account management system or may be newly created. Each core account may be associated with a data structure defining one or more virtual accounts associated with the core account. Balance allocation from the core account to each of the virtual accounts, distribution limitations, balance limits from the core account to each of the virtual accounts may be defined by rules linked to the data structure. Virtual accounts, and in some cases, core accounts, may be redefined in real time, where account management upon reassignment is associated with a different account management system.

IPC Classes  ?

  • G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
  • G06Q 20/08 - Payment architectures

8.

DYNAMIC METAVERSE ACCOMMODATIONS

      
Application Number 18381680
Status Pending
Filing Date 2023-10-19
First Publication Date 2025-04-24
Owner Bank of America Corporation (USA)
Inventor
  • Uniyal, Rahul
  • Dhingra, Mohit
  • Vemula, Srikanth

Abstract

Systems, methods, and apparatus are provided for generating dynamic metaverse accommodations using artificial intelligence. A user device may initiate a metaverse session. Deep learning networks may derive a user profile based on data from the user device and generate a set of samples from the user profile. The generated samples may include user characteristics and avatar features associated with the user characteristics. The generated samples may be used to train a multitask machine learning model. Deep learning networks may generate a metaverse accommodation targeted to the user profile. The accommodation may be rendered in the metaverse environment. The accommodation may be transmitted to an actuator at the user device. The accommodation may be stored in association with user characteristics in a distributed ledger.

IPC Classes  ?

  • G06T 17/00 - 3D modelling for computer graphics
  • G06T 7/70 - Determining position or orientation of objects or cameras
  • G06V 10/44 - Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersectionsConnectivity analysis, e.g. of connected components

9.

MEMORABLE SECURE, AND STRONG PASSWORD GENERATOR ENHANCED WITH GAMIFICATION AND MACHINE LEARNING

      
Application Number 18382620
Status Pending
Filing Date 2023-10-23
First Publication Date 2025-04-24
Owner Bank of America Corporation (USA)
Inventor
  • Kirby, Harry
  • Kocharyan, Olga
  • Levandowski, Robert A.
  • Landy, Marci
  • Jeffreys, Julius D.
  • Pedretti, Anthony D.

Abstract

Systems and methods for automating the generation of a strong, secure, and memorable password using gamification. Systems may include a computer configured to receive words and phrases from a user using a gamification tool, use a machine learning model to eliminate words and phrases found when searching open-source intelligence (OSINT) available about the user, use the machine learning model to identify portions of the non-eliminated units of information, and use the machine learning model to combine the portions into memorable password options. Systems may include the computer configure to use the machine learning model to eliminate any of the password options found when searching OSINT, present a subset of the non-eliminated password options to the user, receive the selected password from the user, use the machine learning model to generate an obfuscated reminder for the selected password, and provide the obfuscated reminder to the user.

IPC Classes  ?

  • G06F 21/46 - Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

10.

ASSEMBLING AND DEPLOYING COMPUTING TASKS LEVERAGING SWARM INTELLIGENCE

      
Application Number 18379209
Status Pending
Filing Date 2023-10-12
First Publication Date 2025-04-17
Owner Bank of America Corporation (USA)
Inventor
  • Singh, Shailendra
  • Gupta, Saurabh

Abstract

Apparatus and methods for assembling and deploying computing tasks using swarm intelligence are provided. A swarm intelligence network program may be installed on multiple automated teller machines (“ATMs”) within a geographical area. When one of the ATMs loses connectivity with its financial institution, the ATM may create an ad-hoc swarm intelligence-based network with the other ATMs. The ad-hoc network may include a distributed ledger. The ATM may determine that a customer request for a financial transaction is valid and complete the request and record the transaction on the distributed ledger. The ATM may use hardware and software resources from the other ATMs on the ad-hoc network.

IPC Classes  ?

  • G07F 19/00 - Complete banking systemsCoded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
  • G06Q 20/38 - Payment protocolsDetails thereof
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists

11.

SECURE AUTHENTICATION AND INTEROPERABILITY MODEL FOR MACHINE TO MACHINE ("M2M") COMMUNICATION

      
Application Number 18380271
Status Pending
Filing Date 2023-10-16
First Publication Date 2025-04-17
Owner Bank of America Corporation (USA)
Inventor
  • Selvaraj, Srinivasan
  • Raj, Ananda

Abstract

A network of nodes supporting machine to machine (“M2M”) communication within the network is provided. Each of a plurality of nodes within the networks may be in an inactive communication state prior to authentication. The authentication may be performed by a remote central node (“RCN”). The RCN may be configured to control authentication and communication between nodes in the network. The RCN may perform one, two or more methods of authentication to securely authenticate each node. Following authentication, the RCN may generate network protocol for data payloads transmitted within the network. The RCN may further be configured to store data transmitted between nodes and maintain or delete the data based on a level of privacy that may be tagged to the stored data.

IPC Classes  ?

12.

Pre-Authentication for Interactive Voice Response System

      
Application Number 18380322
Status Pending
Filing Date 2023-10-16
First Publication Date 2025-04-17
Owner Bank of America Corporation (USA)
Inventor
  • Verma, Sandeep
  • Rathaur, Nandini
  • Chayanam, Pavan K.
  • Dundigalla, Srinivas

Abstract

Arrangements for pre-authenticating users to interactive voice response (IVR) systems are provided. In some examples, a computing device may receive and store a valid telephone number associated with an enterprise organization IVR system and an enterprise organization application programming interface (API) access key. A request to initiate a communication session with the IVR system may be received and the request may include a telephone number. If the telephone number matches the valid telephone number, an API call to the enterprise organization may be made and a one-time passcode (OTP) may be received. The telephone number may be appended to include the OTP as a suffix and the communication session with the IVR system may be initiated. The IVR system may extract the OTP and validate the OTP. If the OTP is validated, the communication session may be initiated as a pre-authenticated call.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04M 3/51 - Centralised call answering arrangements requiring operator intervention

13.

REAL-TIME MAINFRAME NETWORK MANAGEMENT

      
Application Number 18380593
Status Pending
Filing Date 2023-10-16
First Publication Date 2025-04-17
Owner Bank of America Corporation (USA)
Inventor Mays, Kenneth

Abstract

Methods, apparatus, and systems for active and passive monitoring of a mainframe network are provided. The methods may include monitoring, using a mainframe management system, one or more individual applications executing on the mainframe network. The methods may include receiving, at the mainframe management system, a set of search parameters. The methods may include inputting the set of search parameters into a search function within the mainframe management system. The methods may include executing a search corresponding to the set of search parameters. The methods may include identifying a data entry list. The data entry list may include data lines that correspond, over a threshold value of similarity, to the set of search parameters. The methods may include outputting, in real-time, the data entry list. The method may include displaying the data entry list on a display operating in tandem with the mainframe management system.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

14.

MEMORABLE AND STRONG PASSWORD GENERATOR AUTOMATED WITH A MACHINE LEARNING MODEL

      
Application Number 18380692
Status Pending
Filing Date 2023-10-17
First Publication Date 2025-04-17
Owner Bank of America Corporation (USA)
Inventor
  • Kirby, Harry
  • Kocharyan, Olga
  • Levandowski, Robert A.
  • Landy, Marci
  • Jeffreys, Julius D.
  • Pedretti, Anthony D.

Abstract

Systems and methods for automating generation of a strong and memorable password. Systems may include a computer configured to receive units of information from the user, use a machine learning model to eliminate units of information found when searching open-source intelligence (OSINT) available about the user, use the machine learning model to identify portions of the non-eliminated units of information, and use the machine learning model to combine the portions into memorable password options. Systems may include the computer configure to use the machine learning model to eliminate any of the password options found when searching OSINT, present a subset of the non-eliminated password options to the user, receive the selected password from the user, use the machine learning model to generate an obfuscated reminder for the selected password, and provide the obfuscated reminder to the user.

IPC Classes  ?

  • G06F 21/46 - Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
  • G06N 20/20 - Ensemble learning

15.

Real Time Channel Affinity Derivation

      
Application Number 18380773
Status Pending
Filing Date 2023-10-17
First Publication Date 2025-04-17
Owner Bank of America Corporation (USA)
Inventor
  • Mahajan, Nipun
  • Mishra, Amit
  • Raghuvanshi, Yogesh
  • Shelke, Sushama
  • Chughtai, Ayela

Abstract

Systems and methods are disclosed for real time, frictionless channel switching to map and transpose a transaction on a preferred channel from an incoming channel. The systems and methods may use a machine learning model that processes features from a plurality of channels to determine the preferred channel. An omni channel processor is used to determine intended functionality data of the transaction for the preferred channel. The systems and methods may generate transposed intent data based on the intended functionality data of the transaction for the preferred channel. A deep link is generated and embedded with the transposed intent data and a channel access token for the transaction on the preferred channel. The deep link is configured to access and complete the requested transaction on the preferred channel.

IPC Classes  ?

  • G06Q 30/015 - Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk

16.

Real Time Channel Affinity Derivation

      
Application Number 18380780
Status Pending
Filing Date 2023-10-17
First Publication Date 2025-04-17
Owner Bank of America Corporation (USA)
Inventor
  • Mahajan, Nipun
  • Mishra, Amit
  • Raghuvanshi, Yogesh
  • Shelke, Sushama
  • Chughtai, Ayela

Abstract

Systems and methods are disclosed for real time, frictionless channel switching to map and transpose a transaction on a preferred channel from an incoming channel. The systems and methods may use a machine learning model that processes features from a plurality of channels to determine the preferred channel. An omni channel processor is used to determine intended functionality data of the transaction for the preferred channel. The systems and methods may generate transposed intent data based on the intended functionality data of the transaction for the preferred channel. A deep link is generated and embedded with the transposed intent data and a channel access token for the transaction on the preferred channel. The deep link is configured to access and complete the requested transaction on the preferred channel.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

17.

Real Time Channel Affinity Derivation

      
Application Number 18380791
Status Pending
Filing Date 2023-10-17
First Publication Date 2025-04-17
Owner Bank of America Corporation (USA)
Inventor
  • Mahajan, Nipun
  • Mishra, Amit
  • Raghuvanshi, Yogesh
  • Shelke, Sushama
  • Chughtai, Ayela

Abstract

Systems and methods are disclosed for real time, frictionless channel switching to map and transpose a transaction on a preferred channel from an incoming channel. The systems and methods may use a machine learning model that processes features from a plurality of channels to determine the preferred channel. An omni channel processor is used to determine intended functionality data of the transaction for the preferred channel. The systems and methods may generate transposed intent data based on the intended functionality data of the transaction for the preferred channel. A deep link is generated and embedded with the transposed intent data and a channel access token for the transaction on the preferred channel. The deep link is configured to access and complete the requested transaction on the preferred channel.

IPC Classes  ?

  • G06Q 30/015 - Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk

18.

Command and Control Steganographic Communications Detection Engine

      
Application Number 18986933
Status Pending
Filing Date 2024-12-19
First Publication Date 2025-04-17
Owner Bank of America Corporation (USA)
Inventor
  • Sinks, Steven E.
  • Sheedy, Jonathan

Abstract

A network security computing system includes a steganographic communications analysis engine monitoring incoming and outgoing messages on a secure computing network. The steganographic communications analysis engine identifies a pattern of file transfers between a first computing device on the secure computing network and an internal or external message recipient. When a pattern is identified, the steganographic communications analysis engine quarantines an associated computing device from the secure network. The steganographic communications analysis engine analyzes files transferred between the computing device and the recipient for indications of steganographic information and causes display, based on an identified indication of steganography, an indication that the computing device had been compromised by command and control malware.

IPC Classes  ?

19.

ENHANCED SECURE AUTHENTICATION TECHNIQUES USING QUANTUM KEY DISTRIBUTION PROTOCOL

      
Application Number 18487358
Status Pending
Filing Date 2023-10-16
First Publication Date 2025-04-17
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Akhter, Mohammad Shahnawaz
  • Banda, Ramakrishna
  • Maddela, Usha Kiran

Abstract

Embodiments of the present invention provide a system for securely authenticating users using quantum key distribution protocol. The system is configured for receiving an authentication request comprising at least one credential from a user, via a user device, calculating an authentication match score for the at least one credential, retrieving an authentication token associated with the user stored on an external physical device connected to the user device, retrieving an enrollment match score associated with the authentication token of the user, validating the at least one credential by comparing the authentication match score of the at least one credential with the enrollment match score associated with the user, determining that the validation is not successful, and performing a quantum key distribution secret verification based on an enrollment common base stored on a quantum computing platform during the enrollment phase via a quantum communication network.

IPC Classes  ?

20.

SYSTEM AND METHOD FOR A DECENTRALIZED MACHINE LEARNING SOURCE CODE GENERATION FRAMEWORK VIA A HOLOCHAIN NETWORK

      
Application Number 18378797
Status Pending
Filing Date 2023-10-11
First Publication Date 2025-04-17
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Singh, Shailendra
  • Dholakiya, Ankit
  • Francis, Arup

Abstract

Systems, computer program products, and methods are described herein for a decentralized machine learning source code generation framework via a holochain network. The present invention is configured to receive a predetermined code criteria, receive a new code segment from an editor on an endpoint device, retrieve characteristics of the new code segment, determine, using a trained machine learning model, at least one subsequent code segment, based on at least the characteristics of the new code segment, determine, using an evaluation engine, at least one score of the subsequent code segment, wherein the at least one score is associated with the predetermined code criteria, and transmit to the editor of the endpoint device for displaying a predetermined number of the at least one subsequent code segments above a predetermined threshold of the at least one score.

IPC Classes  ?

21.

Intelligence Systems for Quantum-Infused Grading and Optimization Methods for Software Programs

      
Application Number 18379311
Status Pending
Filing Date 2023-10-12
First Publication Date 2025-04-17
Owner Bank of America Corporation (USA)
Inventor
  • Jaiswal, Gunjan
  • Gaddam, Jyothi
  • Kunchanapalli, Susmitha
  • Kutthumolu, Durga Prasad

Abstract

An automated solution is provided through quantum computing, AI/ML algorithms, neural networking, and hybrid computing integration in order to provide end-to-end optimization software programs. The system may be implemented by generating unique grade(s) for software program(s) against disparate behavior using quantum computing. Quantum entanglement and superposition will ensure fast calculation and analysis of every code snippet. The grade can be further utilized by classical computing engines, which can operate in layers to generate an intelligent report highlighting granular deviation and select an optimized version of program through decision making algorithms, which can then be integrated to original version after passing validity/compatibility checks and automatically employed.

IPC Classes  ?

  • G06N 10/60 - Quantum algorithms, e.g. based on quantum optimisation, or quantum Fourier or Hadamard transforms
  • G06N 10/20 - Models of quantum computing, e.g. quantum circuits or universal quantum computers

22.

Pre-Authentication for Interactive Voice Response System

      
Application Number 18380314
Status Pending
Filing Date 2023-10-16
First Publication Date 2025-04-17
Owner Bank of America Corporation (USA)
Inventor
  • Verma, Sandeep
  • Rathaur, Nandini
  • Chayanam, Pavan K.
  • Dundigalla, Srinivas

Abstract

Arrangements for pre-authenticating users to interactive voice response (IVR) systems are provided. In some examples, a user may initiate, via an application executing on a mobile device of the user, a telephone call to an IVR system. A computing platform may intercept the call and may generate a one-time passcode (OTP). The OTP may be appended to the telephone number as a suffix and the telephone call may be initiated with the IVR system using the telephone number and appended suffix. The IVR system may extract the OTP and may validate the OTP. If the OTP is validated, the call may be initiated as a pre-authenticated call in which the IVR system might not request authentication data from the user. If the OTP is not validated, the call may be initiated as a standard call in which the IVR system may request authentication data from the user.

IPC Classes  ?

  • H04M 3/51 - Centralised call answering arrangements requiring operator intervention
  • H04M 3/42 - Systems providing special services or facilities to subscribers
  • H04M 3/436 - Arrangements for screening incoming calls
  • H04M 3/523 - Centralised call answering arrangements requiring operator intervention with call distribution or queuing

23.

SYSTEMS AND METHODS FOR DATA TRACE AND SEQUENCE DETERMINATIONS IN DISTRIBUTED NETWORKS

      
Application Number 18380563
Status Pending
Filing Date 2023-10-16
First Publication Date 2025-04-17
Owner BANK OF AMERICA CORPORATION (USA)
Inventor Kumar, Narayana Sanjay

Abstract

Systems, methods, and computer program products are provided herein for data trace and sequence determinations in distributed networks. An example method includes receiving a request for an interaction determination and determining a plurality of distributed service systems associated with the interaction. The plurality of distributed service systems include a sequence defining an order by which operations associated with the interaction are performed by respective distributed service systems and each of the distributed service systems includes trace agents that generate service system specific data trace objects. The method further includes capturing the one or more service system specific data trace objects for each of the distributed service systems and generating an interaction object based on the service system specific data trace objects for each of the distributed service systems associated with the interaction.

IPC Classes  ?

  • H04L 43/10 - Active monitoring, e.g. heartbeat, ping or trace-route

24.

Intelligent file and filegroup reorganizer for backup and restore in multi environments

      
Application Number 18383923
Grant Number 12277039
Status In Force
Filing Date 2023-10-26
First Publication Date 2025-04-15
Grant Date 2025-04-15
Owner Bank of America Corporation (USA)
Inventor
  • Trivedi, Praveen Kumar
  • Mohanty, Anshuman
  • Randhi, Venugopala Rao
  • Kavali, Rama Venkata

Abstract

Methods and systems are provided for restoring a source database to a target environment. The methods and systems may include calculating an amount of data on each drive of the source database. The methods and systems may include calculating free space of each drive of the target environment. The methods and systems may include shrinking filegroups in the drives of the source database. The methods and systems may include fetching historical transactional queries run on tables in the filegroups. The methods and systems may include identifying interdependencies between tables using the queries. The methods and systems may include ingesting, by an AI engine, the calculations, the queries, the identified interdependent tables, historical information of table movement and a business use case. The methods and systems may include the AI engine determining how to restore the source database using the ingested information.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 16/22 - IndexingData structures thereforStorage structures

25.

SYSTEM AND METHOD FOR DETERMINING OPTIMAL RESOURCE TRANSFER ROUTING USING QUANTUM GATEWAY OPTIMIZATION

      
Application Number 18376533
Status Pending
Filing Date 2023-10-04
First Publication Date 2025-04-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Krishnan, Subburathinam
  • Mishra, Amit
  • Singh, Shailendra
  • Viswanathan, Krithika

Abstract

Systems, computer program products, and methods are described herein for determining optimal resource transfer routing using quantum gateway optimization. The present disclosure is configured to receive a resource transfer request associated with transferring a resource from a submitting device to a receiving device, wherein the resource transfer request comprises resource transfer instructions and resource transfer metadata; determine, in response to the resource transfer request, an optimized gateway route, wherein the optimized gateway route defines a series of gateways that the resource to be transferred may be processed, and wherein determining the optimized gateway route comprises analyzing the resource transfer instructions, resource transfer metadata, and one or more gateway route characteristics; and complete the resource transfer request, wherein completing the resource transfer request, wherein completing the resource transfer request comprises transferring the resource from the submitting device to the receiving device via the optimized gateway route.

IPC Classes  ?

  • G06N 10/70 - Quantum error correction, detection or prevention, e.g. surface codes or magic state distillation
  • G06N 10/20 - Models of quantum computing, e.g. quantum circuits or universal quantum computers

26.

OWNER-MANAGED PASSWORD BASED FILE ACCESS

      
Application Number 18376789
Status Pending
Filing Date 2023-10-04
First Publication Date 2025-04-10
Owner Bank of America Corporation (USA)
Inventor
  • Taylor, Jo-Ann
  • Hollenberg, Anna
  • Rustman, Randy
  • Harris, Mark E.
  • Daniel, Thomas
  • Petrovskis, Dayna

Abstract

Methods and systems are provided for managing access to a file. The methods and systems may include locking access to the file using a password accessible security setting. The methods and systems may include designating a password as an unlock password. The methods and systems may include communicating the password to a first group of users. The methods and systems may include providing a prompt to input the unlock password upon a request to access the file. The methods and systems may include providing access to the file in response to inputting the unlock password. The methods and systems may include authenticating each unauthenticated user that inputs the unlock password. The methods and systems may include deactivating the password as the unlock password. The methods and systems may include removing authentication from a user in response to the user meeting a predetermined condition.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • G06F 21/33 - User authentication using certificates

27.

Authorship Source Analysis for Large Language Models (LLM) Using a Distributed Ledger

      
Application Number 18376906
Status Pending
Filing Date 2023-10-05
First Publication Date 2025-04-10
Owner Bank of America Corporation (USA)
Inventor Mukherjee, Maharaj

Abstract

A computing platform may train an LLM by performing a plurality of clustering iterations. The computing platform may record, using a distributed ledger and for each of the plurality of clustering iterations, information of the corresponding clustering iteration. The computing platform may test the LLM, which may reveal at least one error in the LLM. The computing platform may identify, using the distributed ledger, a clustering iteration corresponding to the at least one error and information associated with the clustering iteration. The computing platform may identify, based on the clustering iteration corresponding to the at least one error and the information associated with the clustering iteration, a remediating action. The computing platform may update the LLM by performing the remediating action. The computing platform may retest the LLM. Based on identifying that an accuracy of the LLM meets or exceeds an accuracy threshold, the computing platform may deploy the LLM.

IPC Classes  ?

  • G06F 40/20 - Natural language analysis
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

28.

USING STRUCTURED INFORMATION FOR IMPROVED TRAINING OF GENERATIVE ARTIFICIAL INTELLIGENCE (AI) MODELS

      
Application Number 18377350
Status Pending
Filing Date 2023-10-06
First Publication Date 2025-04-10
Owner Bank of America Corporation (USA)
Inventor Mukherjee, Maharaj

Abstract

A computing platform may obtain, from an information storage source, historical information, which may be structured rather than unstructured. The computing platform may train, using the historical information, a foundational artificial intelligence (AI) model. The computing platform may select one or more features of the foundational AI model for use in training a generative AI model. The computing platform may identify a portion of the historical information corresponding to the selected one or more features. The computing platform may normalize the portion of the historical information. The computing platform may train, using the normalized portion of the historical information, the generative AI model. The computing platform may receive, from a user device, a generative AI prompt. The computing platform may generate, by inputting the generative AI prompt into the generative AI model, a generative AI response. The computing platform may send, to the user device, the generative AI response.

IPC Classes  ?

29.

MULTICLOUD TEST AUTOMATION FRAMEWORK

      
Application Number 18377849
Status Pending
Filing Date 2023-10-09
First Publication Date 2025-04-10
Owner Bank of America Corporation (USA)
Inventor
  • Thomas, Roshin Jacob
  • Louis, Thresiamma
  • Miller, Tonya Kyra

Abstract

Systems, methods, and apparatus are provided for a secure multicloud test automation framework. The automation framework may receive a natural language request for a cloud-based test scenario at a user interface on an enterprise network. The test scenario may include a cloud resource and a cloud platform. Machine learning may map keywords extracted from the test scenario to a set of test cases associated with the cloud resource. Keyword mapping may also identify a configuration file associated with the cloud platform. The automation framework may retrieve shell scripts specified by the set of test cases from a shell script repository. The automation framework may use data from the configuration file to access the cloud platform via a secure gateway and execute the shell scripts using data from the cloud platform. The automation framework may generate a comprehensive summary report and maintain technical logs for the test.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

30.

DATA RECONCILIATION ARCHITECTURE FOR IMPROVED FAULT TOLERANCE

      
Application Number 18377973
Status Pending
Filing Date 2023-10-09
First Publication Date 2025-04-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Agrawal, Arpan
  • Bansode, Sachin
  • Jain, Anshul
  • Sridharan, Dinesh Kumar Kanchi

Abstract

In conventional networked computing systems, stream-processing software is utilized to handle real-time data feeds. For example, a stream-processing software may sort incoming data feeds into data logs, which are then consumed by various application servers within the computing system. However, this consumption process is susceptible to failure as application servers often fail to consume a full payload of data comprising a particular message. As such, a need exists for a streaming architecture with improved fault tolerance. The system provided herein solves the problem via a reliable streaming process, which regularly generates partitions within a series of data lakes. As streaming data is received, the payloads are synced into the different data lakes based on metadata associated with the streaming data. The system can then perform individual quality checks on each partition of data, enabling the system to continuously monitor data quality over time.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

31.

SYSTEMS AND METHODS FOR MAINTAINING SECURITY OF VIRTUAL OBJECTS IN A DISTRIBUTED NETWORK

      
Application Number 18378049
Status Pending
Filing Date 2023-10-09
First Publication Date 2025-04-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Najumudeen, Syed
  • Karanath, Dalydas
  • Selvamani, Aravinth

Abstract

Systems, computer program products, and methods are described herein for maintaining security of virtual objects in a distributed network. Some embodiments are directed to a system including a first artificial intelligence engine configured to determine viewing angles of avatars moving along access paths in a virtual world and a second artificial intelligence engine configured to determine movements of the avatars moving along the access paths in the virtual world. The system may include a third artificial intelligence engine configured to generate visual content based on attributes of users associated with the avatars, the access paths, the viewing angles of the avatars moving along the access paths in the virtual world, and the movements of the avatars moving along the access paths in the virtual world.

IPC Classes  ?

  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G06T 13/40 - 3D [Three Dimensional] animation of characters, e.g. humans, animals or virtual beings
  • H04L 9/40 - Network security protocols

32.

SYSTEMS AND METHODS FOR MAINTAINING SECURITY OF VIRTUAL OBJECTS IN A DISTRIBUTED NETWORK

      
Application Number 18378062
Status Pending
Filing Date 2023-10-09
First Publication Date 2025-04-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Najumudeen, Syed
  • Karanath, Dalydas
  • Selvamani, Aravinth

Abstract

Systems, computer program products, and methods are described herein for maintaining security of virtual objects in a distributed network. Some embodiments are directed to a system including a first artificial intelligence engine configured to determine motives of users associated with avatars in a virtual world and a second artificial intelligence engine configured to determine access paths of the avatars in the virtual world. The system may include a third artificial intelligence engine configured to generate visual content based on attributes of the users, the motives of the users, and the access paths of the avatars. The system may be configured to detect diversions from access paths, determine updated motives of users, determine whether the diversions are permissible, and restrict movement of the avatar within the virtual world.

IPC Classes  ?

33.

USING STRUCTURED INFORMATION FOR IMPROVED TRAINING OF GENERATIVE ARTIFICIAL INTELLIGENCE (AI) MODELS

      
Application Number 18378286
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-04-10
Owner Bank of America Corporation (USA)
Inventor Mukherjee, Maharaj

Abstract

A computing platform may obtain, from an information storage source, historical information, including both structured information and unstructured information. The computing platform may train, using the historical information, a foundational AI model. The computing platform may select features of the foundational AI model for use in training a plurality of generative AI models. The computing platform may identify a portion of the historical information corresponding to the selected features. The computing platform may normalize the portion of the historical information, and may train, using the normalized portions of the historical information, each generative AI model of the plurality of generative AI models. The computing platform may receive, from a user device, a generative AI prompt. The computing platform may generate, by inputting the generative AI prompt into one of the plurality of generative AI models, a generative AI response, and may send, to the user device, the generative AI response.

IPC Classes  ?

34.

Counterfeit Note Detection Via Machine Olfaction Chemical Analysis

      
Application Number 18378462
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-04-10
Owner Bank of America Corporation (USA)
Inventor
  • Mattison, Paul
  • Brown, Richard
  • Schnittman, Ronald
  • Parziale, Carl

Abstract

A method and system for detecting counterfeit money may include an automated teller machine (ATM) including an olfactory sensor configured to detect counterfeit notes and valid notes, an olfactory signature database comprising counterfeit note olfactory signatures and valid note olfactory signatures, wherein the ATM may be in communication with the olfactory signature database, and wherein the olfactory sensor via the ATM detects and transmits olfactory note signatures to the olfactory signature database, and wherein the ATM is configured to reject a detected counterfeit note for deposit.

IPC Classes  ?

  • G07D 7/14 - Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using chemical means
  • G07F 19/00 - Complete banking systemsCoded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines

35.

System and method for performing a secured operation

      
Application Number 18482356
Status Pending
Filing Date 2023-10-06
First Publication Date 2025-04-10
Owner Bank of America Corporation (USA)
Inventor
  • Behera, Abhijit
  • Suriyanarayanan, Gowri Sundar
  • Sethia, Maneesh Kumar

Abstract

A system for performing secured operations includes a user device and a server. The user device generates a first operation data that comprises the origin of the operation and a unique identifier of a user. The user device communicates the operation data to the server. The server generates, based on the first operation data, one or more first conditional rules that comprise a first rule that indicates the operation is to be executed when a second user requesting to receive a data item is identified. The server determines that one or more first conditional rules are met. In response, the server communicates a signal to the user device, where the signal indicates to transfer the data item to a second user device associated with the second user.

IPC Classes  ?

36.

System and method for implementing traceability to a data item

      
Application Number 18484145
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-04-10
Owner Bank of America Corporation (USA)
Inventor
  • Behera, Abhijit
  • Suriyanarayanan, Gowri Sundar
  • Sethia, Maneesh Kumar

Abstract

A system for implementing traceability to a data item comprises a user device and a gateway server. The user device appends headers to a data packet that includes the data item. The headers comprise parameters including origin information associated with the user device and a user. The gateway server receives the data packet and compares each parameter with a counterpart parameter from a list of expected parameters. The gateway server determines whether more than a threshold number of the parameters corresponds to counterpart parameters from among the list of expected parameters. In response to determining that more than the threshold number of the parameters correspond to counterpart parameters from among the list of expected parameters, the gateway server appends a second header to the data packet, where the second header indicates that the data packet is verified. The gateway server communicates a request message that includes the data packet.

IPC Classes  ?

37.

System and method for validating origin information of a data item

      
Application Number 18484196
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-04-10
Owner Bank of America Corporation (USA)
Inventor
  • Behera, Abhijit
  • Suriyanarayanan, Gowri Sundar
  • Sethia, Maneesh Kumar

Abstract

A system for validating the origin information of a data item accesses a data packet that indicates a request to transfer a data item. The data packet is appended with a first header and a second header. The first header comprises information about the sender of the data packet. The second header comprises information about a user device from which the data packet has originated. The system compares the information about the sender of the data packet with previously provided user information and determines that the user information corresponds to the information about the sender. The system communicates a request that indicates whether the information about the user device is valid and receives a message that indicates the information about the user device is valid. In response, the system communicates a message that comprises the data packet and instructions that, upon execution, cause the data packet to be transferred.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 45/00 - Routing or path finding of packets in data switching networks

38.

System and method for user authentication using a static authentication matrix

      
Application Number 18484376
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-04-10
Owner Bank of America Corporation (USA)
Inventor
  • Joshi, Ravi
  • Berry, Anna Kristen Pingel
  • Kocharyan, Olga Caroline
  • Sharief, Luqman Abdul Hakeem
  • Ambulkar, Shweta
  • Ianni, Angela F.
  • Whitaker, Michael William
  • Hardman, Benjamin Daniel

Abstract

A method includes receiving a hash of a static password and a hash of a lot-one authentication string from a user device of a user. After an initial validation, an authentication matrix is generated. A block selection process is performed to select spurious and authentication blocks from the authentication matrix. The authentication blocks are selected based on a lot-two authentication string associated with the lot-one authentication string. In response to determining that the spurious and authentication blocks are selected according to a block selection sequence stored in a user profile of the user, a dynamic password is generated by combining the static password, the lot-one authentication string, and the authentication blocks. A hash of the dynamic password is generated. In response to determining that the hash of the dynamic password matches a hash of a dynamic password that is stored in the user profile, the user is authenticated.

IPC Classes  ?

39.

System and method for user authentication using a spinning authentication matrix

      
Application Number 18484400
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-04-10
Owner Bank of America Corporation (USA)
Inventor
  • Joshi, Ravi
  • Berry, Anna Kristen Pingel
  • Kocharyan, Olga Caroline
  • Sharief, Luqman Abdul Hakeem
  • Ambulkar, Shweta
  • Ianni, Angela F.
  • Whitaker, Michael William
  • Hardman, Benjamin Daniel

Abstract

A method includes receiving hashes of a static password and a lot-one authentication string from a user device of a user. After an initial validation, a first authentication matrix (AM) is generated. A block selection process is performed to select spurious and authentication blocks. While performing the block selection process, the first AM is replaced by a second AM, such that a first authentication block is selected from the first AM based on a first lot-two authentication string and a second authentication block is selected from the second AM based on a second lot-two authentication string. A dynamic password is generated by combining the static password, the lot-one authentication string, and the authentication blocks. A hash of the dynamic password is generated. In response to determining that the hash of the dynamic password matches a hash of a dynamic password stored in a user profile, the user is authenticated.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs

40.

SYSTEMS AND METHODS FOR DETERMINING A COMPUTING SYSTEM’S CURRENT STATE BY IMPLEMENTING STATE MACHINES AND KNOWLEDGE GRAPHS IN AN ELECTRONIC ENVIRONMENT

      
Application Number 18376556
Status Pending
Filing Date 2023-10-04
First Publication Date 2025-04-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor Mukherjee, Maharaj

Abstract

Systems, computer program products, and methods are described herein for determining a computing system's current state by implementing state machines and knowledge graphs in an electronic environment. The present disclosure is configured to identify at least one knowledge graph comprising a plurality of clusters associated with at least one computing system, each cluster comprises a plurality of state machines associated with the at least one computing system; identify data associated with the computing system; apply the data associated with the computing system to at least one state machine; generate at least one output associated with the computing system; compare the at least one output with at least one pre-defined output; generate a confidence level for the at least one current state attribute; and determine a current state attribute for the computing system, wherein the current state attribute defines a current state of the computing system.

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 9/451 - Execution arrangements for user interfaces

41.

SYSTEMS AND METHODS FOR DETECTING ATTRITION IN A DISTRIBUTED NETWORK USING ARTIFICIAL INTELLIGENCE

      
Application Number 18376799
Status Pending
Filing Date 2023-10-04
First Publication Date 2025-04-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Oberle, Michael J.
  • Mcmillon, Ii, Robert M.
  • West, James Matthew

Abstract

Systems, computer program products, and methods are described herein for detecting attrition in a distributed network using artificial intelligence. Some embodiments are directed to a system including a first artificial intelligence engine configured to determine indicators of relationships between users and entities and a second artificial intelligence engine configured to determine statuses of relationships between the users and the entities. The system may determine, using the first artificial intelligence engine, and based on data associated with interactions between a user and an entity, a plurality of indicators of a relationship between the user and the entity. The system may determine, based on the plurality of indicators, based on the data associated with the interactions between the user and the entity, and using the second artificial intelligence engine, a status of the relationship between the user and the entity.

IPC Classes  ?

  • G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
  • G06Q 30/015 - Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk
  • G06Q 30/0202 - Market predictions or forecasting for commercial activities

42.

INTELLIGENT METHOD TO COMBINE MULTIPLE BLOCKCHAIN BASED SMART CONTRACTS LEVERAGING GENERATIVE ARTIFICIAL INTELLIGENCE

      
Application Number 18377596
Status Pending
Filing Date 2023-10-06
First Publication Date 2025-04-10
Owner Bank of America Corporation (USA)
Inventor Singh, Shailendra

Abstract

Aspects of the disclosure relate to using machine learning models to merge smart contracts. A computing system may receive a prompt to merge smart contracts. Based on inputting the prompt into a generative artificial intelligence model configured to parse prompts, smart contract data may be retrieved from a blockchain stored in a distributed ledger platform. Based on inputting the smart contract data into the generative artificial intelligence model, smart contract clusters may be generated. Based on at least one of the smart contract clusters meeting performance criteria, merged smart contracts that meet the performance criteria may be generated. Furthermore, one or more blocks comprising the merged smart contracts may be generated.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/38 - Payment protocolsDetails thereof

43.

SYSTEMS AND METHODS FOR MAINTAINING SECURITY OF VIRTUAL OBJECTS IN A DISTRIBUTED NETWORK

      
Application Number 18378040
Status Pending
Filing Date 2023-10-09
First Publication Date 2025-04-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Najumudeen, Syed
  • Karanath, Dalydas
  • Selvamani, Aravinth

Abstract

Systems, computer program products, and methods are described herein for maintaining security of virtual objects in a distributed network. Some embodiments are directed to a system including a first artificial intelligence engine configured to determine motives of users associated with avatars in a virtual world and a second artificial intelligence engine configured to determine access paths of the avatars in the virtual world. The system may include a third artificial intelligence engine configured to determine viewing angles of the avatars moving along the access paths in the virtual world and a fourth artificial intelligence engine configured to generate visual content based on attributes of the users, the motives of the users, the access paths of the avatars, and the viewing angles of the avatars moving along the access paths in the virtual world.

IPC Classes  ?

  • G06F 3/04815 - Interaction with a metaphor-based environment or interaction object displayed as three-dimensional, e.g. changing the user viewpoint with respect to the environment or object
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06T 13/40 - 3D [Three Dimensional] animation of characters, e.g. humans, animals or virtual beings

44.

BIOMETRIC DATA-BASED HOLOGRAPHIC AUTHENTICATION

      
Application Number 18378269
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-04-10
Owner Bank of America Corporation (USA)
Inventor
  • Albero, George Anthony
  • Davis, Karen Elizabeth
  • Kocharyan, Olga
  • Clark, Elijah

Abstract

Arrangements for biometric data-based holographic authentication are provided. In some examples, biometric data for a plurality of users may be received. A computing platform may receive a request to process an event. In response to receiving the request to process the event, the computing platform may retrieve biometric data of a requesting user and generate, based on the biometric data, a hologram of the biometric data of the user. In some examples, the hologram may be displayed on a device and provided to an authentication reader device as authentication data. The authentication reader device may capture an image of the hologram and the computing platform may receive the image. The computing platform may compare the captured image of the hologram to the generated hologram to determine whether there is a match. If not, the requested event may be denied. If so, the event may be processed.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G03H 1/00 - Holographic processes or apparatus using light, infrared, or ultraviolet waves for obtaining holograms or for obtaining an image from themDetails peculiar thereto
  • G06F 21/16 - Program or content traceability, e.g. by watermarking
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

45.

SYSTEM FOR AUTOMATED COMPUTER SOFTWARE RELEASE VALIDATION AND MANAGEMENT

      
Application Number 18378416
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-04-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Schrieber, Gary John
  • Mundle, Jennifer A.

Abstract

A system is provided for automated computer software release validation and management. In particular, the system may receive and aggregate data from various computing resources within the network environment, such as computing applications. Based on the data, the system may determine which resources may be affected by a software release that is set to be deployed to the production environment. The system may further receive user inputs in the form of artifacts associated with one or more checkpoints used in a validation process associated with the software release. The system may then, through a reporting engine, provide a visualization of the data and checkpoints through a dashboard to provide a real-time status of the validation process. In this way, the system provides an efficient and transparent way to validate and manage computer software releases.

IPC Classes  ?

  • G06F 8/70 - Software maintenance or management

46.

SYSTEM AND METHOD FOR MULTI-PLATFORM INTEROPERABILITY IN DIGITAL ENVIRONMENTS

      
Application Number 18378473
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-04-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Chakravarthi, Suryanarayan Parthasarathi
  • Chitty, Saisrikanth

Abstract

Systems, computer program products, and methods are described herein for multi-platform interoperability in digital environments. The present disclosure is configured to receive one or more platforms, wherein the one or more platforms comprise multi-platform virtual reality, augmented reality, and extended reality environments. In some embodiments, receiving includes transferring the platform to a platforms operational layer. In some embodiments, the system may receive a central features repository dashboard, wherein the central features repository dashboard comprises one or more features. In some embodiments, the system may create a generate, integrate, and tailor (GINT) module, wherein the GINT module comprises a feature tailor, a feature integrator, and a feature generator; and aggregate, within the platforms operational layer, the one or more platforms, the central features repository dashboard, and the GINT module.

IPC Classes  ?

47.

SYSTEM AND METHOD FOR SYNCHRONIZED MULTI-THREADED EXTRACTION OF HISTORICAL DATA IN WORKFLOW AUTOMATION PLATFORM ARCHITECTURES

      
Application Number 18378500
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-04-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Surpur, Raj
  • Gande, Kashinath
  • Jayasinghe, Lekshan
  • Tripathy, Sai Saran
  • Narne, Arun Chowdary
  • Kumar, Chandan

Abstract

Systems, computer program products, and methods are described herein for extraction of historical data in workflow automation platform architectures. The present disclosure is configured to introduce an advanced approach to historical data extraction from workflow automation platform architectures. At its core, it employs parallel processing, utilizing a multi-threaded asynchronous tool specifically designed within a workflow automation platform architecture framework. This ensures high performance and scalability, enabling easy extraction of large data volumes within designated system maintenance windows without impinging on system performance.

IPC Classes  ?

  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

48.

DE-CENTRALIZED AUTHENTICATION IN A NETWORK SYSTEM

      
Application Number 18982309
Status Pending
Filing Date 2024-12-16
First Publication Date 2025-04-10
Owner Bank of America Corporation (USA)
Inventor
  • Chayanam, Pavan K.
  • Mahajan, Navdeep

Abstract

User authentication and validation for performing transactions may be performed by a validation server of a service provider. For example, when a login request or purchase request is received, the request may be authenticated or validated before permitting the requested transaction. In some arrangements, the validation may be delegated to one or more devices or users external to the service provider. Multiple validation users may be consulted for each transaction request to determine a consensus validation decision. A consensus may be reached based on unanimous responses or based on a specified threshold level (e.g., more than 50% responding positively or negatively). The service provider may use this consensus determination to authorize or reject a transaction request.

IPC Classes  ?

49.

SYSTEMS, METHODS, AND APPARATUSES FOR IDENTIFYING UNAUTHORIZED USE OF A USER'S AUTHENTICATION CREDENTIALS TO AN ELECTRONIC NETWORK BASED ON NON-PUBLIC DATA ACCESS

      
Application Number 18987293
Status Pending
Filing Date 2024-12-19
First Publication Date 2025-04-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Landy, Marci Anne
  • Serna, Daniel Joseph
  • Pachorek, Tina Berumen
  • Thompson, Jessica Hope
  • Pindell, Jr., Joseph Henry
  • Mody, Mrunal

Abstract

Systems, computer program products, and methods are described herein for identifying unauthorized use of a user's authentication credentials to an electronic network based on non-public data access. The present invention is configured to receive a verified access attempt at a first time for a user account; receive an unverified access attempt at a second time for the user account; determine the unverified access attempt is a credential sharing event for the user account; receive unverified account access logs associated with the unverified access attempt, the unverified account access logs comprising access to non-public data; and generate an unverified data access interface component to configure a graphical user interface of a device associated with a manager of the system.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/60 - Protecting data

50.

SYSTEM FOR ELECTRONIC DATA ARTIFACT TESTING USING A HYBRID CENTRALIZED-DECENTRALIZED COMPUTING PLATFORM

      
Application Number 18987805
Status Pending
Filing Date 2024-12-19
First Publication Date 2025-04-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Sloane, Brandon
  • Nunez, Julio Cesar

Abstract

A system is provided for electronic data artifact testing using a hybrid centralized-decentralized computing platform. In particular, the system may comprise an artifact testing platform that may be accessed by users and computing devices within a network. Users may upload a data artifact to the artifact testing platform to be validated by the system. The system may then use a number of different validators (e.g., artificial intelligence-based modules) that may read the data artifact and/or the associated metadata and generate a confidence level based on the characteristics of the data artifact. The confidence levels from each validator may be aggregated to generate a final trust score for the data artifact. If the final trust score is below a first threshold, blocking the user computing device from opening the electronic file and if the final trust score is below a second threshold, performing network segmentation of the user computing device.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

51.

SESSION TRANSFER BETWEEN SMART GLASSES AND COMPUTER FOR MAINTAINING A CONFIDENTIAL DATA VIEW

      
Application Number 18374039
Status Pending
Filing Date 2023-09-28
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor Verma, Sandeep

Abstract

A method for session-sharing between an electronic interactive session hosted at a first device and a session hosted at a second device is provided. The second device includes a display arrangement to input confidential information to the second device absent visual trespass. The method also includes establishing communication between a common data storage device, the first device and the second device, transferring user session initiation information to the common data storage device and receiving a user command. The user command locks the first user session at the first device, sends an instruction to the first device to mask a display associated with the first user session, maintains the session initiation information entered at the first device in the database and creates a second user session. The second user session invokes the information from the first device in order to support a confidential data input session at the second device.

IPC Classes  ?

  • G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

52.

Steganography-Based Secure Document Access Control

      
Application Number 18375582
Status Pending
Filing Date 2023-10-02
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor
  • Albero, George Anthony
  • Mukherjee, Maharaj
  • Kocharyan, Olga
  • Magura, Heidi Leonard
  • Adams, Michael Antonio
  • Clark, Elijah
  • Sanil, Nikhil

Abstract

Arrangements for steganography-based security document access control are provided. In some examples, a security policy for a document may be generated. The security policy may include identification of one or more users authorized to access the document and one or more response actions to execute upon violation of the security policy. The generated security policy may be embedded in the document using steganography. Accordingly, transmission of the document may include transmission of the security policy with the document. The document may be transmitted to a destination node. A user at the destination node may request access to the document. In response to the request, the security policy embedded in the document may be executed to confirm whether the user is an authorized user. If the user is authorized, access to the document may be enabled. If the user is not authorized, the one or more response actions may be executed.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/60 - Protecting data
  • H04L 9/40 - Network security protocols

53.

SYSTEMS AND METHODS FOR DATA SECURITY MODEL MODIFICATION AND ANOMALY DETECTION

      
Application Number 18376130
Status Pending
Filing Date 2023-10-03
First Publication Date 2025-04-03
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Kling, John Howard
  • Dudley, Charles Edward
  • Yeung, Jason T.

Abstract

Systems, methods, and computer program products are provided herein for data security model modification and anomaly detection. An example method includes receiving a model input associated with one or more data entries of a data security model and accessing the data security model. The data security model includes a plurality of data objects including one or more data entries where each data object defines an associated model level indicative of the hierarchical position of the data object within the data security model and one or more links between the data objects that define data object interdependency parameters. The example method further includes determining one or more data objects of the data security model implicated by the model input and modifying one or more data entries of the one or more implicated data objects of the data security model in response to the model input.

IPC Classes  ?

54.

Artificial Intelligence (AI) Based Cloud Architecture Segmentation Leveraging Homomorphic Encryption

      
Application Number 18376138
Status Pending
Filing Date 2023-10-03
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor
  • Garg, Saurabh
  • Allugubelly, Bhagat
  • Sethia, Maneesh

Abstract

A computing platform may train, using smart contract and file type information, a homomorphic encryption model, which may configure the homomorphic encryption model to identify, for a given input file, a corresponding smart contract defining a corresponding set of parameters, included in the given input file, for display. The computing platform may receive an unencrypted file, and may identify, by inputting the unencrypted file into the homomorphic encryption model, a smart contract defining one or more parameters for display. The computing platform may encrypt, using homomorphic encryption, the unencrypted file to produce an encrypted file, and may store the encrypted file. The computing platform may receive, via an application programming interface (API) at a user device, a request to access the encrypted file. The computing platform may send, based on the smart contract and for display at the user device via the API, the parameters for display.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06F 21/60 - Protecting data

55.

SYSTEM FOR CLIENT ONBOARDING AND EXPOSURE DETECTION USING LARGE LANGUAGE MODELS FOR COMPUTATIONAL EFFICIENCY

      
Application Number 18376342
Status Pending
Filing Date 2023-10-03
First Publication Date 2025-04-03
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Adavi, Chandra S.
  • Oberle, Michael J.

Abstract

Systems, computer program products, and methods are described herein for client onboarding and exposure detection using large language models (LLMs) for computational efficiency. The present disclosure is configured to receive interaction data associated with a first user and a second user, wherein the interaction data is associated with an onboarding process for the second user; determine, using a behavioral analysis large language model (LLM) module, an interaction response pattern of the second user from the interaction data; determine interaction response times of the second user from the interaction data; compare the interaction response pattern and the interaction response times with past interactions known to be associated with misappropriate activity; determine a likelihood associated with whether the second user is associated with misappropriate activity based on at least the comparison; and execute a mitigation action in an instance in which the likelihood meets a misappropriate threshold.

IPC Classes  ?

  • G06F 40/47 - Machine-assisted translation, e.g. using translation memory
  • G06F 40/20 - Natural language analysis

56.

System and method to detect device tampering during transit using ambient sensors

      
Application Number 18477637
Status Pending
Filing Date 2023-09-29
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor Singh, Shailendra

Abstract

A system for detecting tampering of an item during transit from a source to a destination. The system includes a processor which receives a plurality of measurements of the environment surrounding the item during transit and detects at least one anomaly in the plurality of measurements. When the at least one anomaly is detected, it is compared with the expected measurement at the location and/or time and if the comparison shows a degree of difference that is greater than a predetermined threshold that indicates the item may have been tampered with during transit, the system and method performs an action to disable the item.

IPC Classes  ?

  • G08B 13/16 - Actuation by interference with mechanical vibrations in air or other fluid
  • G06N 20/00 - Machine learning
  • G06Q 30/016 - After-sales
  • G08B 13/189 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems

57.

System and method to detect device tampering during transit using a geolocation sensor

      
Application Number 18477715
Status Pending
Filing Date 2023-09-29
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor Singh, Shailendra

Abstract

A system and method for detecting tampering of an item during transit from a source to a destination. The system includes a processor which receives a plurality of measurements of the position of the item during transit and detects at least one anomaly in the plurality of measurements. When the at least one anomaly is detected, it is compared with the expected location of the item at that time and if the comparison shows a degree of difference that is greater than a predetermined threshold that indicates the item may have been diverted and tampered with during transit, the system and method performs an action to disable the item.

IPC Classes  ?

58.

System and method for validating an interaction using an agreement key

      
Application Number 18479493
Status Pending
Filing Date 2023-10-02
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor
  • Suriyanarayanan, Gowri Sundar
  • Sethia, Maneesh Kumar
  • Behera, Abhijit
  • Singh, Shailendra

Abstract

A system includes a memory and a processor that validates an interaction between an initiating and a receiving device. An encrypted request is received to perform the interaction and the processor extracts an initiating device identification, a receiving device identification, and one or more numerical values associated with the interaction. Using this extracted information, the processor produces a verification key by applying a hash function and a verification checksum value using a checksum function. The verification key and verification checksum value are then compared with an authentication key and authentication checksum value that were produced in a same manner prior to the interaction being initiated. If it is determined that either the verification key and the authentication key do not have the same value, or verification checksum value and authentication checksum value do not have the same value, then the interaction is reversed.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

59.

System and method for machine-to-machine re-imaging

      
Application Number 18479497
Status Pending
Filing Date 2023-10-02
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor
  • Garg, Saurabh
  • Sethia, Maneesh Kumar
  • Singh, Shailendra

Abstract

An error message is received from a first computing node indicating a malfunction associated with the first computing node. Based on a first error code received in the error message, a first software program is determined that is to be installed at the first computing node to resolve the malfunction. A geographically nearest second computing node to the first computing node is determined that includes the first software program. The second computing node is instructed to transmit the first software program to the first computing node. The second computing node transmits the first software program to the first computing node. The first computing node receives and installs the first software program at the first computing node.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 11/10 - Adding special bits or symbols to the coded information, e.g. parity check, casting out nines or elevens

60.

System and Method for Managing Interactions on a Blockchain Network

      
Application Number 18477719
Status Pending
Filing Date 2023-09-29
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor
  • Suriyanarayanan, Gowri Sundar
  • Sethia, Maneesh Kumar
  • Behera, Abhijit

Abstract

A system is configured to perform an interaction between a first user and a second user. The system comprises memory operable to store a data log comprising information associated with the interaction and a hold duration. The system comprises a processor operably coupled to the memory and a blockchain network. The processor is configured to receive a request from a first user device to record the interaction on the blockchain network, and store information associated with the interaction in a data log. The processor is configured to determine whether a cancel request is received. If received, the processor is configured to cancel the request to record the interaction on the blockchain network. If not received, the processor is configured to hold the request to record the interaction on the blockchain network for the hold duration, and subsequently record the interaction on the blockchain network.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

61.

System, device, and method for performing secured operations

      
Application Number 18479917
Status Pending
Filing Date 2023-10-03
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor
  • Albero, George Anthony
  • Kocharyan, Olga Caroline
  • Stocks, Dustin Paul
  • Mukherjee, Maharaj
  • Davis, Karen
  • Pugh, Lisa Snow
  • Mirarchi, Anna Maria
  • Lohar, Sanjay Arjun
  • Siekman, James Joseph
  • Xu, Anna
  • Quales, Samantha Ilse

Abstract

A device for performing a secured operation is disclosed. The device is embedded with a predefined data item and verification information. The verification information is uniquely associated with the user of the device. The verification information is linked to the identity of the user. The verification information is configured to be extracted in conjunction with the secured operation being performed. The secured operation is performed in response to the verification information being verified. A system and method for performing the secured operation are also disclosed.

IPC Classes  ?

62.

System and method for exchanging data between blockchain networks

      
Application Number 18479976
Status Pending
Filing Date 2023-10-03
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor
  • Nagarajan, Divya
  • Singh, Shailendra

Abstract

A request is transmitted to a second computing node of a second blockchain network to perform a data interaction between a first computing node of a first blockchain network and the second computing node. Upon receiving an acknowledgement of the request, a first smart contract, an encrypted first network address and a first authentication code is generated. The first smart contract is encrypted using the first authentication code to generate an encrypted first smart contract. The encrypted first smart contract, the encrypted first network address and the first authentication code is transmitted to the second computing node. A digital signature is received indicating an approval of the first smart contract. Thereafter, data objects are transmitted to the second computing node as agreed in the first smart contract.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

63.

System and method for alternative interactions using optical absorption spectroscopy

      
Application Number 18480289
Status Pending
Filing Date 2023-10-03
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor
  • Tran, Ngoc
  • Sethia, Maneesh Kumar

Abstract

A mobile device performs an alternative interaction with an entity device using optical absorption spectroscopy, such as when a traditional network connection is unavailable between the mobile device and the entity device.

IPC Classes  ?

64.

SESSION TRANSFER BETWEEN PRE-REGISTERED SMART GLASSES AND COMPUTER FOR MAINTAINING A CONFIDENTIAL DATA VIEW

      
Application Number 18374044
Status Pending
Filing Date 2023-09-28
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor Verma, Sandeep

Abstract

A session-sharing system smoothly toggles between a first device session and a pre-registered second device session. The second computing device enables input confidential information absent visual trespass. The second device is pre-registered with a private key for unlocking a public key. A common data storage device establishes electronic communication between the first and second computing devices by invoking trigger information incorporating a public key from the first computing device. The second computing device executes the trigger information by decoding the public key. The first computing device receives the user session initiation information and then transfers it to the common data storage device. The second computing device locks the first user session, masks a display associated with the first user session, maintains the session initiation information and creates a second user session invoking the information from the first computing device to support confidential data input at the second computing device.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/60 - Protecting data
  • G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light

65.

GAMIFICATION OF TRAINING FOR PHISHING PREVENTION IN METAVERSE

      
Application Number 18374055
Status Pending
Filing Date 2023-09-28
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor Uniyal, Rahul

Abstract

A system, computer program product, and method for training users in phishing prevention may challenge a user with gamified user-specific phishing attacks for a user to encounter in a temporal pattern. Phishing data, including data relating to phishing techniques and actual and non-actual (fake) phishing attacks, may be generated or obtained and input to the training engine. User-related data, including user information, one or more social engineering vectors, or organization information relating to an organization, may be obtained and digitally manipulated. A sequential cross model training engine may process the phishing data and digitally manipulate the user-related data to generate training activities that include test phishing attacks. A gamification engine may generate gamified user-specific testing that includes two or more of the test phishing attacks in a sequence in real time. The test phishing attacks, which may be in a non-question format, may target the user in an XR environment.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G09B 5/06 - Electrically-operated educational appliances with both visual and audible presentation of the material to be studied

66.

Using Tonal Bits for Secure Messaging

      
Application Number 18374761
Status Pending
Filing Date 2023-09-29
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor
  • Albero, George
  • Kocharyan, Olga
  • Brown, Stephen C.
  • Clark, Elijah
  • Mukherjee, Maharaj

Abstract

A computing platform may receive an event processing request. The computing platform may identify, by inputting first communication parameters of the event processing request into a secure communication model, communication validation information for the event processing request. The computing platform may embed, using one or more tonal bits of an audio communication corresponding to the event processing request, the first communication validation information, wherein embedding the first communication validation information generates a secure event communication. The computing platform may send the secure event communication to a recipient user device, where the recipient user device may be configured to verify the secure event communication based on the first communication validation information.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 5/022 - Knowledge engineeringKnowledge acquisition

67.

SYSTEM FOR MAPPING AND EXECUTING USAGE OF MULTIPLE SOURCE ELEMENTS FOR COMPLETION OF A RESOURCE REQUEST

      
Application Number 18374930
Status Pending
Filing Date 2023-09-29
First Publication Date 2025-04-03
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Chauhan, Sandeep Kumar
  • Khatri, Bhoomika
  • Sivanantham, Bindhiya
  • Patwari, Vinayak Rao
  • Sundarapandian, Vengatesh
  • Dhivya, Sugumar
  • Matury, Suman
  • Thangaraju, Mangal

Abstract

Systems, computer program products, and methods are described herein for a system for mapping and executing usage of multiple source elements for completion of a resource request. The present disclosure is configured to receive source element data related to at least two source elements, establish resource request parameters, determine an execution source element, and execute a resource transfer in response to the resource request using the execution source element.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

68.

AMALGAMATION PLATFORM PROVIDING CONCEALED DETECTION OF CODE-PASSING USING STEGANOGRAPHY

      
Application Number 18375845
Status Pending
Filing Date 2023-10-02
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor
  • Murphy, Timothy Scott
  • Albero, George
  • Mukherjee, Maharaj
  • Kim, Jinna

Abstract

Aspects related to an amalgamation platform providing concealed detection of code-passing using steganography are provided. An amalgamation platform may train a scoring engine to generate suspicion scores for code snippets and an amalgamation engine to generate execution scenarios for the code snippets. The platform may embed code in base code of a network using steganography. The platform may use the steganographic code to detect transmission of a code snippet. The platform may generate a suspicion score for the code snippet. The platform may update the scoring engine based on identifying the suspicion score satisfies a threshold. The platform may generate execution scenarios for the code snippet. The platform may determine a match between an execution scenario and a malicious code scenario. The platform may identify the code snippet as malicious and update the amalgamation engine based on the match. The platform may initiate security actions based on the match.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

69.

INTELLIGENT METHOD FOR REAL TIME CACHE UPDATES LEVERAGING DISTRIBUTED LEDGER TECHNOLOGY WITH NON-FUNGIBLE TOKEN (NFT) TIED SYSTEM OF RECORD (SOR) UPDATE INDICATORS

      
Application Number 18376156
Status Pending
Filing Date 2023-10-03
First Publication Date 2025-04-03
Owner Bank of America Corporation (USA)
Inventor
  • Arora, Saurabh
  • Adivi, Suryanarayana
  • Kutthumolu, Durga Prasad
  • Sriperambudur, Sunilkumar

Abstract

Aspects of the disclosure relate to using machine learning models to performing real-time cache updates. A computing system may receive a request to update an unreferenced object of a user interface of an application. A block may be generated in a blockchain stored in a second cache tier. The block may comprise a non-fungible token (NFT) based on the unreferenced object and may indicate that the unreferenced object is not authorized to indicate a system of record update. Based on the request to update the unreferenced object meeting one or more criteria, a block comprising an NFT that is referenced by the unreferenced object may be generated in a first cache tier. A block indicating that the NFT is referenced by the unreferenced object may be generated in a first cache tier and the unreferenced object may be updated in the user interface of the application.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/38 - Payment protocolsDetails thereof

70.

SYSTEM AND METHOD FOR GENERATING DATA MODELS SECURE FROM MALFEASANT MANIPULATION FOR USE IN PREDICTIVE MODELING

      
Application Number 18376298
Status Pending
Filing Date 2023-10-03
First Publication Date 2025-04-03
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Bakshi, Sakshi
  • Ganapathy, Sudha
  • Kutthumolu, Durga Prasad
  • Taneja, Pushkar

Abstract

Embodiments of the present invention provide a system for generating data models secure from malfeasant manipulation for use in predictive modeling. The system is configured for retrieving training data associated with predictive modeling from a data source, processing the training data retrieved from the data source, transmitting the training data to a local linear model to generate a predictive output, retrieving historical data from the data source, transmitting the predictive output from the local linear model and the historical data retrieved from the data source to a Huber loss estimator module, validating, via the Huber loss estimator module, the predictive output received from the local linear model based on the historical data retrieved from the data source, and determining, via the Huber loss estimator module, if the training data has been manipulated by a malfeasant actor based on validating the one or more data points associated with the predictive output.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

71.

HYBRID COMPUTING FOR ACCESS-LESS SURGICAL RETRIEVAL

      
Application Number 18370912
Status Pending
Filing Date 2023-09-21
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor
  • Arumugam, Rajalakshmi
  • Sivaramakrishnan, Ramya
  • Miranda, Roshan
  • Saini, Anshul
  • Lakhtakia, Ankit
  • Gandhi, Shruti
  • Gupta, Sanjay Lal
  • Kumar, Nabh
  • Khurana, Vineet
  • Wilman, Jonathan David

Abstract

Systems and methods for confidential database surgical search and access-less retrieval using a hybrid-computing-powered system with multi-thread processing are provided. The systems and methods may include a quantum processor and a classical processor. The systems and methods may include requesting data elements pertinent to reports. The systems and methods may include authenticating requests and creating classical request strings via a classical processor. The systems and methods may include interfacing classical request strings with a quantum processor. The systems and methods may include running Grover's searches in parallel over the request strings. The systems and methods may include fetching data from smart contracts within ledgers and sub-ledgers within a blockchain. The systems and methods may include pulling dynamic market data through a legacy transformation platform including dynamically derived data values and a machine learning model (MLM).

IPC Classes  ?

  • G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computersPlatforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
  • G06N 10/20 - Models of quantum computing, e.g. quantum circuits or universal quantum computers

72.

SYSTEMS AND METHODS FOR SECURING AND EMULATING OF COMPUTING SYSTEM CONFIGURATIONS

      
Application Number 18371601
Status Pending
Filing Date 2023-09-22
First Publication Date 2025-03-27
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Raj, Narsing
  • Kommu, John Bilton
  • Kumar, Ashok
  • Vinherkar, Aashish Chandrahas
  • Devulapalli, Venkata Lakshmi Sai Siva Kumar

Abstract

Systems, computer program products, and methods are described herein for securing and emulating computing system configurations. The present disclosure is configured to identify at least one potential configuration for at least one system component; generate at least one configuration delta for the at least one potential configuration; apply the at least one configuration delta to a configuration delta processing engine; generate, by the configuration delta processing engine, at least one configuration delta processing engine output; apply the at least one configuration delta processing engine output to a configuration emulator engine; output, by the configuration emulator engine, at least one configuration simulation; apply the at least one configuration simulation to a configuration management component, wherein the configuration management component comprises a component configuration distributed ledger; and update the component configuration distributed ledger with the at least one configuration simulation.

IPC Classes  ?

  • H04L 41/14 - Network analysis or design
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 41/0869 - Validating the configuration within one network element

73.

SYSTEMS AND METHODS FOR HOMOMORPHIC ENCRYPTION-BASED DATA CACHING

      
Application Number 18371755
Status Pending
Filing Date 2023-09-22
First Publication Date 2025-03-27
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Sethia, Maneesh
  • Behera, Abhijit
  • Singh, Shailendra

Abstract

The present disclosure details systems and methods for homomorphic encryption-based data caching. This technology detects transaction patterns via a monitoring module that liaises with both a payment system and an entity system. Prior to its processing, transaction data is encrypted with a homomorphic encryption module. A dynamic interface, aligned with a local point-of-sale (POS) cache, prioritizes data based on current transaction metrics. If a recipient server is busy, the transaction data is rerouted, stored in the POS's local cache, and queued. The transaction's success is gauged against a predefined cut-off time. Unsuccessful transactions within this window are slated for batch processing, yet resource processing proceeds while awaiting this batch processing.

IPC Classes  ?

  • H04L 47/50 - Queue scheduling
  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06Q 20/20 - Point-of-sale [POS] network systems
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

74.

CHANGE PREDICTION PLATFORM USING QUANTUM NEURAL NETWORKS FOR PREDICTING CHANGE INSTRUCTIONS

      
Application Number 18371942
Status Pending
Filing Date 2023-09-22
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor
  • Arumugam, Rajalakshmi
  • Sivaramakrishnan, Ramya
  • Singh, Abhilasha
  • Lamba, Ekta Sood
  • Sehgal, Deepika

Abstract

Arrangements for a change prediction model using quantum neural networks are provided. A platform may train a quantum change prediction model. The platform may receive and process an event processing request and one or more change instructions. The platform may determine whether a quantity of change instructions associated with the event processing request satisfies a threshold. Based on determining that the quantity of change instructions associated with the event processing request satisfies a threshold, the platform may generate a probability score indicating a likelihood that change instructions corresponding to the event processing request are awaiting identification. Based on determining that the probability score satisfies a threshold, the platform may generate a set of predicted change instructions for the event processing request using the model. The platform may update the model based on the set of predicted change instructions and the probability score. The platform may cause the event processing request to be processed based on the set of predicted change instructions.

IPC Classes  ?

  • G06N 10/60 - Quantum algorithms, e.g. based on quantum optimisation, or quantum Fourier or Hadamard transforms

75.

Intelligent Method to Merge Application Programming Interface (API) Leveraging Generative AI and Prompt

      
Application Number 18372221
Status Pending
Filing Date 2023-09-25
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor Singh, Shailendra

Abstract

An intelligent technical procedure to merge two or more application programming interfaces (APIs) leveraging generative AI is disclosed. API metadata is extracted from two or more APIs (e.g., name of API, endpoints, request/response formats (JSON or XLM), authentication mechanism (API keys, OAuth, or JWT tokens), rate limits, error codes, error messages, version scheme and API documentation etc.) to formulate and generate new API based on user prompt. Using Abstract Syntax tree (AST) advance deep learning generative AI algorithms like Generative pre-trained transformer (GPT) or the like, the method can merge and construct new API based on user's requirement prompt. Method leverages smart contracts to test new generated API and deploy API in desired environment based on blockchain consent protocol to manage API.

IPC Classes  ?

  • G06F 9/54 - Interprogram communication
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

76.

SYSTEM FOR REMOTE RETRIEVAL AND INSERTION OF CONTENTS WITHIN INDIVIDUALLY SECURED CONTAINERS

      
Application Number 18373473
Status Pending
Filing Date 2023-09-27
First Publication Date 2025-03-27
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Murphy, Timothy Scott
  • Mattison, Paul Martin

Abstract

Remote access to secured containers is provided by a user interface apparatus having an associated receptacle for receiving physical items delivered from and to the remote secured container. Delivery of the physical items to and from the user interface device's receptacle and the secure container may be accomplished by a robotic mechanism or the like. The user of the remote secured container access system pre-registers, such that presentation of the user credentials at the user interface apparatus provides the user options for receiving items for the secured container and delivering items. Moreover, the user credentials are associated with a secure container identifier and access credentials for gaining access to the secured area and/or the secured container, such that presentation of the user credentials provides identification of the secure container and access to the secured area and/or the secured container.

IPC Classes  ?

  • G07C 9/00 - Individual registration on entry or exit
  • B65G 1/137 - Storage devices mechanical with arrangements or automatic control means for selecting which articles are to be removed
  • G07C 9/32 - Individual registration on entry or exit not involving the use of a pass in combination with an identity check

77.

Decision Making Using Integrated Machine Learning Models and Knowledge Graphs

      
Application Number 18976833
Status Pending
Filing Date 2024-12-11
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor
  • Mukherjee, Maharaj
  • Raj, Utkarsh

Abstract

Aspects of the disclosure relate to machine learning models and knowledge graphs. A computing platform may receive event processing data. Using a machine learning mode, the computing platform may identify k nearest data points corresponding to the event processing data. Using a knowledge graph, the computing platform may identify k nearest data nodes corresponding to the event processing data. The computing platform may generate first weighted relative distances between the event processing data and the k nearest data points, and second weighted relative distances between the event processing data and the k nearest data nodes. Based on the weighted relative distances, the computing platform may identify a data cluster for the event processing data. The computing platform may send, based on the identified data cluster, event processing information and one or more commands directing an enterprise computing device to display the event processing information.

IPC Classes  ?

78.

System and method for network intrusion detection using a neural network implemented by a local computing system

      
Application Number 18473000
Status Pending
Filing Date 2023-09-22
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor
  • Tran, Ngoc Anh
  • Sundaravel, Manimaran
  • Sethia, Maneesh Kumar

Abstract

A method includes intercepting requests. The requests are analyzed to identify authenticated requests. Remaining requests are identified as suspicious requests. The suspicious requests are grouped into request groups based on respective geolocation information. A first rate of requests is determined for a first request group. In response to determining that the first rate of requests is less than or equal to a request rate threshold, parameters of a first suspicious request of the first request group are analyzed to determining values of the parameters. In response to determining that the values of the parameters are not within respective acceptable parameter value ranges, the first suspicious request is analyzed using a neural network to identify if the first suspicious request is legitimate or malicious. In response to identifying that the first suspicious request is malicious, a first notification indicating that the first suspicious request is identified as malicious is send.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

79.

System and method for dynamically merging geofencing rules and messages

      
Application Number 18473437
Status Pending
Filing Date 2023-09-25
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor Singh, Shailendra

Abstract

A method includes monitoring a first geographic area and a second geographic area. In response to determining that a portion of the first geographic area overlaps with a portion of the second geographic area, an overlapping geographic area is defined. A merged rule set for the overlapping geographic area is generated by merging a first rule set associated with the first geographic area and a second rule set associated with the second geographic area. In response to determining that a user device is located within the overlapping geographic area, a merged alert is generated based on the merged rule set. The merged alert includes merged information of a first alert associated with the first rule set and a second alert associated with the second rule set. A message with the merged alert is sent to the user device.

IPC Classes  ?

  • G06F 21/45 - Structures or tools for the administration of authentication

80.

System and method for interacting with a physical device through a virtual twin of the device

      
Application Number 18473736
Status Pending
Filing Date 2023-09-25
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor
  • Singh, Shailendra
  • Kutthumolu, Durga Prasad

Abstract

A system receives an image from a camera, where the image shows a physical device. The system, via deep learning object detection algorithm, determines the identity of the physical device. The system generates a virtual device in a virtual environment, where the virtual device is a virtual representation of the physical device. The system receives a user request that indicates the virtual device is requested to perform an operation. In response, the system establishes a communication path to the physical device and communicates a control signal to the physical device that causes the physical device to perform the operation.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G01S 17/89 - Lidar systems, specially adapted for specific applications for mapping or imaging
  • G06T 17/00 - 3D modelling for computer graphics
  • G06V 10/25 - Determination of region of interest [ROI] or a volume of interest [VOI]
  • G06V 10/44 - Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersectionsConnectivity analysis, e.g. of connected components
  • G06V 10/74 - Image or video pattern matchingProximity measures in feature spaces

81.

System and Method for Verifying User Interactions in an Extended Reality Environment

      
Application Number 18473798
Status Pending
Filing Date 2023-09-25
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor Yarabolu, Vijay Kumar

Abstract

A method includes rendering, on displays of an extended reality (XR) device, an XR environment, detecting a sequence of user interactions with an XR application, and identifying, based on the sequence of user interactions with the XR application and the user identification, a historical user interaction data associated with a user. The method further includes generating a first trust token based on the identified historical user interaction data, and receiving an interaction to finalize execution of the sequence of user interactions. In response, the method includes accessing a second trust token associated with the XR application, comparing the first trust token with the second trust token, validating the second trust token based on the comparison, validating each user interaction of the sequence of user interactions based on the identified historical user interaction data, and finalizing execution of the sequence of user interactions in response to the validations.

IPC Classes  ?

  • G06T 17/00 - 3D modelling for computer graphics
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

82.

System and Method for Generating and Securing a User-Specific Application in an Extended Reality Environment

      
Application Number 18474847
Status Pending
Filing Date 2023-09-26
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor
  • Viswanathan, Krithika
  • Singh, Shailendra
  • K.S., Suresh
  • Mishra, Amit
  • Krishnan, Subburathinam

Abstract

A method includes rendering, on displays of an extended reality (XR) device, an XR environment, and detecting, based on sensor data obtained from sensors of the XR device, a device capability associated with the XR device and one or more environmental conditions associated with the XR environment. The method further includes receiving a request corresponding to one or more user interactions with an XR application. In response to receiving the request, the method includes generating, based the device capability and the environmental conditions, a dynamic digital profile to be associated with the user, in which the dynamic digital profile is dynamically generated to be responsive to one or more input modalities associated with the request, and render, on the displays, the dynamic digital profile. The rendered dynamic digital profile includes a set of elements responsive to the one or more input modalities of the request.

IPC Classes  ?

  • G06T 17/00 - 3D modelling for computer graphics
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer

83.

System and method for network intrusion detection using a neural network implemented by a cloud computing system

      
Application Number 18473063
Status Pending
Filing Date 2023-09-22
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor
  • Tran, Ngoc Anh
  • Sundaravel, Manimaran
  • Sethia, Maneesh Kumar

Abstract

A method includes intercepting requests, which are analyzed to identify authenticated and suspicious requests. The suspicious requests are grouped into request groups based on respective geolocation information. A rate of requests is determined for a request group. In response to determining that the rate of requests is less than or equal to a request rate threshold, parameters of a suspicious request of the request group are analyzed to determining values of the parameters. In response to determining that the value of the parameters do not match with respective malicious parameter values stored in a block list, the suspicious request is analyzed using a neural network to identify if the suspicious request is legitimate or malicious. In response to identifying that the suspicious request is malicious, a notification indicating that the suspicious request is identified as malicious is sent, and the values of the parameters are added to the block list.

IPC Classes  ?

84.

System and Method for Operating Distributed Computer Systems

      
Application Number 18474341
Status Pending
Filing Date 2023-09-26
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor
  • Rajagopalan, Anurajam
  • Rajendran, Sathyanarayana
  • Ghosh, Shantonu

Abstract

A system accesses data of a failed interaction with a target system from a queue and determines whether the failed interaction is a data failure or a system failure. For a data failure, the system determines a category and whether it can be fixed. If it can be fixed, the system updates the data and reprocesses the failed interaction based on the updated data. If it cannot be fixed, the system deletes the data from the queue and notifies the target system the category of the data failure. For a system failure, the system identifies a system trend of the target system and determines whether it can be fixed. If it can be fixed, the system determines a reprocessing schedule and reprocesses the failed interaction accordingly. If it cannot be fixed, the system deletes the data from the queue and notifies the target system of the system trend.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

85.

System and method for identifying anomalous network sessions in a network environment

      
Application Number 18475504
Status Pending
Filing Date 2023-09-27
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor
  • Bishop, Iii, Jack L.
  • Muzzo, Ryan Francis
  • Starin, Jason Conrad

Abstract

A system for identifying one or more anomalous network sessions in a network environment includes a memory and a processor coupled to the memory. The processor collects network traffic data based on a plurality of network sessions between a source and a destination in the network environment. The processor parses the network traffic data to identify a plurality of parameters associated with the network traffic data at different network layers. The processor clusters the network traffic data into baseline network traffic data based on one or more specific parameters of the plurality of parameters. The processor identifies unknown network traffic based upon the clustered network traffic data and analyzes the unknown network traffic with respect to the baseline network traffic data to identify the one or more anomalous network sessions. The processor determines and performs one or more mitigation actions for the identified one or more anomalous network sessions.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 18/2321 - Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions

86.

System and method to integrate microservices in Interactive Voice Response (IVR) operations

      
Application Number 18475747
Status Pending
Filing Date 2023-09-27
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor
  • Sahoo, Amiya R
  • Randrup, Scott S
  • Lutzkow, Robert E
  • Alexandrov, Sergey
  • Mahajan, Nipun
  • Raghuvanshi, Yogesh
  • Daniel, Anand
  • Agrawal, Dinesh Kumar
  • Jain, Dhiraj
  • Han, Chung
  • Balse, Ruma
  • Nagarajan, Sivakumar P

Abstract

An apparatus may comprise a memory communicatively coupled to a processor. The processor may be configured to receive a request to perform multiple data processing operations and determine multiple sub-dialogues corresponding to the request. The sub-dialogues are part of a plurality of IVR operations. The processor may be further configured to route the request to a microservice of the microservices based at least in part upon the sub-dialogues. The microservice may be configured to fulfill the request. The processor may generate a response to the request associated with the microservice, update publishing commands in accordance with one or more rules and policies in response to generating the response, and publish the first microservice. The publishing commands associated with the microservice may be updated in isolation from the rest of the microservices.

IPC Classes  ?

  • G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
  • G06F 9/54 - Interprogram communication
  • G10L 15/30 - Distributed recognition, e.g. in client-server systems, for mobile phones or network applications

87.

STRATEGIZING DISTRIBUTED SYSTEMS USING QUANTUM SIMULATION

      
Application Number 18371555
Status Pending
Filing Date 2023-09-22
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor
  • Murthy, Anbarasan
  • Thomas, Kiran
  • Iruvanti, John

Abstract

Aspects of the disclosure relate to strategizing distributed systems using quantum simulation. A quantum simulation platform may train a quantum simulation model (QSM) and an encoding model. The platform may generate a digital twin of a distributed software system (DSS). The platform may generate a directed acyclic graph (DAG) based on source code for updating the DSS. The platform may generate encoded vectors using the DAG and the encoding model. The platform may generate a source code matrix based on generating distribution assessments for the encoded vectors. The platform may generate a configuration matrix based on generating change vectors using the digital twin. The platform may generate execution scenarios and optimization scores using the QSM, based on inputting the matrices. The platform may identify an optimal execution scenario. The platform may cause one or more updates the DSS based on the optimal execution scenario.

IPC Classes  ?

  • G06N 10/20 - Models of quantum computing, e.g. quantum circuits or universal quantum computers

88.

SYSTEMS AND METHODS FOR IMPLEMENTING A MIXED REALITY APPARATUS TO AUTOMATICALLY AND DYNAMICALLY GENERATE OUTPUT BASED ON SOURCE CODE

      
Application Number 18371578
Status Pending
Filing Date 2023-09-22
First Publication Date 2025-03-27
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Maharaja, Raja Arumugam
  • Sundaram, Natrajan

Abstract

Systems, computer program products, and methods are described herein for implementing a mixed reality apparatus to automatically and dynamically generate output based on source code. The present disclosure is configured to identify at least one source code statement; train the source code output machine learning model with the at least one source code statement; generate at least one input data for the at least one source code statement, the at least one input data is associated with an at least one expected output data; apply the at least one input data to the source code output machine learning model; output the at least one sample output data; transmit the at least one sample output data to a mixed reality apparatus; and compare the at least one sample output data and the at least one expected output data and determine whether the at least one source code statement is valid.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06N 20/00 - Machine learning

89.

CHANGE PREDICTION PLATFORM USING QUANTUM NEURAL NETWORKS AND CHANGE SCHEMA

      
Application Number 18371918
Status Pending
Filing Date 2023-09-22
First Publication Date 2025-03-27
Owner Bank of America Corporation (USA)
Inventor
  • Arumugam, Rajalakshmi
  • Singh, Abhilasha
  • Sivaramakrishnan, Ramya
  • Sehgal, Deepika
  • Lamba, Ekta Sood

Abstract

Arrangements for a change prediction model using a quantum neural network are provided. A platform may train a quantum change schema model. The platform may receive and process an event processing request and one or more change instructions. The platform may generate a change schema for the event processing request using the model and based on the one or more change instructions. The platform may cause processing of the change schema. The platform may update the model based on receiving results of processing the change schema. The platform may cause the event processing request to be processed based on the change schema. The platform may further update the model based on modified change instructions received as a result of processing the event processing request.

IPC Classes  ?

  • G06N 10/60 - Quantum algorithms, e.g. based on quantum optimisation, or quantum Fourier or Hadamard transforms
  • G06F 40/40 - Processing or translation of natural language

90.

SYSTEM FOR INTELLIGENT WORKFLOW MANAGEMENT IN ROBOTIC PROCESS AUTOMATION

      
Application Number 18372199
Status Pending
Filing Date 2023-09-25
First Publication Date 2025-03-27
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Paini, Siva Kumar
  • Balu, Sudhakar
  • Thamilarasan, Sathya

Abstract

Systems, computer program products, and methods are described herein for intelligent workflow management in robotic process automation (RPA). The present disclosure comprises a workflow replication subsystem configured to replicate a sequence of actions executed by an RPA bot in an application server; a fog computing subsystem operatively coupled to the workflow replication subsystem, wherein the fog computing subsystem is configured to extract metadata associated with execution of the sequence of actions; and an anomaly resolution subsystem operatively coupled to the fog computing subsystem and the workflow replication subsystem, wherein the anomaly resolution subsystem is configured to troubleshoot instances of interruptions in the execution of the sequence of actions, wherein the instances of interruptions comprise at least potential failures in at least one action yet to be executed by the RPA bot.

IPC Classes  ?

  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
  • B25J 9/16 - Programme controls
  • G06Q 10/0635 - Risk analysis of enterprise or organisation activities

91.

INTELLIGENT VIRTUAL ASSIST FOR RESOURCE ADVANCEMENT

      
Application Number 18372394
Status Pending
Filing Date 2023-09-25
First Publication Date 2025-03-27
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Dande, Pratap
  • Ali, Amer
  • Dahl, Erik
  • Jacobson, Brian Neal
  • Nyamwange, Elvis
  • Phadnis, Rahul Shashidhar
  • Vezzu, Sailesh
  • Vuppala, Hari
  • Yaksh, Rahul

Abstract

Intelligent autonomous software (i.e., a “bot”) configured to compile and present resource advancement requestor-specific dashboards that summarize the results of analysis of resource advancement data related to the resource advancement request/requestor. In compiling a dashboard presentation for a specific resource advancement requestor, the intelligent autonomous software executes a set of predetermined queries directed to a database that stores the results of the data analysis. In response to receiving the responses to the queries, the intelligent autonomous software is configured to identify data omissions/anomalies in the data that will prevent approval of the resource advancement request and identify, and in some instances generate, corrective action(s) that will rectify the data omissions/anomalies. Subsequently, a resource advancement requestor-specific dashboard presentation is generated and communicated to the user that (i) summarizes the data responsive to the predetermined queries, and (ii) highlights the data omissions/anomalies and the corrective actions necessary to rectify the data omissions/anomalies.

IPC Classes  ?

  • G06N 3/006 - Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]

92.

SYSTEM AND METHOD FOR MACHINE LEARNING-DRIVEN DATA RECORD RETRIEVAL VIA STOCHASTIC EXPANSION DATA QUERYING

      
Application Number 18373331
Status Pending
Filing Date 2023-09-27
First Publication Date 2025-03-27
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Li, Yvonne Y.
  • Blogg, Aaron
  • Naitlho, Nizar

Abstract

Systems, computer program products, and methods are described herein for machine learning-driven data record retrieval via stochastic expansion data querying. Data records and a query statement are received. Using a weighting model, a data vector for each of the data records and a query vector for the query statement are generated. A first similarity score for each data vector is determined. Rankings for the data records are generated. Based on the rankings, a grouping of data records is selected. Test vectors centered from the query vector are then generated stochastically. A second similarity score for each of the test vectors is determined. A subsequent query vector is determined based on a highest second similarity score. If metrics do not satisfy a predetermined stopping criteria, subsequent test vectors are generated stochastically. Ranked data records are then provided to a large language model.

IPC Classes  ?

  • G06F 16/35 - ClusteringClassification
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 16/33 - Querying
  • G06F 40/40 - Processing or translation of natural language

93.

Streaming architecture for improved fault tolerance

      
Application Number 18371713
Grant Number 12261755
Status In Force
Filing Date 2023-09-22
First Publication Date 2025-03-25
Grant Date 2025-03-25
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Agrawal, Arpan
  • Bansode, Sachin
  • Jain, Anshul
  • Sridharan, Dinesh Kumar Kanchi

Abstract

In conventional networked computing systems, stream-processing software is utilized to handle real-time data feeds. For example, a stream-processing software may sort incoming data feeds into data logs, which are then consumed by various application servers within the computing system. However, this consumption process is susceptible to failure as application servers often fail to consume a full payload of data comprising a particular message. As such, a need exists for a streaming architecture with improved fault tolerance. The system provided herein solves the problem via a reliable streaming process, which regularly generates partitions within a series of data lakes. As streaming data is received, the payloads are synced into the different data lakes based on metadata associated with the streaming data. The system can then perform individual quality checks on each partition of data, enabling the system to continuously monitor data quality over time.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
  • H04L 65/60 - Network streaming of media packets

94.

MULTI-COMPUTER SYSTEM FOR PERFORMING VULNERABILITY ANALYSIS AND ALERT GENERATION

      
Application Number 18962031
Status Pending
Filing Date 2024-11-27
First Publication Date 2025-03-20
Owner Bank of America Corporation (USA)
Inventor
  • Stocks, Dustin Paul
  • Rux, Kayla Ashley
  • Venkatasubramanian, Viswanathan
  • Korlepara, Ramkumar
  • Lohar, Sanjay
  • Sifford, Eric Eugene
  • Jones, Ashley L.
  • Cuka, David

Abstract

Arrangements for providing software vulnerability analysis and monitoring are provided. In some aspects, software bill of materials (SBOM) data may be received and software attributes may be extracted from the SBOM data. Author data may be received and analyzed using natural language processing and/or machine learning to identify author attributes. Current event or vulnerability data may be received. In some examples, one or more machine learning models may be executed to determine a confidence score associated with the software being analyzed. For instance, software attributes, author attributes, and current event data may be used as inputs in the machine learning model and a confidence score may be output. Based on the confidence score, one or more alerts may be generated and transmitted to one or more enterprise organization computing devices.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 40/20 - Natural language analysis
  • G06N 20/00 - Machine learning

95.

Network Environment Control Scanning Engine

      
Application Number 18963027
Status Pending
Filing Date 2024-11-27
First Publication Date 2025-03-20
Owner Bank of America Corporation (USA)
Inventor
  • Sheedy, Jonathan
  • Sinks, Steven E.

Abstract

A network environment scanning engine may monitor electronic communications received via an external computing network and by an enterprise computing system. The network environment canning engine after receipt of an electronic message, analyze the electronic message to identify, by a network environment scanning engine using a machine learning algorithm, executable code for execution by a processor of computing device addressed as a recipient of the message. The network environment scanning engine further analyzes, using a machine-learning based algorithm in a virtual security environment, the executable code to identify whether the executable code comprises one or more environment variables. Based on the analysis of the executable code, the network environment scanning engine either triggers, based on identification of the one or more environment variables and by an electronic messaging system, an alert sent via a communication network or releases the electronic message for delivery to the recipient computing device.

IPC Classes  ?

96.

System and method for dynamic switching between an old version and a new version of a software code

      
Application Number 18468768
Status Pending
Filing Date 2023-09-18
First Publication Date 2025-03-20
Owner Bank of America Corporation (USA)
Inventor
  • Bakshi, Sakshi
  • Balu, Sudhakar
  • Paini, Siva Kumar

Abstract

A system for updating a software code executes a current version of the software code on a web application. The system receives a request message to update the current version of the software code to a new version of the software code. The system determines whether the software code is still being executed on the web application. In response to determining that the software code is still being executed on the web application, the system identifies a subset of portions of the software code that have not yet been executed, executes an update instruction to cause the subset of portions of the software code to be updated, and moves the updated subset of portions of the software code from a first memory block to a second memory block.

IPC Classes  ?

97.

System and method for addressing software code update failure

      
Application Number 18468775
Status Pending
Filing Date 2023-09-18
First Publication Date 2025-03-20
Owner Bank of America Corporation (USA)
Inventor
  • Bakshi, Sakshi
  • Balu, Sudhakar
  • Paini, Siva Kumar

Abstract

A system for addressing a software code update failure receives a request message to update a current version of a software code to a new version of the software code. The system executes an update instruction to cause at least a portion of the software code to be updated. The system records a log file that comprises information about an execution of the new version of the software code and captures a video recording that shows a screen on a computing device on which the new version of the software code is executed. The system detects an error message and in response to the error message, rolls back the new version of the software code to the current version, communicates an alert message, receives an updated configuration file, and re-executes the update instruction configured with the updated configuration file.

IPC Classes  ?

  • G06F 8/65 - Updates
  • G06F 8/71 - Version control Configuration management
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

98.

Digital Watermarking for Automated Vishing Prevention

      
Application Number 18368085
Status Pending
Filing Date 2023-09-14
First Publication Date 2025-03-20
Owner Bank of America Corporation (USA)
Inventor
  • Albero, George
  • Mukherjee, Maharaj

Abstract

A computing platform may generate a digital watermark configured to verify an identity of an initiator of a communication session. The computing platform may send, to a first user device, a digital watermark signal, where the digital watermark signal indicates: a validated digital watermark comprising the digital watermark, and a first frequency at which the digital watermark is embedded. The computing platform may embed, into a request to initiate a communication session, the digital watermark. The computing platform may send, to the first user device, the request to initiate the communication session, where the first user device may be configured to: 1) identify, based on the first frequency, the digital watermark, 2) compare the digital watermark to the validated digital watermark, and 3) based on identifying that the digital watermark matches the validated digital watermark, output an authenticated communication session notification.

IPC Classes  ?

  • G06F 21/16 - Program or content traceability, e.g. by watermarking
  • G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material

99.

SYSTEM AND METHOD FOR COMBINATORIAL DATA OUTLIER DETECTION VIA DATABASE QUERY STATEMENT GENERATION

      
Application Number 18368102
Status Pending
Filing Date 2023-09-14
First Publication Date 2025-03-20
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Baber, Matthew Grant
  • Bhattarai, Dipesh
  • Boeker, Andreas Alexander
  • Chowdhury, Abir Mustafa
  • Gorham, Thomas
  • Johansson, Meghan Elise
  • Ruse, Kathryn Wyke
  • Reyes, Mary Ivette
  • Smith, Ii, Kenneth Anthony
  • Wood, Bryan Mitchell

Abstract

Systems, computer program products, and methods are described herein for combinatorial data outlier detection via database query statement generation. A table comprising rows and columns is received, wherein each column comprises records and a corresponding data element. A datatype to be assigned to each data element is determined, based on each column and using a first machine learning model. Conditions are generated for columns corresponding to each data element. The conditions are combined into a predetermined number of condition combinations, wherein the condition combinations comprise combinatorial sequencing of the conditions. A query statement is generated for each of the condition combinations. The table in queried with each query statement to determine query results. A data element quantity and a record quantity in the query results are determined for each query statement.

IPC Classes  ?

  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/242 - Query formulation

100.

Multi-Channel Communication Authentication and Validation

      
Application Number 18368210
Status Pending
Filing Date 2023-09-14
First Publication Date 2025-03-20
Owner Bank of America Corporation (USA)
Inventor
  • Albero, George Anthony
  • Mukherjee, Maharaj

Abstract

Arrangements for multi-channel communication validation are provided. In some examples, an indication of initiation of a communication session may be received. The communication session may be initiated by a first party via a first communication channel. In response to the indication, one or more validation actions may be generated and sent to a user device associated with a second party or recipient of the communication session via a second, different communication channel. The second party may acknowledge the validation action and a call completion action may be generated and transmitted to a computing device of the first party. The call completion action may include enabling a connection of the communication session between the first party and the second party if the second party has accepted the call, or may terminate the communication session if the second party has rejected the call.

IPC Classes  ?

  1     2     3     ...     74        Next Page