Bank of America Corporation

United States of America

Back to Profile

1-100 of 7,476 for Bank of America Corporation Sort by
Query
Excluding Subsidiaries
Aggregations Reset Report
IP Type
        Patent 6,978
        Trademark 498
Jurisdiction
        United States 7,026
        World 331
        Canada 71
        Europe 48
Date
New (last 4 weeks) 49
2025 July (MTD) 27
2025 June 40
2025 May 70
2025 April 71
See more
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 973
H04L 9/40 - Network security protocols 681
G06N 20/00 - Machine learning 620
G06Q 40/00 - FinanceInsuranceTax strategiesProcessing of corporate or income taxes 576
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists 532
See more
NICE Class
36 - Financial, insurance and real estate services 410
09 - Scientific and electric apparatus and instruments 82
42 - Scientific, technological and industrial services, research and design 69
35 - Advertising and business services 59
41 - Education, entertainment, sporting and cultural services 39
See more
Status
Pending 1,172
Registered / In Force 6,304
  1     2     3     ...     75        Next Page

1.

WEB APPLICATION FIREWALL CENTRALIZED MANAGEMENT

      
Application Number 19094040
Status Pending
Filing Date 2025-03-28
First Publication Date 2025-07-10
Owner Bank of America Corporation (USA)
Inventor
  • Isola, Rahul
  • Calderon, Mario Alberto

Abstract

Centralized management of web application firewalls (WAFs) is disclosed. Network-security devices in data centers perform server load balancing and implement WAFs for applications. Vendor-specific bridges map application and system parameters for use by a management process. Policies for policy-name/device pairs are provided and grouped into policy groups, which can be included with global parent policy groups. Portions of policy metadata can be retrieved without degrading system performance to detect changes, which can then be synchronized across other applicable policies, groups, devices, and WAFs.

IPC Classes  ?

2.

SYSTEM AND METHOD FOR AI-BASED ADAPTIVE SECURITY PARAMETER CALCULATION IN LICENSE KEY GENERATION WITH QUANTUM-RESISTANT PROTECTIONS

      
Application Number 18405577
Status Pending
Filing Date 2024-01-05
First Publication Date 2025-07-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Taneja, Pushkar
  • Kutthumolu, Durga Prasad

Abstract

Systems, computer program products, and methods are described herein for AI-based adaptive security parameter calculation in license key generation with quantum-resistant protections. The present disclosure is configured to utilize advanced cryptographic techniques, including elliptic curve cryptography and SHA-3 hashing, to produce secure digital signatures for license keys. An AI-driven engine analyzes historical security data to adaptively adjust key generation parameters, ensuring enhanced protection against current and emerging threats. This adaptive approach allows for continuous learning and improvement of security measures, making the system robust against both classical and quantum cryptographic attacks. The disclosed methods integrate the generation, assessment, and validation of keys into a streamlined process that promotes high security while maintaining efficiency.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

3.

LEVERAGING SPATIAL COMPUTING LiDAR FEEDBACK TO DYNAMICALLY GENERATE IDENTITY PROFILES

      
Application Number 18407819
Status Pending
Filing Date 2024-01-09
First Publication Date 2025-07-10
Owner Bank of America Corporation (USA)
Inventor
  • Singh, Shailendra
  • Aich, Debarati
  • Deshpande, Nimish Ravindra

Abstract

Arrangements for leveraging LiDAR for user validation are provided. A computing platform may receive, from a spatial computing device, first data of a first user environment at a first time captured via LiDAR. A first spatial computing map of the first user environment at the first time may be generated and scored to indicate a likelihood that a user of the spatial computing device is valid. The computing platform may receive a request to process an event. In response, the computing platform may cause the spatial computing device to capture, via LiDAR, second data of a current environment of the user at a current time. A second spatial computing map based on the current environment of the user at the current time may be generated and scored. The score for the second spatial computing map may be compared to a threshold to determine whether to process the requested event.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06T 7/00 - Image analysis

4.

System and method for minimizing control system disturbances

      
Application Number 18404590
Status Pending
Filing Date 2024-01-04
First Publication Date 2025-07-10
Owner Bank of America Corporation (USA)
Inventor
  • Tamizhmani, Aravinthane
  • Pai, Sandeep

Abstract

A method includes receiving a data population and a plurality of constraints. The method includes representing a plurality of units corresponding to the data population by a first set of vectors, determining a holistic feature, and representing the holistic feature by a second vector. The method further includes defining a target volume based on a subset of the plurality of constraints, and for each unit, subtracting a vector representing a respective unit from a vector representing a current holistic feature to determine a third vector. The method thus includes instantiating a first data bucket and a second data bucket based on the plurality of units and the units corresponding to the current data population, and for each third vector, transferring units from the first data bucket to the second data bucket so as to cause the holistic feature to converge to the current holistic feature defined by the target volume.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

5.

Distributed Quantum Computing With Blockchain

      
Application Number 18404152
Status Pending
Filing Date 2024-01-04
First Publication Date 2025-07-10
Owner Bank of America Corporation (USA)
Inventor Singh, Shailendra

Abstract

Systems and methods are disclosed for executing large quantum programs efficiently and securely. It breaks down programs into small, logical components, leveraging runtime analysis and AI-driven labeling. These components are then deployed across distributed quantum hardware nodes based on factors like noise levels, capabilities, and geolocation, optimized by a deep learning engine. Ownership and deployment paths are tracked using non-fungible tokens (NFTs) on a blockchain network, ensuring security and transparency. Outputs from each node are validated and aggregated based on their NFT linkage, resulting in accurate and reliable program results. This distributed quantum DevOps framework promotes scalability, performance optimization, and secure management, accelerating the development and application of quantum computing across diverse fields.

IPC Classes  ?

  • G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computersPlatforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
  • G06F 8/40 - Transformation of program code

6.

SYSTEM AND METHOD FOR DETERMINING MODULE INTERDEPENDENCY USING ADVANCED COMPUTATIONAL MODELS FOR DATA ANALYSIS AND AUTOMATED PROCESSING

      
Application Number 18404265
Status Pending
Filing Date 2024-01-04
First Publication Date 2025-07-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Kieffer, Malinda
  • Wilson, Tanya A.
  • Moss, Susan J.
  • Grabski, Andrzej
  • Boosetty, Kiran
  • Phillips, Donna Lee
  • Rosseland, Jr., Robert Ronald
  • Sodhi, Ravinder Kaur
  • Mishra, Rahul Kumar
  • Moiyallah, Jr., Samuel M.
  • Gay, Gerard P.

Abstract

Systems, computer program products, and methods are described herein for determining module interdependency using advanced computational models for data analysis and automated processing. The present disclosure is configured to receive a module characteristic from a system environment, wherein the system environment comprises a module; map the module characteristic, wherein mapping the module characteristic comprises comparing the module characteristic associated with the module with the module characteristic associated with the system environment; determine a weight for the module, wherein determining the weight comprises evaluating a significance level of the information produced by the module, analyzing a number of active modules contributing to a process, computing a weight value, and prioritizing the modules based on the weight value; determine, using an artificial intelligence module, a module update for the module characteristic, wherein the module update comprises updating the module characteristic; and implement the module update in the system environment.

IPC Classes  ?

7.

SYSTEMS AND METHODS FOR PREVENTING SYNTHETIC MISAPPROPRIATION EVENTS OVER AN ELECTRONIC NETWORK

      
Application Number 18408200
Status Pending
Filing Date 2024-01-09
First Publication Date 2025-07-10
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Greene, Steven Nathan
  • Singtalur, Aravind Shankaragouda
  • Chakravarty, Srinath S.
  • Agrawal, Dinesh Kumar
  • Belton, Stephen Richard
  • Puskarich, Petar Evan
  • Datla, Manmohan V.
  • Boyd, Kenneth L.
  • Vaughan, Kerry M.
  • Shkodnik, Elina
  • Miller, Tonya Kyra

Abstract

Systems, computer program products, and methods are described herein for preventing synthetic misappropriation events over an electronic network. The present disclosure is configured to identify a user communication associated with a communication channel; identify a user account associated with the user communication; collect user account data associated with the user account; receive at least one user communication data via the communication channel; transmit the at least one user communication data to at least one internal communication component; receive at least one internal communication data from the internal communication component; generate a virtual avatar based on at least one of user account data, the at least one user communication data, or the at least one internal communication data; and transmit a virtual avatar interface component based on the virtual avatar to a user device associated with the communication channel, wherein the virtual avatar comprises the at least one internal communication data.

IPC Classes  ?

  • H04L 67/306 - User profiles
  • G06T 13/40 - 3D [Three Dimensional] animation of characters, e.g. humans, animals or virtual beings

8.

TRACKING QUANTUM-BASED INTERACTIONS

      
Application Number 18401636
Status Pending
Filing Date 2024-01-01
First Publication Date 2025-07-03
Owner Bank of America Corporation (USA)
Inventor
  • Young, Michael
  • Kurian, Manu
  • Maxim, Ana

Abstract

Systems, methods, and apparatus are provided for tracking user interactions in a quantum system. An authentication persona may be routed to a quantum processor. The quantum processor may generate a virtual quantum channel. The virtual quantum channel may execute multiple attribute-based authentication chains concurrently. The quantum processor may dynamically change the attributes in the authentication chains for the duration of a user session. The quantum processor may substantially continuously validate the attributes in each chain for the duration of the user session. The quantum processor may map the virtual authentication channel to a potential state of quantum information. In some embodiments, the system may automatically scale the quantum processor during an authentication task by adding additional quantum circuits to each quantum thread when the authentication task has a duration that is longer than a threshold duration and/or a volume that is larger than a threshold volume.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06N 10/40 - Physical realisations or architectures of quantum processors or components for manipulating qubits, e.g. qubit coupling or qubit control

9.

REAL-TIME DOCUMENT FORGERY DETECTION

      
Application Number 18401637
Status Pending
Filing Date 2024-01-01
First Publication Date 2025-07-03
Owner Bank of America Corporation (USA)
Inventor
  • Wilhite, Oralie D.
  • Mehndiratta, Amit
  • Maghnani, Vinod
  • Healy, Jeffrey N.

Abstract

A method for detecting document forgery in real-time at a smart device is provided. The method may include capturing, via a smart device, an image of a document. The method may include extracting, via the smart device, data from the image. Based on the data, the method may include creating a dataset that may include a document type for the document and document details included in the document. The method may include confirming, on the smart device, that user account data retrieved from a remote server correlates to user account identifying data included in the document details. Following the confirming, the method may include determining a validity of the document using a fraud document detection engine. When one or more discrepancies are identified between the dataset and the ML data, the method may include transmitting an electronic fraud alert notification from the smart device to a network of smart devices.

IPC Classes  ?

10.

APPARATUS AND METHOD TO MONITOR AND PREVENT MALICIOUS ANCHORING IN A SPATIAL COMPUTING ENVIRONMENT

      
Application Number 18401640
Status Pending
Filing Date 2024-01-01
First Publication Date 2025-07-03
Owner Bank of America Corporation (USA)
Inventor
  • Singh, Shailendra
  • Sethia, Maneesh
  • Behera, Abhijit

Abstract

Provided herein is a spatial computing system. The system may include a spatial computing apparatus configured to receive an anchoring instruction and consequently anchor a virtual object to a physical object; an onboarding module configured to interface with an existing spatial computing software platform; a spatial telemetry extraction module configured to extract positioning metadata associated with the physical object; a spatial analyzer module configured to detect an anomaly in the anchoring instruction, wherein the anomaly may indicate a suspected attempt to glean personal information from an image of the physical object; an anchor validation module configured to monitor changes in anchoring instructions; a session management module configured to terminate a spatial computing session, upon receiving an indication of an anomaly; a spatial security rule orchestration module configured to block implementation of the anchoring instruction; and a deep learning module.

IPC Classes  ?

  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
  • G06T 19/00 - Manipulating 3D models or images for computer graphics

11.

ADAPTIVE NETWORK ROUTING PROTOCOLS

      
Application Number 18401782
Status Pending
Filing Date 2024-01-02
First Publication Date 2025-07-03
Owner Bank of America Corporation (USA)
Inventor
  • Verma, Sandeep
  • Padiyar, Sneha
  • Rao, Beena
  • Minche, Amruta Kiran

Abstract

Systems, methods, and apparatus are provided for adaptive network routing protocols. A mobile device application may receive a request to pair a first payment instrument with a second payment instrument. The application may generate a preauthorized routing packet encoding information associated with the first payment instrument. The routing packet may be QR code encrypted using a private key associated with the network and functioning as a digital wallet. The routing packet may be deployed to a processing network associated with the second payment instrument. The processing network may receive transaction information from a point of sale, including a charge initiated using the second payment instrument. The processing network may access the routing packet and determine whether transaction routing is active. When transaction routing is active, the charge may be routed to the first payment instrument. When transaction routing is not active, the second payment instrument may be charged.

IPC Classes  ?

  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06Q 20/38 - Payment protocolsDetails thereof
  • H04L 9/40 - Network security protocols

12.

Intelligent Systems for Autogenerating Disseminated Virtual Environment Setup Using Parallel Mesh Oriented Logical Programming

      
Application Number 18401891
Status Pending
Filing Date 2024-01-02
First Publication Date 2025-07-03
Owner Bank of America Corporation (USA)
Inventor
  • Yerramsetti, Bala Bhaskar
  • Kutthumolu, Durga Prasad

Abstract

Arrangements for remotely developing an application are provided. A computing platform may receive a request to build an application. The computing platform may receive the request through an API gateway. The computing platform may use a smart contract to identify a first node as a parent node and a plurality of nodes as child nodes. The computing platform may direct the child nodes to transmit virtual copies of dependency packages to the parent node. The parent node may build the application after receiving the dependency packages. The computing platform may detect that the application has been successfully built and may automatically publish the application at an enterprise server.

IPC Classes  ?

  • G06F 8/71 - Version control Configuration management
  • G06F 8/10 - Requirements analysisSpecification techniques

13.

Enterprise Application Integration Leveraging Non-Fungible Token

      
Application Number 18402084
Status Pending
Filing Date 2024-01-02
First Publication Date 2025-07-03
Owner Bank of America Corporation (USA)
Inventor Dahiya, Nisha

Abstract

Solutions for integration and ongoing management of enterprise applications operating in a networked environment are disclosed. An AI transformer extracts, transforms, and manages integration point information from various sources, including documents, UMLs, and other system diagrams. Instead of relying on traditional documentation, the invention utilizes blockchain-based NFTs (non-fungible tokens) to store and manage integration point information. NFTs are created using smart contracts, which define the rules and conditions for the NFT. A metadata engine prepares metadata for generating the Integration Point NFTs. An NFT manager creates the integration point NFTs. A change analyzer determines the impact of changes to integration points on different applications and functionalities. A release compliance component is integrated with DevOps and is responsible for ensuring that integration point changes are incorporated into all impacted applications according to the release defined in the NFT.

IPC Classes  ?

14.

PRE-ACCESS AUTOMATED LOGIN TO COMPUTING DEVICES, APPLICATIONS AND WEB SITES/SERVICES BASED ON MACHINE-LEARNING DETERMINED USER ACCESS PATTERNS

      
Application Number 18402163
Status Pending
Filing Date 2024-01-02
First Publication Date 2025-07-03
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Mukherjee, Maharaj
  • Albero, George Anthony

Abstract

User authentication/login occurs prior to a user accessing a network, application, web site/service or coming in contact with a computing device. Pre-authenticating/logging-in of users in advance of the user visiting or accessing the computing technology. A single device passcode that unlocks the device and a passcode vault storing the user's passcodes. Unlocking the passcode vault provides for the passcodes stored therein to be automatically applied to the corresponding entities requiring authentication to grant users access without requiring any user input/actions. Machine-Learning (ML) models that are trained to learn user login patterns are implemented to identify login pattern(s) and subsequently passcodes are retrieved for the entities making up the login pattern(s) from the passcode vault. Prior to the user accessing the entities that make up the login pattern, the present invention accesses the entities and applies the retrieved passcodes to pre-authenticate the user.

IPC Classes  ?

15.

AUTOMATED MONITORING AND UPDATING OF PASSCODES FOR APPLICATIONS AND WEB SITES/SERVICES

      
Application Number 18402177
Status Pending
Filing Date 2024-01-02
First Publication Date 2025-07-03
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Mukherjee, Maharaj
  • Albero, George Anthony

Abstract

Automated updating/changing of passcodes based on network, application and/or website specific passcode rules. Passcode rules for passcodes stored in a passcode vault are identified, including passcode structure rules and passcode expiration rules. Subsequently the expiration dates trigger automatic update/change of the passcodes in accordance with the passcode structure rules. Additionally, networks, applications and/or web sites/services associated with the passcodes may be monitored for security threats, which, when detected, trigger automatic update/change of the passcodes in accordance with the passcode structure rules. Such updating/changing of the passcodes may be transparent to the users or the users may receive notification alerts. In further embodiments of the networks, applications and/or web sites services are monitored for changes to their respective passcode rules, such that future automated passcode updates/changes may occur in accordance with the updated passcode rules.

IPC Classes  ?

  • G06F 21/46 - Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

16.

System Simulation and Abnormality Detection

      
Application Number 18403154
Status Pending
Filing Date 2024-01-03
First Publication Date 2025-07-03
Owner Bank of America Corporation (USA)
Inventor
  • Mokkapati, Silpa
  • Ahuja, Yogi
  • Panda, Subhashish
  • Pandya, Tirtha
  • Lee, Jeonghoon
  • Zhitnitskiy, Roman

Abstract

Arrangements for simulation generation and abnormality detection are provided. In some examples, a computing platform may identify a plurality of applications for analysis. The computing platform may execute a plurality of simulated scenarios for each application and, based on execution of the simulated scenarios, the computing platform may capture abnormality results for each application. The abnormality results, as well as application information and/or simulated scenarios may be stored. In some examples, the computing platform may compare deployed versions of each application to the captured abnormality data to identify an abnormality in a deployed version of an application. Based on the identified abnormality, the computing platform may evaluate the identified abnormality to determine whether it can be resolved automatically. If so, the computing platform may execute one or more commands modifying the deployed application to resolve the abnormality.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

17.

DATA SANITIZER

      
Application Number 18401638
Status Pending
Filing Date 2024-01-01
First Publication Date 2025-07-03
Owner Bank of America Corporation (USA)
Inventor Alagar, Ramesh

Abstract

Provided herein is an automated data sanitization system for sanitizing and overlaying data to a non-production environment. The system may include a data sanitization rule engine, which may be configured to receive a recommended set of rules for sanitizing a data source and/or define rules for the dataset. The system may include a feature comparison component, which may be configured to generate suggested sanitization rules for a new dataset, based on comparison with previous datasets. The system may include a data sanitization component, which may be configured to implement sanitization of a plurality of datasets. The system may include a gatekeeper, which may be configured to restrict export of a non-sanitized data source and/or to restrict overlaying of a non-sanitized data source onto a non-production environment.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

18.

INTELLIGENT METHOD TO MINT BLOCKCHAIN TRANSACTION BASED ON INFORMATION IN DNA APPARATUS LEVERAGING GENERATIVE AI

      
Application Number 18401641
Status Pending
Filing Date 2024-01-01
First Publication Date 2025-07-03
Owner Bank of America Corporation (USA)
Inventor Singh, Shailendra

Abstract

A method, apparatus, and system for minting blockchain transactions, leveraging generative artificial intelligence (“AI”), based on information stored in a deoxyribonucleic acid (“DNA”) storage apparatus is provided. The method, apparatus, and system may include receiving a request to execute a transaction from a generative AI user prompt interface. The method, apparatus, and system may include, in response to receipt of the request, analyzing the request to identify user requirements associated with the request, generating a smart contract for each of the user requirements, and converting each of the user requirements to a binary code. The method, apparatus, and system may include synthesizing a DNA sequence including nucleotides, each group of the nucleotides corresponding to one of the binary codes. The method, apparatus, and system may include, after the synthesizing of the DNA sequence, producing a blockchain storing data relating to the transaction using data stored in the DNA sequence.

IPC Classes  ?

  • G06N 3/123 - DNA computing
  • G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computersPlatforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing

19.

Monitor and Control Toxic Configuration in Container Deployment

      
Application Number 18401950
Status Pending
Filing Date 2024-01-02
First Publication Date 2025-07-03
Owner Bank of America Corporation (USA)
Inventor
  • Sundaravel, Manimaran
  • Sethia, Maneesh
  • Singh, Shailendra

Abstract

Systems and processes are disclosed to monitor and control toxic configuration in software container deployment. AI-based monitor in each node provides end-to-end fault management system that can detect, diagnose, classify, and suggest remediation actions for non-virtualized cloud-based misconfiguration vulnerabilities. Anomalies are diagnosed using pre-computed fault signatures and automated remediation is integrated with a cloud management stack. Multiple monitoring layers within nodes secure the container-based virtualization environment. Container-based “CSTC security framework” virtualization technology provides security and identifies potential toxic configuration threats. CSTC security locates container-based systems at severe risk for DDOS attacks to kernel vulnerability/container breakout and ensures appropriate privilege configuration for user processes. Resource access limited based on policies and CSTC security profiles as well as provide AI-based monitoring of container runtime behavior to provide additional security layer that ensures safety and protection in container-based virtualization.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

20.

SINGLE DEVICE-LEVEL PASSCODE THAT PROVIDES AUTOMATED ACCESS TO MULTIPLE COMPUTING DEVICES AND PASSCODE-PROTECTED APPLICATIONS AND WEB SITES/SERVICES

      
Application Number 18402149
Status Pending
Filing Date 2024-01-02
First Publication Date 2025-07-03
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Mukherjee, Maharaj
  • Albero, George Anthony

Abstract

A single device-level passcode serves to unlock a passcode vault, such that, automated login/access to other computing devices, applications, networks and/or websites/web services, which have the user's passcodes stored in the vault, occurs. Specifically, in the case of other computing devices, short-range wireless communication between the initial logged-in computing device and another computing device triggers retrieval of the other computing devices passcode from the passcode vault and automated user log-in at other computing device. The passcode may be mapped to previously-captured user characteristics, such that multi-factored authentication including user characteristic verification may occur at the time the passcode vault is unlocked (i.e., when the single passcode is entered), continuously throughout the device session and/or when the passcode vault is accessed to retrieve a passcode for another device, network, application or web site/service.

IPC Classes  ?

  • H04W 12/06 - Authentication
  • H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

21.

Orchestrate events in Distributed DevOps Apparatus Leveraging Generative AI

      
Application Number 18402254
Status Pending
Filing Date 2024-01-02
First Publication Date 2025-07-03
Owner Bank of America Corporation (USA)
Inventor
  • Singh, Shailendra
  • Gupta, Saurabh

Abstract

Systems and methods for orchestrating events in distributed DevOps apparatus leveraging generative AI are disclosed to automate and streamline software development and deployment in distributed DevOps environments using Generative Adversarial Networks (GANs) and other AI techniques. The method involves interpreting UML diagrams, design documents, or the like with generative AI and computer vision to create DevOps tasks, integrating with various DevOps tools for task management, and deploying generated rules for automated event execution. Metadata is generated and processed in order to facilitate AI analysis. The systems and methods reduce manual intervention, increase efficiency, and improve accuracy, scalability, security, and compliance in DevOps workflows.

IPC Classes  ?

  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

22.

PROVIDING EXPLAINABLE ARTIFICIAL INTELLIGENCE USING DISTRIBUTED LEDGER TECHNOLOGY

      
Application Number 19083983
Status Pending
Filing Date 2025-03-19
First Publication Date 2025-07-03
Owner Bank of America Corporation (USA)
Inventor Mukherjee, Maharaj

Abstract

Aspects related to providing explainable artificial intelligence (XAI) using distributed ledger technology are provided. An XAI platform may train a first iteration of a deep learning model. The platform may store a record of the model to a distributed ledger. The platform may automatically perform an iterative recording process to generate additional iterations of the model and store records of the additional iterations of the model. During the process, the platform may receive outputs of the model. Based on the outputs, the platform may identify an anomalous output. The platform may identify one or more source iterations of the model that correspond to the anomalous output. The platform may initiate one or more response actions based on identifying the one or more source iterations of the model.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G01D 21/02 - Measuring two or more variables by means not covered by a single other subclass
  • G06F 40/30 - Semantic analysis
  • G06N 20/00 - Machine learning
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

23.

SYSTEM FOR FEATURELESS IMAGE CATEGORIZATION AND RECOGNITION USING UNSUPERVISED LEARNING

      
Application Number 19084295
Status Pending
Filing Date 2025-03-19
First Publication Date 2025-07-03
Owner BANK OF AMERICA CORPORATION (USA)
Inventor Mukherjee, Maharaj

Abstract

Systems and methods are described for image categorization and recognition using unsupervised learning. The disclosure is configured to receive an unseen image; implement a first filter on the unseen image to generate a first version of the unseen image; implement a second filter on the first version of the unseen image to generate a second version of the unseen image; determine a subset of the second version of the recorded images that matches the second version of the unseen image; retrieve a subset of first version of recorded images associated with the subset of second version of recorded images; and determine a first recorded image from the subset of the first version of the recorded images that matches the first version of the unseen image. Thereafter, retrieve a first set of responsive actions associated with the first recorded image and provide the first set of responsive actions to the device.

IPC Classes  ?

  • G06V 10/75 - Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video featuresCoarse-fine approaches, e.g. multi-scale approachesImage or video pattern matchingProximity measures in feature spaces using context analysisSelection of dictionaries
  • G06V 10/36 - Applying a local operator, i.e. means to operate on image points situated in the vicinity of a given pointNon-linear local filtering operations, e.g. median filtering
  • G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects

24.

Transforming mainframe processes and routing based on system status

      
Application Number 19084379
Status Pending
Filing Date 2025-03-19
First Publication Date 2025-07-03
Owner Bank of America Corporation (USA)
Inventor
  • Iley, Dean Alan
  • Punekar, Ashish
  • House, Jr., Lester B.

Abstract

A mainframe processing system comprises a memory operable to store data transformation instructions and one or more processors, at least one of the one or more processors operably coupled to the memory. The one or more processors are configured to receive batch processing data from one or more data sources, identify a plurality of mainframe processes associated with corresponding batch processes, and dispatch each mainframe process to a respective mainframe site.

IPC Classes  ?

  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 9/46 - Multiprogramming arrangements
  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/30 - Monitoring

25.

GENERATING PASSWORD COMPLEXITY RULES BASED ON ATTACK PATTERN ANALYSIS USING HASH SEGMENTATION

      
Application Number 19084940
Status Pending
Filing Date 2025-03-20
First Publication Date 2025-07-03
Owner Bank of America Corporation (USA)
Inventor
  • Yarabolu, Vijay Kumar
  • Sundararaj, Gowthaman

Abstract

Aspects of the disclosure relate to a network traffic monitoring platform. The platform may train an attack pattern analysis model to output a behavior profile and a cumulative attack score. The platform may identify a password failure rate spike. The platform may extract a password hash from the network traffic. The platform may generate the behavior profile based on the password hash. The platform may generate the cumulative attack score based on the behavior profile. The platform may compare the cumulative attack score to a threshold. Based on identifying that the cumulative attack score is below the threshold, the platform may identify the password hash as a secure hash. Based on identifying that the cumulative attack score meets or exceeds the threshold, the platform may and generate password complexity rules. The platform may refine the attack pattern analysis model based on the attacked hash and the cumulative attack score.

IPC Classes  ?

26.

System and method for data block analysis prioritization and routing via quantum machine learning

      
Application Number 18625526
Grant Number 12346407
Status In Force
Filing Date 2024-04-03
First Publication Date 2025-07-01
Grant Date 2025-07-01
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Singh, Shailendra
  • Loganathan, Suresh

Abstract

Systems, computer program products, and methods are described herein for data block analysis prioritization and routing via quantum machine learning. The present disclosure includes retrieving distributed ledger transactions, retrieving a stream of telemetry data of computer hardware, clustering, based on the transaction metadata, the distributed ledger transactions using a clustering engine, generating, using a machine learning model, a predetermined number of transaction placement schemas of the computer hardware, determining, from a probability output by parallel simulation testing via a quantum computer, a prime schema and a configuration of the prime computer hardware, and routing, based on the prime schema, a transaction cluster to the prime computer hardware.

IPC Classes  ?

  • G06F 18/2321 - Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions
  • G06N 10/60 - Quantum algorithms, e.g. based on quantum optimisation, or quantum Fourier or Hadamard transforms

27.

Generative artificial intelligence-based automated teller machine process generation

      
Application Number 18654126
Grant Number 12347283
Status In Force
Filing Date 2024-05-03
First Publication Date 2025-07-01
Grant Date 2025-07-01
Owner Bank of America Corporation (USA)
Inventor
  • Mattison, Paul
  • Williams, Matthew
  • Raley, Jennifer

Abstract

Arrangements for using generative artificial intelligence models for ATM process generation are provided. In some examples, a computing platform may receive, from at least one image or measurement capture device, dimension data associated with an ATM. The ATM may have a plurality of components arranged on a face of the ATM. The dimension data may be input to a generative artificial intelligence model and the model may be executed to output, based on the dimension data, a position or location of each ATM component relative to a reference point on the ATM. In some examples, the model may further output at least one audio script describing the location of each component. The model may output one or more translations of the at least one audio script. The computing platform may transmit or send the at least one audio script to the ATM for presentation during user interaction with the ATM.

IPC Classes  ?

  • G07F 19/00 - Complete banking systemsCoded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines

28.

CAPITAL MARKET JOURNEYS

      
Serial Number 99257549
Status Pending
Filing Date 2025-06-27
Owner Bank of America Corporation ()
NICE Classes  ? 41 - Education, entertainment, sporting and cultural services

Goods & Services

Entertainment services, namely, providing podcasts in the field of profiling businesses and preparing for and evaluating business transactions

29.

CAPITAL MARKET JOURNEYS

      
Serial Number 99257551
Status Pending
Filing Date 2025-06-27
Owner Bank of America Corporation ()
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

Downloadable podcasts in the field of profiling businesses and preparing for and evaluating business transactions

30.

VOICE BASED FEATURE EXTRACTION AND OPTICAL RECEPTIVE NET FOR NON-FUNGIBLE TOKEN TRANSFER

      
Application Number 19070960
Status Pending
Filing Date 2025-03-05
First Publication Date 2025-06-26
Owner Bank of America Corporation (USA)
Inventor
  • Bidkar, Prashant Anna
  • Upadhyaya, Ankit
  • Khare, Prashant
  • Dey, Subrojyoti

Abstract

Aspects of the disclosure relate to NFT exchanges. A computing platform may generate a plurality of F-NFTs including F-NFT identifiers that configure the F-NFTs for end-to-end tracking. The computing platform may extract, from a voice communication, information of a request to transfer an F-NFT. The computing platform may generate, based on the information of the request, a text file. The computing platform may input, into a GPT-4 algorithm, the text file to produce a F-NFT contract identifying the F-NFT, the transferor of the F-NFT, and a transferee of the F-NFT. The computing platform may send, to an NFT exchange platform, the F-NFT contract, which may cause the NFT exchange platform to transfer custody of the F-NFT from an account of the transferor at a first institution to an account of the transferee at a second institution.

IPC Classes  ?

31.

TRACKING OF DIGITAL RESOURCES ACROSS MULTIPLE VIRTUAL REALITY COMPUTING ENVIRONMENTS

      
Application Number 19072692
Status Pending
Filing Date 2025-03-06
First Publication Date 2025-06-19
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Albero, George Anthony
  • Kocharyan, Olga
  • Kral, Elizabeth Rhodes

Abstract

Tracking digital resources used in resource exchange events conducted in virtual reality computing environments. Digital resources used in resource exchange events conducted in virtual reality computing environments are tagged with data that at least identifies the location of the resource exchange event in terms of virtual reality computing environment and/or sub-environments. In response, machine-learning algorithm(s) are implemented that analyze the tags to determine resource exchange event movement patterns for specific digital resources. The resource exchange event movement patterns may include digital resource movement across multiple different virtual computing environments.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 9/40 - Network security protocols

32.

Cloud Infrastructure Using Machine Learning and Non-Fungible Tokens (NFT) for Enhanced Security

      
Application Number 19071001
Status Pending
Filing Date 2025-03-05
First Publication Date 2025-06-19
Owner Bank of America Corporation (USA)
Inventor
  • Kutthumolu, Durga Prasad
  • Singh, Shailendra

Abstract

A computing platform may train, using historical information classification information, an information classification model, which may configure the information classification model to classify information and identify, based on the classification, a storage location. The computing platform may receive, from a user device, a request to store information. The computing platform may identify, using the information classification model, a cloud based storage location for the information. The computing platform may generate an NFT representative of the first cloud based storage location. The computing platform may direct a cloud based storage system to store the information at the cloud based storage location. The computing platform may send, to the user device, the NFT. The computing platform may receive, from the user device, the NFT and a request to access the information. Based on validating the NFT, the computing platform may grant the user device access to the information.

IPC Classes  ?

  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

33.

SYSTEM AND METHOD FOR LEVERAGING DISTRIBUTED REGISTER TECHNOLOGY TO MONITOR, TRACK, AND RECOMMEND UTILIZATION OF RESOURCES

      
Application Number 19072566
Status Pending
Filing Date 2025-03-06
First Publication Date 2025-06-19
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Ramasamy, Suki
  • Ramadurai, Sudharsan

Abstract

Embodiments of the present invention provide a system for leveraging distributed register technology to securely monitoring, tracking, and recommending utilization of resources. The system is configured for gathering one or more input parameters from one or more entity systems, collecting activity data from one or more third party systems, analyzing the activity data collected from the one or third party systems, generating one or more recommendations based on the one or more input parameters and analyzing the activity data, wherein the one or more recommendations are associated with one or more activities, estimating resource usage for the one or more recommendations, and allocating resources to the one or more recommendations.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

34.

Systems and methods for integrated analysis of foreground and background communication data

      
Application Number 18731906
Grant Number 12332858
Status In Force
Filing Date 2024-06-03
First Publication Date 2025-06-17
Grant Date 2025-06-17
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Taylor, Jo-Ann
  • Mayers, Kyle
  • Hablutzel, Kathleen Rae
  • Kocharyan, Olga
  • Kim, Jinna
  • Berry, Anna

Abstract

Systems, and methods are described herein for integrated analysis of foreground and background communication data. The present disclosure is configured to collect foreground communication data from one or more data sources; collect background communication data from one or more data sources; pre-process the collected data to clean, normalize, and transform it into a uniform format; integrate the pre-processed data into a cohesive dataset via data alignment based on common identifiers such as timestamps or session IDs; analyze the integrated dataset using an artificial intelligence (AI) engine employing machine learning algorithms to identify patterns and generate responses based on the cohesive dataset; generate an initial AI response based on the analysis; present the AI-generated response and alternative solutions to a user through an interactive user interface; capture user feedback on the presented responses and alternative solutions; and retrain the AI engine based on the captured user feedback to improve future decision-making.

IPC Classes  ?

  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/215 - Improving data qualityData cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
  • G06F 16/26 - Visual data miningBrowsing structured data

35.

ELECTRONIC ARTIFICIAL INTELLIGENCE SYSTEM FOR AUTHENTICATING SOFTWARE

      
Application Number 19046279
Status Pending
Filing Date 2025-02-05
First Publication Date 2025-06-12
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Bouchard, Pierre Jacques
  • Kurian, Manu Jacob
  • Reilly, John L.
  • Vishnubhotla, Lakshminarayana

Abstract

An artificial intelligence (AI) and machine learning (ML) (collectively “AI/ML”) system that provides dynamic detection of potential of resource updates, authentication of the resources updates, and tracking of the links between resources through the use of resource signatures. The resource signatures may provide an indication of the application information, the resources that are accessed by the application, and the resources that access the application. As such, the AI/ML system can monitor and track the applications and updated resources that interact with the applications in order to identify any potential security issues, as well as to optimize and standardize the use of resources by the users when developing applications.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

36.

TechWiki - Computer Diagnostics using Quantum Annealing and Blockchain Framework

      
Application Number 19055815
Status Pending
Filing Date 2025-02-18
First Publication Date 2025-06-12
Owner Bank of America Corporation (USA)
Inventor
  • Nigudkar, Avinash
  • Battiprolu, Vijay Kumar

Abstract

A quantum computing system for determining diagnostic solutions for detected faults in computing devices using at least quantum annealing is described. The quantum computing system takes advantage of superposition and entanglement properties of qubits. A plurality of qubits is initialized into states representing historical data associated with historical faults and historical diagnostic solutions. Couplers entangle the plurality of qubits together based on the detected fault, generating a set of states in uniform superposition. Biases influence the energy levels of the set of states based on the detected fault. The quantum computing system measures a state with the lowest energy level within the set of states to determine diagnostic solutions to the detected fault. The system may further leverage a blockchain ledger for securely storing and accessing historical data associated with historical faults and historical diagnostic solutions.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 16/23 - Updating
  • G06N 10/70 - Quantum error correction, detection or prevention, e.g. surface codes or magic state distillation

37.

CROSS CHANNEL DIGITAL DATA STRUCTURES INTEGRATION AND CONTROLS

      
Application Number 19055884
Status Pending
Filing Date 2025-02-18
First Publication Date 2025-06-12
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Krasuk, Silvia Adriana
  • Zafar, Mansoor
  • Khanna, Saurabh
  • Heller, Ryan Scott
  • Chowdarapu, Muralidhar

Abstract

Embodiments of the invention are directed to a system, method, or computer program product for convenient, secure digital data archiving and utilization across multiple communication channels. The system and methods may also include an array of indications regarding what documents may be required to be uploaded by a user, how many documents to upload, and a confirmation of documents uploaded being the correct types following a user upload action. As such, the system may utilize JSON templates indicating a number of required documents, a correct confirmation message following document upload, and a mechanism for confirming that the documents being uploaded are the correct types of documents via an analysis of input fields of the uploaded documents.

IPC Classes  ?

  • G06F 3/0483 - Interaction with page-structured environments, e.g. book metaphor

38.

System and method for managing metaverse instances

      
Application Number 19056439
Status Pending
Filing Date 2025-02-18
First Publication Date 2025-06-12
Owner Bank of America Corporation (USA)
Inventor
  • Arora, Saurabh
  • Chauhan, Sandeep Kumar
  • Polasa, Puneetha
  • Taggar, Sanchit
  • Mallidi, Bhagya Lakshmi Sudha Lavanya

Abstract

A method for managing metaverse instances includes registering a physical control level for a user. The physical control level includes information about physical locations and data items that the user is allowed to access within an entity. A digital identity is generated for the user. The digital identity includes a virtual control level for an avatar of the user and allows the avatar to access a metaverse instance of a metaverse of the entity. The virtual control level is synchronized with the physical control level. Computing resources to be allocated to the metaverse instance are determined. A first instruction is sent to a metaverse server to open the metaverse instance. A second instruction is sent to the metaverse server to allocate the computing resources to the metaverse instance. A third instruction is sent to the metaverse server to generate the avatar. The avatar is allowed access to the metaverse instance.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 12/14 - Protection against unauthorised use of memory

39.

Security Escrow System

      
Application Number 18531217
Status Pending
Filing Date 2023-12-06
First Publication Date 2025-06-12
Owner Bank of America Corporation (USA)
Inventor
  • Bishop, Jack
  • Keller, Betsy Balgooyen
  • Sharief, Luqman
  • Doyle, Basil C.
  • Pervaiz, Yasir

Abstract

Various aspects of the disclosure relate to enforcing dynamically updated network security policies in real-time (or upon an identified update) from multiple organizations and anonymously analyze computing system configuration information uploaded from third-party computing systems. An analysis engine monitors compliance information and compare the compliance information against the security rules and/or requirements for one or more enterprise networks. A visualization providing a network map with a visual representation of each product system service system may include communication links between internal applications and/or computing systems and drill-down capability to identify issues as they are occurring or are predicted to occur. The security escrow system may include a mechanism to automatically enable/disable access between third party networks and one or more enterprise computing systems in real-time based on identified compliance information.

IPC Classes  ?

40.

RESPONSE FILTERING TO DETECT MALWARE

      
Application Number 18531457
Status Pending
Filing Date 2023-12-06
First Publication Date 2025-06-12
Owner Bank of America Corporation (USA)
Inventor
  • Buchanan, Aaron
  • Felipe, Jeffrey
  • Leedy, Jr., Robert Timothy
  • Mackay, Dana Tishgarten
  • Magura, Heidi L.
  • Mcfeeters, Karen
  • Siekman, James
  • Williams, Stephen J.
  • Malarkey, Michael Thomas

Abstract

Enterprise organizations often have thousands or tens of thousands of employees accessing various websites while conducting business. Users may inadvertently reach compromised websites, unsecure websites, and/or websites that include broken links, which may be used by bad actors to redirect users to websites that include malware threats. Accordingly, arrangements described herein provide for real-time detection and notification of non-functioning websites to enable users to avoid potential malicious acts associated with these non-functioning websites.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

41.

System and method for automated data item degradation detection

      
Application Number 18533347
Grant Number 12353399
Status In Force
Filing Date 2023-12-08
First Publication Date 2025-06-12
Grant Date 2025-07-08
Owner Bank of America Corporation (USA)
Inventor
  • Pirman, Stephanie Margaret
  • Texada, Jeffrey Wayne
  • Depree, Eric Joseph

Abstract

A method includes analyzing a first log of a first log type generated by a first data store and determining if the first log has a first format of the first log type. In response to determining that the first log does not have the first format of the first log type, the first data store and the first log type are identified as degraded. A first impact score is determined for the first log type. First dependency information is analyzed for the first data store. In response to determining that no data store receives data items from the first data store, a report is generated. The report includes an identification that the first data store is degraded, an identification that the first log type is degraded, and the first impact score associated with the first log type.

IPC Classes  ?

  • G06F 16/20 - Information retrievalDatabase structures thereforFile system structures therefor of structured data, e.g. relational data
  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 16/23 - Updating

42.

System and method for automated data pipeline degradation detection

      
Application Number 18533516
Status Pending
Filing Date 2023-12-08
First Publication Date 2025-06-12
Owner Bank of America Corporation (USA)
Inventor
  • Pirman, Stephanie Margaret
  • Texada, Jeffrey Wayne
  • Depree, Eric Joseph

Abstract

A method analyzes dependency information for a first data store. Upon determining that a data pipeline associates a first log type generated by the first data store with a second log type generated by a second data store, a first number of logs of the first log type that are generated at a first time, a first baseline number, and a first threshold value are determined. Upon determining that the first number of logs differs from the first baseline number by less than the first threshold value, a second number of logs of the second log type that are generated at a second time, a second baseline number, and a second threshold value are determined. Upon determining that the second number of logs differs from the second baseline number by more than the second threshold value, the data pipeline is identified as degraded.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

43.

Automated System for Detecting Likelihood of Falsified Outputs from Large Language Models (LLM)

      
Application Number 18535069
Status Pending
Filing Date 2023-12-11
First Publication Date 2025-06-12
Owner Bank of America Corporation (USA)
Inventor
  • Banuelos, Anthony
  • Pirman, Stephanie
  • Osorio, Marvin

Abstract

A computing platform may generate, using a test case generation model, a plurality of large language model (LLM) test cases. The computing platform may input, into an LLM, the plurality of LLM test cases, which may produce a plurality of unverified LLM test results. The computing platform may input, into a validation model, the plurality of LLM test cases, which may produce a plurality of validated LLM test results. The computing platform may compare, using a falsified output evaluation model, the plurality of unverified LLM test results with the corresponding plurality of validated LLM test results, which may produce an LLM compliance score for the LLM. The computing platform may compare the LLM compliance score to a compliance threshold. Based on identifying that the LLM compliance score meets or exceeds the compliance threshold, the computing platform may automatically deploy the LLM for use in an enterprise environment.

IPC Classes  ?

  • G06N 3/0455 - Auto-encoder networksEncoder-decoder networks

44.

HONEYPOTTED FILE DETECTION

      
Application Number 18530788
Status Pending
Filing Date 2023-12-06
First Publication Date 2025-06-12
Owner Bank of America Corporation (USA)
Inventor
  • Nanney, Eric C.
  • Tweel, Benjamin
  • Wilson, Pamela

Abstract

A computing platform may train a machine learning model to detect and analyze threat actor activities. The computing platform may generate dynamic honeypotted files and deploy the generated dynamic honeypotted files as adaptive defenses to threat actors in a computing environment. The computing platform may adapt to threat actor activities based on analyzed behavior of the threat actor and any identified tools used by the threat actor to gain access to the computing system. Threat actor activities may be written to a blockchain to publicly record all transactions related to a threat actor's activities for analysis and generation of adaptive defenses to threat actor attacks. The computing platform may cause redirection of the threat actor into a specific computing environment through generation and deployment of dynamic honeypotted files.

IPC Classes  ?

45.

Artificial Intelligence Based Real-Time Security Escrow System

      
Application Number 18531292
Status Pending
Filing Date 2023-12-06
First Publication Date 2025-06-12
Owner Bank of America Corporation (USA)
Inventor
  • Bishop, Jack
  • Keller, Betsy Balgooyen
  • Sharief, Luqman
  • Doyle, Basil C.
  • Pervaiz, Yasir
  • Solideo, Camilla
  • Farris, Caroline

Abstract

Various aspects of the disclosure relate to enforcing dynamically updated network security policies in real-time (or upon an identified update) from multiple organizations and anonymously analyze computing system configuration information uploaded from third-party computing systems. An analysis engine monitors compliance information and compare the compliance information against the security rules and/or requirements for one or more enterprise networks. A visualization providing a network map with a visual representation of each product system service system may include communication links between internal applications and/or computing systems and drill-down capability to identify issues as they are occurring or are predicted to occur. The security escrow system may include a mechanism to automatically enable/disable access between third party networks and one or more enterprise computing systems in real-time based on identified compliance information.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

46.

Security Escrow System

      
Application Number 18531376
Status Pending
Filing Date 2023-12-06
First Publication Date 2025-06-12
Owner Bank of America Corporation (USA)
Inventor
  • Bishop, Jack
  • Keller, Betsy Balgooyen
  • Sharief, Luqman
  • Doyle, Basil C.
  • Ward, Stephen

Abstract

Various aspects of the disclosure relate to enforcing dynamically updated network security policies in real-time (or upon an identified update) from multiple organizations and anonymously analyze computing system configuration information uploaded from third-party computing systems. An analysis engine monitors compliance information and compare the compliance information against the security rules and/or requirements for one or more enterprise networks. A visualization providing a network map with a visual representation of each product system service system may include communication links between internal applications and/or computing systems and drill-down capability to identify issues as they are occurring or are predicted to occur. The security escrow system may include a mechanism to automatically enable/disable access between third party networks and one or more enterprise computing systems in real-time based on identified compliance information.

IPC Classes  ?

47.

Dynamic Honeypot Generation and Deployment

      
Application Number 18532521
Status Pending
Filing Date 2023-12-07
First Publication Date 2025-06-12
Owner Bank of America Corporation (USA)
Inventor
  • Jones, Ashley
  • Shi, Joshua
  • Tweel, Benjamin
  • Yanan, Frank
  • Nanney, Eric C.
  • Pavalon, Benjamin

Abstract

A computing platform may train a machine learning model to detect and analyze threat actor activities. The computing platform may generate dynamic honeypots and deploy the generated dynamic honeypots as adaptive defenses to threat actors in a computing environment. The computing platform may adapt to threat actor activities based on analyzed behavior of the threat actor and any identified tools used to by the threat actor to gain access to the computing system. The computing platform may cause redirection of the threat actor into a specific computing environment through generation and deployment of dynamic honeypots.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 5/022 - Knowledge engineeringKnowledge acquisition

48.

Natural Language Processing (NLP) Enabled Continuous Integration and Continuous Delivery (CICD) Deployment

      
Application Number 19055587
Status Pending
Filing Date 2025-02-18
First Publication Date 2025-06-12
Owner Bank of America Corporation (USA)
Inventor
  • Iruvanti, John Dinakar
  • Kannaveni, Komuraiah
  • Dongle, Panduranga

Abstract

A computing platform may configure a dependency knowledge graph indicating file dependencies for mainframe applications, and an error knowledge graph indicating errors and corresponding solutions for the mainframe applications. The computing platform may receive mainframe source code. The computing platform may analyze, using the knowledge graphs, the mainframe source code to identify potential errors and corresponding solutions. Based on identifying an error in the mainframe source code, the computing platform may cause the mainframe source code to be updated according to the corresponding solution. The computing platform may analyze, using the dependency knowledge graph and the error knowledge graph, the updated mainframe source code to identify remaining errors. Based on identifying an absence of the remaining errors, the computing platform may send, to a mainframe build and deployment engine, the updated mainframe source code, which may cause the mainframe build and deployment engine to automatically execute a build process.

IPC Classes  ?

49.

SYSTEMS FOR ESTABLISHING AND CONTROLLING ACCESS AND PRIVILEGES IN A VIRTUAL REALITY COMPUTING ENVIRONMENT BASED ON AUTHENTICATED IDENTITIES

      
Application Number 19056038
Status Pending
Filing Date 2025-02-18
First Publication Date 2025-06-12
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Mukherjee, Maharaj
  • Albero, George Anthony
  • Thakur, Prashant

Abstract

Access control within a virtual reality computing system(s) is provided. Once a user requests entry into a virtual reality computing environment and their identity is verified (i.e., authenticating), access privileges are determined/assigned for the user that restrict or allow user access to virtual locations and/or virtual objects/avatars present in the virtual reality computing environment. In specific instances, the access privileges may be dynamically altered during the user's virtual reality computing session based on the user's interactions or other behaviors exhibited during the user's virtual reality computing session. As such the present invention provides necessary control over what areas of a virtual reality computing environment a user can access and/or which virtual objects/avatars a user can interact with.

IPC Classes  ?

  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • G06T 7/20 - Analysis of motion
  • G06T 7/70 - Determining position or orientation of objects or cameras
  • G06V 10/74 - Image or video pattern matchingProximity measures in feature spaces

50.

BOFA REWARDS

      
Serial Number 99221412
Status Pending
Filing Date 2025-06-06
Owner Bank of America Corporation ()
NICE Classes  ? 35 - Advertising and business services

Goods & Services

Promoting various banking and financial services by means of discounts, advertisements, and incentives generated in connection with customers' use of deposit accounts, checking accounts, certificates of deposit, individual retirement accounts, brokerage accounts and general investment accounts

51.

BOFA

      
Serial Number 99221410
Status Pending
Filing Date 2025-06-06
Owner Bank of America Corporation ()
NICE Classes  ? 35 - Advertising and business services

Goods & Services

Promoting various banking and financial services by means of discounts, advertisements, and incentives generated in connection with customers' use of deposit accounts, checking accounts, certificates of deposit, individual retirement accounts, brokerage accounts and general investment accounts

52.

BOFA REWARDS

      
Serial Number 99221413
Status Pending
Filing Date 2025-06-06
Owner Bank of America Corporation ()
NICE Classes  ? 35 - Advertising and business services

Goods & Services

Promoting various banking and financial services by means of discounts, advertisements, and incentives generated in connection with customers' use of deposit accounts, checking accounts, certificates of deposit, individual retirement accounts, brokerage accounts and general investment accounts

53.

INTELLIGENT RESOURCE EVALUATOR SYSTEM FOR ROBOTIC PROCESS AUTOMATIONS

      
Application Number 19042458
Status Pending
Filing Date 2025-01-31
First Publication Date 2025-06-05
Owner Bank of America Corporation (USA)
Inventor
  • Balu, Sudhakar
  • Doraiswamy, Sri Lakshmi Priya
  • Paini, Siva Kumar
  • Sama, Nagalaxmi
  • Thamilarasan, Sathya

Abstract

Aspects of the disclosure relate to an intelligent resource evaluation engine. A computing platform may monitor the plurality of RPA machines to detect parameter information. The computing platform may store the parameter information along with corresponding RPA machines as a key value pairs in a database. The computing platform may identify first current parameter information for a first RPA machine using the key value pairs. The computing platform may input the first current parameter information into an intelligent resource evaluation model, which may output first machine selection information for the first RPA machine. Based on identifying that the first RPA machine is sufficient to execute the first robotic automation process, the computing platform may send direct the first RPA machine to execute the first robotic automation process.

IPC Classes  ?

  • G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

54.

Polymorphic Non-Attributable Website Monitor

      
Application Number 19043896
Status Pending
Filing Date 2025-02-03
First Publication Date 2025-06-05
Owner Bank of America Corporation (USA)
Inventor
  • Zink, Robert
  • Depree, Eric
  • Pirman, Stephanie
  • Wilson, Jared

Abstract

Polymorphic non-attributable processes and architectures to monitor threat domains (e.g., pharming or phishing websites) are disclosed. Obfuscated requests may be generated by control servers to be blended in with normal traffic sent over cloud networks with randomized exit nodes or with normal traffic sent through an anonymization network. Requests may be sent at randomized intervals or time periods determined algorithmically. The requests are obfuscated in order to mask the origination information and location so that the threat actor does not detect that the website is being monitored. User agents may be spoofed and requests may present as if they originated from residential IP addresses. Automatic real-time monitoring can be provided to determine when sites resolve and are addressable. Fingerprint information, screenshots, security certificate, and other threat domain data can be captured. Request responses can be scanned for threat indicia.

IPC Classes  ?

55.

Dynamically Providing Real-Time Configuration of Data Research Control Limits

      
Application Number 19043929
Status Pending
Filing Date 2025-02-03
First Publication Date 2025-06-05
Owner Bank of America Corporation (USA)
Inventor
  • Akarapu, Om Purushotham
  • Akula, Kaushik Kumar
  • Jena, Bibhudatta
  • Mounika, Nunna Venkata Sri Satya
  • Sivaram, Ragala Manoj
  • Basarveni, Rajashekar Gangaram
  • Ramakrishnamraju, Rudraraju

Abstract

Aspects of the disclosure relate to computing hardware and software for dynamic control limit configuration. A computing platform may receive and format historical data. The computing platform may input the formatted data into a control limit prediction model, which may output predicted control limits by weighting, using an ensemble model, outputs from a plurality of other models to produce predicted control limits. The computing platform may adjust existing control limits based on predicted control limits to create actual control limits. The computing platform may receive real time data, and may identify, using the actual control limits and the real time data, a deviation score for the real time data. The computing platform may compare the deviation score to the actual control limits. Based on detecting that the deviation score breaches the actual control limits, the computing platform may send an indication of the breach.

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

56.

PEER TO PEER MOBILE TRANSACTIONS LEVERAGING PERSONAL AREA NETWORKS AND ROBUST POST-TRANSACTION VERIFICATION

      
Application Number 19045609
Status Pending
Filing Date 2025-02-05
First Publication Date 2025-06-05
Owner Bank of America Corporation (USA)
Inventor
  • Dolan, Heather
  • Kurian, Manu
  • Mukherjee, Maharaj

Abstract

A method for facilitating electronic transactions between a first mobile device and a second mobile device is provided. At a central server, when internet connection is established, the method may include receiving transaction data and prior to processing an electronic transaction based on the transaction data, verifying the electronic transaction. The verifying may include retrieving a first activity log from the first mobile device and a first browser timeout history. The method may further include retrieving from the second mobile device a second activity log and a second browser timeout history. The method may further include verifying that a first mobile application was active when a browser on the first mobile device was in timeout and that a second mobile application was active when a browser on the second mobile device was in timeout.

IPC Classes  ?

  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists

57.

NON-FUNGIBLE TOKEN WITH ADAPTABLE DIGITAL FILES

      
Application Number 19045617
Status Pending
Filing Date 2025-02-05
First Publication Date 2025-06-05
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Berry, Anna Kristen Pingel
  • Ambulkar, Shweta
  • Hardman, Benjamin Daniel
  • Ianni, Angela
  • Joshi, Ravi
  • Kocharyan, Olga
  • Sharief, Luqman
  • Whitaker, Michael Wm.

Abstract

The invention relates to adaptation/alteration of a digital file referenced to a Non-Fungible Token (NFT) via NFT metadata-defined adaptation rules and criteria, i.e., predefined conditions or events that trigger the occurrence of digital file adaptation. The adapted digital file may be presented to indicate a change in a state associated with a specific type of NFT. The NFT may be an authentication NFT used to verify the identity of a user/users, and the digital file may be presented within computing networks or applications for conveying user authenticity to other users within the computing network or application. The predefined conditions are security events that have a positive/negative impact on the authenticity of the user or group of users. Occurrence of one or more of the predefined security events triggers adaptation and presentation of the adapted digital file indicating an increase/decrease in the level of authenticity associated with the user/users.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

58.

Method for Dynamic AI Supported Graph-Analytics Self Learning Templates

      
Application Number 19050377
Status Pending
Filing Date 2025-02-11
First Publication Date 2025-06-05
Owner Bank of America Corporation (USA)
Inventor
  • Paini, Siva
  • Bakshi, Sakshi

Abstract

Methods and systems described herein for addressing issues associated with varying graph analytics tools that require different tool-specific coding languages. An artificial intelligence (AI) sub-system of various modules extracts metadata from a dataset and identifies nodes and relationships in the dataset using the metadata. The dataset is matched with a corresponding graph-analytics template in a data store, and a dynamic template modifier modifies the corresponding graph-analytics template. In some examples, the AI system generates smart guided videos with logical breakpoints that are embedded along with templates for quick learning and to build faster graphical analytics. The AI system includes a dynamic template modifier and a cognitive smart AI engine that includes a graph.

IPC Classes  ?

59.

System and method to evaluate microservices integrated in Interactive Voice Response (IVR) operations

      
Application Number 18525494
Status Pending
Filing Date 2023-11-30
First Publication Date 2025-06-05
Owner Bank of America Corporation (USA)
Inventor
  • Sahoo, Amiya R.
  • Mahajan, Nipun
  • Randrup, Scott S.
  • Lutzkow, Robert E.
  • Daniel, Anand
  • Agrawal, Dinesh Kumar
  • Raghuvanshi, Yogesh
  • Alexandrov, Sergey

Abstract

An apparatus may comprise a memory communicatively coupled to a processor. The processor may be configured to receive an evaluation request to perform multiple data processing operations; determine a microservice configured to fulfill the first evaluation request; and determine multiple publishing commands associated with the microservice. The one or more microservices may be integrated in multiple Interactive Voice Response (IVR) operations. The processor may be further configured to obtain input parameters of the one or more input parameters corresponding to the microservice; generate a response to the evaluation request associated with the microservice, compare the response to an expected response of the one or more expected responses; and determine whether the response matches the expected response. In response to determining that the response does not match the expected response, the processor is configured to update the publishing commands in accordance with multiple rules and policies, and publish the microservice.

IPC Classes  ?

  • H04M 3/493 - Interactive information services, e.g. directory enquiries

60.

System and method to validate exceptions associated with data interactions using a tangle network

      
Application Number 18526410
Status Pending
Filing Date 2023-12-01
First Publication Date 2025-06-05
Owner Bank of America Corporation (USA)
Inventor
  • Maharaja, Raja Arumugam
  • Pal, Sonali
  • Manchanda, Priya
  • Kumar, Hitendra
  • Srinivasan, Subramanian
  • Chandran, Sharat
  • Singh, Anurag

Abstract

A plurality of data interactions are monitored and a plurality of potential exceptions relating to the data interactions are identified. Each potential exceptions is analyzed based on a respective pre-configured logic to determine a result relating to the potential exception. A plurality of data objects are generated, wherein each data object includes one or more of the potential exceptions, the results determined for the potential exceptions and other related data. The data objects are passed as nodes of a tangle associated with a tangle network. A federated machine learning (ML) model is deployed with each node passed to the tangle to determine whether the results are correct. A report is generated including a plurality of potential exceptions determined as valid.

IPC Classes  ?

  • G06N 3/098 - Distributed learning, e.g. federated learning

61.

Intuitive Defect Prevention with Swarm Learning Intelligence over Blockchain Network

      
Application Number 18527912
Status Pending
Filing Date 2023-12-04
First Publication Date 2025-06-05
Owner Bank of America Corporation (USA)
Inventor
  • Nigudkar, Avinash
  • Gopalakrishnan, Lingaraj
  • Puri, Anmol
  • Battiprolu, Vijay Kumar

Abstract

Aspects of the disclosure relate to s computing system that is configured to use heuristic and/or metaheuristic algorithms based on swarm learning (SL) intelligence frameworks and combine SL with blockchain and edge computing frameworks to provide a technologically efficient, responsive, and/or adaptable solution to detecting and preventing defects in software applications.

IPC Classes  ?

  • G06F 8/77 - Software metrics
  • G06F 11/22 - Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

62.

Intuitive Defect Prevention with Swarm Learning Intelligence over Blockchain Network

      
Application Number 18527991
Status Pending
Filing Date 2023-12-04
First Publication Date 2025-06-05
Owner Bank of America Corporation (USA)
Inventor
  • Nigudkar, Avinash
  • Gopalakrishnan, Lingaraj
  • Puri, Anmol
  • Battiprolu, Vijay Kumar

Abstract

Aspects of the disclosure relate to s computing system that is configured to use heuristic and/or metaheuristic algorithms based on swarm learning (SL) intelligence frameworks and combine SL with blockchain and edge computing frameworks to provide a technologically efficient, responsive, and/or adaptable solution to detecting and preventing defects in software applications.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06N 3/006 - Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]

63.

Intuitive Defect Prevention with Swarm Learning Intelligence over Blockchain Network

      
Application Number 18528183
Status Pending
Filing Date 2023-12-04
First Publication Date 2025-06-05
Owner Bank of America Corporation (USA)
Inventor
  • Nigudkar, Avinash
  • Gopalakrishnan, Lingaraj
  • Puri, Anmol
  • Battiprolu, Vijay Kumar

Abstract

Aspects of the disclosure relate to s computing system that is configured to use heuristic and/or metaheuristic algorithms based on swarm learning (SL) intelligence frameworks and combine SL with blockchain and edge computing frameworks to provide a technologically efficient, responsive, and/or adaptable solution to detecting and preventing defects in software applications.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 11/26 - Functional testing
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

64.

DYNAMIC RESPONSE ENGINE

      
Application Number 19043589
Status Pending
Filing Date 2025-02-03
First Publication Date 2025-06-05
Owner Bank of America Corporation (USA)
Inventor
  • Noorizadeh, Emad
  • Welles, Chris
  • Jhaveri, Rajan

Abstract

A hybrid system for natural language processing is provided. The system may include a transceiver operable to receive a query from a user. The query may include a stock portion integrated with a set of real-time conditions specific to the user. The transceiver may transmit the query to a model and to a response application. The model may receive the query and communicate with a data store. Based on historical data stored at the data store, the model may separate the stock portion from the set of real-time conditions, formulate a response to the stock portion and insert placeholders into the response for responses to the real-time conditions portion. The response application may receive the query and the response. The response application may communicate with private data stores to formulate responsive elements for the placeholders. The response application may insert the responsive elements into the placeholders to complete the response.

IPC Classes  ?

65.

SYSTEMS AND METHODS FOR VALIDATING THE ACCURACY OF AN AUTHENTICATED, END-TO-END, DIGITAL RESPONSE SYSTEM

      
Application Number 19043608
Status Pending
Filing Date 2025-02-03
First Publication Date 2025-06-05
Owner Bank of America Corporation (USA)
Inventor Chandrasekar, Ganesh

Abstract

Systems and methods for validating the accuracy of an authenticated, end-to-end, digital response system are provided. Methods may include curating a database of training data, including historical profile data and historical interaction data. Profile data may include a name, an identifier, and a set of financial instruments for a plurality of system users. Interaction data may include records of multi-step interactions between the system users and the digital response system. Methods may include generating, via a machine-learning (ML) engine and based on the training data: a test profile including a fictitious name, a fictitious identifier, and a fictitious set of financial instruments; authentication data for the test profile including a username and password that are operational for authenticating the test profile to the digital response system; and a simulated conversation for the test profile including an utterance that is associated with an intended request. Methods may include: initiating a validation session by logging the test profile into the digital response system using the authentication data; feeding the simulated conversation as an input to the digital response system; receiving a response from the digital response system; scoring the accuracy of the response vis-à-vis the intended request; generating an accuracy report based on the accuracy score; and submitting the accuracy report to a system administrator.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/31 - User authentication

66.

NON-FUNGIBLE TOKEN WITH ADAPTABLE DIGITAL FILES

      
Application Number 19045606
Status Pending
Filing Date 2025-02-05
First Publication Date 2025-06-05
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Berry, Anna Kristen Pingel
  • Ambulkar, Shweta
  • Hardman, Benjamin Daniel
  • Ianni, Angela
  • Joshi, Ravi
  • Kocharyan, Olga
  • Sharief, Luqman
  • Whitaker, Michael Wm.

Abstract

The invention relates to adaptation/alteration of a digital file referenced to a Non-Fungible Token (NFT) via NFT metadata-defined adaptation rules and criteria, i.e., predefined conditions or events that trigger the occurrence of digital file adaptation. The adapted digital file may be presented to indicate a change in a state associated with a specific type of NFT. The NFT may be an authentication NFT used to verify the identity of a user/users, and the digital file may be presented within computing networks or applications as a means of conveying user authenticity to other users within the computing network or application. The predefined conditions are security events that have a positive/negative impact on the authenticity of the user or group of users. Occurrence of one or more of the predefined security events triggers adaptation and presentation of the adapted digital file indicating an increase/decrease in the level of authenticity associated with the user/users.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

67.

NON-FUNGIBLE TOKEN WITH ADAPTABLE DIGITAL FILES

      
Application Number 19045629
Status Pending
Filing Date 2025-02-05
First Publication Date 2025-06-05
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Berry, Anna Kristen Pingel
  • Ambulkar, Shweta
  • Hardman, Benjamin Daniel
  • Ianni, Angela
  • Joshi, Ravi
  • Kocharyan, Olga
  • Sharief, Luqman
  • Whitaker, Michael Wm.

Abstract

The invention relates to adaptation/alteration of a digital file referenced to a Non-Fungible Token (NFT) via NFT metadata-defined adaptation rules and criteria, i.e., predefined conditions or events that trigger the occurrence of digital file adaptation. The adapted digital file may be presented to indicate a change in a state associated with a specific type of NFT. The NFT may be an authentication NFT used to verify the identity of a user/users, and the digital file may be presented within computing networks or applications for conveying user authenticity to other users within the computing network or application. The predefined conditions are security events that have a positive/negative impact on the authenticity of the user or group of users. Occurrence of one or more of the predefined security events triggers adaptation and presentation of the adapted digital file indicating an increase/decrease in the level of authenticity associated with the user/users.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

68.

AUTOMATED TELLER MACHINE ("ATM") COLOR TECHNOLOGY FOR MASS TRANSACTION PRE-STAGING

      
Application Number 18519148
Status Pending
Filing Date 2023-11-27
First Publication Date 2025-05-29
Owner Bank of America Corporation (USA)
Inventor Gupta, Saurabh

Abstract

Wait times at ATMs may undermine the utility of these self-service machines. ATMs are configured to provide faster self-service kiosks that allow users to quickly perform common financial transactions. However, it has been increasingly common for users to have to wait in a queue to access an ATM. Systems and methods are provided for an ATM that pre-stages transactions by extracting account balance, account status, account fraud, and other necessary information from a plurality of smart cards, before a user begins interacting with the ATM. Information extracted from the plurality of smart cards may be transferred to the ATM wirelessly. Color changes may then be sent from the ATM to the plurality of smart cards. The color changes indicate whether the plurality of smart cards may transact with the ATM without any additional information, thereby improving the transaction processing efficiency of the plurality of smart cards and enhancing user satisfaction.

IPC Classes  ?

  • G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems

69.

SYSTEMS AND METHODS FOR FAST AND SIMULTANEOUS MULTI-FACTOR AUTHENTICATION USING VECTOR COMPUTING

      
Application Number 18520054
Status Pending
Filing Date 2023-11-27
First Publication Date 2025-05-29
Owner Bank of America Corporation (USA)
Inventor Mukherjee, Maharaj

Abstract

Aspects of the disclosure relate to multi-factor authentication. A computing system may receive, from an authenticated entity, a plurality of authenticated inputs. Normalized authenticated inputs may be generated. An n-dimensional authenticated signature vector corresponding to the plurality of normalized authenticated inputs may be generated. A plurality of multi-factor authentication (MFA) inputs may be received. A plurality of normalized multi-factor authentication inputs may be generated. An n-dimensional multi-factor authentication vector corresponding to the plurality of normalized MFA input may be generated. There may be a determination of whether a distance between the n-dimensional authenticated signature vector and the multi-factor authentication vector not exceeding an authentication distance threshold. Based on the distance between the n-dimensional authenticated signature vector and the multi-factor authentication vector not exceeding the authentication distance threshold, an indication that the plurality of multi-factor authentication inputs have been authenticated may be generated.

IPC Classes  ?

70.

SYSTEMS AND METHODS FOR IMPROVING COMPUTING PERFORMANCE BY IMPLEMENTING AN APPLICATION PACKAGE ORCHESTRATOR IN AN ELECTRONIC ENVIRONMENT

      
Application Number 18520942
Status Pending
Filing Date 2023-11-28
First Publication Date 2025-05-29
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Jain, Eena
  • Shinde, Samir Chandrakant
  • Govuri, Anand
  • Shaik, Riaz Mohammad
  • Vincent, Smijo
  • Rawat, Pradeep Singh

Abstract

Systems, computer program products, and methods are described herein for improving computing performance by implementing an application package orchestrator in an electronic environment. The present disclosure is configured to identify an instruction(s) associated with a current application(s); apply the instruction(s) to an NLP engine; generate, by the NLP engine, a stepwise metadata packet, wherein the stepwise metadata packet comprises a standardized set of computer-readable instructions; apply the stepwise metadata packet to an application package orchestrator model; query, by the application package orchestrator model, a programming template database based on the stepwise metadata package, wherein the programming template database comprises pre-generated programming actions; determine, based on the query, whether the pre-generated programming actions resolve each of the standardized set of computer-readable instructions of the stepwise metadata packet; and generate an application package based on a combination of the pre-generated programming actions that resolve each of the standardized set of computer-readable instructions.

IPC Classes  ?

71.

SYSTEM AND METHOD FOR DYNAMIC TASK MANAGEMENT ACROSS A NETWORK

      
Application Number 18521101
Status Pending
Filing Date 2023-11-28
First Publication Date 2025-05-29
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Cooper, Heidi L.
  • Sahoo, Sushil Kumar
  • Jennings, Levi
  • Nayak, Siddhartha Shankar
  • Pandey, Satya
  • Yeranagula, Niranian Babu

Abstract

Systems, computer program products, and methods are described herein for dynamic task management across a network. The method includes receiving a task to be completed by one or more end-point devices. The method also includes determining one or more task actions that are part of the task. The method further includes receiving a task action input indicating a change to at least one of the one or more task actions or an additional task action to be added to the one or more task actions. The method still further includes updating the one or more task actions based on the task action input. The method also includes determining a task action order for each of the one or more task actions. The method further includes assigning at least one of the task actions to at least one of the end-point devices on the network based on the task action order.

IPC Classes  ?

  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network

72.

SYSTEM AND METHOD UTILIZING ELECTRICALLY ERASABLE PROGRAMMABLE RANDOM ACCESS MEMORY FOR ENCRYPTED DATA RETRIEVAL

      
Application Number 18521447
Status Pending
Filing Date 2023-11-28
First Publication Date 2025-05-29
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Deshpande, Nimish Ravindra
  • Bidkar, Prashant Anna
  • Dey, Subrojyoti
  • Joseph, Anoop
  • Upadhyaya, Ankit

Abstract

Systems, computer program products, and methods are described herein for a secure transactional process utilizing a novel approach to data management within resource instruments. The described technology specifically addresses the need for enhanced security in electronic transactions by incorporating a system that dynamically retrieves, encrypts, stores, and subsequently erases transactional data in a secure manner. At the core of these systems is the use of electrically erasable programmable read-only memory (EEPRAM) which temporarily houses transaction details in an encrypted form. The details are securely fetched from an entity server following the verification of a transaction terminal integrity through unique cryptographic keys.

IPC Classes  ?

  • G06Q 20/20 - Point-of-sale [POS] network systems
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists

73.

system and method for digitally marking artificial intelligence (AI) generated content

      
Application Number 18521792
Status Pending
Filing Date 2023-11-28
First Publication Date 2025-05-29
Owner Bank of America Corporation (USA)
Inventor
  • Patel, Vinesh Premji
  • Young, Michael R.

Abstract

A processor receives request to generate content using an AI tool and generates the requested content using the AI tool. The processor detects that the AI tool used a first AI module and a second AI module associated with the AI tool to generate the requested content. In response, the processor accesses, from a memory, a first digital signature associated with the first AI module and a second digital signature associated with the second AI module. The processor generates a combined digital signature based on the first digital signature and the second digital signature and embeds the combined digital signature in the generated content to generate a marked content.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • G06N 20/00 - Machine learning

74.

SYSTEM FOR GENERATING AN ELECTRONIC DATA FABRIC USING VIRTUALIZED PHOTOCROSSLINKING-BASED PARALLEL COMPUTING PROCESS

      
Application Number 18523049
Status Pending
Filing Date 2023-11-29
First Publication Date 2025-05-29
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Deshpande, Nimish Ravindra
  • Arora, Mani
  • Upadhyaya, Ankit
  • Bidkar, Prashant Anna
  • Miranda, Roshan

Abstract

A system is provided for generating an electronic data fabric using virtualized photocrosslinking-based parallel computing process. In particular, the system may, using an artificial intelligence (“AI”) model, identify one or more users and a subject or description of a communication in order to determine the data needs of the one or more users, where such data may reside within one or more databases, websites, applications, tools, and/or the like. The system may then use a simulated photocrosslinking based process to assimilate various combinations of datasets and place the data sets within a virtualized environment. The virtualized data may then be linked to a data fabric to identify the linkages and/or sublinkages between the virtualized data and the underlying data. Subsequently, upon receiving a data request from a user, the system may use the metadata within the data fabric to dynamically recall the relevant data in real time.

IPC Classes  ?

75.

SYSTEM AND METHOD FOR MODIFYING DATA FORMATS FOR USE IN AN ALTERNATIVE DATA MANAGEMENT SYSTEM

      
Application Number 18520238
Status Pending
Filing Date 2023-11-27
First Publication Date 2025-05-29
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Wilson, Tanya A.
  • Kieffer, Malinda
  • Sodhi, Ravinder Kaur
  • Rosseland, Jr., Robert Ronald
  • Phillips, Donna Lee
  • Mishra, Rahul Kumar
  • Boosetty, Kiran
  • Gay, Gerard P.
  • Moiyallah, Jr., Samuel M.
  • Moss, Susan J.
  • Grabski, Andrzej

Abstract

Systems, computer program products, and methods are described herein for the implementation of an alternative data management system. The method includes dividing a process into one or more tasks, including a first task, to be completed. The method also includes determining a first task availability status for the first task. The first task availability status indicates whether the first task can be started by a user. The first task availability is designated as waiting in an instance in which at least one prerequisite task exists for the first task. The method includes causing the first task availability status to be changed from waiting to ready in an instance in which at least a portion of the prerequisite task(s) is completed. The method further includes assigning the first task to a first user in an instance in which the first user finishes one of the one or more tasks.

IPC Classes  ?

  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations

76.

SYSTEM AND METHOD FOR SECURING DATA TRANSFERS ACROSS MULTIPLE DEVICES ON A NETWORK

      
Application Number 18521203
Status Pending
Filing Date 2023-11-28
First Publication Date 2025-05-29
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Arora, Saurabh
  • Chauhan, Sandeep Kumar
  • Rathaur, Nandini
  • Padiyar, Sneha
  • Pabolu, Srinivas

Abstract

Systems, computer program products, and methods are described herein for securing data transfers across multiple devices on a network. The method includes receiving a transfer identifier associated with a data transfer request. The method also includes generating a transfer record associated with the transfer identifier for the data transfer request. The transfer record indicates node(s) in which the data transfer request has transmitted. The method further includes receiving a transfer data packet associated with a receiving node. The receiving node received the data transfer request from a transmitting node. The transfer data packet includes the transfer identifier. The method still further includes causing a verification signal to be transmitted to the receiving node in an instance in which the transfer data packet is verified. The method also includes updating the transfer record based on the transfer data packet.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/38 - Payment protocolsDetails thereof

77.

SYSTEMS AND METHODS TO TOKENIZE AND CATEGORIZE DATA TRANSACTIONS

      
Application Number 18523123
Status Pending
Filing Date 2023-11-29
First Publication Date 2025-05-29
Owner Bank of America Corporation (USA)
Inventor
  • Thomas, Frency George
  • Singh, Shailendra
  • Venkatachalam, Deepiga
  • Mukherjee, Shoumi
  • Mullapudi, Suhasini

Abstract

An interactive distributive platform apparatus configured to be a single source of truth. The platform may include entity identifier data stored in a database. The data may be placed in a grid through an AI algorithm. The AI algorithm may place the data in the grid using one or more rules. The data may be extracted into datasets. The datasets may be placed in corresponding selected nodes. Placement of the datasets may occur using smart contracts. The nodes may be part of a holochain. The datasets and rules may be validated in an interactive distributive platform. The interactive distributive platform may be the single source of truth. The interactive distributive platform may direct any request that enters the system to the correct node.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/60 - Protecting data
  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

78.

FRAUD PREVENTION PARALLEL METAVERSE SYSTEM

      
Application Number 18510773
Status Pending
Filing Date 2023-11-16
First Publication Date 2025-05-22
Owner Bank of America Corporation (USA)
Inventor Gupta, Saurabh

Abstract

Provided herein is a system. The system may include a parallel metaverse creator layer. The system may include a parallel metaverse verifier layer. The system may include a data sharing interface. The system may include a data deciphering interface. The system may include an NFT stacker. The system may include an NFT validator. The system may include a payment decision interface. the system may include a transaction decision interface. The system may include a payment initiator interface. The system may include a transaction initiator interface. Provided herein is a system. The system may include a parallel metaverse creator layer. The system may include a parallel metaverse verifier layer. The system may include a data sharing interface. The system may include a data deciphering interface. The system may include an NFT stacker. The system may include an NFT validator. The system may include a payment decision interface. the system may include a transaction decision interface. The system may include a payment initiator interface. The system may include a transaction initiator interface. .

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/22 - Payment schemes or models

79.

QUANTUM-COMPATIBLE BLOCKCHAIN FOR ACCOUNTABILITY

      
Application Number 18510792
Status Pending
Filing Date 2023-11-16
First Publication Date 2025-05-22
Owner Bank of America Corporation (USA)
Inventor
  • Kurian, Manu
  • Patel, Vinesh

Abstract

Systems and methods may include contributing to a quantum-resistant blockchain that stores a quantum-resistant audit trail of changes to a dataset. A non-transitory computer readable medium may store instructions that are run on a computer processor to populate a block with a log of a dataset, run a quantum-resistant cryptographic algorithm to encrypt the block, distribute the block to and receive approval from blockchain nodes to add the block to the blockchain, and run the algorithm to encrypt the block onto the blockchain. The method may include repeating the steps of running the non-transitory medium on the computer processor to populate a second block with a second log of the dataset, run the algorithm to encrypt the second block, distribute the second block to and receive approval from the blockchain nodes to add the block to the blockchain, and run the algorithm to encrypt the second block onto the blockchain.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

80.

SYSTEM FOR OPTIMIZING WORKFLOW MANAGEMENT AND RESPONSE SYSTEMS IN A DISTRIBUTED NETWORK USING AI

      
Application Number 18511164
Status Pending
Filing Date 2023-11-16
First Publication Date 2025-05-22
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Ali, Amer
  • Dande, Pratap
  • Vezzu, Sailesh
  • Phadnis, Rahul Shashidhar
  • Yaksh, Rahul
  • Vuppala, Hari
  • Nyamwange, Elvis
  • Jacobson, Brian Neal
  • Dahl, Erik

Abstract

Systems, computer program products, and methods are described herein for optimizing workflow management and response systems in a distributed network. The present disclosure is configured to integrate various enterprise systems, analyze workflow data for efficiency improvements, automate access management, and enhance task prioritization using advanced machine learning algorithms. Specifically, the system leverages real-time analytics and historical data to fine-tune workflows, predict delegation needs, and provide end-users with an actionable dashboard, thus streamlining operations and decision-making processes within an organization.

IPC Classes  ?

81.

SYSTEM FOR SECURE TRAINING OF MACHINE LEARNING MODELS

      
Application Number 18511286
Status Pending
Filing Date 2023-11-16
First Publication Date 2025-05-22
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Belton, Stephen Richard
  • Agrawal, Dinesh Kumar
  • Boyd, Kenneth L.
  • Chakravarty, Srinath S.
  • Datla, Manmohan V.
  • Greene, Steven Nathan
  • Puskarich, Petar Evan
  • Shkodnik, Elina
  • Singtalur, Aravind Shankaragouda
  • Vaughan, Kerry M.

Abstract

Systems, computer program products, and methods are described herein for secure training of machine learning models. The present disclosure is configured to receive a training dataset, wherein the training dataset comprises personally identifiable information (PII); implement a data sanitization algorithm using adjustable data sanitization parameters on the training dataset to generate a corresponding sanitized training dataset; train an ML model using the sanitized training dataset; deploy the trained ML model on a live dataset; evaluate a performance accuracy of the ML model against an accuracy threshold; and iteratively adjust the data sanitization parameters for subsequent iterative re-training of the ML model until the performance accuracy of the ML model meets the accuracy threshold.

IPC Classes  ?

82.

System and method for reversing illegitimate interactions between computing systems

      
Application Number 18512404
Status Pending
Filing Date 2023-11-17
First Publication Date 2025-05-22
Owner Bank of America Corporation (USA)
Inventor
  • Garg, Saurabh
  • Sethia, Maneesh Kumar
  • Singh, Shailendra

Abstract

A method includes analyzing a first block of a blockchain stored in a blockchain network. The first block is associated with an interaction between computing systems. Upon determining that the interaction is illegitimate, a first instruction is sent to the blockchain network to create and add a dispute block associated with a dispute of the interaction to the blockchain. Upon determining that the blockchain includes an intermediate block between the first block and the dispute block that is associated with a subsequent interaction that is performed after the interaction, source and destination computing systems for the interaction and the subsequent interaction are determined. Upon approving reversals of the interaction and the subsequent interaction, a second instruction is sent to each destination computing system to initiate a reversal of a respective interaction. A notification is sent to each source computing system that the reversal of the respective interaction is approved.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

83.

Cryptocurrency Tracing System

      
Application Number 18516272
Status Pending
Filing Date 2023-11-21
First Publication Date 2025-05-22
Owner Bank of America Corporation (USA)
Inventor
  • Siekman, James
  • Leedy, Jr., Robert Timothy
  • Buchanan, Aaron
  • Malarkey, Michael Thomas

Abstract

Various aspects of the disclosure relate to automated identification of illicit transfers of cryptocurrency via mixing organizations. A cryptocurrency tracing system is configured to transfer a series of electronic transactions between known digital wallets via a suspect mixing organization. The cryptocurrency tracing system traces each cryptocurrency transaction through a plurality of mixing digital wallets to identify all possible mixing digital wallets being used by the mixing organization. Based on the identified mixing digital wallets, suspect digital wallets are identified and a second series of transactions are initiated between the known digital wallets via the mixing digital wallets. Based on these transfers, suspect digital wallets can be monitored to identify cryptocurrency transfer patterns representative of an attempt to obscure illicit funds transfers. Once identified, the suspect digital wallets may be automatically frozen.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes

84.

SYSTEMS AND METHODS FOR DATA SECURITY MODEL BASED ANOMALY DETERMINATIONS

      
Application Number 18516873
Status Pending
Filing Date 2023-11-21
First Publication Date 2025-05-22
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Kling, John Howard
  • Dudley, Charles Edward
  • Yeung, Jason T.

Abstract

Systems, methods, and computer program products are provided herein for data security model based anomaly determinations. An example method includes receiving a product evaluation request that is associated with a first product dataset including product data entries and accessing a data security model. The data security model includes a plurality of data objects including one or more data entries where each data object defines an associated model level indicative of the hierarchical position of the data object within the data security model and one or more links between the data objects that define data object interdependency parameters. The example method includes determining data objects of the data security model applicable to the first product dataset and determining one or more anomalies associated with the first product dataset based on a comparison between the one or more product data entries and the applicable data objects of the data security model.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures

85.

System and method for securely synchronizing and integrating data stored in databases associated with multiple entities

      
Application Number 18517776
Status Pending
Filing Date 2023-11-22
First Publication Date 2025-05-22
Owner Bank of America Corporation (USA)
Inventor
  • Mehra, Naman
  • Solow, Aeric John

Abstract

A method includes accessing the first user data set and the second user data set. The second user data set includes a homomorphically-encrypted data set. The method includes executing a predictive model trained to generate a homomorphically-encrypted recommendation of an identified interaction for a user based at least in part upon the first user data set and the homomorphically-encrypted data set. The user is associated with at least one of the first entity or the second entity. The method further includes transmitting the homomorphically-encrypted recommendation of the identified interaction for the user to a computing system associated with the second database and the second entity, receiving, from the computing system associated with the second database and the second entity, a decrypted recommendation of the identified interaction for the user, and transmitting the decrypted recommendation to a computing system associated with the user.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06N 5/022 - Knowledge engineeringKnowledge acquisition

86.

Data Leak Detection in Generative Artificial Intelligence Model Output

      
Application Number 18518182
Status Pending
Filing Date 2023-11-22
First Publication Date 2025-05-22
Owner Bank of America Corporation (USA)
Inventor
  • Gates, Carrie Elaine
  • Strarin, Jason

Abstract

Aspects of the disclosure relate to detection of confidential information used in generative artificial intelligence platforms. An artificial intelligence computing platform having at least one processor, a memory, and a communication interface may generate questions and ask other generative artificial intelligence platforms the generated questions to determine if the other generative artificial intelligent platforms answers indicate that restricted access, confidential, or proprietary information data has been leaked and disseminated. In an embodiment, prompt injection may be used to determine if external generative artificial intelligence platforms are utilizing an enterprises confidential or proprietary information. A computing platform may transmit, via the communication interface, to an administrative computing device, information regarding the unauthorized dissemination which, when processed by the administrative computing device causes a notification to be displayed on the administrative computing device.

IPC Classes  ?

87.

MACHINE LEARNING-BASED SYSTEM FOR CODE DEVELOPMENT AND RELEASE

      
Application Number 18514131
Status Pending
Filing Date 2023-11-20
First Publication Date 2025-05-22
Owner Bank of America Corporation (USA)
Inventor
  • Pervaiz, Yasir
  • Bishop, Iii, Jack
  • Sharief, Luqman

Abstract

Arrangements for machine learning-based code development and release are provided. In some examples, a request to release code may be received from a developer portal and may include the code and a type of release. Based on the type of release, one or more requirements for release may be identified by a rules engine. Code testing data responsive to the one or more requirements may be retrieved from the developer portal and a machine learning model may be executed using the code, type of release and code testing data as inputs. The model may output a release authorization decision. If the release authorization decision includes approval of the release, the code may be deployed to a production environment. If the release authorization decision includes a denial of the request to release the code, the code may be returned to the developer portal for further modification or testing.

IPC Classes  ?

  • G06F 8/658 - Incremental updatesDifferential updates

88.

SYSTEM AND METHOD FOR CENTRALIZED APPLICATION DEVELOPMENT AND PIPELINE MANAGEMENT VIA EVENT DATA STREAMING

      
Application Number 18515606
Status Pending
Filing Date 2023-11-21
First Publication Date 2025-05-22
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Young, Lauderdale Sonnenberg
  • Tavormina, Peter
  • Velagaleti, Suresh

Abstract

Systems, computer program products, and methods are described herein for centralized application development and pipeline management via event data streaming. The present disclosure embraces event data received from discrete components of an application development pipeline platform. The event data is received directly, via webhooks, or via change data capture. The event data is analyzed to determine conformity to a standardized data structure. If the discrete components already transmit and receive event data in the standardized data structure, the application development pipeline platform communicates with such discrete components directly. If the discrete components don't transmit and receive event data in the standardized data, a middleware layer receives the event data from the discrete components and transforms the event data from the discrete components to the standardized data structure.

IPC Classes  ?

  • G06F 8/71 - Version control Configuration management

89.

Method to Validate Application Programming Interface (API) leveraging Non fungible Token (NFT)

      
Application Number 19020521
Status Pending
Filing Date 2025-01-14
First Publication Date 2025-05-15
Owner Bank of America Corporation (USA)
Inventor Singh, Shailendra

Abstract

A system and method for submission and recordation of application programmer interfaces (APIs) using non-fungible tokens (NFTs) inserted into a blockchain.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols

90.

MULTI-STATE DISTRIBUTED TRAINING DATA CREATION USING BYTE-BASED REPLICATION FOR AN ARTIFICIAL INTELLIGENCE PLATFORM

      
Application Number 18388450
Status Pending
Filing Date 2023-11-09
First Publication Date 2025-05-15
Owner Bank of America Corporation (USA)
Inventor
  • Jayasingh, Magaranth
  • Chandroliya, Vimal

Abstract

Aspects of the disclosure relate to generating and replicating training data. A computing system may generate different versions of training data and corresponding different sequence numbers. A distributed machine learning model may be trained to generate different versions of the training data based on the corresponding different sequence numbers. The training data and identical copies of the distributed machine learning model may be sent to secondary computing devices. A second sequence number corresponding to a second version of the training data may be determined. The second sequence number may be sent to secondary computing devices. Based on inputting the second sequence number into the identical copy of the distributed machine learning model, copies of the second version of the training data may be generated in the secondary computing devices.

IPC Classes  ?

  • G06N 3/098 - Distributed learning, e.g. federated learning

91.

AI Automated Facilitation of Support Agent/Client Interactions in Multi-Modal Communications

      
Application Number 18389325
Status Pending
Filing Date 2023-11-14
First Publication Date 2025-05-15
Owner Bank of America Corporation (USA)
Inventor
  • Corzo, Jennifer
  • Singh, Jitender
  • Patel, Priyeshkumar
  • Sanjeevinathan, Bartholomew
  • Mishra, Amit
  • Bhagavathiappan, Pravin Kumar Sankari
  • Mahajan, Nipun

Abstract

Systems and processes are disclosed to leverage conversational AI across voice and digital channels by automating employee interactions with clients to deliver humanized experiences with speed and accuracy. Live phone conversation. Transcriptions between clients and agents are generated. AI assist provides automation based on client interactions. Prompts are provided to speak to customers. Real time updates and summaries are sent to client devices and streamed to customize agent sessions. Auto navigation of agent views and manipulations of the agent screen are optimized by AI. Instant client validations are enabled via audible and visual confirmations on client devices. Various other AI implementations for improved processing our similarly disclosed.

IPC Classes  ?

  • H04M 3/493 - Interactive information services, e.g. directory enquiries
  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • G10L 15/18 - Speech classification or search using natural language modelling
  • G10L 15/26 - Speech to text systems
  • H04M 3/51 - Centralised call answering arrangements requiring operator intervention

92.

SYSTEMS AND METHODS FOR DYNAMICALLY DETERMINING PROCEDURES FOR ELECTRONIC COMMUNICATIONS USING CELLULAR AUTOMATON PROCESSING

      
Application Number 18505687
Status Pending
Filing Date 2023-11-09
First Publication Date 2025-05-15
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Arumugam, Rajalakshmi
  • Niskeode, Anjali
  • Natarajan, Raman
  • Kolluri, Revathi Satya Kishori
  • Chiluka, Susheel
  • Jeyaseelan, Malini

Abstract

Systems, computer program products, and methods are described herein for dynamically determining procedures for electronic communications using cellular automaton processing. The present invention is configured to identify at least one enquiry message; determine, based on the an enquiry message(s), a case type(s) associated with the enquiry message(s); trigger an intelligent classification component, wherein the intelligent classification component is configured to determine a procedure(s) for the enquiry message(s); trigger a cellular automaton engine which comprises an array of a plurality of cells in a grid-based structure, and wherein the cellular automaton engine is configured to select and perform at least one procedure for the enquiry message(s); determine, by the cellular automaton engine, a best procedure based on the selection and performance of the procedure(s) for the enquiry message(s); and generate a response(s) for the enquiry message(s) based on the determined best procedure by the cellular automaton engine.

IPC Classes  ?

  • H04M 1/72436 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails
  • G06N 20/00 - Machine learning
  • G06V 30/10 - Character recognition

93.

SYSTEM AND METHOD FOR EMPLOYING ADAPTIVE PIXEL SELECTOR TECHNIQUES FOR CALCULATING COLOR CONTRAST RATIO WITH DEAD PIXEL MITIGATION

      
Application Number 18505833
Status Pending
Filing Date 2023-11-09
First Publication Date 2025-05-15
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Gupta, Kumar Gaurav
  • Sharma, Arun Kumar
  • Kumar, Saurabh

Abstract

Embodiments of the present invention provide a system for employing adaptive pixel selector techniques for calculating color contrast ratio with dead pixel mitigation. The system is configured for determining that a user is testing user interface accessibility compliance of at least one user interface associated with one or more applications, determining one or more rules associated with the user interface accessibility compliance of the one or more applications, selecting a pixel from the at least one user interface, determining that the pixel is not a defective pixel, calculating a color contrast ratio associated with the pixel, determining if the color contrast ratio is in compliance with the one or more rules, and displaying an output associated with determining if the color contrast ratio is in compliance with the one or more rules.

IPC Classes  ?

94.

System and method for distributed learning using dynamically encrypted data items

      
Application Number 18508472
Status Pending
Filing Date 2023-11-14
First Publication Date 2025-05-15
Owner Bank of America Corporation (USA)
Inventor
  • Rajagopalan, Anurajam
  • Taneja, Pushkar
  • Kutthumolu, Durga Prasad

Abstract

A method includes receiving and analyzing data items to generate a weight for each data item. In response to determining that a first weight of a first data item is within a first weight range, the method determines that the first data item has a high security level. In response to determining that a second weight of a second data item is within a second weight range, the method determines that the second data item has a medium security level. A first subset of the data items having the high security level are encrypted with a first cryptography algorithm to generate first encrypted data items. A second subset of the data items having the medium security level are encrypted with a second cryptography algorithm to generate second encrypted data items. An artificial intelligence/machine learning model is trained using the first and second encrypted data items as a training data set.

IPC Classes  ?

95.

SYSTEM AND METHOD FOR CONVERSION OF REAL-TIME VOICE LOGS TO USER INTERFACE LOGS FOR DEBUGGING OF INTERACTIVE VOICE RESPONSE INTERACTIONS

      
Application Number 18389385
Status Pending
Filing Date 2023-11-14
First Publication Date 2025-05-15
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Shelke, Sushama
  • Mahajan, Nipun
  • Mishra, Amit
  • Sharma, Piyush

Abstract

Embodiments of the present invention provide a system for conversion of real-time voice logs to user interface logs for debugging of Interactive Voice Response (IVR) interactions. The system is configured for determining that a user has initiated a real-time voice interaction with a voice interaction processing platform, generating a real-time voice log associated with the real-time voice interaction, parsing the real-time voice log, via a real-time parser, converting, in real-time via a real-time converter, the parsed voice log to a real-time user interface log, generating a real-time user interface comprising the real-time user interface log, and displaying the real-time user interface comprising the real-time user interface log to the user for debugging the real-time voice interaction.

IPC Classes  ?

  • H04M 3/493 - Interactive information services, e.g. directory enquiries
  • G10L 15/26 - Speech to text systems

96.

SYSTEM AND METHOD FOR INTELLIGENT AUTOMATIC RESOLUTION OF INACTIVE COMPUTER CODE IN A MULTI CLOUD ENVIRONMENT

      
Application Number 18508359
Status Pending
Filing Date 2023-11-14
First Publication Date 2025-05-15
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Nair, Priyanka
  • Veeramreddy, Sudarshan
  • Bussa, Swathi
  • Dhanraj, Shyam K
  • Skariah, Greeshma Susan
  • Pandey, Vishakha

Abstract

A system is provided for intelligent automatic resolution of inactive computer code in a multi cloud environment. In particular, the system may comprise an artificial intelligence powered apparatus that may use one or more machine learning models and/or neural networks to analyze data from a cloud computing environment, such as system logs, memory dumps, real-time status queries, and/or the like. Based on analyzing the data, the system may identify inactive, unused, and/or redundant code within the cloud computing environment. The system may then compute a confidence level associated with the identification of the inactive code. Upon detecting that the confidence level has exceeded a defined threshold, the system may automatically initiate one or more remediation processes, such as deletion or modification of the inactive code. In this way, the system may provide a way to automatically remove inactive code from the cloud computing environment.

IPC Classes  ?

97.

IMPERSONATION DETECTION USING AN AUTHENTICATION ENFORCEMENT ENGINE

      
Application Number 18510270
Status Pending
Filing Date 2023-11-15
First Publication Date 2025-05-15
Owner Bank of America Corporation (USA)
Inventor
  • Buchanan, Aaron
  • Siekman, James
  • Felipe, Jeffrey
  • Leedy, Robert Timothy
  • Mackay, Dana Tishgarten
  • Magura, Heidi L.
  • Malarkey, Michael Thomas
  • Mcfeeters, Karen
  • Williams, Stephen J.

Abstract

Aspects related to impersonation detection using an authentication enforcement engine are provided. An authentication enforcement platform may retrieve electronic signatures and device records. The platform may train an authentication enforcement engine, using the electronic signatures and device records, to generate similarity scores for transmissions. The platform may intercept a transmission. The platform may generate a similarity score for the transmission based on extracted information of the transmission. The platform may identify whether the similarity score satisfies a threshold. If the similarity score satisfies a threshold, the platform may update a device record, update the authentication enforcement engine, and route the transmission. If the similarity score fails to satisfy the threshold score, the platform may identify whether manual review is necessary. In some examples, the platform may initiate security actions responsive to the transmission. The platform may update the authentication enforcement engine based on initiating the security actions.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

98.

Intelligent Apparatus To Monitor And Auto Deploy Security Policy Rules On Container Based Cloud Infrastructure Leveraging NFT & Quantum Knowledge Graph

      
Application Number 19019846
Status Pending
Filing Date 2025-01-14
First Publication Date 2025-05-15
Owner Bank of America Corporation (USA)
Inventor Singh, Shailendra

Abstract

Aspects of the disclosure relate to monitoring and deploying security policy rules in in a container-based computing infrastructure. A computing platform may train a quantum knowledge graph based on interactions in a container-based computing infrastructure. The computing platform may generate and deploy, to the container-based computing infrastructure, one or more security rules associated with interactions in the container-based computing infrastructure based on the quantum knowledge graph les. Subsequently, the computing platform may monitor interactions between containers in the container-based computing infrastructure and identify, using the quantum knowledge graph, an anomaly in a first interaction between a first container and a second container. Based on identifying the anomaly, the computing platform may thereafter perform a verification analysis of the first interaction to determine a potential security risk and send, to an administrator computing platform, an alert action configured to be displayed on an interface of the administrator computing platform.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computersPlatforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing

99.

TECHNOLOGY ENVIRONMENT FOR A SOFTWARE APPLICATION

      
Application Number 19020165
Status Pending
Filing Date 2025-01-14
First Publication Date 2025-05-15
Owner Bank of America Corporation (USA)
Inventor
  • Rathod, Chirag Himatlal
  • Jain, Kalpesh Fatehchand
  • Lakshmi Narayanan, Ramesh
  • Kommineni, Satish Kumar
  • Alla, Venkata Apparao
  • Purushothaman, Sasidhar

Abstract

A system is configured to obtain information relating to a current application environment of a software application and build a plurality of model application environments based on the obtained information. The system runs the software application using the current application environment and each of the model application environments. The system collects a plurality of performance metrics related to performance of the software application in the current application environment and each of the model application environments while running in the simulated environment. The system generates a recommendation report based on the performance metrics, wherein the recommendation report comprises a recommendation of a different technology product for at least one of the technology components used in the current application environment, wherein the different technology product is different from a current technology product used for the at least one technology component in the current application environment.

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

100.

Systems and methods for automatically building dynamic queries for identifying data in unstructured datasets

      
Application Number 18678409
Grant Number 12299014
Status In Force
Filing Date 2024-05-30
First Publication Date 2025-05-13
Grant Date 2025-05-13
Owner BANK OF AMERICA CORPORATION (USA)
Inventor
  • Li, Yvonne
  • Zhu, Yipeng
  • Zhang, Zhexiao
  • Naitlho, Nizar

Abstract

Systems, computer program products, and methods are described herein for automatically building dynamic queries for identifying data in unstructured datasets. The present disclosure is configured to receive a plurality of pre-defined query templates associated with an alert type(s); dynamically filter the plurality of pre-defined query templates based on the alert type(s); identify an unstructured database note(s) based on a user identifier; apply the unstructured database note(s) and the filtered plurality of pre-defined query templates to an unstructured notes search engine; generate, by the unstructured notes search engine, at least one raw score for the at least one unstructured database note and for each alert type(s); transform, by the unstructured notes search engine, the at least one raw score to a relevancy score using a quantile transformation; and determine a highest relevancy score for each of the at least one unstructured database note for the user identifier.

IPC Classes  ?

  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/332 - Query formulation
  1     2     3     ...     75        Next Page