The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jul. 05, 2022

Filed:

Jan. 29, 2020
Applicant:

Bank of America Corporation, Charlotte, NC (US);

Inventors:

Stephen C. Brown, Charlotte, NC (US);

John Scott Alston, Pineville, NC (US);

Olga Kocharyan, Matthewa, NC (US);

George Albero, Charlotte, NC (US);

Edward Lee Traywick, Charlotte, NC (US);

Keaton Drake, Charlotte, NC (US);

Cody Searl, Pineville, NC (US);

Assignee:

Bank of America Corporation, Charlotte, NC (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 11/00 (2006.01); G06F 12/14 (2006.01); G06F 12/16 (2006.01); H04L 9/40 (2022.01); H04L 41/22 (2022.01); H04L 67/1097 (2022.01);
U.S. Cl.
CPC ...
H04L 63/1433 (2013.01); H04L 41/22 (2013.01); H04L 63/02 (2013.01); H04L 63/102 (2013.01); H04L 63/1416 (2013.01); H04L 63/20 (2013.01); H04L 67/1097 (2013.01);
Abstract

Aspects of the disclosure relate to information security by identifying unique or related factors in common between individuals subject to a common threat vector. Data mining and data acquisition of public and non-public user information is performed to prevent, disrupt, and/or address criminal, cyber, and fraudulent threats. The information can be normalized into template(s) to align information across disparate datasets and enable efficient storage of the big data into appropriate fields to be tracked. The information can be stored in data warehouse(s) or in multidimensional data structure(s) for investigation if a threat vector against a group of individuals is detected. The multidimensional data can be analyzed to identify direct connections, common connecting entities, and/or connectivity clusters between individuals who were attacked or who may be attacked in the future. Remediation, machine learning, enhanced security, and/or vulnerability assessments may be implemented based on the results of the analysis.


Find Patent Forward Citations

Loading…