The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 03, 2024

Filed:

Apr. 04, 2022
Applicant:

Bank of America Corporation, Charlotte, NC (US);

Inventors:

George Anthony Albero, Charlotte, NC (US);

Edward Lee Traywick, Bellbrook, OH (US);

Ariel Fontaine Hill, Arlington, VA (US);

Jake Michael Yara, Mint Hill, NC (US);

Dustin Paul Stocks, Stallings, NC (US);

Assignee:

BANK OF AMERICA CORPORATION, Charlotte, NC (US);

Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 9/00 (2022.01); G06V 10/70 (2022.01); G06V 40/16 (2022.01); H04L 9/40 (2022.01);
U.S. Cl.
CPC ...
H04L 63/0861 (2013.01); G06V 10/70 (2022.01); G06V 40/168 (2022.01); G06V 40/172 (2022.01);
Abstract

Systems, computer program products, and methods are described herein for implementing device manipulation for counteracting facial recognition authentication security malfeasance. The present invention is configured to receive a request from a user via a client device to access an authentication subsystem to execute a facial recognition authentication for access to an application; initiate the facial recognition authentication on the client device in response to receiving the request; receive, from the client device, one or more external inputs in response to one or more authentication prompts; determine, using a machine learning subsystem, that at least one of the one or more external inputs is associated with a first preconfigured duress code; trigger, using a breach detection subsystem, a first set of security protocols; and execute, using the breach detection subsystem, a first set of predefined actions associated with the first set of security protocols.


Find Patent Forward Citations

Loading…