-
公开(公告)号:US20240331707A1
公开(公告)日:2024-10-03
申请号:US18130216
申请日:2023-04-03
Applicant: BANK OF AMERICA CORPORATION
Inventor: James J. Siekman , Tomas M. Castrejon, III , Sanjay Arjun Lohar , Kyle Mayers , Karen Stanek McFeeters
Abstract: Systems, computer program products, and methods are described herein for digital voice data processing and authentication. The present invention is configured to receive a user interaction comprising a digital audio signal and capture a first audio segment and a second audio segment of the digital audio signal. The first audio segment and the second audio segment are plotted into corresponding first and second plots. The first and second plots are compared, wherein comparing comprises subtracting the first plot from the second plot to form a difference plot. A quantity of outlier peaks is determined, then an artificial user probability is assigned to the user interaction, wherein the artificial user probability is low if the quantity of outlier peaks is greater than a predetermined outlier peak threshold. The artificial user probability is then displayed on a user interface of an endpoint device.
-
公开(公告)号:US12063249B2
公开(公告)日:2024-08-13
申请号:US17885764
申请日:2022-08-11
Applicant: Bank of America Corporation
Inventor: Kelly Renee-Drop Keiter , Michael Young , Kyle Mayers , Sanjay Lohar
CPC classification number: H04L63/1483 , G06Q50/01 , G06V40/171 , G06V40/172 , G06V40/33 , G06V40/40 , G06V40/50
Abstract: Apparatus and methods for using deepfakes defensively to detect fake, spoofed, and hoax accounts and posts on social media and elsewhere are provided. A program may gather verified images or writings of a target individual. The program may analyze the verified images and writings to create a baseline. The program may use deepfake algorithms to create exemplar deepfake images or writings. The program may store the data in a database. The program may search a network for social media accounts or posts that may meet the baseline and determine whether they are legitimate or illegitimate by comparing the contents of the accounts or posts with the exemplar deepfakes. When the program determines the accounts or posts are illegitimate, the program may initiate a takedown of those accounts or posts. The program may use machine learning algorithms to refine itself and become more accurate.
-
公开(公告)号:US20240372863A1
公开(公告)日:2024-11-07
申请号:US18143309
申请日:2023-05-04
Applicant: BANK OF AMERICA CORPORATION
Inventor: Sanjay Arjun Lohar , Kyle Mayers , Karen Stanek McFeeters , James J. Siekman , Anna Rose Burchman
IPC: H04L9/40
Abstract: Systems, computer program products, and methods are described herein for monitoring and restricting electronic communication in a network based on communication characteristics. The method includes receiving an electronic communication from an end-point device. The method also includes identifying a potential user identity associated with the electronic communication. The potential user identity is based on one or more user identifiers associated with the electronic communication. The method further includes determining one or more restriction tags relating to the potential user identity. Each of the one or more restriction tags include a restriction to communication between the end-point device and one or more entity users. The method still further includes causing a restriction action to be executed based on determining the potential user identity has one or more restriction tags. The restriction action is at least one of a restriction notification or a communication restriction to communication with the end-point device.
-
公开(公告)号:US11991400B2
公开(公告)日:2024-05-21
申请号:US17866109
申请日:2022-07-15
Applicant: BANK OF AMERICA CORPORATION
Inventor: Kyle Mayers , George Anthony Albero , Michael Robert Young
IPC: H04N21/23 , H04N21/233 , H04N21/266
CPC classification number: H04N21/233 , H04N21/266
Abstract: Embodiments of the present invention provide a system for executing audio cryptology in real-time for audio misappropriation prevention. The system is configured for identifying, via a cryptographic device, one or more audio signals, causing the cryptographic device to generate and emit a dynamically varying continuous audio tone, continuously monitoring in real-time the one or more audio signals, via the cryptographic device, determining, via the cryptographic device, termination of the one or more audio signals based on continuously monitoring the one or more audio signals in real-time, and causing the cryptographic device to stop generating and emitting the dynamically varying continuous audio tone.
-
5.
公开(公告)号:US20240022770A1
公开(公告)日:2024-01-18
申请号:US17866109
申请日:2022-07-15
Applicant: BANK OF AMERICA CORPORATION
Inventor: Kyle Mayers , George Anthony Albero , Michael Robert Young
IPC: H04N21/233 , H04N21/266
CPC classification number: H04N21/233 , H04N21/266
Abstract: Embodiments of the present invention provide a system for executing audio cryptology in real-time for audio misappropriation prevention. The system is configured for identifying, via a cryptographic device, one or more audio signals, causing the cryptographic device to generate and emit a dynamically varying continuous audio tone, continuously monitoring in real-time the one or more audio signals, via the cryptographic device, determining, via the cryptographic device, termination of the one or more audio signals based on continuously monitoring the one or more audio signals in real-time, and causing the cryptographic device to stop generating and emitting the dynamically varying continuous audio tone.
-
公开(公告)号:US20250148788A1
公开(公告)日:2025-05-08
申请号:US18387461
申请日:2023-11-07
Applicant: Bank of America Corporation
Inventor: Dylan Bellinger , Sanjay Lohar , Kyle Mayers , Amado Martinez Suarez , Cody Searl , Rachel Howze
IPC: G06V20/40 , G06N20/00 , H04N21/454
Abstract: Various aspects of the disclosure relate to automated monitoring of content associated with an individual for indicators that the content may be a deepfake. A deepfake analysis training device trains artificial intelligence-based models based on validated content associated with one or more profiles. Each profile is associated with an individual. A deepfake analysis engine may be installed on computing devices to monitor access to content (e.g., multimedia content) for deepfakes associated with the one or more profiles, as configured. The deepfake analysis engine may be stand-alone application, an application extension, or may be integrated into third-party applications via application programming interface functions. Analyzed content is assigned a likelihood score that is compared to threshold values that indicates a likelihood that the content is a deepfake. When identified, deepfake content initiates an alert generation and/or blocking of the content otherwise the content is presented to a user.
-
公开(公告)号:US12284212B2
公开(公告)日:2025-04-22
申请号:US18665672
申请日:2024-05-16
Applicant: Bank of America Corporation
Inventor: Kelly Renee-Drop Keiter , Michael Young , Kyle Mayers , Sanjay Lohar
Abstract: Apparatus and methods for using deepfakes defensively to detect fake, spoofed, and hoax accounts and posts on social media and elsewhere are provided. A program may gather verified images or writings of a target individual. The program may analyze the verified images and writings to create a baseline. The program may use deepfake algorithms to create exemplar deepfake images or writings. The program may store the data in a database. The program may search a network for social media accounts or posts that may meet the baseline and determine whether they are legitimate or illegitimate by comparing the contents of the accounts or posts with the exemplar deepfakes. When the program determines the accounts or posts are illegitimate, the program may initiate a takedown of those accounts or posts. The program may use machine learning algorithms to refine itself and become more accurate.
-
公开(公告)号:US12198122B2
公开(公告)日:2025-01-14
申请号:US18488171
申请日:2023-10-17
Applicant: Bank of America Corporation
Inventor: Kyle Mayers
IPC: G06Q20/00 , G06Q20/20 , G06Q20/22 , G06Q20/32 , G06Q20/40 , G06V10/75 , G06V20/20 , G08B5/22 , G06V30/10
Abstract: A system includes a user device and a computing system. The user device accesses a plurality of images captured by a camera and identifies, from the plurality of images, a particular image that depicts a portion of a user interaction object. The user device transmits the particular image across a wireless communications network. The computing system accesses the particular image depicting the portion of the user interaction object and determines a data item from the particular image. The computing system compares the data item to one or more accounts of the user and sends instructions to the user device to display an alert message on the electronic display based on the comparison of the data item to the one or more accounts.
-
公开(公告)号:US20240089371A1
公开(公告)日:2024-03-14
申请号:US17941100
申请日:2022-09-09
Applicant: Bank of America Corporation
Inventor: Sanjay Lohar , James R. Crocker , Kyle Mayers , W. Scott Hammet , Kelly Renee-Drop Keiter
Abstract: Apparatus and methods for using deepfakes defensively to detect fake, spoofed, and hoax phone calls and videoconferences are provided. A program may record a target individual reciting exemplary phrases. The program may analyze the recordings to create a baseline. The program may use deepfake algorithms to create exemplar deepfake audiovisual representations of the target individual. The program may store the data in a database. The program may analyze, in real-time, a phone call or videoconference to determine whether they are legitimate or illegitimate by comparing the audio or audiovisual contents of the phone call or videoconference with the exemplar deepfakes. When the program determines the phone call or videoconference is illegitimate, the program may terminate the call or videoconference and inform the recipient and others.
-
10.
公开(公告)号:US11636203B2
公开(公告)日:2023-04-25
申请号:US16907994
申请日:2020-06-22
Applicant: BANK OF AMERICA CORPORATION
Inventor: Kyle Mayers , George Albero , Jon Codispoti , Jinna Zevulun Kim , Dustin Paul Stocks
Abstract: Providing an isolation system that allows analysts to analyze suspicious information in a way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The analyst may set the virtual environment configurations (e.g., applications, programs, settings, etc.) of the virtual container. The analyst may determine how the suspicious information effects the virtual environment configuration and/or use tools to analyze the suspicious information. When harmful information is identified the virtual container may be discarded (e.g., folded up and deleted), and a new virtual container may be provided to the analyst to continue to analyze the suspicious information and/or new suspicious information.
-
-
-
-
-
-
-
-
-