- Charlotte NC, US Elijah Clark - Charlotte NC, US
International Classification:
G06Q 30/00 G06N 20/00
Abstract:
Arrangements for detecting anomalies and dynamically generating a response are presented. In some examples, attribute data including a plurality of source elements may be received. The source element data may be received from a plurality of source computing systems. The attribute data, including the source element data, may be analyzed using machine learning techniques to identify any anomalies in the attribute data. If an anomaly is detected, a notification may be generated including data associated with the anomaly, a user associated with the anomaly and the like. The notification may be transmitted to a computing device for display. In some examples, if an anomaly is detected, data associated with the anomaly may be compared to pre-stored rules to determine whether a pre-stored rule applies to the identified anomaly. If a pre-stored rule applies, an instruction or command may be generated and transmitted to one or more source computing devices or systems.
System For Prevention Of Unauthorized Access Using Authorized Environment Hash Outputs
- Charlotte NC, US Elijah Clark - Charlotte NC, US Scot Lincoln Daniels - Clover SC, US Emanuel David Guller - Charlotte NC, US Konata Stinson - Charlotte NC, US Rick Wayne Sumrall - Charlotte NC, US Jake Michael Yara - Mint Hill NC, US
Assignee:
BANK OF AMERICA CORPORATION - Charlotte NC
International Classification:
H04L 9/40 H04L 9/32
Abstract:
When a system tries to access a network (e.g., another system, an application, data, or the like) at least two-factor authentication may be used to validate the system. At least one authentication factor may include utilizing authentication credentials of the entity or system accessing the network. At least a second authentication factor may include using an environment hash of the system, which is a representation of the configuration (e.g., hardware, software, or the like) on the system trying to access the network. The environment hash may be compared to hash requirements (e.g., authorized environment hashes, unauthorized environment hashes, or the like) to aid in the validation. The system may only access the network when both the authentication credentials and the environment hashes meet requirements.
Virtual Environment System For Validating Executable Data Using Accelerated Time-Based Process Execution
- Charlotte NC, US Emanuel David Guller - Charlotte NC, US Edward Lee Traywick - Bellbrook OH, US Scot Lincoln Daniels - Clover SC, US Rick Wayne Sumrall - Charlotte NC, US Elijah Clark - Charlotte NC, US Konata Stinson - Charlotte NC, US Jake Michael Yara - Mint Hill NC, US
A virtual environment system for validating using accelerated time-based process execution is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. The set of commands or processes may be executed on an accelerated-time basis such that processes that would be executed on a longer timeline may be executed at a greater speed (e.g., a shorter timeline). In this way, the system may securely detect the presence of latent defects or issues that may arise from executing the code on a long-term basis.
Virtual Environment System For Secure Execution Of Program Code Using Cryptographic Hashes
- Charlotte NC, US Emanuel David Guller - Charlotte NC, US Edward Lee Traywick - Bellbrook OH, US Scot Lincoln Daniels - Clover SC, US Rick Wayne Sumrall - Charlotte NC, US Elijah Clark - Charlotte NC, US Konata Stinson - Charlotte NC, US
A virtual environment system for validating executable data using authorized hash outputs is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. If the system determines that the executable data is safe to run, the system may generate a hash output of the executable data and store the hash output in a database of approved executable data. In this way, the system may securely generate a repository of authorized hashes such that the system may ensure that only safely executable code is processed by the computing systems within the network environment.
System For Analysis And Authorization For Use Of Executable Environment Data In A Computing System Using Hash Outputs
- Charlotte NC, US Emanuel David Guller - Charlotte NC, US Edward Lee Traywick - Bellbrook OH, US Scot Lincoln Daniels - Clover SC, US Rick Wayne Sumrall - Charlotte NC, US Elijah Clark - Charlotte NC, US Konata Stinson - Charlotte NC, US Jake Michael Yara - Mint Hill NC, US
A virtual environment system for validating executable data using authorized hash outputs is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. If the system determines that the executable data is unsafe to run, the system may generate a hash output of the executable data and store the hash output in a database of unauthorized executable data. In this way, the system may securely generate a repository of authorized and unauthorized hashes such that the system may ensure that unsafe executable data is blocked from being processed within a network environment.
System For Network Isolation Of Affected Computing Systems Using Environment Hash Outputs
- Charlotte NC, US Elijah Clark - Charlotte NC, US Scot Lincoln Daniels - Clover SC, US Emanuel David Guller - Charlotte NC, US Konata Stinson - Charlotte NC, US Rick Wayne Sumrall - Charlotte NC, US Edward Lee Traywick - Bellbrook OH, US Jake Michael Yara - Mint Hill NC, US
Assignee:
BANK OF AMERICA CORPORATION - Charlotte NC
International Classification:
H04L 29/06 G06F 16/22
Abstract:
A system already on a network may be analyzed when the system takes an action or may be periodically reviewed. The analysis of the system may include the creation of an environment hash for the system, which is a representation of the configuration (e.g., hardware, software, or the like) of the system, and a comparison with hash requirements. The hash requirements may be stored authorized hashes, stored unauthorized hashes, past hashes for the same system, hashes for other systems with the same or similar configurations, or the like. When the environment hash of the system meets hash requirements, the system may be allowed to continue to operate on the system or may be allowed to take the action on the network. When the hash of the system fails to meet a hash requirement, the system may be isolated from the network and investigated for a non-compliant configuration.
System For Prevention Of Unauthorized Access Using Authorized Environment Hash Outputs
- Charlotte NC, US Elijah Clark - Charlotte NC, US Scot Lincoln Daniels - Clover SC, US Emanuel David Guller - Charlotte NC, US Konata Stinson - Charlotte NC, US Rick Wayne Sumrall - Charlotte NC, US Jake Michael Yara - Mint Hill NC, US
Assignee:
BANK OF AMERICA CORPORATION - Charlotte NC
International Classification:
H04L 29/06 H04L 9/32
Abstract:
When a system tries to access a network (e.g., another system, an application, data, or the like) at least two-factor authentication may be used to validate the system. At least one authentication factor may include utilizing authentication credentials of the entity or system accessing the network. At least a second authentication factor may include using an environment hash of the system, which is a representation of the configuration (e.g., hardware, software, or the like) on the system trying to access the network. The environment hash may be compared to hash requirements (e.g., authorized environment hashes, unauthorized environment hashes, or the like) to aid in the validation. The system may only access the network when both the authentication credentials and the environment hashes meet requirements.
Method And System For Data Communication With Anomaly Detection
Methods, systems, and computing platforms for data communication are disclosed. A computer-data communication based network, including receiving a set of virtual nodes each with a data payload may include an originating node attribute, an infosec data attribute, an behavioral data attribute, a biometric enterprise attribute and at least one data element associated with the originating node attribute. A machine learning module may learn from across multiple of collection points to determine control triggers and control durations. A user anomaly collector/module may be configured to identify an unusual or anomalous usage of an application.
Bank of America
Vice President, Information Security Cyber Defense Senior Manager - Proactive Insider Threat
Teksystems Nov 2015 - Jul 2016
Cyber Security Contractor - Insider Threat: Bank of America
Hendrick Automotive Group May 2014 - Nov 2015
Director of Purchasing
Carmax Oct 2007 - Jun 2014
Senior Buyer
Carmax Aug 2004 - Oct 2007
Buyer
Education:
Purdue University 1997 - 2001
Skills:
Inventory Management Purchasing Sales Management Strategic Planning Project Management Strategy Negotiation Marketing Strategy Inventory Control Customer Service Team Leadership Sales Product Development Retail Management Customer Satisfaction Leadership Business Strategy Leadership Development Interviewing Associate Development Profit Maximization Customer Experience Data Analysis Interviewing Skills Human Resources Market Analysis
Certifications:
Interview and Interrogation Techniques Investigative Interviewing For Human Resources / Er Subconscious Communication For Interview and Interrogation
Loma Heights Elementary School Las Cruces NM 1966-1968, Court Junior High School Las Cruces NM 1968-1971, New Mexico State Univeristy Las Cruces NM 1976-1980