Search

Elijah John Clark

age ~46

from Charlotte, NC

Also known as:
  • Elijah J Clark
  • Elijah C Clark
Phone and address:
610 Ashgrove Ln, Charlotte, NC 28270
(704)6041921

Elijah Clark Phones & Addresses

  • 610 Ashgrove Ln, Charlotte, NC 28270 • (704)6041921
  • 630 Ashgrove Ln, Charlotte, NC 28270 • (704)5538574 • (704)7086947
  • 207 Quincy St, West Lafayette, IN 47906 • (765)7436631
  • Geneva, IL
  • Fort Pierce, FL
  • W Lafayette, IN
  • Saint Charles, IL
  • 630 Ashgrove Ln, Charlotte, NC 28270

Work

  • Company:
    John volpi
    Jul 2012
  • Position:
    Prodution team member

Education

  • School / High School:
    Ranken Technical College- St. Louis, MO
    2011
  • Specialities:
    Welding

License Records

Elijah Bruce Clark

License #:
7029994 - Active
Category:
EMS Licensing
Issued Date:
Dec 8, 2016
Expiration Date:
Jun 30, 2018
Type:
EMT-Intermediate Technician (AEMT)

Us Patents

  • Multi-Source Anomaly Detection And Automated Dynamic Resolution System

    view source
  • US Patent:
    20220253872, Aug 11, 2022
  • Filed:
    Apr 25, 2022
  • Appl. No.:
    17/728486
  • Inventors:
    - Charlotte NC, US
    Elijah Clark - Charlotte NC, US
  • International Classification:
    G06Q 30/00
    G06N 20/00
  • Abstract:
    Arrangements for detecting anomalies and dynamically generating a response are presented. In some examples, attribute data including a plurality of source elements may be received. The source element data may be received from a plurality of source computing systems. The attribute data, including the source element data, may be analyzed using machine learning techniques to identify any anomalies in the attribute data. If an anomaly is detected, a notification may be generated including data associated with the anomaly, a user associated with the anomaly and the like. The notification may be transmitted to a computing device for display. In some examples, if an anomaly is detected, data associated with the anomaly may be compared to pre-stored rules to determine whether a pre-stored rule applies to the identified anomaly. If a pre-stored rule applies, an instruction or command may be generated and transmitted to one or more source computing devices or systems.
  • System For Prevention Of Unauthorized Access Using Authorized Environment Hash Outputs

    view source
  • US Patent:
    20230052790, Feb 16, 2023
  • Filed:
    Oct 28, 2022
  • Appl. No.:
    17/976505
  • Inventors:
    - Charlotte NC, US
    Elijah Clark - Charlotte NC, US
    Scot Lincoln Daniels - Clover SC, US
    Emanuel David Guller - Charlotte NC, US
    Konata Stinson - Charlotte NC, US
    Rick Wayne Sumrall - Charlotte NC, US
    Jake Michael Yara - Mint Hill NC, US
  • Assignee:
    BANK OF AMERICA CORPORATION - Charlotte NC
  • International Classification:
    H04L 9/40
    H04L 9/32
  • Abstract:
    When a system tries to access a network (e.g., another system, an application, data, or the like) at least two-factor authentication may be used to validate the system. At least one authentication factor may include utilizing authentication credentials of the entity or system accessing the network. At least a second authentication factor may include using an environment hash of the system, which is a representation of the configuration (e.g., hardware, software, or the like) on the system trying to access the network. The environment hash may be compared to hash requirements (e.g., authorized environment hashes, unauthorized environment hashes, or the like) to aid in the validation. The system may only access the network when both the authentication credentials and the environment hashes meet requirements.
  • Virtual Environment System For Validating Executable Data Using Accelerated Time-Based Process Execution

    view source
  • US Patent:
    20210326234, Oct 21, 2021
  • Filed:
    Apr 16, 2020
  • Appl. No.:
    16/850485
  • Inventors:
    - Charlotte NC, US
    Emanuel David Guller - Charlotte NC, US
    Edward Lee Traywick - Bellbrook OH, US
    Scot Lincoln Daniels - Clover SC, US
    Rick Wayne Sumrall - Charlotte NC, US
    Elijah Clark - Charlotte NC, US
    Konata Stinson - Charlotte NC, US
    Jake Michael Yara - Mint Hill NC, US
  • Assignee:
    Bank of America Corporation - Charlotte NC
  • International Classification:
    G06F 11/34
    G06F 11/30
    G06F 21/62
    G06F 21/60
    G06F 8/40
  • Abstract:
    A virtual environment system for validating using accelerated time-based process execution is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. The set of commands or processes may be executed on an accelerated-time basis such that processes that would be executed on a longer timeline may be executed at a greater speed (e.g., a shorter timeline). In this way, the system may securely detect the presence of latent defects or issues that may arise from executing the code on a long-term basis.
  • Virtual Environment System For Secure Execution Of Program Code Using Cryptographic Hashes

    view source
  • US Patent:
    20210326434, Oct 21, 2021
  • Filed:
    Apr 16, 2020
  • Appl. No.:
    16/850525
  • Inventors:
    - Charlotte NC, US
    Emanuel David Guller - Charlotte NC, US
    Edward Lee Traywick - Bellbrook OH, US
    Scot Lincoln Daniels - Clover SC, US
    Rick Wayne Sumrall - Charlotte NC, US
    Elijah Clark - Charlotte NC, US
    Konata Stinson - Charlotte NC, US
  • Assignee:
    Bank of America Corporation - Charlotte NC
  • International Classification:
    G06F 21/53
    G06F 16/25
    G06F 16/23
    H04L 9/32
    G06F 21/57
  • Abstract:
    A virtual environment system for validating executable data using authorized hash outputs is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. If the system determines that the executable data is safe to run, the system may generate a hash output of the executable data and store the hash output in a database of approved executable data. In this way, the system may securely generate a repository of authorized hashes such that the system may ensure that only safely executable code is processed by the computing systems within the network environment.
  • System For Analysis And Authorization For Use Of Executable Environment Data In A Computing System Using Hash Outputs

    view source
  • US Patent:
    20210326455, Oct 21, 2021
  • Filed:
    Apr 16, 2020
  • Appl. No.:
    16/850561
  • Inventors:
    - Charlotte NC, US
    Emanuel David Guller - Charlotte NC, US
    Edward Lee Traywick - Bellbrook OH, US
    Scot Lincoln Daniels - Clover SC, US
    Rick Wayne Sumrall - Charlotte NC, US
    Elijah Clark - Charlotte NC, US
    Konata Stinson - Charlotte NC, US
    Jake Michael Yara - Mint Hill NC, US
  • Assignee:
    Bank of America Corporation - Charlotte NC
  • International Classification:
    G06F 21/60
    G06F 21/31
    G06F 21/62
    G06F 11/30
    G06F 11/32
    G06F 8/40
  • Abstract:
    A virtual environment system for validating executable data using authorized hash outputs is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. If the system determines that the executable data is unsafe to run, the system may generate a hash output of the executable data and store the hash output in a database of unauthorized executable data. In this way, the system may securely generate a repository of authorized and unauthorized hashes such that the system may ensure that unsafe executable data is blocked from being processed within a network environment.
  • System For Network Isolation Of Affected Computing Systems Using Environment Hash Outputs

    view source
  • US Patent:
    20210328985, Oct 21, 2021
  • Filed:
    Apr 16, 2020
  • Appl. No.:
    16/850797
  • Inventors:
    - Charlotte NC, US
    Elijah Clark - Charlotte NC, US
    Scot Lincoln Daniels - Clover SC, US
    Emanuel David Guller - Charlotte NC, US
    Konata Stinson - Charlotte NC, US
    Rick Wayne Sumrall - Charlotte NC, US
    Edward Lee Traywick - Bellbrook OH, US
    Jake Michael Yara - Mint Hill NC, US
  • Assignee:
    BANK OF AMERICA CORPORATION - Charlotte NC
  • International Classification:
    H04L 29/06
    G06F 16/22
  • Abstract:
    A system already on a network may be analyzed when the system takes an action or may be periodically reviewed. The analysis of the system may include the creation of an environment hash for the system, which is a representation of the configuration (e.g., hardware, software, or the like) of the system, and a comparison with hash requirements. The hash requirements may be stored authorized hashes, stored unauthorized hashes, past hashes for the same system, hashes for other systems with the same or similar configurations, or the like. When the environment hash of the system meets hash requirements, the system may be allowed to continue to operate on the system or may be allowed to take the action on the network. When the hash of the system fails to meet a hash requirement, the system may be isolated from the network and investigated for a non-compliant configuration.
  • System For Prevention Of Unauthorized Access Using Authorized Environment Hash Outputs

    view source
  • US Patent:
    20210328995, Oct 21, 2021
  • Filed:
    Apr 16, 2020
  • Appl. No.:
    16/850793
  • Inventors:
    - Charlotte NC, US
    Elijah Clark - Charlotte NC, US
    Scot Lincoln Daniels - Clover SC, US
    Emanuel David Guller - Charlotte NC, US
    Konata Stinson - Charlotte NC, US
    Rick Wayne Sumrall - Charlotte NC, US
    Jake Michael Yara - Mint Hill NC, US
  • Assignee:
    BANK OF AMERICA CORPORATION - Charlotte NC
  • International Classification:
    H04L 29/06
    H04L 9/32
  • Abstract:
    When a system tries to access a network (e.g., another system, an application, data, or the like) at least two-factor authentication may be used to validate the system. At least one authentication factor may include utilizing authentication credentials of the entity or system accessing the network. At least a second authentication factor may include using an environment hash of the system, which is a representation of the configuration (e.g., hardware, software, or the like) on the system trying to access the network. The environment hash may be compared to hash requirements (e.g., authorized environment hashes, unauthorized environment hashes, or the like) to aid in the validation. The system may only access the network when both the authentication credentials and the environment hashes meet requirements.
  • Method And System For Data Communication With Anomaly Detection

    view source
  • US Patent:
    20210211447, Jul 8, 2021
  • Filed:
    Jan 8, 2020
  • Appl. No.:
    16/737146
  • Inventors:
    - Charlotte NC, US
    Elijah Clark - Charlotte NC, US
  • International Classification:
    H04L 29/06
    H04L 12/58
    G06N 3/08
    H04L 12/24
    G06N 3/04
  • Abstract:
    Methods, systems, and computing platforms for data communication are disclosed. A computer-data communication based network, including receiving a set of virtual nodes each with a data payload may include an originating node attribute, an infosec data attribute, an behavioral data attribute, a biometric enterprise attribute and at least one data element associated with the originating node attribute. A machine learning module may learn from across multiple of collection points to determine control triggers and control durations. A user anomaly collector/module may be configured to identify an unusual or anomalous usage of an application.

Resumes

Elijah Clark Photo 1

Vsim Card Assistant

view source
Location:
4590 Waterford Dr northwest, Concord, NC 28027
Work:
Dhi Telecom Group
Vsim Card Assistant
Education:
Campbell University
Languages:
English
Spanish
Elijah Clark Photo 2

Vice President, Information Security Cyber Defense Senior Manager - Proactive Insider Threat

view source
Location:
Charlotte, NC
Industry:
Computer & Network Security
Work:
Bank of America
Vice President, Information Security Cyber Defense Senior Manager - Proactive Insider Threat

Teksystems Nov 2015 - Jul 2016
Cyber Security Contractor - Insider Threat: Bank of America

Hendrick Automotive Group May 2014 - Nov 2015
Director of Purchasing

Carmax Oct 2007 - Jun 2014
Senior Buyer

Carmax Aug 2004 - Oct 2007
Buyer
Education:
Purdue University 1997 - 2001
Skills:
Inventory Management
Purchasing
Sales Management
Strategic Planning
Project Management
Strategy
Negotiation
Marketing Strategy
Inventory Control
Customer Service
Team Leadership
Sales
Product Development
Retail
Management
Customer Satisfaction
Leadership
Business Strategy
Leadership Development
Interviewing
Associate Development
Profit Maximization
Customer Experience
Data Analysis
Interviewing Skills
Human Resources
Market Analysis
Certifications:
Interview and Interrogation Techniques
Investigative Interviewing For Human Resources / Er
Subconscious Communication For Interview and Interrogation
Elijah Clark Photo 3

Elijah Clark

view source
Work:
United States
Elijah Clark Photo 4

Beckman High School

view source
Work:

Beckman High School
Elijah Clark Photo 5

Intern

view source
Work:
Tridius Technologies
Intern
Elijah Clark Photo 6

Elijah Clark

view source
Elijah Clark Photo 7

Elijah Clark

view source
Elijah Clark Photo 8

Elijah Clark

view source

Flickr

Facebook

Elijah Clark Photo 17

Elijah Clark Ventura

view source
Elijah Clark Photo 18

Elijah Clark

view source
Elijah Clark Photo 19

Elijah Clark

view source
Elijah Clark Photo 20

Elijah Munch Clark

view source
Elijah Clark Photo 21

Elijah B Clark

view source
Elijah Clark Photo 22

Elijah FreakyFranchise Cl...

view source
Elijah Clark Photo 23

Elijah David Clark

view source
Elijah Clark Photo 24

Elijah Clark

view source

Classmates

Elijah Clark Photo 25

Elijah Clark

view source
Schools:
Pitt Job Corps High School Pittsburgh PA 1978-1982
Community:
Dave Bryner, David Morgan, Kelley Davis
Elijah Clark Photo 26

Elijah Clark

view source
Schools:
Livingston High School Livingston KY 1965-1969
Community:
Nivra Smith, Eldon Mcguire
Elijah Clark Photo 27

Elijah Clark

view source
Schools:
Fulton Elementary School Fulton IL 2000-2004
Community:
Mary Chatman, James Mcneilly, Phillip Campbell, Michael Workman, Bruce Henderson
Elijah Clark Photo 28

Elijah Clark

view source
Schools:
Sheridan Global Arts and Communications Elementary School Minneapolis MN 2000-2004, Robert Fulton Elementary School Chicago IL 2002-2004
Community:
Mary Turpin-Thomas, Gloria Satt, Luann Ziesmer, Candice Alexander
Elijah Clark Photo 29

Elijah Clark

view source
Schools:
R. J. Kirksey High School Aliceville AL 1955-1959
Community:
Dorothy Jones, Joe Mckinstry
Elijah Clark Photo 30

Elijah Clark

view source
Schools:
Loma Heights Elementary School Las Cruces NM 1966-1968, Court Junior High School Las Cruces NM 1968-1971, New Mexico State Univeristy Las Cruces NM 1976-1980
Community:
Bill Adler
Elijah Clark Photo 31

Elijah Clark

view source
Schools:
Douglas High School Lawndale NC 1956-1960
Community:
Lillian Wray, Loy Elmore, Yvonne Glover, Linda Shade, Eleanor Pullen, Airleen Hall, Ambrous Archie, Alice Oglesby, Mary Barnhart, Joseph Mcmullens
Elijah Clark Photo 32

Elijah Clark Junior High ...

view source

Youtube

Who Was Elijah Clarke? | Revolutionary Patriots

During the American Revolution, Elijah Clarke was a colonel for the Ge...

  • Duration:
    2m 16s

Bret Hlavecek vs Elijah Clarke

Bret Hlavecek vs Elijah Clarke August 14, 2015 Official Channel of Fri...

  • Duration:
    24m 46s

Elijah Clark State Park Campground, GA

Elijah Clark State Park campground has 172 single family campsites and...

  • Duration:
    11m 42s

Elijah Clark State Park Campground Review | C...

We spent our Spring Break camping at Elijah Clark State Park on Clarks...

  • Duration:
    40m 32s

Elijah Clark State Park - Full Campsite Tour

Hello Everyone, WELCOME to Our Lives Traveled! Today's adventure is ou...

  • Duration:
    22m 14s

WBC Muaythai Title fight

  • Duration:
    28m 50s

Googleplus

Elijah Clark Photo 33

Elijah Clark

Elijah Clark Photo 34

Elijah Clark

Elijah Clark Photo 35

Elijah Clark

Elijah Clark Photo 36

Elijah Clark

Tagline:
EC3!
Elijah Clark Photo 37

Elijah Clark

Elijah Clark Photo 38

Elijah Clark

Elijah Clark Photo 39

Elijah Clark

Elijah Clark Photo 40

Elijah Clark

Myspace

Elijah Clark Photo 41

Elijah Clark

view source
Locality:
axis, Alabama
Gender:
Male
Birthday:
1948
Elijah Clark Photo 42

Elijah Clark

view source
Locality:
Grand Prairie, Texas
Gender:
Male
Birthday:
1942
Elijah Clark Photo 43

Elijah Clark

view source
Locality:
Omaha, Nebraska
Gender:
Male
Birthday:
1951
Elijah Clark Photo 44

Elijah Clark

view source
Locality:
philadelphia, Pennsylvania
Gender:
Male
Birthday:
1946

Get Report for Elijah John Clark from Charlotte, NC, age ~46
Control profile