- Charlotte NC, US Christopher Daniel Birch - Dayton OH, US Susan R. Hart - Addison TX, US Lisa Matthews - Charlotte NC, US Cody Dean Searl - Pineville NC, US
Assignee:
BANK OF AMERICA CORPORATION - Charlotte NC
International Classification:
H04L 9/40 G06Q 50/26 G06Q 40/02 G06F 8/65
Abstract:
Embodiments of the present invention provide a system for providing selective security regulations associated with network communications to users. The system is configured for extracting user data associated with a user, identifying one or more characteristics based on the extracted user data, generating a custom security package for the user based on the one or more characteristics, displaying one or more options associated with the custom security package on a user device of the user, prompting the user to select at least one option from the one or more options, receiving the at least one option from the user, and deploying a functionality associated with the at least one option from the custom security package.
System For Pattern Recognition To Customized Resource Usage
- Charlotte NC, US Christopher Daniel Birch - Dayton OH, US Kelly Renee-Drop Keiter - Waxhaw NC, US Lisa Matthews - Charlotte NC, US Cody Dean Searl - Pineville NC, US
Assignee:
BANK OF AMERICA CORPORATION - Charlotte NC
International Classification:
G06F 9/50 G06N 5/04
Abstract:
Resource event patterns are identified in previously conducted resource events based on historical resource event data and, in some embodiments, pending and/or previous resource event request data. Specifically, the resource event patterns indicate a timing pattern for when resource events included in the pattern are conducted. Based at least on the timing pattern, an optimal time or time period is determined for communicating a notification to the user that is configured to notify a user that a next occurrence of a time within the timing pattern is imminent and that a resource event within the resource event pattern is pending. The optimal time may be close in proximity of the next occurrence of the time within the timing pattern or, depending on other factors, such as user preference, resource volume due, resource volume availability, resource volume due in comparison to typical resource volume due, the optimal time may be farther out from the next occurrence of a time within the timing pattern.
Systems For Verifying Identities Of Parties Particpating In Distributed Network Communication
- Charlotte NC, US Susan R. Hart - Addison TX, US Kelly Renee-Drop Keiter - Waxhaw NC, US Lisa Matthews - Charlotte NC, US Cody Dean Searl - Pineville NC, US
Verification of the identities of parties participating in network-based communication, such as telephone communication, including SMS/text communication, email communication and the like is provided. Communication identifiers (IDs) (e.g., telephone numbers, email addresses or the like) are verified as being associated with one or more communication parties and, in response, a verified communication (ID) database is established. The verified communication ID database is relied upon when a user/communication is selecting a communication ID as an address for an impending communication or receiving a communication for determining whether the communication ID is verifiably associated with a known communication party. If the communication ID is determined to be verifiably associated with a known communication party, a visual or audible output may be provided on the user's device or within the communication that indicates that the communication ID is verifiably associated with the known communication party.
System For Evaluation And Weighting Of Resource Usage Activity
- Charlotte NC, US Christopher Daniel Birch - Dayton OH, US Susan R. Hart - Addison TX, US Lisa Matthews - Charlotte NC, US Cody Dean Searl - Pineville NC, US
Embodiments of the present invention provide systems and methods for evaluating and weighting resource usage activity data. The system may establish a communicable link to a user device via a user application to receive resource activity data and historical data from one or more users or systems via multiple communication channels. The system may evaluate the historical data and determine evaluation criteria based on perceived chance of loss associated with particular metadata characteristics, and use the evaluation criteria as weighted metrics for determining an overall evaluation score for the user based on indication from resource activity data that the user has conducted resource transfers with entities or channels identified in the historical data.
System For Generation And Maintenance Of Verified Data Records
- Charlotte NC, US Christopher Daniel Birch - Dayton OH, US Susan R. Hart - Addison TX, US Lisa Matthews - Charlotte NC, US Cody Dean Searl - Pineville NC, US
Embodiments of the present invention provide systems and methods for generation and maintenance of verified data records. The system may receive a data submission from a user device over one or more communication channels and convert the data submission into a normalized text format for processing and analysis. The data submission may then be analyzed using one or more trained machined learning models in order to identify factual statements and modifiers within the data submission, and generate a confidence score of verified factual information based on corroboration with one or more additional data sources. Additionally, identified modifiers may be analyzed to determine positive or negative sentiment.
Secure Data Transfer System With Integrated Proxy Gateway
- Charlotte NC, US Christopher Daniel Birch - Dayton OH, US Susan R. Hart - Addison TX, US Lisa Matthews - Charlotte NC, US Cody Dean Searl - Pineville NC, US
Assignee:
BANK OF AMERICA CORPORATION - Charlotte NC
International Classification:
H04L 29/06 H04L 29/08
Abstract:
A system for secure data transfer is provided. The system is configured to: generate a database of verified interaction providers comprising verified provider information; determine that a user device has accessed a data transfer location associated with an interaction provider; install a proxy server over the data transfer location, wherein data transfer traffic between the user device and the interaction provider is routed through and monitored by the proxy server; determine, via the proxy server, that the user device has requested an interaction at the data transfer location, the interaction comprising a data transfer; determine that the interaction provider associated with the data transfer location is in the database of verified interaction providers; and in response to determining that the interaction provider is in the database, complete the data transfer through the proxy server.
Selective Security Regulation For Network Communication
- Charlotte NC, US Christopher Daniel Birch - Dayton OH, US Susan R. Hart - Addison TX, US Lisa Matthews - Charlotte NC, US Cody Dean Searl - Pineville NC, US
Assignee:
BANK OF AMERICA CORPORATION - Charlotte NC
International Classification:
H04L 29/06 G06F 8/65 G06Q 40/02 G06Q 50/26
Abstract:
Embodiments of the present invention provide a system for providing selective security regulations associated with network communications to users. The system is configured for extracting user data associated with a user, identifying one or more characteristics based on the extracted user data, generating a custom security package for the user based on the one or more characteristics, displaying one or more options associated with the custom security package on a user device of the user, prompting the user to select at least one option from the one or more options, receiving the at least one option from the user, and deploying a functionality associated with the at least one option from the custom security package.
Googleplus
Lisa Matthews
Work:
Welcome Wagon, Canada - Co-ordinator for the Welcome Wagon Showcases
About:
I am the new co-ordinator and representative for the Welcome Wagon Showcases, in the Colchester County, in Nova Scotia. We are always looking for new and excited businesses who might be interested in ...
Lisa Matthews
Education:
Eisenhower High School Lawton, OK
Lisa Matthews
Lived:
Springfield, VA
Lisa Matthews
Work:
M2G MedManagement Group
Lisa Matthews
Work:
Oates Investments | Cable & Kilpatrick - Director of Marketing
Lisa Matthews
Tagline:
"You can go around blaming everyone else, but in the end, until you take responsibility for yourself, none of this is going to work out."
Lisa Matthews
Tagline:
Www.ladyvirag.wordpress.com
Lisa Matthews
Bragging Rights:
I have 2 awesome children and 3 precious grandchildren that I love so much!
Youtube
Lisa Matthews - Pure Perfection
My Little Tribute To The Most Adorable Woman In The World, Lisa Matthe...
Duration:
57s
Lisa Matthews
Playboy Playmates of the Year Part 298/Music Lisa Matthews Lisa Matthe...
Duration:
1m 26s
Lisa Matthews / Dirty Dan's Cool Rockin Daddi...
I like the impromptu stuff, when it comes to music. Though these guys ...
Duration:
2m 49s
Lisa Matthews - MY BLEXIT
A BLEXIT volunteer in North Carolina shares her BLEXIT. Find out more ...
Duration:
1m
Lisa Matthews Xmas Commercial
Lisa Matthews Looks PERFECT in her red dress in this Commercial!
Duration:
1m
My BLEXIT is the American Dream - Lisa Matth...
My BLEXIT videos share the stories of many who have fled the confineme...