- Charlotte NC, US Brandon Sloane - Indian Land SC, US Jinyoung Nathan Kim - Charlotte NC, US Regina Yee Cadavid - San Gabriel CA, US Nia Mack - Prosper TX, US Ramkumar Korlepara - McKinney TX, US Elliott Leonard Lillard - Arvada CO, US Philip Lone Mintac - Charlotte NC, US Michael Jacob Richardson - Northbrook IL, US Gloria Youngsook Joo - Moorpark CA, US
A system for verifying a user operating an Automated Teller Machine (ATM) receives a first image of the user from the ATM, captured by a camera associated with the ATM, when the ATM receives a transaction request. The system compares the first image of the user with a second image of the user stored in a user profile associated with the user. The system compares the first image of the user with the second image of the user. The system determines whether the first image of the user corresponds to the second image of the user. The system approves the transaction request if it is determined that the first image of the user corresponds to the second image of the user.
Information Security System And Method For Multi-Factor Authentication For Atms Using Authentication Media
- Charlotte NC, US Brandon Sloane - Indian Land SC, US Jinyoung Nathan Kim - Charlotte NC, US Regina Yee Cadavid - San Gabriel CA, US Nia Mack - Prosper TX, US Ramkumar Korlepara - McKinney TX, US Elliott Leonard Lillard - Arvada CO, US Philip Lone Mintac - Charlotte NC, US Michael Jacob Richardson - Northbrook IL, US Gloria Youngsook Joo - Moorpark CA, US
International Classification:
G06Q 20/40 H04L 29/06 G06Q 20/10 G06K 19/06
Abstract:
A system for verifying a user operating an Automated Teller Machine (ATM) sends an authentication media item to a user device associated with the user when the ATM receives a transaction request. The system receives, from the ATM, a first image of the authentication media item when the authentication media item is presented to the ATM. The system compares the first image of the authentication media item with a second image of the authentication media item stored in a user profile associated with the user. The system extracts a first unique code from the first image of the authentication media item, and a second unique code from the second image of the authentication media item. The system determines whether the first unique code corresponds to the second unique code. The system approves the transaction request if it is determined that the first unique code corresponds to the second unique code.
Wired Multi-Factor Authentication For Atms Using An Authentication Media
- Charlotte NC, US Brandon Sloane - Indian Land SC, US Jinyoung Nathan Kim - Charlotte NC, US Regina Yee Cadavid - San Gabriel CA, US Nia Mack - Prosper TX, US Ramkumar Korlepara - McKinney TX, US Elliott Leonard Lillard - Arvada CO, US Philip Lone Mintac - Charlotte NC, US Michael Jacob Richardson - Northbrook IL, US Gloria Youngsook Joo - Moorpark CA, US
An Automated Teller Machine (ATM) terminal receives a transaction request from a user. The ATM terminal triggers a camera to capture a first image of the authentication media item presented by the user, where the first image of the authentication media item is embedded with a first unique code. The ATM terminal compares the first image of the authentication media item with a second image of the authentication media item that is associated with the user, where the second image of the authentication media item is embedded with a second unique code for verifying the user. The ATM terminal determines whether the first unique code corresponds to the second unique code. The ATM terminal conducts the transaction request if it is determined that the first unique code corresponds to the second unique code.
System And Method For Authorizing Entity Users Based On Augmented Reality And Lidar Technology
- Charlotte NC, US Regina Yee Cadavid - San Gabriel CA, US Gloria Youngsook Joo - Moorpark CA, US Jinyoung Nathan Kim - Charlotte NC, US Ramkumar Korlepara - McKinney TX, US Nia Mack - Addison TX, US Philip Lone Mintac - Charlotte NC, US Michael Jacob Richardson - Chicago IL, US Brandon Sloane - Indian Land SC, US Srilekha Mudumbai Srinivasa - Murphy TX, US
Assignee:
BANK OF AMERICA CORPORATION - Charlotte NC
International Classification:
H04L 29/06 G06F 3/01 G01S 17/42
Abstract:
Embodiments of the present invention provide a system for authorizing entity users based on augmented reality and LiDAR technology. In particular, the system may be configured to determine that a user has accessed an entity application provided by an entity via a user device, receive a unique identifier from the user device of the user, via the entity application, where the unique identifier is scanned using LiDAR technology present in the user device of the user, determine location of the user based on the unique identifier, determine an entity device associated with the unique identifier and location of the user, perform authentication of the user using at least one authentication method, determine that the authentication is successful, and in response to determining that the authentication is successful, provide access to an entity device.
Dynamic Segmentation Of Network Traffic By Use Of Pre-Shared Keys
- Charlotte NC, US Regina Yee Cadavid - San Gabriel CA, US Gloria Joo - Moorpark CA, US Jinyoung Nathan Kim - Charlotte NC, US Nia Mack - Addison TX, US
Assignee:
BANK OF AMERICA CORPORATION - Charlotte NC
International Classification:
H04L 9/32 H04L 9/40 H04L 9/06 H04L 47/10
Abstract:
Dynamic segmentation of network traffic through the use of Pre-Shared Keys (PSKs). Each defined network segment uses a different pre-shared key and a message authentication code (MAC)-signing algorithm to sign data packets with segment-specific MACs. As such, only those computer hosts/nodes that are in the network segment (i.e., have been assigned the same pre-shared key for generating and decoding the MAC signed data packets) are capable or reading the segment's network traffic. By implementing segment-specific MAC signed data packets, the present invention allows for confidential data transmission absent the need to encrypt the actual contents/data being transmitted.
Systems And Methods For Enhanced Resource Protection And Automated Response
- Charlotte NC, US Regina Yee Cadavid - San Gabriel CA, US Gloria Youngsook Joo - Moorpark CA, US Jinyoung Nathan Kim - Charlotte NC, US Ram Korlepara - McKinney TX, US Nia Mack - Prosper TX, US Philip Lone Mintac - Charlotte NC, US Srilekha Mudumbai Srinivasa - Murphy TX, US Michael Jacob Richardson - Chicago IL, US Brandon Sloane - Indian Land SC, US
Embodiments of the invention are directed to systems, methods, and computer program products for providing intelligent analysis of technical and non-technical data to identify and categorize use of entity brand elements as authorized or unauthorized. The system provides a single portal view of aggregated information and usage information for brand elements of the entity. The invention further includes the capability to recommend and automate remedial measures to prevent continued unauthorized use of brand elements.
System For Providing Enhanced Cryptography Based Response Mechanism For Malicious Attacks
- Charlotte NC, US Regina Yee Cadavid - San Gabriel CA, US Gloria Joo - Moorpark CA, US Jinyoung Nathan Kim - Charlotte NC, US Ram Korlepara - McKinney TX, US Elliott Leonard Lillard - Denver CO, US Nia Mack - Addison TX, US Philip Lone Mintac - Charlotte NC, US Michael Jacob Richardson - Chicago IL, US Srilekha Mudumbai Srinivasa - Murphy TX, US
Assignee:
BANK OF AMERICA CORPORATION - Charlotte NC
International Classification:
H04L 29/06 H04L 9/08
Abstract:
Embodiments of the present invention provide a system for providing enhanced cryptography based response mechanism for malicious attacks. The system is configured for generating one or more tracker seeds, storing the one or more tracker seeds in at least one entity system associated with an entity, identifying a malicious event associated with data in the at least one entity system, in response to identifying the malicious event, identifying an encryption algorithm and a key for the malicious event based on the one or more tracker seeds, and decrypting the data in the at least one entity system based on the encryption algorithm the key.
Dynamic Segmentation Of Network Traffic By Use Of Pre-Shared Keys
- Charlotte NC, US Regina Yee Cadavid - San Gabriel CA, US Gloria Joo - Moorpark CA, US Jinyoung Nathan Kim - Charlotte NC, US Nia Mack - Addison TX, US
Assignee:
BANK OF AMERICA CORPORATION - Charlotte NC
International Classification:
H04L 9/32 H04L 12/801 H04L 9/06 H04L 29/06
Abstract:
Dynamic segmentation of network traffic through the use of Pre-Shared Keys (PSKs). Each defined network segment uses a different pre-shared key and a message authentication code (MAC)-signing algorithm to sign data packets with segment-specific MACs. As such, only those computer hosts/nodes that are in the network segment (i.e., have been assigned the same pre-shared key for generating and decoding the MAC signed data packets) are capable or reading the segment's network traffic. By implementing segment-specific MAC signed data packets, the present invention allows for confidential data transmission absent the need to encrypt the actual contents/data being transmitted.
Youtube
RETROSPECCION parte 5/7 [Pelicula de terror 2...
RETROSPECCION; PROMESA ETERNA pelicula mexicana con tatiana espinosa p...
Category:
People & Blogs
Uploaded:
04 Feb, 2010
Duration:
9m 45s
LA AMIGA SECRETA - Corto de Terror
CORTO SIN VOZ Ceuni Tapachula para la materia de TECNICAS AUDIO VISUAL...
Category:
Entertainment
Uploaded:
18 May, 2009
Duration:
3m 1s
La Chinita es Adoptada (ParOdia)
Parodia del comercial de SaladitasCEUNI TAPACHULA Gloria Joo Suly YaLL...