BANK OF AMERICA LEGAL DEPARTMENT Patent applications |
Patent application number | Title | Published |
20120265659 | LOAN REPORTING ASSOCIATED WITH REAL ESTATE - Aspects described herein provide techniques for providing information on real estate loans. First user input indicating a request for identifying at least one exception for data elements associated with at least one real estate loan may be received. The at least one exception may be representative of a conditionally acceptable data element value or an unacceptable data element value. Data for the at least one real estate loan may be compared with business rules data concerning unconditionally acceptable values of the data. The at least one exception may be identified based upon the comparison. Second user input indicating one of a verification of the at least one exception for the conditionally acceptable data element value or a change of the value for the at least one exception for the unacceptable data element value may be received. | 10-18-2012 |
20120226529 | RESOURCE AVAILABILITY AND APPLICABILITY MECHANISM - A computer system may identify an individual accessing a resource computer system. A request from the identified individual to access employee data in a resource computer system may be received. A determination may be made as to whether the identified individual is an employee of a plurality of employees of an entity. Upon determining the identified individual is an employee of the plurality of employees of the entity, updated identified individual entered proficiency level ratings data for a plurality of skills of the identified individual may be received. A notification to a manager of the updated identified individual entered proficiency level ratings data may be generated. For each updated identified individual entered proficiency level ratings data for the plurality of skills of the identified individual, manager entered validation data may be received. | 09-06-2012 |
20120210122 | PERSONAL ENCRYPTION DEVICE - A method and system for securing a handheld computing device is described. A personal encryption device may be physically connected to a handheld computing device. Responsive to the connection, a main screen user interface may be displayed on a display of the handheld computing device. The main screen user interface may include at least one cryptography option for a user of the handheld computing device. A user-defined input representative of selection of a first cryptography option of the at least one cryptography option may be received, and at least one cryptography process associated with the selected first cryptography option may be implemented by the handheld computing device and personal encryption device. The cryptography options may include encryption, decryption, digital signatures, and digital signature verification. | 08-16-2012 |
20110247082 | Integration of Different Mobile Device Types with a Business Infrastructure - A mobile implementation channel enables secure mobile customer alerts, content delivery, event and location awareness and context integration that can be leveraged across multiple lines of business using basic interfaces. Pushed documents may be processed by an application executing at a mobile device in a secure manner. An alert indication may be sent to the mobile device when the documents are available. The documents may then be downloaded over a secure channel if the user affirmatively responds to the alert indication and may be further encrypted and stored in an application file store. The user may subsequently select one of the documents from a document list so that the selected document may be decrypted and displayed. The stored documents in the application file store may be deleted if the operating system has been compromised, the user is not associated with a business, or the user device is lost or stolen. | 10-06-2011 |
20110208677 | INTRUSION DETECTION SYSTEM ALERTS MECHANISM - A system and method for analyzing Intrusion Detection System (IDS) alert data associated with a computer network is described. The method includes applying first association rules to obtained IDS alert data associated with a computer network and processing the obtained IDS alert data with the first association rules. Analyst feedback data associated with the processed obtained IDS alert data is received, and a training data set from the analyst feedback data is received. New association rules are determined based upon the training data set, and the new association rules are outputted to a display of a computing device. Outputting the new association rules may include outputting patterns within the IDS alert data of false positive alerts. The new association rules may be applied back to the obtained IDS alert data. | 08-25-2011 |