BackgroundCheck.run
Search For

Scot L Daniels, 521032 Riddle Oak Ln, Lake Wylie, SC 29710

Scot Daniels Phones & Addresses

1032 Riddle Oak Ln, Clover, SC 29710    803-6313294   

Lake Wylie, SC   

Florence, SC   

York, SC   

1032 Riddle Oak Ln, Clover, SC 29710   

Social networks

Scot L Daniels
Scot L Daniels

Linkedin

Industries

Financial Services

Mentions for Scot L Daniels

Scot Daniels resumes & CV records

Resumes

Scot Daniels Photo 15

Senior Database Technology Manager

Location:
Charlotte, North Carolina Area
Industry:
Financial Services

Publications & IP owners

Us Patents

System For Prevention Of Unauthorized Access Using Authorized Environment Hash Outputs

US Patent:
2023005, Feb 16, 2023
Filed:
Oct 28, 2022
Appl. No.:
17/976505
Inventors:
- Charlotte NC, US
Elijah Clark - Charlotte NC, US
Scot Lincoln Daniels - Clover SC, US
Emanuel David Guller - Charlotte NC, US
Konata Stinson - Charlotte NC, US
Rick Wayne Sumrall - Charlotte NC, US
Jake Michael Yara - Mint Hill NC, US
Assignee:
BANK OF AMERICA CORPORATION - Charlotte NC
International Classification:
H04L 9/40
H04L 9/32
Abstract:
When a system tries to access a network (e.g., another system, an application, data, or the like) at least two-factor authentication may be used to validate the system. At least one authentication factor may include utilizing authentication credentials of the entity or system accessing the network. At least a second authentication factor may include using an environment hash of the system, which is a representation of the configuration (e.g., hardware, software, or the like) on the system trying to access the network. The environment hash may be compared to hash requirements (e.g., authorized environment hashes, unauthorized environment hashes, or the like) to aid in the validation. The system may only access the network when both the authentication credentials and the environment hashes meet requirements.

Virtual Environment System For Validating Executable Data Using Accelerated Time-Based Process Execution

US Patent:
2021032, Oct 21, 2021
Filed:
Apr 16, 2020
Appl. No.:
16/850485
Inventors:
- Charlotte NC, US
Emanuel David Guller - Charlotte NC, US
Edward Lee Traywick - Bellbrook OH, US
Scot Lincoln Daniels - Clover SC, US
Rick Wayne Sumrall - Charlotte NC, US
Elijah Clark - Charlotte NC, US
Konata Stinson - Charlotte NC, US
Jake Michael Yara - Mint Hill NC, US
Assignee:
Bank of America Corporation - Charlotte NC
International Classification:
G06F 11/34
G06F 11/30
G06F 21/62
G06F 21/60
G06F 8/40
Abstract:
A virtual environment system for validating using accelerated time-based process execution is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. The set of commands or processes may be executed on an accelerated-time basis such that processes that would be executed on a longer timeline may be executed at a greater speed (e.g., a shorter timeline). In this way, the system may securely detect the presence of latent defects or issues that may arise from executing the code on a long-term basis.

Virtual Environment System For Secure Execution Of Program Code Using Cryptographic Hashes

US Patent:
2021032, Oct 21, 2021
Filed:
Apr 16, 2020
Appl. No.:
16/850525
Inventors:
- Charlotte NC, US
Emanuel David Guller - Charlotte NC, US
Edward Lee Traywick - Bellbrook OH, US
Scot Lincoln Daniels - Clover SC, US
Rick Wayne Sumrall - Charlotte NC, US
Elijah Clark - Charlotte NC, US
Konata Stinson - Charlotte NC, US
Assignee:
Bank of America Corporation - Charlotte NC
International Classification:
G06F 21/53
G06F 16/25
G06F 16/23
H04L 9/32
G06F 21/57
Abstract:
A virtual environment system for validating executable data using authorized hash outputs is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. If the system determines that the executable data is safe to run, the system may generate a hash output of the executable data and store the hash output in a database of approved executable data. In this way, the system may securely generate a repository of authorized hashes such that the system may ensure that only safely executable code is processed by the computing systems within the network environment.

System For Analysis And Authorization For Use Of Executable Environment Data In A Computing System Using Hash Outputs

US Patent:
2021032, Oct 21, 2021
Filed:
Apr 16, 2020
Appl. No.:
16/850561
Inventors:
- Charlotte NC, US
Emanuel David Guller - Charlotte NC, US
Edward Lee Traywick - Bellbrook OH, US
Scot Lincoln Daniels - Clover SC, US
Rick Wayne Sumrall - Charlotte NC, US
Elijah Clark - Charlotte NC, US
Konata Stinson - Charlotte NC, US
Jake Michael Yara - Mint Hill NC, US
Assignee:
Bank of America Corporation - Charlotte NC
International Classification:
G06F 21/60
G06F 21/31
G06F 21/62
G06F 11/30
G06F 11/32
G06F 8/40
Abstract:
A virtual environment system for validating executable data using authorized hash outputs is provided. In particular, the system may generate a virtual environment using a virtual environment device, where the virtual environment is logically and/or physically separated from other devices and/or environments within the network. The system may then open a specified set of executable data within the virtual environment and perform a set of commands or processes with respect to the executable data. If the system determines that the executable data is unsafe to run, the system may generate a hash output of the executable data and store the hash output in a database of unauthorized executable data. In this way, the system may securely generate a repository of authorized and unauthorized hashes such that the system may ensure that unsafe executable data is blocked from being processed within a network environment.

System For Network Isolation Of Affected Computing Systems Using Environment Hash Outputs

US Patent:
2021032, Oct 21, 2021
Filed:
Apr 16, 2020
Appl. No.:
16/850797
Inventors:
- Charlotte NC, US
Elijah Clark - Charlotte NC, US
Scot Lincoln Daniels - Clover SC, US
Emanuel David Guller - Charlotte NC, US
Konata Stinson - Charlotte NC, US
Rick Wayne Sumrall - Charlotte NC, US
Edward Lee Traywick - Bellbrook OH, US
Jake Michael Yara - Mint Hill NC, US
Assignee:
BANK OF AMERICA CORPORATION - Charlotte NC
International Classification:
H04L 29/06
G06F 16/22
Abstract:
A system already on a network may be analyzed when the system takes an action or may be periodically reviewed. The analysis of the system may include the creation of an environment hash for the system, which is a representation of the configuration (e.g., hardware, software, or the like) of the system, and a comparison with hash requirements. The hash requirements may be stored authorized hashes, stored unauthorized hashes, past hashes for the same system, hashes for other systems with the same or similar configurations, or the like. When the environment hash of the system meets hash requirements, the system may be allowed to continue to operate on the system or may be allowed to take the action on the network. When the hash of the system fails to meet a hash requirement, the system may be isolated from the network and investigated for a non-compliant configuration.

System For Prevention Of Unauthorized Access Using Authorized Environment Hash Outputs

US Patent:
2021032, Oct 21, 2021
Filed:
Apr 16, 2020
Appl. No.:
16/850793
Inventors:
- Charlotte NC, US
Elijah Clark - Charlotte NC, US
Scot Lincoln Daniels - Clover SC, US
Emanuel David Guller - Charlotte NC, US
Konata Stinson - Charlotte NC, US
Rick Wayne Sumrall - Charlotte NC, US
Jake Michael Yara - Mint Hill NC, US
Assignee:
BANK OF AMERICA CORPORATION - Charlotte NC
International Classification:
H04L 29/06
H04L 9/32
Abstract:
When a system tries to access a network (e.g., another system, an application, data, or the like) at least two-factor authentication may be used to validate the system. At least one authentication factor may include utilizing authentication credentials of the entity or system accessing the network. At least a second authentication factor may include using an environment hash of the system, which is a representation of the configuration (e.g., hardware, software, or the like) on the system trying to access the network. The environment hash may be compared to hash requirements (e.g., authorized environment hashes, unauthorized environment hashes, or the like) to aid in the validation. The system may only access the network when both the authentication credentials and the environment hashes meet requirements.

Automatically Executing Responsive Actions Based On A Verification Of An Account Lineage Chain

US Patent:
2021021, Jul 8, 2021
Filed:
Jan 8, 2020
Appl. No.:
16/737502
Inventors:
- Charlotte NC, US
Edward Lee Traywick - Charlotte NC, US
Scot L. Daniels - Clover SC, US
International Classification:
H04L 29/06
G06F 21/62
Abstract:
Aspects of the disclosure relate to account lineage tracking and automatically executing responsive actions upon detecting an account lineage. A computing platform may receive a first account-change message from a source-level interceptor. The first account-change message may include information identifying a source account associated with a first computing device and identifying a first target account. The first target account may be associated with a target application configured to access the target database. The computing platform may receive a second account-change message from a database-level interceptor. The second account-change message may include information identifying the first target account as a database-level source account and identifying a second target account associated with one or more target databases. After receiving the first and second account-change messages, the computing platform may generate a notification comprising information associated with an account lineage between the source account and the second target account.

Automatically Executing Responsive Actions Upon Detecting An Incomplete Account Lineage Chain

US Patent:
2021021, Jul 8, 2021
Filed:
Jan 8, 2020
Appl. No.:
16/737542
Inventors:
- Charlotte NC, US
Edward Lee Traywick - Charlotte NC, US
Scot L. Daniels - Clover SC, US
International Classification:
H04L 29/08
G06Q 40/02
G06F 16/23
Abstract:
Aspects of the disclosure relate to account lineage tracking and automatically executing responsive actions upon detecting an incomplete lineage chain. A computing platform may receive an account-change message from a database-level interceptor. The account-change message may include information identifying a first target account as a database-level source account and identifying a second target account associated with one or more target databases. The first target account may be associated with a target application configured to access the target database. After receiving the account-change message, the computing platform may determine, based on a failure to detect a source account associated with the first target account, that an account lineage chain associated with the account-change message is incomplete. In response to determining that the account lineage chain is incomplete, the computing platform may generate and send one or more commands to limit access of the first target account to the target database.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.