US 12,289,326 B2
Electronic artificial intelligence system for authenticating software
Pierre Jacques Bouchard, Davidson, NC (US); Manu Jacob Kurian, Dallas, TX (US); John L. Reilly, Charlotte, NC (US); and Lakshminarayana Vishnubhotla, Skillman, NJ (US)
Assigned to BANK OF AMERICA CORPORATION, Charlotte, NC (US)
Filed by BANK OF AMERICA CORPORATION, Charlotte, NC (US)
Filed on Aug. 12, 2022, as Appl. No. 17/887,089.
Prior Publication US 2024/0056457 A1, Feb. 15, 2024
Int. Cl. H04L 29/00 (2006.01); H04L 9/40 (2022.01); H04L 41/16 (2022.01)
CPC H04L 63/1416 (2013.01) [H04L 41/16 (2013.01); H04L 63/145 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A security system for application development, the system comprising:
one or more memory devices with computer-readable program code stored thereon; and
one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute the computer-readable program code to:
couple an application signature to an application, wherein the application is a newly developed application within an organization;
monitor, through the use of an artificial intelligence and/or machine learning (AI/ML), one or more resources, wherein the one or more resources are internal resources within the organization or one or more third-party resources outside the organization;
access a resource ontology system, wherein the resources ontology system comprises an interconnected map of a plurality of resources, wherein the interconnected map links interacting resources;
identify, through the use of the AI/ML, the resource ontology system, and the application signature, when the one or more resources with which the application interacts are updated to one or more updated resources;
determine when the one or more updated resources are validated;
alter the application signature in view of the one or more updated resources to create an altered application signature, wherein the altered application signature comprises a tag coupled with the application signature, a new replacement application signature, and addendum to the application signature; and
update the interconnected map of the plurality of resources with the one or more updated resources and the altered application signature.