US 12,407,682 B2
System, device, and method for performing secured operations
George Anthony Albero, Charlotte, NC (US); Olga Caroline Kocharyan, Matthews, NC (US); Dustin Paul Stocks, Matthews, NC (US); Maharaj Mukherjee, Poughkeepsie, NY (US); Karen Davis, Charlotte, NC (US); Lisa Snow Pugh, Charlotte, NC (US); Anna Maria Mirarchi, Charlotte, NC (US); Sanjay Arjun Lohar, Charlotte, NC (US); James Joseph Siekman, Charlotte, NC (US); Anna Xu, New York, NY (US); and Samantha Ilse Quales, Fort Mill, SC (US)
Assigned to Bank of America Corporation, Charlotte, NC (US)
Filed by Bank of America Corporation, Charlotte, NC (US)
Filed on Oct. 3, 2023, as Appl. No. 18/479,917.
Prior Publication US 2025/0112916 A1, Apr. 3, 2025
Int. Cl. G06F 21/00 (2013.01); H04L 9/40 (2022.01)
CPC H04L 63/0853 (2013.01) [H04L 63/0861 (2013.01); H04L 63/107 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A system for performing secured operations, comprising:
a first device, wherein the first device comprises:
a predefined data item, wherein the predefined data item is associated on the first device or embedded into the first device;
a sensor circuit embedded within the first device and configured to detect a location coordinate of the first device;
a network interface embedded within the first device and configured to communicate the detected location coordinate of the first device; and
a verification information embedded within the first device, wherein:
the verification information is uniquely associated with a first user associated with the first device;
the verification information is encoded with information associated with the first user; and
the verification information is linked to an identity of the first user; and
a second device communicatively coupled to the first device and comprising:
a communication interface configured to capture the verification information when the first device is within a threshold distance from the second device; and
a processor operably coupled to the communication interface and configured to:
detect the information that is encoded within the verification information;
determine whether the information is verified; and
in response to determining that the information is verified, transfer at least
a portion of the predefined data item.