Abstract: The invention relates to a computer-implemented system and method for service-to-service authentication. The method may comprise deploying the SSA service, deploying a micro service, and providing an SSA client that serves as an interface between the micro service and the SSA service. The micro service can send a request to the SSA service for an authentication token. The SSA service then generates the authentication token for the micro service, which is signed by the SSA service using an SSA service private key. The authentication token can be encrypted so that it is secure when sent by the SSA service to the micro service. The authentication token carries information necessary for the micro service to access a second micro service directly through validation of the authentication token by the second micro service based in part on a private key of the micro service previously generated by the SSA service.
Abstract: Systems and methods for facilitating payment application provisioning and transacting are disclosed. According to one embodiment, a method for provisioning a token to a third party payment application on a mobile device may include (1) receiving a logon from a customer using a mobile application for a financial institution executed on a mobile device and a device identifier for the mobile device; (2) receiving a request to provision a token for a third party payment application; (3) authenticating the customer using the logon information and the device identifier; (4) provisioning a token for a payment device associated with the customer; and (5) providing the token to the third party payment application for transaction processing.
Type:
Grant
Filed:
April 18, 2016
Date of Patent:
December 29, 2020
Assignee:
JPMORGAN CHASE BANK, N.A.
Inventors:
Howard Spector, Scott Ouellette, Brian J. Smyth, Christina Sheppard, Gavin Michael, Sih X. Lee, Kelly Dempski, Tim J. Parsey, Andrew Sloper, Ken Wimberely, Laura X. Wang, Shadman Zafar
Abstract: An embodiment of the present invention is directed to a code review tool. A system that implements a T24 code review tool comprises: a memory component; an interactive interface that receives one or more user inputs; a processor, coupled to the memory component and the interactive interface, the processor configured to perform the steps comprising: retrieve components of an application; initiate automated code review function for the components; identify code review comments prior to code compilation; display comments with severity for code review; and confirm and initiate code compilation process.
Type:
Grant
Filed:
March 1, 2017
Date of Patent:
December 29, 2020
Assignee:
JPMorgan Chase Bank, N.A.
Inventors:
Rakesh Balachandran Nair, Gowthamen Natarajan, Dinesh Babu Parthasarathi, Narayana N. Venkata, Nicholas M. Lore
Abstract: Various systems, methods, and media for providing an individual with at least one option for relocation are provided. Individual occupation information is obtained that corresponds to a primary occupation, an employment history, or an education of the individual. Individual preference information is obtained that corresponds to a lifestyle preference of the individual. Current location information is obtained, from a predetermined source, that corresponds to a plurality of locations. The individual occupation information and the individual preference information are correlated with the current location information. At least one location is provided, as the at least one option for relocation, to the individual.
Abstract: A method of scanning software code to identify security flaws or risks and reporting those flaws or risks to a software developer or other interested party, where the software code is written in a language for which a vulnerability scanner is not available.
Type:
Grant
Filed:
August 10, 2018
Date of Patent:
December 22, 2020
Assignee:
JPMORGAN CHASE BANK, N.A.
Inventors:
Laura J Schornack, Anna Borowski, Sandeep V Chandan, Sonia L D'Souza, Derek M Ferguson, Daniel F Gleeson, Sreevani Rachakonda, Kaushik Ravichandran, Ankit Shah, Dayann Thompson, Arunkumar Unniparambath
Abstract: Various methods, apparatuses, and media for producing a report are provided. A first input that includes raw data and derived data is received, and mathematical relationships between the derived data and the raw data are determined. The mathematical relationships are used for generating executable code, which is then applied to newly inputted raw data to produce the report.
Type:
Grant
Filed:
December 11, 2018
Date of Patent:
December 22, 2020
Assignee:
JPMORGAN CHASE BANK, N.A.
Inventors:
Deepak Paliwal, Shreedhara Bhat, Emil Streminsky, Soyeon Park
Abstract: Methods, non-transitory computer readable media, and workload scheduler devices that determine one of a plurality of task categories for a received task. A stored expected runtime for each of a plurality of CPUs to execute one standard computation unit (SCU) in the determined one of the plurality of task category is obtained. One of the plurality of CPUs is selected based on the stored expected runtime. The task is dispatched to the selected one of the plurality of CPUs for execution. Accordingly, with this technology, tasks associated with workloads can be more effectively dispatched and more effectively processed by a CPU pool.
Type:
Grant
Filed:
November 17, 2017
Date of Patent:
December 22, 2020
Assignee:
JPMORGAN CHASE BANK, N.A.
Inventors:
Minlin Gao, Jason K S Choy, Darren Marvin, Libin Yang
Abstract: Security design and architecture for a multi-tenant Hadoop cluster are disclosed. In one embodiment, in a multi-tenant Hadoop cluster comprising a plurality of tenants and a plurality of applications, a method for identifying, naming, and creating a multi-tenant directory structure in a multi-tenant Hadoop cluster may include (1) identifying a plurality of groups for a directory structure selected from the group consisting of a superuser group, a plurality of tenant groups, and at least one application group; (2) creating an active directory for each of the groups; (3) adding each of a plurality of users to one of the plurality of tenant groups and the application group; (4) creating tenant directories and home directories for the users; and (5) assigning owners, group owners, default permissions, and extended access control lists to the tenant directories and the home directories.
Type:
Grant
Filed:
May 23, 2017
Date of Patent:
December 22, 2020
Assignee:
JPMORGAN CHASE BANK, N.A.
Inventors:
Akhilesh Gupta, Raja Banerjee, James P. Cuddihy, Jay Rajaram, Ratikanta Mishra, Suman Kumar Addanki, Michael Aguiling
Abstract: A method, device and non-transitory computer readable medium for randomized multi-factor authentication with biometrics includes randomly selecting one of a plurality of biometrics in response to a request from a client device. At least the randomly selected biometric is requested from the requesting client device. A match of the requested randomly selected biometric received from the requesting client device against stored biometric information above a set threshold is verified. Access for the request is granted when the verification indicates the match.
Abstract: Systems and methods for predictive technology incident reduction are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for predictive technology incident reduction may include: (1) receiving a change record for a proposed change to a computer application or a computer network infrastructure; (2) analyzing the potential change for an adverse potential cross impact with another computer application or a computer system; (3) predicting a probability of failure and an impact of the proposed change using a model; (4) in response to a low predicted probability of failure, or a high predicted probability of failure with a low predicted impact: approving the proposed change; and implementing the proposed change; and (5) in response to a high predicted probability of failure and a high predicted impact, rejecting the proposed change.
Abstract: Systems and methods for automated file system capacity risk analysis include obtaining first utilization data of the file system during a plurality of series of time intervals, projecting a future utilization value for the series of time intervals, and determining a threshold utilization percentage indicative of a risk of reaching maximum capacity of the file system. In response to the projected future utilization value being equal to or greater than the threshold, calculating a rate of change of the first utilization data for each of the series of time intervals, determining a variation of the rates of change of all the series of time intervals, and in response to the variation of the rates of change being positive or the first utilization data for the last time interval being equal to or greater than the threshold, designating the file system as being at risk of reaching maximum capacity.
Abstract: Various methods, apparatuses, and media for processing feed data are provided. The methodology includes operations of receiving a data file, receiving a configuration file that includes configuration instructions, extracting the configurations from the configuration file, generating a customized set of feed processing instructions by combining the configuration instructions with a standard framework set of instructions, and processing the data file by executing the customized set of instructions.
Type:
Grant
Filed:
December 18, 2018
Date of Patent:
December 15, 2020
Assignee:
JPMORGAN CHASE BANK, N.A.
Inventors:
Andrew Grimble, Shyamal J. Shah, Denzel Mathew, Dave Fetzer
Abstract: Various methods, apparatuses/systems, and media for implementing a multi-tier intercommunication module (MTIM) for an automatic teller machine (ATM) to prevent fraudulent and forced transactions are provided. A processor within the MTIM verifies whether an anomaly withdrawal transaction is occurring based on analysis of a user's normal banking behavior. When anomaly transactions are detected, the processor transmits a notification to the user's registered Multi-Factor Authentication (MFA) device to verify whether the transaction is fraudulent. Additionally, the MTIM provides a continuous feedback loop of user location data when forced transactions have been triggered. Forced card transactions are allowed completion and the MTIM sends a custom security code (CSC) to the user's registered MFA mobile device.
Type:
Application
Filed:
June 2, 2020
Publication date:
December 10, 2020
Applicant:
JPMorgan Chase Bank, N.A.
Inventors:
Nathan James WRIGHT, Robert C. SCHIEBER
Abstract: Methods and systems for managing data analytics are provided. The methods and systems entail obtaining a configuration file that includes steps. Each step includes at least one parameter that identifies a source of input data, a transformation that corresponds to business logic to be applied to the input data, and/or a sink of output data resulting from a transformation to the input data. A directed acyclic graph is generated based on the configuration file. The directed acyclic graph is then executed by invoking an application programming interface (API) of a data transformation engine to apply the transformations to the input data, and then returning an indication of completion to a source of the configuration file.
Type:
Grant
Filed:
March 25, 2019
Date of Patent:
December 8, 2020
Assignee:
JPMORGAN CHASE BANK, N.A.
Inventors:
Jayant V. Gokhale, Suresh Devaravar, Benjamin F. Sylvester, III, Shailesh Nayak, Tarun Chillara
Abstract: Systems and methods for performing a process are provided. The methods include receiving, from a client, a request for an initiation of the process; transmitting, to a server, a request for executing the process; transmitting, to the client in response to the request, a first message that indicates that the process has been initiated; receiving, from the client, a request for a status of the process; transmitting, to the server, a query that relates to the status of an execution of the process; receiving a response to the query; and transmitting, to the client, a second message that indicates the status of the process.
Abstract: Systems and methods for enhanced shopping using a mobile device are disclosed. In one embodiment, a method for enhanced shopping using a mobile device may include (1) a mobile application executed by a mobile electronic device associating with a merchant system, the mobile electronic device comprising at least one computer processor, a memory, an optical input, and a display; (2) the mobile application receiving an item identifier associated with an item; (3) the mobile application receiving item data for the item from the merchant system based on the item identifier; (4) the mobile application receiving purchase confirmation for the item; and (5) the mobile application communicating payment information for the item to the merchant system.
Abstract: Systems and methods for resolving a computer problem without human intervention are provided. The methods include receiving an alert that indicates an existence of a computer problem; obtaining data that relates to the computer problem; determining a potential resolution based on the obtained data; and applying the determined potential resolution to the computer that is experiencing the problem.
Abstract: The invention relates to a geometric design and corresponding methods for components 22, which are produced on a carrier substrate 10 and prepared by detachment in an etching process 30 for a subsequent absorption and a transfer with a stamp for application to a further substrate. The components 22 are designed in such a way that additional active surfaces are provided for the etching process 30 for undercut the components, so that a faster, more reliable and more homogeneous etching profile is achieved.
Inventors:
Amanda Valladares, Amanda Smith, Melora Zaner, Matthew Gromada, Jay E. Parsons, Jonathan Beck, Erika Scott, Claudio Esposito, Indeevara H. De Silva, Melissa Feldsher, Geoffrey L. Goetz, Michael Thornton, Kimberly Chan
Inventors:
Amanda Valladares, Amanda Smith, Melora Zaner, Matthew Gromada, Jay E. Parsons, Jonathan Beck, Erika Scott, Claudio Esposito, Indeevara H. De Silva, Melissa Feldsher, Geoffrey L. Goetz, Michael Thornton, Kimberly Chan