Patents by Inventor Goran Loncaric

Goran Loncaric has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240121232
    Abstract: A method for facilitating application authentication bypass based on proximate with time using device authentication is disclosed. The method includes receiving a request from a user to access an application on a user device, the request including an application authentication request; accessing the user device via a device application programming interface; retrieving, via the device application programming interface, device authentication data, the device authentication data including a timeline of successful device authentications; determining whether the device authentication data is within a predetermined threshold; authenticating the request by using the device authentication data when the device authentication data is within the predetermined threshold; and permitting access to the application based on a result of the authenticating.
    Type: Application
    Filed: October 11, 2022
    Publication date: April 11, 2024
    Applicant: JPMorgan Chase Bank, N.A.
    Inventors: Goran LONCARIC, Mimi WANG, Sandeep Reddy BANALA, Bipin MORE
  • Publication number: 20220232036
    Abstract: Systems and methods for providing social engineering and malware alerts are disclosed. According to one embodiment, a method for providing in-application alerts may include: (1) receiving, at a computer program and from an operating system executed by a user electronic device, a notification that a message was received by the user electronic device and a caller ID for the message and/or a message sender identifier; (2) comparing, by the computer program, the caller ID for the message and/or the message sender identifier to data in one or more database; (3) determining, by the computer program, that the message is suspicious based on the comparison; (4) identifying, by the computer program, an activity being conducted using the user electronic device within a predetermined period of time from receipt of the message; and (5) issuing, by the computer program, a warning that the activity may be suspicious.
    Type: Application
    Filed: January 14, 2022
    Publication date: July 21, 2022
    Inventor: Goran LONCARIC
  • Publication number: 20120271760
    Abstract: Exemplary embodiments describe systems and methods which provide for currency or inter-currency transfers. An intermediate broker operates between service providers to enable the transfer to be separated into two local e-money transactions from point of view of the service providers. E-money flows and real money flows are disassociated to enable, for example, beneficiary parties to receive their funds in real time (or near real time) and to enable the intermediate broker to aggregate real money flows during periodic rebalancing processes among its local accounts.
    Type: Application
    Filed: June 27, 2012
    Publication date: October 25, 2012
    Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)
    Inventors: Adrian LINDBOM, Goran LONCARIC
  • Publication number: 20120089508
    Abstract: Exemplary embodiments describe systems and methods which provide for currency or inter-currency transfers. An intermediate broker operates between service providers to enable the transfer to be separated into two local e-money transactions from point of view of the service providers. E-money flows and real money flows are disassociated to enable, for example, beneficiary parties to receive their funds in real time (or near real time) and to enable the intermediate broker to aggregate real money flows during periodic rebalancing processes among its local accounts.
    Type: Application
    Filed: December 15, 2010
    Publication date: April 12, 2012
    Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)
    Inventors: Adrian Lindbom, Goran Loncaric