Patents by Inventor Jon WHITMORE

Jon WHITMORE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250085991
    Abstract: Systems and methods for adaptive configuration. In some aspects, a system may receive an indication that a communication session is initiated between a public terminal and a user device in proximity of the public terminal. In response to receiving the indication, the system may obtain historical transaction data of the user. Based on the historical transaction data, the system may determine (1) frequent locations of the user where a user has conducted more than a threshold number of transactions and (2) a language preference for the user. In response to determining that the user is not located within one or more frequent locations of the user, the system may transmit a command to alter a digital display of the public terminal based on a user-specific configuration, wherein the user-specific configuration comprises the language preference of the user.
    Type: Application
    Filed: September 11, 2023
    Publication date: March 13, 2025
    Applicant: Capital One Services, LLC
    Inventors: Jon WHITMORE, Lucas ROZIER
  • Publication number: 20230297676
    Abstract: A computer-implemented method for detecting a code injection threat may include: performing a search process on a memory of a computer system to identify property list files; in response to an identification of a property list file, retrieving the property list file; performing an analysis process on the property list file to identify a target identifier; in response to an identification of the target identifier in the property list file, determining whether the target identifier corresponds to an electronic application stored in the memory of the computer system; in response to determining that the target identifier corresponds to the electronic application, determining that the property list file is indicative of a code injection threat to the electronic application; and in response to the determination that the property list file is indicative of a code injection threat to the electronic application, performing a security action based on the property list.
    Type: Application
    Filed: May 26, 2023
    Publication date: September 21, 2023
    Applicant: Capital One Services, LLC
    Inventor: Jon WHITMORE
  • Publication number: 20230009963
    Abstract: A system and method for early detection of a compromised client device includes a tamper detection service configured to monitor modifications to resource access privileges over time to identify unusual variations in jailbreak status that indicate compromise of the client device. For example, the tamper detection service may monitor the jailbreak status of system files over time to expose attempts to hide the jailbreak status of a protected resource. To validate that malware is attempting to hide the jailbreak status of a protected resources, the tamper detection process may launch multiple different resource accesses, targeting the protected resource, to determine whether different accessibility results are returned, indicating a compromised device.
    Type: Application
    Filed: June 23, 2022
    Publication date: January 12, 2023
    Applicant: Capital One Services, LLC
    Inventors: Jon WHITMORE, Kevin NIEMAN
  • Publication number: 20220391502
    Abstract: A computer-implemented method for detecting a security status of a computer system may include: in response to satisfaction of a predetermined trigger condition associated with an electronic application installed on a memory of the computer system, performing a security check process on the computer system; in response to the security check process determining that a security status of the computer system is currently compromised, performing a first security action; and in response to the security check process determining that the security status is formerly compromised, performing a second security action.
    Type: Application
    Filed: August 15, 2022
    Publication date: December 8, 2022
    Applicant: Capital One Services, LLC
    Inventor: Jon WHITMORE
  • Publication number: 20210319095
    Abstract: A computer-implemented method for detecting a security status of a computer system may include: in response to satisfaction of a predetermined trigger condition associated with an electronic application installed on a memory of the computer system, performing a security check process on the computer system; in response to the security check process determining that a security status of the computer system is currently compromised, performing a first security action; and in response to the security check process determining that the security status is formerly compromised, performing a second security action.
    Type: Application
    Filed: April 13, 2020
    Publication date: October 14, 2021
    Applicant: Capital One Services, LLC
    Inventor: Jon WHITMORE
  • Publication number: 20210319105
    Abstract: A computer-implemented method for detecting a code injection threat may include: performing a search process on a memory of a computer system to identify property list files; in response to an identification of a property list file, retrieving the property list file; performing an analysis process on the property list file to identify a target identifier; in response to an identification of the target identifier in the property list file, determining whether the target identifier corresponds to an electronic application stored in the memory of the computer system; in response to determining that the target identifier corresponds to the electronic application, determining that the property list file is indicative of a code injection threat to the electronic application; and in response to the determination that the property list file is indicative of a code injection threat to the electronic application, performing a security action based on the property list.
    Type: Application
    Filed: April 13, 2020
    Publication date: October 14, 2021
    Applicant: Capital One Services, LLC
    Inventor: Jon WHITMORE
  • Publication number: 20210089655
    Abstract: A system and method for early detection of a compromised client device includes a tamper detection service configured to monitor modifications to resource access privileges over time to identify unusual variations in jailbreak status that indicate compromise of the client device. For example, the tamper detection service may monitor the jailbreak status of system files over time to expose attempts to hide the jailbreak status of a protected resource. To validate that malware is attempting to hide the jailbreak status of a protected resources, the tamper detection process may launch multiple different resource accesses, targeting the protected resource, to determine whether different accessibility results are returned, indicating a compromised device.
    Type: Application
    Filed: March 30, 2020
    Publication date: March 25, 2021
    Applicant: Capital One Services, LLC
    Inventors: Jon WHITMORE, Kevin NIEMAN
  • Publication number: 20190297158
    Abstract: A device may receive transaction information related to a transaction in association with the transaction being completed. The device may identify a set of identifiers included in the transaction information. The device may determine a time of interest associated with the transaction based on the set of identifiers included in the transaction information. Different identifiers or different combinations of identifiers included in the set of identifiers may be associated with different times of interest. The device may prompt, via a display associated with a remote computing device by providing instructions associated with a user interface for display via the display, a user of the remote computing device to indicate whether to generate a calendar reminder for the time of interest after determining the time of interest. The device may perform an action after receiving a response to the prompt from the user of the remote computing device.
    Type: Application
    Filed: March 20, 2018
    Publication date: September 26, 2019
    Inventors: Michelle OLENOSKI, Patrick ZEARFOSS, Jon WHITMORE