Patents by Inventor Rejith G. Kurup

Rejith G. Kurup has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12039313
    Abstract: A system and a method for reconstructing an electronic data processing facility is provided. The method includes: accessing information that indicates a predetermined arrangement of hardware components included in the electronic data processing facility; verifying that the hardware components are operational based on the predetermined arrangement; accessing information that indicates a predetermined order of software modules to be installed in the electronic data processing facility; installing the software modules based on the predetermined order; accessing information that indicates a predetermined data set to be stored in a memory of the electronic data processing facility; and verifying that the installed software modules and the stored data set are operational based on a predetermined standard.
    Type: Grant
    Filed: May 5, 2023
    Date of Patent: July 16, 2024
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Rejith G. Kurup, Keith Billis
  • Publication number: 20230273781
    Abstract: A system and a method for reconstructing an electronic data processing facility is provided. The method includes: accessing information that indicates a predetermined arrangement of hardware components included in the electronic data processing facility; verifying that the hardware components are operational based on the predetermined arrangement; accessing information that indicates a predetermined order of software modules to be installed in the electronic data processing facility; installing the software modules based on the predetermined order; accessing information that indicates a predetermined data set to be stored in a memory of the electronic data processing facility; and verifying that the installed software modules and the stored data set are operational based on a predetermined standard.
    Type: Application
    Filed: May 5, 2023
    Publication date: August 31, 2023
    Applicants: JPMorgan Chase Bank, N.A., JPMorgan Chase Bank, N.A.
    Inventors: Rejith G. KURUP, Keith BILLIS
  • Patent number: 11729179
    Abstract: In one embodiment, in access gateway comprising at least one computer processor, a method for real-time data protection may include: (1) receiving a user login comprising a user identifier; (2) retrieving, using an in-memory entitlements graph, a role definition for the user identifier, wherein the role definition comprises allowed actions, entitled assets, and a system account; (3) receiving a selection of a requested asset from the entitled assets and a requested action from the allowed actions; (4) verifying the user's entitlement to access the requested asset and perform the requested action with the system account using the in-memory entitlement graph based on the user identifier, the system account, the requested asset, and the requested action; and (5) authorizing the user's entitlement to access the requested asset and perform the requested action with the system account substantially at a time of requested access.
    Type: Grant
    Filed: March 15, 2021
    Date of Patent: August 15, 2023
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Rejith G. Kurup, Kanishka Hettiarachchi, Vladimir Belinkis, Ish K. Ahluwalia, Ricky Hei Wong Chan, Dennis Joseph
  • Patent number: 11687329
    Abstract: A system and a method for reconstructing an electronic data processing facility is provided. The method includes: accessing information that indicates a predetermined arrangement of hardware components included in the electronic data processing facility; verifying that the hardware components are operational based on the predetermined arrangement; accessing information that indicates a predetermined order of software modules to be installed in the electronic data processing facility; installing the software modules based on the predetermined order; accessing information that indicates a predetermined data set to be stored in a memory of the electronic data processing facility; and verifying that the installed software modules and the stored data set are operational based on a predetermined standard.
    Type: Grant
    Filed: March 16, 2021
    Date of Patent: June 27, 2023
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Rejith G. Kurup, Keith Billis
  • Patent number: 11546362
    Abstract: Systems and methods for data-driven infrastructure controls are disclosed. According to one embodiment, in an information processing apparatus comprising at least one computer processor, a computer-implemented method for automatically detecting anomalous user behavior within a unified entitlement framework may include: (1) receiving an access request for a technology asset from a user on a computing device, the access request comprising session data comprising one or more of user identification, user location, key strokes, and user computing device identification; (2) applying an entitlement-specific machine learning algorithm to the session data to generate an anomaly score; (3) storing the session data and associated anomaly score; (4) sending a review request to a manager; (5) receiving review results from the manager; and (6) updating the entitlement-specific machine learning algorithm based on the anomaly score and the review results from the manager.
    Type: Grant
    Filed: April 28, 2020
    Date of Patent: January 3, 2023
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Rejith G. Kurup, Kanishka Hettiarachchi, Vladimir Belinkis, Ish K. Ahluwalia, Ricky Hei Wong Chan, Dennis Joseph
  • Publication number: 20220334817
    Abstract: Systems and methods for cross platform configuration are described herein. The platform may receive selections for software programs or operating system configurations and selections of installation settings. A blueprint file is generated to specify the software programs or operating systems that are selected. In addition, the blueprint file may specify different installation settings and configuration settings. The blueprint file is stored in a repository and may be applied to one or more target devices. When applied, a task schedule is generated, where the task schedule prioritizes installations specified in a blueprint file. In addition, the task schedule specifies various provider identifiers to perform the installation(s).
    Type: Application
    Filed: June 30, 2022
    Publication date: October 20, 2022
    Inventors: Rejith G. KURUP, Rajesh GUPTA, Benjamin IRIZARRY, Sathya GOPALREDDY, Lalit KUMAR, Mahesh NAPA, Andrew E. JONES, Raghavendra Reedy MUTTANA
  • Patent number: 11392362
    Abstract: Systems and methods for cross platform configuration are described herein. The platform may receive selections for software programs or operating system configurations and selections of installation settings. A blueprint file is generated to specify the software programs or operating systems that are selected. In addition, the blueprint file may specify different installation settings and configuration settings. The blueprint file is stored in a repository and may be applied to one or more target devices. When applied, a task schedule is generated, where the task schedule prioritizes installations specified in a blueprint file. In addition, the task schedule specifies various provider identifiers to perform the installation(s).
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: July 19, 2022
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Rejith G. Kurup, Rajesh Gupta, Benjamin Irizarry, Sathya Gopalreddy, Lalit Kumar, Mahesh Napa, Andrew E. Jones, Raghavendra Reedy Muttana
  • Publication number: 20220035615
    Abstract: Systems and methods for cross platform configuration are described herein. The platform may receive selections for software programs or operating system configurations and selections of installation settings. A blueprint file is generated to specify the software programs or operating systems that are selected. In addition, the blueprint file may specify different installation settings and configuration settings. The blueprint file is stored in a repository and may be applied to one or more target devices. When applied, a task schedule is generated, where the task schedule prioritizes installations specified in a blueprint file. In addition, the task schedule specifies various provider identifiers to perform the installation(s).
    Type: Application
    Filed: July 31, 2020
    Publication date: February 3, 2022
    Inventors: Rejith G. KURUP, Rajesh GUPTA, Benjamin IRIZARRY, Sathya GOPALREDDY, Lalit KUMAR, Mahesh NAPA, Andrew E. JONES, Raghavendra Reedy MUTTANA
  • Publication number: 20210286607
    Abstract: A system and a method for reconstructing an electronic data processing facility is provided. The method includes: accessing information that indicates a predetermined arrangement of hardware components included in the electronic data processing facility; verifying that the hardware components are operational based on the predetermined arrangement; accessing information that indicates a predetermined order of software modules to be installed in the electronic data processing facility; installing the software modules based on the predetermined order; accessing information that indicates a predetermined data set to be stored in a memory of the electronic data processing facility; and verifying that the installed software modules and the stored data set are operational based on a predetermined standard.
    Type: Application
    Filed: March 16, 2021
    Publication date: September 16, 2021
    Applicant: JPMorgan Chase Bank, N.A.
    Inventors: Rejith G. KURUP, Keith BILLIS
  • Publication number: 20210203663
    Abstract: In one embodiment, in access gateway comprising at least one computer processor, a method for real-time data protection may include: (1) receiving a user login comprising a user identifier; (2) retrieving, using an in-memory entitlements graph, a role definition for the user identifier, wherein the role definition comprises allowed actions, entitled assets, and a system account; (3) receiving a selection of a requested asset from the entitled assets and a requested action from the allowed actions; (4) verifying the user's entitlement to access the requested asset and perform the requested action with the system account using the in-memory entitlement graph based on the user identifier, the system account, the requested asset, and the requested action; and (5) authorizing the user's entitlement to access the requested asset and perform the requested action with the system account substantially at a time of requested access.
    Type: Application
    Filed: March 15, 2021
    Publication date: July 1, 2021
    Inventors: Rejith G. Kurup, Kanishka Hettiarachchi, Vladimir Belinkis, Ish K. Ahluwalia, Ricky Hei Wong Chan, Dennis Joseph
  • Patent number: 10951624
    Abstract: In one embodiment, in access gateway comprising at least one computer processor, a method for real-time data protection may include: (1) receiving a user login comprising a user identifier; (2) retrieving, using an in-memory entitlements graph, a role definition for the user identifier, wherein the role definition comprises allowed actions, entitled assets, and a system account; (3) receiving a selection of a requested asset from the entitled assets and a requested action from the allowed actions; (4) verifying the user's entitlement to access the requested asset and perform the requested action with the system account using the in-memory entitlement graph based on the user identifier, the system account, the requested asset, and the requested action; and (5) authorizing the user's entitlement to access the requested asset and perform the requested action with the system account substantially at a time of requested access.
    Type: Grant
    Filed: December 14, 2018
    Date of Patent: March 16, 2021
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Rejith G. Kurup, Kanishka Hettiarachchi, Vladimir Belinkis, Ish K. Ahluwalia, Ricky Hei Wong Chan, Dennis Joseph
  • Publication number: 20200344253
    Abstract: Systems and methods for data-driven infrastructure controls are disclosed. According to one embodiment, in an information processing apparatus comprising at least one computer processor, a computer-implemented method for automatically detecting anomalous user behavior within a unified entitlement framework may include: (1) receiving an access request for a technology asset from a user on a computing device, the access request comprising session data comprising one or more of user identification, user location, key strokes, and user computing device identification; (2) applying an entitlement-specific machine learning algorithm to the session data to generate an anomaly score; (3) storing the session data and associated anomaly score; (4) sending a review request to a manager; (5) receiving review results from the manager; and (6) updating the entitlement-specific machine learning algorithm based on the anomaly score and the review results from the manager.
    Type: Application
    Filed: April 28, 2020
    Publication date: October 29, 2020
    Inventors: Rejith G. KURUP, Kanishka HETTIARACHCHI, Vladimir BELINKIS, Ish K. AHLUWALIA, Ricky Hei Wong CHAN, Dennis JOSEPH
  • Publication number: 20200195650
    Abstract: In one embodiment, in access gateway comprising at least one computer processor, a method for real-time data protection may include: (1) receiving a user login comprising a user identifier; (2) retrieving, using an in-memory entitlements graph, a role definition for the user identifier, wherein the role definition comprises allowed actions, entitled assets, and a system account; (3) receiving a selection of a requested asset from the entitled assets and a requested action from the allowed actions; (4) verifying the user's entitlement to access the requested asset and perform the requested action with the system account using the in-memory entitlement graph based on the user identifier, the system account, the requested asset, and the requested action; and (5) authorizing the user's entitlement to access the requested asset and perform the requested action with the system account substantially at a time of requested access.
    Type: Application
    Filed: December 14, 2018
    Publication date: June 18, 2020
    Inventors: Rejith G. Kurup, Kanishka Hettiarachchi, Vladimir Belinkis, Ish K. Ahluwalia, Ricky Hei Wong Chan, Dennis Joseph