Patents by Inventor Robert Kong

Robert Kong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250227101
    Abstract: Per one example embodiment, a method is provided of shifting an OS (operating system) and associated native application platform from a private network to a cloud-based target environment, where the OS comprises an operating system not configured for web access. An image of the OS is provided that is suitable for installation on a target virtual machine in the cloud-based target platform. In lieu of moving user credentials of numerous current private network-based users of the OS—native application platform to the target environment, a passwordless credential-based OS command level communication brokering service is provided at the cloud-based target environment.
    Type: Application
    Filed: January 5, 2024
    Publication date: July 10, 2025
    Applicant: JP Morgan Chase Bank, N.A.
    Inventors: Ricky CHAN, Vijaya Basker BALAKRISHNAN, Kanishka HETTIARACHCHI, Robert KONG, Ross INDYKE, Jeremy WELLMEIER, Ramesh KRISHNAMURTHY, Robert SPINELLI, George IRIZARRY
  • Publication number: 20250227108
    Abstract: Per one example embodiment, a method is provided of shifting an OS (operating system) and associated native application platform from a private network to a cloud-based target environment, where the OS comprises an operating system not configured for web access. An image of the OS is provided that is suitable for installation on a target virtual machine in the cloud-based target platform. In lieu of moving user credentials of numerous current private network-based users of the OS—native application platform to the target environment, a passwordless credential-based OS command level communication brokering service is provided at the cloud-based target environment.
    Type: Application
    Filed: January 5, 2024
    Publication date: July 10, 2025
    Applicant: JP Morgan Chase Bank, N.A.
    Inventors: Ricky CHAN, Vijaya Basker BALAKRISHNAN, Kanishka HETTIARACHCHI, Robert KONG, Ross INDYKE, Jeremy WELLMEIER, Ramesh KRISHNAMURTHY, Robert SPINELLI, George IRIZARRY
  • Publication number: 20250165242
    Abstract: Per one example embodiment, a method is provided of shifting an OS (operating system) and associated native application platform from a private network to a cloud-based target environment, where the OS comprises an operating system not configured for web access. An image of the OS is provided that is suitable for installation on a target virtual machine in the cloud-based target platform. In lieu of moving user credentials of numerous current private network-based users of the OS—native application platform to the target environment, a passwordless credential-based OS command level communication brokering service is provided at the cloud-based target environment.
    Type: Application
    Filed: November 21, 2023
    Publication date: May 22, 2025
    Applicant: JP Morgan Chase Bank, N.A.
    Inventors: Ricky CHAN, Vijaya Basker BALAKRISHNAN, Kanishka HETTIARACHCHI, Robert KONG, Ross INDYKE, Jeremy WELLMEIER, Ramesh KRISHNAMURTHY, Robert SPINELLI, George IRIZARRY
  • Patent number: 12267336
    Abstract: Dynamic multi-network security controls are provided herein. A method can include receiving a report of malicious network traffic observed by first network equipment operating in a first communication network, where the report indicates a second communication network distinct from the first communication network as an originating network of the malicious network traffic, identifying second network equipment operating in the second communication network as a source of the malicious network traffic, and based on the identifying, blocking communications from the second network equipment for a defined time interval.
    Type: Grant
    Filed: July 1, 2021
    Date of Patent: April 1, 2025
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Donald Levy, Jason Godfrey, Robert Kong, Deon Ogle
  • Publication number: 20240220658
    Abstract: A processing system may obtain baseline attributes associated with a plurality of representative files of a first type of network equipment, where the baseline attributes comprise a plurality of baseline checksums associated with the plurality of representative files, obtain snapshot attributes associated with a first plurality of files of a first device deployed in a communication network, where the first device is of the first type of network equipment, and where the first plurality of files is associated with at least a portion of the plurality of representative files, identify at least one file of the first plurality of files or at least one directory associated with the first plurality of files, for which a respective one of the snapshot attributes fails to match a respective one of the baseline attributes, and perform at least one remedial action in the communication network in response to the identifying.
    Type: Application
    Filed: December 30, 2022
    Publication date: July 4, 2024
    Inventors: Gregory Herrera, Robert Kong, Emily Lu, Brittany Vassallo, Meredith Gee
  • Publication number: 20230007018
    Abstract: Dynamic multi-network security controls are provided herein. A method can include receiving, via an internet protocol network, a report of malicious network traffic observed by first network equipment operating in a first communication network communicatively coupled to the internet protocol network, wherein the report indicates a second communication network, communicatively coupled to the internet protocol network and distinct from the first communication network, as an originating network of the malicious network traffic; in response to receiving the report, identifying second network equipment operating in the second communication network as a source of the malicious network traffic; and causing a control device associated with the second communication network to prevent the second network equipment from transmitting network traffic, comprising the malicious network traffic, outside of the second communication network via the internet protocol network for a defined time interval.
    Type: Application
    Filed: July 1, 2021
    Publication date: January 5, 2023
    Inventors: Donald Levy, Jason Godfrey, Robert Kong, Deon Ogle