Patents by Inventor Xianhong Zhang
Xianhong Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Selectively Enabling and Disabling Biometric Authentication Based on Mobile Device State Information
Publication number: 20170149840Abstract: Methods, systems, and computer-readable media for selectively enabling and disabling biometric authentication are presented. In some embodiments, a computing platform may receive, from a device monitoring and management computer system, a device state indicator message comprising device state information associated with a mobile computing device. Subsequently, the computing platform may set a biometric authentication flag for the mobile computing device based on the device state indicator message received from the device monitoring and management computer system. Then, the computing platform may generate an authentication functionality message for the mobile computing device based on the biometric authentication flag set for the mobile computing device, and the authentication functionality message may be configured to selectively enable or disable one or more biometric authentication functions provided by the mobile computing device.Type: ApplicationFiled: November 19, 2015Publication date: May 25, 2017Inventors: Xianhong Zhang, Wenhui Meng, Kalyan V. Pasumarthi, Elizabeth S. Votaw, Andrew T. Keys, Apeksh M. Dave -
Publication number: 20170053252Abstract: Systems and methods for authenticating a user's identity at an ATM are provided. One method may authenticate a user's identity at an Automated Teller Machine (“ATM”) over a period of time. The method may include capturing at least a portion of user's facial information using a facial recognition camera. The method may include displaying a QR code for capture by a mobile device. The method may further include receiving information using a wireless receiver from the mobile device that corresponds to the QR code. The method may also include using one or more device handlers to receive information related to the captured portion of the user's facial information from the facial recognition camera and to receive information related to the QR code from the wireless receiver and for determining one or more routing destinations for the information related to the captured portion of the user's facial information and for the information that corresponds to the QR code.Type: ApplicationFiled: August 20, 2015Publication date: February 23, 2017Inventors: Elizabeth Votaw, Xianhong Zhang
-
Publication number: 20170053284Abstract: Systems and methods for authenticating a user's identity at an ATM are provided. One method may include capturing at least a portion of user's facial information using a facial recognition camera. The method may also include receiving information using an additional biometric scanner. The method may further include using one or more device handlers to receive information related to the captured portion of the user's facial information from the facial recognition camera and to receive information related to the additional biometric scanner. The one or more device handlers may also be used for determining one or more routing destinations for said information related to the captured portion of the user's facial information, for said information and for said information received from the additional biometric scanner.Type: ApplicationFiled: August 20, 2015Publication date: February 23, 2017Inventors: Elizabeth Votaw, Xianhong Zhang, Wenhui Meng
-
Patent number: 9548997Abstract: A computer system receives a service request over a service channel from a user device, initiates a challenge to the user device to provide authentication information based on a set of authenticators, and determines an initial level of authentication. When the initial level of authentication is not sufficient for the service channel or protected resource, the apparatus generates a challenge to the user device with at least one additional authenticator and determines an achieved level of authentication based on the further authentication information. When the achieved level of authentication reaches a target authentication level for the service channel, the apparatus continues processing the service request by the service channel. The computer may transfer the service request to another service channel with the authentication token obtained on the original service channel and further challenges the user device with additional authenticators when a higher level of authentication is necessary.Type: GrantFiled: February 12, 2016Date of Patent: January 17, 2017Assignee: Bank of America CorporationInventors: Andrew T. Keys, Kapil Pruthi, Xianhong Zhang, Mark A. Pender, Daniel Lynn Carpenter
-
Patent number: 9519783Abstract: Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a customer portal computing platform, a request for a security dashboard user interface for a customer. In response to receiving the request for the security dashboard user interface, the computer system may request, from a security score computing platform, a security score for the customer. Subsequently, the computer system may receive, from the security score computing platform, the security score for the customer. The computer system then may generate, based on the security score for the customer, the security dashboard user interface for the customer. Thereafter, the computer system may provide, to the customer portal computing platform, the generated security dashboard user interface for the customer.Type: GrantFiled: January 8, 2016Date of Patent: December 13, 2016Assignee: Bank of America CorporationInventors: Kapil Pruthi, Xianhong Zhang, Tao Huang, Raghav Shenoy, Palash K. Shil, Andy Keys, Vikram Jalota, Arul Arasu Madavadiyan
-
Patent number: 9519790Abstract: Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a security dashboard computing platform, a request for a security score associated with a customer. In response to receiving the request for the security score associated with the customer, the computer system may request, from a customer portal computing platform, one or more security preferences associated with the customer. Subsequently, the computer system may receive, from the customer portal computing platform, the one or more security preferences associated with the customer. The computer system then may determine, based on at least one security score definition file and based on the one or more security preferences associated with the customer, a security score for the customer. Thereafter, the computer system may provide, to the security dashboard computing platform, the determined security score for the customer.Type: GrantFiled: February 4, 2016Date of Patent: December 13, 2016Assignee: Bank of America CorporationInventors: Kapil Pruthi, Xianhong Zhang, Tao Huang, Raghav Shenoy, Palash K. Shil, Andy Keys, Vikram Jalota, Arul Arasu Madavadiyan
-
Publication number: 20160350751Abstract: Methods, systems, and computer-readable media for provisioning a mobile device with a code generation key to enable generation of one-time passcodes are presented. In some embodiments, a computer system may receive, from a mobile computing device associated with a customer of a financial institution, a request to register a passcode generator on the mobile computing device. Subsequently, based on receiving the request, the computer system may authenticate a user of the mobile computing device to an online banking user account associated with the customer. Then, based on authenticating the user to the online banking user account, the computer system may generate a code generation key configured to be used by the passcode generator. Next, the computer system may store the code generation key in a key database. Subsequently, the computer system may send, to the mobile computing device, the code generation key to provision the passcode generator.Type: ApplicationFiled: May 27, 2015Publication date: December 1, 2016Inventors: Andrew T. Keys, Kapil Pruthi, Xianhong Zhang, Tao Huang
-
Patent number: 9378345Abstract: A system for authenticating a customer is disclosed. The customer may attempt to access protected resources located at an authentication server. The customer may log in to the authentication server's website, thereby submitting an authentication request. The authentication request may comprise attributes of the device the customer uses to log in. The authentication server may generate a device ID using the received device attributes and generate an authentication token that is signed with the device ID. The authentication server may transmit the authentication token to the client device. Subsequent requests to access protected resources from the client device may include the authentication token that is signed with the device ID.Type: GrantFiled: April 29, 2014Date of Patent: June 28, 2016Assignee: Bank of America CorporationInventors: Xianhong Zhang, Andrew Keys, Kapil Pruthi
-
Publication number: 20160164921Abstract: A computer system receives a service request over a service channel from a user device, initiates a challenge to the user device to provide authentication information based on a set of authenticators, and determines an initial level of authentication. When the initial level of authentication is not sufficient for the service channel or protected resource, the apparatus generates a challenge to the user device with at least one additional authenticator and determines an achieved level of authentication based on the further authentication information. When the achieved level of authentication reaches a target authentication level for the service channel, the apparatus continues processing the service request by the service channel. The computer may transfer the service request to another service channel with the authentication token obtained on the original service channel and further challenges the user device with additional authenticators when a higher level of authentication is necessary.Type: ApplicationFiled: February 12, 2016Publication date: June 9, 2016Inventors: Andrew T. Keys, Kapil Pruthi, Xianhong Zhang, Mark A. Pender, Daniel Lynn Carpenter
-
Publication number: 20160154961Abstract: Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a security dashboard computing platform, a request for a security score associated with a customer. In response to receiving the request for the security score associated with the customer, the computer system may request, from a customer portal computing platform, one or more security preferences associated with the customer. Subsequently, the computer system may receive, from the customer portal computing platform, the one or more security preferences associated with the customer. The computer system then may determine, based on at least one security score definition file and based on the one or more security preferences associated with the customer, a security score for the customer. Thereafter, the computer system may provide, to the security dashboard computing platform, the determined security score for the customer.Type: ApplicationFiled: February 4, 2016Publication date: June 2, 2016Inventors: Kapil Pruthi, Xianhong Zhang, Tao Huang, Raghav Shenoy, Palash K. Shil, Andy Keys, Vikram Jalota, Arul Arasu Madavadiyan
-
Publication number: 20160117507Abstract: Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a customer portal computing platform, a request for a security dashboard user interface for a customer. In response to receiving the request for the security dashboard user interface, the computer system may request, from a security score computing platform, a security score for the customer. Subsequently, the computer system may receive, from the security score computing platform, the security score for the customer. The computer system then may generate, based on the security score for the customer, the security dashboard user interface for the customer. Thereafter, the computer system may provide, to the customer portal computing platform, the generated security dashboard user interface for the customer.Type: ApplicationFiled: January 8, 2016Publication date: April 28, 2016Inventors: Kapil Pruthi, Xianhong Zhang, Tao Huang, Raghav Shenoy, Palash K. Shil, Andy Keys, Vikram Jalota, Arul Arasu Madavadiyan
-
Patent number: 9306930Abstract: A computer system receives a service request over a service channel from a user device, initiates a challenge to the user device to provide authentication information based on a set of authenticators, and determines an initial level of authentication. When the initial level of authentication is not sufficient for the service channel or protected resource, the apparatus generates a challenge to the user device with at least one additional authenticator and determines an achieved level of authentication based on the further authentication information. When the achieved level of authentication reaches a target authentication level for the service channel, the apparatus continues processing the service request by the service channel. The computer may transfer the service request to another service channel with the authentication token obtained on the original service channel and further challenges the user device with additional authenticators when a higher level of authentication is necessary.Type: GrantFiled: May 19, 2014Date of Patent: April 5, 2016Assignee: Bank of America CorporationInventors: Andrew T. Keys, Kapil Pruthi, Xianhong Zhang, Mark A. Pender, Daniel Lynn Carpenter
-
Patent number: 9286467Abstract: Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a security dashboard computing platform, a request for a security score associated with a customer. In response to receiving the request for the security score associated with the customer, the computer system may request, from a customer portal computing platform, one or more security preferences associated with the customer. Subsequently, the computer system may receive, from the customer portal computing platform, the one or more security preferences associated with the customer. The computer system then may determine, based on at least one security score definition file and based on the one or more security preferences associated with the customer, a security score for the customer. Thereafter, the computer system may provide, to the security dashboard computing platform, the determined security score for the customer.Type: GrantFiled: April 25, 2014Date of Patent: March 15, 2016Assignee: Bank of America CorporationInventors: Kapil Pruthi, Xianhong Zhang, Tao Huang, Raghav Shenoy, Palash K. Shil, Andy Keys, Vikram Jalota, Arul Arasu Madavadiyan
-
Patent number: 9251335Abstract: Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a customer portal computing platform, a request for a security dashboard user interface for a customer. In response to receiving the request for the security dashboard user interface, the computer system may request, from a security score computing platform, a security score for the customer. Subsequently, the computer system may receive, from the security score computing platform, the security score for the customer. The computer system then may generate, based on the security score for the customer, the security dashboard user interface for the customer. Thereafter, the computer system may provide, to the customer portal computing platform, the generated security dashboard user interface for the customer.Type: GrantFiled: April 25, 2014Date of Patent: February 2, 2016Assignee: Bank of America CorporationInventors: Kapil Pruthi, Xianhong Zhang, Tao Huang, Raghav Shenoy, Palash K. Shil, Andy Keys, Vikram Jalota, Arul Arasu Madavadiyan
-
Publication number: 20150334099Abstract: A computer system receives an authentication request from a user device and determines a determined device identification from a set of received device attributes. When the device is properly authenticated, the computer system generates an authentication token that is signed by the determined device identification and returns the authentication token to the user device. When the computer system subsequently receives a service request with an authentication token and a plurality of device attributes for a protected resource from a user device, the computer system determines a derived device identification from some or all of the received device attributes. When a signed device identification of the authentication token and the derived device identification are equal, the apparatus continues processing the service request. Otherwise, the service request is rejected.Type: ApplicationFiled: May 19, 2014Publication date: November 19, 2015Applicant: BANK OF AMERICA CORPORATIONInventors: Xianhong Zhang, Andrew T. Keys, Kapil Pruthi, Daniel Lynn Carpenter, Mark A. Pender, Spencer Yezo, Apeksh M. Dave
-
Publication number: 20150334098Abstract: A computer system receives a service request over a service channel from a user device, initiates a challenge to the user device to provide authentication information based on a set of authenticators, and determines an initial level of authentication. When the initial level of authentication is not sufficient for the service channel or protected resource, the apparatus generates a challenge to the user device with at least one additional authenticator and determines an achieved level of authentication based on the further authentication information. When the achieved level of authentication reaches a target authentication level for the service channel, the apparatus continues processing the service request by the service channel. The computer may transfer the service request to another service channel with the authentication token obtained on the original service channel and further challenges the user device with additional authenticators when a higher level of authentication is necessary.Type: ApplicationFiled: May 19, 2014Publication date: November 19, 2015Applicant: Bank of America CorporationInventors: Andrew T. Keys, Kapil Pruthi, Xianhong Zhang, Mark A. Pender, Daniel Lynn Carpenter
-
Publication number: 20150310194Abstract: A system for authenticating a customer is disclosed. The customer may attempt to access protected resources located at an authentication server. The customer may log in to the authentication server's website, thereby submitting an authentication request. The authentication request may comprise attributes of the device the customer uses to log in. The authentication server may generate a device ID using the received device attributes and generate an authentication token that is signed with the device ID. The authentication server may transmit the authentication token to the client device. Subsequent requests to access protected resources from the client device may include the authentication token that is signed with the device ID.Type: ApplicationFiled: April 29, 2014Publication date: October 29, 2015Applicant: Bank of America CorporationInventors: Xianhong Zhang, Andrew Keys, Kapil Pruthi
-
Publication number: 20150310204Abstract: Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a security dashboard computing platform, a request for a security score associated with a customer. In response to receiving the request for the security score associated with the customer, the computer system may request, from a customer portal computing platform, one or more security preferences associated with the customer. Subsequently, the computer system may receive, from the customer portal computing platform, the one or more security preferences associated with the customer. The computer system then may determine, based on at least one security score definition file and based on the one or more security preferences associated with the customer, a security score for the customer. Thereafter, the computer system may provide, to the security dashboard computing platform, the determined security score for the customer.Type: ApplicationFiled: April 25, 2014Publication date: October 29, 2015Applicant: Bank of America CorporationInventors: Kapil Pruthi, Xianhong Zhang, Tao Huang, Raghav Shenoy, Palash K. Shil, Andy Keys, Vikram Jalota, Arul Arasu Madavadiyan
-
Publication number: 20150310205Abstract: Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a customer portal computing platform, a request for a security dashboard user interface for a customer. In response to receiving the request for the security dashboard user interface, the computer system may request, from a security score computing platform, a security score for the customer. Subsequently, the computer system may receive, from the security score computing platform, the security score for the customer. The computer system then may generate, based on the security score for the customer, the security dashboard user interface for the customer. Thereafter, the computer system may provide, to the customer portal computing platform, the generated security dashboard user interface for the customer.Type: ApplicationFiled: April 25, 2014Publication date: October 29, 2015Applicant: Bank of America CorporationInventors: Kapil Pruthi, Xianhong Zhang, Tao Huang, Raghav Shenoy, Palash K. Shil, Andy Keys, Vikram Jalota, Arul Arasu Madavadiyan
-
Patent number: 8458204Abstract: A method and related data processing system and computer readable medium. A method includes receiving, in a data processing system, a first file and a second file, and receiving comparison rules. This method includes comparing the first file and the second file, by the data processing system, according to the comparison rules, and producing an output report corresponding to the comparison.Type: GrantFiled: September 22, 2009Date of Patent: June 4, 2013Assignee: Siemens Product Lifecycle Management Software Inc.Inventors: Yunfei Wu, Tiancai Yin, Xianhong Zhang, Shingchi Hsu