Jeff Jancula

Jeff Jancula

Raleigh-Durham-Chapel Hill Area
5K followers 500+ connections

About

I am having a fantastic experience working at Corebridge Financial where people are…

Services

Articles by Jeff

Activity

Join now to see all activity

Experience

  • Corebridge Financial Graphic

    Corebridge Financial

    North Carolina, United States

  • -

    Raleigh-Durham-Chapel Hill Area

  • -

    Raleigh, North Carolina

  • -

    Washington D.C. Metro Area

  • -

    Raleigh, North Carolina

  • -

    Charlotte, North Carolina

  • -

    Charlotte, North Carolina

  • -

    Charlotte, North Carolina Area

  • -

    Charlotte, North Carolina

  • -

Education

Licenses & Certifications

Patents

  • Password reset system (2017)

    Issued US 9,805,187

    A customer initiated password reset system... Another variant of patents 8,826,396 and 9,323,919.

    Other inventors
    See patent
  • Password reset system (2016)

    Issued US 9,323,919

    A customer initiated password reset system... A variant of patent 8,826,396

    Other inventors
  • Password reset system (2014)

    Issued US 8,826,396

    This disclosure relates generally to data processing systems and, more particularly, to password maintenance among data processing systems, and especially to user interfaces for guiding a user to reset one or more passwords.

    The password reset system resets user passwords on a variety of network entities, such as internal systems, allowing simultaneous reset with a minimum number of user specified passwords that nonetheless satisfy the password specifications of these internal systems…

    This disclosure relates generally to data processing systems and, more particularly, to password maintenance among data processing systems, and especially to user interfaces for guiding a user to reset one or more passwords.

    The password reset system resets user passwords on a variety of network entities, such as internal systems, allowing simultaneous reset with a minimum number of user specified passwords that nonetheless satisfy the password specifications of these internal systems. Thereby, the user avoids the tedium of logging into each of these systems, changing their password, logging out, etc., for each system with the likelihood of creating unique passwords for each system that have to be remembered.

    Other inventors
  • Application controlled encryption of web browser cached data (continuation)

    Issued US 8,307,452

    Continuation of patent 7,979,909

    Other inventors
  • Application controlled encryption of web browser data

    Issued US 7,979,909

    This patent relates to protecting sensitive information stored in a web browser cache. More particularly, it relates to a method for encrypted loading of sensitive data within cached data that is prevented from being maliciously accessed after the session terminates - thereby reducing the exposure of that cached data to spyware, computer viruses and other malware.

    Other inventors
  • Internet third-party authentication using electronic tickets

    Issued US 7,266,684

    The invention relates generally to computer information security and the Internet, and more specifically to methods that permit one or more third-party agents to access customers' private personal and financial data or other confidential information on the world-wide-web. The invention was originally designed as a method for banks and bank customers to mutually approve one or more third party agents (such as aggregators, for example) to access customer confidential data via the Internet. It is…

    The invention relates generally to computer information security and the Internet, and more specifically to methods that permit one or more third-party agents to access customers' private personal and financial data or other confidential information on the world-wide-web. The invention was originally designed as a method for banks and bank customers to mutually approve one or more third party agents (such as aggregators, for example) to access customer confidential data via the Internet. It is also applicable, however, in any situation involving computers where an agent's computer or computers act as an intermediary between computers of two other parties and where access to certain information is to be limited, whether or not the information is confidential.

Courses

  • MIT Sloan Implementing Improvement Strategies: Practical Tools and Methods

    -

  • MIT Sloan Managing Technical Professionals and Organizations

    -

Recommendations received

More activity by Jeff

View Jeff’s full profile

  • See who you know in common
  • Get introduced
  • Contact Jeff directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses