Patents by Inventor Michael Hanley

Michael Hanley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11974767
    Abstract: Systems and methods for treating cellulite including an apparatus that applies or a method involving separating septa to eliminate or reduce the appearance of cellulite. In one approach, an interventional tool is placed between tissue layers to engage and treat septa connecting tissue layers between which fat deposits are contained.
    Type: Grant
    Filed: January 21, 2021
    Date of Patent: May 7, 2024
    Assignee: Revelle Aesthetics, Inc.
    Inventors: Joshua Makower, Jonathan Podmore, Earl Bright, II, John Hanley, Pablo Acosta, Theodore Ketai, William Sauway Law, Michael Schaller, Bryan Hartley
  • Patent number: 11941661
    Abstract: Embodiments of the present invention provide methods, systems, apparatuses, and computer program products for predicting consumer behavior. In one embodiment a method is provided comprising automatically creating a link graph comprising nodes representing webpages, links representing hyperlinks, and weights for each link representing a number of times a hyperlink associated with the respective link redirected the a user devices from a webpage associated with a first node connected to the link to a webpage associated with a second node connected to the link; and determining based on the link graph a programmatically expected path for a particular user, wherein the programmatically expected path identifies, at least, two or more webpages that the particular user is programmatically expected to visit and specifying a programmatically expected order at which the particular user will visit the webpages.
    Type: Grant
    Filed: December 21, 2021
    Date of Patent: March 26, 2024
    Assignee: Groupon, Inc.
    Inventors: Michael Sussman, Jesse Pinho, Michael Hines, Jim Challenger, David Hanley, Isaac Sanders, Dean Marano
  • Patent number: 11902302
    Abstract: System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.
    Type: Grant
    Filed: August 30, 2021
    Date of Patent: February 13, 2024
    Assignee: KnowBe4, Inc.
    Inventors: Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
  • Publication number: 20240048560
    Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.
    Type: Application
    Filed: September 28, 2023
    Publication date: February 8, 2024
    Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
  • Patent number: 11831642
    Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.
    Type: Grant
    Filed: April 20, 2021
    Date of Patent: November 28, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
  • Patent number: 11529363
    Abstract: Provided herein are methods for treating cancers (e.g., inflammatory myofibroblastic tumor, anaplastic large cell lymphoma, and neuroblastoma) in pediatric patients using brigatinib, as monotherapy or combination therapy with one or more second therapeutic agents.
    Type: Grant
    Filed: March 18, 2019
    Date of Patent: December 20, 2022
    Inventors: Sharon Bowen, Michael Hanley, David Kerstein, Karthik Venkatakrishnan
  • Patent number: 11230467
    Abstract: A detection device for detecting that a source is sold-out for a beverage dispenser, the beverage dispenser dispensing from the source via a valve controlled by a solenoid. A circuit board is configured to be positioned on the valve proximal to the solenoid. A detector is coupled to the circuit board, where the solenoid creates a magnetic field when dispensing from the valve, and where the detector detects the magnetic field created by the solenoid and consequently produces an electrical output. A control system is coupled to the circuit board in communication with the detector. The control system is configured to access threshold data and to compare the electrical output of the detector to the threshold data. The control system indicates that the source is sold-out based upon the comparison of the electrical output to the threshold data.
    Type: Grant
    Filed: November 3, 2020
    Date of Patent: January 25, 2022
    Assignee: Marmon Foodservice Technologies, Inc.
    Inventors: Daniel Prochaska, E. Scott Sevcik, Michael Hanley, David K. Njaastad
  • Publication number: 20210392149
    Abstract: System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.
    Type: Application
    Filed: August 30, 2021
    Publication date: December 16, 2021
    Inventors: Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
  • Patent number: 11108791
    Abstract: System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.
    Type: Grant
    Filed: August 11, 2020
    Date of Patent: August 31, 2021
    Assignee: KnowBe4, Inc.
    Inventors: Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
  • Publication number: 20210258307
    Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.
    Type: Application
    Filed: April 20, 2021
    Publication date: August 19, 2021
    Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
  • Patent number: 11019057
    Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.
    Type: Grant
    Filed: January 14, 2020
    Date of Patent: May 25, 2021
    Assignee: DUO SECURITY, INC.
    Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
  • Publication number: 20210130149
    Abstract: A detection device for detecting that a source is sold-out for a beverage dispenser, the beverage dispenser dispensing from the source via a valve controlled by a solenoid. A circuit board is configured to be positioned on the valve proximal to the solenoid. A detector is coupled to the circuit board, where the solenoid creates a magnetic field when dispensing from the valve, and where the detector detects the magnetic field created by the solenoid and consequently produces an electrical output. A control system is coupled to the circuit board in communication with the detector. The control system is configured to access threshold data and to compare the electrical output of the detector to the threshold data. The control system indicates that the source is sold-out based upon the comparison of the electrical output to the threshold data.
    Type: Application
    Filed: November 3, 2020
    Publication date: May 6, 2021
    Applicant: Cornelius, Inc.
    Inventors: Daniel Prochaska, E. Scott Sevcik, Michael Hanley, David K. Njaastad
  • Publication number: 20210047427
    Abstract: Methods of administering isolated anti-CD38 antibodies subcutaneously are disclosed. The methods provide an effective treatment for autoimmune diseases and cancers, including hematologic diseases. Also disclosed are unit dosage forms for the anti-CD38 antibodies.
    Type: Application
    Filed: March 27, 2019
    Publication date: February 18, 2021
    Inventors: Eric Fedyk, Michael Hanley, Antonio Palumbo
  • Publication number: 20210000845
    Abstract: Provided herein are methods for treating cancers (e.g., inflammatory myofibroblastic tumor, anaplastic large cell lymphoma, and neuroblastoma) in pediatric patients using brigatinib, as monotherapy or combination therapy with one or more second therapeutic agents.
    Type: Application
    Filed: March 18, 2019
    Publication date: January 7, 2021
    Inventors: Sharon Bowen, Michael Hanley, David Kerstein, Karthik Venkatakrishnan
  • Publication number: 20200374303
    Abstract: System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.
    Type: Application
    Filed: August 11, 2020
    Publication date: November 26, 2020
    Inventors: Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
  • Patent number: 10812507
    Abstract: System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.
    Type: Grant
    Filed: April 19, 2019
    Date of Patent: October 20, 2020
    Assignee: KnowBe4, Inc.
    Inventors: Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
  • Publication number: 20200288315
    Abstract: Systems and methods are provided that include: accessing implicit authentication data from a possession factor associated with an authorized user; at the possession factor or at an authentication platform: generating a possession confidence level using the implicit authentication data, the possession confidence level being one of a plurality of possession confidence levels, the possession confidence level indicating a likelihood that the possession factor is possessed by the authorized user; identifying, among a plurality of varying authentication requirements, an authentication requirement for the transaction based on the possession confidence level, the authentication requirement defines a process or action to prove authority to perform the transaction or a process or action to prove an identity of a user attempting to perform the transaction; and implementing the authentication requirement for the transaction.
    Type: Application
    Filed: May 28, 2020
    Publication date: September 10, 2020
    Inventors: Michael Hanley, Jon Oberheide
  • Patent number: 10708776
    Abstract: Systems and methods are provided that include: accessing implicit authentication data from a possession factor associated with an authorized user; at the possession factor or at an authentication platform: generating a possession confidence level using the implicit authentication data, the possession confidence level being one of a plurality of possession confidence levels, the possession confidence level indicating a likelihood that the possession factor is possessed by the authorized user; identifying, among a plurality of varying authentication requirements, an authentication requirement for the transaction based on the possession confidence level, the authentication requirement defines a process or action to prove authority to perform the transaction or a process or action to prove an identity of a user attempting to perform the transaction; and implementing the authentication requirement for the transaction.
    Type: Grant
    Filed: September 18, 2017
    Date of Patent: July 7, 2020
    Inventors: Michael Hanley, Jon Oberheide
  • Publication number: 20200204550
    Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.
    Type: Application
    Filed: January 14, 2020
    Publication date: June 25, 2020
    Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
  • Publication number: 20200195664
    Abstract: System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.
    Type: Application
    Filed: April 19, 2019
    Publication date: June 18, 2020
    Inventors: Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner