Patents by Inventor Michelle Rivers

Michelle Rivers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10771493
    Abstract: A security vulnerability analysis mechanism is provided that ingests content from a plurality of content source computing devices to identify instances of security vulnerability content in the ingested content. The mechanism performs a security trend analysis on the instances of security vulnerability content to identify a relative ranking of security vulnerabilities. The mechanism identifies computing resources of a specified computing infrastructure and a criticality of the computing resources to an operation of the computing infrastructure. The mechanism generates a prioritized listing of security vulnerabilities associated with the computing infrastructure based on the relative ranking of security vulnerabilities and the criticality of the computing resources in the computing infrastructure. The mechanism outputs a notification to a user via a user computing device, indicating the prioritized listing of security vulnerabilities.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: September 8, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael Spisak, Steven D. McKay, Mariya Ali, Rhonda L. Childress, Michelle Rivers, Carlos E. Aguilera
  • Publication number: 20200092319
    Abstract: A security vulnerability analysis mechanism is provided that ingests content from a plurality of content source computing devices to identify instances of security vulnerability content in the ingested content. The mechanism performs a security trend analysis on the instances of security vulnerability content to identify a relative ranking of security vulnerabilities. The mechanism identifies computing resources of a specified computing infrastructure and a criticality of the computing resources to an operation of the computing infrastructure. The mechanism generates a prioritized listing of security vulnerabilities associated with the computing infrastructure based on the relative ranking of security vulnerabilities and the criticality of the computing resources in the computing infrastructure. The mechanism outputs a notification to a user via a user computing device, indicating the prioritized listing of security vulnerabilities.
    Type: Application
    Filed: September 18, 2018
    Publication date: March 19, 2020
    Inventors: Michael Spisak, Steven D. McKay, Mariya Ali, Rhonda L. Childress, Michelle Rivers, Carlos E. Aguilera
  • Patent number: 10348768
    Abstract: Training a random forest model to relate settings of a network security device to undesirable behavior of the network security device is provided. A determination of a corresponding set of settings associated with each region of lowest incident probability is made using a random forest. The plurality of identified desired settings are presented as options for changing the network security device from the as-is settings to the identified desired settings. A choice is received from the plurality of options. The choice informs the random forest model. The random forest model ranks for a new problematic network security device the plurality of options for changing the new problematic network security device from as-is settings to desired settings by aggregating an identified cost of individual configuration changes, thereby identifying a most cost-effective setting for the network security device to achieve a desired output of the network security device.
    Type: Grant
    Filed: March 9, 2017
    Date of Patent: July 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Michael E. Nidd, Michelle Rivers, George E. Stark, Srinivas B. Tummalapenta, Dorothea Wiesmann
  • Publication number: 20180262531
    Abstract: Training a random forest model to relate settings of a network security device to undesirable behavior of the network security device is provided. A determination of a corresponding set of settings associated with each region of lowest incident probability is made using a random forest. The plurality of identified desired settings are presented as options for changing the network security device from the as-is settings to the identified desired settings. A choice is received from the plurality of options. The choice informs the random forest model. The random forest model ranks for a new problematic network security device the plurality of options for changing the new problematic network security device from as-is settings to desired settings by aggregating an identified cost of individual configuration changes, thereby identifying a most cost-effective setting for the network security device to achieve a desired output of the network security device.
    Type: Application
    Filed: March 9, 2017
    Publication date: September 13, 2018
    Inventors: Rhonda L. Childress, Michael E. Nidd, Michelle Rivers, George E. Stark, Srinivas B. Tummalapenta, Dorothea Wiesmann
  • Publication number: 20180174069
    Abstract: A computer-implemented method of increasing reliability of an information technology environment comprising a plurality of hardware devices. Training data is received and a random forest is built from the training data using machine learning. A particular hardware device in the plurality of hardware devices is determined to be strange. Strange is defined as the particular hardware device having a proximity value lower than a predetermined threshold value for the random forest. A preventative action is determined to lower a risk of failure of the particular hardware device. The preventative action is reported. Reporting includes at least one of displaying a report on a display device, printing the report onto paper, and storing the report in a non-transitory computer recordable storage medium.
    Type: Application
    Filed: December 15, 2016
    Publication date: June 21, 2018
    Inventors: Rhonda L. Childress, Michael E. Nidd, Michelle Rivers, George E. Stark, Srinivas B. Tummalapenta, Dorothea Wiesmann