Patents by Inventor Charles Dallas
Charles Dallas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11909758Abstract: Systems and methods described herein provide a cyber risk assessment service. A computing device determines weights for techniques of a cyber security framework based on historical industry impact. The computing device associates an enterprise network with an industry identifier, obtains customer risk data for the enterprise network, and normalizes and/or combines the customer risk data to form normalized risk scores. The computing device maps the customer risk data to corresponding techniques in the cyber security framework, generates technique scores based on the mapping and the normalized risk scores, and generates weighted technique scores using some of the weights selected based on the industry identifier. The computing device calculates an overall security score for the enterprise network based on the weighted technique scores, identifies a corrective recommendation for the overall security score, and provides the overall security score and the corrective recommendation for presentation to a user.Type: GrantFiled: March 10, 2023Date of Patent: February 20, 2024Assignee: Verizon Patent and Licensing Inc.Inventors: Lori K. Bogren, Katrina Marie Kutchko, Allison J. Ashford, Charles A. Dallas, Yonatan Fridman
-
Publication number: 20230216881Abstract: Systems and methods described herein provide a cyber risk assessment service. A computing device determines weights for techniques of a cyber security framework based on historical industry impact. The computing device associates an enterprise network with an industry identifier, obtains customer risk data for the enterprise network, and normalizes and/or combines the customer risk data to form normalized risk scores. The computing device maps the customer risk data to corresponding techniques in the cyber security framework, generates technique scores based on the mapping and the normalized risk scores, and generates weighted technique scores using some of the weights selected based on the industry identifier. The computing device calculates an overall security score for the enterprise network based on the weighted technique scores, identifies a corrective recommendation for the overall security score, and provides the overall security score and the corrective recommendation for presentation to a user.Type: ApplicationFiled: March 10, 2023Publication date: July 6, 2023Inventors: Lori K. Bogren, Katrina Marie Kutchko, Allison K. Ashford, Charles A. Dallas, Yonatan Fridman
-
Patent number: 11647038Abstract: Systems and methods described herein provide a cyber risk assessment service. A computing device determines weights for techniques of a cyber security framework based on historical industry impact. The computing device associates an enterprise network with an industry identifier, obtains customer risk data for the enterprise network, and normalizes and/or combines the customer risk data to form normalized risk scores. The computing device maps the customer risk data to corresponding techniques in the cyber security framework, generates technique scores based on the mapping and the normalized risk scores, and generates weighted technique scores using some of the weights selected based on the industry identifier. The computing device calculates an overall security score for the enterprise network based on the weighted technique scores, identifies a corrective recommendation for the overall security score, and provides the overall security score and the corrective recommendation for presentation to a user.Type: GrantFiled: January 15, 2021Date of Patent: May 9, 2023Assignee: Verizon Patent and Licensing Inc.Inventors: Lori K. Bogren, Katrina Marie Kutchko, Allison J. Ashford, Charles A. Dallas, Yonatan Fridman
-
Publication number: 20220232031Abstract: Systems and methods described herein provide a cyber risk assessment service. A computing device determines weights for techniques of a cyber security framework based on historical industry impact. The computing device associates an enterprise network with an industry identifier, obtains customer risk data for the enterprise network, and normalizes and/or combines the customer risk data to form normalized risk scores. The computing device maps the customer risk data to corresponding techniques in the cyber security framework, generates technique scores based on the mapping and the normalized risk scores, and generates weighted technique scores using some of the weights selected based on the industry identifier. The computing device calculates an overall security score for the enterprise network based on the weighted technique scores, identifies a corrective recommendation for the overall security score, and provides the overall security score and the corrective recommendation for presentation to a user.Type: ApplicationFiled: January 15, 2021Publication date: July 21, 2022Inventors: Lori K. Bogren, Katrina Marie Kutchko, Allison J. Ashford, Charles A. Dallas, Yonatan Fridman
-
Patent number: 9390418Abstract: A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as, for example, a rules-based thresholding engine and a profiling engine. The detection layer can include an AI-based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases.Type: GrantFiled: August 18, 2008Date of Patent: July 12, 2016Assignee: Verizon Patent and Licensing Inc.Inventors: John Gavan, Kevin Paul, Jim Richards, Charles A Dallas, Hans Van Arkel, Cheryl Herrington, Saralyn Mahone, Terrill J Curtis, James J Wagner
-
Publication number: 20140351909Abstract: A computer is configured to receive an authentication request that identifies one or more authentication form factors, and for each form factor identified, further identifies at least one parameter. The computer is further configured to generate a risk score for the authentication request using the parameter, the risk score being based at least in part on a complexity associated with each of the one or more authentication form factors. The computer is further configured to provide the risk score to a requester.Type: ApplicationFiled: August 11, 2014Publication date: November 27, 2014Inventors: Charles Dallas, Mohammad R. Tayebnejad, Ken Mckeever, Vidhyaprakash Ramachandran, Paul A. Donfried
-
Patent number: 8806591Abstract: A computer is configured to receive an authentication request that identifies one or more authentication form factors, and for each form factor identified, further identifies at least one parameter. The computer is further configured to generate a risk score for the authentication request using the parameter, the risk score being based at least in part on a complexity associated with each of the one or more authentication form factors. The computer is further configured to provide the risk score to a requester.Type: GrantFiled: January 7, 2011Date of Patent: August 12, 2014Assignee: Verizon Patent and Licensing Inc.Inventors: Charles Dallas, Mohammad Reza Tayebnejad, Ken Mckeever, Vidhyaprakash Ramachandran, Paul Andrew Donfried
-
Patent number: 8506204Abstract: A strike-off accessory device, which is configured to be mounted on a vehicle, includes a strike-off assembly for leveling the top surface of a bulk material, the strike-off assembly having a first side member, a second side member spaced apart from the first side member by a lateral distance, and at least one rear member disposed between the first side member and the second side member, the at least one rear member including a bottom edge that is configured to contact the bulk material; and a mounting assembly operatively coupled to the strike-off assembly, the mounting assembly configured to structurally support the strike-off assembly from the vehicle. In one embodiment of the invention, the lateral distance between the first member and the second member of the strike-off assembly is selectively adjustable by a user of the strike-off accessory device. In another embodiment, the vehicle is a skid-steer loader.Type: GrantFiled: October 4, 2011Date of Patent: August 13, 2013Assignee: Quality Paving LLCInventors: Rex William Reames, Steven Richard Cooper, Robert Eugene Watt, Charles Dallas Sullivan, Tony Stephen Elliott, Luke Cole Reames
-
Publication number: 20120180124Abstract: A computer is configured to receive an authentication request that identifies one or more authentication form factors, and for each form factor identified, further identifies at least one parameter. The computer is further configured to generate a risk score for the authentication request using the parameter, the risk score being based at least in part on a complexity associated with each of the one or more authentication form factors. The computer is further configured to provide the risk score to a requester.Type: ApplicationFiled: January 7, 2011Publication date: July 12, 2012Applicant: Verizon Patent and Licensing Inc.Inventors: Charles Dallas, Mohammad Reza Tayebnejad, Ken McKeever, Vidhyaprakash Ramachandran, Paul Andrew Donfried
-
Publication number: 20090129573Abstract: A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as, for example, a rules-based thresholding engine and a profiling engine. The detection layer can include an AI-based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases.Type: ApplicationFiled: August 18, 2008Publication date: May 21, 2009Applicant: MCI COMMUNICATIONS CORPORATIONInventors: John Gavan, Kevin Paul, Jim Richards, Charles A. Dallas, Hans Van Arkel, Cheryl Herrington, Saralyn Mahone, Terrill J. Curtis, James J. Wagner
-
Patent number: 7433855Abstract: A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as, for example, a rules-based thresholding engine and a profiling engine. The detection layer can include an AI-based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases.Type: GrantFiled: July 24, 2003Date of Patent: October 7, 2008Assignee: MCI Communications CorporationInventors: John Gavan, Kevin Paul, Jim Richards, Charles A Dallas, Hans Van Arkel, Cheryl Herrington, Saralyn Mahone, Terrell J Curtis, James J Wagner
-
Publication number: 20070094181Abstract: A data processing system program to develop, train, and implement a neural network for identifying customers who represent a bad debt risk is disclosed. A feature vector is applied to a neural network to generate outputs that approximate the relative likelihood that customers who are the subjects of the records used to generate the feature vector will be a bad debt risk. Statistical values relating categorical attributes of the customers to the likelihood of their becoming a bad debt risk are substituted for the categorical attributes, and the attributes are normalized before the feature vector is applied to the network. In one embodiment the customers are customers of a long distance service provider.Type: ApplicationFiled: September 18, 2006Publication date: April 26, 2007Applicant: MCI, LLC.Inventors: Mohammad Tayebnejad, Karl Van Camp, Charles Dallas, John Van Arkel
-
Patent number: 7117191Abstract: A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as a rules-based thresholding engine and a profiling engine. The detection layer can include an Artificial Intelligence based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases.Type: GrantFiled: September 8, 2003Date of Patent: October 3, 2006Assignee: MCI, Inc.Inventors: John Gavan, Kevin Paul, Jim Richards, Charles A. Dallas, Hans Van Arkel, Cheryl Herrington, Saralyn M. Mahone, Terrill J. Curtis, James J. Wagner
-
Publication number: 20050075992Abstract: A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as a rules-based thresholding engine and a profiling engine. The detection layer can include an Artificial Intelligence based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases.Type: ApplicationFiled: September 8, 2003Publication date: April 7, 2005Applicant: MCI WORLDCOM, INC.Inventors: John Gavan, Kevin Paul, Jim Richards, Charles Dallas, Hans Van Arkel, Cheryl Herrington, Saralyn Mahone, Terrill Curtis, James Wagner
-
Publication number: 20040111305Abstract: A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as, for example, a rules-based thresholding engine and a profiling engine. The detection layer can include an AI-based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases.Type: ApplicationFiled: July 24, 2003Publication date: June 10, 2004Applicant: WorldCom, INC.Inventors: John Gavan, Kevin Paul, Jim Richards, Charles A. Dallas, Hans Van Arkel, Cheryl Herrington, Saralyn Mahone, Terreil J. Curtis, James J. Wagner
-
Patent number: 6732082Abstract: A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as a rules-based thresholding engine and a profiling engine. The detection layer can include an Artificial Intelligence based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases.Type: GrantFiled: December 15, 1998Date of Patent: May 4, 2004Assignee: WorldCom, Inc.Inventors: John Gavan, Kevin Paul, Jim Richards, Charles A. Dallas, Hans Van Arkel, Cheryl Herrington, Saralyn M. Mahone, Terrill J. Curtis, James J. Wagner
-
Patent number: 6601048Abstract: A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as, for example, a rules-based thresholding engine and a profiling engine. The detection layer can include an AI-based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases.Type: GrantFiled: September 12, 1997Date of Patent: July 29, 2003Assignee: MCI Communications CorporationInventors: John Gavan, Kevin Paul, Jim Richards, Charles A. Dallas, Hans Van Arkel, Cheryl Herrington, Saralyn Mahone, Terril J. Curtis, James J. Wagner
-
Patent number: 6208720Abstract: A configurable and scalable rules-based thresholding system, method and computer program product for processing event records includes a core infrastructure and a configurable domain-specific implementation. The core infrastructure is generically employed regardless of the actual type of network being monitored. The domain-specific implementation is provided with user specific data and rules. The core infrastructure includes an event record enhancer which enhances events with additional data and a threshold detector which determines whether an enhanced event record, alone or in light of prior event records, exceeds one or more thresholds. The enhancer can access external databases for additional information related to an event record. In one embodiment, the enhancer generates feature vectors to represent enhanced event records. The threshold detector receives enhanced event records from the event record enhancer.Type: GrantFiled: April 23, 1998Date of Patent: March 27, 2001Assignee: MCI Communications CorporationInventors: Terrill J. Curtis, Charles A. Dallas, John Gavan, Cheryl Herrington, Saralyn Mahone, Kevin Paul, Jim Richards, Hans Van Arkel, James J. Wagner
-
Patent number: 4217930Abstract: A venting port for refrigerated shipping containers is provided to facilitate the introduction and movement of refrigerated atmospheric air or refrigerant gas through the container. The venting port comprises a pair of flanged rings adapted to engage an opening formed in the wall of the container and to sandwich said wall therebetween, said rings defining a central port extending from the interior to the exterior of the container, a rotatable closure slidably disposed on the inside of the container and movable between a closed position in engagement with one of said flanged rings to seal the port and an open position spaced apart from said flanged rings to permit the entry of ambient air, means attached to the first flanged ring for guiding the closure between the open and closed positions, and locking means comprising a plurality of cooperating radially disposed teeth on one of said flanged rings and the closure to secure the closure in the closed position.Type: GrantFiled: September 28, 1978Date of Patent: August 19, 1980Inventors: Marc Lerner, Charles Dallas