Patents by Inventor Gary I. Givental
Gary I. Givental has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200351075Abstract: An example operation may include one or more of retrieving a predefined image from a storage, encoding data attributes to be stored on a blockchain into one or more image layers of the predefined image to generate an encoded image, generating a data block comprising the encoded image including the data attributes which are encoded into the one or more image layers, and storing the data block via a hash-linked chain of data blocks on a distributed ledger.Type: ApplicationFiled: May 2, 2019Publication date: November 5, 2020Inventors: Adam L. Griffin, Srinivas B. Tummalapenta, Gary I. Givental, Wesley A. Khademi, Aankur Bhatia
-
Publication number: 20200342252Abstract: Mechanisms are provided to implement an image based event classification engine having an event image encoder and a first neural network computer model. The event image encoder receives an event data structure comprising a plurality of event attributes, where the event data structure represents an event occurring in association with a computing resource. The event image encoder executes, for each event attribute, a corresponding event attribute encoder that encodes the event attribute as a pixel pattern in a predetermined grid of pixels, corresponding to the event attribute, of an event image. The event image is into to a neural network computer model which applies one or more image feature extraction operations and image feature analysis algorithms to the event image to generate a classification prediction classifying the event into one of a plurality of predefined classifications and outputs the classification prediction.Type: ApplicationFiled: April 23, 2019Publication date: October 29, 2020Inventors: Gary I. Givental, Wesley A. Khademi, Aankur Bhatia, Srinivas B. Tummalapenta
-
Publication number: 20200186559Abstract: An anomaly detection system configured to generate a plurality of tensors based on spatial attributes of a set of cybersecurity data and temporal attributes of the set of cybersecurity data. The set of cybersecurity data comprising numeric data and textual data collected from a plurality of computational sources. The anomaly detection system can provide the plurality of tensors to a Hierarchical Temporal Memory (HTM) network. The HTM network can be configured to generate respective HTM outputs for respective regions of the HTM network. The anomaly detection system can determine that at least one HTM output indicates an anomaly, convert the at least one HTM output to a notification, and provide the notification to a user interface.Type: ApplicationFiled: January 8, 2020Publication date: June 11, 2020Inventors: Sharon Hagi, Gary I. Givental
-
Patent number: 10616253Abstract: An anomaly detection system configured to generate a plurality of tensors based on spatial attributes of a set of cybersecurity data and temporal attributes of the set of cybersecurity data. The set of cybersecurity data comprising numeric data and textual data collected from a plurality of computational sources. The anomaly detection system can provide the plurality of tensors to a Hierarchical Temporal Memory (HTM) network. The HTM network can be configured to generate respective HTM outputs for respective regions of the HTM network. The anomaly detection system can determine that at least one HTM output indicates an anomaly, convert the at least one HTM output to a notification, and provide the notification to a user interface.Type: GrantFiled: November 13, 2017Date of Patent: April 7, 2020Assignee: International Business Machines CorporationInventors: Sharon Hagi, Gary I. Givental
-
Patent number: 10609061Abstract: An anomaly detection system configured to generate a plurality of tensors based on spatial attributes of a set of cybersecurity data and temporal attributes of the set of cybersecurity data. The set of cybersecurity data comprising numeric data and textual data collected from a plurality of computational sources. The anomaly detection system can provide the plurality of tensors to a Hierarchical Temporal Memory (HTM) network. The HTM network can be configured to generate respective HTM outputs for respective regions of the HTM network. The anomaly detection system can determine that at least one HTM output indicates an anomaly, convert the at least one HTM output to a notification, and provide the notification to a user interface.Type: GrantFiled: April 29, 2019Date of Patent: March 31, 2020Assignee: International Business Machines CorporationInventors: Sharon Hagi, Gary I. Givental
-
Publication number: 20190260789Abstract: An anomaly detection system configured to generate a plurality of tensors based on spatial attributes of a set of cybersecurity data and temporal attributes of the set of cybersecurity data. The set of cybersecurity data comprising numeric data and textual data collected from a plurality of computational sources. The anomaly detection system can provide the plurality of tensors to a Hierarchical Temporal Memory (HTM) network. The HTM network can be configured to generate respective HTM outputs for respective regions of the HTM network. The anomaly detection system can determine that at least one HTM output indicates an anomaly, convert the at least one HTM output to a notification, and provide the notification to a user interface.Type: ApplicationFiled: April 29, 2019Publication date: August 22, 2019Inventors: Sharon Hagi, Gary I. Givental
-
Publication number: 20190149565Abstract: An anomaly detection system configured to generate a plurality of tensors based on spatial attributes of a set of cybersecurity data and temporal attributes of the set of cybersecurity data. The set of cybersecurity data comprising numeric data and textual data collected from a plurality of computational sources. The anomaly detection system can provide the plurality of tensors to a Hierarchical Temporal Memory (HTM) network. The HTM network can be configured to generate respective HTM outputs for respective regions of the HTM network. The anomaly detection system can determine that at least one HTM output indicates an anomaly, convert the at least one HTM output to a notification, and provide the notification to a user interface.Type: ApplicationFiled: November 13, 2017Publication date: May 16, 2019Inventors: Sharon Hagi, Gary I. Givental
-
Publication number: 20180367561Abstract: An enhanced threat disposition analysis technique is provided. In response to receipt of a security threat, a threat disposition score (TDS) is retrieved. The threat disposition score is generated from a machine learning scoring model that is built from information about historical security threats, including historical disposition of one or more alerts associated with the historical security threats. The system augments an alert to include the threat disposition score, optionally together with a confidence level, to generate an enriched alert. The enriched alert is then presented to the security analyst for handling directly. Depending on the TDS (and its confidence level), the analyst may be able to respond to the threat immediately, i.e., without further detailed investigation. Preferably, the machine learning model is updated continuously as the system handles security threats, thereby increasing the predictive benefit of the TDS scoring.Type: ApplicationFiled: June 14, 2017Publication date: December 20, 2018Inventors: Gary I. Givental, Aankur Bhatia, Paul J. Dwyer
-
Patent number: 9955116Abstract: Eye tracking for the purpose of detecting attendee disengagement with respect to a presentation including a visual display communicated over a network. The eye tracking method includes: during a play of the presentation, tracking eye positions of a set of control party(ies); during a play of the presentation, tracking eye positions of a set of non-control party(ies); determining a set of divergence value(s) corresponding to divergence between the eye position(s) of the control party(ies) and the non-control party(ies); and determining a disengagement value corresponding to relative disengagement of the non-control party(ies) based, at least in part on the set of divergence value(s).Type: GrantFiled: April 8, 2016Date of Patent: April 24, 2018Assignee: International Business Machines CorporationInventors: Gary I. Givental, Kaleb D. Walton
-
Patent number: 9531759Abstract: An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a second business are determined. The second business has a second computer system currently or recently under attack. The characteristics include respective industries, sizes, geographical locations, types of sensitive data, and security vulnerabilities associated with the first and second businesses or first and second computer systems, an address of traffic through a device in the first computer system, and an address of an entity responsible for the attack on the second computer system. Based on a similarity between the characteristics of the first and second businesses, a likelihood that the entity responsible for the attack on the second computer system will attack the first computer system of the first business is determined.Type: GrantFiled: November 6, 2015Date of Patent: December 27, 2016Assignee: International Business Machines CorporationInventors: Nicholas W. Bradley, Gary I. Givental, David M. McMillen, Kaleb D. Walton
-
Patent number: 9531746Abstract: An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics are determined for target businesses having target computer systems currently or recently under attack by an entity whose Internet Protocol (IP) address was selected from a list of suspicious IP addresses. Percentages associated with the characteristics are determined. Each percentage indicates a percentage of the target businesses whose associated characteristic matches a corresponding characteristic of the first business. A score is incremented by an amount for each of the percentages that exceeds an associated threshold. The score is incremented by twice the amount if the IP address matches an address of a source or destination of traffic through a security device in the first computer system. A recommendation to change a security policy for the first computer system is generated if the score exceeds twice the predetermined amount.Type: GrantFiled: June 24, 2016Date of Patent: December 27, 2016Assignee: International Business Machines CorporationInventors: Nicholas W. Bradley, Gary I. Givental, David M. McMillen, Kaleb D. Walton
-
Publication number: 20160308899Abstract: An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics are determined for target businesses having target computer systems currently or recently under attack by an entity whose Internet Protocol (IP) address was selected from a list of suspicious IP addresses. Percentages associated with the characteristics are determined. Each percentage indicates a percentage of the target businesses whose associated characteristic matches a corresponding characteristic of the first business. A score is incremented by an amount for each of the percentages that exceeds an associated threshold. The score is incremented by twice the amount if the IP address matches an address of a source or destination of traffic through a security device in the first computer system. A recommendation to change a security policy for the first computer system is generated if the score exceeds twice the predetermined amount.Type: ApplicationFiled: June 24, 2016Publication date: October 20, 2016Inventors: Nicholas W. Bradley, Gary I. Givental, David M. McMillen, Kaleb D. Walton
-
Publication number: 20160227167Abstract: Eye tracking for the purpose of detecting attendee disengagement with respect to a presentation including a visual display communicated over a network. The eye tracking method includes: during a play of the presentation, tracking eye positions of a set of control party(ies); during a play of the presentation, tracking eye positions of a set of non-control party(ies); determining a set of divergence value(s) corresponding to divergence between the eye position(s) of the control party(ies) and the non-control party(ies); and determining a disengagement value corresponding to relative disengagement of the non-control party(ies) based, at least in part on the set of divergence value(s).Type: ApplicationFiled: April 8, 2016Publication date: August 4, 2016Inventors: Gary I. Givental, Kaleb D. Walton
-
Patent number: 9363093Abstract: Eye tracking for the purpose of detecting attendee disengagement with respect to a presentation including a visual display communicated over a network. The eye tracking method includes: during a play of the presentation, tracking eye positions of a set of control party(ies); during a play of the presentation, tracking eye positions of a set of non-control party(ies); determining a set of divergence value(s) corresponding to divergence between the eye position(s) of the control party(ies) and the non-control party(ies); and determining a disengagement value corresponding to relative disengagement of the non-control party(ies) based, at least in part on the set of divergence value(s).Type: GrantFiled: March 21, 2014Date of Patent: June 7, 2016Assignee: International Business Machines CorporationInventors: Gary I. Givental, Kaleb D. Walton
-
Patent number: 9344457Abstract: A computer determines a number of matches returned by a proposed security rule that result from application of the proposed security-rule to historical logged event data. The computer determines a predicted performance of the proposed security rule as part of a network security system based on the number of matches. The computer sends a message during a creation session of the proposed security-rule. The message includes a recommended change for a portion of the proposed security based on the predicted performance of the proposed security rule.Type: GrantFiled: August 31, 2015Date of Patent: May 17, 2016Assignee: International Business Machines CorporationInventors: Daniel E. Chapman, II, Gary I. Givental, Kaleb D. Walton
-
Publication number: 20160065621Abstract: An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a second business are determined. The second business has a second computer system currently or recently under attack. The characteristics include respective industries, sizes, geographical locations, types of sensitive data, and security vulnerabilities associated with the first and second businesses or first and second computer systems, an address of traffic through a device in the first computer system, and an address of an entity responsible for the attack on the second computer system. Based on a similarity between the characteristics of the first and second businesses, a likelihood that the entity responsible for the attack on the second computer system will attack the first computer system of the first business is determined.Type: ApplicationFiled: November 6, 2015Publication date: March 3, 2016Inventors: Nicholas W. Bradley, Gary I. Givental, David M. McMillen, Kaleb D. Walton
-
Patent number: 9253204Abstract: An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a second business are determined. The second business has a second computer system currently or recently under attack. The characteristics include respective industries, sizes, geographical locations, types of sensitive data, and security vulnerabilities associated with the first and second businesses or first and second computer systems, an address of traffic through a device in the first computer system, and an address of an entity responsible for the attack on the second computer system. Based on a similarity between the characteristics of the first and second businesses, a likelihood that the entity responsible for the attack on the second computer system will attack the first computer system of the first business is determined.Type: GrantFiled: March 19, 2014Date of Patent: February 2, 2016Assignee: International Business Machines CorporationInventors: Nicholas W. Bradley, Gary I. Givental, David M. McMillen, Kaleb D. Walton
-
Publication number: 20150373054Abstract: A computer determines a number of matches returned by a proposed security rule that result from application of the proposed security-rule to historical logged event data. The computer determines a predicted performance of the proposed security rule as part of a network security system based on the number of matches. The computer sends a message during a creation session of the proposed security-rule. The message includes a recommended change for a portion of the proposed security based on the predicted performance of the proposed security rule.Type: ApplicationFiled: August 31, 2015Publication date: December 24, 2015Inventors: Daniel E. Chapman, II, Gary I. Givental, Kaleb D. Walton
-
Patent number: 9183385Abstract: A computer receives entry of a proposed security rule during a security rule entry or editing session and determines that the proposed security rule requires review of a type of security data. The number of matches of the proposed security rule to the logged security data is determined and a user is notified as to the number of matches. The computer searches the security data and applies the proposed security rule to the security data to determine the predicted performance of the proposed security rule. The computer generates a report that may include warnings, recommendations, and information correlated to the security data. The report is presented to a user during the rule editing session, and based on the report a modification to the proposed security rule can be made.Type: GrantFiled: August 22, 2012Date of Patent: November 10, 2015Assignee: International Business Machines CorporationInventors: Daniel E. Chapman, II, Gary I. Givental, Kaleb D. Walton
-
Publication number: 20150271199Abstract: An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a second business are determined. The second business has a second computer system currently or recently under attack. The characteristics include respective industries, sizes, geographical locations, types of sensitive data, and security vulnerabilities associated with the first and second businesses or first and second computer systems, an address of traffic through a device in the first computer system, and an address of an entity responsible for the attack on the second computer system. Based on a similarity between the characteristics of the first and second businesses, a likelihood that the entity responsible for the attack on the second computer system will attack the first computer system of the first business is determined.Type: ApplicationFiled: March 19, 2014Publication date: September 24, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nicholas W. Bradley, Gary I. Givental, David M. McMillen, Kaleb D. Walton