Patents by Inventor John F. Behnken

John F. Behnken has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11117664
    Abstract: In one embodiment, a method includes limiting functionality of a remote controlled device during a first period of time where a user of the remote controlled device is not authenticated, receiving, from a separate authentication device, identity information of the user of the remote controlled device and information of the remote controlled device via an authentication process, authenticating the user prior to allowing full functionality of the remote controlled device, sending an indication of the identity of the user to the remote controlled device; and in response to determining during the authenticating that the user is verified as a trainee for the remote controlled device, enabling a trainer/trainee setting that allows a trainer to provide control of the remote controlled device to the trainee without functionality of the remote controlled device being limited.
    Type: Grant
    Filed: August 19, 2019
    Date of Patent: September 14, 2021
    Assignee: International Business Machines Corporation
    Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John Melchionne, David K. Wright
  • Patent number: 11049599
    Abstract: A method for implementing a secure system to prevent adverse drug interactions and repeat prescriptions, for a patient, in a multi-party computing environment. The method includes receiving a patient identifier from a provider, authenticating an access by the provider, and retrieving a second patient identifier, wherein the second patient identifier corresponds to the received patient identifier, wherein the received patient identifier and the second patient identifier are different. The method further includes receiving an input from the provider that corresponds to the patient identifier, and accessing a database that contains a stored private ID, wherein the stored private ID is a combination of the received patient identifier and the retrieved second patient identifier, and wherein the database includes data relating to the patient. The method includes searching the database to obtain a search result based on the received input from the provider, and transmitting the search result to the provider.
    Type: Grant
    Filed: June 8, 2018
    Date of Patent: June 29, 2021
    Assignee: International Business Machines Corporation
    Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John L. Melchionne, David K. Wright
  • Patent number: 10679493
    Abstract: An apparatus, method, program product, and system are disclosed for cognitive-based incident response. A sensor module captures baseline environment data related to a traffic incident using one or more sensors at a location of the traffic incident. A recommendation module generates and makes available, in real-time, one or more recommendations for responding to the traffic incident using cognitive computing processes based on the baseline environment data, the one or more recommendations comprising precautionary information for managing one or more emergency situations at the traffic incident. An update module continuously captures new environment data for the traffic incident using the one or more sensors, supplements the baseline environment data with the new environment data, and generates and makes available, in real-time, one or more updated recommendations based on the supplemented environment data using the supplemented environment data and the cognitive computing processes.
    Type: Grant
    Filed: September 18, 2017
    Date of Patent: June 9, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David B. Kumhyr, John F. Behnken, Louie A. Dickens, Rodolfo Lopez
  • Patent number: 10560844
    Abstract: In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated with and executable by the processing circuit. The logic is configured to cause the processing circuit to limit functionality of a remote controlled device during periods of time that a user of the remote controlled device is not authenticated, and to receive identity information of the user of the remote controlled device via an authentication process, with the identity information establishing an identity of the user. Also, the logic is configured to cause the processing circuit to authenticate the user prior to allowing full functionality of the remote controlled device, send an indication of the identity of the user to the remote controlled device, and provide full functionality of the remote controlled device to the user in response to successfully authenticating the user.
    Type: Grant
    Filed: March 15, 2017
    Date of Patent: February 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John Melchionne, David K. Wright
  • Patent number: 10554680
    Abstract: A first collection including an analytical feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one of vectors of the second collection with a corresponding vector of a fourth collection, migrating at least one of the vectors of the second collection with a corresponding vector of a fifth collection. Using a forecasting configuration, an analytical feature vector of the third collection is aged to generate a changed analytical feature vector containing analytical feature values expected at a future time. The changed analytical feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Grant
    Filed: March 7, 2018
    Date of Patent: February 4, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Publication number: 20190378599
    Abstract: A method for implementing a secure system to prevent adverse drug interactions and repeat prescriptions, for a patient, in a multi-party computing environment. The method includes receiving a patient identifier from a provider, authenticating an access by the provider, and retrieving a second patient identifier, wherein the second patient identifier corresponds to the received patient identifier, wherein the received patient identifier and the second patient identifier are different. The method further includes receiving an input from the provider that corresponds to the patient identifier, and accessing a database that contains a stored private ID, wherein the stored private ID is a combination of the received patient identifier and the retrieved second patient identifier, and wherein the database includes data relating to the patient. The method includes searching the database to obtain a search result based on the received input from the provider, and transmitting the search result to the provider.
    Type: Application
    Filed: June 8, 2018
    Publication date: December 12, 2019
    Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John L. Melchionne, David K. Wright
  • Publication number: 20190373468
    Abstract: In one embodiment, a method includes limiting functionality of a remote controlled device during a first period of time where a user of the remote controlled device is not authenticated, receiving, from a separate authentication device, identity information of the user of the remote controlled device and information of the remote controlled device via an authentication process, authenticating the user prior to allowing full functionality of the remote controlled device, sending an indication of the identity of the user to the remote controlled device; and in response to determining during the authenticating that the user is verified as a trainee for the remote controlled device, enabling a trainer/trainee setting that allows a trainer to provide control of the remote controlled device to the trainee without functionality of the remote controlled device being limited.
    Type: Application
    Filed: August 19, 2019
    Publication date: December 5, 2019
    Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John Melchionne, David K. Wright
  • Publication number: 20190088114
    Abstract: An apparatus, method, program product, and system are disclosed for cognitive-based incident response. A sensor module captures baseline environment data related to a traffic incident using one or more sensors at a location of the traffic incident. A recommendation module generates and makes available, in real-time, one or more recommendations for responding to the traffic incident using cognitive computing processes based on the baseline environment data, the one or more recommendations comprising precautionary information for managing one or more emergency situations at the traffic incident. An update module continuously captures new environment data for the traffic incident using the one or more sensors, supplements the baseline environment data with the new environment data, and generates and makes available, in real-time, one or more updated recommendations based on the supplemented environment data using the supplemented environment data and the cognitive computing processes.
    Type: Application
    Filed: September 18, 2017
    Publication date: March 21, 2019
    Inventors: DAVID B. KUMHYR, JOHN F. BEHNKEN, LOUIE A. DICKENS, RODOLFO LOPEZ
  • Patent number: 10230751
    Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by migrating, at least one of a vectors of the second collection with a corresponding vector of a fourth collection. The second and the fourth collections have a property distinct from one another. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Grant
    Filed: February 9, 2016
    Date of Patent: March 12, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Publication number: 20180270657
    Abstract: In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated with and executable by the processing circuit. The logic is configured to cause the processing circuit to limit functionality of a remote controlled device during periods of time that a user of the remote controlled device is not authenticated, and to receive identity information of the user of the remote controlled device via an authentication process, with the identity information establishing an identity of the user. Also, the logic is configured to cause the processing circuit to authenticate the user prior to allowing full functionality of the remote controlled device, send an indication of the identity of the user to the remote controlled device, and provide full functionality of the remote controlled device to the user in response to successfully authenticating the user.
    Type: Application
    Filed: March 15, 2017
    Publication date: September 20, 2018
    Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John Melchionne, David K. Wright
  • Publication number: 20180198816
    Abstract: A first collection including an analytical feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one of vectors of the second collection with a corresponding vector of a fourth collection, migrating at least one of the vectors of the second collection with a corresponding vector of a fifth collection. Using a forecasting configuration, an analytical feature vector of the third collection is aged to generate a changed analytical feature vector containing analytical feature values expected at a future time. The changed analytical feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Application
    Filed: March 7, 2018
    Publication date: July 12, 2018
    Applicant: International Business Machines Corporation
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Patent number: 10015190
    Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over a feature vectors of the second collection with a corresponding feature vector of a fourth collection. The second and the fourth collections have a property similar to one another. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Grant
    Filed: November 16, 2017
    Date of Patent: July 3, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Patent number: 9998491
    Abstract: A first collection including a pattern of life (POL) feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by combining a vector of the second collection with a corresponding vector of a different collection. Using a forecasting configuration, a POL feature vector of the third collection is aged to generate a changed POL feature vector containing POL feature values expected at a future time. The changed POL feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Grant
    Filed: November 16, 2017
    Date of Patent: June 12, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Patent number: 9948666
    Abstract: A first collection including an analytical feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one of vectors of the second collection with a corresponding vector of a fourth collection, migrating at least one of the vectors of the second collection with a corresponding vector of a fifth collection. Using a forecasting configuration, an analytical feature vector of the third collection is aged to generate a changed analytical feature vector containing analytical feature values expected at a future time. The changed analytical feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Grant
    Filed: February 9, 2016
    Date of Patent: April 17, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Publication number: 20180084004
    Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over a feature vectors of the second collection with a corresponding feature vector of a fourth collection. The second and the fourth collections have a property similar to one another. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Application
    Filed: November 16, 2017
    Publication date: March 22, 2018
    Applicant: International Business Machines Corporation
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Publication number: 20180077191
    Abstract: A first collection including a pattern of life (POL) feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by combining a vector of the second collection with a corresponding vector of a different collection. Using a forecasting configuration, a POL feature vector of the third collection is aged to generate a changed POL feature vector containing POL feature values expected at a future time. The changed POL feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Application
    Filed: November 16, 2017
    Publication date: March 15, 2018
    Applicant: International Business Machines Corporation
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Patent number: 9906551
    Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one of vectors of the second collection with a corresponding vector of a fourth collection. The second and the fourth collections have a property similar to one another. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Grant
    Filed: February 9, 2016
    Date of Patent: February 27, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Patent number: 9900338
    Abstract: A first collection including a pattern of life (POL) feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one of vectors of the second collection with a corresponding vector of a fourth collection, migrating at least one of the vectors of the second collection with a corresponding vector of a fifth collection. Using a forecasting configuration, a POL feature vector of the third collection is aged to generate a changed POL feature vector containing POL feature values expected at a future time. The changed POL feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Grant
    Filed: February 9, 2016
    Date of Patent: February 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Patent number: 9866580
    Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one the vectors of the second collection with a corresponding vector of a fourth collection, migrating at least one of the vectors of the second collection with a corresponding vector of a fifth collection, or both. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Grant
    Filed: February 9, 2016
    Date of Patent: January 9, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Publication number: 20170230399
    Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by migrating, at least one of a vectors of the second collection with a corresponding vector of a fourth collection. The second and the fourth collections have a property distinct from one another. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Application
    Filed: February 9, 2016
    Publication date: August 10, 2017
    Applicant: International Business Machines Corporation
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati