Patents by Inventor John F. Behnken
John F. Behnken has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11117664Abstract: In one embodiment, a method includes limiting functionality of a remote controlled device during a first period of time where a user of the remote controlled device is not authenticated, receiving, from a separate authentication device, identity information of the user of the remote controlled device and information of the remote controlled device via an authentication process, authenticating the user prior to allowing full functionality of the remote controlled device, sending an indication of the identity of the user to the remote controlled device; and in response to determining during the authenticating that the user is verified as a trainee for the remote controlled device, enabling a trainer/trainee setting that allows a trainer to provide control of the remote controlled device to the trainee without functionality of the remote controlled device being limited.Type: GrantFiled: August 19, 2019Date of Patent: September 14, 2021Assignee: International Business Machines CorporationInventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John Melchionne, David K. Wright
-
Patent number: 11049599Abstract: A method for implementing a secure system to prevent adverse drug interactions and repeat prescriptions, for a patient, in a multi-party computing environment. The method includes receiving a patient identifier from a provider, authenticating an access by the provider, and retrieving a second patient identifier, wherein the second patient identifier corresponds to the received patient identifier, wherein the received patient identifier and the second patient identifier are different. The method further includes receiving an input from the provider that corresponds to the patient identifier, and accessing a database that contains a stored private ID, wherein the stored private ID is a combination of the received patient identifier and the retrieved second patient identifier, and wherein the database includes data relating to the patient. The method includes searching the database to obtain a search result based on the received input from the provider, and transmitting the search result to the provider.Type: GrantFiled: June 8, 2018Date of Patent: June 29, 2021Assignee: International Business Machines CorporationInventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John L. Melchionne, David K. Wright
-
Patent number: 10679493Abstract: An apparatus, method, program product, and system are disclosed for cognitive-based incident response. A sensor module captures baseline environment data related to a traffic incident using one or more sensors at a location of the traffic incident. A recommendation module generates and makes available, in real-time, one or more recommendations for responding to the traffic incident using cognitive computing processes based on the baseline environment data, the one or more recommendations comprising precautionary information for managing one or more emergency situations at the traffic incident. An update module continuously captures new environment data for the traffic incident using the one or more sensors, supplements the baseline environment data with the new environment data, and generates and makes available, in real-time, one or more updated recommendations based on the supplemented environment data using the supplemented environment data and the cognitive computing processes.Type: GrantFiled: September 18, 2017Date of Patent: June 9, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David B. Kumhyr, John F. Behnken, Louie A. Dickens, Rodolfo Lopez
-
Patent number: 10560844Abstract: In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated with and executable by the processing circuit. The logic is configured to cause the processing circuit to limit functionality of a remote controlled device during periods of time that a user of the remote controlled device is not authenticated, and to receive identity information of the user of the remote controlled device via an authentication process, with the identity information establishing an identity of the user. Also, the logic is configured to cause the processing circuit to authenticate the user prior to allowing full functionality of the remote controlled device, send an indication of the identity of the user to the remote controlled device, and provide full functionality of the remote controlled device to the user in response to successfully authenticating the user.Type: GrantFiled: March 15, 2017Date of Patent: February 11, 2020Assignee: International Business Machines CorporationInventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John Melchionne, David K. Wright
-
Patent number: 10554680Abstract: A first collection including an analytical feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one of vectors of the second collection with a corresponding vector of a fourth collection, migrating at least one of the vectors of the second collection with a corresponding vector of a fifth collection. Using a forecasting configuration, an analytical feature vector of the third collection is aged to generate a changed analytical feature vector containing analytical feature values expected at a future time. The changed analytical feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.Type: GrantFiled: March 7, 2018Date of Patent: February 4, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
-
Publication number: 20190378599Abstract: A method for implementing a secure system to prevent adverse drug interactions and repeat prescriptions, for a patient, in a multi-party computing environment. The method includes receiving a patient identifier from a provider, authenticating an access by the provider, and retrieving a second patient identifier, wherein the second patient identifier corresponds to the received patient identifier, wherein the received patient identifier and the second patient identifier are different. The method further includes receiving an input from the provider that corresponds to the patient identifier, and accessing a database that contains a stored private ID, wherein the stored private ID is a combination of the received patient identifier and the retrieved second patient identifier, and wherein the database includes data relating to the patient. The method includes searching the database to obtain a search result based on the received input from the provider, and transmitting the search result to the provider.Type: ApplicationFiled: June 8, 2018Publication date: December 12, 2019Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John L. Melchionne, David K. Wright
-
Publication number: 20190373468Abstract: In one embodiment, a method includes limiting functionality of a remote controlled device during a first period of time where a user of the remote controlled device is not authenticated, receiving, from a separate authentication device, identity information of the user of the remote controlled device and information of the remote controlled device via an authentication process, authenticating the user prior to allowing full functionality of the remote controlled device, sending an indication of the identity of the user to the remote controlled device; and in response to determining during the authenticating that the user is verified as a trainee for the remote controlled device, enabling a trainer/trainee setting that allows a trainer to provide control of the remote controlled device to the trainee without functionality of the remote controlled device being limited.Type: ApplicationFiled: August 19, 2019Publication date: December 5, 2019Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John Melchionne, David K. Wright
-
Publication number: 20190088114Abstract: An apparatus, method, program product, and system are disclosed for cognitive-based incident response. A sensor module captures baseline environment data related to a traffic incident using one or more sensors at a location of the traffic incident. A recommendation module generates and makes available, in real-time, one or more recommendations for responding to the traffic incident using cognitive computing processes based on the baseline environment data, the one or more recommendations comprising precautionary information for managing one or more emergency situations at the traffic incident. An update module continuously captures new environment data for the traffic incident using the one or more sensors, supplements the baseline environment data with the new environment data, and generates and makes available, in real-time, one or more updated recommendations based on the supplemented environment data using the supplemented environment data and the cognitive computing processes.Type: ApplicationFiled: September 18, 2017Publication date: March 21, 2019Inventors: DAVID B. KUMHYR, JOHN F. BEHNKEN, LOUIE A. DICKENS, RODOLFO LOPEZ
-
Patent number: 10230751Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by migrating, at least one of a vectors of the second collection with a corresponding vector of a fourth collection. The second and the fourth collections have a property distinct from one another. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.Type: GrantFiled: February 9, 2016Date of Patent: March 12, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
-
Publication number: 20180270657Abstract: In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated with and executable by the processing circuit. The logic is configured to cause the processing circuit to limit functionality of a remote controlled device during periods of time that a user of the remote controlled device is not authenticated, and to receive identity information of the user of the remote controlled device via an authentication process, with the identity information establishing an identity of the user. Also, the logic is configured to cause the processing circuit to authenticate the user prior to allowing full functionality of the remote controlled device, send an indication of the identity of the user to the remote controlled device, and provide full functionality of the remote controlled device to the user in response to successfully authenticating the user.Type: ApplicationFiled: March 15, 2017Publication date: September 20, 2018Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John Melchionne, David K. Wright
-
Publication number: 20180198816Abstract: A first collection including an analytical feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one of vectors of the second collection with a corresponding vector of a fourth collection, migrating at least one of the vectors of the second collection with a corresponding vector of a fifth collection. Using a forecasting configuration, an analytical feature vector of the third collection is aged to generate a changed analytical feature vector containing analytical feature values expected at a future time. The changed analytical feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.Type: ApplicationFiled: March 7, 2018Publication date: July 12, 2018Applicant: International Business Machines CorporationInventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
-
Patent number: 10015190Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over a feature vectors of the second collection with a corresponding feature vector of a fourth collection. The second and the fourth collections have a property similar to one another. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.Type: GrantFiled: November 16, 2017Date of Patent: July 3, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
-
Patent number: 9998491Abstract: A first collection including a pattern of life (POL) feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by combining a vector of the second collection with a corresponding vector of a different collection. Using a forecasting configuration, a POL feature vector of the third collection is aged to generate a changed POL feature vector containing POL feature values expected at a future time. The changed POL feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.Type: GrantFiled: November 16, 2017Date of Patent: June 12, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
-
Patent number: 9948666Abstract: A first collection including an analytical feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one of vectors of the second collection with a corresponding vector of a fourth collection, migrating at least one of the vectors of the second collection with a corresponding vector of a fifth collection. Using a forecasting configuration, an analytical feature vector of the third collection is aged to generate a changed analytical feature vector containing analytical feature values expected at a future time. The changed analytical feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.Type: GrantFiled: February 9, 2016Date of Patent: April 17, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
-
Publication number: 20180084004Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over a feature vectors of the second collection with a corresponding feature vector of a fourth collection. The second and the fourth collections have a property similar to one another. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.Type: ApplicationFiled: November 16, 2017Publication date: March 22, 2018Applicant: International Business Machines CorporationInventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
-
Publication number: 20180077191Abstract: A first collection including a pattern of life (POL) feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by combining a vector of the second collection with a corresponding vector of a different collection. Using a forecasting configuration, a POL feature vector of the third collection is aged to generate a changed POL feature vector containing POL feature values expected at a future time. The changed POL feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.Type: ApplicationFiled: November 16, 2017Publication date: March 15, 2018Applicant: International Business Machines CorporationInventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
-
Patent number: 9906551Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one of vectors of the second collection with a corresponding vector of a fourth collection. The second and the fourth collections have a property similar to one another. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.Type: GrantFiled: February 9, 2016Date of Patent: February 27, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
-
Patent number: 9900338Abstract: A first collection including a pattern of life (POL) feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one of vectors of the second collection with a corresponding vector of a fourth collection, migrating at least one of the vectors of the second collection with a corresponding vector of a fifth collection. Using a forecasting configuration, a POL feature vector of the third collection is aged to generate a changed POL feature vector containing POL feature values expected at a future time. The changed POL feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.Type: GrantFiled: February 9, 2016Date of Patent: February 20, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
-
Patent number: 9866580Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one the vectors of the second collection with a corresponding vector of a fourth collection, migrating at least one of the vectors of the second collection with a corresponding vector of a fifth collection, or both. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.Type: GrantFiled: February 9, 2016Date of Patent: January 9, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
-
Publication number: 20170230399Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by migrating, at least one of a vectors of the second collection with a corresponding vector of a fourth collection. The second and the fourth collections have a property distinct from one another. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.Type: ApplicationFiled: February 9, 2016Publication date: August 10, 2017Applicant: International Business Machines CorporationInventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati