Patents by Inventor John F. Behnken

John F. Behnken has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170230398
    Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one the vectors of the second collection with a corresponding vector of a fourth collection, migrating at least one of the vectors of the second collection with a corresponding vector of a fifth collection, or both. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Application
    Filed: February 9, 2016
    Publication date: August 10, 2017
    Applicant: International Business Machines Corporation
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Publication number: 20170230400
    Abstract: A first collection including an analytical feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one of vectors of the second collection with a corresponding vector of a fourth collection, migrating at least one of the vectors of the second collection with a corresponding vector of a fifth collection. Using a forecasting configuration, an analytical feature vector of the third collection is aged to generate a changed analytical feature vector containing analytical feature values expected at a future time. The changed analytical feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Application
    Filed: February 9, 2016
    Publication date: August 10, 2017
    Applicant: International Business Machines Corporation
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Publication number: 20170230401
    Abstract: A first collection including a pattern of life (POL) feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one of vectors of the second collection with a corresponding vector of a fourth collection, migrating at least one of the vectors of the second collection with a corresponding vector of a fifth collection. Using a forecasting configuration, a POL feature vector of the third collection is aged to generate a changed POL feature vector containing POL feature values expected at a future time. The changed POL feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Application
    Filed: February 9, 2016
    Publication date: August 10, 2017
    Applicant: International Business Machines Corporation
    Inventors: MOHAMED N. AHMED, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Publication number: 20170230407
    Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one of vectors of the second collection with a corresponding vector of a fourth collection. The second and the fourth collections have a property similar to one another. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.
    Type: Application
    Filed: February 9, 2016
    Publication date: August 10, 2017
    Applicant: International Business Machines Corporation
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
  • Patent number: 9721370
    Abstract: A system, method, and computer-readable medium are disclosed for memorizing a configuration sequence comprising: capturing an image of a device to be configured; recording a configuration sequence of physical movements performed by a user when configuring the device to provide a recorded configuration sequence; overlaying the sequence of physical movements with the image of the device to provide an overlaid image of the configuration sequence; and, storing the sequence of physical movements and the overlaid image of the configuration sequence.
    Type: Grant
    Filed: October 20, 2015
    Date of Patent: August 1, 2017
    Assignee: International Business Machines Corporation
    Inventors: John F. Behnken, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 9641516
    Abstract: A digital certificate incorporated within a communication is received from a server associated with a host name. Resource records associated with the host name are caused to be queried for a list of certificate authorities. In response to causing the resource records to be queried, the list of certificate authorities is received. A certificate authority is identified within the received digital certificate. The identified certificate authority is compared to the received list of certificate authorities. A determination is made, based on the comparison, that the identified certificate authority is included in the received list of certificate authorities.
    Type: Grant
    Filed: July 1, 2015
    Date of Patent: May 2, 2017
    Assignee: International Business Machines Corporation
    Inventors: John F. Behnken, Yaser K. Doleh, Mauro Marzorati
  • Publication number: 20170109913
    Abstract: A system, method, and computer-readable medium are disclosed for memorizing a configuration sequence comprising: capturing an image of a device to be configured; recording a configuration sequence of physical movements performed by a user when configuring the device to provide a recorded configuration sequence; overlaying the sequence of physical movements with the image of the device to provide an overlaid image of the configuration sequence; and, storing the sequence of physical movements and the overlaid image of the configuration sequence.
    Type: Application
    Filed: October 20, 2015
    Publication date: April 20, 2017
    Inventors: John F. Behnken, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Publication number: 20170006023
    Abstract: A digital certificate incorporated within a communication is received from a server associated with a host name. Resource records associated with the host name are caused to be queried for a list of certificate authorities. In response to causing the resource records to be queried, the list of certificate authorities is received. A certificate authority is identified within the received digital certificate. The identified certificate authority is compared to the received list of certificate authorities. A determination is made, based on the comparison, that the identified certificate authority is included in the received list of certificate authorities.
    Type: Application
    Filed: July 1, 2015
    Publication date: January 5, 2017
    Inventors: John F. Behnken, Yaser K. Doleh, Mauro Marzorati
  • Patent number: 9380053
    Abstract: A digital certificate incorporated within a communication is received from a server associated with a host name. Resource records associated with the host name are caused to be queried for a list of certificate authorities. In response to causing the resource records to be queried, the list of certificate authorities is received. A certificate authority is identified within the received digital certificate. The identified certificate authority is compared to the received list of certificate authorities. A determination is made, based on the comparison, that the identified certificate authority is included in the received list of certificate authorities.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: June 28, 2016
    Assignee: International Business Machines Corporation
    Inventors: John F. Behnken, Yaser K. Doleh, Mauro Marzorati