Patents by Inventor John H. Denning

John H. Denning has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11528261
    Abstract: Systems for dynamically detecting and controlling unauthorized events are presented. In some examples, data may be received from one or more computing systems. In some examples, the computing systems may each be associated with an enterprise unit within an enterprise organization. The data may include, in some examples, processed unauthorized activity event data, such as account takeover event data. The data received may be aggregated and analyzed (e.g., using machine learning) to identify potential threats and threat outputs. In some examples, the threat output may include a user interface indicating the threat or potential threat, systems or applications potentially impacted, enterprise units impacted, and the like. Based on the threat output, one or more mitigation actions may be identified and executed. The mitigation actions may include modifying operation of one or more systems, modifying authentication requirements, and the like.
    Type: Grant
    Filed: April 28, 2020
    Date of Patent: December 13, 2022
    Assignee: Bank of America Corporation
    Inventors: Geoffrey George Aslaksen, John H. Denning, Ruchira Ghosh, Russell Scott Nejdl, Jr.
  • Patent number: 11431719
    Abstract: Systems for dynamically evaluating and controlling access to applications and systems are presented. In some examples, registration data may be received. In some examples, unauthorized activity data may be received. The unauthorized activity data may be analyzed to identify one or more vulnerable applications. Users of the one or more vulnerable applications may then be identified. Entitlements for the one or more vulnerable applications may be identified and, in particular, entitlements having privileged access may be identified. Users having entitlements with privileged access may be identified and one or more modified authentication requirements may be implemented.
    Type: Grant
    Filed: June 23, 2020
    Date of Patent: August 30, 2022
    Assignee: Bank of America Corporation
    Inventors: John H. Denning, Ruchira Ghosh, W. Scott Hammet, Levi Weldon Mcvay
  • Publication number: 20210400049
    Abstract: Systems for dynamically evaluating and controlling access to applications and systems are presented. In some examples, registration data may be received. In some examples, unauthorized activity data may be received. The unauthorized activity data may be analyzed to identify one or more vulnerable applications. Users of the one or more vulnerable applications may then be identified. Entitlements for the one or more vulnerable applications may be identified and, in particular, entitlements having privileged access may be identified. Users having entitlements with privileged access may be identified and one or more modified authentication requirements may be implemented.
    Type: Application
    Filed: June 23, 2020
    Publication date: December 23, 2021
    Inventors: John H. Denning, Ruchira Ghosh, W. Scott Hammet, Levi Weldon Mcvay
  • Publication number: 20210336940
    Abstract: Systems for dynamically detecting and controlling unauthorized events are presented. In some examples, data may be received from one or more computing systems. In some examples, the computing systems may each be associated with an enterprise unit within an enterprise organization. The data may include, in some examples, processed unauthorized activity event data, such as account takeover event data. The data received may be aggregated and analyzed (e.g., using machine learning) to identify potential threats and threat outputs. In some examples, the threat output may include a user interface indicating the threat or potential threat, systems or applications potentially impacted, enterprise units impacted, and the like. Based on the threat output, one or more mitigation actions may be identified and executed. The mitigation actions may include modifying operation of one or more systems, modifying authentication requirements, and the like.
    Type: Application
    Filed: April 28, 2020
    Publication date: October 28, 2021
    Inventors: Geoffrey George Aslaksen, John H. Denning, Ruchira Ghosh, Russell Scott Nejdl, JR.