Patents by Inventor JOSHUA F. PAYNE

JOSHUA F. PAYNE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220309179
    Abstract: A computer implemented method and related apparatus defend a system against adversarial queries. An enforcement graph is provided and used to enforce data policies for a system. A generative adversarial model (GAN) is used for querying the enforcement graph to detect a potential adversarial query-based attack against the enforcement graph A policy is provided to protect the enforcement graph against the potential adversarial attack.
    Type: Application
    Filed: March 24, 2021
    Publication date: September 29, 2022
    Inventors: Joshua F. PAYNE, Ashish KUNDU, Arjun NATARAJAN
  • Publication number: 20220309155
    Abstract: An apparatus and related method defend against adversarial queries. A policy enforcement hypergraph is constructed to express a set of security policies. Then, the hypergraph is repeatedly traversed to determine whether a user behavior is changing over time. The user behavior is measured by reference to a vertex or an edge in the hypergraph. If it is determined that the user behavior has changed over time an enforcement action is taken based on a security policy.
    Type: Application
    Filed: March 24, 2021
    Publication date: September 29, 2022
    Inventors: Joshua F. PAYNE, Ashish KUNDU, Arjun NATARAJAN, Roger C. RAPHAEL, Scott SCHUMACHER
  • Publication number: 20200366716
    Abstract: A method provides a network-agnostic identity broker for retrieving identity records across heterogeneous identity networks. An identity broker receives a client request from a client to retrieve and evaluate user identity information for confirming an identity of a particular entity. The identity broker utilizes a group membership of the client to select a set of policies for handling the client request, and selects an identity network from multiple heterogeneous identity networks as a selected identity network to which the client request is to be sent. The identity broker sends the client request to the selected identity network, and then receives a response from the selected identity network. The identity broker evaluates the response according to the set of policies, such that the evaluated response conforms with the set of policies, and transmits the evaluated response to the client.
    Type: Application
    Filed: May 16, 2019
    Publication date: November 19, 2020
    Inventors: KAPIL KUMAR SINGH, JOSHUA F. PAYNE, ASHISH KUNDU, ARJUN NATARAJAN
  • Publication number: 20200364366
    Abstract: A method provides a security action based on identity profile scores. One or more processors represent an identity profile as a knowledge graph. The processor(s) associate a set of changes of the identity profile across a plurality of identity networks with a fraud score. The processor(s) then implement a security action based on the fraud score.
    Type: Application
    Filed: May 15, 2019
    Publication date: November 19, 2020
    Inventors: ASHISH KUNDU, ARJUN NATARAJAN, KAPIL KUMAR SINGH, JOSHUA F. PAYNE
  • Publication number: 20200358662
    Abstract: A method routes an identity query to a particular identity network. An identity broker determines that a candidate identity network is associated with a confidence score that satisfies predetermined criteria. Responsive to determining that the candidate identity network is associated with the confidence score that satisfies the predetermined criteria, the identity broker onboards the candidate identity network into a set of identity networks services, and then routes an identity query for an identity to the candidate identity network that satisfies the predetermined criteria.
    Type: Application
    Filed: May 9, 2019
    Publication date: November 12, 2020
    Inventors: ASHISH KUNDU, JOSHUA F. PAYNE, KAPIL KUMAR SINGH, ARJUN NATARAJAN
  • Publication number: 20200358796
    Abstract: A deep-learning based method evaluates similarities of entities in decentralized identity graphs. One or more processors represent a first identity profile as a first identity graph and a second identity profile as a second identity graph. The processor(s) compare the first identity graph to the second identity graph, which are decentralized identity graphs from different identity networks, in order to determine a similarity score between the first identity profile and the second identity profile. The processor(s) then implement a security action based on the similarity score.
    Type: Application
    Filed: May 10, 2019
    Publication date: November 12, 2020
    Inventors: ASHISH KUNDU, ARJUN NATARAJAN, KAPIL KUMAR SINGH, JOSHUA F. PAYNE