Patents by Inventor JOSHUA F. PAYNE
JOSHUA F. PAYNE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11930023Abstract: A deep-learning based method evaluates similarities of entities in decentralized identity graphs. One or more processors represent a first identity profile as a first identity graph and a second identity profile as a second identity graph. The processor(s) compare the first identity graph to the second identity graph, which are decentralized identity graphs from different identity networks, in order to determine a similarity score between the first identity profile and the second identity profile. The processor(s) then implement a security action based on the similarity score.Type: GrantFiled: May 10, 2019Date of Patent: March 12, 2024Assignee: International Business Machines CorporationInventors: Ashish Kundu, Arjun Natarajan, Kapil Kumar Singh, Joshua F. Payne
-
Patent number: 11675980Abstract: A method, computer system, and a computer program product for text bias identification and correction are provided. A first text corpus may be received. A designation of a second text corpus may be received. Words of the first text corpus may be embedded as a first word embedding in an embedding model. The first word embedding may be compared to a second word embedding in the embedding model to identify a first biased text in the first text corpus. The second word embedding may be from the second text corpus. A first replacement text portion may be generated as a substitute for the first biased text. The first replacement text portion may include a first unbiased text. The first biased text and the first replacement text portion may be presented.Type: GrantFiled: December 7, 2020Date of Patent: June 13, 2023Assignee: International Business Machines CorporationInventors: Sanjana Sahayaraj, Alexandre Rademaker, Joshua F. Payne, Ashish Kundu, Arjun Natarajan
-
Patent number: 11647004Abstract: Preserving distributions of data values of a data asset in a data anonymization operation is provided. Anonymizing data values is performed by transforming sensitive data in a set of columns over rows of the data asset while preserving distribution of the data values in the set of transformed columns to a defined degree using a set of autoencoders and loss function. The autoencoders are base trained from preexisting data in a data assets catalog and actively trained during data dissemination. Parametric coefficients of the loss function are configured and the threshold is generated using policies from an enforcement decision for the data asset and data consumer. The loss function value of a selected row is compared to the threshold. Transformed data values of the selected row are transcribed to an output row when the loss function value is greater than the threshold and disseminated to the data consumer.Type: GrantFiled: March 24, 2021Date of Patent: May 9, 2023Assignee: International Business Machines CorporationInventors: Arjun Natarajan, Ashish Kundu, Roger C. Raphael, Aniya Aggarwal, Rajesh M. Desai, Joshua F. Payne, Mu Qiao
-
Publication number: 20230016113Abstract: A processor-implemented method securely responds to a query for information from a data graph. One or more processors create an embedding for encrypted sensitive information in vertices in a data graph; and bucketize embedded encrypted sensitive information on an embedding graph, where bucketizing the embedded encrypted sensitive information clusters vertices from the graph database that have shared data graph features. The processor(s) receive a query of the data graph from a requester, where the query is for information related to the shared data graph features. The processor(s) retrieve a bucket from the embedding graph that contains the information related to the shared data graph features; and extract encrypted sensitive information from the retrieved bucket.Type: ApplicationFiled: July 17, 2021Publication date: January 19, 2023Inventors: Mustafa Canim, Joshua F. Payne
-
Patent number: 11531780Abstract: A method provides a security action based on identity profile scores. One or more processors represent an identity profile as a knowledge graph. The processor(s) associate a set of changes of the identity profile across a plurality of identity networks with a fraud score. The processor(s) then implement a security action based on the fraud score.Type: GrantFiled: May 15, 2019Date of Patent: December 20, 2022Assignee: International Business Machines CorporationInventors: Ashish Kundu, Arjun Natarajan, Kapil Kumar Singh, Joshua F. Payne
-
Publication number: 20220309155Abstract: An apparatus and related method defend against adversarial queries. A policy enforcement hypergraph is constructed to express a set of security policies. Then, the hypergraph is repeatedly traversed to determine whether a user behavior is changing over time. The user behavior is measured by reference to a vertex or an edge in the hypergraph. If it is determined that the user behavior has changed over time an enforcement action is taken based on a security policy.Type: ApplicationFiled: March 24, 2021Publication date: September 29, 2022Inventors: Joshua F. PAYNE, Ashish KUNDU, Arjun NATARAJAN, Roger C. RAPHAEL, Scott SCHUMACHER
-
Publication number: 20220309179Abstract: A computer implemented method and related apparatus defend a system against adversarial queries. An enforcement graph is provided and used to enforce data policies for a system. A generative adversarial model (GAN) is used for querying the enforcement graph to detect a potential adversarial query-based attack against the enforcement graph A policy is provided to protect the enforcement graph against the potential adversarial attack.Type: ApplicationFiled: March 24, 2021Publication date: September 29, 2022Inventors: Joshua F. PAYNE, Ashish KUNDU, Arjun NATARAJAN
-
Publication number: 20220311749Abstract: Preserving distributions of data values of a data asset in a data anonymization operation is provided. Anonymizing data values is performed by transforming sensitive data in a set of columns over rows of the data asset while preserving distribution of the data values in the set of transformed columns to a defined degree using a set of autoencoders and loss function. The autoencoders are base trained from preexisting data in a data assets catalog and actively trained during data dissemination. Parametric coefficients of the loss function are configured and the threshold is generated using policies from an enforcement decision for the data asset and data consumer. The loss function value of a selected row is compared to the threshold. Transformed data values of the selected row are transcribed to an output row when the loss function value is greater than the threshold and disseminated to the data consumer.Type: ApplicationFiled: March 24, 2021Publication date: September 29, 2022Inventors: Arjun Natarajan, ASHISH KUNDU, Roger C. Raphael, Aniya Aggarwal, Rajesh M. Desai, Joshua F. Payne, Mu Qiao
-
Publication number: 20220180068Abstract: A method, computer system, and a computer program product for text bias identification and correction are provided. A first text corpus may be received. A designation of a second text corpus may be received. Words of the first text corpus may be embedded as a first word embedding in an embedding model. The first word embedding may be compared to a second word embedding in the embedding model to identify a first biased text in the first text corpus. The second word embedding may be from the second text corpus. A first replacement text portion may be generated as a substitute for the first biased text. The first replacement text portion may include a first unbiased text. The first biased text and the first replacement text portion may be presented.Type: ApplicationFiled: December 7, 2020Publication date: June 9, 2022Inventors: Sanjana Sahayaraj, Alexandre Rademaker, Joshua F. Payne, Ashish Kundu, Arjun Natarajan
-
Patent number: 11245727Abstract: A method provides a network-agnostic identity broker for retrieving identity records across heterogeneous identity networks. An identity broker receives a client request from a client to retrieve and evaluate user identity information for confirming an identity of a particular entity. The identity broker utilizes a group membership of the client to select a set of policies for handling the client request, and selects an identity network from multiple heterogeneous identity networks as a selected identity network to which the client request is to be sent. The identity broker sends the client request to the selected identity network, and then receives a response from the selected identity network. The identity broker evaluates the response according to the set of policies, such that the evaluated response conforms with the set of policies, and transmits the evaluated response to the client.Type: GrantFiled: May 16, 2019Date of Patent: February 8, 2022Assignee: International Business Machines CorporationInventors: Kapil Kumar Singh, Joshua F. Payne, Ashish Kundu, Arjun Natarajan
-
Patent number: 11095528Abstract: A method routes an identity query to a particular identity network. An identity broker determines that a candidate identity network is associated with a confidence score that satisfies predetermined criteria. Responsive to determining that the candidate identity network is associated with the confidence score that satisfies the predetermined criteria, the identity broker onboards the candidate identity network into a set of identity networks services, and then routes an identity query for an identity to the candidate identity network that satisfies the predetermined criteria.Type: GrantFiled: May 9, 2019Date of Patent: August 17, 2021Assignee: International Business Machines CorporationInventors: Ashish Kundu, Joshua F. Payne, Kapil Kumar Singh, Arjun Natarajan
-
Publication number: 20200366716Abstract: A method provides a network-agnostic identity broker for retrieving identity records across heterogeneous identity networks. An identity broker receives a client request from a client to retrieve and evaluate user identity information for confirming an identity of a particular entity. The identity broker utilizes a group membership of the client to select a set of policies for handling the client request, and selects an identity network from multiple heterogeneous identity networks as a selected identity network to which the client request is to be sent. The identity broker sends the client request to the selected identity network, and then receives a response from the selected identity network. The identity broker evaluates the response according to the set of policies, such that the evaluated response conforms with the set of policies, and transmits the evaluated response to the client.Type: ApplicationFiled: May 16, 2019Publication date: November 19, 2020Inventors: KAPIL KUMAR SINGH, JOSHUA F. PAYNE, ASHISH KUNDU, ARJUN NATARAJAN
-
Publication number: 20200364366Abstract: A method provides a security action based on identity profile scores. One or more processors represent an identity profile as a knowledge graph. The processor(s) associate a set of changes of the identity profile across a plurality of identity networks with a fraud score. The processor(s) then implement a security action based on the fraud score.Type: ApplicationFiled: May 15, 2019Publication date: November 19, 2020Inventors: ASHISH KUNDU, ARJUN NATARAJAN, KAPIL KUMAR SINGH, JOSHUA F. PAYNE
-
Publication number: 20200358662Abstract: A method routes an identity query to a particular identity network. An identity broker determines that a candidate identity network is associated with a confidence score that satisfies predetermined criteria. Responsive to determining that the candidate identity network is associated with the confidence score that satisfies the predetermined criteria, the identity broker onboards the candidate identity network into a set of identity networks services, and then routes an identity query for an identity to the candidate identity network that satisfies the predetermined criteria.Type: ApplicationFiled: May 9, 2019Publication date: November 12, 2020Inventors: ASHISH KUNDU, JOSHUA F. PAYNE, KAPIL KUMAR SINGH, ARJUN NATARAJAN
-
Publication number: 20200358796Abstract: A deep-learning based method evaluates similarities of entities in decentralized identity graphs. One or more processors represent a first identity profile as a first identity graph and a second identity profile as a second identity graph. The processor(s) compare the first identity graph to the second identity graph, which are decentralized identity graphs from different identity networks, in order to determine a similarity score between the first identity profile and the second identity profile. The processor(s) then implement a security action based on the similarity score.Type: ApplicationFiled: May 10, 2019Publication date: November 12, 2020Inventors: ASHISH KUNDU, ARJUN NATARAJAN, KAPIL KUMAR SINGH, JOSHUA F. PAYNE