Patents by Inventor Michael Evan Wendt
Michael Evan Wendt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11693667Abstract: Systems and methods are provided for efficiently performing processing intensive operations, such as those involving large volumes of data, that enable accelerated processing time of these operations. In at least one embodiment, a system includes a graphics processor unit (GPU) including a memory and a plurality of cores. The plurality of cores perform a plurality of data analytics operations on a respectively allocated portion of a dataset, each of the plurality of cores using only the memory to store data input for each of the plurality of data analytics operations performed by the plurality of cores. The data storage for the plurality of data analytics operations performed by the plurality of cores is also provided solely by the memory.Type: GrantFiled: March 11, 2022Date of Patent: July 4, 2023Assignee: NVIDIA CorporationInventors: Joshua Patterson, Leeann Chau Tuyet Dang, Keith Jason Kraus, Allan Rabbitt Enemark, Frank Joseph Eaton, Bradley Stuart Rees, Michael Evan Wendt, Mark Jason Harris
-
Publication number: 20220197664Abstract: Systems and methods are provided for efficiently performing processing intensive operations, such as those involving large volumes of data, that enable accelerated processing time of these operations. In at least one embodiment, a system includes a graphics processor unit (GPU) including a memory and a plurality of cores. The plurality of cores perform a plurality of data analytics operations on a respectively allocated portion of a dataset, each of the plurality of cores using only the memory to store data input for each of the plurality of data analytics operations performed by the plurality of cores. The data storage for the plurality of data analytics operations performed by the plurality of cores is also provided solely by the memory.Type: ApplicationFiled: March 11, 2022Publication date: June 23, 2022Inventors: Joshua Patterson, Leeann Chau Tuyet Dang, Keith Jason Kraus, Allan Rabbitt Enemark, Frank Joseph Eaton, Bradley Stuart Rees, Michael Evan Wendt, Mark Jason Harris
-
Patent number: 11323460Abstract: Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters associated with a computer network event in a computing network. The data analysis device produces a graphical model of the computing network based on at least one parameter included in the log data. The data analysis device also identifies a parameter associated with a node of the computer network represented by the graphical model, and performs a time-series analysis on the parameter. The data analysis device further determines, based on the time-series analysis on the parameter, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: GrantFiled: October 30, 2019Date of Patent: May 3, 2022Assignee: Accenture Global Solutions LimitedInventors: Louis William DiValentin, Joshua Patterson, Keith Kraus, Robin Lynn Burkett, Michael Evan Wendt
-
Patent number: 11307863Abstract: Systems and methods are provided for efficiently performing processing intensive operations, such as those involving large volumes of data, that enable accelerated processing time of these operations. In at least one embodiment, a system includes a graphics processor unit (GPU) including a memory and a plurality of cores. The plurality of cores perform a plurality of data analytics operations on a respectively allocated portion of a dataset, each of the plurality of cores using only the memory to store data input for each of the plurality of data analytics operations performed by the plurality of cores. The data storage for the plurality of data analytics operations performed by the plurality of cores is also provided solely by the memory.Type: GrantFiled: October 8, 2019Date of Patent: April 19, 2022Assignee: NVIDIA CorporationInventors: Joshua Patterson, Leeann Chau Tuyet Dang, Keith Jason Kraus, Allan Rabbitt Enemark, Frank Joseph Eaton, Bradley Stuart Rees, Michael Evan Wendt, Mark Jason Harris
-
Patent number: 11212306Abstract: Graph database analysis for network anomaly detection systems, in which a data analysis device receives multiple log data entries including parameters associated with a computer network event in a computing network. The data analysis device extracts one or more parameters in real-time and generates a network event graph based on at least one of a first graph metric or a second graph metric. The first and second graph metrics are based on the one or more extracted parameters. The data analysis device detects, based on queries performed on the network event graph, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: GrantFiled: December 23, 2019Date of Patent: December 28, 2021Assignee: Accenture Global Solutions LimitedInventors: Joshua Patterson, Michael Evan Wendt, Keith Kraus, Louis William DiValentin, Robin Lynn Burkett
-
Publication number: 20200145441Abstract: Graph database analysis for network anomaly detection systems, in which a data analysis device receives multiple log data entries including parameters associated with a computer network event in a computing network. The data analysis device extracts one or more parameters in real-time and generates a network event graph based on at least one of a first graph metric or a second graph metric. The first and second graph metrics are based on the one or more extracted parameters. The data analysis device detects, based on queries performed on the network event graph, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: ApplicationFiled: December 23, 2019Publication date: May 7, 2020Inventors: Joshua Patterson, Michael Evan Wendt, Keith Kraus, Louis William DiValentin, Robin Lynn Burkett
-
Publication number: 20200076836Abstract: Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters associated with a computer network event in a computing network. The data analysis device produces a graphical model of the computing network based on at least one parameter included in the log data. The data analysis device also identifies a parameter associated with a node of the computer network represented by the graphical model, and performs a time-series analysis on the parameter. The data analysis device further determines, based on the time-series analysis on the parameter, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: ApplicationFiled: October 30, 2019Publication date: March 5, 2020Inventors: Louis William DiValentin, Joshua Patterson, Keith Kraus, Robin Lynn Burkett, Michael Evan Wendt
-
Patent number: 10530796Abstract: Graph database analysis for network anomaly detection systems, in which a data analysis device receives multiple log data entries including parameters associated with a computer network event in a computing network. The data analysis device extracts one or more parameters in real-time and generates a network event graph based on at least one of a first graph metric or a second graph metric. The first and second graph metrics are based on the one or more extracted parameters. The data analysis device detects, based on queries performed on the network event graph, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: GrantFiled: September 6, 2017Date of Patent: January 7, 2020Assignee: Accenture Global Solutions LimitedInventors: Joshua Patterson, Michael Evan Wendt, Keith Kraus, Louis William DiValentin, Robin Lynn Burkett
-
Patent number: 10476896Abstract: Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters associated with a computer network event in a computing network. The data analysis device produces a graphical model of the computing network based on at least one parameter included in the log data. The data analysis device also identifies a parameter associated with a node of the computer network represented by the graphical model, and performs a time-series analysis on the parameter. The data analysis device further determines, based on the time-series analysis on the parameter, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: GrantFiled: September 13, 2016Date of Patent: November 12, 2019Assignee: Accenture Global Solutions LimitedInventors: Louis William DiValentin, Joshua Patterson, Keith Kraus, Robin Lynn Burkett, Michael Evan Wendt
-
Publication number: 20180077175Abstract: Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters associated with a computer network event in a computing network. The data analysis device produces a graphical model of the computing network based on at least one parameter included in the log data. The data analysis device also identifies a parameter associated with a node of the computer network represented by the graphical model, and performs a time-series analysis on the parameter. The data analysis device further determines, based on the time-series analysis on the parameter, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: ApplicationFiled: September 13, 2016Publication date: March 15, 2018Inventors: Louis William DiValentin, Joshua Patterson, Keith Kraus, Robin Lynn Burkett, Michael Evan Wendt
-
Publication number: 20180069885Abstract: Graph database analysis for network anomaly detection systems, in which a data analysis device receives multiple log data entries including parameters associated with a computer network event in a computing network. The data analysis device extracts one or more parameters in real-time and generates a network event graph based on at least one of a first graph metric or a second graph metric. The first and second graph metrics are based on the one or more extracted parameters. The data analysis device detects, based on queries performed on the network event graph, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.Type: ApplicationFiled: September 6, 2017Publication date: March 8, 2018Inventors: Joshua Patterson, Michael Evan Wendt, Keith Kraus, Louis William DiValentin, Robin Lynn Burkett