Patents by Inventor Michael Hanley
Michael Hanley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12010513Abstract: Systems and methods are provided that include: accessing implicit authentication data from a possession factor associated with an authorized user; at the possession factor or at an authentication platform: generating a possession confidence level using the implicit authentication data, the possession confidence level being one of a plurality of possession confidence levels, the possession confidence level indicating a likelihood that the possession factor is possessed by the authorized user; identifying, among a plurality of varying authentication requirements, an authentication requirement for the transaction based on the possession confidence level, the authentication requirement defines a process or action to prove authority to perform the transaction or a process or action to prove an identity of a user attempting to perform the transaction; and implementing the authentication requirement for the transaction.Type: GrantFiled: May 28, 2020Date of Patent: June 11, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Michael Hanley, Jon Oberheide
-
Patent number: 11902302Abstract: System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.Type: GrantFiled: August 30, 2021Date of Patent: February 13, 2024Assignee: KnowBe4, Inc.Inventors: Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
-
Publication number: 20240048560Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: ApplicationFiled: September 28, 2023Publication date: February 8, 2024Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Patent number: 11831642Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: GrantFiled: April 20, 2021Date of Patent: November 28, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Patent number: 11529363Abstract: Provided herein are methods for treating cancers (e.g., inflammatory myofibroblastic tumor, anaplastic large cell lymphoma, and neuroblastoma) in pediatric patients using brigatinib, as monotherapy or combination therapy with one or more second therapeutic agents.Type: GrantFiled: March 18, 2019Date of Patent: December 20, 2022Inventors: Sharon Bowen, Michael Hanley, David Kerstein, Karthik Venkatakrishnan
-
Patent number: 11230467Abstract: A detection device for detecting that a source is sold-out for a beverage dispenser, the beverage dispenser dispensing from the source via a valve controlled by a solenoid. A circuit board is configured to be positioned on the valve proximal to the solenoid. A detector is coupled to the circuit board, where the solenoid creates a magnetic field when dispensing from the valve, and where the detector detects the magnetic field created by the solenoid and consequently produces an electrical output. A control system is coupled to the circuit board in communication with the detector. The control system is configured to access threshold data and to compare the electrical output of the detector to the threshold data. The control system indicates that the source is sold-out based upon the comparison of the electrical output to the threshold data.Type: GrantFiled: November 3, 2020Date of Patent: January 25, 2022Assignee: Marmon Foodservice Technologies, Inc.Inventors: Daniel Prochaska, E. Scott Sevcik, Michael Hanley, David K. Njaastad
-
Publication number: 20210392149Abstract: System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.Type: ApplicationFiled: August 30, 2021Publication date: December 16, 2021Inventors: Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
-
Patent number: 11108791Abstract: System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.Type: GrantFiled: August 11, 2020Date of Patent: August 31, 2021Assignee: KnowBe4, Inc.Inventors: Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
-
Publication number: 20210258307Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: ApplicationFiled: April 20, 2021Publication date: August 19, 2021Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Patent number: 11019057Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: GrantFiled: January 14, 2020Date of Patent: May 25, 2021Assignee: DUO SECURITY, INC.Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Publication number: 20210130149Abstract: A detection device for detecting that a source is sold-out for a beverage dispenser, the beverage dispenser dispensing from the source via a valve controlled by a solenoid. A circuit board is configured to be positioned on the valve proximal to the solenoid. A detector is coupled to the circuit board, where the solenoid creates a magnetic field when dispensing from the valve, and where the detector detects the magnetic field created by the solenoid and consequently produces an electrical output. A control system is coupled to the circuit board in communication with the detector. The control system is configured to access threshold data and to compare the electrical output of the detector to the threshold data. The control system indicates that the source is sold-out based upon the comparison of the electrical output to the threshold data.Type: ApplicationFiled: November 3, 2020Publication date: May 6, 2021Applicant: Cornelius, Inc.Inventors: Daniel Prochaska, E. Scott Sevcik, Michael Hanley, David K. Njaastad
-
Publication number: 20210047427Abstract: Methods of administering isolated anti-CD38 antibodies subcutaneously are disclosed. The methods provide an effective treatment for autoimmune diseases and cancers, including hematologic diseases. Also disclosed are unit dosage forms for the anti-CD38 antibodies.Type: ApplicationFiled: March 27, 2019Publication date: February 18, 2021Inventors: Eric Fedyk, Michael Hanley, Antonio Palumbo
-
Publication number: 20210000845Abstract: Provided herein are methods for treating cancers (e.g., inflammatory myofibroblastic tumor, anaplastic large cell lymphoma, and neuroblastoma) in pediatric patients using brigatinib, as monotherapy or combination therapy with one or more second therapeutic agents.Type: ApplicationFiled: March 18, 2019Publication date: January 7, 2021Inventors: Sharon Bowen, Michael Hanley, David Kerstein, Karthik Venkatakrishnan
-
Publication number: 20200374303Abstract: System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.Type: ApplicationFiled: August 11, 2020Publication date: November 26, 2020Inventors: Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
-
Patent number: 10812507Abstract: System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.Type: GrantFiled: April 19, 2019Date of Patent: October 20, 2020Assignee: KnowBe4, Inc.Inventors: Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
-
Publication number: 20200288315Abstract: Systems and methods are provided that include: accessing implicit authentication data from a possession factor associated with an authorized user; at the possession factor or at an authentication platform: generating a possession confidence level using the implicit authentication data, the possession confidence level being one of a plurality of possession confidence levels, the possession confidence level indicating a likelihood that the possession factor is possessed by the authorized user; identifying, among a plurality of varying authentication requirements, an authentication requirement for the transaction based on the possession confidence level, the authentication requirement defines a process or action to prove authority to perform the transaction or a process or action to prove an identity of a user attempting to perform the transaction; and implementing the authentication requirement for the transaction.Type: ApplicationFiled: May 28, 2020Publication date: September 10, 2020Inventors: Michael Hanley, Jon Oberheide
-
Patent number: 10708776Abstract: Systems and methods are provided that include: accessing implicit authentication data from a possession factor associated with an authorized user; at the possession factor or at an authentication platform: generating a possession confidence level using the implicit authentication data, the possession confidence level being one of a plurality of possession confidence levels, the possession confidence level indicating a likelihood that the possession factor is possessed by the authorized user; identifying, among a plurality of varying authentication requirements, an authentication requirement for the transaction based on the possession confidence level, the authentication requirement defines a process or action to prove authority to perform the transaction or a process or action to prove an identity of a user attempting to perform the transaction; and implementing the authentication requirement for the transaction.Type: GrantFiled: September 18, 2017Date of Patent: July 7, 2020Inventors: Michael Hanley, Jon Oberheide
-
Publication number: 20200204550Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: ApplicationFiled: January 14, 2020Publication date: June 25, 2020Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Publication number: 20200195664Abstract: System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.Type: ApplicationFiled: April 19, 2019Publication date: June 18, 2020Inventors: Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
-
Patent number: 10594692Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: GrantFiled: May 18, 2018Date of Patent: March 17, 2020Assignee: Duo Security, Inc.Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay