Patents by Inventor Michael Robert Young

Michael Robert Young has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200396240
    Abstract: Information technology/cyber security for computer-related processes in which vulnerabilities are identified and, those vulnerabilities which are technology-related are automatically remediated by determining and executing network-based tasks. The most granular level of computer-related process assessment in made possible by reliance on a critical function/process taxonomy this is automatically generated and, as such, the present invention, identifies both technology and non-technology-related vulnerabilities.
    Type: Application
    Filed: June 13, 2019
    Publication date: December 17, 2020
    Inventors: Casey L. Flaherty, Michael Sbandi, Jo-Ann Taylor, Michael Robert Young, Zarna Arun Patel
  • Publication number: 20200396210
    Abstract: An apparatus includes a memory and a hardware processor. The memory stores identification information of a user. The processor receives from a device a request for the identification information of the user and in response to the request, appends a data element to the identification information to produce a protected message. The processor also encrypts the protected message to produce an encrypted message and communicates the encrypted message to the device. The data element executes in response to the encrypted message being decrypted, and the data element encrypts the identification information when the data element executes.
    Type: Application
    Filed: June 11, 2019
    Publication date: December 17, 2020
    Inventors: Jo-Ann Taylor, Manu Jacob Kurian, Michael Robert Young
  • Publication number: 20200349296
    Abstract: A system for real-time authenticated obfuscation of electronic data provides real-time visual obfuscation of the data by transforming displayed data into undecipherable data when viewed by an unauthorized user while maintaining access for an authorized user. The system may further provide application-level obfuscation of electronic data via cryptographic keys such that only authorized applications may decrypt the encrypted data. In this way, the system provides secure access control of electronic data within a networked environment.
    Type: Application
    Filed: May 2, 2019
    Publication date: November 5, 2020
    Applicant: Bank of America Corporation
    Inventors: Michael Robert Young, Manu Jacob Kurian, Jo-Ann Taylor
  • Publication number: 20200334345
    Abstract: Arrangements for automatically authenticating a user based on a signals-based footprint of the user are provided. In some examples, an authentication device may continuously scan a predefined area surrounding the authentication device. Upon detecting a user device, a determination may be made as to whether the device is detected for at least a threshold amount of time. If so, user data may be requested. In some examples, the user data may be requested from, for example, a mobile device of a user and may include biometric signature data, such as heart rate, respiratory rate, blood pressure, and the like. User response data may be received and compared to pre-stored data and, if the user response data meets or exceeds a threshold confidence level, the user may be automatically authenticated. If not, additional user authentication information, such as a username and password, personal identification number (PIN), or the like, may be requested to authenticate the user.
    Type: Application
    Filed: April 22, 2019
    Publication date: October 22, 2020
    Inventor: Michael Robert Young
  • Publication number: 20190372999
    Abstract: Systems for analyzing and controlling cyber events are provided. In some examples, indicator or compromise (IOC) data may be received. The system may parse the data to identify one or more IOC parameters within the IOC data. In some examples, the IOC parameters may be compared to known IOC parameters to determine whether the IOC parameters are known. If not, the newly identified IOC parameters may be stored in a database. The identified IOC parameters may be evaluated to identify one or more linkages associated with the IOC parameters. For instance, each IOC parameters may be evaluated to identify one or more other parameters associated with each parameter. Those linkages may indicate a threat or potential threat. Based on the evaluation, the system may generate, update and/or execute one or more blocks. For instance, access to one or more domain name, email address, or the like, may be locked based on the identified IOC parameters, linkages, and the like.
    Type: Application
    Filed: May 30, 2018
    Publication date: December 5, 2019
    Inventors: Michael Robert Young, Alexander Hutton