Patents by Inventor Steven D. McKay

Steven D. McKay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11012472
    Abstract: Security rules management mechanisms are provided. A cognitive computing system of the security rules management system ingests natural language content, from one or more corpora, describing features of security attacks, and ingests security event log data from a monitored computing environment. The cognitive computing system processes the natural language content from the one or more corpora and the security event log data to identify attack characteristics applicable to the security event log data. A security rule query engine evaluates existing security rules present in a security rules database to determine if any existing security rule addresses the attack characteristics. In response to the evaluation indicating that no existing security rule addresses the attack characteristics, a security rule generator automatically generates a new security rule based on the attack characteristics, which is then deployed to the monitored computing environment.
    Type: Grant
    Filed: December 5, 2018
    Date of Patent: May 18, 2021
    Assignee: International Business Machines Corporation
    Inventors: Marina Milazzo, Michael Spisak, Carlos Alberto Lopez Chinchilla, Steven D. McKay, Eric Hanratty
  • Patent number: 10771493
    Abstract: A security vulnerability analysis mechanism is provided that ingests content from a plurality of content source computing devices to identify instances of security vulnerability content in the ingested content. The mechanism performs a security trend analysis on the instances of security vulnerability content to identify a relative ranking of security vulnerabilities. The mechanism identifies computing resources of a specified computing infrastructure and a criticality of the computing resources to an operation of the computing infrastructure. The mechanism generates a prioritized listing of security vulnerabilities associated with the computing infrastructure based on the relative ranking of security vulnerabilities and the criticality of the computing resources in the computing infrastructure. The mechanism outputs a notification to a user via a user computing device, indicating the prioritized listing of security vulnerabilities.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: September 8, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael Spisak, Steven D. McKay, Mariya Ali, Rhonda L. Childress, Michelle Rivers, Carlos E. Aguilera
  • Publication number: 20200186569
    Abstract: Security rules management mechanisms are provided. A cognitive computing system of the security rules management system ingests natural language content, from one or more corpora, describing features of security attacks, and ingests security event log data from a monitored computing environment. The cognitive computing system processes the natural language content from the one or more corpora and the security event log data to identify attack characteristics applicable to the security event log data. A security rule query engine evaluates existing security rules present in a security rules database to determine if any existing security rule addresses the attack characteristics. In response to the evaluation indicating that no existing security rule addresses the attack characteristics, a security rule generator automatically generates a new security rule based on the attack characteristics, which is then deployed to the monitored computing environment.
    Type: Application
    Filed: December 5, 2018
    Publication date: June 11, 2020
    Inventors: Marina Milazzo, Michael Spisak, Carlos Alberto Lopez Chinchilla, Steven D. McKay, Eric Hanratty
  • Publication number: 20200092319
    Abstract: A security vulnerability analysis mechanism is provided that ingests content from a plurality of content source computing devices to identify instances of security vulnerability content in the ingested content. The mechanism performs a security trend analysis on the instances of security vulnerability content to identify a relative ranking of security vulnerabilities. The mechanism identifies computing resources of a specified computing infrastructure and a criticality of the computing resources to an operation of the computing infrastructure. The mechanism generates a prioritized listing of security vulnerabilities associated with the computing infrastructure based on the relative ranking of security vulnerabilities and the criticality of the computing resources in the computing infrastructure. The mechanism outputs a notification to a user via a user computing device, indicating the prioritized listing of security vulnerabilities.
    Type: Application
    Filed: September 18, 2018
    Publication date: March 19, 2020
    Inventors: Michael Spisak, Steven D. McKay, Mariya Ali, Rhonda L. Childress, Michelle Rivers, Carlos E. Aguilera
  • Publication number: 20170338018
    Abstract: A table pad assembly includes a first pad section and a second pad section. The first pad section includes a first section lip that has a first magnetic element. The second pad section includes a second section lip that has a second magnetic element. The second section lip overlaps the first section lip when the second pad section is positioned adjacent to the first pad section, and the second magnetic element overlaps the first magnetic element when the second pad section is positioned adjacent to the first pad section, such that the first and second magnetic elements cooperate to releasably couple the first and second pad sections.
    Type: Application
    Filed: May 16, 2017
    Publication date: November 23, 2017
    Inventors: Steven D. McKay, Brenda M. Tracy