Patents by Inventor Steven Noel

Steven Noel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12051107
    Abstract: A method for presenting pre-approved and pre-underwritten offers to a customer may include: receiving targeting criteria based on at least one of current accounts with the financial institution, assets, creditworthiness, and credit risk for an offer for a financial product; identifying a target population of customers for the offer by applying the targeting criteria to a population of customers; reviewing each customer in the target population for underwriting for the financial product based on inferred income for each customer and accounts that each customer has with the financial institution, wherein the underwriting is performed before the financial product is offered; determining a channel to present the offer to one of the customers that passed underwriting; communicating the offer to the customer over the selected channel; and providing an accepted offer to a fulfilment engine, wherein the fulfilment engine initiates an account opening for the financial product.
    Type: Grant
    Filed: March 17, 2023
    Date of Patent: July 30, 2024
    Assignee: JPMORGAN CHASE BANK , N.A.
    Inventors: W. David Thomas, Claimonte Nelson, Dennis Bowers, Michael S. Hartman, Steven Noel Roth, Jagan Devisetty, Nagesh Chalasani, Jason J. Kim, Marianna Dulkina, Suzanne Dimant, Vakul Garg, Ajit Nalla, Daniel A. Haas, James Hennessey, Keith Reichenbach, Richard S. Bunke, Seth Goldkrantz, Stephani L. Breault, Steven Aller, Vidyasankar Narayanan, Wade A. Stratton, Margaret F. Evans, Kapil Bansal
  • Publication number: 20230222580
    Abstract: A method for presenting pre-approved and pre-underwritten offers to a customer may include: receiving targeting criteria based on at least one of current accounts with the financial institution, assets, creditworthiness, and credit risk for an offer for a financial product; identifying a target population of customers for the offer by applying the targeting criteria to a population of customers; reviewing each customer in the target population for underwriting for the financial product based on inferred income for each customer and accounts that each customer has with the financial institution, wherein the underwriting is performed before the financial product is offered; determining a channel to present the offer to one of the customers that passed underwriting; communicating the offer to the customer over the selected channel; and providing an accepted offer to a fulfilment engine, wherein the fulfilment engine initiates an account opening for the financial product.
    Type: Application
    Filed: March 17, 2023
    Publication date: July 13, 2023
    Inventors: W. David THOMAS, Claimonte NELSON, Dennis BOWERS, Michael S. HARTMAN, Steven Noel ROTH, Jagan DEVISETTY, Nagesh CHALASANI, Jason J. KIM, Marianna DULKINA, Suzanne DIMANT, Vakul GARG, Ajit NALLA, Daniel A. HAAS, James HENNESSEY, Keith REICHENBACH, Richard S. BUNKE, Seth GOLDKRANTZ, Stephani L. BREAULT, Steven ALLER, Vidyasankar NARAYANAN, Wade A. STRATTON, Margaret F. EVANS, Kapil BANSAL
  • Patent number: 11615467
    Abstract: A method for presenting pre-approved and pre-underwritten offers to a customer may include: receiving targeting criteria based on at least one of current accounts with the financial institution, assets, creditworthiness, and credit risk for an offer for a financial product; identifying a target population of customers for the offer by applying the targeting criteria to a population of customers; reviewing each customer in the target population for underwriting for the financial product based on inferred income for each customer and accounts that each customer has with the financial institution, wherein the underwriting is performed before the financial product is offered; determining a channel to present the offer to one of the customers that passed underwriting; communicating the offer to the customer over the selected channel; and providing an accepted offer to a fulfilment engine, wherein the fulfilment engine initiates an account opening for the financial product.
    Type: Grant
    Filed: June 18, 2020
    Date of Patent: March 28, 2023
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: W. David Thomas, Claimonte Nelson, Dennis Bowers, Michael S. Hartman, Steven Noel Roth, Jagan Devisetty, Nagesh Chalasani, Jason J. Kim, Marianna Dulkina, Suzanne Dimant, Vakul Garg, Ajit Nalla, Daniel A. Haas, James Hennessey, Keith Reichenbach, Richard S. Bunke, Seth Goldkrantz, Stephani L. Breault, Steven Aller, Vidyasankar Narayanan, Wade A. Stratton, Margaret F. Evans, Kapil Bansal
  • Publication number: 20200402162
    Abstract: A method for presenting pre-approved and pre-underwritten offers to a customer may include: receiving targeting criteria based on at least one of current accounts with the financial institution, assets, creditworthiness, and credit risk for an offer for a financial product; identifying a target population of customers for the offer by applying the targeting criteria to a population of customers; reviewing each customer in the target population for underwriting for the financial product based on inferred income for each customer and accounts that each customer has with the financial institution, wherein the underwriting is performed before the financial product is offered; determining a channel to present the offer to one of the customers that passed underwriting; communicating the offer to the customer over the selected channel; and providing an accepted offer to a fulfilment engine, wherein the fulfilment engine initiates an account opening for the financial product.
    Type: Application
    Filed: June 18, 2020
    Publication date: December 24, 2020
    Inventors: W. David THOMAS, Claimonte NELSON, Dennis BOWERS, Michael S. HARTMAN, Steven Noel ROTH, Jagan DEVISETTY, Nagesh CHALASANI, Jason J. KIM, Marianna DULKINA, Suzanne DIMANT, Vakul GARG, Ajit NALLA, Daniel A. HAAS, James HENNESSEY, Keith REICHENBACH, Richard S. BUNKE, Seth GOLDKRANTZ, Stephani L. BREAULT, Steven ALLER, Vidyasankar NARAYANAN, Wade A. STRATTON, Maggie Evans
  • Patent number: 10313382
    Abstract: A system and method for implementing a graph database to analyze and monitor a status of an enterprise computer network is provided. In one example, a plurality of sensors can be inputted into sensor interface in which all of the data associated with the sensors in converted into a common data format. The data can be parsed into a data model that contains nodes and edges in order to generate a graph database model that can allow a network analyst to analyze the real-time status of a computer network. The graph database model can include multiple layers including an infrastructure layer, a cyber threats layer, a cyber posture layer, and a mission readiness layer. The graph database model can also be queried by a user using a domain-specific query language, so as to provide a user-friendly syntax in generating queries.
    Type: Grant
    Filed: March 29, 2016
    Date of Patent: June 4, 2019
    Assignee: The MITRE Corporation
    Inventors: Steven Noel, Eric Harley, Kam Him Tam, Michael Limiero, Matthew Share
  • Patent number: 9830339
    Abstract: A data processing system for processing data related to incoming interactions. The data processing system comprises a first configuration object defining a set of metrics; a second configuration object defining a number of aggregation primitives, by analyzing requirements of the set of metrics; a first processing unit adapted for receiving data related to incoming interactions, and adapted for real time calculation of at least one aggregation primitive based on this data taking into account the second configuration object; a data storage element for storing the calculated at least one aggregation primitive without storing raw data related to the incoming interactions; a second processing unit adapted for calculating one or more metrics based on the stored at least one aggregation primitive taking into account the first and the second configuration object.
    Type: Grant
    Filed: May 4, 2015
    Date of Patent: November 28, 2017
    Assignee: NGDATA PRODUCTS NV
    Inventors: Steven Noels, Luc Burgelman, Frank Hamerlinck
  • Publication number: 20170289187
    Abstract: A system and method for implementing a graph database to analyze and monitor a status of an enterprise computer network is provided. In one example, a plurality of sensors can be inputted into sensor interface in which all of the data associated with the sensors in converted into a common data format. The data can be parsed into a data model that contains nodes and edges in order to generate a graph database model that can allow a network analyst to analyze the real-time status of a computer network. The graph database model can include multiple layers including an infrastructure layer, a cyber threats layer, a cyber posture layer, and a mission readiness layer. The graph database model can also be queried by a user using a domain-specific query language, so as to provide a user-friendly syntax in generating queries.
    Type: Application
    Filed: March 29, 2016
    Publication date: October 5, 2017
    Applicant: The MITRE Corporation
    Inventors: Steven NOEL, Eric HARLEY, Kam Him TAM, Michael LIMIERO, Matthew SHARE
  • Publication number: 20160328422
    Abstract: A data processing system for processing data related to incoming interactions. The data processing system comprises a first configuration object defining a set of metrics; a second configuration object defining a number of aggregation primitives, by analyzing requirements of the set of metrics; a first processing unit adapted for receiving data related to incoming interactions, and adapted for real time calculation of at least one aggregation primitive based on this data taking into account the second configuration object; a data storage element for storing the calculated at least one aggregation primitive without storing raw data related to the incoming interactions; a second processing unit adapted for calculating one or more metrics based on the stored at least one aggregation primitive taking into account the first and the second configuration object.
    Type: Application
    Filed: May 4, 2015
    Publication date: November 10, 2016
    Inventors: Steven NOELS, Luc BURGELMAN, Frank HAMERLINCK
  • Patent number: 9325729
    Abstract: Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.
    Type: Grant
    Filed: July 7, 2014
    Date of Patent: April 26, 2016
    Assignees: George Mason Research Foundation, Inc., The United States of America, as represented by the Secretary of Commerce, The National Institute of Standards and Technology
    Inventors: Sushil Jajodia, Lingyu Wang, Steven Noel, Anoop Singhal
  • Patent number: 9203861
    Abstract: A system and method for determining at least one hardening strategy to prevent at least one attack, comprising: performing processing associated with obtaining at least one attack graph, the at least one attack graph comprising at least one goal condition, at least one initial condition, and at least one exploit; performing processing associated with obtaining at least one allowable action that disables the at least one initial condition; performing processing associated with obtaining costs associated with the at least one allowable action; and performing processing associated with utilizing the at least one allowable action to determine at least one recommended strategy from the at least one allowable action taking into account the costs.
    Type: Grant
    Filed: June 21, 2013
    Date of Patent: December 1, 2015
    Assignee: GEORGE MASON UNIVERSITY
    Inventors: Massimiliano Albanese, Sushil Jajodia, Steven Noel
  • Patent number: 8918884
    Abstract: Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.
    Type: Grant
    Filed: January 11, 2012
    Date of Patent: December 23, 2014
    Assignees: The United States of America, as represented by the Secretary of Commerce, The National Institute of Standards and Technology, George Mason Intellectual Properties, Inc.
    Inventors: Sushil Jajodia, Lingyu Wang, Steven Noel, Anoop Singhal
  • Publication number: 20140325660
    Abstract: Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.
    Type: Application
    Filed: July 7, 2014
    Publication date: October 30, 2014
    Inventors: Sushil JAJODIA, Lingyu WANG, Steven NOEL, Anoop SINGHAL
  • Patent number: 8855972
    Abstract: The manufacture and installation of heat trace systems, particularly cables, are controlled from comprehensive controls in the design and management of the heat trace systems.
    Type: Grant
    Filed: October 23, 2008
    Date of Patent: October 7, 2014
    Assignee: Pentair Thermal Management LLC
    Inventors: Neil Bourgeois, Elson Castillo, Xiaorong Deng, Michael H. Easley, Rodney E. Gilmour, Mitchell A. Todd, Cara J. Hensley, Bruno Guinand, Steven Noel, Donald L. Hunter, Brent Podruzny, Willem P. Westerhuijs
  • Publication number: 20140173740
    Abstract: A system and method for determining at least one hardening strategy to prevent at least one attack, comprising: performing processing associated with obtaining at least one attack graph, the at least one attack graph comprising at least one goal condition, at least one initial condition, and at least one exploit; performing processing associated with obtaining at least one allowable action that disables the at least one initial condition; performing processing associated with obtaining costs associated with the at least one allowable action; and performing processing associated with utilizing the at least one allowable action to determine at least one recommended strategy from the at least one allowable action taking into account the costs.
    Type: Application
    Filed: June 21, 2013
    Publication date: June 19, 2014
    Inventors: MASSIMILIANO ALBANESE, SUSHIL JAJODIA, STEVEN NOEL
  • Publication number: 20120233699
    Abstract: Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.
    Type: Application
    Filed: January 11, 2012
    Publication date: September 13, 2012
    Inventors: Sushil JAJODIA, Lingyu Wang, Steven Noel, Anoop Singhal
  • Publication number: 20120109588
    Abstract: The manufacture and installation of heat trace systems, particularly cables, are controlled from comprehensive controls in the design and management of the heat trace systems.
    Type: Application
    Filed: October 23, 2008
    Publication date: May 3, 2012
    Applicant: TYCO THERMAL CONTROLS LLC
    Inventors: Neil Bourgeois, Elson Castillo, Xiaorong Deng, MIchael Easley, Rodney Gilmour, Mitchell Todd, Cara Hensley, Bruno Guinand, Steven Noel, Donald Hunter, Brent Podruzny, Willem Westerhuijs
  • Patent number: 7917339
    Abstract: Heat trace system design is disclosed. In some embodiments, pipe system data including data associated with pipe system components is received, and in response to receiving a selection of a pipe system component, data associated with a set of one or more pipe system components including the selected pipe system component is automatically extracted from the received pipe system data. One or more heat trace system components for the set of pipe system components are determined based at least in part on the extracted data.
    Type: Grant
    Filed: November 5, 2007
    Date of Patent: March 29, 2011
    Assignee: Tyco Thermal Controls LLC
    Inventors: Neil Bourgeois, Elson Castillo, Xiaorong Deng, Michael H. Easley, Rodney E. Gilmour, Donald Lee Hunter, Steven Noel, Brent Steven Podruzny, Mitchell A. Todd, Willem Philip Westerhuijs
  • Publication number: 20090119073
    Abstract: Heat trace system design is disclosed. In some embodiments, pipe system data including data associated with pipe system components is received, and in response to receiving a selection of a pipe system component, data associated with a set of one or more pipe system components including the selected pipe system component is automatically extracted from the received pipe system data. One or more heat trace system components for the set of pipe system components are determined based at least in part on the extracted data.
    Type: Application
    Filed: November 5, 2007
    Publication date: May 7, 2009
    Inventors: Neil Bourgeois, Elson Castillo, Xiaorong Deng, Michael H. Easley, Rodney E. Gilmour, Donald Lee Hunter, Steven Noel, Brent Steven Podruzny, Mitchell A. Todd, Willem Philip Westerhuijs
  • Publication number: 20080086450
    Abstract: Interfaces, systems and methods for searching a plurality of electronic databases, including patent databases. Downloaded database records can be adapted to a common format that includes hyperlinks to respective databases. Software for manipulating one or more of the database records is accessed via a chordal interface, wherein selection of individual software buttons and concurrent selection of two or more software buttons in a two-dimensional array of buttons is interpreted contextually.
    Type: Application
    Filed: October 4, 2006
    Publication date: April 10, 2008
    Inventor: Steven Noel Bittenson
  • Publication number: 20060085858
    Abstract: Disclosed is a network hardening mechanism. The mechanism: generates a dependency graph from a multitude of exploits; constructs a goal conditions expression which may then be used to determine set(s) of safe network configurations. A subset of these safe network configuration sets may then be selected for implementation using hardening costs as a criterion.
    Type: Application
    Filed: October 17, 2005
    Publication date: April 20, 2006
    Inventors: Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs