Patents by Inventor Giora Tamir
Giora Tamir has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240031232Abstract: A system includes a processor and memory storing instructions that cause the processor to receive, from a client device, inputs defining associations between one or more control objectives and one more policies, wherein the one or more control objectives define one or more functions to be performed to comply with the one or more policies. The processor may map the one or more policies associated with the one or more control objectives to an application environment and receive, from the client device or a different client device, a change set to an application in the application environment, wherein the change set comprises one or more modifications to the application. The processor may then determine whether the change set adheres to the one or more policies and restrict implementation of the change set in response to determining that the change set does not adhere to the one more policies.Type: ApplicationFiled: July 19, 2022Publication date: January 25, 2024Inventors: Anushree Shrivallabh Randad, Ravindra Bansal, Tamir Segal, Abhi Sekhar Thyadi, Hari Krishna Vutukuru, Samujjwal Bhandari, Utkarsh Jain, Vasant Balasubramanian, Lal Narayanasamy, Giora Tamir, Rama Raghava Reddy Bandi, Prabhat Kuchibhotla
-
Patent number: 11743278Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.Type: GrantFiled: December 15, 2021Date of Patent: August 29, 2023Assignee: ServiceNow, Inc.Inventors: Kurt Joseph Zettel, II, Richard Reybok, Jr., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
-
Patent number: 11575703Abstract: Systems and methods are disclosed for obtaining network security threat information and mitigating threats to improve computing network operations. For example, methods may include receiving a message from a central instance; from outside of a private network, invoking a search of data associated with the private network, wherein the search is based on the message and the search is performed by an agent device within the private network; receiving a search result of the search from the agent device; transmitting the search result to the central instance, wherein the central instance is configured to generate network security threat information based in part on the search result and share the network security threat information with a plurality of customer instances that are associated with a group of customers; and receiving an alert message from the central instance, wherein the alert message includes information that identifies a network security threat.Type: GrantFiled: August 29, 2019Date of Patent: February 7, 2023Assignee: ServiceNow, Inc.Inventors: Richard Reybok, Jr., Kurt Joseph Zettel, II, Phillip Dicorpo, Simon N. Allen, Amit Sharma, Giora Tamir
-
Patent number: 11349877Abstract: Solution management systems and methods are presently disclosed that enable receiving, compiling, and analyzing vendor solutions, determining the vendor solutions that address a target vulnerability of a client network and/or client devices, determining additional vulnerabilities of the client network and/or client devices that the vendor solutions address, and selecting a vendor solution to remediate the target vulnerability. The presently disclosed systems and methods also enable scoring, risk evaluation, and additional metrics to facilitate determining the vendor solution(s) that have the largest impact and/or benefit to the various vulnerabilities of the client network and/or client devices.Type: GrantFiled: August 29, 2019Date of Patent: May 31, 2022Assignee: ServiceNow, Inc.Inventors: Brian James Waplington, David Victor Barkovic, Xuchang Chen, Karthika Gajjala, Giora Tamir
-
Publication number: 20220156063Abstract: Persistent storage may contain: (i) an explicit configuration item table with entries of explicit configuration items representing hardware devices and executable software applications deployed on the hardware devices, (ii) an implicit configuration item table with entries of implicit configuration items representing units of source code, wherein at least some of the executable software applications are compiled versions of the units of source code, and (iii) an implicit relationship table associating pairs of the configuration items.Type: ApplicationFiled: February 3, 2022Publication date: May 19, 2022Inventors: Giora Tamir, Kurt Zettel, Naveen Bojja, Brian James Waplington, Maulik Shah, Thomas Brotherton
-
Publication number: 20220109686Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.Type: ApplicationFiled: December 15, 2021Publication date: April 7, 2022Inventors: Kurt Joseph Zettel, II, Richard Reybok, JR., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
-
Patent number: 11275580Abstract: Persistent storage may contain: (i) an explicit configuration item table with entries of explicit configuration items representing hardware devices and executable software applications deployed on the hardware devices, (ii) an implicit configuration item table with entries of implicit configuration items representing units of source code, wherein at least some of the executable software applications are compiled versions of the units of source code, and (iii) an implicit relationship table associating pairs of the configuration items.Type: GrantFiled: August 12, 2020Date of Patent: March 15, 2022Assignee: ServiceNow, Inc.Inventors: Giora Tamir, Kurt Zettel, Naveen Bojja, Brian James Waplington, Maulik Shah, Thomas Brotherton
-
Publication number: 20220050675Abstract: Persistent storage may contain: (i) an explicit configuration item table with entries of explicit configuration items representing hardware devices and executable software applications deployed on the hardware devices, (ii) an implicit configuration item table with entries of implicit configuration items representing units of source code, wherein at least some of the executable software applications are compiled versions of the units of source code, and (iii) an implicit relationship table associating pairs of the configuration items.Type: ApplicationFiled: August 12, 2020Publication date: February 17, 2022Inventors: Giora Tamir, Kurt Zettel, Naveen Bojja, Brian James Waplington, Maulik Shah, Thomas Brotherton
-
Patent number: 11223640Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.Type: GrantFiled: May 21, 2019Date of Patent: January 11, 2022Assignee: ServiceNow, Inc.Inventors: Kurt Joseph Zettel, II, Richard Reybok, Jr., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
-
Patent number: 10938850Abstract: An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a security computer external vulnerability data from an external source regarding vulnerabilities associated with an attack vector for configuration item (CI) data related to a (CI) device, of the networked computer system. The security computer accesses a configuration management database (CMDB) and the CI data related to the physical device is read. Trust zone data associated with the CI device is determined utilizing the CMDB, and the security computer performs a vulnerability calculation for the CI device utilizing the external vulnerability data and associated trust zone data. This is also done for a second CI device. The vulnerability calculations for both are compared and this comparison serves as a basis for prioritizing an action to be taken on the CI device or associated other network components.Type: GrantFiled: October 8, 2019Date of Patent: March 2, 2021Assignee: ServiceNow, Inc.Inventors: Giora Tamir, Lisa Henderson, Jose Bernal, Bryan Boyle
-
Publication number: 20200404022Abstract: Solution management systems and methods are presently disclosed that enable receiving, compiling, and analyzing vendor solutions, determining the vendor solutions that address a target vulnerability of a client network and/or client devices, determining additional vulnerabilities of the client network and/or client devices that the vendor solutions address, and selecting a vendor solution to remediate the target vulnerability. The presently disclosed systems and methods also enable scoring, risk evaluation, and additional metrics to facilitate determining the vendor solution(s) that have the largest impact and/or benefit to the various vulnerabilities of the client network and/or client devices.Type: ApplicationFiled: August 29, 2019Publication date: December 24, 2020Inventors: Brian James Waplington, David Victor Barkovic, Xuchang Chen, Karthika Gajjala, Giora Tamir
-
Publication number: 20200196045Abstract: A pair of headphones has a pair of ear devices positioned in contact with a user's ears, a band located between the ear devices, a transceiver in the band at a distance away from the user's head for low power communication with an electronic device, a pair of speakers in the band and in communication with the transceiver for generating sound, and a pair of sound air chambers extending between the speakers and the ear devices for conveying the sound to the user's ears. An accelerometer in the band detects a tilt angle of the user's head, and generates a posture correction signal when the detected tilt angle is greater than a reference tilt angle.Type: ApplicationFiled: December 12, 2019Publication date: June 18, 2020Inventors: Giora TAMIR, Doron SHAFRIR
-
Publication number: 20200120128Abstract: An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a security computer external vulnerability data from an external source regarding vulnerabilities associated with an attack vector for configuration item (CI) data related to a (CI) device, of the networked computer system. The security computer accesses a configuration management database (CMDB) and the CI data related to the physical device is read. Trust zone data associated with the CI device is determined utilizing the CMDB, and the security computer performs a vulnerability calculation for the CI device utilizing the external vulnerability data and associated trust zone data. This is also done for a second CI device. The vulnerability calculations for both are compared and this comparison serves as a basis for prioritizing an action to be taken on the CI device or associated other network components.Type: ApplicationFiled: October 8, 2019Publication date: April 16, 2020Inventors: Giora Tamir, Lisa Henderson, Jose Bernal, Bryan Boyle
-
Publication number: 20190394227Abstract: Systems and methods are disclosed for obtaining network security threat information and mitigating threats to improve computing network operations. For example, methods may include receiving a message from a central instance; from outside of a private network, invoking a search of data associated with the private network, wherein the search is based on the message and the search is performed by an agent device within the private network; receiving a search result of the search from the agent device; transmitting the search result to the central instance, wherein the central instance is configured to generate network security threat information based in part on the search result and share the network security threat information with a plurality of customer instances that are associated with a group of customers; and receiving an alert message from the central instance, wherein the alert message includes information that identifies a network security threat.Type: ApplicationFiled: August 29, 2019Publication date: December 26, 2019Inventors: Richard Reybok, JR., Kurt Joseph Zettel, II, Phillip Dicorpo, Simon N. Allen, Amit Sharma, Giora Tamir
-
Publication number: 20190342316Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.Type: ApplicationFiled: May 21, 2019Publication date: November 7, 2019Inventors: Kurt Joseph Zettel, II, Richard Reybok, JR., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
-
Patent number: 10462176Abstract: An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a security computer external vulnerability data from an external source regarding vulnerabilities associated with an attack vector for configuration item (CI) data related to a (CI) device, of the networked computer system. The security computer accesses a configuration management database (CMDB) and the CI data related to the physical device is read. Trust zone data associated with the CI device is determined utilizing the CMDB, and the security computer performs a vulnerability calculation for the CI device utilizing the external vulnerability data and associated trust zone data. This is also done for a second CI device. The vulnerability calculations for both are compared and this comparison serves as a basis for prioritizing an action to be taken on the CI device or associated other network components.Type: GrantFiled: March 29, 2018Date of Patent: October 29, 2019Assignee: ServiceNow, Inc.Inventors: Giora Tamir, Lisa Henderson, Jose Bernal, Bryan Boyle
-
Patent number: 10333960Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.Type: GrantFiled: May 3, 2017Date of Patent: June 25, 2019Assignee: SERVICENOW, INC.Inventors: Kurt Joseph Zettel, II, Richard Reybok, Jr., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
-
Publication number: 20180324197Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.Type: ApplicationFiled: May 3, 2017Publication date: November 8, 2018Inventors: Kurt Joseph Zettel, II, Richard Reybok, JR., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
-
Publication number: 20180324207Abstract: Systems and methods are disclosed for obtaining network security threat information and mitigating threats to improve computing network operations. For example, methods may include receiving a message from a central instance; from outside of a private network, invoking a search of data associated with the private network, wherein the search is based on the message and the search is performed by an agent device within the private network; receiving a search result of the search from the agent device; transmitting the search result to the central instance, wherein the central instance is configured to generate network security threat information based in part on the search result and share the network security threat information with a plurality of customer instances that are associated with a group of customers; and receiving an alert message from the central instance, wherein the alert message includes information that identifies a network security threat.Type: ApplicationFiled: May 5, 2017Publication date: November 8, 2018Inventors: Richard Reybok, JR., Kurt Joseph Zettel, II, Phillip Dicorpo, Simon N. Allen, Amit Sharma, Giora Tamir
-
Publication number: 20180219908Abstract: An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a security computer external vulnerability data from an external source regarding vulnerabilities associated with an attack vector for configuration item (CI) data related to a (CI) device, of the networked computer system. The security computer accesses a configuration management database (CMDB) and the CI data related to the physical device is read. Trust zone data associated with the CI device is determined utilizing the CMDB, and the security computer performs a vulnerability calculation for the CI device utilizing the external vulnerability data and associated trust zone data. This is also done for a second CI device. The vulnerability calculations for both are compared and this comparison serves as a basis for prioritizing an action to be taken on the CI device or associated other network components.Type: ApplicationFiled: March 29, 2018Publication date: August 2, 2018Inventors: Giora Tamir, Lisa Henderson, Jose Bernal, Bryan Boyle