Patents by Inventor Giora Tamir

Giora Tamir has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240031232
    Abstract: A system includes a processor and memory storing instructions that cause the processor to receive, from a client device, inputs defining associations between one or more control objectives and one more policies, wherein the one or more control objectives define one or more functions to be performed to comply with the one or more policies. The processor may map the one or more policies associated with the one or more control objectives to an application environment and receive, from the client device or a different client device, a change set to an application in the application environment, wherein the change set comprises one or more modifications to the application. The processor may then determine whether the change set adheres to the one or more policies and restrict implementation of the change set in response to determining that the change set does not adhere to the one more policies.
    Type: Application
    Filed: July 19, 2022
    Publication date: January 25, 2024
    Inventors: Anushree Shrivallabh Randad, Ravindra Bansal, Tamir Segal, Abhi Sekhar Thyadi, Hari Krishna Vutukuru, Samujjwal Bhandari, Utkarsh Jain, Vasant Balasubramanian, Lal Narayanasamy, Giora Tamir, Rama Raghava Reddy Bandi, Prabhat Kuchibhotla
  • Patent number: 11743278
    Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.
    Type: Grant
    Filed: December 15, 2021
    Date of Patent: August 29, 2023
    Assignee: ServiceNow, Inc.
    Inventors: Kurt Joseph Zettel, II, Richard Reybok, Jr., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
  • Patent number: 11575703
    Abstract: Systems and methods are disclosed for obtaining network security threat information and mitigating threats to improve computing network operations. For example, methods may include receiving a message from a central instance; from outside of a private network, invoking a search of data associated with the private network, wherein the search is based on the message and the search is performed by an agent device within the private network; receiving a search result of the search from the agent device; transmitting the search result to the central instance, wherein the central instance is configured to generate network security threat information based in part on the search result and share the network security threat information with a plurality of customer instances that are associated with a group of customers; and receiving an alert message from the central instance, wherein the alert message includes information that identifies a network security threat.
    Type: Grant
    Filed: August 29, 2019
    Date of Patent: February 7, 2023
    Assignee: ServiceNow, Inc.
    Inventors: Richard Reybok, Jr., Kurt Joseph Zettel, II, Phillip Dicorpo, Simon N. Allen, Amit Sharma, Giora Tamir
  • Patent number: 11349877
    Abstract: Solution management systems and methods are presently disclosed that enable receiving, compiling, and analyzing vendor solutions, determining the vendor solutions that address a target vulnerability of a client network and/or client devices, determining additional vulnerabilities of the client network and/or client devices that the vendor solutions address, and selecting a vendor solution to remediate the target vulnerability. The presently disclosed systems and methods also enable scoring, risk evaluation, and additional metrics to facilitate determining the vendor solution(s) that have the largest impact and/or benefit to the various vulnerabilities of the client network and/or client devices.
    Type: Grant
    Filed: August 29, 2019
    Date of Patent: May 31, 2022
    Assignee: ServiceNow, Inc.
    Inventors: Brian James Waplington, David Victor Barkovic, Xuchang Chen, Karthika Gajjala, Giora Tamir
  • Publication number: 20220156063
    Abstract: Persistent storage may contain: (i) an explicit configuration item table with entries of explicit configuration items representing hardware devices and executable software applications deployed on the hardware devices, (ii) an implicit configuration item table with entries of implicit configuration items representing units of source code, wherein at least some of the executable software applications are compiled versions of the units of source code, and (iii) an implicit relationship table associating pairs of the configuration items.
    Type: Application
    Filed: February 3, 2022
    Publication date: May 19, 2022
    Inventors: Giora Tamir, Kurt Zettel, Naveen Bojja, Brian James Waplington, Maulik Shah, Thomas Brotherton
  • Publication number: 20220109686
    Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.
    Type: Application
    Filed: December 15, 2021
    Publication date: April 7, 2022
    Inventors: Kurt Joseph Zettel, II, Richard Reybok, JR., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
  • Patent number: 11275580
    Abstract: Persistent storage may contain: (i) an explicit configuration item table with entries of explicit configuration items representing hardware devices and executable software applications deployed on the hardware devices, (ii) an implicit configuration item table with entries of implicit configuration items representing units of source code, wherein at least some of the executable software applications are compiled versions of the units of source code, and (iii) an implicit relationship table associating pairs of the configuration items.
    Type: Grant
    Filed: August 12, 2020
    Date of Patent: March 15, 2022
    Assignee: ServiceNow, Inc.
    Inventors: Giora Tamir, Kurt Zettel, Naveen Bojja, Brian James Waplington, Maulik Shah, Thomas Brotherton
  • Publication number: 20220050675
    Abstract: Persistent storage may contain: (i) an explicit configuration item table with entries of explicit configuration items representing hardware devices and executable software applications deployed on the hardware devices, (ii) an implicit configuration item table with entries of implicit configuration items representing units of source code, wherein at least some of the executable software applications are compiled versions of the units of source code, and (iii) an implicit relationship table associating pairs of the configuration items.
    Type: Application
    Filed: August 12, 2020
    Publication date: February 17, 2022
    Inventors: Giora Tamir, Kurt Zettel, Naveen Bojja, Brian James Waplington, Maulik Shah, Thomas Brotherton
  • Patent number: 11223640
    Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.
    Type: Grant
    Filed: May 21, 2019
    Date of Patent: January 11, 2022
    Assignee: ServiceNow, Inc.
    Inventors: Kurt Joseph Zettel, II, Richard Reybok, Jr., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
  • Patent number: 10938850
    Abstract: An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a security computer external vulnerability data from an external source regarding vulnerabilities associated with an attack vector for configuration item (CI) data related to a (CI) device, of the networked computer system. The security computer accesses a configuration management database (CMDB) and the CI data related to the physical device is read. Trust zone data associated with the CI device is determined utilizing the CMDB, and the security computer performs a vulnerability calculation for the CI device utilizing the external vulnerability data and associated trust zone data. This is also done for a second CI device. The vulnerability calculations for both are compared and this comparison serves as a basis for prioritizing an action to be taken on the CI device or associated other network components.
    Type: Grant
    Filed: October 8, 2019
    Date of Patent: March 2, 2021
    Assignee: ServiceNow, Inc.
    Inventors: Giora Tamir, Lisa Henderson, Jose Bernal, Bryan Boyle
  • Publication number: 20200404022
    Abstract: Solution management systems and methods are presently disclosed that enable receiving, compiling, and analyzing vendor solutions, determining the vendor solutions that address a target vulnerability of a client network and/or client devices, determining additional vulnerabilities of the client network and/or client devices that the vendor solutions address, and selecting a vendor solution to remediate the target vulnerability. The presently disclosed systems and methods also enable scoring, risk evaluation, and additional metrics to facilitate determining the vendor solution(s) that have the largest impact and/or benefit to the various vulnerabilities of the client network and/or client devices.
    Type: Application
    Filed: August 29, 2019
    Publication date: December 24, 2020
    Inventors: Brian James Waplington, David Victor Barkovic, Xuchang Chen, Karthika Gajjala, Giora Tamir
  • Publication number: 20200196045
    Abstract: A pair of headphones has a pair of ear devices positioned in contact with a user's ears, a band located between the ear devices, a transceiver in the band at a distance away from the user's head for low power communication with an electronic device, a pair of speakers in the band and in communication with the transceiver for generating sound, and a pair of sound air chambers extending between the speakers and the ear devices for conveying the sound to the user's ears. An accelerometer in the band detects a tilt angle of the user's head, and generates a posture correction signal when the detected tilt angle is greater than a reference tilt angle.
    Type: Application
    Filed: December 12, 2019
    Publication date: June 18, 2020
    Inventors: Giora TAMIR, Doron SHAFRIR
  • Publication number: 20200120128
    Abstract: An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a security computer external vulnerability data from an external source regarding vulnerabilities associated with an attack vector for configuration item (CI) data related to a (CI) device, of the networked computer system. The security computer accesses a configuration management database (CMDB) and the CI data related to the physical device is read. Trust zone data associated with the CI device is determined utilizing the CMDB, and the security computer performs a vulnerability calculation for the CI device utilizing the external vulnerability data and associated trust zone data. This is also done for a second CI device. The vulnerability calculations for both are compared and this comparison serves as a basis for prioritizing an action to be taken on the CI device or associated other network components.
    Type: Application
    Filed: October 8, 2019
    Publication date: April 16, 2020
    Inventors: Giora Tamir, Lisa Henderson, Jose Bernal, Bryan Boyle
  • Publication number: 20190394227
    Abstract: Systems and methods are disclosed for obtaining network security threat information and mitigating threats to improve computing network operations. For example, methods may include receiving a message from a central instance; from outside of a private network, invoking a search of data associated with the private network, wherein the search is based on the message and the search is performed by an agent device within the private network; receiving a search result of the search from the agent device; transmitting the search result to the central instance, wherein the central instance is configured to generate network security threat information based in part on the search result and share the network security threat information with a plurality of customer instances that are associated with a group of customers; and receiving an alert message from the central instance, wherein the alert message includes information that identifies a network security threat.
    Type: Application
    Filed: August 29, 2019
    Publication date: December 26, 2019
    Inventors: Richard Reybok, JR., Kurt Joseph Zettel, II, Phillip Dicorpo, Simon N. Allen, Amit Sharma, Giora Tamir
  • Publication number: 20190342316
    Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.
    Type: Application
    Filed: May 21, 2019
    Publication date: November 7, 2019
    Inventors: Kurt Joseph Zettel, II, Richard Reybok, JR., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
  • Patent number: 10462176
    Abstract: An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a security computer external vulnerability data from an external source regarding vulnerabilities associated with an attack vector for configuration item (CI) data related to a (CI) device, of the networked computer system. The security computer accesses a configuration management database (CMDB) and the CI data related to the physical device is read. Trust zone data associated with the CI device is determined utilizing the CMDB, and the security computer performs a vulnerability calculation for the CI device utilizing the external vulnerability data and associated trust zone data. This is also done for a second CI device. The vulnerability calculations for both are compared and this comparison serves as a basis for prioritizing an action to be taken on the CI device or associated other network components.
    Type: Grant
    Filed: March 29, 2018
    Date of Patent: October 29, 2019
    Assignee: ServiceNow, Inc.
    Inventors: Giora Tamir, Lisa Henderson, Jose Bernal, Bryan Boyle
  • Patent number: 10333960
    Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.
    Type: Grant
    Filed: May 3, 2017
    Date of Patent: June 25, 2019
    Assignee: SERVICENOW, INC.
    Inventors: Kurt Joseph Zettel, II, Richard Reybok, Jr., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
  • Publication number: 20180324197
    Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.
    Type: Application
    Filed: May 3, 2017
    Publication date: November 8, 2018
    Inventors: Kurt Joseph Zettel, II, Richard Reybok, JR., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
  • Publication number: 20180324207
    Abstract: Systems and methods are disclosed for obtaining network security threat information and mitigating threats to improve computing network operations. For example, methods may include receiving a message from a central instance; from outside of a private network, invoking a search of data associated with the private network, wherein the search is based on the message and the search is performed by an agent device within the private network; receiving a search result of the search from the agent device; transmitting the search result to the central instance, wherein the central instance is configured to generate network security threat information based in part on the search result and share the network security threat information with a plurality of customer instances that are associated with a group of customers; and receiving an alert message from the central instance, wherein the alert message includes information that identifies a network security threat.
    Type: Application
    Filed: May 5, 2017
    Publication date: November 8, 2018
    Inventors: Richard Reybok, JR., Kurt Joseph Zettel, II, Phillip Dicorpo, Simon N. Allen, Amit Sharma, Giora Tamir
  • Publication number: 20180219908
    Abstract: An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a security computer external vulnerability data from an external source regarding vulnerabilities associated with an attack vector for configuration item (CI) data related to a (CI) device, of the networked computer system. The security computer accesses a configuration management database (CMDB) and the CI data related to the physical device is read. Trust zone data associated with the CI device is determined utilizing the CMDB, and the security computer performs a vulnerability calculation for the CI device utilizing the external vulnerability data and associated trust zone data. This is also done for a second CI device. The vulnerability calculations for both are compared and this comparison serves as a basis for prioritizing an action to be taken on the CI device or associated other network components.
    Type: Application
    Filed: March 29, 2018
    Publication date: August 2, 2018
    Inventors: Giora Tamir, Lisa Henderson, Jose Bernal, Bryan Boyle