Patents by Inventor Lisa Sherilyn Henderson
Lisa Sherilyn Henderson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11818161Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.Type: GrantFiled: October 25, 2021Date of Patent: November 14, 2023Assignee: ServiceNow, Inc.Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
-
Patent number: 11805146Abstract: A modified configuration management database (CMDB) system is disclosed in which detected configuration item (CI) vulnerabilities are stored as less-resource-intensive detection objects, rather than as more-resource-intensive vulnerable item (VI) objects. The system includes a vulnerability response (VR) server that enables promotion rules to be created and periodically applied to the stored detections. When the conditions of a detection promotion rule are satisfied by information relating to a stored detection, a new VI may be created and related to the stored detection within the CMDB. The disclosed promotion rules can be configured to ensure that VIs are only automatically created for high-risk or relevant detections, substantially reducing the number of VIs to be created, stored, and managed. As such, the disclosed system substantially reduces resource consumption and improves the efficiency and operation of the CMDB.Type: GrantFiled: April 29, 2020Date of Patent: October 31, 2023Assignee: ServiceNow, Inc.Inventor: Lisa Sherilyn Henderson
-
Patent number: 11777792Abstract: The present disclosure relates to a timeline visualization to enable users to more quickly find information and limit the amount of displayed information associated with one or more records. The timeline visualization displays events associated with a record as areas that are positioned along the timeline visualization. In some embodiments, the events displayed on the timeline visualization may be selected based on properties of the events and timeline parameters, such as dimensions of the timeline visualization and the areas to be displayed using the timeline visualization.Type: GrantFiled: April 4, 2022Date of Patent: October 3, 2023Assignee: ServiceNow, Inc.Inventors: Lisa Sherilyn Henderson, Betsy Cherian
-
Patent number: 11777980Abstract: A system may include a server device configured to: receive selected factors and respective weights for each of the selected factors; obtain combinations of selected primary factors that total less than a maximum number of rows; determine a duplication count for the combinations of selected primary factors; and generate, for display on a graphical user interface, data representing a table, where each column of the table represents one of the selected factors, where for columns of the table representing selected primary factors, rows represent each of the combinations of selected primary factors duplicated according to the duplication count, where for columns of the table representing selected secondary factors from the selected factors, rows represent repeated iteration through possible values of the selected secondary factors, and where each row includes a respective risk score based on a weighted average of the respective weights applied to the selected factors represented therein.Type: GrantFiled: March 8, 2022Date of Patent: October 3, 2023Assignee: ServiceNow, Inc.Inventor: Lisa Sherilyn Henderson
-
Publication number: 20220224587Abstract: The present disclosure relates to a timeline visualization to enable users to more quickly find information and limit the amount of displayed information associated with one or more records. The timeline visualization displays events associated with a record as areas that are positioned along the timeline visualization. In some embodiments, the events displayed on the timeline visualization may be selected based on properties of the events and timeline parameters, such as dimensions of the timeline visualization and the areas to be displayed using the timeline visualization.Type: ApplicationFiled: April 4, 2022Publication date: July 14, 2022Inventors: Lisa Sherilyn Henderson, Betsy Cherian
-
Publication number: 20220191236Abstract: A system may include a server device configured to: receive selected factors and respective weights for each of the selected factors; obtain combinations of selected primary factors that total less than a maximum number of rows; determine a duplication count for the combinations of selected primary factors; and generate, for display on a graphical user interface, data representing a table, where each column of the table represents one of the selected factors, where for columns of the table representing selected primary factors, rows represent each of the combinations of selected primary factors duplicated according to the duplication count, where for columns of the table representing selected secondary factors from the selected factors, rows represent repeated iteration through possible values of the selected secondary factors, and where each row includes a respective risk score based on a weighted average of the respective weights applied to the selected factors represented therein.Type: ApplicationFiled: March 8, 2022Publication date: June 16, 2022Inventor: Lisa Sherilyn Henderson
-
Patent number: 11296926Abstract: The present disclosure relates to a timeline visualization to enable users to more quickly find information and limit the amount of displayed information associated with one or more records. The timeline visualization displays events associated with a record as areas that are positioned along the timeline visualization. In some embodiments, the events displayed on the timeline visualization may be selected based on properties of the events and timeline parameters, such as dimensions of the timeline visualization and the areas to be displayed using the timeline visualization.Type: GrantFiled: January 7, 2021Date of Patent: April 5, 2022Assignee: ServiceNow, Inc.Inventors: Lisa Sherilyn Henderson, Betsy Cherian
-
Patent number: 11283826Abstract: A system may include a server device configured to: receive selected factors and respective weights for each of the selected factors; obtain combinations of selected primary factors that total less than a maximum number of rows; determine a duplication count for the combinations of selected primary factors; and generate, for display on a graphical user interface, data representing a table, where each column of the table represents one of the selected factors, where for columns of the table representing selected primary factors, rows represent each of the combinations of selected primary factors duplicated according to the duplication count, where for columns of the table representing selected secondary factors from the selected factors, rows represent repeated iteration through possible values of the selected secondary factors, and where each row includes a respective risk score based on a weighted average of the respective weights applied to the selected factors represented therein.Type: GrantFiled: June 24, 2019Date of Patent: March 22, 2022Assignee: ServiceNow, Inc.Inventor: Lisa Sherilyn Henderson
-
Publication number: 20220046049Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.Type: ApplicationFiled: October 25, 2021Publication date: February 10, 2022Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
-
Publication number: 20210344701Abstract: A modified configuration management database (CMDB) system is disclosed in which detected configuration item (CI) vulnerabilities are stored as less-resource-intensive detection objects, rather than as more-resource-intensive vulnerable item (VI) objects. The system includes a vulnerability response (VR) server that enables promotion rules to be created and periodically applied to the stored detections. When the conditions of a detection promotion rule are satisfied by information relating to a stored detection, a new VI may be created and related to the stored detection within the CMDB. The disclosed promotion rules can be configured to ensure that VIs are only automatically created for high-risk or relevant detections, substantially reducing the number of VIs to be created, stored, and managed. As such, the disclosed system substantially reduces resource consumption and improves the efficiency and operation of the CMDB.Type: ApplicationFiled: April 29, 2020Publication date: November 4, 2021Inventor: Lisa Sherilyn Henderson
-
Patent number: 11159557Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.Type: GrantFiled: November 13, 2019Date of Patent: October 26, 2021Assignee: ServiceNow, Inc.Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
-
Publication number: 20210144168Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.Type: ApplicationFiled: November 13, 2019Publication date: May 13, 2021Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
-
Publication number: 20200382546Abstract: A system may include a server device configured to: receive selected factors and respective weights for each of the selected factors; obtain combinations of selected primary factors that total less than a maximum number of rows; determine a duplication count for the combinations of selected primary factors; and generate, for display on a graphical user interface, data representing a table, where each column of the table represents one of the selected factors, where for columns of the table representing selected primary factors, rows represent each of the combinations of selected primary factors duplicated according to the duplication count, where for columns of the table representing selected secondary factors from the selected factors, rows represent repeated iteration through possible values of the selected secondary factors, and where each row includes a respective risk score based on a weighted average of the respective weights applied to the selected factors represented therein.Type: ApplicationFiled: June 24, 2019Publication date: December 3, 2020Inventor: Lisa Sherilyn Henderson
-
Patent number: 10749889Abstract: A computing system may include a database disposed within a computational instance of a remote network management platform that manages a managed network. Additionally, the computing system may include server device(s) disposed within the computational instance. The server device(s) may be configured to: compare, in order of priorities of assignment rules, a particular configuration item to the assignment rules until a matching condition is found, where the comparison includes consideration of one or more of: (i) particular item attributes of the particular configuration item or (ii) particular vulnerability attributes that apply to the particular configuration item; determine a particular remediator identifier related to the matching condition; based on a key and the particular remediator identifier, determine a particular group for the particular configuration item according to grouping rules; and store, in the database, a reference to the particular configuration item in the particular group.Type: GrantFiled: May 7, 2018Date of Patent: August 18, 2020Assignee: ServiceNow, Inc.Inventors: Lisa Sherilyn Henderson, Eun-Sook Arlene Watson
-
Publication number: 20190342323Abstract: A computing system may include a database disposed within a computational instance of a remote network management platform that manages a managed network. Additionally, the computing system may include server device(s) disposed within the computational instance. The server device(s) may be configured to: compare, in order of priorities of assignment rules, a particular configuration item to the assignment rules until a matching condition is found, where the comparison includes consideration of one or more of: (i) particular item attributes of the particular configuration item or (ii) particular vulnerability attributes that apply to the particular configuration item; determine a particular remediator identifier related to the matching condition; based on a key and the particular remediator identifier, determine a particular group for the particular configuration item according to grouping rules; and store, in the database, a reference to the particular configuration item in the particular group.Type: ApplicationFiled: May 7, 2018Publication date: November 7, 2019Inventors: Lisa Sherilyn Henderson, Eun-Sook Arlene Watson