Patents by Inventor Lisa Sherilyn Henderson

Lisa Sherilyn Henderson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11818161
    Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.
    Type: Grant
    Filed: October 25, 2021
    Date of Patent: November 14, 2023
    Assignee: ServiceNow, Inc.
    Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
  • Patent number: 11805146
    Abstract: A modified configuration management database (CMDB) system is disclosed in which detected configuration item (CI) vulnerabilities are stored as less-resource-intensive detection objects, rather than as more-resource-intensive vulnerable item (VI) objects. The system includes a vulnerability response (VR) server that enables promotion rules to be created and periodically applied to the stored detections. When the conditions of a detection promotion rule are satisfied by information relating to a stored detection, a new VI may be created and related to the stored detection within the CMDB. The disclosed promotion rules can be configured to ensure that VIs are only automatically created for high-risk or relevant detections, substantially reducing the number of VIs to be created, stored, and managed. As such, the disclosed system substantially reduces resource consumption and improves the efficiency and operation of the CMDB.
    Type: Grant
    Filed: April 29, 2020
    Date of Patent: October 31, 2023
    Assignee: ServiceNow, Inc.
    Inventor: Lisa Sherilyn Henderson
  • Patent number: 11777792
    Abstract: The present disclosure relates to a timeline visualization to enable users to more quickly find information and limit the amount of displayed information associated with one or more records. The timeline visualization displays events associated with a record as areas that are positioned along the timeline visualization. In some embodiments, the events displayed on the timeline visualization may be selected based on properties of the events and timeline parameters, such as dimensions of the timeline visualization and the areas to be displayed using the timeline visualization.
    Type: Grant
    Filed: April 4, 2022
    Date of Patent: October 3, 2023
    Assignee: ServiceNow, Inc.
    Inventors: Lisa Sherilyn Henderson, Betsy Cherian
  • Patent number: 11777980
    Abstract: A system may include a server device configured to: receive selected factors and respective weights for each of the selected factors; obtain combinations of selected primary factors that total less than a maximum number of rows; determine a duplication count for the combinations of selected primary factors; and generate, for display on a graphical user interface, data representing a table, where each column of the table represents one of the selected factors, where for columns of the table representing selected primary factors, rows represent each of the combinations of selected primary factors duplicated according to the duplication count, where for columns of the table representing selected secondary factors from the selected factors, rows represent repeated iteration through possible values of the selected secondary factors, and where each row includes a respective risk score based on a weighted average of the respective weights applied to the selected factors represented therein.
    Type: Grant
    Filed: March 8, 2022
    Date of Patent: October 3, 2023
    Assignee: ServiceNow, Inc.
    Inventor: Lisa Sherilyn Henderson
  • Publication number: 20220224587
    Abstract: The present disclosure relates to a timeline visualization to enable users to more quickly find information and limit the amount of displayed information associated with one or more records. The timeline visualization displays events associated with a record as areas that are positioned along the timeline visualization. In some embodiments, the events displayed on the timeline visualization may be selected based on properties of the events and timeline parameters, such as dimensions of the timeline visualization and the areas to be displayed using the timeline visualization.
    Type: Application
    Filed: April 4, 2022
    Publication date: July 14, 2022
    Inventors: Lisa Sherilyn Henderson, Betsy Cherian
  • Publication number: 20220191236
    Abstract: A system may include a server device configured to: receive selected factors and respective weights for each of the selected factors; obtain combinations of selected primary factors that total less than a maximum number of rows; determine a duplication count for the combinations of selected primary factors; and generate, for display on a graphical user interface, data representing a table, where each column of the table represents one of the selected factors, where for columns of the table representing selected primary factors, rows represent each of the combinations of selected primary factors duplicated according to the duplication count, where for columns of the table representing selected secondary factors from the selected factors, rows represent repeated iteration through possible values of the selected secondary factors, and where each row includes a respective risk score based on a weighted average of the respective weights applied to the selected factors represented therein.
    Type: Application
    Filed: March 8, 2022
    Publication date: June 16, 2022
    Inventor: Lisa Sherilyn Henderson
  • Patent number: 11296926
    Abstract: The present disclosure relates to a timeline visualization to enable users to more quickly find information and limit the amount of displayed information associated with one or more records. The timeline visualization displays events associated with a record as areas that are positioned along the timeline visualization. In some embodiments, the events displayed on the timeline visualization may be selected based on properties of the events and timeline parameters, such as dimensions of the timeline visualization and the areas to be displayed using the timeline visualization.
    Type: Grant
    Filed: January 7, 2021
    Date of Patent: April 5, 2022
    Assignee: ServiceNow, Inc.
    Inventors: Lisa Sherilyn Henderson, Betsy Cherian
  • Patent number: 11283826
    Abstract: A system may include a server device configured to: receive selected factors and respective weights for each of the selected factors; obtain combinations of selected primary factors that total less than a maximum number of rows; determine a duplication count for the combinations of selected primary factors; and generate, for display on a graphical user interface, data representing a table, where each column of the table represents one of the selected factors, where for columns of the table representing selected primary factors, rows represent each of the combinations of selected primary factors duplicated according to the duplication count, where for columns of the table representing selected secondary factors from the selected factors, rows represent repeated iteration through possible values of the selected secondary factors, and where each row includes a respective risk score based on a weighted average of the respective weights applied to the selected factors represented therein.
    Type: Grant
    Filed: June 24, 2019
    Date of Patent: March 22, 2022
    Assignee: ServiceNow, Inc.
    Inventor: Lisa Sherilyn Henderson
  • Publication number: 20220046049
    Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.
    Type: Application
    Filed: October 25, 2021
    Publication date: February 10, 2022
    Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
  • Publication number: 20210344701
    Abstract: A modified configuration management database (CMDB) system is disclosed in which detected configuration item (CI) vulnerabilities are stored as less-resource-intensive detection objects, rather than as more-resource-intensive vulnerable item (VI) objects. The system includes a vulnerability response (VR) server that enables promotion rules to be created and periodically applied to the stored detections. When the conditions of a detection promotion rule are satisfied by information relating to a stored detection, a new VI may be created and related to the stored detection within the CMDB. The disclosed promotion rules can be configured to ensure that VIs are only automatically created for high-risk or relevant detections, substantially reducing the number of VIs to be created, stored, and managed. As such, the disclosed system substantially reduces resource consumption and improves the efficiency and operation of the CMDB.
    Type: Application
    Filed: April 29, 2020
    Publication date: November 4, 2021
    Inventor: Lisa Sherilyn Henderson
  • Patent number: 11159557
    Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.
    Type: Grant
    Filed: November 13, 2019
    Date of Patent: October 26, 2021
    Assignee: ServiceNow, Inc.
    Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
  • Publication number: 20210144168
    Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.
    Type: Application
    Filed: November 13, 2019
    Publication date: May 13, 2021
    Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
  • Publication number: 20200382546
    Abstract: A system may include a server device configured to: receive selected factors and respective weights for each of the selected factors; obtain combinations of selected primary factors that total less than a maximum number of rows; determine a duplication count for the combinations of selected primary factors; and generate, for display on a graphical user interface, data representing a table, where each column of the table represents one of the selected factors, where for columns of the table representing selected primary factors, rows represent each of the combinations of selected primary factors duplicated according to the duplication count, where for columns of the table representing selected secondary factors from the selected factors, rows represent repeated iteration through possible values of the selected secondary factors, and where each row includes a respective risk score based on a weighted average of the respective weights applied to the selected factors represented therein.
    Type: Application
    Filed: June 24, 2019
    Publication date: December 3, 2020
    Inventor: Lisa Sherilyn Henderson
  • Patent number: 10749889
    Abstract: A computing system may include a database disposed within a computational instance of a remote network management platform that manages a managed network. Additionally, the computing system may include server device(s) disposed within the computational instance. The server device(s) may be configured to: compare, in order of priorities of assignment rules, a particular configuration item to the assignment rules until a matching condition is found, where the comparison includes consideration of one or more of: (i) particular item attributes of the particular configuration item or (ii) particular vulnerability attributes that apply to the particular configuration item; determine a particular remediator identifier related to the matching condition; based on a key and the particular remediator identifier, determine a particular group for the particular configuration item according to grouping rules; and store, in the database, a reference to the particular configuration item in the particular group.
    Type: Grant
    Filed: May 7, 2018
    Date of Patent: August 18, 2020
    Assignee: ServiceNow, Inc.
    Inventors: Lisa Sherilyn Henderson, Eun-Sook Arlene Watson
  • Publication number: 20190342323
    Abstract: A computing system may include a database disposed within a computational instance of a remote network management platform that manages a managed network. Additionally, the computing system may include server device(s) disposed within the computational instance. The server device(s) may be configured to: compare, in order of priorities of assignment rules, a particular configuration item to the assignment rules until a matching condition is found, where the comparison includes consideration of one or more of: (i) particular item attributes of the particular configuration item or (ii) particular vulnerability attributes that apply to the particular configuration item; determine a particular remediator identifier related to the matching condition; based on a key and the particular remediator identifier, determine a particular group for the particular configuration item according to grouping rules; and store, in the database, a reference to the particular configuration item in the particular group.
    Type: Application
    Filed: May 7, 2018
    Publication date: November 7, 2019
    Inventors: Lisa Sherilyn Henderson, Eun-Sook Arlene Watson