Patents by Inventor Richard D. Li

Richard D. Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11979434
    Abstract: A system and a method for secure operator onboarding and creating an ingest job agent for secure multitenant operations of a distributed computing cluster are provided. Embodiments automate multitenant operations for distributed computing clusters. These operations include automation of operator onboarding, creation of logically segregated distributed data stores within the distributed computing clusters for the on-boarded operator, and creation of ingest agents with security isolation for transfer of large quantities of files into the distributed computing clusters. Embodiments provide multitenant security, in which the same Hadoop cluster serves multiple operators with each operator's data and processes in effective isolation. In this manner, multitenant security keeps each user's data storage and operations on the Hadoop cluster separated from other operators.
    Type: Grant
    Filed: June 24, 2021
    Date of Patent: May 7, 2024
    Assignee: NORTHROP GRUMMAN SYSTEMS CORPORATION
    Inventors: Leon D. Li, Tyson Solberg, Christopher Lock, Richard Vitek
  • Patent number: 11957894
    Abstract: A neuromodulation therapy is delivered via at least one electrode implanted subcutaneously and superficially to a fascia layer superficial to a nerve of a patient. In one example, an implantable medical device is deployed along a superficial surface of a deep fascia tissue layer superficial to a nerve of a patient. Electrical stimulation energy is delivered to the nerve through the deep fascia tissue layer via implantable medical device electrodes.
    Type: Grant
    Filed: August 25, 2020
    Date of Patent: April 16, 2024
    Assignee: Medtronic, Inc.
    Inventors: Anthony M. Chasensky, Bernard Q. Li, Brad C. Tischendorf, Chris J. Paidosh, Christian S. Nielsen, Craig L. Schmidt, David A. Dinsmoor, Duane L. Bourget, Eric H. Bonde, Erik R. Scott, Forrest C M Pape, Gabriela C. Molnar, Gordon O. Munns, Joel A. Anderson, John E. Kast, Joseph J. Viavattine, Markus W. Reiterer, Michael J. Ebert, Phillip C. Falkner, Prabhakar A. Tamirisa, Randy S. Roles, Reginald D. Robinson, Richard T. Stone, Shawn C. Kelley, Stephen J. Roddy, Thomas P. Miltich, Timothy J. Denison, Todd V. Smith, Xuan K. Wei
  • Patent number: 11957893
    Abstract: A neuromodulation therapy is delivered via at least one electrode implanted subcutaneously and superficially to a fascia layer superficial to a nerve of a patient. In one example, an implantable medical device is deployed along a superficial surface of a deep fascia tissue layer superficial to a nerve of a patient. Electrical stimulation energy is delivered to the nerve through the deep fascia tissue layer via implantable medical device electrodes.
    Type: Grant
    Filed: August 25, 2020
    Date of Patent: April 16, 2024
    Assignee: Medtronic, Inc.
    Inventors: Brad C. Tischendorf, John E. Kast, Thomas P. Miltich, Gordon O. Munns, Randy S. Roles, Craig L. Schmidt, Joseph J. Viavattine, Christian S. Nielsen, Prabhakar A. Tamirisa, Anthony M. Chasensky, Markus W. Reiterer, Chris J. Paidosh, Reginald D. Robinson, Bernard Q. Li, Erik R. Scott, Phillip C. Falkner, Xuan K. Wei, Eric H. Bonde, David A. Dinsmoor, Duane L. Bourget, Forrest C M Pape, Gabriela C. Molnar, Joel A. Anderson, Michael J. Ebert, Richard T. Stone, Shawn C. Kelley, Stephen J. Roddy, Timothy J. Denison, Todd V. Smith
  • Publication number: 20230047978
    Abstract: A system and method for real-time configuration analysis employs a source code management event listener and a remote server to receive a proposed configuration change event, retrieve a real-time server configuration, determine the effect of a requested change associated with the proposed configuration change event and report an impact of the requested change. In various embodiments, the impact is reported in a user’s interface associated with a source code manager enabling a user to apply the requested change into production if appropriate or seek to resolve a problem as reported before the change is effectuated into production.
    Type: Application
    Filed: August 15, 2022
    Publication date: February 16, 2023
    Inventors: Richard D. Li, Alix Cook, Bjorn N. Freeaman-Benson
  • Patent number: 10546134
    Abstract: A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine various approaches for remediating or mitigating the identified vulnerabilities, and can prioritize the various approaches based on the efficiency of the various approaches in remediating or mitigating the identified vulnerabilities. The SR tool can recommend one or more of the prioritized approaches based on constraints such as cost, effectiveness, complexity, and the like. Once the one or more of the prioritized approaches are selected, the SR tool can recommend the one or more prioritized approaches to third-party experts for evaluation.
    Type: Grant
    Filed: August 3, 2018
    Date of Patent: January 28, 2020
    Assignee: Rapid7, Inc.
    Inventors: Derek M Abdine, Anastasios Giakouminakis, Chad Loder, Richard D. Li
  • Patent number: 10437620
    Abstract: Embodiments described herein relate to systems and methods for identifying virtual machines in a network. The systems and methods comprise a virtual asset tool that can interface with a virtualization manager to receive metadata identifying virtual machines hosted by a plurality of physical machines. The virtual asset tool can subscribe to updates associated with the virtual machines, such as changes to the virtual machines, or additions or deletions of virtual machines. In response to receiving an update, the virtual asset tool can modify an asset record associated with the virtual machines and any corresponding descriptions. In embodiments, the virtual asset tool can schedule vulnerability scans for any or all of the virtual machines.
    Type: Grant
    Filed: August 26, 2011
    Date of Patent: October 8, 2019
    Assignee: RAPID7, INC.
    Inventors: Richard D. Li, Jeffrey L. Berger, Anastasios Giakouminakis
  • Publication number: 20190034640
    Abstract: A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine various approaches for remediating or mitigating the identified vulnerabilities, and can prioritize the various approaches based on the efficiency of the various approaches in remediating or mitigating the identified vulnerabilities. The SR tool can recommend one or more of the prioritized approaches based on constraints such as cost, effectiveness, complexity, and the like. Once the one or more of the prioritized approaches are selected, the SR tool can recommend the one or more prioritized approaches to third-party experts for evaluation.
    Type: Application
    Filed: August 3, 2018
    Publication date: January 31, 2019
    Inventors: Derek M. Abdine, Anastasios Giakouminakis, Chad Loder, Richard D. Li
  • Patent number: 10043011
    Abstract: A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine various approaches for remediating or mitigating the identified vulnerabilities, and can prioritize the various approaches based on the efficiency of the various approaches in remediating or mitigating the identified vulnerabilities. The SR tool can recommend one or more of the prioritized approaches based on constraints such as cost, effectiveness, complexity, and the like. Once the one or more of the prioritized approaches are selected, the SR tool can recommend the one or more prioritized approaches to third-party experts for evaluation.
    Type: Grant
    Filed: January 19, 2011
    Date of Patent: August 7, 2018
    Assignee: Rapid7, LLC
    Inventors: Derek M. Abdine, Anastasios Giakouminakis, Chad Loder, Richard D. Li
  • Patent number: 9411965
    Abstract: A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and additional factors that represent the evolving nature of vulnerabilities. Likewise, the security tool can determine an overall risk for vulnerabilities, an asset, and/or a collection of assets that encompasses a global view of an asset's risk and/or collection of assets' risk, business considerations of an entity that own and controls the asset and/or the collection of assets, and the entity's associations.
    Type: Grant
    Filed: September 22, 2015
    Date of Patent: August 9, 2016
    Assignee: Rapid7 LLC
    Inventors: Anastasios Giakouminakis, Sheldon E Malm, Chad Loder, Richard D Li
  • Publication number: 20160012236
    Abstract: A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and additional factors that represent the evolving nature of vulnerabilities. Likewise, the security tool can determine an overall risk for vulnerabilities, an asset, and/or a collection of assets that encompasses a global view of an asset's risk and/or collection of assets' risk, business considerations of an entity that own and controls the asset and/or the collection of assets, and the entity's associations.
    Type: Application
    Filed: September 22, 2015
    Publication date: January 14, 2016
    Inventors: Anastasios Giakouminakis, Sheldon E. Malm, Chad Loder, Richard D. Li
  • Patent number: 9141805
    Abstract: A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and additional factors that represent the evolving nature of vulnerabilities. Likewise, the security tool can determine an overall risk for vulnerabilities, an asset, and/or a collection of assets that encompasses a global view of an asset's risk and/or collection of assets' risk, business considerations of an entity that own and controls the asset and/or the collection of assets, and the entity's associations.
    Type: Grant
    Filed: November 17, 2011
    Date of Patent: September 22, 2015
    Assignee: RAPID7 LLC
    Inventors: Anastasios Giakouminakis, Sheldon E. Malm, Chad Loder, Richard D. Li
  • Patent number: 8819832
    Abstract: Embodiments described herein relate to systems and methods for performing vulnerability scans on virtual machines. The systems and methods comprise a virtual asset tool that can instantiate a vulnerability scanner on a physical machine hosting a set of virtual machines. The vulnerability scanner can scan the virtual machines to identify any vulnerabilities, security flaws, or other risks, and can provide a result of the scan to the virtual asset tool. In embodiments, the virtual asset tool can examine the result of the scan to identify any vulnerabilities resulting from the scan.
    Type: Grant
    Filed: August 26, 2011
    Date of Patent: August 26, 2014
    Assignee: Rapid7, LLC
    Inventors: Richard D. Li, Jeffrey L. Berger, Anastasios Giakouminakis
  • Publication number: 20130074188
    Abstract: A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and additional factors that represent the evolving nature of vulnerabilities. Likewise, the security tool can determine an overall risk for vulnerabilities, an asset, and/or a collection of assets that encompasses a global view of an asset's risk and/or collection of assets' risk, business considerations of an entity that own and controls the asset and/or the collection of assets, and the entity's associations.
    Type: Application
    Filed: November 17, 2011
    Publication date: March 21, 2013
    Inventors: Anastasios Giakouminakis, Sheldon E. Malm, Chad Loder, Richard D. Li
  • Publication number: 20130055246
    Abstract: Embodiments described herein relate to systems and methods for identifying virtual machines in a network. The systems and methods comprise a virtual asset tool that can interface with a virtualization manager to receive metadata identifying virtual machines hosted by a plurality of physical machines. The virtual asset tool can subscribe to updates associated with the virtual machines, such as changes to the virtual machines, or additions or deletions of virtual machines. In response to receiving an update, the virtual asset tool can modify an asset record associated with the virtual machines and any corresponding descriptions. In embodiments, the virtual asset tool can schedule vulnerability scans for any or all of the virtual machines.
    Type: Application
    Filed: August 26, 2011
    Publication date: February 28, 2013
    Inventors: Richard D. Li, Jeffrey L. Berger, Anastasios Giakouminakis
  • Publication number: 20130055398
    Abstract: Embodiments described herein relate to systems and methods for performing vulnerability scans on virtual machines. The systems and methods comprise a virtual asset tool that can instantiate a vulnerability scanner on a physical machine hosting a set of virtual machines. The vulnerability scanner can scan the virtual machines to identify any vulnerabilities, security flaws, or other risks, and can provide a result of the scan to the virtual asset tool. In embodiments, the virtual asset tool can examine the result of the scan to identify any vulnerabilities resulting from the scan.
    Type: Application
    Filed: August 26, 2011
    Publication date: February 28, 2013
    Inventors: Richard D. Li, Jeffrey L. Berger, Anastasios Giakouminakis
  • Publication number: 20120185944
    Abstract: A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine various approaches for remediating or mitigating the identified vulnerabilities, and can prioritize the various approaches based on the efficiency of the various approaches in remediating or mitigating the identified vulnerabilities. The SR tool can recommend one or more of the prioritized approaches based on constraints such as cost, effectiveness, complexity, and the like. Once the one or more of the prioritized approaches are selected, the SR tool can recommend the one or more prioritized approaches to third-party experts for evaluation.
    Type: Application
    Filed: January 19, 2011
    Publication date: July 19, 2012
    Inventors: Derek M. Abdine, Anastasios Giakouminakis, Chad Loder, Richard D. Li