Patents by Inventor Richard D. Li
Richard D. Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11979434Abstract: A system and a method for secure operator onboarding and creating an ingest job agent for secure multitenant operations of a distributed computing cluster are provided. Embodiments automate multitenant operations for distributed computing clusters. These operations include automation of operator onboarding, creation of logically segregated distributed data stores within the distributed computing clusters for the on-boarded operator, and creation of ingest agents with security isolation for transfer of large quantities of files into the distributed computing clusters. Embodiments provide multitenant security, in which the same Hadoop cluster serves multiple operators with each operator's data and processes in effective isolation. In this manner, multitenant security keeps each user's data storage and operations on the Hadoop cluster separated from other operators.Type: GrantFiled: June 24, 2021Date of Patent: May 7, 2024Assignee: NORTHROP GRUMMAN SYSTEMS CORPORATIONInventors: Leon D. Li, Tyson Solberg, Christopher Lock, Richard Vitek
-
Patent number: 11957894Abstract: A neuromodulation therapy is delivered via at least one electrode implanted subcutaneously and superficially to a fascia layer superficial to a nerve of a patient. In one example, an implantable medical device is deployed along a superficial surface of a deep fascia tissue layer superficial to a nerve of a patient. Electrical stimulation energy is delivered to the nerve through the deep fascia tissue layer via implantable medical device electrodes.Type: GrantFiled: August 25, 2020Date of Patent: April 16, 2024Assignee: Medtronic, Inc.Inventors: Anthony M. Chasensky, Bernard Q. Li, Brad C. Tischendorf, Chris J. Paidosh, Christian S. Nielsen, Craig L. Schmidt, David A. Dinsmoor, Duane L. Bourget, Eric H. Bonde, Erik R. Scott, Forrest C M Pape, Gabriela C. Molnar, Gordon O. Munns, Joel A. Anderson, John E. Kast, Joseph J. Viavattine, Markus W. Reiterer, Michael J. Ebert, Phillip C. Falkner, Prabhakar A. Tamirisa, Randy S. Roles, Reginald D. Robinson, Richard T. Stone, Shawn C. Kelley, Stephen J. Roddy, Thomas P. Miltich, Timothy J. Denison, Todd V. Smith, Xuan K. Wei
-
Patent number: 11957893Abstract: A neuromodulation therapy is delivered via at least one electrode implanted subcutaneously and superficially to a fascia layer superficial to a nerve of a patient. In one example, an implantable medical device is deployed along a superficial surface of a deep fascia tissue layer superficial to a nerve of a patient. Electrical stimulation energy is delivered to the nerve through the deep fascia tissue layer via implantable medical device electrodes.Type: GrantFiled: August 25, 2020Date of Patent: April 16, 2024Assignee: Medtronic, Inc.Inventors: Brad C. Tischendorf, John E. Kast, Thomas P. Miltich, Gordon O. Munns, Randy S. Roles, Craig L. Schmidt, Joseph J. Viavattine, Christian S. Nielsen, Prabhakar A. Tamirisa, Anthony M. Chasensky, Markus W. Reiterer, Chris J. Paidosh, Reginald D. Robinson, Bernard Q. Li, Erik R. Scott, Phillip C. Falkner, Xuan K. Wei, Eric H. Bonde, David A. Dinsmoor, Duane L. Bourget, Forrest C M Pape, Gabriela C. Molnar, Joel A. Anderson, Michael J. Ebert, Richard T. Stone, Shawn C. Kelley, Stephen J. Roddy, Timothy J. Denison, Todd V. Smith
-
Publication number: 20230047978Abstract: A system and method for real-time configuration analysis employs a source code management event listener and a remote server to receive a proposed configuration change event, retrieve a real-time server configuration, determine the effect of a requested change associated with the proposed configuration change event and report an impact of the requested change. In various embodiments, the impact is reported in a user’s interface associated with a source code manager enabling a user to apply the requested change into production if appropriate or seek to resolve a problem as reported before the change is effectuated into production.Type: ApplicationFiled: August 15, 2022Publication date: February 16, 2023Inventors: Richard D. Li, Alix Cook, Bjorn N. Freeaman-Benson
-
Patent number: 10546134Abstract: A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine various approaches for remediating or mitigating the identified vulnerabilities, and can prioritize the various approaches based on the efficiency of the various approaches in remediating or mitigating the identified vulnerabilities. The SR tool can recommend one or more of the prioritized approaches based on constraints such as cost, effectiveness, complexity, and the like. Once the one or more of the prioritized approaches are selected, the SR tool can recommend the one or more prioritized approaches to third-party experts for evaluation.Type: GrantFiled: August 3, 2018Date of Patent: January 28, 2020Assignee: Rapid7, Inc.Inventors: Derek M Abdine, Anastasios Giakouminakis, Chad Loder, Richard D. Li
-
Patent number: 10437620Abstract: Embodiments described herein relate to systems and methods for identifying virtual machines in a network. The systems and methods comprise a virtual asset tool that can interface with a virtualization manager to receive metadata identifying virtual machines hosted by a plurality of physical machines. The virtual asset tool can subscribe to updates associated with the virtual machines, such as changes to the virtual machines, or additions or deletions of virtual machines. In response to receiving an update, the virtual asset tool can modify an asset record associated with the virtual machines and any corresponding descriptions. In embodiments, the virtual asset tool can schedule vulnerability scans for any or all of the virtual machines.Type: GrantFiled: August 26, 2011Date of Patent: October 8, 2019Assignee: RAPID7, INC.Inventors: Richard D. Li, Jeffrey L. Berger, Anastasios Giakouminakis
-
Publication number: 20190034640Abstract: A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine various approaches for remediating or mitigating the identified vulnerabilities, and can prioritize the various approaches based on the efficiency of the various approaches in remediating or mitigating the identified vulnerabilities. The SR tool can recommend one or more of the prioritized approaches based on constraints such as cost, effectiveness, complexity, and the like. Once the one or more of the prioritized approaches are selected, the SR tool can recommend the one or more prioritized approaches to third-party experts for evaluation.Type: ApplicationFiled: August 3, 2018Publication date: January 31, 2019Inventors: Derek M. Abdine, Anastasios Giakouminakis, Chad Loder, Richard D. Li
-
Patent number: 10043011Abstract: A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine various approaches for remediating or mitigating the identified vulnerabilities, and can prioritize the various approaches based on the efficiency of the various approaches in remediating or mitigating the identified vulnerabilities. The SR tool can recommend one or more of the prioritized approaches based on constraints such as cost, effectiveness, complexity, and the like. Once the one or more of the prioritized approaches are selected, the SR tool can recommend the one or more prioritized approaches to third-party experts for evaluation.Type: GrantFiled: January 19, 2011Date of Patent: August 7, 2018Assignee: Rapid7, LLCInventors: Derek M. Abdine, Anastasios Giakouminakis, Chad Loder, Richard D. Li
-
Patent number: 9411965Abstract: A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and additional factors that represent the evolving nature of vulnerabilities. Likewise, the security tool can determine an overall risk for vulnerabilities, an asset, and/or a collection of assets that encompasses a global view of an asset's risk and/or collection of assets' risk, business considerations of an entity that own and controls the asset and/or the collection of assets, and the entity's associations.Type: GrantFiled: September 22, 2015Date of Patent: August 9, 2016Assignee: Rapid7 LLCInventors: Anastasios Giakouminakis, Sheldon E Malm, Chad Loder, Richard D Li
-
Publication number: 20160012236Abstract: A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and additional factors that represent the evolving nature of vulnerabilities. Likewise, the security tool can determine an overall risk for vulnerabilities, an asset, and/or a collection of assets that encompasses a global view of an asset's risk and/or collection of assets' risk, business considerations of an entity that own and controls the asset and/or the collection of assets, and the entity's associations.Type: ApplicationFiled: September 22, 2015Publication date: January 14, 2016Inventors: Anastasios Giakouminakis, Sheldon E. Malm, Chad Loder, Richard D. Li
-
Patent number: 9141805Abstract: A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and additional factors that represent the evolving nature of vulnerabilities. Likewise, the security tool can determine an overall risk for vulnerabilities, an asset, and/or a collection of assets that encompasses a global view of an asset's risk and/or collection of assets' risk, business considerations of an entity that own and controls the asset and/or the collection of assets, and the entity's associations.Type: GrantFiled: November 17, 2011Date of Patent: September 22, 2015Assignee: RAPID7 LLCInventors: Anastasios Giakouminakis, Sheldon E. Malm, Chad Loder, Richard D. Li
-
Patent number: 8819832Abstract: Embodiments described herein relate to systems and methods for performing vulnerability scans on virtual machines. The systems and methods comprise a virtual asset tool that can instantiate a vulnerability scanner on a physical machine hosting a set of virtual machines. The vulnerability scanner can scan the virtual machines to identify any vulnerabilities, security flaws, or other risks, and can provide a result of the scan to the virtual asset tool. In embodiments, the virtual asset tool can examine the result of the scan to identify any vulnerabilities resulting from the scan.Type: GrantFiled: August 26, 2011Date of Patent: August 26, 2014Assignee: Rapid7, LLCInventors: Richard D. Li, Jeffrey L. Berger, Anastasios Giakouminakis
-
Publication number: 20130074188Abstract: A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and additional factors that represent the evolving nature of vulnerabilities. Likewise, the security tool can determine an overall risk for vulnerabilities, an asset, and/or a collection of assets that encompasses a global view of an asset's risk and/or collection of assets' risk, business considerations of an entity that own and controls the asset and/or the collection of assets, and the entity's associations.Type: ApplicationFiled: November 17, 2011Publication date: March 21, 2013Inventors: Anastasios Giakouminakis, Sheldon E. Malm, Chad Loder, Richard D. Li
-
Publication number: 20130055246Abstract: Embodiments described herein relate to systems and methods for identifying virtual machines in a network. The systems and methods comprise a virtual asset tool that can interface with a virtualization manager to receive metadata identifying virtual machines hosted by a plurality of physical machines. The virtual asset tool can subscribe to updates associated with the virtual machines, such as changes to the virtual machines, or additions or deletions of virtual machines. In response to receiving an update, the virtual asset tool can modify an asset record associated with the virtual machines and any corresponding descriptions. In embodiments, the virtual asset tool can schedule vulnerability scans for any or all of the virtual machines.Type: ApplicationFiled: August 26, 2011Publication date: February 28, 2013Inventors: Richard D. Li, Jeffrey L. Berger, Anastasios Giakouminakis
-
Publication number: 20130055398Abstract: Embodiments described herein relate to systems and methods for performing vulnerability scans on virtual machines. The systems and methods comprise a virtual asset tool that can instantiate a vulnerability scanner on a physical machine hosting a set of virtual machines. The vulnerability scanner can scan the virtual machines to identify any vulnerabilities, security flaws, or other risks, and can provide a result of the scan to the virtual asset tool. In embodiments, the virtual asset tool can examine the result of the scan to identify any vulnerabilities resulting from the scan.Type: ApplicationFiled: August 26, 2011Publication date: February 28, 2013Inventors: Richard D. Li, Jeffrey L. Berger, Anastasios Giakouminakis
-
Publication number: 20120185944Abstract: A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine various approaches for remediating or mitigating the identified vulnerabilities, and can prioritize the various approaches based on the efficiency of the various approaches in remediating or mitigating the identified vulnerabilities. The SR tool can recommend one or more of the prioritized approaches based on constraints such as cost, effectiveness, complexity, and the like. Once the one or more of the prioritized approaches are selected, the SR tool can recommend the one or more prioritized approaches to third-party experts for evaluation.Type: ApplicationFiled: January 19, 2011Publication date: July 19, 2012Inventors: Derek M. Abdine, Anastasios Giakouminakis, Chad Loder, Richard D. Li