Patents by Inventor Richard Reybok

Richard Reybok has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190342316
    Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.
    Type: Application
    Filed: May 21, 2019
    Publication date: November 7, 2019
    Inventors: Kurt Joseph Zettel, II, Richard Reybok, JR., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
  • Publication number: 20190268354
    Abstract: Providing are incident response techniques useful for personas with a variety of experience levels are described. The incident response techniques include a graphical user interface (GUI) for providing a variety of different views for different personas. The graphical user interface may provide a landing page for providing a queue of risk-score prioritized incidents, an incident playbook for providing default or customizable instructions for resolving a particular incident to lesser-experienced personas, an explore container for facilitating efficient navigation of data associated with a particular incident by more-experienced personas, and an activity stream container for providing an overview of activities that have been performed with regard to a particular incident to more-experienced or supervising personas. The explore container may also be integrated with tools for performing actions with the data without leaving the graphical user interface.
    Type: Application
    Filed: February 27, 2018
    Publication date: August 29, 2019
    Inventors: Kurt Joseph Zettel, II, Scott Alan Lewis, James Erbes, Richard Reybok, Harold Byun, Ryan Currier, Michel Abou Samah, Sachin Nayak, Patrice Tollenaere, Zhe Wang
  • Patent number: 10333960
    Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.
    Type: Grant
    Filed: May 3, 2017
    Date of Patent: June 25, 2019
    Assignee: SERVICENOW, INC.
    Inventors: Kurt Joseph Zettel, II, Richard Reybok, Jr., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
  • Publication number: 20190104156
    Abstract: Systems and methods for configuration vulnerability checking and remediation are provided. The systems provided herein map vulnerability data with compliance data, such that automated compliance indication may be facilitated.
    Type: Application
    Filed: November 16, 2017
    Publication date: April 4, 2019
    Inventors: David Barkovic, Cresta Kirkwood, Lal Narayanasamy, Anushree Randad, Clifford Huntington, Richard Reybok, Harold Byun
  • Publication number: 20190034626
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Application
    Filed: October 3, 2018
    Publication date: January 31, 2019
    Inventors: Richard Reybok, Andreis Seip Haugsnes, Kurt Joseph Zettel, II, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Publication number: 20180324207
    Abstract: Systems and methods are disclosed for obtaining network security threat information and mitigating threats to improve computing network operations. For example, methods may include receiving a message from a central instance; from outside of a private network, invoking a search of data associated with the private network, wherein the search is based on the message and the search is performed by an agent device within the private network; receiving a search result of the search from the agent device; transmitting the search result to the central instance, wherein the central instance is configured to generate network security threat information based in part on the search result and share the network security threat information with a plurality of customer instances that are associated with a group of customers; and receiving an alert message from the central instance, wherein the alert message includes information that identifies a network security threat.
    Type: Application
    Filed: May 5, 2017
    Publication date: November 8, 2018
    Inventors: Richard Reybok, JR., Kurt Joseph Zettel, II, Phillip Dicorpo, Simon N. Allen, Amit Sharma, Giora Tamir
  • Publication number: 20180324197
    Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.
    Type: Application
    Filed: May 3, 2017
    Publication date: November 8, 2018
    Inventors: Kurt Joseph Zettel, II, Richard Reybok, JR., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
  • Publication number: 20180322107
    Abstract: An embodiment may involve transmitting, to a first client device, a representation of a first graphical user interface. The first graphical user interface may define fillable web-based forms. The embodiment may involve receiving, from the first client device, a first submission of the fillable web-based forms. The embodiment may involve transmitting, to a second client device, a representation of a second graphical user interface. The second graphical user interface may allow the second client device to fill out the fillable web-based forms. The embodiment may further involve receiving, from the second client device, a second submission of the fillable web-based forms. The embodiment may further involve determining numerical scores associated with each of the fillable web-based forms. The embodiment may also involve transmitting a representation of a third graphical user interface. The third graphical user interface may show the fillable web-based forms and their respective numerical scores.
    Type: Application
    Filed: May 5, 2017
    Publication date: November 8, 2018
    Inventors: Harold Byun, Richard Reybok, JR., David Barkovic, Vivian Gopico Tero
  • Patent number: 10032020
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Grant
    Filed: July 17, 2017
    Date of Patent: July 24, 2018
    Assignee: ServiceNow, Inc.
    Inventors: Richard Reybok, Andreis Seip Haugsnes, Kurt Joseph Zettel, II, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Publication number: 20170316203
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Application
    Filed: July 17, 2017
    Publication date: November 2, 2017
    Inventors: Richard Reybok, Andreis Seip Haugsnes, Kurt Joseph Zettel, II, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Patent number: 9710644
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Grant
    Filed: February 5, 2015
    Date of Patent: July 18, 2017
    Assignee: ServiceNow, Inc.
    Inventors: Richard Reybok, Andreas Seip Haugsnes, Kurt Joseph Zettel, II, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Publication number: 20170171231
    Abstract: Systems and methods are disclosed for computer network threat assessment. For example, methods may include receiving from client networks respective threat data and storing the respective threat data in a security event database; maintaining affiliations for groups of the client networks; detecting correlation between a network threat and one of the groups; identifying an indicator associated with the network threat, and, dependent on the affiliation for the group, identifying a client network and generating a message, which conveys an alert to the client network, comprising the indicator; responsive to the message, receiving, from the client network, a report of detected correlation between the indicator and security event data maintained by the client network; and updating the security event database responsive to the report of detected correlation.
    Type: Application
    Filed: December 9, 2016
    Publication date: June 15, 2017
    Inventors: Richard Reybok, JR., Jeffrey Rhines, Kurt Joseph Zettel, II, Henry Geddes
  • Patent number: 9286568
    Abstract: Technologies for wireless device battery analysis and prediction are disclosed.
    Type: Grant
    Filed: May 3, 2013
    Date of Patent: March 15, 2016
    Assignee: Asurion, LLC
    Inventors: Jeffrey Rhines, Cory Adams, Glen Tregoning, Heather Lee Wilson, Michael Ballou, Christopher Morgan, Nathanial Beck, Richard Reybok, Shawn O'Donnell, Lindsay Thompson
  • Publication number: 20150207813
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Application
    Filed: February 5, 2015
    Publication date: July 23, 2015
    Inventors: Richard Reybok, Andreas Seip Haugsnes, Kurt Joseph Zettel, II, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Publication number: 20150161633
    Abstract: Technologies related to data analysis and reporting are disclosed. Data is gathered from multiple social media sources, including gathering data related to issues that users are experiencing related to the use of a deployed device. Trending data is identified based at least in part on an analysis of the gathered data. The trending data is classified into categories. Data similarity between the trending data in a respective category is measured to create groups. Groups and information related to issues associated with a given group are reported.
    Type: Application
    Filed: December 6, 2013
    Publication date: June 11, 2015
    Applicant: Asurion, LLC
    Inventors: Cory Adams, Jeffrey Rhines, Richard Reybok
  • Publication number: 20150148007
    Abstract: Technologies related to mobile communication devices are disclosed. A mobile communication device is identified, including identifying a unique identifier associated with the mobile communication device. An application is stored in firmware of the mobile communication device. The application is executed at boot-up and periodically when the mobile communication device is operating. Executing the application includes checking with a service to ensure that the mobile communication device is confirmed to be operational, including providing the unique identifier to the service. A confirmation is received that the mobile communication device is confirmed to be operational, and when so, waiting until a next check time for further processing. Upon receiving an indication that the device is confirmed to no longer be operational, a script is executed that locks the device, including creating a password, locking the mobile communication device with the password, and disabling a USB port that is included in the device.
    Type: Application
    Filed: November 25, 2013
    Publication date: May 28, 2015
    Applicant: Asurion, LLC
    Inventors: Joshua M. Mitchell, Richard Reybok, Michael Ballou
  • Patent number: 8805764
    Abstract: Technologies for wireless device battery analysis and prediction are disclosed. A described technology includes collecting wireless device information including battery drain information relating to a battery of a wireless device; determining, based on the collected wireless device information, a plurality of prediction outcomes corresponding respectively to a plurality of different battery usage prediction models; determining accuracies respectively for the battery usage prediction models; generating weight values respectively for the battery usage prediction models based on the determined accuracies; and generating a battery prediction result for the wireless device based on the prediction outcomes and the generated weight values.
    Type: Grant
    Filed: October 1, 2013
    Date of Patent: August 12, 2014
    Assignee: Asurion, LLC
    Inventors: Jeffrey Rhines, Cory Adams, Glen Tregoning, Heather Lee Wilson, Michael Ballou, Christopher Morgan, Nathanial Beck, Richard Reybok, Shawn O'Donnell, Lindsay Thompson