Patents by Inventor Alexander Raitz

Alexander Raitz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11651563
    Abstract: A system and method that allows a user to view objects in a three-dimensional environment, where one or more of the objects have a data display (e.g., a data billboard, etc.) that shows data about the object. To enhance user experience and to provide relevant contextual data as the user navigates through the three-dimensional environment, the system calculates a location for the user and a location for each object and determines if a relationship between the user frame of reference and each object location satisfies a first criterion. If the first criterion is satisfied, the system is configured to move the data display to the bottom of a viewing area of the three-dimensional environment (e.g. docking the data display to the bottom of the viewing area, etc.). The system may also arrange the data displays in the same order as the objects are perceived by the user in the three-dimensional environment.
    Type: Grant
    Filed: February 5, 2021
    Date of Patent: May 16, 2023
    Assignee: SPLUNK INC.
    Inventors: Roy Arsan, Alexander Raitz, Clark Allan, Cary Glen Noel
  • Patent number: 11641372
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: May 27, 2022
    Date of Patent: May 2, 2023
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Patent number: 11363047
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: September 11, 2020
    Date of Patent: June 14, 2022
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Patent number: 11134094
    Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.
    Type: Grant
    Filed: January 30, 2020
    Date of Patent: September 28, 2021
    Assignee: SPLUNK INC.
    Inventors: Munawar Monzy Merza, John Coates, James M Hansen, Lucas Murphey, David Hazekamp, Michael Kinsley, Alexander Raitz
  • Patent number: 11010970
    Abstract: Systems and methods according to various embodiments enable a user to view three-dimensional representations of data objects (“nodes”) within a 3D environment from a first person perspective. The system may be configured to allow the user to interact with the nodes by moving a virtual camera through the 3D environment. The nodes may have one or more attributes that may correspond, respectively, to particular static or dynamic values within the data object's data fields. The attributes may include physical aspects of the nodes, such as color, size, or shape. The system may group related data objects within the 3D environment into clusters that are demarked using one or more cluster designators, which may be in the form of a dome or similar feature that encompasses the related data objects. The system may enable multiple users to access the 3D environment simultaneously, or to record their interactions with the 3D environment.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: May 18, 2021
    Assignee: SPLUNK INC.
    Inventors: Roy Arsan, Alexander Raitz, Clark Allan, Cary Glen Noel
  • Publication number: 20210067535
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Application
    Filed: September 11, 2020
    Publication date: March 4, 2021
    Applicant: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Patent number: 10916063
    Abstract: A system and method that allows a user to view objects in a three-dimensional environment, where one or more of the objects have a data display (e.g., a data billboard, etc.) that shows data about the object. To enhance user experience and to provide relevant contextual data as the user navigates through the three-dimensional environment, the system calculates a location for the user and a location for each object and determines if a relationship between the user frame of reference and each object location satisfies a first criterion. If the first criterion is satisfied, the system is configured to move the data display to the bottom of a viewing area of the three-dimensional environment (e.g. docking the data display to the bottom of the viewing area, etc.). The system may also arrange the data displays in the same order as the objects are perceived by the user in the three-dimensional environment.
    Type: Grant
    Filed: July 18, 2019
    Date of Patent: February 9, 2021
    Assignee: SPLUNK INC.
    Inventors: Roy Arsan, Alexander Raitz, Clark Allan, Cary Glen Noel
  • Patent number: 10810796
    Abstract: Systems and methods according to various embodiments enable a user to view three-dimensional representations of data objects (“nodes”) within a 3D environment from a first person perspective. The system may be configured to allow the user to interact with the nodes by moving a virtual camera through the 3D environment. The nodes may have one or more attributes that may correspond, respectively, to particular static or dynamic values within the data object's data fields. The attributes may include physical aspects of the nodes, such as color, size, or shape. The system may group related data objects within the 3D environment into clusters that are demarked using one or more cluster designators, which may be in the form of a dome or similar feature that encompasses the related data objects. The system may enable multiple users to access the 3D environment simultaneously, or to record their interactions with the 3D environment.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: October 20, 2020
    Assignee: SPLUNK INC.
    Inventors: Roy Arsan, Alexander Raitz, Clark Allan, Cary Glen Noel
  • Patent number: 10778712
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: September 15, 2020
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Patent number: 10740970
    Abstract: Systems and methods according to various embodiments enable a user to view three-dimensional representations of data objects (“nodes”) within a 3D environment from a first person perspective. The system may be configured to allow the user to interact with the nodes by moving a virtual camera through the 3D environment. The nodes may have one or more attributes that may correspond, respectively, to particular static or dynamic values within the data object's data fields. The attributes may include physical aspects of the nodes, such as color, size, or shape. The system may group related data objects within the 3D environment into clusters that are demarked using one or more cluster designators, which may be in the form of a dome or similar feature that encompasses the related data objects. The system may enable multiple users to access the 3D environment simultaneously, or to record their interactions with the 3D environment.
    Type: Grant
    Filed: October 28, 2019
    Date of Patent: August 11, 2020
    Assignee: SPLUNK INC.
    Inventors: Roy Arsan, Alexander Raitz, Clark Allan, Cary Glen Noel
  • Publication number: 20200169579
    Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.
    Type: Application
    Filed: January 30, 2020
    Publication date: May 28, 2020
    Inventors: Munawar Monzy Merza, John Coates, James M. Hansen, Lucas Murphey, David Hazekamp, Michael Kinsley, Alexander Raitz
  • Patent number: 10567412
    Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.
    Type: Grant
    Filed: August 9, 2018
    Date of Patent: February 18, 2020
    Assignee: SPLUNK INC.
    Inventors: Munawar Monzy Merza, John Coates, James M Hansen, Lucas Murphey, David Hazekamp, Michael Kinsley, Alexander Raitz
  • Patent number: 10460519
    Abstract: Systems and methods according to various embodiments enable a user to view three-dimensional representations of data objects (“nodes”) within a 3D environment from a first person perspective. The system may be configured to allow the user to interact with the nodes by moving a virtual camera through the 3D environment. The nodes may have one or more attributes that may correspond, respectively, to particular static or dynamic values within the data object's data fields. The attributes may include physical aspects of the nodes, such as color, size, or shape. The system may group related data objects within the 3D environment into clusters that are demarked using one or more cluster designators, which may be in the form of a dome or similar feature that encompasses the related data objects. The system may enable multiple users to access the 3D environment simultaneously, or to record their interactions with the 3D environment.
    Type: Grant
    Filed: July 30, 2018
    Date of Patent: October 29, 2019
    Assignee: SPLUNK INC.
    Inventors: Roy Arsan, Alexander Raitz, Clark Allan, Cary Glen Noel
  • Patent number: 10403041
    Abstract: Systems and methods according to various embodiments enable a user to view three-dimensional representations of data objects (“nodes”) within a 3D environment from a first person perspective. The system may be configured to allow the user to interact with the nodes by moving a virtual camera through the 3D environment. The nodes may have one or more attributes that may correspond, respectively, to particular static or dynamic values within the data object's data fields. The attributes may include physical aspects of the nodes, such as color, size, or shape. The system may group related data objects within the 3D environment into clusters that are demarked using one or more cluster designators, which may be in the form of a dome or similar feature that encompasses the related data objects. The system may enable multiple users to access the 3D environment simultaneously, or to record their interactions with the 3D environment.
    Type: Grant
    Filed: April 26, 2017
    Date of Patent: September 3, 2019
    Assignee: SPLUNK INC.
    Inventors: Roy Arsan, Alexander Raitz, Clark Allan, Cary Glen Noel
  • Patent number: 10388067
    Abstract: Systems and methods according to various embodiments enable a user to view three-dimensional representations of data objects (“nodes”) within a 3D environment from a first person perspective. The system may be configured to allow the user to interact with the nodes by moving a virtual camera through the 3D environment. The nodes may have one or more attributes that may correspond, respectively, to particular static or dynamic values within the data object's data fields. The attributes may include physical aspects of the nodes, such as color, size, or shape. The system may group related data objects within the 3D environment into clusters that are demarked using one or more cluster designators, which may be in the form of a dome or similar feature that encompasses the related data objects. The system may enable multiple users to access the 3D environment simultaneously, or to record their interactions with the 3D environment.
    Type: Grant
    Filed: April 26, 2017
    Date of Patent: August 20, 2019
    Assignee: SPLUNK INC.
    Inventors: Roy Arsan, Alexander Raitz, Clark Allan, Cary Glen Noel
  • Patent number: 10380799
    Abstract: A system and method that allows a user to view objects in a three-dimensional environment, where one or more of the objects have a data display (e.g., a data billboard, etc.) that shows data about the object. To enhance user experience and to provide relevant contextual data as the user navigates through the three-dimensional environment, the system calculates a location for the user and a location for each object and determines if a relationship between the user frame of reference and each object location satisfies a first criterion. If the first criterion is satisfied, the system is configured to move the data display to the bottom of a viewing area of the three-dimensional environment (e.g. docking the data display to the bottom of the viewing area, etc.). The system may also arrange the data displays in the same order as the objects are perceived by the user in the three-dimensional environment.
    Type: Grant
    Filed: April 30, 2014
    Date of Patent: August 13, 2019
    Assignee: SPLUNK INC.
    Inventors: Roy Arsan, Alexander Raitz, Clark Allan, Cary Glen Noel
  • Publication number: 20190166146
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Application
    Filed: January 31, 2019
    Publication date: May 30, 2019
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Patent number: 10250628
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: April 2, 2019
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Patent number: 10204450
    Abstract: Systems and methods according to various embodiments enable a user to view three-dimensional representations of data objects (“nodes”) within a 3D environment from a first person perspective. The system may be configured to allow the user to interact with the nodes by moving a virtual camera through the 3D environment. The nodes may have one or more attributes that may correspond, respectively, to particular static or dynamic values within the data object's data fields. The attributes may include physical aspects of the nodes, such as color, size, or shape. The system may group related data objects within the 3D environment into clusters that are demarked using one or more cluster designators, which may be in the form of a dome or similar feature that encompasses the related data objects. The system may enable multiple users to access the 3D environment simultaneously, or to record their interactions with the 3D environment.
    Type: Grant
    Filed: April 30, 2018
    Date of Patent: February 12, 2019
    Assignee: SPLUNK INC.
    Inventors: Roy Arsan, Alexander Raitz, Clark Allan, Cary Glen Noel
  • Publication number: 20180351983
    Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.
    Type: Application
    Filed: August 9, 2018
    Publication date: December 6, 2018
    Inventors: Munawar Monzy Merza, John Coates, James M Hansen, Lucas Murphey, David Hazekamp, Michael Kinsely, Alexander Raitz