Patents by Inventor Bryan S. Inagaki
Bryan S. Inagaki has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11720687Abstract: Various methods, apparatuses/systems, and media for managing vulnerability data are provided. A processor allows ingestion of vulnerability data from an external database into a local database which then makes the vulnerability data available for review via a graphical user interface (GUI). The processor also compares a risk score associated with each vulnerability included in the vulnerability data to a predefined threshold value; modifies, based on a determination that the risk score exceeds the predefined threshold value, the risk score by receiving user input via the GUI in accordance with risk information applicable to systems managed and operated by an organization; and updates a list of vulnerabilities of the vulnerability data stored in the local database by supplementing with the modified risk score without overwriting the risk score associated with each vulnerability initially received from the external database.Type: GrantFiled: November 17, 2022Date of Patent: August 8, 2023Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Bryan S. Inagaki, Christopher Sansone, Ainsley G. Rattray
-
Patent number: 11645396Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking.Type: GrantFiled: August 6, 2021Date of Patent: May 9, 2023Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Bryan S. Inagaki, Martin Dawson, Andrew Graham, Ramiro Rodney Murgueytio, David J. Robinson, Ajay D. Vachhani, Travis Washburn
-
Publication number: 20230072258Abstract: Various methods, apparatuses/systems, and media for managing vulnerability data are provided. A processor allows ingestion of vulnerability data from an external database into a local database which then makes the vulnerability data available for review via a graphical user interface (GUI). The processor also compares a risk score associated with each vulnerability included in the vulnerability data to a predefined threshold value; modifies, based on a determination that the risk score exceeds the predefined threshold value, the risk score by receiving user input via the GUI in accordance with risk information applicable to systems managed and operated by an organization; and updates a list of vulnerabilities of the vulnerability data stored in the local database by supplementing with the modified risk score without overwriting the risk score associated with each vulnerability initially received from the external database.Type: ApplicationFiled: November 17, 2022Publication date: March 9, 2023Applicant: JPMorgan Chase Bank, N.A.Inventors: Bryan S. INAGAKI, Christopher SANSONE, Ainsley G. RATTRAY
-
Patent number: 11531762Abstract: Various methods, apparatuses/systems, and media for managing vulnerability data are provided. A processor allows ingestion of vulnerability data from an external database into a local database which then makes the vulnerability data available for review via a graphical user interface (GUI). The processor also compares a risk score associated with each vulnerability included in the vulnerability data to a predefined threshold value; modifies, based on a determination that the risk score exceeds the predefined threshold value, the risk score by receiving user input via the GUI in accordance with risk information applicable to systems managed and operated by an organization; and updates a list of vulnerabilities of the vulnerability data stored in the local database by supplementing with the modified risk score without overwriting the risk score associated with each vulnerability initially received from the external database.Type: GrantFiled: August 8, 2019Date of Patent: December 20, 2022Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Bryan S. Inagaki, Christopher Sansone, Ainsley G. Rattray
-
Publication number: 20210374250Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking.Type: ApplicationFiled: August 6, 2021Publication date: December 2, 2021Applicant: JPMorgan Chase Bank, N.A.Inventors: Bryan S. INAGAKI, Martin DAWSON, Andrew GRAHAM, Ramiro Rodney MURGUEYTIO, David J. ROBINSON, Ajay D. VACHHANI, Travis WASHBURN
-
Patent number: 11120139Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking.Type: GrantFiled: June 19, 2019Date of Patent: September 14, 2021Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Bryan S. Inagaki, Martin Dawson, Andrew Graham, Ramiro Rodney Murgueytio, David J. Robinson, Ajay D. Vachhani, Travis Washburn
-
Publication number: 20200050770Abstract: Various methods, apparatuses/systems, and media for managing vulnerability data are provided. A processor allows ingestion of vulnerability data from an external database into a local database which then makes the vulnerability data available for review via a graphical user interface (GUI). The processor also compares a risk score associated with each vulnerability included in the vulnerability data to a predefined threshold value; modifies, based on a determination that the risk score exceeds the predefined threshold value, the risk score by receiving user input via the GUI in accordance with risk information applicable to systems managed and operated by an organization; and updates a list of vulnerabilities of the vulnerability data stored in the local database by supplementing with the modified risk score without overwriting the risk score associated with each vulnerability initially received from the external database.Type: ApplicationFiled: August 8, 2019Publication date: February 13, 2020Applicant: JPMorgan Chase Bank, N.A.Inventors: Bryan S. INAGAKI, Christopher SANSONE, Ainsley G. RATTRAY
-
Publication number: 20190362078Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking.Type: ApplicationFiled: June 19, 2019Publication date: November 28, 2019Applicant: JPMorgan Chase Bank, N.A.Inventors: Bryan S. INAGAKI, Martin DAWSON, Andrew GRAHAM, Ramiro Rodney MURGUEYTIO, David J. ROBINSON, Ajay D. VACHHANI, Travis WASHBURN
-
Patent number: 10372915Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining a severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking and prioritizing remediation of the vulnerabilities based on the two-dimensional risk ranking.Type: GrantFiled: July 26, 2017Date of Patent: August 6, 2019Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Bryan S. Inagaki, Martin Dawson, Andrew Graham, Ramiro R. Murgueytio, David J. Robinson, Ajay D. Vachhani, Travis Washburn