Patents by Inventor Fredi Jaramillo
Fredi Jaramillo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11368366Abstract: Embodiments of the present invention provide for group policy object (GPO) update compliance. A method for GPO update compliance includes selecting both a compliance update and also a computing system as an endpoint targeted for receiving the compliance update, directing execution of a remediation process that applies the compliance update onto the selected endpoint and performing a re-scan of the selected endpoint subsequent to the execution of the remediation process. The method further includes executing a GPO update within a threshold period of time after the re-scan and repeating the re-scan after the GPO update and then comparing a log produced by the repeated re-scan after the GPO update with a log produced by the re-scan before the GPO update, detecting an out-of-compliance update in the comparison and responding to the out-of-compliance update by directing a repair of the out-of-compliance update using a domain login for the selected endpoint.Type: GrantFiled: December 29, 2020Date of Patent: June 21, 2022Assignee: Steelcloud, Inc.Inventors: Brian H. Hajost, Fredi Jaramillo, Matthew Heimlich
-
Publication number: 20210119873Abstract: Embodiments of the present invention provide for group policy object (GPO) update compliance. A method for GPO update compliance includes selecting both a compliance update and also a computing system as an endpoint targeted for receiving the compliance update, directing execution of a remediation process that applies the compliance update onto the selected endpoint and performing a re-scan of the selected endpoint subsequent to the execution of the remediation process. The method further includes executing a GPO update within a threshold period of time after the re-scan and repeating the re-scan after the GPO update and then comparing a log produced by the repeated re-scan after the GPO update with a log produced by the re-scan before the GPO update, detecting an out-of-compliance update in the comparison and responding to the out-of-compliance update by directing a repair of the out-of-compliance update using a domain login for the selected endpoint.Type: ApplicationFiled: December 29, 2020Publication date: April 22, 2021Inventors: Brian H. Hajost, Fredi Jaramillo, Matthew Heimlich
-
Patent number: 10880171Abstract: Embodiments of the present invention provide for group policy object (GPO) update compliance. A method for GPO update compliance includes selecting both a compliance update and also a computing system as an endpoint targeted for receiving the compliance update, directing execution of a remediation process that applies the compliance update onto the selected endpoint and performing a re-scan of the selected endpoint subsequent to the execution of the remediation process. The method further includes executing a GPO update within a threshold period of time after the re-scan and repeating the re-scan after the GPO update and then comparing a log produced by the repeated re-scan after the GPO update with a log produced by the re-scan before the GPO update, detecting an out-of-compliance update in the comparison and responding to the out-of-compliance update by directing a repair of the out-of-compliance update using a domain login for the selected endpoint.Type: GrantFiled: September 9, 2018Date of Patent: December 29, 2020Assignee: STEELCLOUD, LLCInventors: Brian H. Hajost, Fredi Jaramillo, Matthew Heimlich
-
Publication number: 20200084105Abstract: Embodiments of the present invention provide for group policy object (GPO) update compliance. A method for GPO update compliance includes selecting both a compliance update and also a computing system as an endpoint targeted for receiving the compliance update, directing execution of a remediation process that applies the compliance update onto the selected endpoint and performing a re-scan of the selected endpoint subsequent to the execution of the remediation process. The method further includes executing a GPO update within a threshold period of time after the re-scan and repeating the re-scan after the GPO update and then comparing a log produced by the repeated re-scan after the GPO update with a log produced by the re-scan before the GPO update, detecting an out-of-compliance update in the comparison and responding to the out-of-compliance update by directing a repair of the out-of-compliance update using a domain login for the selected endpoint.Type: ApplicationFiled: September 9, 2018Publication date: March 12, 2020Inventors: Brian Hajost, Fredi Jaramillo, Matthew Heimlich
-
Patent number: 10341303Abstract: Embodiments of the present invention provide for a method, system, and apparatus for creating a publishable computer file. The method includes selecting a first computer file encapsulating a source security policy for a computing device and creating a second computer file using the source security policy of the first computer file to create a local security policy and to encapsulate the created local security policy and also an operating system security policy. The method further includes calculating a hash value for the second computer file and storing the hash value in a header for the second computer file. The method yet further includes encrypting the second computer file, wherein the encrypted second computer file once loaded into memory of the computing device is processed by the computing device.Type: GrantFiled: December 8, 2016Date of Patent: July 2, 2019Assignee: STEELCLOUD, LLCInventors: Brian H. Hajost, Fredi Jaramillo, Bao Nguyen
-
Patent number: 10044742Abstract: Embodiments of the present invention provide a method, system, and computer program product for debugging a computer environment. In an embodiment of the invention, an anomaly is detected in a computing environment of multiple different computing devices disposed in multiple different network domains. Thereafter, administrative network privileges to access the multiple different network domains are acquired and existing resources in the computing environment are identified. Additionally, a signature file is loaded into a memory of the computer, where the signature file denotes infrastructure requirements of the computing environment, and the existing resources and the infrastructure requirements denoted in the signature file are compared to determine whether a disparity exists between the existing resources and the infrastructure requirements.Type: GrantFiled: November 28, 2017Date of Patent: August 7, 2018Assignee: STEELCLOUD, LLCInventors: Bao Nguyen, Fredi Jaramillo, Brian H. Hajost
-
Patent number: 9954900Abstract: Embodiments of the present invention provide for a method, system, and apparatus for creating a publishable computer file. The method includes selecting a first computer file encapsulating a source security policy for a computing device and creating a second computer file using the source security policy of the first computer file to create a local security policy and to encapsulate the created local security policy and also an operating system security policy. The method further includes calculating a hash value for the second computer file and storing the hash value in a header for the second computer file. The method yet further includes encrypting the second computer file, wherein the encrypted second computer file once loaded into memory of the computing device is processed by the computing device.Type: GrantFiled: June 13, 2016Date of Patent: April 24, 2018Assignee: STEELCLOUD, LLCInventors: Brian H. Hajost, Fredi Jaramillo
-
Publication number: 20180083998Abstract: Embodiments of the present invention provide a method, system, and computer program product for debugging a computer environment. In an embodiment of the invention, an anomaly is detected in a computing environment of multiple different computing devices disposed in multiple different network domains. Thereafter, administrative network privileges to access the multiple different network domains are acquired and existing resources in the computing environment are identified. Additionally, a signature file is loaded into a memory of the computer, where the signature file denotes infrastructure requirements of the computing environment, and the existing resources and the infrastructure requirements denoted in the signature file are compared to determine whether a disparity exists between the existing resources and the infrastructure requirements.Type: ApplicationFiled: November 28, 2017Publication date: March 22, 2018Applicant: SteelCloud, LLCInventors: Bao Nguyen, Fredi Jaramillo, Brian H. Hajost
-
Patent number: 9853990Abstract: Embodiments of the present invention provide a method, system, and computer program product for debugging a computer environment. In an embodiment of the invention, an anomaly is detected in a computing environment of multiple different computing devices disposed in multiple different network domains. Thereafter, administrative network privileges to access the multiple different network domains are acquired and existing resources in the computing environment are identified. Additionally, a signature file is loaded into a memory of the computer, where the signature file denotes infrastructure requirements of the computing environment, and the existing resources and the infrastructure requirements denoted in the signature file are compared to determine whether a disparity exists between the existing resources and the infrastructure requirements.Type: GrantFiled: March 29, 2016Date of Patent: December 26, 2017Assignee: SteelCloud, LLCInventors: Bao Nguyen, Fredi Jaramillo, Brian H. Hajost
-
Publication number: 20170093813Abstract: Embodiments of the present invention provide for a method, system, and apparatus for creating a publishable computer file. The method includes selecting a first computer file encapsulating a source security policy for a computing device and creating a second computer file using the source security policy of the first computer file to create a local security policy and to encapsulate the created local security policy and also an operating system security policy. The method further includes calculating a hash value for the second computer file and storing the hash value in a header for the second computer file. The method yet further includes encrypting the second computer file, wherein the encrypted second computer file once loaded into memory of the computing device is processed by the computing device.Type: ApplicationFiled: December 8, 2016Publication date: March 30, 2017Inventors: Brian H. Hajost, Fredi Jaramillo, Bao Nguyen
-
Publication number: 20160301715Abstract: Embodiments of the present invention provide for a method, system, and apparatus for creating a publishable computer file. The method includes selecting a first computer file encapsulating a source security policy for a computing device and creating a second computer file using the source security policy of the first computer file to create a local security policy and to encapsulate the created local security policy and also an operating system security policy. The method further includes calculating a hash value for the second computer file and storing the hash value in a header for the second computer file. The method yet further includes encrypting the second computer file, wherein the encrypted second computer file once loaded into memory of the computing device is processed by the computing device.Type: ApplicationFiled: June 13, 2016Publication date: October 13, 2016Inventors: Brian H. Hajost, Fredi Jaramillo
-
Publication number: 20160212164Abstract: Embodiments of the present invention provide a method, system, and computer program product for debugging a computer environment. In an embodiment of the invention, an anomaly is detected in a computing environment of multiple different computing devices disposed in multiple different network domains. Thereafter, administrative network privileges to access the multiple different network domains are acquired and existing resources in the computing environment are identified. Additionally, a signature file is loaded into a memory of the computer, where the signature file denotes infrastructure requirements of the computing environment, and the existing resources and the infrastructure requirements denoted in the signature file are compared to determine whether a disparity exists between the existing resources and the infrastructure requirements.Type: ApplicationFiled: March 29, 2016Publication date: July 21, 2016Applicant: SteelCloud, LLCInventors: Bao Nguyen, Fredi Jaramillo, Brian H. Hajost
-
Patent number: 9367699Abstract: Embodiments of the present invention provide for a method, system, and apparatus for creating a publishable computer file. The method includes selecting a first computer file encapsulating a source security policy for a computing device and creating a second computer file using the source security policy of the first computer file to create a local security policy and to encapsulate the created local security policy and also an operating system security policy. The method further includes calculating a hash value for the second computer file and storing the hash value in a header for the second computer file. The method yet further includes encrypting the second computer file, wherein the encrypted second computer file once loaded into memory of the computing device is processed by the computing device.Type: GrantFiled: March 23, 2015Date of Patent: June 14, 2016Assignee: SteelCloud, LLCInventors: Brian H. Hajost, Fredi Jaramillo
-
Patent number: 9313040Abstract: Embodiments of the present invention provide a method, system, and computer program product for validating a computer environment. In an embodiment of the invention, a signature file denoting the infrastructure requirements of a computing environment to support a computer program to be installed in the computer environment of multiple different computing devices disposed in multiple different network domains can be loaded. Administrative network privileges to access the multiple different network domains in the computing environment can be acquired. Further, at least one deficiency in the infrastructure requirements corresponding to one of the network domains can be identified and the identified deficiency can be remediated. The identified deficiency can be reported.Type: GrantFiled: August 4, 2012Date of Patent: April 12, 2016Assignee: SteelCloud, LLCInventors: Bao Nguyen, Fredi Jaramillo, Brian H. Hajost
-
Publication number: 20150193629Abstract: Embodiments of the present invention provide for a method, system, and apparatus for creating a publishable computer file. The method includes selecting a first computer file encapsulating a source security policy for a computing device and creating a second computer file using the source security policy of the first computer file to create a local security policy and to encapsulate the created local security policy and also an operating system security policy. The method further includes calculating a hash value for the second computer file and storing the hash value in a header for the second computer file. The method yet further includes encrypting the second computer file, wherein the encrypted second computer file once loaded into memory of the computing device is processed by the computing device.Type: ApplicationFiled: March 23, 2015Publication date: July 9, 2015Applicant: SteelCloud, LLCInventors: Brian H. Hajost, Fredi Jaramillo
-
Publication number: 20140040990Abstract: Embodiments of the present invention provide a method, system, and computer program product apparatus for validating a computer environment. In an embodiment of the invention, a signature file denoting the infrastructure requirements of a computing environment to support a computer program to be installed in the computer environment of multiple different computing devices disposed in multiple different network domains can be loaded. Administrative network privileges to access the multiple different network domains in the computing environment can be acquired. Further, at least one deficiency in the infrastructure requirements corresponding to one of the network domains can be identified and the identified deficiency can be remediated. The identified deficiency can be reported.Type: ApplicationFiled: August 4, 2012Publication date: February 6, 2014Applicant: SteelCloud, Inc.Inventors: Bao Nguyen, Fredi Jaramillo, Brian H. Hajost
-
Publication number: 20090300118Abstract: In an embodiment of the invention, a method for subscriber auditing in a mobile messaging system can be provided. The method can include deploying a mobile messaging system for use in cooperation with a communicatively coupled e-mail server, pushing e-mail from the e-mail server to wireless devices belonging to different subscribers through the mobile messaging system, counting the subscribers and comparing a number of the subscribers to a permitted number of licensed subscribers for the mobile messaging system, and alerting an administrator of the mobile messaging system when the number of the subscribers counted crosses a threshold value less than the licensed subscribers. In one aspect of the embodiment, the threshold value can be zero thus an alert is only sent when the number of subscribers counted exceeds the permitted number of licensed subscribers.Type: ApplicationFiled: May 30, 2008Publication date: December 3, 2009Applicant: STEELCLOUD, INC.Inventors: Bao Nguyen, Fredi Jaramillo