Patents by Inventor George Y. Ng

George Y. Ng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180359276
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments include generating a disaster scenario that includes elements of a disaster event, modeling the disaster scenario against a profile of the computer network and the entity, determining theoretical damage based on the modeling, and updating a cyber security policy or a network change to mitigate the theoretical damage.
    Type: Application
    Filed: May 4, 2018
    Publication date: December 13, 2018
    Inventors: George Y. Ng, Frank Beier, Olivier Giulieri, Yoshifumi Yamamoto, Zheng Cheung
  • Publication number: 20180359281
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments involve using continual or periodic data collecting to improve inferential analysis, as well as obtaining circumstantial or inferential information from social networks. Machine learning may be used to improve predicitive capabilities. Some embodiments allow for identification of an entity from circumstantial or inferential information based on the machine learning and comparative analyses.
    Type: Application
    Filed: May 4, 2018
    Publication date: December 13, 2018
    Inventors: George Y. Ng, Brian Wu, Ming Yang, Paul Yang, Fernando Tancioco
  • Publication number: 20180359275
    Abstract: Embodiments of the present technology relate to cyber attack vulnerability analyses. In one embodiment, a method includes determining an external infrastructure of an entity, the external infrastructure including one or more cyber assets utilized by the entity, collecting infrastructure information regarding the one or more cyber assets, performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information, and assessing cyber security vulnerabilities of the one or more cyber assets. The method may further include calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities, and automatically recommending, based on the association score, computer network changes to reduce the cyber security vulnerabilities.
    Type: Application
    Filed: May 4, 2018
    Publication date: December 13, 2018
    Inventors: George Y. Ng, Feiyin Zhang, Fernando Tancioco
  • Patent number: 10050990
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments include generating a disaster scenario that includes elements of a disaster event, modeling the disaster scenario against a profile of the computer network and the entity, determining theoretical damage based on the modeling, and updating a cyber security policy or a network change to mitigate the theoretical damage.
    Type: Grant
    Filed: December 9, 2016
    Date of Patent: August 14, 2018
    Assignee: Guidewire Software, Inc.
    Inventors: George Y. Ng, Frank Beier, Olivier Giulieri, Yoshifumi Yamamoto, Zheng Cheung
  • Patent number: 10050989
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in one or more computer networks for an entity. Various embodiments include establishing a plurality of proxy connections with entity resources, evaluating performance of the proxy connections, and scoring the proxy connections based on performance. Various embodiments may further include automatically determining, based on the proxy score, a change or setting regarding the proxy connections. Various embodiments may also include automatically recommending, based on the assessed risk, computer network changes for the one or more computer networks to reduce the assessed risk. Some embodiments may include providing recommended computer network and/or policy changes to reduce the assessed risk, determining the entity has enacted some recommended network changes, and in response, automatically reassessing the risk of a cyber security failure based on the enacted recommended computer network changes.
    Type: Grant
    Filed: December 8, 2016
    Date of Patent: August 14, 2018
    Assignee: Guidewire Software, Inc.
    Inventors: George Y. Ng, Don Ma, Yuen Tsing Ooi, Feiyin Zhang, Fernando Tancioco, Jr.
  • Patent number: 10003609
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in one or more computer networks for an entity. Various embodiments include establishing a plurality of proxy connections with entity resources, evaluating performance of the proxy connections, and scoring the proxy connections based on performance. Various embodiments may further include automatically determining, based on the proxy score, a change or setting regarding the proxy connections. Various embodiments may also include automatically recommending, based on the assessed risk, computer network changes for the one or more computer networks to reduce the assessed risk. Some embodiments may include providing recommended computer network and/or policy changes to reduce the assessed risk, determining the entity has enacted some recommended network changes, and in response, automatically reassessing the risk of a cyber security failure based on the enacted recommended computer network changes.
    Type: Grant
    Filed: December 8, 2016
    Date of Patent: June 19, 2018
    Assignee: Guidewire Software, Inc.
    Inventors: George Y. Ng, Don Ma, Yuen Tsing Ooi, Feiyin Zhang, Fernando Tancioco, Jr.
  • Patent number: 9699209
    Abstract: Embodiments of the present technology relate to cyber attack vulnerability analyzes. In one embodiment, a method includes determining an external infrastructure of an entity, the external infrastructure including one or more cyber assets utilized by the entity, collecting infrastructure information regarding the one or more cyber assets, performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information, assessing cyber security vulnerabilities of the one or more cyber assets, calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities, and automatically recommending, based on the association score, computer network changes to reduce the cyber security vulnerabilities.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: July 4, 2017
    Assignee: Cyence Inc.
    Inventors: George Y. Ng, Feiyin Zhang, Fernando Tancioco, Jr.
  • Publication number: 20170187745
    Abstract: Embodiments of the present technology relate to cyber attack vulnerability analyses. In one embodiment, a method includes determining an external infrastructure of an entity, the external infrastructure including one or more cyber assets utilized by the entity, collecting infrastructure information regarding the one or more cyber assets, performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information, and assessing cyber security vulnerabilities of the one or more cyber assets. The method may further include calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities, and automatically recommending, based on the association score, computer network changes to reduce the cyber security vulnerabilities.
    Type: Application
    Filed: March 13, 2017
    Publication date: June 29, 2017
    Inventors: George Y. Ng, Feiyin Zhang, Fernando Tancioco, JR.
  • Publication number: 20170093904
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in one or more computer networks for an entity. Various embodiments include establishing a plurality of proxy connections with entity resources, evaluating performance of the proxy connections, and scoring the proxy connections based on performance. Various embodiments may further include automatically determining, based on the proxy score, a change or setting regarding the proxy connections. Various embodiments may also include automatically recommending, based on the assessed risk, computer network changes for the one or more computer networks to reduce the assessed risk. Some embodiments may include providing recommended computer network and/or policy changes to reduce the assessed risk, determining the entity has enacted some recommended network changes, and in response, automatically reassessing the risk of a cyber security failure based on the enacted recommended computer network changes.
    Type: Application
    Filed: December 8, 2016
    Publication date: March 30, 2017
    Inventors: George Y. Ng, Don Ma, Yuen Tsing Ooi, Feiyin Zhang, Fernando Tancioco, JR.
  • Publication number: 20170093905
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments include generating a disaster scenario that includes elements of a disaster event, modeling the disaster scenario against a profile of the computer network and the entity, determining theoretical damage based on the modeling, and updating a cyber security policy or a network change to mitigate the theoretical damage.
    Type: Application
    Filed: December 9, 2016
    Publication date: March 30, 2017
    Inventors: George Y. Ng, Frank Beier, Olivier Giulieri, Yoshifumi Yamamoto, Zheng Cheung
  • Publication number: 20170085595
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments involve using continual or periodic data collecting to improve inferential analysis, as well as obtaining circumstantial or inferential information from social networks. Machine learning may be used to improve predicitive capabilities. Some embodiments allow for identification of an entity from circumstantial or inferential information based on the machine learning and comparative analyses.
    Type: Application
    Filed: December 6, 2016
    Publication date: March 23, 2017
    Inventors: George Y. Ng, Brian Wu, Ming Yang, Paul Yang, Fernando Tancioco, JR.
  • Patent number: 9521160
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Various embodiments also include automatically determining, based on the assessed risk, a change or a setting to at least one element of policy criteria of a cyber security policy, automatically recommending, based on the assessed risk, computer network changes to reduce the assessed risk, and providing one or more recommended computer network changes to reduce the assessed risk. Various embodiments further include enactment by the entity of at least one of the one or more of the recommended computer network changes to reduce the assessed risk to the entity, determining that the entity has enacted at least a portion of the recommended computer network changes, and in response, automatically reassessing the risk of a cyber security failure based on the enacted recommended computer network changes.
    Type: Grant
    Filed: April 28, 2016
    Date of Patent: December 13, 2016
    Assignee: Cyence Inc.
    Inventors: George Y. Ng, Feiyin Zhang, Fernando Tancioco, Jr.
  • Publication number: 20160294854
    Abstract: Systems and methods for cyber risk analysis and remediation using network monitored sensors are provided herein. An example system includes one or more data collecting devices deployed within a network that collect entity information and monitor network traffic of the network that is related to security information. The network includes computing systems that are subject to a cyber risk policy having breach parameters defining one or more events that are indicative of a cyber security breach. A cyber security risk assessment and management system is used to automatically detect occurrence of one or more of the events that are indicative of a cyber security breach, automatically determine the breach parameters that apply for the one or more events that occurred, and generates a remediation of cyber security parameters for the network.
    Type: Application
    Filed: March 28, 2016
    Publication date: October 6, 2016
    Inventors: Arvind Parthasarathi, George Y. Ng, Matthew Honea
  • Publication number: 20160248799
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Various embodiments also include automatically determining, based on the assessed risk, a change or a setting to at least one element of policy criteria of a cyber security policy, automatically recommending, based on the assessed risk, computer network changes to reduce the assessed risk, and providing one or more recommended computer network changes to reduce the assessed risk. Various embodiments further include enactment by the entity of at least one of the one or more of the recommended computer network changes to reduce the assessed risk to the entity, determining that the entity has enacted at least a portion of the recommended computer network changes, and in response, automatically reassessing the risk of a cyber security failure based on the enacted recommended computer network changes.
    Type: Application
    Filed: April 28, 2016
    Publication date: August 25, 2016
    Inventors: George Y. Ng, Feiyin Zhang, Fernando Tancioco, JR.
  • Publication number: 20160248800
    Abstract: Embodiments of the present technology relate to cyber attack vulnerability analyses. In one embodiment, a method includes determining an external infrastructure of an entity, the external infrastructure including one or more cyber assets utilized by the entity, collecting infrastructure information regarding the one or more cyber assets, performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information, assessing cyber security vulnerabilities of the one or more cyber assets, calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities, and automatically recommending, based on the association score, computer network changes to reduce the cyber security vulnerabilities.
    Type: Application
    Filed: April 29, 2016
    Publication date: August 25, 2016
    Inventors: George Y. Ng, Feiyin Zhang, Fernando Tancioco, JR.
  • Publication number: 20160234247
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Various embodiments also include automatically determining, based on the assessed risk, a change or a setting to at least one element of policy criteria of a cyber security policy, automatically recommending, based on the assessed risk, computer network changes to reduce the assessed risk, and providing one or more recommended computer network changes to reduce the assessed risk. Various embodiments further include enactment by the entity of at least one of the one or more of the recommended computer network changes to reduce the assessed risk to the entity, determining that the entity has enacted at least a portion of the recommended computer network changes, and in response, automatically reassessing the risk of a cyber security failure based on the enacted recommended computer network changes.
    Type: Application
    Filed: April 14, 2016
    Publication date: August 11, 2016
    Inventors: George Y. Ng, Philip A. Rosace, III
  • Publication number: 20160189301
    Abstract: Various embodiments of the present technology relate to diversity and similarity analysis. In some exemplary embodiments, a method includes, for each of a plurality of entities, receiving a set of variables that are indicative of attributes of an entity. The exemplary method also includes comparing the sets of variables for the plurality of entities to each other, locating clusters of similar variables shared between two or more of the plurality of entities, determining a probable maximum loss for the plurality of entities that share the clusters, the probable maximum loss being a loss value attributed to a cyber event against one or more of the shared variables, receiving feedback from an end user in response to providing the probable maximum loss to the end user, and updating the probable maximum loss in response to the feedback.
    Type: Application
    Filed: November 3, 2015
    Publication date: June 30, 2016
    Inventors: George Y. Ng, Philip A. Rosace, III
  • Patent number: 9373144
    Abstract: Various embodiments of the present technology relate to diversity and similarity analysis. In some exemplary embodiments, a method includes, for each of a plurality of entities, receiving a set of variables that are indicative of attributes of an entity. The exemplary method also includes comparing the sets of variables for the plurality of entities to each other, locating clusters of similar variables shared between two or more of the plurality of entities, determining a probable maximum loss for the plurality of entities that share the clusters, the probable maximum loss being a loss value attributed to a cyber event against one or more of the shared variables, receiving feedback from an end user in response to providing the probable maximum loss to the end user, and updating the probable maximum loss in response to the feedback.
    Type: Grant
    Filed: November 3, 2015
    Date of Patent: June 21, 2016
    Assignee: Cyence Inc.
    Inventors: George Y. Ng, Philip A. Rosace, III
  • Patent number: 9253203
    Abstract: Embodiments of the present technology relate to diversity and similarity analysis. In one embodiment, a method includes, for each of a plurality of entities, receiving a set of variables that are indicative of attributes of an entity, comparing the sets of variables for the plurality of entities to each other, locating clusters of similar variables shared between two or more of the plurality of entities, calculating a diversity score that represents how different the plurality of entities are to one another based on variables that are not shared between the plurality of entities, receiving feedback from an end user in response to providing the diversity score to the end user and updating the diversity score in response to the feedback. The variables and attributes may be used to calculate a diversity score regarding aggregate cyber security risk, for use in planning so as to increase that diversity.
    Type: Grant
    Filed: December 29, 2014
    Date of Patent: February 2, 2016
    Assignee: Cyence Inc.
    Inventor: George Y. Ng