Patents by Inventor Gregory A. Gerber, JR.

Gregory A. Gerber, JR. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210397634
    Abstract: An apparatus comprises a processing device configured to select a first data field of a first type that is associated with a second data field of a second type in a document, to determine an embedding of terms of unstructured text data in the first data field and to identify a subset of paired data fields from an unstructured text database based at least in part on metrics characterizing similarity between (i) the embedding of terms in the first data field and (ii) embeddings of terms in data fields of the first type in the paired data fields. The processing device is further configured to determine syntactic differences between the unstructured text data in the first data field and the identified subset of paired data fields, and to provide recommendations for unstructured text data to fill the second data field in the document based on the syntactic differences.
    Type: Application
    Filed: June 19, 2020
    Publication date: December 23, 2021
    Inventors: Gregory A. Gerber, JR., Sashka T. Davis
  • Patent number: 11201891
    Abstract: A method includes identifying two or more vulnerabilities, each vulnerability affecting a set of one or more assets of an enterprise system. The method also includes assigning a weight to each vulnerability, the weight assigned to each of the vulnerabilities being based at least in part on the set of assets affected by that vulnerability, asset criticalities associated with the set of assets affected by that vulnerability, and at least one of (i) an exploitability potential of that vulnerability and (ii) an impact potential of that vulnerability. The method further includes determining an order in which to apply remediation actions in the enterprise system to address at least one of the vulnerabilities based at least in part on the weights assigned to the vulnerabilities, and applying, in accordance with the determined order, at least one of the remediation actions to at least one of the assets in the enterprise system.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: December 14, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Sashka T. Davis, Gregory A. Gerber, Jr.
  • Patent number: 11159556
    Abstract: A method includes obtaining vulnerability scan results for a first subset of assets of an enterprise system and populating an observation data structure, based on the obtained vulnerability scan results, indicating which vulnerabilities are observed on respective ones of the assets. The method also includes determining a set of recommendations for missing entries of the observation data structure for a second subset of the assets of the enterprise system utilizing at least one recommender system that comprises at least one similarity function for determining similarity between a first and second sets of vulnerabilities observed on ones of the first and second subsets of the assets. The method further includes predicting vulnerabilities affecting the second subset of assets utilizing a machine learning model and the determined set of recommendations, and applying remediation actions for remediating the predicted vulnerabilities affecting the second subset of the assets.
    Type: Grant
    Filed: October 25, 2019
    Date of Patent: October 26, 2021
    Assignee: EMC IP Holding Company LLC
    Inventor: Gregory A. Gerber, Jr.
  • Publication number: 20210319173
    Abstract: An apparatus comprises a processing device configured to obtain an unstructured version of a document comprising text data having a nested hierarchical structure comprising two or more levels, and to determine a syntax parse tree for the nested hierarchical structure specifying one or more list types associated with items in at least a given one of the levels in the nested hierarchical structure. The processing device is also configured to identify, in the document, a plurality of items each having one of the specified one or more list types in the syntax parse tree, to extract, from the document, portions of the text data corresponding to respective ones of the plurality of items, and to generate a structured version of the document that associates the extracted portions of the text data with the corresponding ones of the plurality of items.
    Type: Application
    Filed: April 9, 2020
    Publication date: October 14, 2021
    Inventors: Gregory A. Gerber, JR., Sashka T. Davis
  • Publication number: 20210319039
    Abstract: An apparatus comprises a processing device configured to analyze an unstructured version of a document to read text data contained therein having a nested hierarchical structure comprising two or more levels and to obtain at least one sample item for a given one of the levels in the nested hierarchical structure. The processing device is also configured to determine a list type associated with the at least one sample item, to identify items having the determined list type in the text data as belonging to the given, and to extract portions of the text data corresponding to respective ones of the items having the determined list type. The processing device is further configured to generate a structured version of the document that associates the extracted portions of the text data with the corresponding ones of the items having the determined list type.
    Type: Application
    Filed: April 9, 2020
    Publication date: October 14, 2021
    Inventors: Gregory A. Gerber, JR., Corey J. Carpenter, Kevin D. Bowers
  • Patent number: 10999311
    Abstract: A method includes obtaining information regarding authentication events for users accessing assets of an enterprise system. The method also includes determining a likelihood of a given asset of the enterprise system becoming compromised responsive to compromise of a given user of the enterprise system. The method further includes determining an importance of the given asset based at least in part on a criticality value associated with the given asset, and generating a risk score for the given asset based at least in part on the determined likelihood of the given asset becoming compromised responsive to compromise of the given user and the determined importance of the given asset. The method further includes identifying remedial actions to reduce the risk score for the given asset and implementing, prior to detecting compromise of the given user, at least one of the remedial actions to modify a configuration of the given asset.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: May 4, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Sashka T. Davis, Zulfikar A. Ramzan, Zohar Duchin, Gregory A. Gerber, Jr., Mark Gergely, Steve G. Schlarman
  • Publication number: 20210126936
    Abstract: A method includes obtaining vulnerability scan results for a first subset of assets of an enterprise system and populating an observation data structure, based on the obtained vulnerability scan results, indicating which vulnerabilities are observed on respective ones of the assets. The method also includes determining a set of recommendations for missing entries of the observation data structure for a second subset of the assets of the enterprise system utilizing at least one recommender system that comprises at least one similarity function for determining similarity between a first and second sets of vulnerabilities observed on ones of the first and second subsets of the assets. The method further includes predicting vulnerabilities affecting the second subset of assets utilizing a machine learning model and the determined set of recommendations, and applying remediation actions for remediating the predicted vulnerabilities affecting the second subset of the assets.
    Type: Application
    Filed: October 25, 2019
    Publication date: April 29, 2021
    Inventor: Gregory A. Gerber, JR.
  • Publication number: 20200351294
    Abstract: A method includes identifying two or more vulnerabilities, each vulnerability affecting a set of one or more assets of an enterprise system. The method also includes assigning a weight to each vulnerability, the weight assigned to each of the vulnerabilities being based at least in part on the set of assets affected by that vulnerability, asset criticalities associated with the set of assets affected by that vulnerability, and at least one of (i) an exploitability potential of that vulnerability and (ii) an impact potential of that vulnerability. The method further includes determining an order in which to apply remediation actions in the enterprise system to address at least one of the vulnerabilities based at least in part on the weights assigned to the vulnerabilities, and applying, in accordance with the determined order, at least one of the remediation actions to at least one of the assets in the enterprise system.
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Inventors: Sashka T. Davis, Gregory A. Gerber, JR.
  • Publication number: 20200252422
    Abstract: A method includes obtaining information regarding authentication events for users accessing assets of an enterprise system. The method also includes determining a likelihood of a given asset of the enterprise system becoming compromised responsive to compromise of a given user of the enterprise system. The method further includes determining an importance of the given asset based at least in part on a criticality value associated with the given asset, and generating a risk score for the given asset based at least in part on the determined likelihood of the given asset becoming compromised responsive to compromise of the given user and the determined importance of the given asset. The method further includes identifying remedial actions to reduce the risk score for the given asset and implementing, prior to detecting compromise of the given user, at least one of the remedial actions to modify a configuration of the given asset.
    Type: Application
    Filed: January 31, 2019
    Publication date: August 6, 2020
    Inventors: Sashka T. Davis, Zulfikar A. Ramzan, Zohar Duchin, Gregory A. Gerber, JR., Mark Gergely, Steve G. Schlarman