Patents by Inventor Hnin Haymar
Hnin Haymar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240097992Abstract: Persistent storage may contain definitions of: configuration items (CIs) each having attributes that characterize a respective hardware or software component, a list of data sources used to update at least some of the CIs, and an auto-attestation time period; and one or more processors configured to: identify a plurality of the CIs for auto-attestation; for each respective CI, determine a respective condition of whether: (i) a data-source attribute of the respective CI indicates that it was updated by a trusted data source, and (ii) a most-recent-update attribute of the respective CI indicates that it was updated within the auto-attestation time period; and mark each respective CI based on its respective condition, wherein the respective CI is marked as auto-attested when its respective condition is true, and wherein the respective CI is marked as not auto-attested when its respective condition is false.Type: ApplicationFiled: September 20, 2022Publication date: March 21, 2024Inventors: Aparna Ganti, Lilia Manguy, Akhilesh Kashyap Kittane Ravikumar, Siyou Li, Kavitha Kotti, Shijin Joshua, Anthony Walter Branton, Luc John Johnson, Ganesh Bhattarai, Hnin Haymar
-
Patent number: 11818161Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.Type: GrantFiled: October 25, 2021Date of Patent: November 14, 2023Assignee: ServiceNow, Inc.Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
-
Patent number: 11533339Abstract: An example embodiment performed by a scoped software application executable on a computing device of a computational instance of a remote network management platform may involve: requesting and receiving, from an application database associated with a third-party software application, alert rules that trigger alerts when associated events occur in a managed network; receiving data representing selection of a set of the alert rules and, based on the data, requesting and receiving, from the application database, a set of past alerts that have been triggered by the set of the alert rules; using mapping data to map fields of the set of the past alerts to fields of a sample security incident record; displaying a preview region including the sample security incident record; using the mapping data to create security incident records that map to the set of the past alerts; and writing, to a security incident database, the security incident records.Type: GrantFiled: October 26, 2020Date of Patent: December 20, 2022Assignee: ServiceNow, Inc.Inventors: Thomas Woodley Brotherton, Vamsi Krishna Madala, Teja Chava, John Gerald Ferguson, Hnin Haymar, Betsy Cherian, Eun-Sook Watson
-
Publication number: 20220046049Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.Type: ApplicationFiled: October 25, 2021Publication date: February 10, 2022Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
-
Patent number: 11159557Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.Type: GrantFiled: November 13, 2019Date of Patent: October 26, 2021Assignee: ServiceNow, Inc.Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
-
Publication number: 20210144168Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.Type: ApplicationFiled: November 13, 2019Publication date: May 13, 2021Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
-
Publication number: 20210058431Abstract: An example embodiment performed by a scoped software application executable on a computing device of a computational instance of a remote network management platform may involve: requesting and receiving, from an application database associated with a third-party software application, alert rules that trigger alerts when associated events occur in a managed network; receiving data representing selection of a set of the alert rules and, based on the data, requesting and receiving, from the application database, a set of past alerts that have been triggered by the set of the alert rules; using mapping data to map fields of the set of the past alerts to fields of a sample security incident record; displaying a preview region including the sample security incident record; using the mapping data to create security incident records that map to the set of the past alerts; and writing, to a security incident database, the security incident records.Type: ApplicationFiled: October 26, 2020Publication date: February 25, 2021Inventors: Thomas Woodley Brotherton, Vamsi Krishna Madala, Teja Chava, John Gerald Ferguson, Hnin Haymar, Betsy Cherian, Eun-Sook Watson
-
Patent number: 10826942Abstract: An example embodiment performed by a scoped software application executable on a computing device of a computational instance of a remote network management platform may involve: requesting and receiving, from an application database associated with a third-party software application, alert rules that trigger alerts when associated events occur in a managed network; receiving data representing selection of a set of the alert rules and, based on the data, requesting and receiving, from the application database, a set of past alerts that have been triggered by the set of the alert rules; using mapping data to map fields of the set of the past alerts to fields of a sample security incident record; displaying a preview region including the sample security incident record; using the mapping data to create security incident records that map to the set of the past alerts; and writing, to a security incident database, the security incident records.Type: GrantFiled: August 10, 2018Date of Patent: November 3, 2020Assignee: ServiceNow, Inc.Inventors: Thomas Woodley Brotherton, Vamsi Krishna Madala, Teja Chava, John Gerald Ferguson, Hnin Haymar, Betsy Cherian, Eun-Sook Watson
-
Publication number: 20200053127Abstract: An example embodiment performed by a scoped software application executable on a computing device of a computational instance of a remote network management platform may involve: requesting and receiving, from an application database associated with a third-party software application, alert rules that trigger alerts when associated events occur in a managed network; receiving data representing selection of a set of the alert rules and, based on the data, requesting and receiving, from the application database, a set of past alerts that have been triggered by the set of the alert rules; using mapping data to map fields of the set of the past alerts to fields of a sample security incident record; displaying a preview region including the sample security incident record; using the mapping data to create security incident records that map to the set of the past alerts; and writing, to a security incident database, the security incident records.Type: ApplicationFiled: August 10, 2018Publication date: February 13, 2020Inventors: Thomas Woodley Brotherton, Vamsi Krishna Madala, Teja Chava, John Gerald Ferguson, Hnin Haymar, Betsy Cherian, Eun-Sook Watson