Patents by Inventor Hnin Haymar

Hnin Haymar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240097992
    Abstract: Persistent storage may contain definitions of: configuration items (CIs) each having attributes that characterize a respective hardware or software component, a list of data sources used to update at least some of the CIs, and an auto-attestation time period; and one or more processors configured to: identify a plurality of the CIs for auto-attestation; for each respective CI, determine a respective condition of whether: (i) a data-source attribute of the respective CI indicates that it was updated by a trusted data source, and (ii) a most-recent-update attribute of the respective CI indicates that it was updated within the auto-attestation time period; and mark each respective CI based on its respective condition, wherein the respective CI is marked as auto-attested when its respective condition is true, and wherein the respective CI is marked as not auto-attested when its respective condition is false.
    Type: Application
    Filed: September 20, 2022
    Publication date: March 21, 2024
    Inventors: Aparna Ganti, Lilia Manguy, Akhilesh Kashyap Kittane Ravikumar, Siyou Li, Kavitha Kotti, Shijin Joshua, Anthony Walter Branton, Luc John Johnson, Ganesh Bhattarai, Hnin Haymar
  • Patent number: 11818161
    Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.
    Type: Grant
    Filed: October 25, 2021
    Date of Patent: November 14, 2023
    Assignee: ServiceNow, Inc.
    Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
  • Patent number: 11533339
    Abstract: An example embodiment performed by a scoped software application executable on a computing device of a computational instance of a remote network management platform may involve: requesting and receiving, from an application database associated with a third-party software application, alert rules that trigger alerts when associated events occur in a managed network; receiving data representing selection of a set of the alert rules and, based on the data, requesting and receiving, from the application database, a set of past alerts that have been triggered by the set of the alert rules; using mapping data to map fields of the set of the past alerts to fields of a sample security incident record; displaying a preview region including the sample security incident record; using the mapping data to create security incident records that map to the set of the past alerts; and writing, to a security incident database, the security incident records.
    Type: Grant
    Filed: October 26, 2020
    Date of Patent: December 20, 2022
    Assignee: ServiceNow, Inc.
    Inventors: Thomas Woodley Brotherton, Vamsi Krishna Madala, Teja Chava, John Gerald Ferguson, Hnin Haymar, Betsy Cherian, Eun-Sook Watson
  • Publication number: 20220046049
    Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.
    Type: Application
    Filed: October 25, 2021
    Publication date: February 10, 2022
    Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
  • Patent number: 11159557
    Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.
    Type: Grant
    Filed: November 13, 2019
    Date of Patent: October 26, 2021
    Assignee: ServiceNow, Inc.
    Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
  • Publication number: 20210144168
    Abstract: A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.
    Type: Application
    Filed: November 13, 2019
    Publication date: May 13, 2021
    Inventors: Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
  • Publication number: 20210058431
    Abstract: An example embodiment performed by a scoped software application executable on a computing device of a computational instance of a remote network management platform may involve: requesting and receiving, from an application database associated with a third-party software application, alert rules that trigger alerts when associated events occur in a managed network; receiving data representing selection of a set of the alert rules and, based on the data, requesting and receiving, from the application database, a set of past alerts that have been triggered by the set of the alert rules; using mapping data to map fields of the set of the past alerts to fields of a sample security incident record; displaying a preview region including the sample security incident record; using the mapping data to create security incident records that map to the set of the past alerts; and writing, to a security incident database, the security incident records.
    Type: Application
    Filed: October 26, 2020
    Publication date: February 25, 2021
    Inventors: Thomas Woodley Brotherton, Vamsi Krishna Madala, Teja Chava, John Gerald Ferguson, Hnin Haymar, Betsy Cherian, Eun-Sook Watson
  • Patent number: 10826942
    Abstract: An example embodiment performed by a scoped software application executable on a computing device of a computational instance of a remote network management platform may involve: requesting and receiving, from an application database associated with a third-party software application, alert rules that trigger alerts when associated events occur in a managed network; receiving data representing selection of a set of the alert rules and, based on the data, requesting and receiving, from the application database, a set of past alerts that have been triggered by the set of the alert rules; using mapping data to map fields of the set of the past alerts to fields of a sample security incident record; displaying a preview region including the sample security incident record; using the mapping data to create security incident records that map to the set of the past alerts; and writing, to a security incident database, the security incident records.
    Type: Grant
    Filed: August 10, 2018
    Date of Patent: November 3, 2020
    Assignee: ServiceNow, Inc.
    Inventors: Thomas Woodley Brotherton, Vamsi Krishna Madala, Teja Chava, John Gerald Ferguson, Hnin Haymar, Betsy Cherian, Eun-Sook Watson
  • Publication number: 20200053127
    Abstract: An example embodiment performed by a scoped software application executable on a computing device of a computational instance of a remote network management platform may involve: requesting and receiving, from an application database associated with a third-party software application, alert rules that trigger alerts when associated events occur in a managed network; receiving data representing selection of a set of the alert rules and, based on the data, requesting and receiving, from the application database, a set of past alerts that have been triggered by the set of the alert rules; using mapping data to map fields of the set of the past alerts to fields of a sample security incident record; displaying a preview region including the sample security incident record; using the mapping data to create security incident records that map to the set of the past alerts; and writing, to a security incident database, the security incident records.
    Type: Application
    Filed: August 10, 2018
    Publication date: February 13, 2020
    Inventors: Thomas Woodley Brotherton, Vamsi Krishna Madala, Teja Chava, John Gerald Ferguson, Hnin Haymar, Betsy Cherian, Eun-Sook Watson