Patents by Inventor James Apger

James Apger has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240354401
    Abstract: A graphical user interface (GUI) for presentation of network security risk and threat information is disclosed. A listing is generated of incidents identified by use of event data obtained from a networked computing environment. A particular incident is determined to be associated with a risk object, wherein a risk object is a component of the networked computing environment. The listing is populated with a name associated with the risk object. Risk events associated with the incident are determined, wherein each risk event contributes to a risk score for the incident. The risk score indicates a potential security issue associated with the risk object. The listing is populated with the risk score and a summary of the events. An action is associated with the listing, for triggering display of additional information associated with the risk object. The listing can be displayed in a first display screen of the GUI.
    Type: Application
    Filed: July 2, 2024
    Publication date: October 24, 2024
    Inventors: James Apger, Allison Lindsey Drake, James Irwin Ebeling, Orville Esoy, Bhooshan Kulkarni, Marquis L. Montgomery, Daniel Trenkner
  • Patent number: 12061691
    Abstract: A graphical user interface (GUI) for presentation of network security risk and threat information is disclosed. A listing is generated of incidents identified by use of event data obtained from a networked computing environment. A particular incident is determined to be associated with a risk object, wherein a risk object is a component of the networked computing environment. The listing is populated with a name associated with the risk object. Risk events associated with the incident are determined, wherein each risk event contributes to a risk score for the incident. The risk score indicates a potential security issue associated with the risk object. The listing is populated with the risk score and a summary of the events. An action is associated with the listing, for triggering display of additional information associated with the risk object. The listing can be displayed in a first display screen of the GUI.
    Type: Grant
    Filed: October 29, 2021
    Date of Patent: August 13, 2024
    Assignee: Splunk Inc.
    Inventors: James Apger, Allison Lindsey Drake, James Irwin Ebeling, Orville Esoy, Bhooshan Kulkarni, Marquis L. Montgomery, Daniel Trenkner
  • Publication number: 20230139000
    Abstract: A graphical user interface (GUI) for presentation of network security risk and threat information is disclosed. A listing is generated of incidents identified by use of event data obtained from a networked computing environment. A particular incident is determined to be associated with a risk object, wherein a risk object is a component of the networked computing environment. The listing is populated with a name associated with the risk object. Risk events associated with the incident are determined, wherein each risk event contributes to a risk score for the incident. The risk score indicates a potential security issue associated with the risk object. The listing is populated with the risk score and a summary of the events. An action is associated with the listing, for triggering display of additional information associated with the risk object. The listing can be displayed in a first display screen of the GUI.
    Type: Application
    Filed: October 29, 2021
    Publication date: May 4, 2023
    Inventors: James Apger, Allison Lindsey Drake, James Irwin Ebeling, Orville Esoy, Bhooshan Kulkarni, Marquis L. Montgomery, Daniel Trenkner
  • Publication number: 20220141188
    Abstract: Described herein, is a technique of data reduction and focusing for system and network security. Anomaly alerts pertain to specific risk objects that are network devices or users that triggered the associated anomaly. Threat objects are entities used by the risk object that include the specific activity of the risk object that triggered the anomaly. Once identified, threat objects are linked to the risk objects that they respectively pertain to. The link between a risk object and a threat object is generated via searchable metadata. Through linking, relationships are built between threat objects and risk objects. Links are between a number (N) risk objects and a number (M) of threat objects. The relationships are surfaced to a user based on satisfaction of predetermined thresholds. Examples of display to the user may include generation of a threat report, anomaly alerts, or graphical presentations depicting the links in the relationship(s).
    Type: Application
    Filed: March 26, 2021
    Publication date: May 5, 2022
    Inventors: James Apger, Kyle Champlin