Patents by Inventor Jason Parry

Jason Parry has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11777978
    Abstract: Systems and methods for assessing an application access risk are provided. An example method commences with collecting data concerning relationships between an application, one or more client devices, and one or more users in a computing environment. The method includes updating a graph database including nodes and edges. The nodes represent the application, the one or more client devices, and the one or more users and the edges represent relationships between the application, the one or more client devices, and the one or more users. The method continues with enriching the graph database by associating the nodes with metadata including information concerning the one or more users accessing the application from the one or more client devices. The method further includes analyzing the graph database to identify a subset of nodes used to access the application and displaying a graphical representation of the subset of nodes.
    Type: Grant
    Filed: January 29, 2021
    Date of Patent: October 3, 2023
    Assignee: vArmour Networks, Inc.
    Inventors: Paul Bigbee, Marc Woolward, Hsisheng Wang, Keith Stewart, Jason Parry
  • Patent number: 11734316
    Abstract: Systems and methods for a relationship-based search in a computing environment are provided. An example method includes providing a graph database. The graph database includes nodes representing workloads of the computing environment and edges representing relationships between the nodes. The method also includes enriching the graph database by associating the nodes with metadata associated with the nodes and the relationships. The method also includes receiving a user query including data associated with at least one of the metadata and the relationships. The method also includes determining, based on the user query, a subset of the nodes in the graph database and a subset of relationships between the nodes in the subset of the nodes. The method also includes displaying, via a graphical user interface, a graphical representation of the subset of the nodes and relationships between the nodes in the subset of the nodes.
    Type: Grant
    Filed: July 8, 2021
    Date of Patent: August 22, 2023
    Assignee: vArmour Networks, Inc.
    Inventors: Jason Parry, Liza Detrick, David Lin, Colin Ross
  • Patent number: 11575563
    Abstract: Methods and systems for managing security in a cloud computing environment are provided. Exemplary methods include: gathering data about workloads and applications in the cloud computing environment; updating a graph database using the data, the graph database representing the workloads of the cloud computing environment as nodes and relationships between the workloads as edges; receiving a security template, the security template logically describing targets in the cloud computing environment to be protected and how to protect the targets; creating a security policy using the security template and information in the graph database; and deploying the security policy in the cloud computing environment.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: February 7, 2023
    Assignee: vArmour Networks, Inc.
    Inventors: Marc Woolward, Keith Stewart, Timothy Eades, Meng Xu, Myo Zarny, Matthew M. Williamson, Jason Parry, Hong Xiao, Hsisheng Wang, Cheng-Lin Hou
  • Publication number: 20230011588
    Abstract: Systems and methods for a relationship-based search in a computing environment are provided. An example method includes providing a graph database. The graph database includes nodes representing workloads of the computing environment and edges representing relationships between the nodes. The method also includes enriching the graph database by associating the nodes with metadata associated with the nodes and the relationships. The method also includes receiving a user query including data associated with at least one of the metadata and the relationships. The method also includes determining, based on the user query, a subset of the nodes in the graph database and a subset of relationships between the nodes in the subset of the nodes. The method also includes displaying, via a graphical user interface, a graphical representation of the subset of the nodes and relationships between the nodes in the subset of the nodes.
    Type: Application
    Filed: July 8, 2021
    Publication date: January 12, 2023
    Inventors: Jason Parry, Lisa Detrick, David Lin, Colin Ross
  • Publication number: 20220247774
    Abstract: Systems and methods for assessing an application access risk are provided. An example method commences with collecting data concerning relationships between an application, one or more client devices, and one or more users in a computing environment. The method includes updating a graph database including nodes and edges. The nodes represent the application, the one or more client devices, and the one or more users and the edges represent relationships between the application, the one or more client devices, and the one or more users. The method continues with enriching the graph database by associating the nodes with metadata including information concerning the one or more users accessing the application from the one or more client devices. The method further includes analyzing the graph database to identify a subset of nodes used to access the application and displaying a graphical representation of the subset of nodes.
    Type: Application
    Filed: January 29, 2021
    Publication date: August 4, 2022
    Inventors: Paul Bigbee, Marc Woolward, Hsi-Sheng Wang, Keith Stewart, Jason Parry
  • Publication number: 20200382363
    Abstract: Methods and systems for managing security in a cloud computing environment are provided. Exemplary methods include: gathering data about workloads and applications in the cloud computing environment; updating a graph database using the data, the graph database representing the workloads of the cloud computing environment as nodes and relationships between the workloads as edges; receiving a security template, the security template logically describing targets in the cloud computing environment to be protected and how to protect the targets; creating a security policy using the security template and information in the graph database; and deploying the security policy in the cloud computing environment.
    Type: Application
    Filed: May 31, 2019
    Publication date: December 3, 2020
    Inventors: Marc Woolward, Keith Stewart, Timothy Eades, Meng Xu, Myo Zarny, Matthew M. Williamson, Jason Parry, Hong Xiao, Hsisheng Wang, Cheng-Lin Hou