Patents by Inventor Javier Godinez

Javier Godinez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150312274
    Abstract: Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an application and application deployment security compliance data for ensuring compliance with one or more application deployment security policies associated with the deployment of assets used to implement the application is generated. The asset security compliance data is then used to ensure each asset used to implement the application is created and used in compliance with asset security policies and the application deployment security compliance data is used to ensure that each asset used to implement the application is deployed in compliance with the application deployment security policies.
    Type: Application
    Filed: April 25, 2014
    Publication date: October 29, 2015
    Applicant: INTUIT INC.
    Inventors: Thomas Bishop, Brett Weaver, Christian Price, Javier Godinez, Capen Brinkley, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20150278523
    Abstract: An application is implemented in the production environment in which the application will be used. Two or more backend systems are provided. Actual user data is received. The actual user data is routed and processed in the production environment using a first backend system of the two or more backend systems. Fabricated user data is generated, routed, and also processed in the production environment but using a second backend system of the two or more backend systems. Results data from the processing of the fabricated user data is then analyzed to evaluate the production environment and/or operation of the application in the production environment.
    Type: Application
    Filed: March 31, 2014
    Publication date: October 1, 2015
    Applicant: Intuit Inc.
    Inventors: Capen Brinkley, Javier Godinez, Thomas Bishop, Brett Weaver, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20150278517
    Abstract: An application is implemented in the production environment in which the application will be used. Two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed. Actual user data is received. A first portion of the actual user data is routed and processed in the production environment using a first version of the application and a first backend system of the two or more backend systems. A second portion of the actual user data is also routed and processed in the production environment but using a second version of the application and a second backend system of the two or more backend systems. The results data is then analyzed to evaluate the various versions of the application in the production environment.
    Type: Application
    Filed: March 31, 2014
    Publication date: October 1, 2015
    Applicant: Intuit Inc.
    Inventors: Brett Weaver, Javier Godinez, Capen Brinkley, Thomas Bishop, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20150269064
    Abstract: An application is implemented in the production environment in which the application will be used. Fabricated user data associated with the application implemented in the production environment is then generated and provided to the application as implemented in the production environment. The fabricated user data is then processed by the application in the production environment to transform the fabricated user data into fabricated user results data. In one embodiment, the fabricated user results data is then analyzed to evaluate the production environment and/or operation of the application in the production environment.
    Type: Application
    Filed: March 21, 2014
    Publication date: September 24, 2015
    Applicant: INTUIT INC.
    Inventors: Thomas Bishop, Javier Godinez, Capen Brinkley, Brett Weaver, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20150242634
    Abstract: A virtual asset creation template associated with a class of virtual assets is identified and analyzed to identify any vulnerabilities in the virtual asset creation template. If one or more vulnerabilities are identified in the virtual asset creation template, an appropriate remedy for each identified vulnerability identified in the virtual asset creation template is applied. If no vulnerability is identified in the virtual asset creation template, or once each vulnerability identified in the virtual asset creation template is remedied, each virtual asset of the virtual asset class generated using the virtual asset creation template is assigned an initial status of verified virtual asset.
    Type: Application
    Filed: February 27, 2014
    Publication date: August 27, 2015
    Applicant: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Barry J. Nisly, Ted R. Neher, III, Javier Godinez
  • Publication number: 20150106939
    Abstract: One or more relevant scanners used to identify asset vulnerabilities are identified, obtained, and logically arranged for deployment on an asset in accordance with a vulnerability management policy and a scanner deployment policy such that the relevant scanners are deployed at, or before, a determined ideal time to minimize the resources necessary to correct the vulnerabilities, if found. The relevant scanners are then automatically deployed in accordance with the scanner deployment policy and, if a vulnerability is identified, one or more associated remedies or remedy procedures are applied to the asset. At least one of the one or more relevant scanners are then re-deployed on the asset to determine if the identified vulnerability has been corrected and, if the vulnerability is not corrected at, or before, a defined time, protective measures are automatically taken.
    Type: Application
    Filed: October 14, 2013
    Publication date: April 16, 2015
    Applicant: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Barry J. Nisly, Ted R. Neher, III, Javier Godinez, Ankur Jain
  • Patent number: 8844044
    Abstract: A process for facilitating a client system defense training exercise implemented over a client-server architecture includes designated modules and hardware for protocol version identification message; registration; profiling; health reporting; vulnerability status messaging; storage; access and scoring. More particularly, the server identifies a rule-based vulnerability profile to the client and scores client responses in accordance with established scoring rules for various defensive and offensive asset training scenarios.
    Type: Grant
    Filed: July 20, 2012
    Date of Patent: September 23, 2014
    Assignee: Leidos, Inc.
    Inventors: Scott Cruickshanks Kennedy, Carleton Royse Ayers, II, Javier Godinez, Susan Fichera Banks, Myoki Elizabeth Spencer
  • Publication number: 20130014264
    Abstract: A process for facilitating a client system defense training exercise implemented over a client-server architecture includes designated modules and hardware for protocol version identification message; registration; profiling; health reporting; vulnerability status messaging; storage; access and scoring. More particularly, the server identifies a rule-based vulnerability profile to the client and scores client responses in accordance with established scoring rules for various defensive and offensive asset training scenarios.
    Type: Application
    Filed: July 20, 2012
    Publication date: January 10, 2013
    Inventors: Scott Cruickshanks Kennedy, Carleton Royse Ayers, II, Javier Godinez, Susan Fichera Banks, Myoki Elizabeth Spencer
  • Patent number: 8250654
    Abstract: A process for facilitating a client system defense training exercise implemented over a client-server architecture includes designated modules and hardware for protocol version identification message; registration; profiling; health reporting; vulnerability status messaging; storage; access and scoring. More particularly, the server identifies a rule-based vulnerability profile to the client and scores client responses in accordance with established scoring rules for various defensive and offensive asset training scenarios.
    Type: Grant
    Filed: June 26, 2009
    Date of Patent: August 21, 2012
    Assignee: Science Applications International Corporation
    Inventors: Scott Cruickshanks Kennedy, Carleton Royse Ayers, II, Javier Godinez, Susan Fichera Banks, Myoki Elizabeth Spencer