Patents by Inventor Johara Abdulrahman AL Jarri

Johara Abdulrahman AL Jarri has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240098107
    Abstract: A system and method monitor a computer resource asset for vulnerability and security weaknesses using a smart contract and a neural network. The system comprises a processor configured to receive data from a data source, a memory configured to store current smart contract baseline data, an artificial neural network including a plurality of nodes configured as a plurality of layers to determine a new data feed in the received data and to update the current smart contract baseline data, a smart contract monitoring subsystem configured to monitor a computer resource asset using the current smart contract baseline data, and a remediation subsystem configured to remediate access of the computer resource asset to a computer network. The method implements the system.
    Type: Application
    Filed: September 20, 2022
    Publication date: March 21, 2024
    Inventors: Johara Abdulrahman AL Jarri, Mohammed A. Alfraih
  • Patent number: 11868478
    Abstract: Configuration monitoring is performed using a computer-based system and method by identifying misconfigured settings through the collection of large amounts of configuration data from diverse sources. The configuration data is then analyzed to identify misconfigured items. Automation of such configurations is implemented using machine learning to analyze existing configurations as well as new configurations. By using machine learning, the computer-based system and method can predict a pass state or a fail state of the configuration of a newly connected system in an organization. A logistic regression classifier is trained using old complying configuration data and data reflecting industry standards. The trained classifier can predict and classify whether a new configuration passes or fails the industry standards based on the training data of old configuration data.
    Type: Grant
    Filed: May 18, 2020
    Date of Patent: January 9, 2024
    Assignee: SAUDI ARABIAN OIL COMPANY
    Inventors: Johara Abdulrahman Al Jarri, Aasim Ajaz
  • Patent number: 11799917
    Abstract: A system, a method, and a computer program remediate a risk of a computing resource located in a computer network that has a plurality of other computing resource assets each having an associated risk. Data associated with a first computing resource is received, and a first risk framework is selected from among a plurality of risk frameworks. A risk score is calculated based on the received data and the selected first risk framework, and a first risk rating is determined based on the risk score. The first risk rating is compared against a zone risk rating to determine whether the first risk rating is greater than the zone risk rating, and the first risk rating is replaced by the zone risk rating when the zone risk rating is greater than the first risk rating. The cybersecurity risk of the first computing resource is remediated according to the first risk rating.
    Type: Grant
    Filed: January 25, 2021
    Date of Patent: October 24, 2023
    Assignee: SAUDI ARABIAN OIL COMPANY
    Inventor: Johara Abdulrahman Al Jarri
  • Patent number: 11641371
    Abstract: Systems, methods, and computer-readable media for monitoring a computer network for threats using OLAP cubes are disclosed. In one embodiment, a method of monitoring a computer network for threats includes receiving, from a plurality of computing devices on the network, dataset data, asset data, and temporal data, and storing, in an online analytical processing cube for each computing device of the plurality of computing devices, the dataset data within a dataset dimension, the asset data within an asset dimension, and the temporal data within a temporal dimension. The method further includes searching one or more online analytical processing cubes for correlated data within two or more of the dataset dimension, the asset dimension, and the temporal dimension satisfying an alert metric, and issuing an alert when correlated data satisfies the alert metric.
    Type: Grant
    Filed: February 17, 2021
    Date of Patent: May 2, 2023
    Assignee: Saudi Arabian Oil Company
    Inventor: Johara Abdulrahman Al Jarri
  • Publication number: 20220263844
    Abstract: Systems, methods, and computer-readable media for monitoring a computer network for threats using OLAP cubes are disclosed. In one embodiment, a method of monitoring a computer network for threats includes receiving, from a plurality of computing devices on the network, dataset data, asset data, and temporal data, and storing, in an online analytical processing cube for each computing device of the plurality of computing devices, the dataset data within a dataset dimension, the asset data within an asset dimension, and the temporal data within a temporal dimension. The method further includes searching one or more online analytical processing cubes for correlated data within two or more of the dataset dimension, the asset dimension, and the temporal dimension satisfying an alert metric, and issuing an alert when correlated data satisfies the alert metric.
    Type: Application
    Filed: February 17, 2021
    Publication date: August 18, 2022
    Applicant: Saudi Arabian Oil Company
    Inventor: Johara Abdulrahman Al Jarri
  • Publication number: 20220239702
    Abstract: A system, a method, and a computer program remediate a risk of a computing resource located in a computer network that has a plurality of other computing resource assets each having an associated risk. Data associated with a first computing resource is received, and a first risk framework is selected from among a plurality of risk frameworks. A risk score is calculated based on the received data and the selected first risk framework, and a first risk rating is determined based on the risk score. The first risk rating is compared against a zone risk rating to determine whether the first risk rating is greater than the zone risk rating, and the first risk rating is replaced by the zone risk rating when the zone risk rating is greater than the first risk rating. The cybersecurity risk of the first computing resource is remediated according to the first risk rating.
    Type: Application
    Filed: January 25, 2021
    Publication date: July 28, 2022
    Inventor: Johara Abdulrahman AL Jarri
  • Publication number: 20210357506
    Abstract: Configuration monitoring is performed using a computer-based system and method by identifying misconfigured settings through the collection of large amounts of configuration data from diverse sources. The configuration data is then analyzed to identify misconfigured items. Automation of such configurations is implemented using machine learning to analyze existing configurations as well as new configurations. By using machine learning, the computer-based system and method can predict a pass state or a fail state of the configuration of a newly connected system in an organization. A logistic regression classifier is trained using old complying configuration data and data reflecting industry standards. The trained classifier can predict and classify whether a new configuration passes or fails the industry standards based on the training data of old configuration data.
    Type: Application
    Filed: May 18, 2020
    Publication date: November 18, 2021
    Inventors: Johara Abdulrahman AL Jarri, Aasim Ajaz