Patents by Inventor Megumi Ando
Megumi Ando has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12010137Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.Type: GrantFiled: August 22, 2023Date of Patent: June 11, 2024Assignee: BitSight Technologies, Inc.Inventors: Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
-
Patent number: 11882146Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.Type: GrantFiled: September 5, 2023Date of Patent: January 23, 2024Assignee: BitSight Technologies, Inc.Inventors: Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
-
Publication number: 20230421600Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.Type: ApplicationFiled: September 5, 2023Publication date: December 28, 2023Inventors: Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
-
Publication number: 20230403295Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.Type: ApplicationFiled: August 22, 2023Publication date: December 14, 2023Inventors: Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
-
Patent number: 11777976Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.Type: GrantFiled: October 13, 2020Date of Patent: October 3, 2023Assignee: BitSight Technologies, Inc.Inventors: Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
-
Publication number: 20210211454Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.Type: ApplicationFiled: October 13, 2020Publication date: July 8, 2021Inventors: Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
-
Patent number: 10805331Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.Type: GrantFiled: September 22, 2011Date of Patent: October 13, 2020Assignee: BitSight Technologies, Inc.Inventors: Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
-
Patent number: 9973524Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.Type: GrantFiled: November 18, 2015Date of Patent: May 15, 2018Assignee: BitSight Technologies, Inc.Inventors: Stephen Boyer, Nagarjuna Venna, Megumi Ando
-
Publication number: 20160323308Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.Type: ApplicationFiled: November 18, 2015Publication date: November 3, 2016Inventors: Stephen Boyer, Nagarjuna Venna, Megumi Ando
-
Publication number: 20160205126Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.Type: ApplicationFiled: September 22, 2011Publication date: July 14, 2016Applicant: BITSIGHT TECHNOLOGIES, INC.Inventors: Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
-
Patent number: 9319877Abstract: The technology includes a method for generating a secret key. The method includes receiving initialization data, the initialization data includes an initialization packet and a transmission path channel response; generating sample data based on the transmission path channel response; and generating a secret key based on the sample data utilizing a chaotic map.Type: GrantFiled: December 21, 2010Date of Patent: April 19, 2016Assignee: Massachusetts Institute of TechnologyInventor: Megumi Ando
-
Publication number: 20120159147Abstract: The technology includes a method for generating a secret key. The method includes receiving initialization data, the initialization data includes an initialization packet and a transmission path channel response; generating sample data based on the transmission path channel response; and generating a secret key based on the sample data utilizing a chaotic map.Type: ApplicationFiled: December 21, 2010Publication date: June 21, 2012Inventor: Megumi Ando