Patents by Inventor Michael Roytman

Michael Roytman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10332042
    Abstract: A method and system optimizes investments for each marketing channel of a multichannel marketing campaign. Past optimal investments are compared to current sales or profits for each marketing channel, and a new optimal investment is estimated for each marketing channel, which may be used as a marketing budget. A marketing dashboard is used to determine the new optimal investments for the marketing channels, and the new optimal investments are stored in a marketing database.
    Type: Grant
    Filed: February 17, 2010
    Date of Patent: June 25, 2019
    Assignee: ACCENTURE GLOBAL SERVICES LIMITED
    Inventors: Matthew Symons, Anatoly Roytman, Stephen Denis Kirkby, Andris Umblijs, Janmesh Srivastava, Michael J Williams
  • Publication number: 20190163917
    Abstract: Generation of one or more models is caused based on selecting training data comprising a plurality of features including a prevalence feature for each vulnerability of a first plurality of vulnerabilities. The one or more models enable predicting whether an exploit will be developed for a vulnerability and/or whether the exploit will be used in an attack. The one or more models are applied to input data comprising the prevalence feature for each vulnerability of a second plurality of vulnerabilities. Based on the application of the one or more models to the input data, output data is received. The output data indicates a prediction of whether an exploit will be developed for each vulnerability of the second plurality. Additionally or alternatively, the output data indicates, for each vulnerability of the second plurality, a prediction of whether an exploit that has yet to be developed will be used in an attack.
    Type: Application
    Filed: October 12, 2018
    Publication date: May 30, 2019
    Inventors: Edward T. Bellis, Michael Roytman, Jeffrey Heuer
  • Patent number: 10305925
    Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: May 28, 2019
    Assignee: Kenna Security, Inc.
    Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
  • Publication number: 20190104180
    Abstract: Presented here are system and methods for collecting information from devices, such as sensors, that are not necessarily connected to the Internet. Multiple sensors are distributed in a geographic area. The sensors power up every 10 minutes to gather data about the environment and then power down to save battery. A collecting device, i.e., a device attached to a moving object, traverses the geographic area containing the sensors, and continuously sends wake-up signals into the environment. When a sensor is within 20 feet of the collecting device, and receives the wake-up signal, the sensor uploads the gathered data to the collecting device. Subsequently, when the collecting device establishes an Internet connection, the collecting device uploads the gathered data to a central database.
    Type: Application
    Filed: November 10, 2017
    Publication date: April 4, 2019
    Inventors: Stefan Anastas Nagey, Jesse Erin Berns, Michael Roytman
  • Publication number: 20190104471
    Abstract: Presented here are system and methods for collecting information from devices, such as sensors, that are not necessarily connected to the Internet. Multiple sensors are distributed in a geographic area. The sensors power up every 10 minutes to gather data about the environment and then power down to save battery. A collecting device, i.e., a device attached to a moving object, traverses the geographic area containing the sensors, and continuously sends wake-up signals into the environment. When a sensor is within 20 feet of the collecting device, and receives the wake-up signal, the sensor uploads the gathered data to the collecting device. Subsequently, when the collecting device establishes an Internet connection, the collecting device uploads the gathered data to a central database.
    Type: Application
    Filed: November 10, 2017
    Publication date: April 4, 2019
    Inventors: Stefan Anastas Nagey, Jesse Erin Berns, Michael Roytman
  • Publication number: 20190087475
    Abstract: Presented here is a system for automatic conversion of data between various data sets. In one embodiment, the system can obtain a data set, can analyze associations between the variables in the data set, and can convert the data set into a canonical data model. The canonical data model is a smaller representation of the original data set because insignificant variables and associations can be left out, and significant relationships can be represented procedurally and/or using mathematical functions. In one embodiment, part of the system can be a trained machine learning model which can convert the input data set into a canonical data model. The canonical data model can be a more efficient representation of the input data set. Consequently, various actions, such as an analysis of the data set, merging of two data sets, etc. can be performed more efficiently on the canonical data model.
    Type: Application
    Filed: September 12, 2018
    Publication date: March 21, 2019
    Inventors: Stefan Anastas Nagey, James Charles Bursa, Samuel Vincent Scarpino, Conor Matthew Hastings, Agastya Mondal, Michael Roytman
  • Publication number: 20190087474
    Abstract: Presented here is a system for automatic conversion of data between various data sets. In one embodiment, the system can obtain a data set, can analyze associations between the variables in the data set, and can convert the data set into a canonical data model. The canonical data model is a smaller representation of the original data set because insignificant variables and associations can be left out, and significant relationships can be represented procedurally and/or using mathematical functions. In one embodiment, part of the system can be a trained machine learning model which can convert the input data set into a canonical data model. The canonical data model can be a more efficient representation of the input data set. Consequently, various actions, such as an analysis of the data set, merging of two data sets, etc. can be performed more efficiently on the canonical data model.
    Type: Application
    Filed: September 12, 2018
    Publication date: March 21, 2019
    Inventors: Stefan Anastas Nagey, James Charles Bursa, Samuel Vincent Scarpino, Conor Matthew Hastings, Agastya Mondal, Michael Roytman
  • Patent number: 10114954
    Abstract: Generation of one or more models is caused based on selecting training data comprising a plurality of features including a prevalence feature for each vulnerability of a first plurality of vulnerabilities. The one or more models enable predicting whether an exploit will be developed for a vulnerability and/or whether the exploit will be used in an attack. The one or more models are applied to input data comprising the prevalence feature for each vulnerability of a second plurality of vulnerabilities. Based on the application of the one or more models to the input data, output data is received. The output data indicates a prediction of whether an exploit will be developed for each vulnerability of the second plurality. Additionally or alternatively, the output data indicates, for each vulnerability of the second plurality, a prediction of whether an exploit that has yet to be developed will be used in an attack.
    Type: Grant
    Filed: November 30, 2017
    Date of Patent: October 30, 2018
    Assignee: Kenna Security, Inc.
    Inventors: Edward T. Bellis, Michael Roytman, Jeffrey Heuer
  • Publication number: 20180077193
    Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.
    Type: Application
    Filed: November 20, 2017
    Publication date: March 15, 2018
    Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
  • Patent number: 9825981
    Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: November 21, 2017
    Assignee: Kenna Security, Inc.
    Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
  • Publication number: 20170123643
    Abstract: The technology presented here enables low skilled administrators to design a hierarchical survey, low skilled field agents to collect answers to the hierarchical survey, and low skilled field managers to manage and monitor the progress of the field agents. The hierarchical surveys designed can be complex hierarchical surveys comprising multi-stage sampling units. The graphical user interfaces presented to the users are easy to use, and hide the complexity of the hierarchical survey. The user devices can communicate with each other to transmit the hierarchical surveys and the answers received to the hierarchical surveys using peer-to-peer networks, in environments where there is low, or no Internet connectivity.
    Type: Application
    Filed: December 17, 2015
    Publication date: May 4, 2017
    Inventors: Jesse Erin BERNS, Michael ROYTMAN, Jennifer Paige GRIFFIN
  • Publication number: 20160072835
    Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.
    Type: Application
    Filed: November 16, 2015
    Publication date: March 10, 2016
    Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
  • Patent number: 9270695
    Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.
    Type: Grant
    Filed: March 9, 2015
    Date of Patent: February 23, 2016
    Assignee: Risk I/O, Inc.
    Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
  • Publication number: 20150237065
    Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.
    Type: Application
    Filed: March 9, 2015
    Publication date: August 20, 2015
    Inventors: MICHAEL ROYTMAN, EDWARD T. BELLIS, JEFFREY HEUER
  • Publication number: 20150237062
    Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.
    Type: Application
    Filed: February 14, 2014
    Publication date: August 20, 2015
    Applicant: Risk I/O, Inc.
    Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
  • Patent number: 8966639
    Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.
    Type: Grant
    Filed: February 14, 2014
    Date of Patent: February 24, 2015
    Assignee: Risk I/O, Inc.
    Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
  • Patent number: 6484200
    Abstract: Method and system for allowing a computer network operations manager to subscribe for and receive notifications concerning network events from one or more objects or object levels, as defined by distinguished name scoping, and optionally having at least one event characteristic from a selected list. The selected list of characteristics may include: one or more levels of network objects involved in the event; one or more specified network nodes involved in the event; a specified geographical region in which said event occurs; a specified period of days within which the event occurs or is initiated; a specified time interval within which the event occurs or is initiated; a specified class of devices involved in the event; and an event of one or more specified event types.
    Type: Grant
    Filed: June 11, 1999
    Date of Patent: November 19, 2002
    Assignee: Sun Microsystems, Inc.
    Inventors: Rajeev Angal, Shivaram Bhat, Michael Roytman, Subodh Bapat
  • Patent number: 6356282
    Abstract: The alarm manager display in a distributed network management system is arranged to have two modes of operation. In one mode of operation, the alarm manager display automatically scrolls when new events arrive. If there are sorting criteria defined, the alarm manager window scrolls either up or down depending on the sort order so that when new events arrive, they always appear on the screen. In the second mode of operation, the alarm manager window does not scroll when new events arrive. The scroll bar operational modes are selectable by an operator from a menu. In accordance with another embodiment, a special attribute is added to the alarm manager configuration file. This attribute is read when the alarm manager is started and places the alarm manager into the operational mode in which it was last used.
    Type: Grant
    Filed: December 4, 1998
    Date of Patent: March 12, 2002
    Assignee: Sun Microsystems, Inc.
    Inventors: Michael Roytman, Plamen Petrov
  • Publication number: 20020012011
    Abstract: The alarm manager display in a distributed network management system is arranged to have two modes of operation. In one mode of operation, the alarm manager display automatically scrolls when new events arrive. If there are sorting criteria defined, the alarm manager window scrolls either up or down depending on the sort order so that when new events arrive, they always appear on the screen. In the second mode of operation, the alarm manager window does not scroll when new events arrive. The scroll bar operational modes are selectable by an operator from a menu. In accordance with another embodiment, a special attribute is added to the alarm manager configuration file. This attribute is read when the alarm manager is started and places the alarm manager into the operational mode in which it was last used.
    Type: Application
    Filed: December 4, 1998
    Publication date: January 31, 2002
    Inventors: MICHAEL ROYTMAN, PLAMEN PETROV