Patents by Inventor Michael Roytman
Michael Roytman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10305925Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.Type: GrantFiled: November 20, 2017Date of Patent: May 28, 2019Assignee: Kenna Security, Inc.Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
-
Publication number: 20190104180Abstract: Presented here are system and methods for collecting information from devices, such as sensors, that are not necessarily connected to the Internet. Multiple sensors are distributed in a geographic area. The sensors power up every 10 minutes to gather data about the environment and then power down to save battery. A collecting device, i.e., a device attached to a moving object, traverses the geographic area containing the sensors, and continuously sends wake-up signals into the environment. When a sensor is within 20 feet of the collecting device, and receives the wake-up signal, the sensor uploads the gathered data to the collecting device. Subsequently, when the collecting device establishes an Internet connection, the collecting device uploads the gathered data to a central database.Type: ApplicationFiled: November 10, 2017Publication date: April 4, 2019Inventors: Stefan Anastas Nagey, Jesse Erin Berns, Michael Roytman
-
Publication number: 20190104471Abstract: Presented here are system and methods for collecting information from devices, such as sensors, that are not necessarily connected to the Internet. Multiple sensors are distributed in a geographic area. The sensors power up every 10 minutes to gather data about the environment and then power down to save battery. A collecting device, i.e., a device attached to a moving object, traverses the geographic area containing the sensors, and continuously sends wake-up signals into the environment. When a sensor is within 20 feet of the collecting device, and receives the wake-up signal, the sensor uploads the gathered data to the collecting device. Subsequently, when the collecting device establishes an Internet connection, the collecting device uploads the gathered data to a central database.Type: ApplicationFiled: November 10, 2017Publication date: April 4, 2019Inventors: Stefan Anastas Nagey, Jesse Erin Berns, Michael Roytman
-
Publication number: 20190087474Abstract: Presented here is a system for automatic conversion of data between various data sets. In one embodiment, the system can obtain a data set, can analyze associations between the variables in the data set, and can convert the data set into a canonical data model. The canonical data model is a smaller representation of the original data set because insignificant variables and associations can be left out, and significant relationships can be represented procedurally and/or using mathematical functions. In one embodiment, part of the system can be a trained machine learning model which can convert the input data set into a canonical data model. The canonical data model can be a more efficient representation of the input data set. Consequently, various actions, such as an analysis of the data set, merging of two data sets, etc. can be performed more efficiently on the canonical data model.Type: ApplicationFiled: September 12, 2018Publication date: March 21, 2019Inventors: Stefan Anastas Nagey, James Charles Bursa, Samuel Vincent Scarpino, Conor Matthew Hastings, Agastya Mondal, Michael Roytman
-
Publication number: 20190087475Abstract: Presented here is a system for automatic conversion of data between various data sets. In one embodiment, the system can obtain a data set, can analyze associations between the variables in the data set, and can convert the data set into a canonical data model. The canonical data model is a smaller representation of the original data set because insignificant variables and associations can be left out, and significant relationships can be represented procedurally and/or using mathematical functions. In one embodiment, part of the system can be a trained machine learning model which can convert the input data set into a canonical data model. The canonical data model can be a more efficient representation of the input data set. Consequently, various actions, such as an analysis of the data set, merging of two data sets, etc. can be performed more efficiently on the canonical data model.Type: ApplicationFiled: September 12, 2018Publication date: March 21, 2019Inventors: Stefan Anastas Nagey, James Charles Bursa, Samuel Vincent Scarpino, Conor Matthew Hastings, Agastya Mondal, Michael Roytman
-
Patent number: 10114954Abstract: Generation of one or more models is caused based on selecting training data comprising a plurality of features including a prevalence feature for each vulnerability of a first plurality of vulnerabilities. The one or more models enable predicting whether an exploit will be developed for a vulnerability and/or whether the exploit will be used in an attack. The one or more models are applied to input data comprising the prevalence feature for each vulnerability of a second plurality of vulnerabilities. Based on the application of the one or more models to the input data, output data is received. The output data indicates a prediction of whether an exploit will be developed for each vulnerability of the second plurality. Additionally or alternatively, the output data indicates, for each vulnerability of the second plurality, a prediction of whether an exploit that has yet to be developed will be used in an attack.Type: GrantFiled: November 30, 2017Date of Patent: October 30, 2018Assignee: Kenna Security, Inc.Inventors: Edward T. Bellis, Michael Roytman, Jeffrey Heuer
-
Publication number: 20180077193Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.Type: ApplicationFiled: November 20, 2017Publication date: March 15, 2018Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
-
Patent number: 9825981Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.Type: GrantFiled: November 16, 2015Date of Patent: November 21, 2017Assignee: Kenna Security, Inc.Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
-
Publication number: 20170123643Abstract: The technology presented here enables low skilled administrators to design a hierarchical survey, low skilled field agents to collect answers to the hierarchical survey, and low skilled field managers to manage and monitor the progress of the field agents. The hierarchical surveys designed can be complex hierarchical surveys comprising multi-stage sampling units. The graphical user interfaces presented to the users are easy to use, and hide the complexity of the hierarchical survey. The user devices can communicate with each other to transmit the hierarchical surveys and the answers received to the hierarchical surveys using peer-to-peer networks, in environments where there is low, or no Internet connectivity.Type: ApplicationFiled: December 17, 2015Publication date: May 4, 2017Inventors: Jesse Erin BERNS, Michael ROYTMAN, Jennifer Paige GRIFFIN
-
Publication number: 20160072835Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.Type: ApplicationFiled: November 16, 2015Publication date: March 10, 2016Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
-
Patent number: 9270695Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.Type: GrantFiled: March 9, 2015Date of Patent: February 23, 2016Assignee: Risk I/O, Inc.Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
-
Publication number: 20150237062Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.Type: ApplicationFiled: February 14, 2014Publication date: August 20, 2015Applicant: Risk I/O, Inc.Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
-
Publication number: 20150237065Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.Type: ApplicationFiled: March 9, 2015Publication date: August 20, 2015Inventors: MICHAEL ROYTMAN, EDWARD T. BELLIS, JEFFREY HEUER
-
Patent number: 8966639Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.Type: GrantFiled: February 14, 2014Date of Patent: February 24, 2015Assignee: Risk I/O, Inc.Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
-
Patent number: 6484200Abstract: Method and system for allowing a computer network operations manager to subscribe for and receive notifications concerning network events from one or more objects or object levels, as defined by distinguished name scoping, and optionally having at least one event characteristic from a selected list. The selected list of characteristics may include: one or more levels of network objects involved in the event; one or more specified network nodes involved in the event; a specified geographical region in which said event occurs; a specified period of days within which the event occurs or is initiated; a specified time interval within which the event occurs or is initiated; a specified class of devices involved in the event; and an event of one or more specified event types.Type: GrantFiled: June 11, 1999Date of Patent: November 19, 2002Assignee: Sun Microsystems, Inc.Inventors: Rajeev Angal, Shivaram Bhat, Michael Roytman, Subodh Bapat
-
Patent number: 6356282Abstract: The alarm manager display in a distributed network management system is arranged to have two modes of operation. In one mode of operation, the alarm manager display automatically scrolls when new events arrive. If there are sorting criteria defined, the alarm manager window scrolls either up or down depending on the sort order so that when new events arrive, they always appear on the screen. In the second mode of operation, the alarm manager window does not scroll when new events arrive. The scroll bar operational modes are selectable by an operator from a menu. In accordance with another embodiment, a special attribute is added to the alarm manager configuration file. This attribute is read when the alarm manager is started and places the alarm manager into the operational mode in which it was last used.Type: GrantFiled: December 4, 1998Date of Patent: March 12, 2002Assignee: Sun Microsystems, Inc.Inventors: Michael Roytman, Plamen Petrov
-
Publication number: 20020012011Abstract: The alarm manager display in a distributed network management system is arranged to have two modes of operation. In one mode of operation, the alarm manager display automatically scrolls when new events arrive. If there are sorting criteria defined, the alarm manager window scrolls either up or down depending on the sort order so that when new events arrive, they always appear on the screen. In the second mode of operation, the alarm manager window does not scroll when new events arrive. The scroll bar operational modes are selectable by an operator from a menu. In accordance with another embodiment, a special attribute is added to the alarm manager configuration file. This attribute is read when the alarm manager is started and places the alarm manager into the operational mode in which it was last used.Type: ApplicationFiled: December 4, 1998Publication date: January 31, 2002Inventors: MICHAEL ROYTMAN, PLAMEN PETROV