Patents by Inventor Yolanta Beresnevichiene

Yolanta Beresnevichiene has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9607155
    Abstract: A system for analyzing an environment to identify a security risk in a process, comprising a model engine to generate a model of the environment using multiple components defining adjustable elements of the model and including components representing a patching process for the environment, a risk analyzer to calculate multiple randomized instances of an outcome for the environment using multiple values for parameters of the elements of the model selected from within respective predefined ranges for the parameters, and to use a results plan to provide data for identifying a security risk in the patching process using the multiple instances.
    Type: Grant
    Filed: October 29, 2010
    Date of Patent: March 28, 2017
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Yolanta Beresnevichiene, Jonathan F. Griffin
  • Publication number: 20140337971
    Abstract: A mapping system is provided that makes use of security data collected from various data sources. Following appropriate pre-processing, the mapping system analyses the security data to provide estimated values for parameters in a security model, the security model in turn being based on one or more mathematical representations.
    Type: Application
    Filed: February 22, 2012
    Publication date: November 13, 2014
    Inventors: Marco Casassa Mont, Yolanta Beresnevichiene, Shane Sullivan, Richard Brown
  • Patent number: 8650637
    Abstract: A security risk of a computer network is assessed by simulating a threat environment of the computer network, wherein the threat environment includes a vulnerability and a website, simulating a protection environment of the computer network and a computer system in the computer network, and simulating network activity of the computer system. The security risk of the computer network is assessed based at least in part on the simulated threat environment, the simulated protection environment, and the simulated network activity of the computer system.
    Type: Grant
    Filed: August 24, 2011
    Date of Patent: February 11, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Yolanta Beresnevichiene, Fotios Tsifountidis
  • Patent number: 8397302
    Abstract: A system for analyzing a process, comprising a model engine to generate a model of the environment using multiple components defining adjustable elements of the model and including components representing a process for provisioning and de-provisioning of access credentials for an individual in the environment and a risk analyzer to calculate multiple randomized instances of an outcome for the environment using multiple values for parameters of the elements of the model selected from within respective predefined ranges for the parameters, and to use a results plan to provide data for identifying the security risk using the multiple instances.
    Type: Grant
    Filed: October 29, 2010
    Date of Patent: March 12, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Marco Casassa Mont, Yolanta Beresnevichiene, Simon Kai-Ying Shiu
  • Publication number: 20130055394
    Abstract: A security risk of a computer network is assessed by simulating a threat environment of the computer network, wherein the threat environment includes a vulnerability and a website, simulating a protection environment of the computer network and a computer system in the computer network, and simulating network activity of the computer system. The security risk of the computer network is assessed based at least in part on the simulated threat environment, the simulated protection environment, and the simulated network activity of the computer system.
    Type: Application
    Filed: August 24, 2011
    Publication date: February 28, 2013
    Inventors: Yolanta Beresnevichiene, Fotios Tsifountidis
  • Publication number: 20120179501
    Abstract: Information relating to an entity's objectives is received, a utility function based on the received objectives is derived, the utility function is compared with results from a number of simulated investment options, and the comparisons are presented to a user associated with the entity.
    Type: Application
    Filed: January 7, 2011
    Publication date: July 12, 2012
    Inventors: Yolanta Beresnevichiene, Marco Casassa Mont, David Pym, Simon Kai-Ying Shiu
  • Publication number: 20120110671
    Abstract: A system for analyzing an environment to identify a security risk in a process, comprising a model engine to generate a model of the environment using multiple components defining adjustable elements of the model and including components representing a patching process for the environment, a risk analyzer to calculate multiple randomized instances of an outcome for the environment using multiple values for parameters of the elements of the model selected from within respective predefined ranges for the parameters, and to use a results plan to provide data for identifying a security risk in the patching process using the multiple instances.
    Type: Application
    Filed: October 29, 2010
    Publication date: May 3, 2012
    Inventors: Yolanta Beresnevichiene, Jonathan F. Griffin
  • Publication number: 20120110669
    Abstract: A system for analyzing an environment to identify a security risk, comprising a model engine to generate a model of the environment using multiple components defining adjustable elements of the model and a risk analyzer to calculate multiple randomized instances of an outcome for the environment using multiple values for parameters of the elements of the model selected from within respective predefined ranges for the parameters.
    Type: Application
    Filed: October 29, 2010
    Publication date: May 3, 2012
    Inventors: Yolanta Beresnevichiene, Adrian John Baldwin, Jonathan F. Griffin, Simon K.Y. Shiu, Marco Casassa Mont, Brian Quentin Monahan, David J. Pym
  • Publication number: 20120110670
    Abstract: A system for analyzing a process, comprising a model engine to generate a model of the environment using multiple components defining adjustable elements of the model and including components representing a process for provisioning and de-provisioning of access credentials for an individual in the environment and a risk analyzer to calculate multiple randomized instances of an outcome for the environment using multiple values for parameters of the elements of the model selected from within respective predefined ranges for the parameters, and to use a results plan to provide data for identifying the security risk using the multiple instances.
    Type: Application
    Filed: October 29, 2010
    Publication date: May 3, 2012
    Inventors: Marco Casassa Mont, Yolanta Beresnevichiene, Simon Kai-Ying Shiu
  • Patent number: 8069450
    Abstract: A method of computer operating system data management comprising the steps of: (a) associating data management information with data input to a process (300); and (b) regulating operating system operations involving the data according to the data management information is provided (310). A computing platform (1) for operating system data management is also provided. Furthermore, a computer program including instructions configured to enable operating system data management, an operating system, and an operating system data management method and apparatus arranged to identify data having data management information associated therewith when that data is read into a memory space are provided.
    Type: Grant
    Filed: January 26, 2004
    Date of Patent: November 29, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Yolanta Beresnevichiene, David Plaquin, Christopher I. Dalton
  • Publication number: 20110252479
    Abstract: A method for analyzing risk to a system, the method being carried out by a computer having a processor and system memory, includes the steps of inputting data representing multiple threat objectives that comprise the risk, calculating a residual risk for each threat objective in view of a plurality of control mechanisms, and generating output representing an overall residual risk to the system that is a combination of the residual risks.
    Type: Application
    Filed: April 8, 2010
    Publication date: October 13, 2011
    Inventors: Yolanta Beresnevichiene, Sandeep N. Bhatt, William G. Horne, Tari Schreider
  • Patent number: 7908640
    Abstract: A data handling apparatus (400) for a computer platform (1) using an operating system executing a process, the apparatus comprising a system call monitor (402) for detecting predetermined system calls, and means (402, 404, 406) for applying a data handling policy to the system call upon a predetermined system call being detected, whereby the data handling policy is applied for all system calls involving the writing of data outside the process. A corresponding method is disclosed.
    Type: Grant
    Filed: January 26, 2004
    Date of Patent: March 15, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Yolanta Beresnevichiene, David Plaquin, Christopher I. Dalton
  • Publication number: 20080271110
    Abstract: In one embodiment, a system or method pertain to accessing a model that comprises a computer-readable version of a standard or policy, identifying rules or requirements specified by the model that pertain to compliance with the standard or policy, and automatically generating questions relevant to the identified rules or requirements, the questions being intended to query intended respondents as to compliance with the identified rules or requirements.
    Type: Application
    Filed: April 25, 2007
    Publication date: October 30, 2008
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: David Graves, Adrian John Baldwin, Yolanta Beresnevichiene, Simon Kai-Ying Shiu
  • Publication number: 20080270198
    Abstract: In one embodiment, a system and method pertain to receiving audit exceptions indicative of instances of noncompliance of an information system under evaluation relative to a policy or standard, identifying remediation recommendations that are relevant to the audit exceptions and that indicate how to correct conditions that caused the noncompliance, and providing the remediation recommendations to an entity responsible for correcting the conditions so as to provide information as to how the information system can be brought into compliance with the policy or standard.
    Type: Application
    Filed: April 25, 2007
    Publication date: October 30, 2008
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: David Graves, Adrian John Baldwin, Yolanta Beresnevichiene, Philippe Lamy, Simon Kai-Ying Shiu
  • Publication number: 20070276711
    Abstract: A method of monitoring compliance with a business process comprising the steps of: generating, from a record of the business process and further information not expressed explicitly within the record of the process, a canonical model of all processes of a given genre which are to be monitored; applying the canonical model to the process as recorded to generate a process-specific model in which specific process operations are expressed in canonical form; and measuring the performance of the process by generating reports, based on the algorithms contained within the process-specific model and data generated by actual performance of the process, thereby to indicate whether the process is compliant.
    Type: Application
    Filed: May 23, 2006
    Publication date: November 29, 2007
    Inventors: Simon Shiu, Adrian Baldwin, Yolanta Beresnevichiene
  • Publication number: 20060155738
    Abstract: A monitoring method and system for monitoring compliance of a policy in an IT infrastructure (150) are described. A modeling component (110) and an analysis system (110) are used. The modeling component (110) is arranged to model the policy and configure the analysis system in dependence on the model and the analysis system (100) is arranged to monitor aspects of the IT infrastructure (150) in dependence on the model.
    Type: Application
    Filed: December 14, 2005
    Publication date: July 13, 2006
    Inventors: Adrian Baldwin, David Plaquin, Nicholas Murison, Yolanta Beresnevichiene
  • Publication number: 20050076293
    Abstract: The present invention provides a document storage specification generator apparatus (2) for generating a storage specification (14) for a document (10), the document (10) having associated with it at least one storage label (12), the apparatus (2) comprising a storage specification template database (4) for determining storage specification templates according to storage labels associated with documents, a rules database (6) comprising rules for resolving conflicts between conflicting storage specification templates and a storage specification generator (8) for generating a storage specification (14) for the document (10) therefrom. A corresponding method, which may use specification fields, and appropriately programmed computer apparatus is also disclosed.
    Type: Application
    Filed: June 27, 2003
    Publication date: April 7, 2005
    Inventor: Yolanta Beresnevichiene
  • Publication number: 20050060561
    Abstract: A method of protecting a user's data comprises: a) wrapping data content to be sent to a third party computing platform in a compound software wrapper; b) interrogating the third party computing platform for compliance with a trusted platform specification; c) on successful interrogation of the third party computing platform, transmitting the data content wrapped in the compound wrapper to the third party computing platform; d) unwrapping the compound software wrapper on the third party computing platform; e) wherein the third party computing platform treats the data content in conformity with a compound policy forming part of the software wrapper which compound policy specifies how the data content may be used.
    Type: Application
    Filed: July 20, 2004
    Publication date: March 17, 2005
    Inventors: Siani Pearson, Yolanta Beresnevichiene
  • Publication number: 20050060568
    Abstract: A method of controlling access to data comprises: a) in a first platform wrapping selected data content and at least one information flow control policy in a software wrapper; b) interrogating a second platform for compliance with a trusted platform specification; c) on successful interrogation of the second platform, sending the wrapped data content to the second platform; and d) unwrapping the wrapped data content within the trusted environment of the second platform for use.
    Type: Application
    Filed: July 22, 2004
    Publication date: March 17, 2005
    Inventors: Yolanta Beresnevichiene, Siani Pearson
  • Publication number: 20040210906
    Abstract: A data handling apparatus (400) for a computer platform (1) using an operating system executing a process, the apparatus comprising a system call monitor (402) for detecting predetermined system calls, and means (402, 404, 406) for applying a data handling policy to the system call upon a predetermined system call being detected, whereby the data handling policy is applied for all system calls involving the writing of data outside the process. A corresponding method is disclosed.
    Type: Application
    Filed: January 26, 2004
    Publication date: October 21, 2004
    Inventors: Yolanta Beresnevichiene, David Plaquin, Christopher I. Dalton