Patents by Inventor Elizabeth Lawler

Elizabeth Lawler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11893364
    Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating new versions of the code based on the code behavior models. In some embodiments, a method of improving a codebase includes recording a run of the existing code, characterizing the code behavior via one or more models, prototyping new code according to a target language and target environment, deploying the new code to the target environment, and comparing the behavior of the new code to the behavior of the existing code. In some implementations, generating new code based on the behavior models includes using one or more machine learning techniques for code generation based on the target language and environment.
    Type: Grant
    Filed: August 19, 2022
    Date of Patent: February 6, 2024
    Assignee: AppLand Inc.
    Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
  • Publication number: 20230273775
    Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating new versions of the code based on the code behavior models. In some embodiments, a method of improving a codebase includes recording a run of the existing code, characterizing the code behavior via one or more models, prototyping new code according to a target language and target environment, deploying the new code to the target environment, and comparing the behavior of the new code to the behavior of the existing code. In some implementations, generating new code based on the behavior models includes using one or more machine learning techniques for code generation based on the target language and environment.
    Type: Application
    Filed: April 11, 2023
    Publication date: August 31, 2023
    Applicant: AppLand Inc.
    Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
  • Patent number: 11650799
    Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating new versions of the code based on the code behavior models. In some embodiments, a method of improving a codebase includes recording a run of the existing code, characterizing the code behavior via one or more models, prototyping new code according to a target language and target environment, deploying the new code to the target environment, and comparing the behavior of the new code to the behavior of the existing code. In some implementations, generating new code based on the behavior models includes using one or more machine learning techniques for code generation based on the target language and environment.
    Type: Grant
    Filed: December 2, 2020
    Date of Patent: May 16, 2023
    Assignee: AppLand Inc.
    Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
  • Publication number: 20220391179
    Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating new versions of the code based on the code behavior models. In some embodiments, a method of improving a codebase includes recording a run of the existing code, characterizing the code behavior via one or more models, prototyping new code according to a target language and target environment, deploying the new code to the target environment, and comparing the behavior of the new code to the behavior of the existing code. In some implementations, generating new code based on the behavior models includes using one or more machine learning techniques for code generation based on the target language and environment.
    Type: Application
    Filed: August 19, 2022
    Publication date: December 8, 2022
    Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
  • Patent number: 11455150
    Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating new versions of the code based on the code behavior models. In some embodiments, a method of improving a codebase includes recording a run of the existing code, characterizing the code behavior via one or more models, prototyping new code according to a target language and target environment, deploying the new code to the target environment, and comparing the behavior of the new code to the behavior of the existing code. In some implementations, generating new code based on the behavior models includes using one or more machine learning techniques for code generation based on the target language and environment.
    Type: Grant
    Filed: June 24, 2020
    Date of Patent: September 27, 2022
    Assignee: Appland Inc.
    Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
  • Publication number: 20210365354
    Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating characterizations of the code behavior and interrelations based on the code models. Some embodiments include user interfaces that provide views into the characterizations and interrelations of the application features and components that can give developers insights quickly and efficiently into applications which may be used for future developments and modifications to the application and to avoid introducing bugs into the application.
    Type: Application
    Filed: May 24, 2021
    Publication date: November 25, 2021
    Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
  • Publication number: 20210165640
    Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating new versions of the code based on the code behavior models. In some embodiments, a method of improving a codebase includes recording a run of the existing code, characterizing the code behavior via one or more models, prototyping new code according to a target language and target environment, deploying the new code to the target environment, and comparing the behavior of the new code to the behavior of the existing code. In some implementations, generating new code based on the behavior models includes using one or more machine learning techniques for code generation based on the target language and environment.
    Type: Application
    Filed: June 24, 2020
    Publication date: June 3, 2021
    Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
  • Publication number: 20210165641
    Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating new versions of the code based on the code behavior models. In some embodiments, a method of improving a codebase includes recording a run of the existing code, characterizing the code behavior via one or more models, prototyping new code according to a target language and target environment, deploying the new code to the target environment, and comparing the behavior of the new code to the behavior of the existing code. In some implementations, generating new code based on the behavior models includes using one or more machine learning techniques for code generation based on the target language and environment.
    Type: Application
    Filed: December 2, 2020
    Publication date: June 3, 2021
    Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
  • Publication number: 20200004946
    Abstract: Disclosed embodiments relate to secretless and secure communications with access-protected network resources. Techniques include identifying a request from a client service to access an access-protected network resource; automatically identifying an identity token uniquely associated with the client service for enabling autonomous authentication of the client service using the identity token; providing, from a secretless connection broker to an authentication credential provider, the identity token uniquely associated with the client service; receiving, from the authentication credential provider, based on the identity token and conditional on successful authentication of the client service, a connection credential; establishing a secure connection with the access-protected network resource using the connection credential; and exchanging secure communications with the access-protected network resource.
    Type: Application
    Filed: August 16, 2018
    Publication date: January 2, 2020
    Applicant: CyberArk Software Ltd.
    Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne
  • Patent number: 10397213
    Abstract: An access control service to provide access control for operations between resources and/or between resources and users in a cloud computing environment. The access control service receives a request to perform an operation. The requested operation could be initiated by a resource with respect to another resource. The requested operation could also be initiated by a user with respect to a resource. The access control service determines whether the requested operation is permitted. If the requested operation is permitted, the access control service provides the credentials required to perform the requested operation.
    Type: Grant
    Filed: May 26, 2015
    Date of Patent: August 27, 2019
    Assignee: CONJUR, INC.
    Inventors: Kevin Gilpin, Elizabeth Lawler
  • Patent number: 9985970
    Abstract: To provide enhanced operation of computing systems to control access to audit logging resources by virtual machines, various systems, apparatuses, methods, and software are provided herein. In a first example, a method of operating a computing system is provided. The method includes receiving requests for audit credentials from virtual machines, and responsively providing individualized audit credentials to the virtual machines based at least on identities of the virtual machines. The method also includes, in the audit system, authorizing storage of audit data transferred by the virtual machines based at least on the individualized audit credentials accompanying the audit data. The method also includes, in the authorization system, selectively de-authorizing one or more of the virtual machines and reporting information regarding the de-authorized one or more of the virtual machines to the one or more audit systems.
    Type: Grant
    Filed: October 9, 2014
    Date of Patent: May 29, 2018
    Assignee: CONJUR, INC.
    Inventors: Kevin Gilpin, Elizabeth Lawler
  • Publication number: 20170324728
    Abstract: To provide enhanced operation of virtualized computing systems, various systems, apparatuses, methods, and software are provided herein. In a first example, a method of operating a computing system to control access to data resources by virtual machines is provided. The method includes receiving an access token and an instantiation command from an end user system. Responsive to the instantiation command, the method includes instantiating a virtual machine identified by the instantiation command using the access token as user data for the virtual machine during instantiation. The method also includes, in the virtual machine, executing a security module responsive to instantiation that transfers the access token for delivery to an authorization system, receiving credentials responsive to the access token, and accessing a data resource using the credentials.
    Type: Application
    Filed: June 12, 2017
    Publication date: November 9, 2017
    Inventors: Kevin Gilpin, Elizabeth Lawler
  • Patent number: 9680821
    Abstract: To provide enhanced operation of virtualized computing systems, various systems, apparatuses, methods, and software are provided herein. In a first example, a method of operating a computing system to control access to data resources by virtual machines is provided. The method includes receiving an access token and an instantiation command from an end user system. Responsive to the instantiation command, the method includes instantiating a virtual machine identified by the instantiation command using the access token as user data for the virtual machine during instantiation. The method also includes, in the virtual machine, executing a security module responsive to instantiation that transfers the access token for delivery to an authorization system, receiving credentials responsive to the access token, and accessing a data resource using the credentials.
    Type: Grant
    Filed: October 8, 2014
    Date of Patent: June 13, 2017
    Assignee: Conjur, Inc.
    Inventors: Kevin Gilpin, Elizabeth Lawler
  • Publication number: 20150350188
    Abstract: To provide enhanced operation of virtualized computing systems, various systems, apparatuses, methods, and software are provided herein. In a first example, a method of operating a computing system to control access to data resources by virtual machines is provided. The method includes receiving an access token and an instantiation command from an end user system. Responsive to the instantiation command, the method includes instantiating a virtual machine identified by the instantiation command using the access token as user data for the virtual machine during instantiation. The method also includes, in the virtual machine, executing a security module responsive to instantiation that transfers the access token for delivery to an authorization system, receiving credentials responsive to the access token, and accessing a data resource using the credentials.
    Type: Application
    Filed: October 8, 2014
    Publication date: December 3, 2015
    Inventors: Kevin Gilpin, Elizabeth Lawler
  • Publication number: 20150350194
    Abstract: An access control service to provide access control for operations between resources and/or between resources and users in a cloud computing environment. The access control service receives a request to perform an operation. The requested operation could be initiated by a resource with respect to another resource. The requested operation could also be initiated by a user with respect to a resource. The access control service determines whether the requested operation is permitted. If the requested operation is permitted, the access control service provides the credentials required to perform the requested operation.
    Type: Application
    Filed: May 26, 2015
    Publication date: December 3, 2015
    Inventors: Kevin Gilpin, Elizabeth Lawler
  • Publication number: 20150350214
    Abstract: To provide enhanced operation of computing systems to control access to audit logging resources by virtual machines, various systems, apparatuses, methods, and software are provided herein. In a first example, a method of operating a computing system is provided. The method includes receiving requests for audit credentials from virtual machines, and responsively providing individualized audit credentials to the virtual machines based at least on identities of the virtual machines. The method also includes, in the audit system, authorizing storage of audit data transferred by the virtual machines based at least on the individualized audit credentials accompanying the audit data. The method also includes, in the authorization system, selectively de-authorizing one or more of the virtual machines and reporting information regarding the de-authorized one or more of the virtual machines to the one or more audit systems.
    Type: Application
    Filed: October 9, 2014
    Publication date: December 3, 2015
    Inventors: Kevin Gilpin, Elizabeth Lawler