Patents by Inventor John Peyton

John Peyton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7418734
    Abstract: A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models are derived for the code and the models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.
    Type: Grant
    Filed: April 15, 2004
    Date of Patent: August 26, 2008
    Assignee: Ounce Labs, Inc.
    Inventors: Ryan James Berg, Larry Rose, John Peyton, John J. Danahy, Robert Gottlieb, Chris Rehbein
  • Patent number: 7398516
    Abstract: A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models are derived for the code and the models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routines posses one or more of pre-selected vulnerabilities.
    Type: Grant
    Filed: April 15, 2004
    Date of Patent: July 8, 2008
    Assignee: Ounce Labs, Inc.
    Inventors: Ryan James Berg, Larry Rose, John Peyton, John J. Danahy, Robert Gottlieb, Chris Rehbein
  • Patent number: 7398517
    Abstract: A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.
    Type: Grant
    Filed: June 13, 2007
    Date of Patent: July 8, 2008
    Assignee: Ounce Labs, Inc.
    Inventors: Ryan J. Berg, Larry Rose, John Peyton, John J. Danahy, Robert Gottlieb, Chris Rehbein
  • Publication number: 20080072214
    Abstract: Methods and systems of detecting vulnerabilities in source code using inter-procedural analysis of source code. Vulnerabilities in a pre-existing source code listing are detected. The variables in the source code listing are modeled in the context of at least one of the inherent control flow and inherent data flow. The variable models are used to create models of arguments to routine calls in the source code listing. The source code listing is modeled with a call graph to represent routine call interactions expressed in the source code listing. The arguments to routine calls are modeled to account for inter-procedural effects and dependencies on the arguments as expressed in the source code listing.
    Type: Application
    Filed: September 15, 2006
    Publication date: March 20, 2008
    Inventors: John Peyton, Robert Gottlieb
  • Publication number: 20070234304
    Abstract: A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.
    Type: Application
    Filed: June 13, 2007
    Publication date: October 4, 2007
    Inventors: Ryan BERG, Larry ROSE, John PEYTON, John DANAHY, Robert GOTTLIEB, Chris REHBEIN
  • Patent number: 7240332
    Abstract: A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.
    Type: Grant
    Filed: April 15, 2004
    Date of Patent: July 3, 2007
    Assignee: Ounce Labs, Inc.
    Inventors: Ryan James Berg, Larry Rose, John Peyton, John J. Danahy, Robert Gottlieb, Chris Rehbein
  • Publication number: 20050010806
    Abstract: A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models are derived for the code and the models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.
    Type: Application
    Filed: April 15, 2004
    Publication date: January 13, 2005
    Inventors: Ryan Berg, Larry Rose, John Peyton, John Danahy, Robert Gottlieb, Chris Rehbein
  • Publication number: 20040260940
    Abstract: A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.
    Type: Application
    Filed: April 15, 2004
    Publication date: December 23, 2004
    Applicant: Ounce Labs, Inc.
    Inventors: Ryan James Berg, Larry Rose, John Peyton, John J. Danahy, Robert Gottlieb, Chris Rehbein
  • Publication number: 20040255277
    Abstract: A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models are derived for the code and the models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routines posses one or more of pre-selected vulnerabilities.
    Type: Application
    Filed: April 15, 2004
    Publication date: December 16, 2004
    Applicant: Ounce Labs, Inc.
    Inventors: Ryan James Berg, Larry Rose, John Peyton, John J. Danahy, Robert Gottlieb, Chris Rehbein
  • Patent number: 6192452
    Abstract: A method for avoiding data loss due to cancelled transactions within a non-uniform memory access (NUMA) data processing system is disclosed. A NUMA data processing system includes a node interconnect to which at least a first node and a second node are coupled. The first and the second nodes each includes a local interconnect, a system memory coupled to the local interconnect, and a node controller interposed between the local interconnect and a node interconnect. The node controller detects certain situations which, due to the nature of a NUMA data processing system, can lead to data loss. These situations share the common feature that a node controller ends up with the only copy of a modified cache line and the original transaction that requested the modified cache line may not be issued again with the same tag or may not be issued again at all.
    Type: Grant
    Filed: February 26, 1999
    Date of Patent: February 20, 2001
    Assignee: International Business Machines Corporation
    Inventors: John Peyton Bannister, Gary Dale Carpenter, Mark Edward Dean, David Brian Glasco, Richard Nicholas Iachetta, Jr.
  • Patent number: 6145032
    Abstract: A data recirculation apparatus for a data processing system includes at least one output buffer from which data are output onto an interconnect, a plurality of input storage areas from which data are selected for storage within the output buffer, and selection logic that selects data from the plurality of input storage areas for storage within the output buffer. In addition, the data recirculation apparatus includes buffer control logic that, in response to a determination that a particular datum has stalled in the output buffer, causes the particular datum to be removed from the output buffer and stored in one of the plurality of input storage areas. In one embodiment, the recirculated data has a dedicated input storage area.
    Type: Grant
    Filed: September 21, 1998
    Date of Patent: November 7, 2000
    Assignee: International Business Machines Corporation
    Inventors: John Peyton Bannister, Gary Dale Carpenter, David Brian Glasco