Patents by Inventor Ronald Joseph Sechman

Ronald Joseph Sechman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11057395
    Abstract: Information stored in a Hypertext Transfer Protocol (HTTP) session is monitored. Based on the monitoring, authentication information in the information stored in the HTTP session is identified.
    Type: Grant
    Filed: March 24, 2014
    Date of Patent: July 6, 2021
    Assignee: Micro Focus LLC
    Inventors: Ming Sum Sam Ng, Ronald Joseph Sechman, Matias Madou
  • Patent number: 10699017
    Abstract: Example embodiments relate to assessing dynamic security scans using runtime analysis and static code analysis. In example embodiments, a system performs static code analysis of a web application to identify reachable code and/or data entry points, where the data entry points are used to determine an attack surface size for the web application. At this stage, the system may initiate runtime monitoring for a dynamic security scan of the web application, where the runtime monitoring detects invocation of a statement at one of the data entry points. The invocation is logged as an invocation entry that comprises invocation parameters and/or code units that were executed in response to the invocation. The system may then determine an attack surface coverage of the dynamic security scan using the invocation entry and the attack surface size and/or a reachable code coverage using the invocation entry and the reachable code.
    Type: Grant
    Filed: February 28, 2013
    Date of Patent: June 30, 2020
    Assignee: MICRO FOCUS LLC
    Inventors: Kirill Mendelev, Lu Zhao, David John Babcock, Ronald Joseph Sechman
  • Patent number: 10587641
    Abstract: Example embodiments disclosed herein relate to generating a point-wise protection based on dynamic security analysis. Vulnerability solution recommendation are provided based on the dynamic security analysis. A point-wise protection is generated based on a selection of the vulnerability solution recommendation.
    Type: Grant
    Filed: May 20, 2014
    Date of Patent: March 10, 2020
    Assignee: MICRO FOCUS LLC
    Inventors: Matias Madou, Ronald Joseph Sechman, Sam Ng Ming Sum
  • Patent number: 10516692
    Abstract: Examples relate to detection of email-related vulnerabilities. The examples disclosed herein enable monitoring, at a runtime, application programming interface (API) calls made by a server-based application for the API calls related to at least one of a plurality of email protocols. A request to obtain a first set of data indicating a result of a vulnerability attack may be received from a vulnerability scanner. The examples disclosed herein enable identifying, at the runtime, an API call that has been made based on the vulnerability attack in response to receiving the request. The first set of data may be obtained, at the runtime, based on the API call. The examples disclosed herein further enable providing the first set of data to the vulnerability scanner to detect a vulnerability in the first set of data.
    Type: Grant
    Filed: September 29, 2014
    Date of Patent: December 24, 2019
    Assignee: Micro Focus LLC
    Inventors: Sasi Siddharth Muthurajan, Ronald Joseph Sechman
  • Patent number: 9846781
    Abstract: Example embodiments disclosed herein relate to unused parameters. A request to a web page of an application under test is made. It is determined whether the web page includes one or more unused parameter fields. Another request to the web page of the application under test is made using one or more parameters corresponding to the unused parameter fields.
    Type: Grant
    Filed: April 19, 2013
    Date of Patent: December 19, 2017
    Assignee: EntIT Software LLC
    Inventors: Nidhi GovindRam Kejriwal, Ronald Joseph Sechman, Sasi Siddharth Muthurajan
  • Publication number: 20170223042
    Abstract: Examples relate to detection of email-related vulnerabilities. The examples disclosed herein enable monitoring, at a runtime, application programming interface (API) calls made by a server-based application for the API calls related to at least one of a plurality of email protocols. A request to obtain a first set of data indicating a result of a vulnerability attack may be received from a vulnerability scanner. The examples disclosed herein enable identifying, at the runtime, an API call that has been made based on the vulnerability attack in response to receiving the request. The first set of data may be obtained, at the runtime, based on the API call. The examples disclosed herein further enable providing the first set of data to the vulnerability scanner to detect a vulnerability in the first set of data.
    Type: Application
    Filed: September 29, 2014
    Publication date: August 3, 2017
    Inventors: Sasi Siddharth MUTHURAJAN, Ronald Joseph SECHMAN
  • Publication number: 20170111370
    Abstract: Information stored in a Hypertext Transfer Protocol (HTTP) session is monitored. Based on the monitoring, authentication information in the information stored in the HTTP session is identified.
    Type: Application
    Filed: March 24, 2014
    Publication date: April 20, 2017
    Inventors: Ming Sum Sam NG, Ronald Joseph SECHMAN, Matias MADOU
  • Publication number: 20160034690
    Abstract: Example embodiments disclosed herein relate to unused parameters. A request to a web page of an application under test is made. It is determined whether the web page includes one or more unused parameter fields. Another request to the web page of the application under test is made using one or more parameters corresponding to the unused parameter fields.
    Type: Application
    Filed: April 19, 2013
    Publication date: February 4, 2016
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Nidhi GovindRam Kejriwal, Ronald Joseph Sechman, Sasi Siddharth Muthurajan
  • Publication number: 20150371047
    Abstract: Example embodiments relate to assessing dynamic security scans using runtime analysis and static code analysis. In example embodiments, a system performs static code analysis of a web application to identify reachable code and/or data entry points, where the data entry points are used to determine an attack surface size for the web application. At this stage, the system may initiate runtime monitoring for a dynamic security scan of the web application, where the runtime monitoring detects invocation of a statement at one of the data entry points. The invocation is logged as an invocation entry that comprises invocation parameters and/or code units that were executed in response to the invocation. The system may then determine an attack surface coverage of the dynamic security scan using the invocation entry and the attack surface size and/or a reachable code coverage using the invocation entry and the reachable code.
    Type: Application
    Filed: February 28, 2013
    Publication date: December 24, 2015
    Inventors: Kirill Mendelev, Lu Zhao, David John Babcock, Ronald Joseph Sechman