Patents by Inventor Sam Ng

Sam Ng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190121985
    Abstract: In some examples, a method may include detecting a vulnerability in an application during execution on a first computing device. The method may include triggering a breakpoint based on the detecting, thereby pausing the execution of the application before execution of a portion of code that exploits the vulnerability. The method may include communicating a message indicating occurrence of the breakpoint. The method may include receiving a connection request from a second computing device in response to the message. The method may include resuming execution of the application from the breakpoint subject to a signal from the second computing device.
    Type: Application
    Filed: October 24, 2017
    Publication date: April 25, 2019
    Inventors: Alexander Michael HOOLE, Ming Sum Sam NG
  • Patent number: 10210335
    Abstract: Example embodiments disclosed herein relate to actively modify execution at runtime of an application under test (AUT). The AUT is executed using a real-time modifier. A security test is performed on the AUT. Execution of the AUT is modified at a decision point.
    Type: Grant
    Filed: July 26, 2012
    Date of Patent: February 19, 2019
    Assignee: Entit Software LLC
    Inventors: Matias Madou, Kirill Mendelev, Sam Ng Ming Sum
  • Publication number: 20190052666
    Abstract: In some examples, a system includes a scan execution engine and a scan adaptation engine. The scan execution engine may execute a scan of a web application hosted on a web host. During scan execution, the scan adaptation engine may adapt a subsequent scan portion for later execution based on a scan metric received from a monitoring agent that monitors the web application, the web host, or both.
    Type: Application
    Filed: February 26, 2016
    Publication date: February 14, 2019
    Inventors: Sasi Siddharth Muthurajan, Ming Sum Sam Ng, Jeremy C. Brooks
  • Publication number: 20180359265
    Abstract: A method for attack detection includes: intercepting, by a runtime security agent, a request for a web resource; determining whether the intercepted request was triggered from an external website; determining whether the intercepted request was triggered from a current session; determining whether the intercepted request is requesting a static file type; and in response to a determination that the intercepted request was triggered from an external website and was not triggered from a current session, or a determination that the intercepted request was triggered from an external website and is not requesting a static file type, providing, by the runtime security agent, an indication of a potential attack.
    Type: Application
    Filed: June 8, 2017
    Publication date: December 13, 2018
    Inventors: Ming Sum Sam Ng, Oleksandr Mirosh, Alvaro Munoz Sanchez
  • Publication number: 20180336348
    Abstract: Examples disclosed herein relate to modifying a web page. In one example, in response to beginning execution of a process initiating generation of a web page of a web application at a server, a runtime agent is executed. In this example, the runtime agent modifies code of the web page to inject code to protect output of the web page. In the example, the process can be executed using the modified code to generate a modified web page.
    Type: Application
    Filed: April 10, 2015
    Publication date: November 22, 2018
    Inventors: Ming Sum Sam Ng, Alvaro Munoz, Oleksandr Mirosh
  • Publication number: 20180268136
    Abstract: Examples relate to protection against database injection attacks. The examples disclosed herein enable intercepting a current database query prior to being executed by a database management system (DBMS). The examples disclosed herein further enable determining whether the current database query is suspected of having a security threat of a database injection attack by comparing the current database query with past database queries that have been intercepted prior to the interception of the current database query, and in response to determining that the current database query is not suspected of having the security threat of the database injection attack, storing the current database query in an allowed query list.
    Type: Application
    Filed: January 30, 2015
    Publication date: September 20, 2018
    Inventors: Ming Sum Sam Ng, Oleksandr Mirosh, Siddharth Muthurajan
  • Patent number: 9953169
    Abstract: Example embodiments disclosed herein relate to modifying execution of an application under test to act as if a user is a power user. The application under test is hosted in a real-time modifier. A security crawl is performed on the application under test logged in as the user. The user is treated as a power user.
    Type: Grant
    Filed: February 28, 2013
    Date of Patent: April 24, 2018
    Assignee: Entit Software LLC
    Inventors: Sam Ng Ming Sum, Matias Madou
  • Publication number: 20180095969
    Abstract: The present invention relates to methods, systems and apparatus for capturing, integrating, organizing, navigating and querying large-scale data from high-throughput biological and chemical assay platforms. It provides a highly efficient meta-analysis infrastructure for performing research queries across a large number of studies and experiments from different biological and chemical assays, data types and organisms, as well as systems to build and add to such an infrastructure. According to various embodiments, methods, systems and interfaces for identifying genes that are potentially associated with a biological, chemical or medical concept of interest.
    Type: Application
    Filed: October 2, 2017
    Publication date: April 5, 2018
    Inventors: Marc Jung, Sam Ng, Joseph R. Delaney
  • Publication number: 20170220805
    Abstract: Example embodiments disclosed herein relate to determining a secure activity of an application under test (AUT). Execution of an application under test is monitored. During an attack vector, an application programming interface associated with a secure activity is determined. A message is sent to a security test that secure activity occurred.
    Type: Application
    Filed: September 25, 2014
    Publication date: August 3, 2017
    Inventors: Sam NG, Ronald J. SECHMAN, Matias MADOU
  • Publication number: 20170185784
    Abstract: Example embodiments disclosed herein relate to generating a point-wise protection based capable of being implemented using a runtime agent. Security information including line of code information associated with possible vulnerabilities are processed to determine vulnerability solution recommendations. A vulnerability solution recommendation is presented. The point-wise protection is generated based on a selection input for the vulnerability solution recommendation, where the point-wise protection is capable of being implemented using a runtime agent.
    Type: Application
    Filed: May 20, 2014
    Publication date: June 29, 2017
    Inventors: Matias MADOU, Ronald SECHMAN, Sam NG MING SUM
  • Publication number: 20170187743
    Abstract: Example embodiments disclosed herein relate to generating a point-wise protection based on dynamic security analysis. Vulnerability solution recommendation are provided based on the dynamic security analysis. A point-wise protection is generated based on a selection of the vulnerability solution recommendation.
    Type: Application
    Filed: May 20, 2014
    Publication date: June 29, 2017
    Inventors: Matias Madou, Ronald J. SECHMAN, Sam NG MING SUM
  • Publication number: 20170111370
    Abstract: Information stored in a Hypertext Transfer Protocol (HTTP) session is monitored. Based on the monitoring, authentication information in the information stored in the HTTP session is identified.
    Type: Application
    Filed: March 24, 2014
    Publication date: April 20, 2017
    Inventors: Ming Sum Sam NG, Ronald Joseph SECHMAN, Matias MADOU
  • Publication number: 20170103211
    Abstract: Example embodiments disclosed herein relate to an approach for installing a runtime agent during a security test. A security test is initiated or performed on an application under test executing on a server. An application vulnerability associated with the application under test is determined. The application vulnerability is exploited to install the runtime agent on the server. The security test is continued using the runtime agent to receive additional information about the application under test.
    Type: Application
    Filed: June 19, 2014
    Publication date: April 13, 2017
    Inventors: Matias MADOU, Ronald J. SECHMAN, Sam NG MING SUM
  • Patent number: 9558355
    Abstract: Example embodiments disclosed herein relate to generating a scanning strategy based on a dynamic taint module. A dynamic taint module associated with an application is caused to be initiated for a crawling phase of a security test. A report is received from the dynamic taint module. The dynamic taint module is restricted. The scanning strategy is based on the report.
    Type: Grant
    Filed: August 29, 2012
    Date of Patent: January 31, 2017
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Matias Madou, Sam Ng Ming Sum
  • Patent number: 9438617
    Abstract: Example embodiments disclosed herein relate to real-time modification of an application under test (AUT). A security rest is performed on the AUT. A real-time modifier determines that a portion of a function to be executed by the AUT is unsafe. The real-time modifier modifies execution of the AUT to not execute the portion.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: September 6, 2016
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Kirill Mendelev, Matias Madou, Sam Ng Ming Sum
  • Publication number: 20150264074
    Abstract: Example embodiments disclosed herein relate to real-time modification of an application under test (AUT). A security rest is performed on the AUT. A real-time modifier determines that a portion of a function to be executed by the AUT is unsafe. The real-time modifier modifies execution of the AUT to not execute the portion.
    Type: Application
    Filed: September 28, 2012
    Publication date: September 17, 2015
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Kirill Mendelev, Matias Madou, Sam Ng Ming Sum
  • Publication number: 20150248558
    Abstract: Example embodiments disclosed herein relate to actively modify execution at runtime of an application under test (AUT). The AUT is executed using a real-time modifier. A security test is performed on the AUT. Execution of the AUT is modified at a decision point.
    Type: Application
    Filed: July 26, 2012
    Publication date: September 3, 2015
    Applicant: HEWLETT-PACKARD DEVELOPMENT COWMPANY, L.P.
    Inventors: Matias Madou, Kirill Mendelev, Sam Ng Ming Sum
  • Publication number: 20150248559
    Abstract: Example embodiments disclosed herein relate to generating a scanning strategy based on a dynamic taint module. A dynamic taint module associated with an application is caused to be initiated for a crawling phase of a security test. A report is received from the dynamic taint module. The dynamic taint module is restricted. The scanning strategy is based on the report.
    Type: Application
    Filed: August 29, 2012
    Publication date: September 3, 2015
    Inventors: Matias Madou, Sam Ng Ming Sum
  • Publication number: 20140245460
    Abstract: Example embodiments disclosed herein relate to modifying execution of an application under test to act as if a user is a power user. The application under test is hosted in a real-time modifier. A security crawl is performed on the application under test logged in as the user. The user is treated as a power user.
    Type: Application
    Filed: February 28, 2013
    Publication date: August 28, 2014
    Applicant: Hewlett-Packard Development Company
    Inventors: Sam Ng Ming Sum, Matias Madou
  • Patent number: 7808503
    Abstract: A deferred shading graphics pipeline processor and method are provided encompassing numerous substructures. Embodiments of the processor and method may include one or more of deferred shading, a tiled frame buffer, and multiple?stage hidden surface removal processing. In the deferred shading graphics pipeline, hidden surface removal is completed before pixel coloring is done. The pipeline processor comprises a command fetch and decode unit, a geometry unit, a mode extraction unit, a sort unit, a setup unit, a cull unit, a mode injection unit, a fragment unit, a texture unit, a Phong lighting unit, a pixel unit, and a backend unit.
    Type: Grant
    Filed: December 19, 2006
    Date of Patent: October 5, 2010
    Assignee: Apple Inc.
    Inventors: Jerome F. Duluk, Jr., Richard E. Hessel, Vaughn T. Arnold, Jack Benkual, Joseph P. Bratt, George Cuan, Stephen L. Dodgen, Emerson S. Fang, Zhaoyu Gong, Thomas Y. Yo, Hengwei Hsu, Sidong Li, Sam Ng, Matthew N. Papakipos, Jason R. Redgrave, Sushma S. Trivedi, Nathan D. Tuck, Shun Wai Go, Lindy Fung, Tuan D. Nguyen, Joseph P. Grass, Bo Hong, Abraham Mammen, Abbas Rashid, Albert Suan-Wei Tsay