Patents by Inventor William James McCourt

William James McCourt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230216869
    Abstract: In embodiments of the present teachings, improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may use the contextual information and the retrieved content to initiate a remedial action on the client.
    Type: Application
    Filed: March 13, 2023
    Publication date: July 6, 2023
    Inventors: Fraser Peter Howard, Paul Oliver Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt
  • Patent number: 11632379
    Abstract: In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content.
    Type: Grant
    Filed: April 2, 2018
    Date of Patent: April 18, 2023
    Assignee: Sophos Limited
    Inventors: Fraser Howard, Paul Oliver Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt
  • Patent number: 11347850
    Abstract: Systems, methods, and software can be used to analyze binary software codes. In some aspects, a computer-implemented method comprises: scanning, by at least one hardware processor, a binary software code to identify one or more text strings; associating, by the at least one hardware processor, the binary software code with a software platform based on the identified one or more text strings; disassembling, by the at least one hardware processor, the binary software code based on the software platform associated with the binary software code; and detecting, by the at least one hardware processor, a security risk in the disassembled binary software code.
    Type: Grant
    Filed: October 1, 2018
    Date of Patent: May 31, 2022
    Assignee: BlackBerry Limited
    Inventors: Adam John Boulton, William James McCourt, Benjamin John Godwood, Paul Compton Hirst, Niall Fitzgibbon
  • Patent number: 11210405
    Abstract: A method of determining a severity score is disclosed. The method includes receiving a binary; using the binary, determining a plurality of vulnerability parameters; and generating a report based on the plurality of vulnerability parameters.
    Type: Grant
    Filed: October 29, 2019
    Date of Patent: December 28, 2021
    Assignee: BlackBerry Limited
    Inventors: Adam John Boulton, William James McCourt, Benjamin John Godwood, Paul Compton Hirst
  • Publication number: 20210271762
    Abstract: A method for symbolic analysis of a software program is described. The method comprises constructing a control flow graph (CFG), for a software program procedure, the CFG comprising nodes representing basic blocks reachable within the software program procedure, the basic blocks represented as respective functions from a first machine state on entry to a said basic block to a second machine state on exit from that basic block. The method further describes simplifying the CFG to a single node representing the software program procedure as a function from an input machine state on entry to the software program procedure to an output machine state on exit from the software program procedure, comparing said function to a rule set identifying vulnerabilities based on effects on the machine state; and determining a vulnerability within the software program procedure based on the comparing.
    Type: Application
    Filed: February 4, 2021
    Publication date: September 2, 2021
    Applicant: BlackBerry Limited
    Inventors: William James McCOURT, Niall FITZGIBBON, Benjamin John GODWOOD, Paul Compton HIRST
  • Publication number: 20210133330
    Abstract: Systems, methods, and software can be used to determine a security score of a binary software code. In some aspects, a computer-implemented method comprises: receiving a binary software code; inspecting the binary software code to determine at least one Common Vulnerability Scoring Standard (CVSS) factor; and determining a CVSS score based on the at least one CVSS factor.
    Type: Application
    Filed: November 1, 2019
    Publication date: May 6, 2021
    Applicant: BlackBerry Limited
    Inventors: Adam John BOULTON, William James McCOURT, Paul Compton HIRST, Benjamin John GODWOOD
  • Publication number: 20210034757
    Abstract: A method of determining a severity score is disclosed. The method includes receiving a binary; using the binary, determining a plurality of vulnerability parameters; and generating a report based on the plurality of vulnerability parameters.
    Type: Application
    Filed: October 29, 2019
    Publication date: February 4, 2021
    Inventors: Adam John BOULTON, William James McCOURT, Benjamin John GODWOOD, Paul Compton HIRST
  • Patent number: 10891212
    Abstract: Systems, methods, and software can be used to identify functions prone to logic errors in software components using binary static analysis. In some aspects, one computer-implemented method includes identifying a function defined within a binary software component; determining one or more complexity characteristics of the function based on included instructions; determining, based on the complexity characteristics, whether the function is likely to produce errors when the instructions included in the function are executed by a processor; and in response to determining that the function is likely to contain errors, generating an indication that the function requires further review.
    Type: Grant
    Filed: October 22, 2018
    Date of Patent: January 12, 2021
    Assignee: BlackBerry Limited
    Inventors: William James McCourt, Adam John Boulton
  • Publication number: 20200410108
    Abstract: Described are methods and computing devices for identifying potential vulnerabilities in a software package. The package includes build files that include an application file and one or more associated files. The method may include scanning the application file to identify and extract a string from the application file and determining that the string is referenced in one of the associated files and obtaining data associated with the string from the associated file. The string may then be classified based, in part, on the data obtained from the associated file, and a full context may be determined for the string based, at least in part, on the classification. A relevance rank for the string is then set based on the full context and the string and its relevance rank are output.
    Type: Application
    Filed: June 27, 2019
    Publication date: December 31, 2020
    Applicant: BlackBerry Limited
    Inventors: Adam John BOULTON, William James MCCOURT, Benjamin John GODWOOD
  • Patent number: 10664254
    Abstract: Systems, methods, and software can be used to analyzing binary software components utilizing multiple instruction sets. In some aspects, one computer-implemented method includes identifying a program section in a binary software component; performing a first disassembly process according to a first instruction set on the program section to produce a first disassembly result; performing a second disassembly process according to a second instruction set different from the first instruction set on the program section to produce a second disassembly result; comparing the first disassembly result to the second disassembly result; and determining a utilized instruction set associated with the program section based at least in part on comparing the first disassembly result to the second disassembly result, wherein the utilized instruction set is either the first instruction set or the second instruction set.
    Type: Grant
    Filed: October 22, 2018
    Date of Patent: May 26, 2020
    Assignee: BlackBerry Limited
    Inventor: William James McCourt
  • Patent number: 10643259
    Abstract: Certain embodiments of the present invention provide methods and systems for dynamic classification of electronic vendors. Certain embodiments provide a method for dynamic vendor classification. The method includes analyzing a vendor based on a comparison of vendor features; categorizing the vendor based on the analysis; and permitting access to the vendor according to the categorization of the vendor. The categorization may include trusted, not trusted, or unsure, for example. Analysis may include comparing a first outlet of the vendor with a second outlet of the vendor, for example. Analysis may include comparing an outlet of the vendor with an outlet of a second vendor, for example. A vendor may be defined as a particular outlet for a vendor and/or all outlets associated with a vendor (a vendor entity).
    Type: Grant
    Filed: August 24, 2017
    Date of Patent: May 5, 2020
    Assignee: Sophos Limited
    Inventors: Paul Oliver Baccas, William James McCourt
  • Publication number: 20200104490
    Abstract: Systems, methods, and software can be used to analyze binary software codes. In some aspects, a computer-implemented method comprises: scanning, by at least one hardware processor, a binary software code to identify one or more text strings; associating, by the at least one hardware processor, the binary software code with a software platform based on the identified one or more text strings; disassembling, by the at least one hardware processor, the binary software code based on the software platform associated with the binary software code; and detecting, by the at least one hardware processor, a security risk in the disassembled binary software code.
    Type: Application
    Filed: October 1, 2018
    Publication date: April 2, 2020
    Applicant: BlackBerry Limited
    Inventors: Adam John BOULTON, William James McCOURT, Benjamin John GODWOOD, Paul Compton HIRST, Niall FITZGIBBON
  • Publication number: 20190121718
    Abstract: Systems, methods, and software can be used to identify functions prone to logic errors in software components using binary static analysis. In some aspects, one computer-implemented method includes identifying a function defined within a binary software component; determining one or more complexity characteristics of the function based on included instructions; determining, based on the complexity characteristics, whether the function is likely to produce errors when the instructions included in the function are executed by a processor; and in response to determining that the function is likely to contain errors, generating an indication that the function requires further review.
    Type: Application
    Filed: October 22, 2018
    Publication date: April 25, 2019
    Applicant: BlackBerry Limited
    Inventors: William James McCourt, Adam John BOULTON
  • Publication number: 20190121626
    Abstract: Systems, methods, and software can be used to analyzing binary software components utilizing multiple instruction sets. In some aspects, one computer-implemented method includes identifying a program section in a binary software component; performing a first disassembly process according to a first instruction set on the program section to produce a first disassembly result; performing a second disassembly process according to a second instruction set different from the first instruction set on the program section to produce a second disassembly result; comparing the first disassembly result to the second disassembly result; and determining a utilized instruction set associated with the program section based at least in part on comparing the first disassembly result to the second disassembly result, wherein the utilized instruction set is either the first instruction set or the second instruction set.
    Type: Application
    Filed: October 22, 2018
    Publication date: April 25, 2019
    Applicant: BlackBerry Limited
    Inventor: William James McCourt
  • Publication number: 20180227319
    Abstract: In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content.
    Type: Application
    Filed: April 2, 2018
    Publication date: August 9, 2018
    Inventors: Fraser Howard, Paul Oliver Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt
  • Patent number: 9967271
    Abstract: In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content.
    Type: Grant
    Filed: August 31, 2017
    Date of Patent: May 8, 2018
    Assignee: Sophos Limited
    Inventors: Fraser Howard, Paul Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt
  • Publication number: 20180005284
    Abstract: Certain embodiments of the present invention provide methods and systems for dynamic classification of electronic vendors. Certain embodiments provide a method for dynamic vendor classification. The method includes analyzing a vendor based on a comparison of vendor features; categorizing the vendor based on the analysis; and permitting access to the vendor according to the categorization of the vendor. The categorization may include trusted, not trusted, or unsure, for example. Analysis may include comparing a first outlet of the vendor with a second outlet of the vendor, for example. Analysis may include comparing an outlet of the vendor with an outlet of a second vendor, for example. A vendor may be defined as a particular outlet for a vendor and/or all outlets associated with a vendor (a vendor entity).
    Type: Application
    Filed: August 24, 2017
    Publication date: January 4, 2018
    Inventors: Paul Oliver Baccas, William James McCourt
  • Publication number: 20170366565
    Abstract: In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content.
    Type: Application
    Filed: August 31, 2017
    Publication date: December 21, 2017
    Inventors: Fraser Howard, Paul Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt
  • Patent number: 9800599
    Abstract: In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content.
    Type: Grant
    Filed: February 10, 2017
    Date of Patent: October 24, 2017
    Assignee: Sophos Limited
    Inventors: Fraser Howard, Paul Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt
  • Patent number: 9779433
    Abstract: Certain embodiments of the present invention provide methods and systems for dynamic classification of electronic vendors. Certain embodiments provide a method for dynamic vendor classification. The method includes analyzing a vendor based on a comparison of vendor features; categorizing the vendor based on the analysis; and permitting access to the vendor according to the categorization of the vendor. The categorization may include trusted, not trusted, or unsure, for example. Analysis may include comparing a first outlet of the vendor with a second outlet of the vendor, for example. Analysis may include comparing an outlet of the vendor with an outlet of a second vendor, for example. A vendor may be defined as a particular outlet for a vendor and/or all outlets associated with a vendor (a vendor entity).
    Type: Grant
    Filed: March 22, 2007
    Date of Patent: October 3, 2017
    Assignee: Sophos Limited
    Inventors: Paul Oliver Baccas, William James McCourt