Patents by Inventor Adam Cecchetti

Adam Cecchetti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12271726
    Abstract: Blockchain distribution of computer data is disclosed. Computer data can comprise computer code, a computer code segment, a computer command, or a block of computer data, which can be employed by a device to patch software, change a device state, or synchronize data between devices. Blockchain distribution can provide benefits in a heterogeneous device environment, facilitate ad hoc device synchronization, and embody a distributed patch and communications network. Devices can receive a blockchain block from another device and, in some embodiments, enable other devices to access the block from the device. In some embodiments, devices can discard irrelevant blocks, however, an entire blockchain can be reconstructed where partial blockchains can be received from more than one device. Additionally, checkpoint blocks can enable devices to navigate the blockchain efficiently by skipping over known irrelevant blocks.
    Type: Grant
    Filed: February 1, 2023
    Date of Patent: April 8, 2025
    Assignee: Accenture Global Solutions Limited
    Inventors: Adam Cecchetti, Michael Eddington
  • Publication number: 20230185565
    Abstract: Blockchain distribution of computer data is disclosed. Computer data can comprise computer code, a computer code segment, a computer command, or a block of computer data, which can be employed by a device to patch software, change a device state, or synchronize data between devices. Blockchain distribution can provide benefits in a heterogeneous device environment, facilitate ad hoc device synchronization, and embody a distributed patch and communications network. Devices can receive a blockchain block from another device and, in some embodiments, enable other devices to access the block from the device. In some embodiments, devices can discard irrelevant blocks, however, an entire blockchain can be reconstructed where partial blockchains can be received from more than one device. Additionally, checkpoint blocks can enable devices to navigate the blockchain efficiently by skipping over known irrelevant blocks.
    Type: Application
    Filed: February 1, 2023
    Publication date: June 15, 2023
    Inventors: Adam Cecchetti, Michael Eddington
  • Patent number: 11599350
    Abstract: Blockchain distribution of computer data is disclosed. Computer data can comprise computer code, a computer code segment, a computer command, or a block of computer data, which can be employed by a device to patch software, change a device state, or synchronize data between devices. Blockchain distribution can provide benefits in a heterogeneous device environment, facilitate ad hoc device synchronization, and embody a distributed patch and communications network. Devices can receive a blockchain block from another device and, in some embodiments, enable other devices to access the block from the device. In some embodiments, devices can discard irrelevant blocks, however, an entire blockchain can be reconstructed where partial blockchains can be received from more than one device. Additionally, checkpoint blocks can enable devices to navigate the blockchain efficiently by skipping over known irrelevant blocks.
    Type: Grant
    Filed: March 29, 2021
    Date of Patent: March 7, 2023
    Assignee: Accenture Global Solutions Limited
    Inventors: Adam Cecchetti, Michael Eddington
  • Publication number: 20210263723
    Abstract: Blockchain distribution of computer data is disclosed. Computer data can comprise computer code, a computer code segment, a computer command, or a block of computer data, which can be employed by a device to patch software, change a device state, or synchronize data between devices. Blockchain distribution can provide benefits in a heterogeneous device environment, facilitate ad hoc device synchronization, and embody a distributed patch and communications network. Devices can receive a blockchain block from another device and, in some embodiments, enable other devices to access the block from the device. In some embodiments, devices can discard irrelevant blocks, however, an entire blockchain can be reconstructed where partial blockchains can be received from more than one device. Additionally, checkpoint blocks can enable devices to navigate the blockchain efficiently by skipping over known irrelevant blocks.
    Type: Application
    Filed: March 29, 2021
    Publication date: August 26, 2021
    Inventors: Adam Cecchetti, Michael Eddington
  • Patent number: 10983781
    Abstract: Blockchain distribution of computer data is disclosed. Computer data can comprise computer code, a computer code segment, a computer command, or a block of computer data, which can be employed by a device to patch software, change a device state, or synchronize data between devices. Blockchain distribution can provide benefits in a heterogeneous device environment, facilitate ad hoc device synchronization, and embody a distributed patch and communications network. Devices can receive a blockchain block from another device and, in some embodiments, enable other devices to access the block from the device. In some embodiments, devices can discard irrelevant blocks, however, an entire blockchain can be reconstructed where partial blockchains can be received from more than one device. Additionally, checkpoint blocks can enable devices to navigate the blockchain efficiently by skipping over known irrelevant blocks.
    Type: Grant
    Filed: December 3, 2019
    Date of Patent: April 20, 2021
    Assignee: Accenture Global Solutions Limited
    Inventors: Adam Cecchetti, Michael Eddington
  • Publication number: 20200142686
    Abstract: Blockchain distribution of computer data is disclosed. Computer data can comprise computer code, a computer code segment, a computer command, or a block of computer data, which can be employed by a device to patch software, change a device state, or synchronize data between devices. Blockchain distribution can provide benefits in a heterogeneous device environment, facilitate ad hoc device synchronization, and embody a distributed patch and communications network. Devices can receive a blockchain block from another device and, in some embodiments, enable other devices to access the block from the device. In some embodiments, devices can discard irrelevant blocks, however, an entire blockchain can be reconstructed where partial blockchains can be received from more than one device. Additionally, checkpoint blocks can enable devices to navigate the blockchain efficiently by skipping over known irrelevant blocks.
    Type: Application
    Filed: December 3, 2019
    Publication date: May 7, 2020
    Inventors: Adam Cecchetti, Michael Eddington
  • Patent number: 9910766
    Abstract: Software testing of networked devices using whitebox fuzzing is provided. Target network device (TC) can execute a software target that can selectively receive fuzzed data to perturb the execution of the software target. The perturbation can be correlated with the fuzzed data to detect intentional and unintentional features of the software target in. Information related to the interaction of the TC and a target network peer device (TPC) can be employed to determine a state input. Optionally, the TC can interact with the TPC normally until a determined state input, at which point, a fuzzed input can be substituted into the communication to the TC as if it were from the TPC. Resulting deviations from normal operation can then be determined and analyzed. Further optionally, a session dependent conditional and corresponding value can be determined.
    Type: Grant
    Filed: May 25, 2016
    Date of Patent: March 6, 2018
    Assignee: PEACH FUZZER LLC
    Inventors: Adam Cecchetti, Michael Eddington
  • Patent number: 9836617
    Abstract: The disclosed subject matter provides for code repository intrusion detection. A code developer profile can be generated based on characteristic features present in code composed by the developer. Characteristic features can be related to the coding propensities peculiar to individual developers and, over sufficient numbers of characteristic features, can be considered pseudo-signatures. A target code set is analyzed in view of one or more developer profiles to generate a validation score related to a likelihood of a particular developer composing a portion of the target code set. This can serve to confirm or refute a claim of authorship, or can serve to identify likely author candidates from a set of developers. Where the target code set authorship is determined to be sufficiently suspect, the code set can be subjected to further scrutiny to thwart intrusion into the code repository.
    Type: Grant
    Filed: March 22, 2016
    Date of Patent: December 5, 2017
    Assignee: DEJA VU SECURITY, LLC
    Inventors: Adam Cecchetti, Michael Eddington
  • Patent number: 9767005
    Abstract: The disclosed subject matter provides for software testing using metaphor based language fuzzing. Metaphor based language fuzzing can decompose a code segment into a metaphor representing the code segment. The metaphor can be mutated based on determined logical perturbations to any element of the metaphor. The mutation of the metaphor can act as a surrogate for mutation of the code segment. The mutated metaphor can be analyzed to reveal performance differences in comparison to the code segment. These performance difference can be correlated to mutation of the metaphor such that a corresponding mutation of the code segment can be correlated by extrapolation. Moreover, mutators can be stored and reused on other metaphors. Furthermore, employing a metaphor as a root language surrogate can facilitate generating a reduced number of mutators as compared to directly mutating code segments in a plurality of computer languages.
    Type: Grant
    Filed: July 2, 2015
    Date of Patent: September 19, 2017
    Assignee: PEACH FUZZER LLC
    Inventors: Michael Eddington, Adam Cecchetti
  • Publication number: 20170031676
    Abstract: Blockchain distribution of computer data is disclosed. Computer data can comprise computer code, a computer code segment, a computer command, or a block of computer data, which can be employed by a device to patch software, change a device state, or synchronize data between devices. Blockchain distribution can provide benefits in a heterogeneous device environment, facilitate ad hoc device synchronization, and embody a distributed patch and communications network. Devices can receive a blockchain block from another device and, in some embodiments, enable other devices to access the block from the device. In some embodiments, devices can discard irrelevant blocks, however, an entire blockchain can be reconstructed where partial blockchains can be received from more than one device. Additionally, checkpoint blocks can enable devices to navigate the blockchain efficiently by skipping over known irrelevant blocks.
    Type: Application
    Filed: July 25, 2016
    Publication date: February 2, 2017
    Inventors: Adam Cecchetti, Michael Eddington
  • Publication number: 20160350211
    Abstract: Software testing of networked devices using whitebox fuzzing is provided. Target network device (TC) can execute a software target that can selectively receive fuzzed data to perturb the execution of the software target. The perturbation can be correlated with the fuzzed data to detect intentional and unintentional features of the software target in. Information related to the interaction of the TC and a target network peer device (TPC) can be employed to determine a state input. Optionally, the TC can interact with the TPC normally until a determined state input, at which point, a fuzzed input can be substituted into the communication to the TC as if it were from the TPC. Resulting deviations from normal operation can then be determined and analyzed. Further optionally, a session dependent conditional and corresponding value can be determined.
    Type: Application
    Filed: May 25, 2016
    Publication date: December 1, 2016
    Inventors: Adam Cecchetti, Michael Eddington
  • Publication number: 20160203330
    Abstract: The disclosed subject matter provides for code repository intrusion detection. A code developer profile can be generated based on characteristic features present in code composed by the developer. Characteristic features can be related to the coding propensities peculiar to individual developers and, over sufficient numbers of characteristic features, can be considered pseudo-signatures. A target code set is analyzed in view of one or more developer profiles to generate a validation score related to a likelihood of a particular developer composing a portion of the target code set. This can serve to confirm or refute a claim of authorship, or can serve to identify likely author candidates from a set of developers. Where the target code set authorship is determined to be sufficiently suspect, the code set can be subjected to further scrutiny to thwart intrusion into the code repository.
    Type: Application
    Filed: March 22, 2016
    Publication date: July 14, 2016
    Inventors: Adam Cecchetti, Michael Eddington
  • Patent number: 9323923
    Abstract: The disclosed subject matter provides for code repository intrusion detection. A code developer profile can be generated based on characteristic features present in code composed by the developer. Characteristic features can be related to the coding propensities peculiar to individual developers and, over sufficient numbers of characteristic features, can be considered pseudo-signatures. A target code set is analyzed in view of one or more developer profiles to generate a validation score related to a likelihood of a particular developer composing a portion of the target code set. This can serve to confirm or refute a claim of authorship, or can serve to identify likely author candidates from a set of developers. Where the target code set authorship is determined to be sufficiently suspect, the code set can be subjected to further scrutiny to thwart intrusion into the code repository.
    Type: Grant
    Filed: December 3, 2012
    Date of Patent: April 26, 2016
    Assignee: DEJA VU SECURITY, LLC
    Inventors: Adam Cecchetti, Michael Eddington
  • Publication number: 20150309914
    Abstract: The disclosed subject matter provides for software testing using metaphor based language fuzzing. Metaphor based language fuzzing can decompose a code segment into a metaphor representing the code segment. The metaphor can be mutated based on determined logical perturbations to any element of the metaphor. The mutation of the metaphor can act as a surrogate for mutation of the code segment. The mutated metaphor can be analyzed to reveal performance differences in comparison to the code segment. These performance difference can be correlated to mutation of the metaphor such that a corresponding mutation of the code segment can be correlated by extrapolation. Moreover, mutators can be stored and reused on other metaphors. Furthermore, employing a metaphor as a root language surrogate can facilitate generating a reduced number of mutators as compared to directly mutating code segments in a plurality of computer languages.
    Type: Application
    Filed: July 2, 2015
    Publication date: October 29, 2015
    Inventors: Michael Eddington, Adam Cecchetti
  • Patent number: 9098352
    Abstract: The disclosed subject matter provides for software testing using metaphor based language fuzzing. Metaphor based language fuzzing can decompose a code segment into a metaphor representing the code segment. The metaphor can be mutated based on determined logical perturbations to any element of the metaphor. The mutation of the metaphor can act as a surrogate for mutation of the code segment. The mutated metaphor can be analyzed to reveal performance differences in comparison to the code segment. These performance difference can be correlated to mutation of the metaphor such that a corresponding mutation of the code segment can be correlated by extrapolation. Moreover, mutators can be stored and reused on other metaphors. Furthermore, employing a metaphor as a root language surrogate can facilitate generating a reduced number of mutators as compared to directly mutating code segments in a plurality of computer languages.
    Type: Grant
    Filed: June 19, 2014
    Date of Patent: August 4, 2015
    Assignee: DEJA VU SECURITY, LLC
    Inventors: Michael Eddington, Adam Cecchetti
  • Publication number: 20150026669
    Abstract: The disclosed subject matter provides for software testing using metaphor based language fuzzing. Metaphor based language fuzzing can decompose a code segment into a metaphor representing the code segment. The metaphor can be mutated based on determined logical perturbations to any element of the metaphor. The mutation of the metaphor can act as a surrogate for mutation of the code segment. The mutated metaphor can be analyzed to reveal performance differences in comparison to the code segment. These performance difference can be correlated to mutation of the metaphor such that a corresponding mutation of the code segment can be correlated by extrapolation. Moreover, mutators can be stored and reused on other metaphors. Furthermore, employing a metaphor as a root language surrogate can facilitate generating a reduced number of mutators as compared to directly mutating code segments in a plurality of computer languages.
    Type: Application
    Filed: June 19, 2014
    Publication date: January 22, 2015
    Inventors: Michael Eddington, Adam Cecchetti
  • Publication number: 20130340076
    Abstract: The disclosed subject matter provides for code repository intrusion detection. A code developer profile can be generated based on characteristic features present in code composed by the developer. Characteristic features can be related to the coding propensities peculiar to individual developers and, over sufficient numbers of characteristic features, can be considered pseudo-signatures. A target code set is analyzed in view of one or more developer profiles to generate a validation score related to a likelihood of a particular developer composing a portion of the target code set. This can serve to confirm or refute a claim of authorship, or can serve to identify likely author candidates from a set of developers. Where the target code set authorship is determined to be sufficiently suspect, the code set can be subjected to further scrutiny to thwart intrusion into the code repository.
    Type: Application
    Filed: December 3, 2012
    Publication date: December 19, 2013
    Applicant: Deja vu Security, LLC
    Inventors: Adam Cecchetti, Michael Eddington