Patents by Inventor Adam John Boulton
Adam John Boulton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12265946Abstract: Systems, methods, and software can be used to identify security risks in software code based on Software Bill of Materials (SBOM). In some aspects, a method includes: obtaining, by a server, software code and a SBOM corresponding to the software code; identifying, by the server and based on the SBOM, a library used by the software code; and generating, by the server, a risk assessment based on at least one metric corresponding to the library, where the at least one metric is associated with one or more maintainers of the library.Type: GrantFiled: May 4, 2022Date of Patent: April 1, 2025Assignee: BlackBerry LimitedInventors: Neil David Jonathan Duggan, Adam John Boulton
-
Publication number: 20240262390Abstract: A method of processing data for a driving automation system, the method comprising steps of: obtaining image data from a camera of an autonomous vehicle, AV; image processing the image data to obtain a vehicle registration mark, VRM, of another vehicle within the surrounding area of the AV; looking up the VRM in a vehicle information database to obtain information indicative of the make, the model and the date of manufacture of the other vehicle; looking up information indicative of the make, the model and the date of manufacture of the other vehicle in a vehicle dimensions database to obtain at least one dimension of the other vehicle; and updating a context of the autonomous vehicle based on said at least one dimension of the other vehicle.Type: ApplicationFiled: March 26, 2024Publication date: August 8, 2024Applicant: Malikie Innovations LimitedInventor: Adam John Boulton
-
Patent number: 11970188Abstract: A method of processing data for a driving automation system, the method comprising steps of: obtaining image data from a camera of an autonomous vehicle, AV; image processing the image data to obtain a vehicle registration mark, VRM, of another vehicle within the surrounding area of the AV; looking up the VRM in a vehicle information database to obtain information indicative of the make, the model and the date of manufacture of the other vehicle; looking up information indicative of the make, the model and the date of manufacture of the other vehicle in a vehicle dimensions database to obtain at least one dimension of the other vehicle; and updating a context of the autonomous vehicle based on said at least one dimension of the other vehicle.Type: GrantFiled: October 7, 2022Date of Patent: April 30, 2024Assignee: Malikie Innovations LimitedInventor: Adam John Boulton
-
Patent number: 11868465Abstract: A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include identifying a function in a binary file, assigning one of a plurality of classifications to the function, and determining that the function requires stack cookie protection based at least in part on the classification assigned to the function.Type: GrantFiled: October 25, 2021Date of Patent: January 9, 2024Assignee: Blackberry LimitedInventors: Adam John Boulton, Benjamin John Godwood
-
Publication number: 20230359744Abstract: Systems, methods, and software can be used to identify security risks in software code based on software bill of materials (SBOM). In some aspects, a method includes: obtaining, by a server, software code and a SBOM corresponding to the software code; identifying, by the server and based on the SBOM, a library used by the software code; and generating, by the server, a risk assessment based on at least one metric corresponding to the library, where the at least one metric is associated with one or more maintainers of the library.Type: ApplicationFiled: May 4, 2022Publication date: November 9, 2023Inventors: Neil David Jonathan DUGGAN, Vincenzo Kazimierz MARCOVECCHIO, Adam John BOULTON
-
Publication number: 20230359992Abstract: Systems, methods, and software can be used to identify security risks in software code based on Software Bill of Materials (SBOM). In some aspects, a method includes: obtaining, by a server, software code and a SBOM corresponding to the software code; identifying, by the server and based on the SBOM, a library used by the software code; and generating, by the server, a risk assessment based on at least one metric corresponding to the library, where the at least one metric is associated with one or more maintainers of the library.Type: ApplicationFiled: May 4, 2022Publication date: November 9, 2023Inventors: Neil David Jonathan DUGGAN, Adam John BOULTON
-
Publication number: 20230359739Abstract: Systems, methods, and software can be used to detect backdoors in binary software code. In some aspects, a method comprises: obtaining, by a server, binary software code corresponding to source code; generating, by the server, a backdoor abstraction of the binary software code; and generating, by the server, a backdoor risk assessment based on the backdoor abstraction of the binary software code.Type: ApplicationFiled: May 4, 2022Publication date: November 9, 2023Inventors: Neil David Jonathan DUGGAN, Vincenzo Kazimierz MARCOVECCHIO, Adam John BOULTON
-
Publication number: 20230322212Abstract: A method of processing data for a driving automation system, the method comprising steps of: obtaining sound data from a microphone of an autonomous vehicle; processing the sound data to obtain a sound characteristic; and updating a context of the autonomous vehicle based on the sound characteristic.Type: ApplicationFiled: June 8, 2023Publication date: October 12, 2023Inventor: Adam John Boulton
-
Publication number: 20230297688Abstract: Systems, methods, and software can be used to determine security risks in binary software using a software relationship model. In some aspects, a method comprises: receiving a software relationship model that identifies: (i) a set of software components, and (ii) communication interfaces between software components in the set of software components; receiving a set of binary software code; generating a risk assessment for the set of binary software code based on the software relationship model; and generating a notification, based on the risk assessment for the set of binary software code, that indicates security risks associated with the set of binary software code.Type: ApplicationFiled: March 15, 2022Publication date: September 21, 2023Applicant: BlackBerry LimitedInventor: Adam John BOULTON
-
Patent number: 11708068Abstract: A method of processing data for a driving automation system, the method comprising steps of: obtaining sound data from a microphone of an autonomous vehicle; processing the sound data to obtain a sound characteristic; and updating a context of the autonomous vehicle based on the sound characteristic.Type: GrantFiled: June 24, 2020Date of Patent: July 25, 2023Assignee: BlackBerry LimitedInventor: Adam John Boulton
-
Patent number: 11665198Abstract: A verification server comprising a memory and a processor programmed to execute instructions stored in the memory. The instructions include receiving a link registration request including a third-party link to a third-party server, validating the third-party server as a result of receiving the link registration request, generating a unique code as a result of validating the third-party server, and generating a custom link that includes the unique code.Type: GrantFiled: May 17, 2022Date of Patent: May 30, 2023Assignee: BLACKBERRY LIMITEDInventor: Adam John Boulton
-
Patent number: 11656861Abstract: A computer-implemented method of selectively installing an application from an application archive file is disclosed. The method includes receiving an indication to install an application on a computing device, the application being available for download as an archive file storing a manifest file and one or more installation files. The method further includes determining that installation of the application is permissible. The determining includes: without downloading the archive file, downloading at least a portion of the manifest file; and determining, based on the at least a portion of the manifest file, that installation of the application on the computing device would comply with a device management policy for the computing device. After determining that installation of the application is permissible, the archive file is downloaded and the application is installed therefrom. Related computer-readable media and computer systems are also disclosed.Type: GrantFiled: June 18, 2020Date of Patent: May 23, 2023Assignee: BlackBerry LimitedInventor: Adam John Boulton
-
Patent number: 11636211Abstract: Described are methods and devices to identify vulnerabilities in a software package that includes two or more build files. The build files include at least an application file and one or more resource files. The method includes scanning the build files to identify strings. Strings that appear in one of the resource files and are not referenced in the application file are labelled orphaned. Strings that appear in the application file and are node defined in any of the resources files are labelled hardcoded. The identity of hardcoded and orphaned strings is output as potential vulnerabilities or data leakage points.Type: GrantFiled: June 27, 2019Date of Patent: April 25, 2023Assignee: BlackBerry LimitedInventor: Adam John Boulton
-
Publication number: 20230050343Abstract: A method of processing data for a driving automation system, the method comprising steps of: obtaining image data from a camera of an autonomous vehicle, AV; image processing the image data to obtain a vehicle registration mark, VRM, of another vehicle within the surrounding area of the AV; looking up the VRM in a vehicle information database to obtain information indicative of the make, the model and the date of manufacture of the other vehicle; looking up information indicative of the make, the model and the date of manufacture of the other vehicle in a vehicle dimensions database to obtain at least one dimension of the other vehicle; and updating a context of the autonomous vehicle based on said at least one dimension of the other vehicle.Type: ApplicationFiled: October 7, 2022Publication date: February 16, 2023Inventor: Adam John Boulton
-
Patent number: 11548513Abstract: A method for evaluating contextual risk profiles at a computing device (110, 212, 312) in a vehicle (310), the method including obtaining information about a proximate vehicle (320, 330); utilizing the information to create a risk profile for the proximate vehicle (320, 330); and based on the risk profile, initiating an action at computing device (110, 212, 312).Type: GrantFiled: October 17, 2017Date of Patent: January 10, 2023Assignee: BlackBerry LimitedInventor: Adam John Boulton
-
Patent number: 11485385Abstract: A method of processing data for a driving automation system, the method comprising steps of: obtaining image data from a camera of an autonomous vehicle, AV; image processing the image data to obtain a vehicle registration mark, VRM, of another vehicle within the surrounding area of the AV; looking up the VRM in a vehicle information database to obtain information indicative of the make, the model and the date of manufacture of the other vehicle; looking up information indicative of the make, the model and the date of manufacture of the other vehicle in a vehicle dimensions database to obtain at least one dimension of the other vehicle; and updating a context of the autonomous vehicle based on said at least one dimension of the other vehicle.Type: GrantFiled: June 3, 2020Date of Patent: November 1, 2022Assignee: BlackBerry LimitedInventor: Adam John Boulton
-
Publication number: 20220279018Abstract: A verification server comprising a memory and a processor programmed to execute instructions stored in the memory. The instructions include receiving a link registration request including a third-party link to a third-party server, validating the third-party server as a result of receiving the link registration request, generating a unique code as a result of validating the third-party server, and generating a custom link that includes the unique code.Type: ApplicationFiled: May 17, 2022Publication date: September 1, 2022Applicant: Blackberry LimitedInventor: Adam John BOULTON
-
Patent number: 11392686Abstract: Systems, methods, and software can be used to detect stack cookie utilization in a binary software component using binary static analysis. In some aspects, one computer-implemented method includes identifying a function defined in the binary software component, the function including one or more instructions; performing a binary static analysis of the function to determine whether the function utilizes stack cookie protection based on the one or more instructions including one or more stack cookie handling instructions; and in response to determining that the function utilizes stack cookie protection, updating a security report for the binary software component to indicate that the function utilizes stack cookie protection.Type: GrantFiled: December 4, 2018Date of Patent: July 19, 2022Assignee: BlackBerry LimitedInventor: Adam John Boulton
-
Patent number: 11388192Abstract: A verification server comprising a memory and a processor programmed to execute instructions stored in the memory. The instructions include receiving a link registration request including a third-party link to a third-party server, validating the third-party server as a result of receiving the link registration request, generating a unique code as a result of validating the third-party server, and generating a custom link that includes the unique code.Type: GrantFiled: July 9, 2018Date of Patent: July 12, 2022Assignee: Blackberry LimitedInventor: Adam John Boulton
-
Patent number: 11347865Abstract: Systems, methods, and software can be used to analyze security risks of a binary software code. In some aspects, a computer-implemented method comprises: receiving, by at least one hardware processor, a binary software code; determining, by the at least one hardware processor, a security risk value for each of a plurality of security risk factors of the binary software code; for each of the plurality of security risk factors, determining, by the at least one hardware processor, a security confidence level of the respective security risk factor; and generating, by the at least one hardware processor, a security notification, wherein the security notification includes the security confidence levels corresponding to the plurality of security risk factors.Type: GrantFiled: March 29, 2019Date of Patent: May 31, 2022Assignee: BlackBerry LimitedInventor: Adam John Boulton