Patents by Inventor Alvaro Munoz
Alvaro Munoz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240403546Abstract: Aspects of the subject technology include identifying one or more portions of a data object that include a table by providing the data object to a table detection model, determining a structure of the table by providing the one or more portions of the data object to a table structure recognition model, generating a virtual table based on the determined structure of the table, the virtual table including an indication of at least one of one or more rows, one or more columns, or one or more cells corresponding to the table, mapping text from the one or more portions of the data object to corresponding cells of the virtual table, and performing a process with the virtual table.Type: ApplicationFiled: September 27, 2023Publication date: December 5, 2024Inventors: Hanna RAGNARSDÓTTIR, Thomas DESELAERS, Francisco ALVARO MUNOZ, Ryan S. DIXON
-
Patent number: 11671696Abstract: The present disclosure generally relates to methods and user interfaces for managing visual content at a computer system. In some embodiments, methods and user interfaces for managing visual content in media are described. In some embodiments, methods and user interfaces for managing visual indicators for visual content in media are described. In some embodiments, methods and user interfaces for inserting visual content in media are described. In some embodiments, methods and user interfaces for identifying visual content in media are described. In some embodiments, methods and user interfaces for translating visual content in media are described.Type: GrantFiled: September 24, 2021Date of Patent: June 6, 2023Assignee: Apple Inc.Inventors: Grant Paul, Francisco Alvaro Munoz, Jeffrey A. Brasket, Brandon J. Corey, Thomas Deselaers, Nathan De Vries, Ryan S. Dixon, Craig M. Federighi, Vignesh Jagadeesh, James N. Jones, Nicholas Lupinetti, Behkish J. Manzari, Vinay Sharma, Xin Wang, Marco Zuliani
-
Publication number: 20220337741Abstract: The present disclosure generally relates to methods and user interfaces for managing visual content at a computer system. In some embodiments, methods and user interfaces for managing visual content in media are described. In some embodiments, methods and user interfaces for managing visual indicators for visual content in media are described. In some embodiments, methods and user interfaces for inserting visual content in media are described. In some embodiments, methods and user interfaces for identifying visual content in media are described. In some embodiments, methods and user interfaces for translating visual content in media are described.Type: ApplicationFiled: September 24, 2021Publication date: October 20, 2022Inventors: Grant PAUL, Francisco ALVARO MUNOZ, Jeffrey A. BRASKET, Brandon J. Corey, Thomas DESELAERS, Nathan DE VRIES, Ryan S. DIXON, Craig M. FEDERIGHI, Vignesh JAGADEESH, James N. JONES, Nicholas Lupinetti, Behkish J. MANZARI, Ron SANTOS, Vinay SHARMA, Xin WANG, Xishuo Lili, Maeco Zuliani
-
Patent number: 10678910Abstract: Examples disclosed herein relate to modifying a web page. In one example, in response to beginning execution of a process initiating generation of a web page of a web application at a server, a runtime agent is executed. In this example, the runtime agent modifies code of the web page to inject code to protect output of the web page. In the example, the process can be executed using the modified code to generate a modified web page.Type: GrantFiled: April 10, 2015Date of Patent: June 9, 2020Assignee: Micro Focus LLCInventors: Ming Sum Sam Ng, Alvaro Munoz, Oleksandr Mirosh
-
Patent number: 10581878Abstract: A method for attack detection includes: intercepting, by a runtime security agent, a request for a web resource; determining whether the intercepted request was triggered from an external website; determining whether the intercepted request was triggered from a current session; determining whether the intercepted request is requesting a static file type; and in response to a determination that the intercepted request was triggered from an external website and was not triggered from a current session, or a determination that the intercepted request was triggered from an external website and is not requesting a static file type, providing, by the runtime security agent, an indication of a potential attack.Type: GrantFiled: June 8, 2017Date of Patent: March 3, 2020Assignee: Micro Focus LLCInventors: Ming Sum Sam Ng, Oleksandr Mirosh, Alvaro Munoz Sanchez
-
Patent number: 10546132Abstract: In one implementation, a static analysis system can include an operator engine to identify a modification operation on a string based on a structural comparison of program code to a static analysis rule, a label engine to maintain a label with the string based on the static analysis rule, and a sink engine to identify that the label denotes a string property and provide an analysis message associated with the string property based on the label.Type: GrantFiled: September 30, 2014Date of Patent: January 28, 2020Assignee: MICRO FOCUS LLCInventors: Alvaro Munoz, Yekaterina O'Neil
-
Patent number: 10331894Abstract: Example implementations relate to static program analysis. For example, an apparatus includes a processor to perform static program analysis on a set of processor executable instructions associated with an object-relational mapping (ORM) framework. The first set of processor executable instructions includes an object. The processor is also to generate a propagation path of the object based on an execution flow of the object. The propagation path includes a first node and a second node. The first node corresponds to a first ORM operation to store the object in a database. The second node corresponds to a second ORM operation to retrieve the object from the database. The second node is linked to the first node based on a common attribute of the object. In response to a determination that the propagation path includes a sink, the processor is to output a security risk warning.Type: GrantFiled: August 29, 2014Date of Patent: June 25, 2019Assignee: ENTIT SOFTWARE LLCInventors: Alvaro Munoz, Yekaterina Tsipenyuk O'Neil
-
Patent number: 10310962Abstract: In one implementation, a system can comprise a probe monitor engine to monitor a probe passed to a function of a set of instructions, a propagation engine to identify an infrastructure connection based on an attribute of the probe during a runtime session, and a rule engine to generate an infrastructure rule based on the infrastructure connection and the attribute of the probe.Type: GrantFiled: September 24, 2014Date of Patent: June 4, 2019Assignee: ENTIT SOFTWARE LLCInventors: Alvaro Munoz Sanchez, Yekaterina Tsipenyuk O'Neil
-
Patent number: 10182068Abstract: Example embodiments disclosed herein relate to determination of vulnerability of an application under test using a runtime agent and network sniffer during a security test. A runtime agent monitors execution of an application under test. A network sniffer is used to identify a probe value for determination of the vulnerability.Type: GrantFiled: November 26, 2014Date of Patent: January 15, 2019Assignee: ENTIT SOFTWARE LLCInventors: Alvaro Munoz, Sasi Siddharth Muthurajan
-
Publication number: 20180359265Abstract: A method for attack detection includes: intercepting, by a runtime security agent, a request for a web resource; determining whether the intercepted request was triggered from an external website; determining whether the intercepted request was triggered from a current session; determining whether the intercepted request is requesting a static file type; and in response to a determination that the intercepted request was triggered from an external website and was not triggered from a current session, or a determination that the intercepted request was triggered from an external website and is not requesting a static file type, providing, by the runtime security agent, an indication of a potential attack.Type: ApplicationFiled: June 8, 2017Publication date: December 13, 2018Inventors: Ming Sum Sam Ng, Oleksandr Mirosh, Alvaro Munoz Sanchez
-
Publication number: 20180336348Abstract: Examples disclosed herein relate to modifying a web page. In one example, in response to beginning execution of a process initiating generation of a web page of a web application at a server, a runtime agent is executed. In this example, the runtime agent modifies code of the web page to inject code to protect output of the web page. In the example, the process can be executed using the modified code to generate a modified web page.Type: ApplicationFiled: April 10, 2015Publication date: November 22, 2018Inventors: Ming Sum Sam Ng, Alvaro Munoz, Oleksandr Mirosh
-
Publication number: 20170223043Abstract: Example embodiments disclosed herein relate to determination of vulnerability of an application under test using a runtime agent and network sniffer during a security test. A runtime agent monitors execution of an application under test. A network sniffer is used to identify a probe value for determination of the vulnerability.Type: ApplicationFiled: November 26, 2014Publication date: August 3, 2017Applicant: Hewlett Packard Enterprise Development LPInventors: Alvaro Munoz, Sasi Siddharth MUTHURAJAN
-
Publication number: 20170220807Abstract: Example implementations relate to static program analysis. For example, an apparatus includes a processor to perform static program analysis on a set of processor executable instructions associated with an object-relational mapping (ORM) framework. The first set of processor executable instructions includes an object. The processor is also to generate a propagation path of the object based on an execution flow of the object. The propagation path includes a first node and a second node. The first node corresponds to a first ORM operation to store the object in a database. The second node corresponds to a second ORM operation to retrieve the object from the database. The second node is linked to the first node based on a common attribute of the object. In response to a determination that the propagation path includes a sink, the processor is to output a security risk warning.Type: ApplicationFiled: August 29, 2014Publication date: August 3, 2017Inventors: Alvaro Munoz, Yekaterina O'Neil
-
Publication number: 20170220449Abstract: In one implementation, a system can comprise a probe monitor engine to monitor a probe passed to a function of a set of instructions, a propagation engine to identify an infrastructure connection based on an attribute of the probe during a runtime session, and a rule engine to generate an infrastructure rule based on the infrastructure connection and the attribute of the probe.Type: ApplicationFiled: September 24, 2014Publication date: August 3, 2017Inventors: Alvaro MUNOZ SANCHEZ, Yekaterina O'NEIL
-
Publication number: 20170220806Abstract: In one implementation, a static analysis system can include an operator engine to identify a modification operation on a string based on a structural comparison of program code to a static analysis rule, a label engine to maintain a label with the string based on the static analysis rule, and a sink engine to identify that the label denotes a string property and provide an analysis message associated with the string property based on the label.Type: ApplicationFiled: September 30, 2014Publication date: August 3, 2017Inventors: Alvaro Munoz, Yekaterina O'Neil
-
Publication number: 20130178933Abstract: The present invention describes an ocular device comprising a magnetic eye implant and a ferrofluid. The products of the invention solve the problems of the patients' position and contribute to the increase in the success rate of the surgical procedure for correcting retinal detachment, problems of severe proliferative diabetic retinopathy in those incapable of maintaining posture, of infectious retinitis, problems resulting from traumatisms and endophthalmitis. It is also possible to use the device as an auxiliary surgical element, e.g., for extracting subretinal fluid.Type: ApplicationFiled: June 27, 2012Publication date: July 11, 2013Applicants: UNIVERSIDAD POLITECNICA DE MADRID, FUNDACION PARA LA INVESTIGACION BIOMEDICA DEL HOSPITAL, (CIBER BBN), UNIVERSIDAD AUTONOMOA DE MADRIDInventors: Jose Javier Serrano Olmedo, Ruben Antonio Garcia Mendoza, Alejandra Mina Rosales, Diego Ruiz Casas, Diego Losado Bayo, Francisco Jose Munoz Negrete, Gema Rebolleda Fernandez, Alvaro Munoz Noval, Miguel Jose Manso Silvan, Raul Jose Martin Palma, Vicente Torres Costa