Patents by Inventor Brian Chess

Brian Chess has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9491164
    Abstract: A method is disclosed for migrating a client domain involving identifying a user account entry in a client domain's password table, where the entry includes a user identifier and a first hashed password value, where the first hashed password value is derived from hashing a user password with a client domain hash algorithm. The first hashed password value is re-hashed using a multi-tenant system hash algorithm to obtain a second hashed password value. Another user account entry is created and stored in a multi-tenant system password table along with the second hashed password value and metadata from which the client domain hash algorithm can be determined.
    Type: Grant
    Filed: August 20, 2014
    Date of Patent: November 8, 2016
    Assignee: NetSuite Inc.
    Inventors: Sean Fay, Brian Chess
  • Patent number: 9400889
    Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.
    Type: Grant
    Filed: April 9, 2007
    Date of Patent: July 26, 2016
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
  • Patent number: 8527975
    Abstract: A computer readable storage medium includes executable instructions to identify a memory operation in target source code. A set of constraints associated with the memory operation are developed. The constraints are converted into a Boolean expression. The Boolean expression is processed with a Boolean satisfiability engine to determine whether the memory operation is potentially unsafe.
    Type: Grant
    Filed: November 2, 2007
    Date of Patent: September 3, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Brian Chess, Sean Fay, Ayee Kannan Goundan
  • Patent number: 8528093
    Abstract: A computer readable storage medium includes executable instructions to perform a static analysis of a set of target code to identify a first set of security issues. A dynamic analysis of the target code is executed to identify a second set of security issues. The first set of security issues and the second set of security issues are compared and common security issues are reported.
    Type: Grant
    Filed: April 11, 2007
    Date of Patent: September 3, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Toshinari Kureha, Koorosh Nouri, Arthur Do, Brian Chess, Roger Thornton
  • Patent number: 8347392
    Abstract: A computer readable storage medium has executable instructions to perform an automated analysis of program instructions. The automated analysis includes at least two analyses selected from an automated analysis of injection vulnerabilities, an automated analysis of potential repetitive attacks, an automated analysis of sensitive information, and an automated analysis of specific HTTP attributes. Protective instructions are inserted into the program instructions. The protective instructions are utilized to detect and respond to attacks during execution of the program instructions.
    Type: Grant
    Filed: August 25, 2006
    Date of Patent: January 1, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Brian Chess, Arthur Do, Roger Thornton
  • Patent number: 8209646
    Abstract: A computer readable storage medium includes executable instructions to identify a path in target source code. Constraints associated with the path are extracted. The constraints are converted to a Boolean expression. The Boolean expression is processed with a Boolean satisfiability engine to identify either a feasible path or an infeasible path. A feasible path is statically analyzed, while an infeasible path is not statically analyzed.
    Type: Grant
    Filed: November 2, 2007
    Date of Patent: June 26, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Brian Chess, Sean Fay, Ayee Kannan Goundan
  • Patent number: 8082299
    Abstract: The present invention relates to Internet based and web applications and the need to reduce page latency and bandwidth usage. The invention can achieve these goals by making use of the cache built in to standard web browsers. In one embodiment, the invention provides that a web application user will use their browser to request a page from the application web server, which responds with a small page that includes a script. The script appends a previously established cookie value to the URL originally requested and the browser then re-requests the URL with the appended cookie value. (The server computes the cookie value based on the last modified time of the data used to generate the page.) If the most recent version of the page is in the browser cache, the browser gets a cache hit, which means the page is retrieved from browser cache rather than from the server, rapidly displaying the page to the user.
    Type: Grant
    Filed: May 31, 2011
    Date of Patent: December 20, 2011
    Assignee: NetSuite Inc.
    Inventors: Brian Chess, Evan Goldberg, William Ellery Bailey
  • Publication number: 20110238746
    Abstract: The present invention relates to Internet based and web applications and the need to reduce page latency and bandwidth usage. The invention can achieve these goals by making use of the cache built in to standard web browsers. In one embodiment, the invention provides that a web application user will use their browser to request a page from the application web server, which responds with a small page that includes a script. The script appends a previously established cookie value to the URL originally requested and the browser then re-requests the URL with the appended cookie value. (The server computes the cookie value based on the last modified time of the data used to generate the page.) If the most recent version of the page is in the browser cache, the browser gets a cache hit, which means the page is retrieved from browser cache rather than from the server, rapidly displaying the page to the user.
    Type: Application
    Filed: May 31, 2011
    Publication date: September 29, 2011
    Inventors: Brian Chess, Evan Goldberg, William Ellery Bailey
  • Patent number: 7975306
    Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions perform a security audit of program instructions. Based upon the security audit, sensors are inserted into the program instructions. The program instructions are executable and the sensors generate a stream of security events. The stream of security events is monitored and security performance results are reported.
    Type: Grant
    Filed: December 10, 2004
    Date of Patent: July 5, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
  • Patent number: 7970816
    Abstract: The present invention relates to Internet based and web applications and the need to reduce page latency and bandwidth usage. The invention can achieve these goals by making use of the cache built in to standard web browsers. In one embodiment, the invention provides that a web application user will use their browser to request a page from the application web server, which responds with a small page that includes a script. The script appends a previously established cookie value to the URL originally requested and the browser then re-requests the URL with the appended cookie value. (The server computes the cookie value based on the last modified time of the data used to generate the page.) If the most recent version of the page is in the browser cache, the browser gets a cache hit, which means the page is retrieved from browser cache rather than from the server, rapidly displaying the page to the user.
    Type: Grant
    Filed: March 1, 2002
    Date of Patent: June 28, 2011
    Assignee: NetSuite Inc.
    Inventors: Brian Chess, Evan Goldberg, William Ellery Bailey
  • Publication number: 20090282480
    Abstract: A computer readable storage medium includes executable instructions to insert monitors at selected locations within a computer program. Training output from the monitors is recorded during a training phase of the computer program. Program invariants are derived from the training output. During a deployment phase of the computer program, deployment output from the monitors is compared to the program invariants to identify security anomalies.
    Type: Application
    Filed: May 8, 2009
    Publication date: November 12, 2009
    Inventors: Edward Lee, Jacob West, Matias Madou, Brian Chess
  • Publication number: 20090119648
    Abstract: A computer readable storage medium includes executable instructions to identify a memory operation in target source code. A set of constraints associated with the memory operation are developed. The constraints are converted into a Boolean expression. The Boolean expression is processed with a Boolean satisfiability engine to determine whether the memory operation is potentially unsafe.
    Type: Application
    Filed: November 2, 2007
    Publication date: May 7, 2009
    Applicant: Fortify Software, Inc.
    Inventors: Brian Chess, Sean Fay, Ayee Kannan Goundan
  • Publication number: 20090119624
    Abstract: A computer readable storage medium includes executable instructions to identify a path in target source code. Constraints associated with the path are extracted. The constraints are converted to a Boolean expression. The Boolean expression is processed with a Boolean satisfiability engine to identify either a feasible path or an infeasible path. A feasible path is statically analyzed, while an infeasible path is not statically analyzed.
    Type: Application
    Filed: November 2, 2007
    Publication date: May 7, 2009
    Applicant: Fortify Software, Inc.
    Inventors: Brian CHESS, Sean Fay, Ayee Kannan Goundan
  • Publication number: 20070240138
    Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.
    Type: Application
    Filed: April 9, 2007
    Publication date: October 11, 2007
    Applicant: FORTIFY SOFTWARE, INC.
    Inventors: Brian CHESS, Arthur DO, Sean FAY, Roger THORNTON
  • Patent number: 7207065
    Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.
    Type: Grant
    Filed: December 10, 2004
    Date of Patent: April 17, 2007
    Assignee: Fortify Software, Inc.
    Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
  • Publication number: 20070074169
    Abstract: A computer readable storage medium has executable instructions to perform an automated analysis of program instructions. The automated analysis includes at least two analyses selected from an automated analysis of injection vulnerabilities, an automated analysis of potential repetitive attacks, an automated analysis of sensitive information, and an automated analysis of specific HTTP attributes. Protective instructions are inserted into the program instructions. The protective instructions are utilized to detect and respond to attacks during execution of the program instructions.
    Type: Application
    Filed: August 25, 2006
    Publication date: March 29, 2007
    Applicant: Fortify Software, Inc.
    Inventors: Brian Chess, Arthur Do, Roger Thornton
  • Publication number: 20050273860
    Abstract: A method of analyzing program instructions for security vulnerabilities includes applying a static analysis to program instructions during a development phase of the program instructions to identify security vulnerabilities. The security vulnerabilities are used to apply a security test to the program instructions during a testing phase of the program instructions. The security vulnerabilities are analyzed to develop security monitoring criteria to apply to the program instructions during a deployment phase of the program instructions.
    Type: Application
    Filed: December 10, 2004
    Publication date: December 8, 2005
    Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
  • Publication number: 20050273854
    Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.
    Type: Application
    Filed: December 10, 2004
    Publication date: December 8, 2005
    Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
  • Publication number: 20050273859
    Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. Executable instructions identify potential security vulnerabilities within program instructions based upon input from an attack database and information derived during a static analysis of the program instructions. Vulnerability tests are applied to the program instructions in view of the security vulnerabilities. Performance results from the vulnerability tests are analyzed. The performance results are then reported.
    Type: Application
    Filed: December 10, 2004
    Publication date: December 8, 2005
    Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
  • Publication number: 20050273861
    Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions perform a security audit of program instructions. Based upon the security audit, sensors are inserted into the program instructions. The program instructions are executable and the sensors generate a stream of security events. The stream of security events is monitored and security performance results are reported.
    Type: Application
    Filed: December 10, 2004
    Publication date: December 8, 2005
    Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton