Patents by Inventor Bryan Childs
Bryan Childs has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12361137Abstract: Cyber security testing with automated system message processing for input and result determination is disclosed, including issuing, by a test tool, a call to an authorized service; identifying, by the test tool, one or more system-level error messages generated after issuing the call; determining, by the test tool based on at least one first system-level error message, a missing input for the call to the authorized service; and reissuing, by the test tool, the call to the authorized service with the missing input.Type: GrantFiled: March 30, 2023Date of Patent: July 15, 2025Assignee: International Business Machines CorporationInventors: Michael Page Kasper, Eric Rosenfeld, Bryan Childs, Diane Marie Stamboni, Joshua David Steen
-
Publication number: 20240091653Abstract: An anonymous leaderboard for a monitored computing environments is provided. In response to an entity registering with the monitored computing environment (MCE), an encrypted identity and a dynamic non-fungible token (NFT) are generated for the registered entity, where the dynamic NFT has an associated blockchain technology data structure. The blockchain technology data structure is associated with the encrypted identity. A progress element notification is received from the MCE in response to the entity satisfying criteria for a predefined progress element associated with the MCE. In response, a static NFT, corresponding to the predefined progress element, is generated and stored as a block in the blockchain technology data structure. An entry in an anonymous leaderboard output is generated based on the blockchain technology data structure, where the entry identifies the entity by the encrypted identity.Type: ApplicationFiled: September 15, 2022Publication date: March 21, 2024Inventors: Sneha Kanaujia, Al Chakra, Bryan Childs, GREGORY C. CREMINS, Travis Biro, Andrew C. M. Hicks, Cecilia Carranza Lewis, Peter G. Spera
-
Patent number: 11416623Abstract: A computer-implemented method for generating penetration tests automatically includes parsing an existing system test case, and identifying a particular program call in the system test case. The particular program call can require a particular data access authorization. The method further includes, in response to the system test case including the particular program call, generating a penetration test using a predetermined attack vector. The method further includes executing the penetration test and detecting an unauthorized access being performed during the penetration test. Further, the method includes responsively, sending a notification that identifies the particular program call.Type: GrantFiled: July 31, 2019Date of Patent: August 16, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Andrew C. M. Hicks, Thomas William Conti, Bryan Childs, Michael Page Kasper
-
Patent number: 11336679Abstract: A method includes receiving test objective data indicates an objective to be achieved during a cybersecurity test of a target system. An attack tree is generated by processing the test objective data into attack tree data including a plurality of data parameter sets and links between data parameter sets. Complexity of the attack tree is analyzed based on the test objective data using a combinatorics model. The attack tree is reduced to achieve the objective of the cybersecurity test based on the analyzed complexity of the attack tree.Type: GrantFiled: January 28, 2020Date of Patent: May 17, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Andrew C. M. Hicks, Thomas William Conti, Bryan Childs, Michael Page Kasper
-
Patent number: 11182447Abstract: Methods, systems and computer program products for providing a customized display of social media content that is automatically filtered based on emotional content are provided. Aspects include receiving a plurality of social media posts that have been published for display by a social media service. Aspects also include receiving an emotional profile including social media post filtering preferences that are based on emotional content of social media posts. In response to performing an emotional content analysis of each of the plurality of social media posts, aspects include identifying a set of emotionally acceptable social media posts and a set of emotionally unacceptable social media. Aspects also include causing the set of emotionally acceptable social media posts to be displayed in a primary news feed window of the social media service in association with an account of the user of the social media service.Type: GrantFiled: November 6, 2018Date of Patent: November 23, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bryan Childs, Elizabeth Noel, Peter G. Spera
-
Patent number: 11169869Abstract: Techniques for system kernel error identification and reporting for a computer system are described herein. An aspect includes detecting an error during the execution of a program. Another aspect includes determining whether the error is a system kernel error in the program. Another aspect includes, based on determining that the error is a system kernel error, generating a report regarding the determined system kernel error.Type: GrantFiled: July 8, 2020Date of Patent: November 9, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Page Kasper, Gregg Arquero, Diane Marie Stamboni, Joshua David Steen, Bryan Childs, Thomas William Conti, Andrew C. M. Hicks
-
Publication number: 20210234883Abstract: A method includes receiving test objective data indicates an objective to be achieved during a cybersecurity test of a target system. An attack tree is generated by processing the test objective data into attack tree data including a plurality of data parameter sets and links between data parameter sets. Complexity of the attack tree is analyzed based on the test objective data using a combinatorics model. The attack tree is reduced to achieve the objective of the cybersecurity test based on the analyzed complexity of the attack tree.Type: ApplicationFiled: January 28, 2020Publication date: July 29, 2021Inventors: Andrew C. M. Hicks, Thomas William Conti, Bryan Childs, Michael Page Kasper
-
Patent number: 11010479Abstract: A system includes a memory system and a processing system operably coupled to the memory system. The memory system includes a plurality of address spaces. The processing system is configured to perform operations including creating a data space from within a primary address space and a primary address space number access list entry referencing the data space. An unauthorized caller routine in a home address space configured to issue a service request including an address space-switching program call from the home address space to a program call target routine in the primary address space. The address space-switching program call references the primary address space number access list entry in the primary address space. A vulnerability identifier associated with the program call target routine is created and logged based on one or more conditions indicative of a cross-memory integrity violation detected responsive to the service request.Type: GrantFiled: October 1, 2018Date of Patent: May 18, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bryan Childs, Peter Relson, Karl D. Schmitz, Michael P. Kasper, Kathryn Voss, Kin Choi
-
Patent number: 10915640Abstract: A system includes a memory system and a processing system operably coupled to the memory system. The processing system is configured to perform operations including setting a target register to point to a first protected storage location of the memory system resulting in a protection exception upon access, calling an authorized service, and confirming that the authorized service uses the target register based on detecting the protection exception. The target register is adjusted to point to a parameter list including one or more known values and a pointer to a second protected storage location resulting in the protection exception upon access to confirm use of a value of the parameter list responsive to calling the authorized service. Parameter list testing and target register testing is repeated for locations in the parameter list and target registers to construct a testing profile for vulnerability testing of the authorized service.Type: GrantFiled: October 1, 2018Date of Patent: February 9, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael P. Kasper, Bryan Childs, Kin Choi, Karl D. Schmitz, Kathryn Voss
-
Publication number: 20200143000Abstract: Methods, systems and computer program products for providing a customized display of social media content that is automatically filtered based on emotional content are provided. Aspects include receiving a plurality of social media posts that have been published for display by a social media service. Aspects also include receiving an emotional profile including social media post filtering preferences that are based on emotional content of social media posts. In response to performing an emotional content analysis of each of the plurality of social media posts, aspects include identifying a set of emotionally acceptable social media posts and a set of emotionally unacceptable social media. Aspects also include causing the set of emotionally acceptable social media posts to be displayed in a primary news feed window of the social media service in association with an account of the user of the social media service.Type: ApplicationFiled: November 6, 2018Publication date: May 7, 2020Inventors: Bryan Childs, Elizabeth Noel, Peter G. Spera
-
Publication number: 20200104507Abstract: A system includes a memory system and a processing system operably coupled to the memory system. The processing system is configured to perform operations including setting a target register to point to a first protected storage location of the memory system resulting in a protection exception upon access, calling an authorized service, and confirming that the authorized service uses the target register based on detecting the protection exception. The target register is adjusted to point to a parameter list including one or more known values and a pointer to a second protected storage location resulting in the protection exception upon access to confirm use of a value of the parameter list responsive to calling the authorized service. Parameter list testing and target register testing is repeated for locations in the parameter list and target registers to construct a testing profile for vulnerability testing of the authorized service.Type: ApplicationFiled: October 1, 2018Publication date: April 2, 2020Inventors: Michael P. Kasper, Bryan Childs, Kin Choi, Karl D. Schmitz, Kathryn Voss
-
Publication number: 20200104508Abstract: A system includes a memory system and a processing system operably coupled to the memory system. The memory system includes a plurality of address spaces. The processing system is configured to perform operations including creating a data space from within a primary address space and a primary address space number access list entry referencing the data space. An unauthorized caller routine in a home address space configured to issue a service request including an address space-switching program call from the home address space to a program call target routine in the primary address space. The address space-switching program call references the primary address space number access list entry in the primary address space. A vulnerability identifier associated with the program call target routine is created and logged based on one or more conditions indicative of a cross-memory integrity violation detected responsive to the service request.Type: ApplicationFiled: October 1, 2018Publication date: April 2, 2020Inventors: Bryan Childs, Peter Relson, Karl D. Schmitz, Michael P. Kasper, Kathryn Voss, Kin Choi