Patents by Inventor Bryan Childs

Bryan Childs has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12361137
    Abstract: Cyber security testing with automated system message processing for input and result determination is disclosed, including issuing, by a test tool, a call to an authorized service; identifying, by the test tool, one or more system-level error messages generated after issuing the call; determining, by the test tool based on at least one first system-level error message, a missing input for the call to the authorized service; and reissuing, by the test tool, the call to the authorized service with the missing input.
    Type: Grant
    Filed: March 30, 2023
    Date of Patent: July 15, 2025
    Assignee: International Business Machines Corporation
    Inventors: Michael Page Kasper, Eric Rosenfeld, Bryan Childs, Diane Marie Stamboni, Joshua David Steen
  • Publication number: 20240091653
    Abstract: An anonymous leaderboard for a monitored computing environments is provided. In response to an entity registering with the monitored computing environment (MCE), an encrypted identity and a dynamic non-fungible token (NFT) are generated for the registered entity, where the dynamic NFT has an associated blockchain technology data structure. The blockchain technology data structure is associated with the encrypted identity. A progress element notification is received from the MCE in response to the entity satisfying criteria for a predefined progress element associated with the MCE. In response, a static NFT, corresponding to the predefined progress element, is generated and stored as a block in the blockchain technology data structure. An entry in an anonymous leaderboard output is generated based on the blockchain technology data structure, where the entry identifies the entity by the encrypted identity.
    Type: Application
    Filed: September 15, 2022
    Publication date: March 21, 2024
    Inventors: Sneha Kanaujia, Al Chakra, Bryan Childs, GREGORY C. CREMINS, Travis Biro, Andrew C. M. Hicks, Cecilia Carranza Lewis, Peter G. Spera
  • Patent number: 11416623
    Abstract: A computer-implemented method for generating penetration tests automatically includes parsing an existing system test case, and identifying a particular program call in the system test case. The particular program call can require a particular data access authorization. The method further includes, in response to the system test case including the particular program call, generating a penetration test using a predetermined attack vector. The method further includes executing the penetration test and detecting an unauthorized access being performed during the penetration test. Further, the method includes responsively, sending a notification that identifies the particular program call.
    Type: Grant
    Filed: July 31, 2019
    Date of Patent: August 16, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew C. M. Hicks, Thomas William Conti, Bryan Childs, Michael Page Kasper
  • Patent number: 11336679
    Abstract: A method includes receiving test objective data indicates an objective to be achieved during a cybersecurity test of a target system. An attack tree is generated by processing the test objective data into attack tree data including a plurality of data parameter sets and links between data parameter sets. Complexity of the attack tree is analyzed based on the test objective data using a combinatorics model. The attack tree is reduced to achieve the objective of the cybersecurity test based on the analyzed complexity of the attack tree.
    Type: Grant
    Filed: January 28, 2020
    Date of Patent: May 17, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew C. M. Hicks, Thomas William Conti, Bryan Childs, Michael Page Kasper
  • Patent number: 11182447
    Abstract: Methods, systems and computer program products for providing a customized display of social media content that is automatically filtered based on emotional content are provided. Aspects include receiving a plurality of social media posts that have been published for display by a social media service. Aspects also include receiving an emotional profile including social media post filtering preferences that are based on emotional content of social media posts. In response to performing an emotional content analysis of each of the plurality of social media posts, aspects include identifying a set of emotionally acceptable social media posts and a set of emotionally unacceptable social media. Aspects also include causing the set of emotionally acceptable social media posts to be displayed in a primary news feed window of the social media service in association with an account of the user of the social media service.
    Type: Grant
    Filed: November 6, 2018
    Date of Patent: November 23, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bryan Childs, Elizabeth Noel, Peter G. Spera
  • Patent number: 11169869
    Abstract: Techniques for system kernel error identification and reporting for a computer system are described herein. An aspect includes detecting an error during the execution of a program. Another aspect includes determining whether the error is a system kernel error in the program. Another aspect includes, based on determining that the error is a system kernel error, generating a report regarding the determined system kernel error.
    Type: Grant
    Filed: July 8, 2020
    Date of Patent: November 9, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael Page Kasper, Gregg Arquero, Diane Marie Stamboni, Joshua David Steen, Bryan Childs, Thomas William Conti, Andrew C. M. Hicks
  • Publication number: 20210234883
    Abstract: A method includes receiving test objective data indicates an objective to be achieved during a cybersecurity test of a target system. An attack tree is generated by processing the test objective data into attack tree data including a plurality of data parameter sets and links between data parameter sets. Complexity of the attack tree is analyzed based on the test objective data using a combinatorics model. The attack tree is reduced to achieve the objective of the cybersecurity test based on the analyzed complexity of the attack tree.
    Type: Application
    Filed: January 28, 2020
    Publication date: July 29, 2021
    Inventors: Andrew C. M. Hicks, Thomas William Conti, Bryan Childs, Michael Page Kasper
  • Patent number: 11010479
    Abstract: A system includes a memory system and a processing system operably coupled to the memory system. The memory system includes a plurality of address spaces. The processing system is configured to perform operations including creating a data space from within a primary address space and a primary address space number access list entry referencing the data space. An unauthorized caller routine in a home address space configured to issue a service request including an address space-switching program call from the home address space to a program call target routine in the primary address space. The address space-switching program call references the primary address space number access list entry in the primary address space. A vulnerability identifier associated with the program call target routine is created and logged based on one or more conditions indicative of a cross-memory integrity violation detected responsive to the service request.
    Type: Grant
    Filed: October 1, 2018
    Date of Patent: May 18, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bryan Childs, Peter Relson, Karl D. Schmitz, Michael P. Kasper, Kathryn Voss, Kin Choi
  • Patent number: 10915640
    Abstract: A system includes a memory system and a processing system operably coupled to the memory system. The processing system is configured to perform operations including setting a target register to point to a first protected storage location of the memory system resulting in a protection exception upon access, calling an authorized service, and confirming that the authorized service uses the target register based on detecting the protection exception. The target register is adjusted to point to a parameter list including one or more known values and a pointer to a second protected storage location resulting in the protection exception upon access to confirm use of a value of the parameter list responsive to calling the authorized service. Parameter list testing and target register testing is repeated for locations in the parameter list and target registers to construct a testing profile for vulnerability testing of the authorized service.
    Type: Grant
    Filed: October 1, 2018
    Date of Patent: February 9, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael P. Kasper, Bryan Childs, Kin Choi, Karl D. Schmitz, Kathryn Voss
  • Publication number: 20200143000
    Abstract: Methods, systems and computer program products for providing a customized display of social media content that is automatically filtered based on emotional content are provided. Aspects include receiving a plurality of social media posts that have been published for display by a social media service. Aspects also include receiving an emotional profile including social media post filtering preferences that are based on emotional content of social media posts. In response to performing an emotional content analysis of each of the plurality of social media posts, aspects include identifying a set of emotionally acceptable social media posts and a set of emotionally unacceptable social media. Aspects also include causing the set of emotionally acceptable social media posts to be displayed in a primary news feed window of the social media service in association with an account of the user of the social media service.
    Type: Application
    Filed: November 6, 2018
    Publication date: May 7, 2020
    Inventors: Bryan Childs, Elizabeth Noel, Peter G. Spera
  • Publication number: 20200104507
    Abstract: A system includes a memory system and a processing system operably coupled to the memory system. The processing system is configured to perform operations including setting a target register to point to a first protected storage location of the memory system resulting in a protection exception upon access, calling an authorized service, and confirming that the authorized service uses the target register based on detecting the protection exception. The target register is adjusted to point to a parameter list including one or more known values and a pointer to a second protected storage location resulting in the protection exception upon access to confirm use of a value of the parameter list responsive to calling the authorized service. Parameter list testing and target register testing is repeated for locations in the parameter list and target registers to construct a testing profile for vulnerability testing of the authorized service.
    Type: Application
    Filed: October 1, 2018
    Publication date: April 2, 2020
    Inventors: Michael P. Kasper, Bryan Childs, Kin Choi, Karl D. Schmitz, Kathryn Voss
  • Publication number: 20200104508
    Abstract: A system includes a memory system and a processing system operably coupled to the memory system. The memory system includes a plurality of address spaces. The processing system is configured to perform operations including creating a data space from within a primary address space and a primary address space number access list entry referencing the data space. An unauthorized caller routine in a home address space configured to issue a service request including an address space-switching program call from the home address space to a program call target routine in the primary address space. The address space-switching program call references the primary address space number access list entry in the primary address space. A vulnerability identifier associated with the program call target routine is created and logged based on one or more conditions indicative of a cross-memory integrity violation detected responsive to the service request.
    Type: Application
    Filed: October 1, 2018
    Publication date: April 2, 2020
    Inventors: Bryan Childs, Peter Relson, Karl D. Schmitz, Michael P. Kasper, Kathryn Voss, Kin Choi