Patents by Inventor Christopher Michael Henry Faucon

Christopher Michael Henry Faucon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250139275
    Abstract: Disclosed systems and methods identify a data record set and determine whether one or more predetermined conditions exist for triggering analysis of one or more records in the data record set. Disclosed embodiments trigger the analysis only in response to determining that the predetermined conditions have been met. Upon triggering the analysis of the data record set, disclosed embodiments identify a subset of the data record set to undergo the analysis while refraining from performing the analysis on the remaining records in the data record set. Further, embodiments identify an analysis model based on a level of analysis to be performed and apply the analysis model to the subset of the data record set to identify any presence of sensitive data. Lastly, disclosed embodiments selectively perform a security process to the data record set in response to detecting the presence of the sensitive data.
    Type: Application
    Filed: October 25, 2023
    Publication date: May 1, 2025
    Inventors: Michael Christopher FANNING, Eugene Wilson HODGES, IV, Jacek Andrzej CZERWONKA, Nicolas Yves COURAUD, Christopher Michael Henry FAUCON
  • Patent number: 12225002
    Abstract: Techniques for (i) using contextual information associated with an exposed credential to identify a resource that could be accessed using the exposed credential, (ii) identifying a responsible entity of that resource, and (iii) alerting the responsible entity about the exposed credential are disclosed. A credential is determined to be in an exposed state. The exposed credential, if used, could potentially provide an actor access to a resource, despite the fact that the actor should not have access to the resource. The exposed credential is analyzed to determine a context. Based on that context, the resource is identified. A responsible entity associated with the resource is identified. An alert is then sent to that entity.
    Type: Grant
    Filed: October 17, 2022
    Date of Patent: February 11, 2025
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Michael Christopher Fanning, Suvam Mukherjee, Jacek Andrzej Czerwonka, Christopher Michael Henry Faucon, Eddy Toshiyuki Okada Nakamura, Danielle Nicole Gonzalez, Nicolas Yves Couraud, Alison Lynne Maclellan
  • Patent number: 12061903
    Abstract: Static analysis of a code base is expanded beyond finding faults to also find code instances where a particular fault could have occurred but did not. A conformance count reflects code portions that satisfy a specified coding rule per static analysis, and a nonconformance count reflects code portions that do not satisfy the coding rule. Various metrics computed from the conformance count and nonconformance count drive software development quality assessments. For example, bugs or bug categories may be prioritized for developer attention, static analysis tools are evaluated based on the metrics, to reduce noise by eliminating low-value bug alerts. Particular areas of expertise of developers and developer groups are objectively identified. Source code editors are enhanced to provide specific recommendations in context. Other quality enhancements are also provided.
    Type: Grant
    Filed: September 16, 2022
    Date of Patent: August 13, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Michael C. Fanning, Suvam Mukherjee, Danielle Nicole Gonzalez, Christopher Michael Henry Faucon, Pragya Prakash
  • Publication number: 20240126917
    Abstract: Techniques for identifying an exposed credential that, if used, would provide access to a resource are disclosed. The techniques enable the resource to remain online while (i) a new credential is allocated for the resource, (ii) the resource is transitioned to using the new credential instead of the exposed credential, and (iii) the exposed credential is attempted to be invalidated. A credential is accessed. This credential is suspected of being in an exposed state. The credential is accessible from within an artifact and is determined to be in the exposed state. A new credential is generated. This new credential is designed to replace the exposed credential. An instruction is transmitted to the resource to cause it to transition from using the exposed credential to using the new credential. The exposed credential is then invalidated.
    Type: Application
    Filed: October 17, 2022
    Publication date: April 18, 2024
    Inventors: Michael Christopher FANNING, Nicolas Yves COURAUD, Jacek Andrzej CZERWONKA, Christopher Michael Henry FAUCON, Yingting YU, Etan Micah BASSERI, Floyd Odiwuor K'OTOHOYOH, Jacek Ernest LICHWA
  • Publication number: 20240129293
    Abstract: Techniques for (i) using contextual information associated with an exposed credential to identify a resource that could be accessed using the exposed credential, (ii) identifying a responsible entity of that resource, and (iii) alerting the responsible entity about the exposed credential are disclosed. A credential is determined to be in an exposed state. The exposed credential, if used, could potentially provide an actor access to a resource, despite the fact that the actor should not have access to the resource. The exposed credential is analyzed to determine a context. Based on that context, the resource is identified. A responsible entity associated with the resource is identified. An alert is then sent to that entity.
    Type: Application
    Filed: October 17, 2022
    Publication date: April 18, 2024
    Inventors: Michael Christopher FANNING, Suvam MUKHERJEE, Jacek Andrzej CZERWONKA, Christopher Michael Henry FAUCON, Eddy Toshiyuki OKADA NAKAMURA, Danielle Nicole GONZALEZ, Nicolas Yves Couraud, Alison Lynne MACLELLAN
  • Publication number: 20240095027
    Abstract: Static analysis of a code base is expanded beyond finding faults to also find code instances where a particular fault could have occurred but did not. A conformance count reflects code portions that satisfy a specified coding rule per static analysis, and a nonconformance count reflects code portions that do not satisfy the coding rule. Various metrics computed from the conformance count and nonconformance count drive software development quality assessments. For example, bugs or bug categories may be prioritized for developer attention, static analysis tools are evaluated based on the metrics, to reduce noise by eliminating low-value bug alerts. Particular areas of expertise of developers and developer groups are objectively identified. Source code editors are enhanced to provide specific recommendations in context. Other quality enhancements are also provided.
    Type: Application
    Filed: September 16, 2022
    Publication date: March 21, 2024
    Inventors: Michael C. FANNING, Suvam MUKHERJEE, Danielle Nicole GONZALEZ, Christopher Michael Henry FAUCON, Pragya PRAKASH
  • Publication number: 20140372988
    Abstract: The use of a static analysis for configuring a follow-on dynamic analysis for the evaluation of program code is provided. A request may be received for configuring a static analysis session for the evaluation of the program code. The static analysis may be executed and an output may be produced therefrom. The output may be analyzed to determine whether a dynamic analysis is needed for resolving code ambiguities in the program code. If it determined that the dynamic analysis is needed, then the dynamic analysis of the program code is initiated.
    Type: Application
    Filed: June 14, 2013
    Publication date: December 18, 2014
    Inventors: Michael C. Fanning, Frederico A. Mameri, Zachary A. Nation, Christopher Michael Henry Faucon, Alexander Robin Gordon Lucas