Patents by Inventor David John Babcock

David John Babcock has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10878470
    Abstract: An example system in accordance with an aspect of the present disclosure includes a framework to demonstrate and/or train at least one live product. The framework includes a first panel associated with at least one step, and a second panel to display content and at least a portion of the at least one live product according to the at least one step. The system also includes at least one script to perform at least one task associated with the at least one step. The at least one step is performable independent of an order in which the at least one step is presented by the framework.
    Type: Grant
    Filed: September 5, 2014
    Date of Patent: December 29, 2020
    Assignee: MICRO FOCUS LLC
    Inventors: David John Babcock, Spencer Firestone, Jagadeesh Kandasamy
  • Patent number: 10699017
    Abstract: Example embodiments relate to assessing dynamic security scans using runtime analysis and static code analysis. In example embodiments, a system performs static code analysis of a web application to identify reachable code and/or data entry points, where the data entry points are used to determine an attack surface size for the web application. At this stage, the system may initiate runtime monitoring for a dynamic security scan of the web application, where the runtime monitoring detects invocation of a statement at one of the data entry points. The invocation is logged as an invocation entry that comprises invocation parameters and/or code units that were executed in response to the invocation. The system may then determine an attack surface coverage of the dynamic security scan using the invocation entry and the attack surface size and/or a reachable code coverage using the invocation entry and the reachable code.
    Type: Grant
    Filed: February 28, 2013
    Date of Patent: June 30, 2020
    Assignee: MICRO FOCUS LLC
    Inventors: Kirill Mendelev, Lu Zhao, David John Babcock, Ronald Joseph Sechman
  • Publication number: 20170364679
    Abstract: Examples described herein include receiving a loading request of an executable file from a requester. The executable file may include original content. Examples described herein also include determining an instrumented version of the executable file to provide to the requester based on a security policy, determining an existence of the instrumented version of the executable file on a storage, and providing the instrumented version of the executable file to the requester. The instrumented version may include protective content in addition to the original content of the executable file.
    Type: Application
    Filed: June 17, 2016
    Publication date: December 21, 2017
    Inventor: David John Babcock
  • Publication number: 20160071179
    Abstract: An example system in accordance with an aspect of the present disclosure includes a framework to demonstrate and/or train at least one live product. The framework includes a first panel associated with at least one step, and a second panel to display content and at least a portion of the at least one live product according to the at least one step. The system also includes at least one script to perform at least one task associated with the at least one step. The at least one step is performable independent of an order in which the at least one step is presented by the framework.
    Type: Application
    Filed: September 5, 2014
    Publication date: March 10, 2016
    Inventors: David John Babcock, Spencer Firestone, Jagadeesh Kandasamy
  • Publication number: 20150371047
    Abstract: Example embodiments relate to assessing dynamic security scans using runtime analysis and static code analysis. In example embodiments, a system performs static code analysis of a web application to identify reachable code and/or data entry points, where the data entry points are used to determine an attack surface size for the web application. At this stage, the system may initiate runtime monitoring for a dynamic security scan of the web application, where the runtime monitoring detects invocation of a statement at one of the data entry points. The invocation is logged as an invocation entry that comprises invocation parameters and/or code units that were executed in response to the invocation. The system may then determine an attack surface coverage of the dynamic security scan using the invocation entry and the attack surface size and/or a reachable code coverage using the invocation entry and the reachable code.
    Type: Application
    Filed: February 28, 2013
    Publication date: December 24, 2015
    Inventors: Kirill Mendelev, Lu Zhao, David John Babcock, Ronald Joseph Sechman
  • Patent number: 7249349
    Abstract: A method and system for reverting a process in an in-line instrumented state to an uninstrumented state. In one embodiment, the present invention modifies selected text segment portions from the process to be uninstrumented. The present embodiment then unmaps instrumented code space such that the instrumented code space is inaccessible to the process. In this embodiment, provided an instruction pointer resides in the instrumented code space, the present invention updates the instruction pointer to uninstrumented code space. The present embodiment also executes the process and, provided the process generates a fault by seeking to access an address in instrumented code space, provides a corresponding address in uninstrumented code space. In one embodiment, the present invention then continues execution at the address in instrumented code space.
    Type: Grant
    Filed: December 13, 2001
    Date of Patent: July 24, 2007
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Robert Hundt, David John Babcock
  • Publication number: 20030115583
    Abstract: A method and system for reverting a process in an in-line instrumented state to an uninstrumented state. In one embodiment, the present invention modifies selected text segment portions from the process to be uninstrumented. The present embodiment then unmaps instrumented code space such that the instrumented code space is inaccessible to the process. In this embodiment, provided an instruction pointer resides in the instrumented code space, the present invention updates the instruction pointer to uninstrumented code space. The present embodiment also executes the process and, provided the process generates a fault by seeking to access an address in instrumented code space, provides a corresponding address in uninstrumented code space. In one embodiment, the present invention then continues execution at the address in instrumented code space.
    Type: Application
    Filed: December 13, 2001
    Publication date: June 19, 2003
    Inventors: Robert Hundt, David John Babcock