Patents by Inventor Elizabeth A. Holz
Elizabeth A. Holz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10621360Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.Type: GrantFiled: January 30, 2019Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
-
Patent number: 10621361Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.Type: GrantFiled: January 30, 2019Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
-
Patent number: 10621359Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.Type: GrantFiled: January 30, 2019Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
-
Publication number: 20190163919Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.Type: ApplicationFiled: January 30, 2019Publication date: May 30, 2019Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
-
Publication number: 20190163921Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.Type: ApplicationFiled: January 30, 2019Publication date: May 30, 2019Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
-
Publication number: 20190163920Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.Type: ApplicationFiled: January 30, 2019Publication date: May 30, 2019Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
-
Patent number: 10268825Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.Type: GrantFiled: December 1, 2016Date of Patent: April 23, 2019Assignee: International Business Machines CorporationInventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
-
Patent number: 10223535Abstract: A computer-implemented method improves a computer system's security. A description of real-time trends, for multiple computer security issues from a third party resource is associated with multiple security routines for a computer system. The multiple security routines are sorted according to the real-time trends, such that the sorting establishes an order of priority for running each of the multiple security routines based on the real-time trends. A percentage of sorted security routines to execute on the computer system is executed in their order of priority to identify one or more computer security issues for the computer system. One or more processors then execute a resolution program to resolve the one or more computer security issues that are identified for the computer system.Type: GrantFiled: December 14, 2016Date of Patent: March 5, 2019Assignee: International Business Machines CorporationInventors: Elizabeth A. Holz, Hyun Kyu Seo, Ronald B. Williams
-
Publication number: 20180165457Abstract: A computer-implemented method improves a computer system's security. A description of real-time trends, for multiple computer security issues from a third party resource is associated with multiple security routines for a computer system. The multiple security routines are sorted according to the real-time trends, such that the sorting establishes an order of priority for running each of the multiple security routines based on the real-time trends. A percentage of sorted security routines to execute on the computer system is executed in their order of priority to identify one or more computer security issues for the computer system. One or more processors then execute a resolution program to resolve the one or more computer security issues that are identified for the computer system.Type: ApplicationFiled: December 14, 2016Publication date: June 14, 2018Inventors: ELIZABETH A. HOLZ, HYUN KYU SEO, RONALD B. WILLIAMS
-
Publication number: 20180157842Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.Type: ApplicationFiled: December 1, 2016Publication date: June 7, 2018Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
-
Patent number: 9906472Abstract: A navigation bar is provided for switching between modules within an expanded communication service such as email, calendar, contacts, tasks, etc. and for presenting preview peeks associated with each module to a user. A temporary preview of a module may be provided upon a hover action over predefined navigation bar locations such as icons and/or textual identifiers without actually needing to switch to a module. The preview may also be docked or pinned to a location on the main user interface so that it is displayed within the main user interface. New or interesting activity within each module may be highlighted by displaying an information badge next to a module name, for example.Type: GrantFiled: September 29, 2014Date of Patent: February 27, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Daniel Costenaro, Elizabeth Holz, Alessio Roic, Jedidiah Brown
-
Patent number: 9904437Abstract: A minimized state navigation bar is provided for switching between modules within an expanded communication service such as email, calendar, contacts, tasks, etc. and for presenting preview peeks associated with each module to a user. The minimized state may be selected automatically based on user interface context or user action. A temporary preview of a module may be provided upon a hover action over the icons without actually needing to switch to a module. The preview may also be docked or pinned to a location on the main user interface so that it is displayed within the main user interface. New or interesting activity within each module may be highlighted by displaying an information badge next to an icon, for example.Type: GrantFiled: November 14, 2014Date of Patent: February 27, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Daniel Costenaro, Elizabeth Holz, Alessio Roic, Jedidiah Brown
-
Patent number: 9348484Abstract: A navigation bar is provided for switching between modules within an expanded communication service such as email, calendar, contacts, tasks, etc. and for providing preview peeks associated with each module to a user. A temporary preview of a module may be provided upon a hover action over predefined navigation bar locations such as icons and/or textual identifiers without actually needing to switch to a module. One or more preview panes may be docked or pinned to a dynamically selected or user defined location on the main user interface so that they are permanently displayed within the main user interface. Users may be enabled to undock one or more of the docked preview panes through a user interface control. New or interesting activity within each module may be highlighted by displaying an information badge next to a module name, for example.Type: GrantFiled: December 8, 2011Date of Patent: May 24, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Daniel Costenaro, Elizabeth Holz, Alessio Roic, Jedidiah Brown
-
Publication number: 20150074525Abstract: A minimized state navigation bar is provided for switching between modules within an expanded communication service such as email, calendar, contacts, tasks, etc. and for presenting preview peeks associated with each module to a user. The minimized state may be selected automatically based on user interface context or user action. A temporary preview of a module may be provided upon a hover action over the icons without actually needing to switch to a module. The preview may also be docked or pinned to a location on the main user interface so that it is displayed within the main user interface. New or interesting activity within each module may be highlighted by displaying an information badge next to an icon, for example.Type: ApplicationFiled: November 14, 2014Publication date: March 12, 2015Inventors: Daniel Costenaro, Elizabeth Holz, Alessio Roic, Jedidiah Brown
-
Publication number: 20150019988Abstract: A navigation bar is provided for switching between modules within an expanded communication service such as email, calendar, contacts, tasks, etc. and for presenting preview peeks associated with each module to a user. A temporary preview of a module may be provided upon a hover action over predefined navigation bar locations such as icons and/or textual identifiers without actually needing to switch to a module. The preview may also be docked or pinned to a location on the main user interface so that it is displayed within the main user interface. New or interesting activity within each module may be highlighted by displaying an information badge next to a module name, for example.Type: ApplicationFiled: September 29, 2014Publication date: January 15, 2015Inventors: Daniel Costenaro, Elizabeth Holz, Alessio Roic, Jedidiah Brown
-
Patent number: 8935610Abstract: A minimized state navigation bar is provided for switching between modules within an expanded communication service such as email, calendar, contacts, tasks, etc. and for presenting preview peeks associated with each module to a user. The minimized state may be selected automatically based on user interface context or user action. A temporary preview of a module may be provided upon a hover action over the icons without actually needing to switch to a module. The preview may also be docked or pinned to a location on the main user interface so that it is displayed within the main user interface. New or interesting activity within each module may be highlighted by displaying an information badge next to an icon, for example.Type: GrantFiled: December 8, 2011Date of Patent: January 13, 2015Assignee: Microsoft CorporationInventors: Daniel Costenaro, Elizabeth Holz, Alessio Roic, Jedidiah Brown
-
Patent number: 8875051Abstract: A navigation bar is provided for switching between modules within an expanded communication service such as email, calendar, contacts, tasks, etc. and for presenting preview peeks associated with each module to a user. A temporary preview of a module may be provided upon a hover action over predefined navigation bar locations such as icons and/or textual identifiers without actually needing to switch to a module. The preview may also be docked or pinned to a location on the main user interface so that it is displayed within the main user interface. New or interesting activity within each module may be highlighted by displaying an information badge next to a module name, for example.Type: GrantFiled: December 8, 2011Date of Patent: October 28, 2014Assignee: Microsoft CorporationInventors: Daniel Costenaro, Elizabeth Holz, Alessio Roic, Jedidiah Brown
-
Publication number: 20130152007Abstract: A navigation bar is provided for switching between modules within an expanded communication service such as email, calendar, contacts, tasks, etc. and for providing preview peeks associated with each module to a user. A temporary preview of a module may be provided upon a hover action over predefined navigation bar locations such as icons and/or textual identifiers without actually needing to switch to a module. One or more preview panes may be docked or pinned to a dynamically selected or user defined location on the main user interface so that they are permanently displayed within the main user interface. Users may be enabled to undock one or more of the docked preview panes through a user interface control. New or interesting activity within each module may be highlighted by displaying an information badge next to a module name, for example.Type: ApplicationFiled: December 8, 2011Publication date: June 13, 2013Applicant: MICROSOFT CORPORATIONInventors: Daniel Costenaro, Elizabeth Holz, Alessio Roic, Jedidiah Brown
-
Publication number: 20130152015Abstract: A navigation bar is provided for switching between modules within an expanded communication service such as email, calendar, contacts, tasks, etc. and for presenting preview peeks associated with each module to a user. A temporary preview of a module may be provided upon a hover action over predefined navigation bar locations such as icons and/or textual identifiers without actually needing to switch to a module. The preview may also be docked or pinned to a location on the main user interface so that it is displayed within the main user interface. New or interesting activity within each module may be highlighted by displaying an information badge next to a module name, for example.Type: ApplicationFiled: December 8, 2011Publication date: June 13, 2013Applicant: MICROSOFT CORPORATIONInventors: Daniel Costenaro, Elizabeth Holz, Alessio Roic, Jedidiah Brown
-
Publication number: 20130151963Abstract: A minimized state navigation bar is provided for switching between modules within an expanded communication service such as email, calendar, contacts, tasks, etc. and for presenting preview peeks associated with each module to a user. The minimized state may be selected automatically based on user interface context or user action. A temporary preview of a module may be provided upon a hover action over the icons without actually needing to switch to a module. The preview may also be docked or pinned to a location on the main user interface so that it is displayed within the main user interface. New or interesting activity within each module may be highlighted by displaying an information badge next to an icon, for example.Type: ApplicationFiled: December 8, 2011Publication date: June 13, 2013Applicant: MICROSOFT CORPORATIONInventors: Daniel Costenaro, Elizabeth Holz, Alessio Roic, Jedidiah Brown