Patents by Inventor Eric C. Scoredos

Eric C. Scoredos has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8739288
    Abstract: An embodiment of the invention provides an apparatus and method for automatic detection of a vulnerability exploit. The apparatus and method are configured to post a security vulnerability warning indicating a vulnerability of software; provide an exploit detector; and use the exploit detector to detect an attempted exploit that targets the vulnerability.
    Type: Grant
    Filed: July 31, 2007
    Date of Patent: May 27, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: John R. Diamant, Wan-Yen Hsu, David Hsing Lin, Eric C. Scoredos
  • Patent number: 8312194
    Abstract: Method and apparatus for enabling continuous validation of a data structure by acquiring a first read lock for the data structure and processing the data structure under the first read lock. When the first read lock is relinquished and subsequently reacquired, the method provides for determining if a write lock was granted prior to reacquiring the first read lock. The data structure is further processed when a write lock was not granted and is revalidated when a write lock was granted.
    Type: Grant
    Filed: September 30, 2005
    Date of Patent: November 13, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Eric C. Scoredos
  • Patent number: 7660794
    Abstract: A database operable in a multithreaded environment has a database update code. Each thread accessing the database obtains lock prior to walking the database. Any thread that alters database structure, such as by adding or deleting a record of the database, writes the database update code. Before releasing lock, the thread copies the database update code and a current record pointer into memory locations private to the thread. When a thread requires a second access to a record of the database, it obtains lock. The thread then compares its copy of the update code to the database update code, if they are different the thread must re-walk the database to locate the record since database structure has changed since the thread first accessed the database.
    Type: Grant
    Filed: June 3, 2003
    Date of Patent: February 9, 2010
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Eric C. Scoredos
  • Publication number: 20090038015
    Abstract: An embodiment of the invention provides an apparatus and method for automatic detection of a vulnerability exploit. The apparatus and method are configured to post a security vulnerability warning indicating a vulnerability of software; provide an exploit detector; and use the exploit detector to detect an attempted exploit that targets the vulnerability.
    Type: Application
    Filed: July 31, 2007
    Publication date: February 5, 2009
    Inventors: John R. Diamant, Wan-Yen Hsu, David Hsing Lin, Eric C. Scoredos
  • Patent number: 7404205
    Abstract: A method for controlling connections from an IP entity to a server. Initially, a limit count, representing a number of concurrently allowable connections between the IP entity and the server, is determined. When an incoming IP packet is received, the packet is processed to determine the source and destination IP addresses for the packet. An entry is then created in a limit table for the IP entity, if no entry for that IP entity exists in the table. A determination is made as to whether a pending connection should be allowed for the packet, by referring to the limit count and the entry in the limit table. The connection is allowed, and the limit count for the entry is incremented, if the attempted connection would not exceed the limit count for the IP entity; otherwise, the packet is blocked if the attempted connection would exceed the limit count for the IP entity.
    Type: Grant
    Filed: June 3, 2003
    Date of Patent: July 22, 2008
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Eric C. Scoredos, Hrishikesh Talgery, David Hsing Lin
  • Publication number: 20080082658
    Abstract: Various embodiments of spam control systems and methods are disclosed. One method embodiment, among others, comprises identifying an IP address as a spam source, and monitoring the activity of the IP address to determine if the IP address is re-assigned to another source.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 3, 2008
    Inventors: Wan-Yen Hsu, Eric C. Scoredos
  • Patent number: 7254562
    Abstract: A rule-based selection, storage and access method and system for processing packets from network traffic. First, packet intercepted from network traffic are selected based on at least one rule. Second, the selected packets are stored in an in-kernel storage buffer, which can be tuned to a size that is appropriate to the number packets being captured and the ability of a packet usage application (e.g., a billing program) to process the packets. Third, an access mechanism is provided to a packet usage application for accessing the stored packets. The intercepted network traffic is provided to a receiving application.
    Type: Grant
    Filed: July 11, 2002
    Date of Patent: August 7, 2007
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Wan-Yen Hsu, Eric C. Scoredos, Nobuhisa Takahashi
  • Publication number: 20040249812
    Abstract: A database operable in a multithreaded environment has a database update code. Each thread accessing the database obtains lock prior to walking the database. Any thread that alters database structure, such as by adding or deleting a record of the database, writes the database update code. Before releasing lock, the thread copies the database update code and a current record pointer into memory locations private to the thread. When a thread requires a second access to a record of the database, it obtains lock. The thread then compares its copy of the update code to the database update code, if they are different the thread must re-walk the database to locate the record since database structure has changed since the thread first accessed the database.
    Type: Application
    Filed: June 3, 2003
    Publication date: December 9, 2004
    Inventor: Eric C. Scoredos
  • Publication number: 20040250127
    Abstract: A method for controlling connections from an IP entity to a server. Initially, a limit count, representing a number of concurrently allowable connections between the IP entity and the server, is determined. When an incoming IP packet is received, the packet is processed to determine the source and destination IP addresses for the packet. An entry is then created in a limit table for the IP entity, if no entry for that IP entity exists in the table. A determination is made as to whether a pending connection should be allowed for the packet, by referring to the limit count and the entry in the limit table. The connection is allowed, and the limit count for the entry is incremented, if the attempted connection would not exceed the limit count for the IP entity; otherwise, the packet is blocked if the attempted connection would exceed the limit count for the IP entity.
    Type: Application
    Filed: June 3, 2003
    Publication date: December 9, 2004
    Inventors: Eric C. Scoredos, Hrishikesh Talgery, David Hsing Lin
  • Publication number: 20040010473
    Abstract: A rule-based selection, storage and access method and system for processing packets from network traffic. First, packet intercepted from network traffic are selected based on at least one rule. Second, the selected packets are stored in an in-kernel storage buffer, which can be tuned to a size that is appropriate to the number packets being captured and the ability of a packet usage application (e.g., a billing program) to process the packets. Third, an access mechanism is provided to a packet usage application for accessing the stored packets. The intercepted network traffic is provided to a receiving application.
    Type: Application
    Filed: July 11, 2002
    Publication date: January 15, 2004
    Inventors: Wan-Yen Hsu, Eric C. Scoredos, Nobuhisa Takahashi