Patents by Inventor Kenneth William Scott Morrison

Kenneth William Scott Morrison has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200117523
    Abstract: Embodiments of the present disclosure relate to deep content inspection of API traffic. Initially, messages are received from users of an API at an API gateway. The messages comprise a structure and metadata and are intended for an API server. The API gateway selectively communicates copies of the messages to a traffic sampler. The traffic sampler comprises a database of traffic samples, a machine learning system, and a database comprising one or more models. The traffic sample communicates the models corresponding to usage of the API servers to the API gateway. The models are built by the machine learning system based on the structure and metadata of the traffic samples and may be utilized to perform tests on the API servers.
    Type: Application
    Filed: October 15, 2018
    Publication date: April 16, 2020
    Inventors: KENNETH WILLIAM SCOTT MORRISON, JAY WILLIAM THORNE
  • Patent number: 10581800
    Abstract: An application programming interface (API) security gateway communicates with a client computer application to establish a URL key rotation operation. An API request is received from the client computer application that is directed to a computer server. The API request contains a URL address. The URL address is parsed to identify a URL key. A local validation key is generated based on the URL key rotation operation. The URL key is validated based on the local validation key to determine whether the URL key is valid. Based on determining that the URL key is valid, a modified API request is generated which contains the URL address with at least part of the URL key removed. The modified API request is provided to the computer server.
    Type: Grant
    Filed: July 25, 2017
    Date of Patent: March 3, 2020
    Assignee: CA, Inc.
    Inventor: Kenneth William Scott Morrison
  • Patent number: 10348739
    Abstract: A method is described for receiving a plurality of node data streams through a data network from a plurality of source nodes, respectively, each of the plurality of node data streams comprising a plurality of node data. The method further comprises determining a respective risk assessment for each of the plurality of node data streams based on a plurality of elements, wherein the respective risk assessment indicates a level of trustworthiness of each of the plurality of node data streams. Moreover, the method comprises determining a plurality of respective actions for each of the plurality of source nodes, based on the respective risk assessment of the plurality of node data streams. The method further comprises instructing each of the plurality of source nodes to perform the respective action.
    Type: Grant
    Filed: February 9, 2016
    Date of Patent: July 9, 2019
    Assignee: CA, Inc.
    Inventors: Steven L. Greenspan, Debra J. Danielson, Kenneth William Scott Morrison
  • Publication number: 20190036878
    Abstract: An application programming interface (API) security gateway communicates with a client computer application to establish a URL key rotation operation. An API request is received from the client computer application that is directed to a computer server. The API request contains a URL address. The URL address is parsed to identify a URL key. A local validation key is generated based on the URL key rotation operation. The URL key is validated based on the local validation key to determine whether the URL key is valid. Based on determining that the URL key is valid, a modified API request is generated which contains the URL address with at least part of the URL key removed. The modified API request is provided to the computer server.
    Type: Application
    Filed: July 25, 2017
    Publication date: January 31, 2019
    Applicant: CA, Inc.
    Inventor: Kenneth William Scott Morrison
  • Patent number: 9977920
    Abstract: Data privacy is provided in a computer network using a security inference control processor of a network device in the computer network which receives a query from a user device through a network interface circuit. In response to the query, a query result data set is generated based on information in a database stored in a non-volatile data storage device. Personally Identifiable Information (PII) exposure risk associated with the query result data set is determined based on an evaluation of combining the query result data set with an exposure storage log that includes result data sets from past queries associated with the user. Based on the PII exposure risk, the query result data set is provided to the user, so as to refrain from providing the query result data set if the PII exposure risk is greater than a risk threshold. Related methods, devices, and computer program products are provided.
    Type: Grant
    Filed: March 22, 2016
    Date of Patent: May 22, 2018
    Assignee: CA, INC.
    Inventors: Debra J. Danielson, Steven L. Greenspan, Kenneth William Scott Morrison
  • Patent number: 9881304
    Abstract: An API transaction risk assessment equipment is disclosed that receives an API transaction request through a data network from an application processed by a source node, and generates a risk assessment score based on context information that characterizes the API transaction request. The risk assessment score indicates a level of trustworthiness of the API transaction request for processing by an application on a destination node. The API transaction risk assessment equipment then controls deliverability of the API transaction request through the data network to the destination node for processing based on the risk assessment score. Corresponding methods by API transaction risk assessment equipment are disclosed.
    Type: Grant
    Filed: January 24, 2014
    Date of Patent: January 30, 2018
    Assignee: CA, Inc.
    Inventors: Kenneth William Scott Morrison, Thomas E. Hamilton, III, James D. Reno
  • Publication number: 20170277908
    Abstract: Data privacy is provided in a computer network using a security inference control processor of a network device in the computer network which receives a query from a user device through a network interface circuit. In response to the query, a query result data set is generated based on information in a database stored in a non-volatile data storage device. Personally Identifiable Information (PII) exposure risk associated with the query result data set is determined based on an evaluation of combining the query result data set with an exposure storage log that includes result data sets from past queries associated with the user. Based on the PII exposure risk, the query result data set is provided to the user, so as to refrain from providing the query result data set if the PII exposure risk is greater than a risk threshold. Related methods, devices, and computer program products are provided.
    Type: Application
    Filed: March 22, 2016
    Publication date: September 28, 2017
    Applicant: CA, Inc.
    Inventors: Debra J. Danielson, Steven L. Greenspan, Kenneth William Scott Morrison
  • Publication number: 20170230402
    Abstract: A method is described for receiving a plurality of node data streams through a data network from a plurality of source nodes, respectively, each of the plurality of node data streams comprising a plurality of node data. The method further comprises determining a respective risk assessment for each of the plurality of node data streams based on a plurality of elements, wherein the respective risk assessment indicates a level of trustworthiness of each of the plurality of node data streams. Moreover, the method comprises determining a plurality of respective actions for each of the plurality of source nodes, based on the respective risk assessment of the plurality of node data streams. The method further comprises instructing each of the plurality of source nodes to perform the respective action.
    Type: Application
    Filed: February 9, 2016
    Publication date: August 10, 2017
    Applicant: CA, Inc.
    Inventors: Steven L. GREENSPAN, Debra J. DANIELSON, Kenneth William Scott MORRISON
  • Patent number: 9661013
    Abstract: Methods of operating an application programming interface (API) request risk assessment system include receiving an API request from a source computer application that is directed to a destination computer application. A risk assessment score is generated based on a characteristic of the API request. The risk assessment score indicates a level of trustworthiness of the source computer application. Deliverability of the API request to the destination computer application is controlled based on the risk assessment score. Related methods of operating a source computer and related operations by API request risk assessment systems and source computers are disclosed.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: May 23, 2017
    Assignee: CA, INC.
    Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
  • Patent number: 9462011
    Abstract: A method includes receiving an application programming interface (API) request from a source computer application that is directed to a destination computer application. An attack response message that is configured to trigger operation of a defined action by the source computer application is sent to the source computer application. Deliverability of the API request to the destination computer application is controlled based on whether the attack response message triggered operation of the defined action. Related operations by API request risk assessment systems are disclosed.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: October 4, 2016
    Assignee: CA, Inc.
    Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
  • Patent number: 9462044
    Abstract: A secure protocol for registering a user, device and application with a computing device, such as a server, is provided. The protocol uses a single sign-on or registration request that enables multiple applications executing on single mobile computing device to access server resources' without each application separately registering with the server. After registration, a server is able to determine which user is using which application on which computing device whenever a request is sent from a device to the server. This type of registration enables fine grained access control to protected resources, such as information and/or services, of the server.
    Type: Grant
    Filed: November 25, 2013
    Date of Patent: October 4, 2016
    Assignee: CA, INC.
    Inventors: Sascha Preibisch, Mike Lyons, Anthony Peiqun Yu, Francois Lascelles, Kenneth William Scott Morrison
  • Patent number: 9386078
    Abstract: Some aspects of the present disclosure operate an application programming interface (API) risk assessment equipment. An API transaction request is received from an application processed by a source node. A risk assessment score is generated based on comparison of content of the API transaction request to content of earlier API transaction requests. The risk assessment score indicates trustworthiness of the API transaction request. Deliverability of the API transaction request to a destination node for processing is controlled based on the risk assessment score.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: July 5, 2016
    Assignee: CA, Inc.
    Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
  • Publication number: 20160134620
    Abstract: A user device transmits a location update message, indicating a location of the user device, to a network server. Responsive to the location update message, the user device receives from the network server a list of radio frequency beacons transmitted by resource devices and associated service identifiers for services available from the resource devices. A radio frequency beacon received from a resource device is identified as being in the list. A message is sent to the resource device requesting access to a service identified by a service identifier in the list associated with the radio frequency beacon and providing credentials for a user of the user device in the message.
    Type: Application
    Filed: November 6, 2014
    Publication date: May 12, 2016
    Applicant: CA, INC.
    Inventors: Kenneth William Scott Morrison, Pei Qun (Anthony) Yu, Mike Lyons, Efraim Moscovich, Anders Wilhelm Magnusson
  • Publication number: 20150350174
    Abstract: Some aspects of the present disclosure operate an application programming interface (API) risk assessment equipment. An API transaction request is received from an application processed by a source node. A risk assessment score is generated based on comparison of content of the API transaction request to content of earlier API transaction requests. The risk assessment score indicates trustworthiness of the API transaction request. Deliverability of the API transaction request to a destination node for processing is controlled based on the risk assessment score.
    Type: Application
    Filed: May 30, 2014
    Publication date: December 3, 2015
    Applicant: CA, Inc.
    Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
  • Publication number: 20150350249
    Abstract: A method includes receiving an application programming interface (API) request from a source computer application that is directed to a destination computer application. An attack response message that is configured to trigger operation of a defined action by the source computer application is sent to the source computer application. Deliverability of the API request to the destination computer application is controlled based on whether the attack response message triggered operation of the defined action. Related operations by API request risk assessment systems are disclosed.
    Type: Application
    Filed: May 30, 2014
    Publication date: December 3, 2015
    Applicant: CA, Inc.
    Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
  • Publication number: 20150350234
    Abstract: Methods of operating an application programming interface (API) request risk assessment system include receiving an API request from a source computer application that is directed to a destination computer application. A risk assessment score is generated based on a characteristic of the API request. The risk assessment score indicates a level of trustworthiness of the source computer application. Deliverability of the API request to the destination computer application is controlled based on the risk assessment score. Related methods of operating a source computer and related operations by API request risk assessment systems and source computers are disclosed.
    Type: Application
    Filed: May 30, 2014
    Publication date: December 3, 2015
    Applicant: CA, Inc.
    Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
  • Publication number: 20150213449
    Abstract: An API transaction risk assessment equipment is disclosed that receives an API transaction request through a data network from an application processed by a source node, and generates a risk assessment score based on context information that characterizes the API transaction request. The risk assessment score indicates a level of trustworthiness of the API transaction request for processing by an application on a destination node. The API transaction risk assessment equipment then controls deliverability of the API transaction request through the data network to the destination node for processing based on the risk assessment score. Corresponding methods by API transaction risk assessment equipment are disclosed.
    Type: Application
    Filed: January 24, 2014
    Publication date: July 30, 2015
    Applicant: CA, Inc.
    Inventors: Kenneth William Scott Morrison, Thomas E. Hamilton, III, James D. Reno