Patents by Inventor Kevin Gilpin
Kevin Gilpin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250028626Abstract: Systems, methods, and devices are provided to intelligently identify run-time complications within a codebase and provide recommended solutions for the identified run-time complications. A behavioral model of the codebase is accessed that depicts a run-time behavior of the codebase. The behavioral model generated is then interrogated to predict run-time complications within the codebase. Recommended solutions are generated and provided in a user interface for resolving the run-time complications.Type: ApplicationFiled: July 21, 2023Publication date: January 23, 2025Inventors: Elizabeth Lawler, Kevin Gilpin
-
Publication number: 20250028625Abstract: Systems, methods, and devices are provided to intelligently interrogate and tag a codebase. A behavioral model of the codebase is accessed that represents a run-time behavior of the codebase. The behavioral model and codebase are interrogated to identify locations for placing bidirectional tags within the behavioral model and the codebase. The bidirectional tags include links for connecting portions of the behavioral model to corresponding lines of code within the codebase. Selection of a bidirectional tag of the behavioral model causes focus of a user interface to change from a view of a visual depiction of the behavioral model to a view of a corresponding tag in the codebase. Selection of a bidirectional tag of the codebase causes focus of the user interface to change from a view of the codebase to a view of a corresponding tag in the visual depiction of the behavioral model.Type: ApplicationFiled: July 21, 2023Publication date: January 23, 2025Inventors: Elizabeth Lawler, Kevin Gilpin
-
Publication number: 20240320118Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating characterizations of the code behavior and interrelations based on the code models. Some embodiments include user interfaces that provide views into the characterizations and interrelations of the application features and components that can give developers insights quickly and efficiently into applications which may be used for future developments and modifications to the application and to avoid introducing bugs into the application.Type: ApplicationFiled: June 3, 2024Publication date: September 26, 2024Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
-
Patent number: 12026077Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating characterizations of the code behavior and interrelations based on the code models. Some embodiments include user interfaces that provide views into the characterizations and interrelations of the application features and components that can give developers insights quickly and efficiently into applications which may be used for future developments and modifications to the application and to avoid introducing bugs into the application.Type: GrantFiled: May 24, 2021Date of Patent: July 2, 2024Assignee: AppLand Inc.Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
-
Patent number: 11893364Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating new versions of the code based on the code behavior models. In some embodiments, a method of improving a codebase includes recording a run of the existing code, characterizing the code behavior via one or more models, prototyping new code according to a target language and target environment, deploying the new code to the target environment, and comparing the behavior of the new code to the behavior of the existing code. In some implementations, generating new code based on the behavior models includes using one or more machine learning techniques for code generation based on the target language and environment.Type: GrantFiled: August 19, 2022Date of Patent: February 6, 2024Assignee: AppLand Inc.Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
-
Patent number: 11750609Abstract: Techniques include receiving an access notification identifying a request by an identity for access to an access-protected network resource; identifying a configurable and multi-dimensional policy defining rights of the identity to access the access-protected network resource with respect to the operation of the access-protected network resource; automatically determining, based on the configurable and multi-dimensional policy, whether to perform at least one of: permitting the identity to access the access-protected network resource; denying the identity to access the access-protected network resource; or rotating a secret associated with the identity.Type: GrantFiled: April 26, 2018Date of Patent: September 5, 2023Assignee: CYBERARK SOFTWARE LTD.Inventors: Kevin Gilpin, Brian Kelly
-
Publication number: 20230273775Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating new versions of the code based on the code behavior models. In some embodiments, a method of improving a codebase includes recording a run of the existing code, characterizing the code behavior via one or more models, prototyping new code according to a target language and target environment, deploying the new code to the target environment, and comparing the behavior of the new code to the behavior of the existing code. In some implementations, generating new code based on the behavior models includes using one or more machine learning techniques for code generation based on the target language and environment.Type: ApplicationFiled: April 11, 2023Publication date: August 31, 2023Applicant: AppLand Inc.Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
-
Patent number: 11650799Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating new versions of the code based on the code behavior models. In some embodiments, a method of improving a codebase includes recording a run of the existing code, characterizing the code behavior via one or more models, prototyping new code according to a target language and target environment, deploying the new code to the target environment, and comparing the behavior of the new code to the behavior of the existing code. In some implementations, generating new code based on the behavior models includes using one or more machine learning techniques for code generation based on the target language and environment.Type: GrantFiled: December 2, 2020Date of Patent: May 16, 2023Assignee: AppLand Inc.Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
-
Publication number: 20220391179Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating new versions of the code based on the code behavior models. In some embodiments, a method of improving a codebase includes recording a run of the existing code, characterizing the code behavior via one or more models, prototyping new code according to a target language and target environment, deploying the new code to the target environment, and comparing the behavior of the new code to the behavior of the existing code. In some implementations, generating new code based on the behavior models includes using one or more machine learning techniques for code generation based on the target language and environment.Type: ApplicationFiled: August 19, 2022Publication date: December 8, 2022Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
-
Patent number: 11455150Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating new versions of the code based on the code behavior models. In some embodiments, a method of improving a codebase includes recording a run of the existing code, characterizing the code behavior via one or more models, prototyping new code according to a target language and target environment, deploying the new code to the target environment, and comparing the behavior of the new code to the behavior of the existing code. In some implementations, generating new code based on the behavior models includes using one or more machine learning techniques for code generation based on the target language and environment.Type: GrantFiled: June 24, 2020Date of Patent: September 27, 2022Assignee: Appland Inc.Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
-
Publication number: 20210365354Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating characterizations of the code behavior and interrelations based on the code models. Some embodiments include user interfaces that provide views into the characterizations and interrelations of the application features and components that can give developers insights quickly and efficiently into applications which may be used for future developments and modifications to the application and to avoid introducing bugs into the application.Type: ApplicationFiled: May 24, 2021Publication date: November 25, 2021Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
-
Publication number: 20210165640Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating new versions of the code based on the code behavior models. In some embodiments, a method of improving a codebase includes recording a run of the existing code, characterizing the code behavior via one or more models, prototyping new code according to a target language and target environment, deploying the new code to the target environment, and comparing the behavior of the new code to the behavior of the existing code. In some implementations, generating new code based on the behavior models includes using one or more machine learning techniques for code generation based on the target language and environment.Type: ApplicationFiled: June 24, 2020Publication date: June 3, 2021Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
-
Publication number: 20210165641Abstract: Various embodiments of the present technology generally relate to the characterization and improvement of software applications. More specifically, some embodiments relate to systems and methods for modeling code behavior and generating new versions of the code based on the code behavior models. In some embodiments, a method of improving a codebase includes recording a run of the existing code, characterizing the code behavior via one or more models, prototyping new code according to a target language and target environment, deploying the new code to the target environment, and comparing the behavior of the new code to the behavior of the existing code. In some implementations, generating new code based on the behavior models includes using one or more machine learning techniques for code generation based on the target language and environment.Type: ApplicationFiled: December 2, 2020Publication date: June 3, 2021Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne, Daniel Warner
-
Publication number: 20200004946Abstract: Disclosed embodiments relate to secretless and secure communications with access-protected network resources. Techniques include identifying a request from a client service to access an access-protected network resource; automatically identifying an identity token uniquely associated with the client service for enabling autonomous authentication of the client service using the identity token; providing, from a secretless connection broker to an authentication credential provider, the identity token uniquely associated with the client service; receiving, from the authentication credential provider, based on the identity token and conditional on successful authentication of the client service, a connection credential; establishing a secure connection with the access-protected network resource using the connection credential; and exchanging secure communications with the access-protected network resource.Type: ApplicationFiled: August 16, 2018Publication date: January 2, 2020Applicant: CyberArk Software Ltd.Inventors: Kevin Gilpin, Elizabeth Lawler, Dustin Byrne
-
Patent number: 10397213Abstract: An access control service to provide access control for operations between resources and/or between resources and users in a cloud computing environment. The access control service receives a request to perform an operation. The requested operation could be initiated by a resource with respect to another resource. The requested operation could also be initiated by a user with respect to a resource. The access control service determines whether the requested operation is permitted. If the requested operation is permitted, the access control service provides the credentials required to perform the requested operation.Type: GrantFiled: May 26, 2015Date of Patent: August 27, 2019Assignee: CONJUR, INC.Inventors: Kevin Gilpin, Elizabeth Lawler
-
Patent number: 10248807Abstract: Examples provided herein enhance the management of permissions based on error reporting in a computing environment. Enhanced permission allocation in a computing environment includes obtaining an error report for an application operating within the computing environment. Based on the error report, permission changes are identified to assist in addressing one or more reported errors. Permission changes can include new, temporary, suspended, updated, modified and/or other permissions for new and/or existing members. Some or all of the identified permission changes can then be allocated to new and/or existing members of the computing environment. Some permission changes may include temporary permissions that provide changed permissions for a limited time period. If an error is not fully addressed, additional evaluation and identification of permission changes can be conducted. Based on this further evaluation, the permission changes can then be updated.Type: GrantFiled: October 5, 2016Date of Patent: April 2, 2019Assignee: CONJUR, INC.Inventor: Kevin Gilpin
-
Publication number: 20180316676Abstract: Techniques include receiving an access notification identifying a request by an identity for access to an access-protected network resource; identifying a configurable and multi-dimensional policy defining rights of the identity to access the access-protected network resource with respect to the operation of the access-protected network resource; automatically determining, based on the configurable and multi-dimensional policy, whether to perform at least one of: permitting the identity to access the access-protected network resource; denying the identity to access the access-protected network resource; or rotating a secret associated with the identity.Type: ApplicationFiled: April 26, 2018Publication date: November 1, 2018Applicant: Conjur, Inc.Inventors: Kevin GILPIN, Brian KELLY
-
Publication number: 20180295126Abstract: Dynamic computing resource access authorization is utilized to manage access to computing resources in a computing environment. A user obtains a digital credential such as a token from an access authority and includes the digital credential in an access request transmitted to a computing resource. The computing resource includes a protective gatekeeper access layer that receives the user request and transmits a user confirmation request to the access authority. The user confirmation request includes the digital credential, which can be used by the access authority to link the users identity to a permission set or the like. The access authority then transmits a status confirmation to the computing resources access layer. The status confirmation may approve or deny the users access request and/or may include permission(s) used by the access layer in allowing or denying the users access request.Type: ApplicationFiled: September 22, 2016Publication date: October 11, 2018Inventor: Kevin GILPIN
-
Publication number: 20180196928Abstract: Network visualization of access controls is utilized to manage computing resources in a computing environment. Host computing systems, virtual nodes executing on the host computing systems, end users associated with each host computing system and virtual node, and permissions for each 5 end user are identified. A display of the computing environment is then generated and comprises interconnections between visual representations of the host computing systems, the virtual nodes, the end users, and the secrets. Modifying data can update, simplify and alter the display.Type: ApplicationFiled: September 12, 2016Publication date: July 12, 2018Inventors: Kevin Gilpin, J. Mitchell Haile
-
Patent number: 9985970Abstract: To provide enhanced operation of computing systems to control access to audit logging resources by virtual machines, various systems, apparatuses, methods, and software are provided herein. In a first example, a method of operating a computing system is provided. The method includes receiving requests for audit credentials from virtual machines, and responsively providing individualized audit credentials to the virtual machines based at least on identities of the virtual machines. The method also includes, in the audit system, authorizing storage of audit data transferred by the virtual machines based at least on the individualized audit credentials accompanying the audit data. The method also includes, in the authorization system, selectively de-authorizing one or more of the virtual machines and reporting information regarding the de-authorized one or more of the virtual machines to the one or more audit systems.Type: GrantFiled: October 9, 2014Date of Patent: May 29, 2018Assignee: CONJUR, INC.Inventors: Kevin Gilpin, Elizabeth Lawler