Patents by Inventor Kristofer A. Duer

Kristofer A. Duer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11544384
    Abstract: A computer-implemented method includes obtaining, by a processor, existing security information for static application security testing (SAST). The method also includes using, by the processor, the existing security information to discover, by a machine capable of learning, new security information. The method also includes improving, by the processor, security of a computer using the new security information.
    Type: Grant
    Filed: April 12, 2019
    Date of Patent: January 3, 2023
    Assignee: International Business Machines Corporation
    Inventors: Kristofer A. Duer, John T. Peyton, Jr., Babita Sharma, David E. Stewart, Jason N. Todd, Shu Wang
  • Patent number: 10592405
    Abstract: Vulnerability testing of applications may include one or more of identifying a number of paths from a software application being tested, identifying a number of nodes associated with the paths, determining one or more of the paths which share one or more of the nodes, designating the paths which share the nodes as overlapping paths, and displaying the overlapping paths and the shared nodes as an interactive visualization to identify to identify optimal locations to fix one or more vulnerability findings.
    Type: Grant
    Filed: October 3, 2017
    Date of Patent: March 17, 2020
    Assignee: International Business Machines Corporation
    Inventors: Kristofer A. Duer, John T. Peyton, Stephen D. Teilhet, Lin Tan, Jinqiu Yang
  • Publication number: 20190236483
    Abstract: A computer-implemented method includes obtaining, by a processor, existing security information for static application security testing (SAST). The method also includes using, by the processor, the existing security information to discover, by a machine capable of learning, new security information. The method also includes improving, by the processor, security of a computer using the new security information.
    Type: Application
    Filed: April 12, 2019
    Publication date: August 1, 2019
    Inventors: Kristofer A. Duer, John T. Peyton, JR., Babita Sharma, David E. Stewart, Jason N. Todd, Shu Wang
  • Patent number: 10339320
    Abstract: A computer-implemented method includes obtaining, by a processor, existing security information for static application security testing (SAST). The method also includes using, by the processor, the existing security information to discover, by a machine capable of learning, new security information. The method also includes improving, by the processor, security of a computer using the new security information.
    Type: Grant
    Filed: November 18, 2016
    Date of Patent: July 2, 2019
    Assignee: International Business Machines Corporation
    Inventors: Kristofer A. Duer, John T. Peyton, Jr., Babita Sharma, David E. Stewart, Jason N. Todd, Shu Wang
  • Patent number: 10324825
    Abstract: A source code processing application may process source code and realize the results of the code in a map configuration. In one example, the map may be displayed with a number of stations and pathways between the stations to illustrate associations with classes of the source code. An example method of operation may include one or more of retrieving source code comprising a class from memory, processing the source code to identify an error associated with the class, creating a map with a station linked to the error, and displaying the map on a device.
    Type: Grant
    Filed: August 14, 2018
    Date of Patent: June 18, 2019
    Assignee: International Business Machines Corporation
    Inventors: Kristofer A. Duer, John T. Peyton, Johnathan D. Smith, Stephen D. Teilhet, Jason N. Todd, Lin Tan, Jinqiu Yang
  • Publication number: 20190102286
    Abstract: Vulnerability testing of applications may include one or more of identifying a number of paths from a software application being tested, identifying a number of nodes associated with the paths, determining one or more of the paths which share one or more of the nodes, designating the paths which share the nodes as overlapping paths, and displaying the overlapping paths and the shared nodes as an interactive visualization to identify to identify optimal locations to fix one or more vulnerability findings.
    Type: Application
    Filed: October 3, 2017
    Publication date: April 4, 2019
    Inventors: Kristofer A. Duer, John T. Peyton, Stephen D. Teilhet, Lin Tan, Jinqiu Yang
  • Publication number: 20180357151
    Abstract: A source code processing application may process source code and realize the results of the code in a map configuration. In one example, the map may be displayed with a number of stations and pathways between the stations to illustrate associations with classes of the source code. An example method of operation may include one or more of retrieving source code comprising a class from memory, processing the source code to identify an error associated with the class, creating a map with a station linked to the error, and displaying the map on a device.
    Type: Application
    Filed: August 14, 2018
    Publication date: December 13, 2018
    Inventors: Kristofer A. Duer, John T. Peyton, Johnathan D. Smith, Stephen D. Teilhet, Jason N. Todd, Lin Tan, Jinqiu Yang
  • Patent number: 10089215
    Abstract: A source code processing application may process source code and realize the results of the code in a map configuration. In one example, the map may be displayed with a number of stations and pathways between the stations to illustrate associations with classes of the source code. An example method of operation may include one or more of retrieving source code comprising a class from memory, processing the source code to identify an error associated with the class, creating a map with a station linked to the error, and displaying the map on a device.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: October 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Kristofer A. Duer, John T. Peyton, Stephen D. Teilhet, Jason N. Todd, Lin Tan, Jinqui Yang
  • Publication number: 20180144127
    Abstract: A computer-implemented method includes obtaining, by a processor, existing security information for static application security testing (SAST). The method also includes using, by the processor, the existing security information to discover, by a machine capable of learning, new security information. The method also includes improving, by the processor, security of a computer using the new security information.
    Type: Application
    Filed: November 18, 2016
    Publication date: May 24, 2018
    Inventors: Kristofer A. Duer, John T. Peyton, JR., Babita Sharma, David E. Stewart, Jason N. Todd, Shu Wang
  • Publication number: 20180089064
    Abstract: A source code processing application may process source code and realize the results of the code in a map configuration. In one example, the map may be displayed with a number of stations and pathways between the stations to illustrate associations with classes of the source code. An example method of operation may include one or more of retrieving source code comprising a class from memory, processing the source code to identify an error associated with the class, creating a map with a station linked to the error, and displaying the map on a device.
    Type: Application
    Filed: September 23, 2016
    Publication date: March 29, 2018
    Inventors: Kristofer A. Duer, John T. Peyton, Jonathan D. Smith, Stephen D. Teilhet, Jason N. Todd, Lin Tan, Jinqiu Yang
  • Patent number: 9749345
    Abstract: A computer-implemented method, computer program product, and computing system is provided for reporting security vulnerabilities. In an embodiment, a method may include receiving a set of potential security vulnerabilities associated with a program. The method may also include filtering the set of potential security vulnerabilities by eliminating one or more spurious security vulnerabilities to generate a set of likely security vulnerabilities. The method may further include consolidating the set of likely security vulnerabilities into one or more solution categories, each of the one or more solutions categories defining a solution for remedying each of the likely security vulnerabilities within the solution category.
    Type: Grant
    Filed: April 22, 2015
    Date of Patent: August 29, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kristofer A. Duer, Omer Tripp, Stephen D. Teilhet, John T. Peyton, Jr.
  • Publication number: 20160315961
    Abstract: A computer-implemented method, computer program product, and computing system is provided for reporting security vulnerabilities. In an embodiment, a method may include receiving a set of potential security vulnerabilities associated with a program. The method may also include filtering the set of potential security vulnerabilities by eliminating one or more spurious security vulnerabilities to generate a set of likely security vulnerabilities. The method may further include consolidating the set of likely security vulnerabilities into one or more solution categories, each of the one or more solutions categories defining a solution for remedying each of the likely security vulnerabilities within the solution category.
    Type: Application
    Filed: April 22, 2015
    Publication date: October 27, 2016
    Inventors: Kristofer A. Duer, Omer Tripp, Stephen D. Teilhet, John T. Peyton, JR.