Patents by Inventor Michael P. Shema

Michael P. Shema has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10108801
    Abstract: Present example embodiments relate generally to scanning websites, wherein the devices, methods, and logic for the scanning comprises receiving interaction information between a user computing device and a web application of the website; dynamically determining an action to be performed to the web application that approximately simulates the user computing device interacting with the web application, wherein the action is dynamically determined based on the received interaction information; establishing a browsing session with the website; discovering the web application within the website; and identifying a vulnerability of the web application by interacting with the web application using the action.
    Type: Grant
    Filed: November 15, 2012
    Date of Patent: October 23, 2018
    Assignee: Qualys, Inc.
    Inventors: Michael P. Shema, Vaagn Toukharian, Sergey Shekyan
  • Patent number: 9876813
    Abstract: The technology described herein provides a novel system and method for web-based log analysis. The analysis combines the benefits of typical log monitoring systems with those of typical vulnerability managements systems. The synergy of the combined log monitoring and vulnerability management results in a single provider detecting vulnerability and subsequently accessing archived log data to detect if the vulnerability has been exploited in the past, identifying compromised machines for customers.
    Type: Grant
    Filed: February 11, 2015
    Date of Patent: January 23, 2018
    Assignee: Qualys, Inc.
    Inventors: Artem Harutyunyan, Amol R. Sarwate, Sumedh Thakar, Michael P. Shema
  • Publication number: 20160234238
    Abstract: The technology described herein provides a novel system and method for web-based log analysis. The analysis combines the benefits of typical log monitoring systems with those of typical vulnerability managements systems. The synergy of the combined log monitoring and vulnerability management results in a single provider detecting vulnerability and subsequently accessing archived log data to detect if the vulnerability has been exploited in the past, identifying compromised machines for customers.
    Type: Application
    Filed: February 11, 2015
    Publication date: August 11, 2016
    Inventors: Artem Harutyunyan, Amol R. Sarwate, Sumedh Thakar, Michael P. Shema
  • Publication number: 20140137228
    Abstract: Present example embodiments relate generally to scanning websites, wherein the devices, methods, and logic for the scanning comprises receiving interaction information between a user computing device and a web application of the website; dynamically determining an action to be performed to the web application that approximately simulates the user computing device interacting with the web application, wherein the action is dynamically determined based on the received interaction information; establishing a browsing session with the website; discovering the web application within the website; and identifying a vulnerability of the web application by interacting with the web application using the action.
    Type: Application
    Filed: November 15, 2012
    Publication date: May 15, 2014
    Applicant: QUALYS, INC.
    Inventors: Michael P. Shema, Vaagn Toukharian, Sergey Shekyan