Patents by Inventor Ming Sum Sam Ng

Ming Sum Sam Ng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11928204
    Abstract: A TEE system that includes a first platform that runs a first TEE, a second platform that runs a second TEE, and a merging unit that is adapted to merge a first output from the first TEE of the first platform, with a second output from the second TEE of the second platform, so as to form an output of the TEE system. The first TEE and the second TEE are based on different implementations. In this way, the security of the system is improved, as a malicious actor even be able to access “t” machines, still would not be able to retrieve the secret unless there are multiple exploitable TEE vulnerabilities on all executing TEE platforms at the same time.
    Type: Grant
    Filed: December 13, 2021
    Date of Patent: March 12, 2024
    Assignee: Foris Technology Pte Ltd
    Inventors: Kian Chuan Yap, Ming Sum Sam Ng, Jason Wai King Lau, Chun Ting Yip, Tung Ling Terry Young, Durgesh Pandey
  • Patent number: 11831753
    Abstract: A distributed key management system, which contains a server, a plurality of key-holding devices adapted to communicate with the server; and a key-requesting device adapted to communicate with the server. Each one of the plurality of key-holding devices is adapted to hold a different fragment of a private key. The server is adapted to reconstruct the private key based on the fragments received from the plurality of key-holding devices. The key-requesting device is adapted to obtain the private key from the server. The systems according to the invention provide a zero-trust model key management scheme and would eliminate the risk of key leakage to unauthorized person while providing flexibility of authorizing devices.
    Type: Grant
    Filed: December 3, 2019
    Date of Patent: November 28, 2023
    Assignee: Foris Limited
    Inventors: Ming Sum Sam Ng, Matthew David Chan, Wai King Jason Lau, Siu Kei Thomas Kung
  • Patent number: 11695793
    Abstract: A method includes: identifying, by a runtime instrumentation agent of a web server, a plurality of attack surfaces of a web application executed on the web server; generating, by the runtime instrumentation agent, a plurality of hash values, where each hash value is generated based on one of the plurality of attack surfaces; and transmitting, by the runtime instrumentation agent, the plurality of hash values to an attack server external to the web server, where the attack server is to determine whether to scan each attack surface based on the plurality of hash values.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: July 4, 2023
    Assignee: MICRO FOCUS LLC
    Inventors: Ming Sum Sam Ng, Sasi Siddharth Muthurajan, Nidhi Govindram Kejriwal, Gerald E. Sullivan, II, Alexander Hoole
  • Patent number: 11449638
    Abstract: Examples herein disclose via use of a physical processor, detecting a specific application programming interface (API) call to interact with an application running on a production server. Based on the detection of the specific API call, die examples assist, using the physical processor, a scanning session based on the specific API call Using the physical processor, the examples identify a modification to the application based on the scanning session.
    Type: Grant
    Filed: March 18, 2016
    Date of Patent: September 20, 2022
    Assignee: MICRO FOCUS LLC
    Inventors: Ming Sum Sam Ng, Sasi Siddharth Muthurajan, Barak Raz
  • Publication number: 20220188404
    Abstract: A TEE system that includes a first platform that runs a first TEE, a second platform that runs a second TEE, and a merging unit that is adapted to merge a first output from the first TEE of the first platform, with a second output from the second TEE of the second platform, so as to form an output of the TEE system. The first TEE and the second TEE are based on different implementations. In this way, the security of the system is improved, as a malicious actor even be able to access “t” machines, still would not be able to retrieve the secret unless there are multiple exploitable TEE vulnerabilities on all executing TEE platforms at the same time.
    Type: Application
    Filed: December 13, 2021
    Publication date: June 16, 2022
    Inventors: Kian Chuan YAP, Ming Sum Sam NG, Jason Wai King LAU, Chun Ting YIP, Tung Ling Terry YOUNG, Durgesh PANDEY
  • Publication number: 20210350368
    Abstract: A method for preventing blockchain intrusion includes the steps of detecting a transaction broadcasted to a blockchain network, determining if the transaction is authorized or unauthorized, and taking a prevention action if the transaction is unauthorized. The proposed system and method are not only adapted to detect unauthorized transactions but they can also cancel unauthorized transactions if the system prepare some data/arrangements in advance.
    Type: Application
    Filed: April 21, 2021
    Publication date: November 11, 2021
    Inventors: Tung Ling Terry YOUNG, Matthew David CHAN, Jason Wai King LAU, Ming Sum Sam NG, King Yin TAM
  • Patent number: 11055416
    Abstract: In some examples, a method may include detecting a vulnerability in an application during execution on a first computing device. The method may include triggering a breakpoint based on the detecting, thereby pausing the execution of the application before execution of a portion of code that exploits the vulnerability. The method may include communicating a message indicating occurrence of the breakpoint. The method may include receiving a connection request from a second computing device in response to the message. The method may include resuming execution of the application from the breakpoint subject to a signal from the second computing device.
    Type: Grant
    Filed: October 24, 2017
    Date of Patent: July 6, 2021
    Assignee: Micro Focus LLC
    Inventors: Alexander Michael Hoole, Ming Sum Sam Ng
  • Patent number: 11057395
    Abstract: Information stored in a Hypertext Transfer Protocol (HTTP) session is monitored. Based on the monitoring, authentication information in the information stored in the HTTP session is identified.
    Type: Grant
    Filed: March 24, 2014
    Date of Patent: July 6, 2021
    Assignee: Micro Focus LLC
    Inventors: Ming Sum Sam Ng, Ronald Joseph Sechman, Matias Madou
  • Patent number: 11044266
    Abstract: In some examples, a system includes a scan execution engine and a scan adaptation engine. The scan execution engine may execute a scan of a web application hosted on a web host. During scan execution, the scan adaptation engine may adapt a subsequent scan portion for later execution based on a scan metric received from a monitoring agent that monitors the web application, the web host, or both.
    Type: Grant
    Filed: February 26, 2016
    Date of Patent: June 22, 2021
    Assignee: Micro Focus LLC
    Inventors: Sasi Siddharth Muthurajan, Ming Sum Sam Ng, Jeremy C. Brooks
  • Publication number: 20210028931
    Abstract: A distributed key management system, which contains a server, a plurality of key-holding devices adapted to communicate with the server; and a key-requesting device adapted to communicate with the server. Each one of the plurality of key-holding devices is adapted to hold a different fragment of a private key. The server is adapted to reconstruct the private key based on the fragments received from the plurality of key-holding devices. The key-requesting device is adapted to obtain the private key from the server. The systems according to the invention provide a zero-trust model key management scheme and would eliminate the risk of key leakage to unauthorized person while providing flexibility of authorizing devices.
    Type: Application
    Filed: December 3, 2019
    Publication date: January 28, 2021
    Inventors: Ming Sum Sam NG, Matthew David CHAN, Wai King Jason LAU, Siu Kei Thomas KUNG
  • Publication number: 20200293673
    Abstract: Examples herein disclose via use of a physical processor, detecting a specific application programming interface (API) call to interact with an application running on a production server. Based on the detection of the specific API call, die examples assist, using the physical processor, a scanning session based on the specific API call Using the physical processor, the examples identify a modification to the application based on the scanning session.
    Type: Application
    Filed: March 18, 2016
    Publication date: September 17, 2020
    Inventors: Ming Sum Sam Ng, Sasi Siddharth Muthurajan, Barak Raz
  • Patent number: 10678910
    Abstract: Examples disclosed herein relate to modifying a web page. In one example, in response to beginning execution of a process initiating generation of a web page of a web application at a server, a runtime agent is executed. In this example, the runtime agent modifies code of the web page to inject code to protect output of the web page. In the example, the process can be executed using the modified code to generate a modified web page.
    Type: Grant
    Filed: April 10, 2015
    Date of Patent: June 9, 2020
    Assignee: Micro Focus LLC
    Inventors: Ming Sum Sam Ng, Alvaro Munoz, Oleksandr Mirosh
  • Patent number: 10581878
    Abstract: A method for attack detection includes: intercepting, by a runtime security agent, a request for a web resource; determining whether the intercepted request was triggered from an external website; determining whether the intercepted request was triggered from a current session; determining whether the intercepted request is requesting a static file type; and in response to a determination that the intercepted request was triggered from an external website and was not triggered from a current session, or a determination that the intercepted request was triggered from an external website and is not requesting a static file type, providing, by the runtime security agent, an indication of a potential attack.
    Type: Grant
    Filed: June 8, 2017
    Date of Patent: March 3, 2020
    Assignee: Micro Focus LLC
    Inventors: Ming Sum Sam Ng, Oleksandr Mirosh, Alvaro Munoz Sanchez
  • Publication number: 20190132348
    Abstract: A method includes: identifying, by a runtime instrumentation agent of a web server, a plurality of attack surfaces of a web application executed on the web server; generating, by the runtime instrumentation agent, a plurality of hash values, where each hash value is generated based on one of the plurality of attack surfaces; and transmitting, by the runtime instrumentation agent, the plurality of hash values to an attack server external to the web server, where the attack server is to determine whether to scan each attack surface based on the plurality of hash values.
    Type: Application
    Filed: October 31, 2017
    Publication date: May 2, 2019
    Inventors: Ming Sum Sam Ng, Sasi Siddharth Muthurajan, Nidhi Govindram Kejriwal, Gerald E. Sullivan, II, Alexander Hoole
  • Publication number: 20190121985
    Abstract: In some examples, a method may include detecting a vulnerability in an application during execution on a first computing device. The method may include triggering a breakpoint based on the detecting, thereby pausing the execution of the application before execution of a portion of code that exploits the vulnerability. The method may include communicating a message indicating occurrence of the breakpoint. The method may include receiving a connection request from a second computing device in response to the message. The method may include resuming execution of the application from the breakpoint subject to a signal from the second computing device.
    Type: Application
    Filed: October 24, 2017
    Publication date: April 25, 2019
    Inventors: Alexander Michael HOOLE, Ming Sum Sam NG
  • Publication number: 20190052666
    Abstract: In some examples, a system includes a scan execution engine and a scan adaptation engine. The scan execution engine may execute a scan of a web application hosted on a web host. During scan execution, the scan adaptation engine may adapt a subsequent scan portion for later execution based on a scan metric received from a monitoring agent that monitors the web application, the web host, or both.
    Type: Application
    Filed: February 26, 2016
    Publication date: February 14, 2019
    Inventors: Sasi Siddharth Muthurajan, Ming Sum Sam Ng, Jeremy C. Brooks
  • Publication number: 20180359265
    Abstract: A method for attack detection includes: intercepting, by a runtime security agent, a request for a web resource; determining whether the intercepted request was triggered from an external website; determining whether the intercepted request was triggered from a current session; determining whether the intercepted request is requesting a static file type; and in response to a determination that the intercepted request was triggered from an external website and was not triggered from a current session, or a determination that the intercepted request was triggered from an external website and is not requesting a static file type, providing, by the runtime security agent, an indication of a potential attack.
    Type: Application
    Filed: June 8, 2017
    Publication date: December 13, 2018
    Inventors: Ming Sum Sam Ng, Oleksandr Mirosh, Alvaro Munoz Sanchez
  • Publication number: 20180336348
    Abstract: Examples disclosed herein relate to modifying a web page. In one example, in response to beginning execution of a process initiating generation of a web page of a web application at a server, a runtime agent is executed. In this example, the runtime agent modifies code of the web page to inject code to protect output of the web page. In the example, the process can be executed using the modified code to generate a modified web page.
    Type: Application
    Filed: April 10, 2015
    Publication date: November 22, 2018
    Inventors: Ming Sum Sam Ng, Alvaro Munoz, Oleksandr Mirosh
  • Publication number: 20180268136
    Abstract: Examples relate to protection against database injection attacks. The examples disclosed herein enable intercepting a current database query prior to being executed by a database management system (DBMS). The examples disclosed herein further enable determining whether the current database query is suspected of having a security threat of a database injection attack by comparing the current database query with past database queries that have been intercepted prior to the interception of the current database query, and in response to determining that the current database query is not suspected of having the security threat of the database injection attack, storing the current database query in an allowed query list.
    Type: Application
    Filed: January 30, 2015
    Publication date: September 20, 2018
    Inventors: Ming Sum Sam Ng, Oleksandr Mirosh, Siddharth Muthurajan
  • Publication number: 20170111370
    Abstract: Information stored in a Hypertext Transfer Protocol (HTTP) session is monitored. Based on the monitoring, authentication information in the information stored in the HTTP session is identified.
    Type: Application
    Filed: March 24, 2014
    Publication date: April 20, 2017
    Inventors: Ming Sum Sam NG, Ronald Joseph SECHMAN, Matias MADOU