Patents by Inventor Morgan Simpson
Morgan Simpson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240338442Abstract: Software developers and security personnel routinely scan code to look for threats, such as security vulnerabilities. While such scans are useful, they are unable to determine the actual data provided to a client device executing a web application. By monitoring the web traffic to a client, the libraries utilized by the web application may be determined by name, version, and vendor. With the library identified, the libraries may be provided to one or more repositories of vulnerabilities to identify the particular vulnerabilities of the library. With the vulnerability identified, a resolution (e.g., version wherein the vulnerability was fixed) may be identified and/or other action to mitigate the vulnerability.Type: ApplicationFiled: April 5, 2023Publication date: October 10, 2024Applicant: MICRO FOCUS LLCInventors: Shawn Morgan Simpson, Vladyslav Voloshyn, Eyal Jakob
-
Publication number: 20230373333Abstract: A camera is located within an array of receptacles of a robotically controlled vehicle charging connector which receptacles are configured to mate and establish electrical connection with respective mating pins of a vehicle's charging port. Image signals generated by the camera are supplied to a computer vision processor which generates motor control signals which enable the connector receptacles and mating pins to be properly aligned so as to enable the charging connector to be robotically plugged into the vehicle's charging port. In other embodiments, the mating pins may be located in the charging connector and the receptacles in the charging port.Type: ApplicationFiled: May 19, 2022Publication date: November 23, 2023Applicant: Procom Engineering, Inc.Inventors: Wesley Zhou, Shepherd Darquea, Morgan Simpson
-
Publication number: 20230373323Abstract: An apparatus for interconnecting a vehicle charging connector with a charging port of a vehicle wherein a latch arm is slidably mounted in the charging connector to slide toward and away from the charging port and toward and into an opening in the charging port. A tip portion is positioned on the latch arm so as to be insertable downwardly into a cavity formed in an interior surface of the opening of the charging port and a linear actuator is configured to drive the latch arm towards and away from the charging connector. In an illustrative embodiment, the charging connector comprises part of a robot configured to move the tip of the latch arm downwardly into the cavity in the opening of the charging port to enable pulling the charging connector and charging port together to establish electrical contact.Type: ApplicationFiled: October 7, 2022Publication date: November 23, 2023Applicant: Procom Engineering, Inc.Inventors: Wesley Zhou, Shepherd Darquea, Morgan Simpson
-
Patent number: 10339207Abstract: A functional fragment of a document object model (DOM) tree is identified based on detecting at least one handler associated with at least one corresponding element of the DOM tree. In response to determining that the identified functional fragment matches a previously processed functional fragment, the identified functional fragment is excluded from further processing.Type: GrantFiled: April 22, 2014Date of Patent: July 2, 2019Assignee: ENTIT SOFTWARE LLCInventors: Philip Edward Hamer, Shawn Morgan Simpson, Stephen Daniel Hardeman
-
Patent number: 10243679Abstract: In some examples, a system receives a response from a web server, the response being responsive to a web request sent to the web server. The system executes a script in the response with a web browser, links a document object model (DOM) method to application code executed during the executing of the script, and determines a vulnerability based on the DOM method linked during the executing of the script.Type: GrantFiled: May 25, 2017Date of Patent: March 26, 2019Assignee: ENTIT SOFTWARE LLCInventors: Shawn Morgan Simpson, Philip Edward Hamer
-
Patent number: 10152552Abstract: Example embodiments disclosed herein relate to analyzing a web application. A web application is loaded. User actions are simulated on user interface elements of the web application. A structure of the web application is traversed based on rules to determine a set of actionable tokens. The respective actionable tokens include a portion of the web application that can change a user interface presented based on the web application.Type: GrantFiled: January 29, 2013Date of Patent: December 11, 2018Assignee: ENTIT SOFTWARE LLCInventors: Shawn Morgan Simpson, Kirill Mendelev, David Scott Tillery
-
Patent number: 9910992Abstract: Example embodiments disclosed herein relate to present part of a web application with one or more user interface elements of the part highlighted based on updated rules. A web application is loaded in a browser layout engine. User actions are simulated on user interface elements of the web application to update the rules. The part of the web application is presented with one or more user interface elements highlighted.Type: GrantFiled: February 25, 2013Date of Patent: March 6, 2018Assignee: EntIT Software LLCInventors: Shawn Morgan Simpson, Kirill Mendelev, Philip Edward Hamer
-
Publication number: 20170264378Abstract: In some examples, a system receives a response from a web server, the response being responsive to a web request sent to the web server. The system executes a script in the response with a web browser, links a document object model (DOM) method to application code executed during the executing of the script, and determines a vulnerability based on the DOM method linked during the executing of the script.Type: ApplicationFiled: May 25, 2017Publication date: September 14, 2017Inventors: Shawn Morgan Simpson, Philip Edward Hamer
-
Patent number: 9736177Abstract: A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The web request may be attacked and sent to a web server. A response from the web server based on the web request is received, and the response of the web server is processed to determine any vulnerabilities.Type: GrantFiled: January 21, 2016Date of Patent: August 15, 2017Assignee: Hewlett Packard Enterprise Development LPInventors: Shawn Morgan Simpson, Philip Edward Hamer
-
Publication number: 20160142434Abstract: A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The web request may be attacked and sent to a web server. A response from the web server based on the web request is received, and the response of the web server is processed to determine any vulnerabilities.Type: ApplicationFiled: January 21, 2016Publication date: May 19, 2016Inventors: Shawn Morgan Simpson, Philip Edward Hamer
-
Publication number: 20160078146Abstract: Example embodiments disclosed herein relate to analyzing a web application. A web application is loaded. User actions are simulated on user interface elements of the web application. A structure of the web application is traversed based on rules to determine a set of actionable tokens. The respective actionable tokens include a portion of the web application that can change a user interface presented based on the web application.Type: ApplicationFiled: January 29, 2013Publication date: March 17, 2016Inventors: Shawn Morgan Simpson, Kirill Mendelev, David Scott Tillery
-
Patent number: 9276952Abstract: A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The web request may be attacked and sent to a web server. A response from the web server based on the web request is received, and the response of the web server is processed to determine any vulnerabilities.Type: GrantFiled: May 31, 2011Date of Patent: March 1, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Shawn Morgan Simpson, Philip Edward Hamer
-
Publication number: 20150356302Abstract: Example embodiments disclosed herein relate to present part of a web application with one or more user interface elements of the part highlighted based on updated rules. A web application is loaded in a browser layout engine. User actions are simulated on user interface elements of the web application to update the rules. The part of the web application is presented with one or more user interface elements highlighted.Type: ApplicationFiled: February 25, 2013Publication date: December 10, 2015Inventors: Shawn Morgan Simpson, Kirill Mendelev, Philip Edward Hamer
-
Publication number: 20140075563Abstract: A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The web request may be attacked and sent to a web server. A response from the web server based on the web request is received, and the response of the web server is processed to determine any vulnerabilities.Type: ApplicationFiled: May 31, 2011Publication date: March 13, 2014Inventors: Shawn Morgan Simpson, Philip Edward Hamer