Patents by Inventor Oleksandr Mirosh

Oleksandr Mirosh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10678910
    Abstract: Examples disclosed herein relate to modifying a web page. In one example, in response to beginning execution of a process initiating generation of a web page of a web application at a server, a runtime agent is executed. In this example, the runtime agent modifies code of the web page to inject code to protect output of the web page. In the example, the process can be executed using the modified code to generate a modified web page.
    Type: Grant
    Filed: April 10, 2015
    Date of Patent: June 9, 2020
    Assignee: Micro Focus LLC
    Inventors: Ming Sum Sam Ng, Alvaro Munoz, Oleksandr Mirosh
  • Patent number: 10581878
    Abstract: A method for attack detection includes: intercepting, by a runtime security agent, a request for a web resource; determining whether the intercepted request was triggered from an external website; determining whether the intercepted request was triggered from a current session; determining whether the intercepted request is requesting a static file type; and in response to a determination that the intercepted request was triggered from an external website and was not triggered from a current session, or a determination that the intercepted request was triggered from an external website and is not requesting a static file type, providing, by the runtime security agent, an indication of a potential attack.
    Type: Grant
    Filed: June 8, 2017
    Date of Patent: March 3, 2020
    Assignee: Micro Focus LLC
    Inventors: Ming Sum Sam Ng, Oleksandr Mirosh, Alvaro Munoz Sanchez
  • Publication number: 20180359265
    Abstract: A method for attack detection includes: intercepting, by a runtime security agent, a request for a web resource; determining whether the intercepted request was triggered from an external website; determining whether the intercepted request was triggered from a current session; determining whether the intercepted request is requesting a static file type; and in response to a determination that the intercepted request was triggered from an external website and was not triggered from a current session, or a determination that the intercepted request was triggered from an external website and is not requesting a static file type, providing, by the runtime security agent, an indication of a potential attack.
    Type: Application
    Filed: June 8, 2017
    Publication date: December 13, 2018
    Inventors: Ming Sum Sam Ng, Oleksandr Mirosh, Alvaro Munoz Sanchez
  • Publication number: 20180336348
    Abstract: Examples disclosed herein relate to modifying a web page. In one example, in response to beginning execution of a process initiating generation of a web page of a web application at a server, a runtime agent is executed. In this example, the runtime agent modifies code of the web page to inject code to protect output of the web page. In the example, the process can be executed using the modified code to generate a modified web page.
    Type: Application
    Filed: April 10, 2015
    Publication date: November 22, 2018
    Inventors: Ming Sum Sam Ng, Alvaro Munoz, Oleksandr Mirosh
  • Publication number: 20180268136
    Abstract: Examples relate to protection against database injection attacks. The examples disclosed herein enable intercepting a current database query prior to being executed by a database management system (DBMS). The examples disclosed herein further enable determining whether the current database query is suspected of having a security threat of a database injection attack by comparing the current database query with past database queries that have been intercepted prior to the interception of the current database query, and in response to determining that the current database query is not suspected of having the security threat of the database injection attack, storing the current database query in an allowed query list.
    Type: Application
    Filed: January 30, 2015
    Publication date: September 20, 2018
    Inventors: Ming Sum Sam Ng, Oleksandr Mirosh, Siddharth Muthurajan