Patents by Inventor Patrick Wardle

Patrick Wardle has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9838418
    Abstract: Computer systems and methods in various embodiments are configured to determine whether a file is likely to be malware-free or include malware.
    Type: Grant
    Filed: March 16, 2015
    Date of Patent: December 5, 2017
    Assignee: SYNACK, INC.
    Inventor: Patrick Wardle
  • Patent number: 9727738
    Abstract: A method and apparatus for patch validation via replay and remediation verification is provided.
    Type: Grant
    Filed: June 8, 2016
    Date of Patent: August 8, 2017
    Assignee: Synack, Inc.
    Inventors: Mark G. Kuhr, Patrick Wardle
  • Patent number: 9660870
    Abstract: A method and apparatus for soft patching security vulnerabilities is provided.
    Type: Grant
    Filed: June 8, 2016
    Date of Patent: May 23, 2017
    Assignee: Synack, Inc.
    Inventors: Mark G. Kuhr, Patrick Wardle
  • Patent number: 9607145
    Abstract: In an embodiment, a method comprises downloading an application program to a first storage coupled to a first device, wherein the application program comprises an encrypted portion based on a set of personally identifying data stored on the first storage; configuring the application program to load and execute a pre-compiled library when the application program is launched and which when executed by the first device, causes storing an unencrypted version of the application program on the first storage; launching the application program.
    Type: Grant
    Filed: November 23, 2015
    Date of Patent: March 28, 2017
    Assignee: Synack, Inc.
    Inventors: Jay Kaplan, Mark Kuhr, Patrick Wardle
  • Patent number: 9477399
    Abstract: Embedded devices, such as smart phones, can execute an application for performing a set of discrete tasks. To evaluate applications for security vulnerabilities, the application is executed and monitored. Part of this process involves the time-consuming process of performing or invoking the various user interface elements included in the application. An automated interaction system automatically, without human intervention, simulates various gestures that can be performed within each view of the application. The automated interaction system further identifies unactivated elements within subviews of the views and tracks its interactions to ensure that all of the identified UI elements within each view and subview are activated.
    Type: Grant
    Filed: May 19, 2015
    Date of Patent: October 25, 2016
    Assignee: Synack, Inc.
    Inventors: Patrick Wardle, Mark G. Kuhr
  • Publication number: 20160078221
    Abstract: In an embodiment, a method comprises downloading an application program to a first storage coupled to a first device, wherein the application program comprises an encrypted portion based on a set of personally identifying data stored on the first storage; configuring the application program to load and execute a pre-compiled library when the application program is launched and which when executed by the first device, causes storing an unencrypted version of the application program on the first storage; launching the application program.
    Type: Application
    Filed: November 23, 2015
    Publication date: March 17, 2016
    Applicant: SYNACK, INC.
    Inventors: JAY KAPLAN, MARK KUHR, PATRICK WARDLE
  • Patent number: 9201591
    Abstract: Embedded devices, such as smart phones, can execute an application for performing a set of discrete tasks. To evaluate applications for security vulnerabilities, a coverage monitoring system generates a directed graph of the application running on the embedded device. The directed graph is generated by logging gestures submitted by a user of the application and logging one or more actions taken by the application in response to the gesture. The gesture can include a click, a text input, or a more complex gesture. In response to the gesture, the application can change a current view, or screen, or can transition to a different view. The coverage monitoring system logs the gestures and logs a screenshot or other data about the response of the application. The logged data is used to generate the directed graph which can be accessed by application analysts and analyzed for security vulnerabilities.
    Type: Grant
    Filed: May 19, 2015
    Date of Patent: December 1, 2015
    Assignee: Synack, Inc.
    Inventors: Patrick Wardle, Mark G. Kuhr
  • Patent number: 9195809
    Abstract: In an embodiment, a method comprises downloading an application program to a first storage coupled to a first device, wherein the application program comprises an encrypted portion based on a set of personally identifying data stored on the first storage; configuring the application program to load and execute a pre-compiled library when the application program is launched and which when executed by the first device, causes storing an unencrypted version of the application program on the first storage; launching the application program.
    Type: Grant
    Filed: August 14, 2014
    Date of Patent: November 24, 2015
    Assignee: SYNACK, INC.
    Inventors: Jay Kaplan, Mark Kuhr, Patrick Wardle
  • Publication number: 20150183498
    Abstract: The invention is directed toward an autonomous submersible aquatic drone, a system utilizing an autonomous submersible aquatic drone and a control unit, a control unit for controlling an autonomous submersible aquatic drone, and a method for using the same. The autonomous submersible aquatic drone comprises a shaped housing, a propulsion system, one or more electromotors, a camera, a sonar unit, a wireless transponder, a battery, a microcontroller unit, and a control hardware unit. The control hardware unit is configured with artificial intelligence logic. The submersible drone surveys a predetermined area around a person engaged in a water sport for the presence of an underwater threat. When the aquatic drone detects the presence of an underwater threat the submersible drone sends a warning signal to a control unit worn by the person. The aquatic drone may also have a threat response unit to deter an attack on the person.
    Type: Application
    Filed: December 30, 2013
    Publication date: July 2, 2015
    Inventor: Patrick Wardle