Patents by Inventor Paul Compton HIRST

Paul Compton HIRST has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11347850
    Abstract: Systems, methods, and software can be used to analyze binary software codes. In some aspects, a computer-implemented method comprises: scanning, by at least one hardware processor, a binary software code to identify one or more text strings; associating, by the at least one hardware processor, the binary software code with a software platform based on the identified one or more text strings; disassembling, by the at least one hardware processor, the binary software code based on the software platform associated with the binary software code; and detecting, by the at least one hardware processor, a security risk in the disassembled binary software code.
    Type: Grant
    Filed: October 1, 2018
    Date of Patent: May 31, 2022
    Assignee: BlackBerry Limited
    Inventors: Adam John Boulton, William James McCourt, Benjamin John Godwood, Paul Compton Hirst, Niall Fitzgibbon
  • Patent number: 11210405
    Abstract: A method of determining a severity score is disclosed. The method includes receiving a binary; using the binary, determining a plurality of vulnerability parameters; and generating a report based on the plurality of vulnerability parameters.
    Type: Grant
    Filed: October 29, 2019
    Date of Patent: December 28, 2021
    Assignee: BlackBerry Limited
    Inventors: Adam John Boulton, William James McCourt, Benjamin John Godwood, Paul Compton Hirst
  • Publication number: 20210271762
    Abstract: A method for symbolic analysis of a software program is described. The method comprises constructing a control flow graph (CFG), for a software program procedure, the CFG comprising nodes representing basic blocks reachable within the software program procedure, the basic blocks represented as respective functions from a first machine state on entry to a said basic block to a second machine state on exit from that basic block. The method further describes simplifying the CFG to a single node representing the software program procedure as a function from an input machine state on entry to the software program procedure to an output machine state on exit from the software program procedure, comparing said function to a rule set identifying vulnerabilities based on effects on the machine state; and determining a vulnerability within the software program procedure based on the comparing.
    Type: Application
    Filed: February 4, 2021
    Publication date: September 2, 2021
    Applicant: BlackBerry Limited
    Inventors: William James McCOURT, Niall FITZGIBBON, Benjamin John GODWOOD, Paul Compton HIRST
  • Publication number: 20210133330
    Abstract: Systems, methods, and software can be used to determine a security score of a binary software code. In some aspects, a computer-implemented method comprises: receiving a binary software code; inspecting the binary software code to determine at least one Common Vulnerability Scoring Standard (CVSS) factor; and determining a CVSS score based on the at least one CVSS factor.
    Type: Application
    Filed: November 1, 2019
    Publication date: May 6, 2021
    Applicant: BlackBerry Limited
    Inventors: Adam John BOULTON, William James McCOURT, Paul Compton HIRST, Benjamin John GODWOOD
  • Publication number: 20210034757
    Abstract: A method of determining a severity score is disclosed. The method includes receiving a binary; using the binary, determining a plurality of vulnerability parameters; and generating a report based on the plurality of vulnerability parameters.
    Type: Application
    Filed: October 29, 2019
    Publication date: February 4, 2021
    Inventors: Adam John BOULTON, William James McCOURT, Benjamin John GODWOOD, Paul Compton HIRST
  • Publication number: 20200104490
    Abstract: Systems, methods, and software can be used to analyze binary software codes. In some aspects, a computer-implemented method comprises: scanning, by at least one hardware processor, a binary software code to identify one or more text strings; associating, by the at least one hardware processor, the binary software code with a software platform based on the identified one or more text strings; disassembling, by the at least one hardware processor, the binary software code based on the software platform associated with the binary software code; and detecting, by the at least one hardware processor, a security risk in the disassembled binary software code.
    Type: Application
    Filed: October 1, 2018
    Publication date: April 2, 2020
    Applicant: BlackBerry Limited
    Inventors: Adam John BOULTON, William James McCOURT, Benjamin John GODWOOD, Paul Compton HIRST, Niall FITZGIBBON