Patents by Inventor Philip Edward Hamer

Philip Edward Hamer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10572657
    Abstract: Examples disclosed herein relate to detecting object creation when instrumenting an application for security purposes. The examples enable determining, by an instrumenter implemented by a physical processor that implements machine readable instructions, whether to instrument a function; responsive to determining that the function should be instrumented, determining, by the instrumenter, that a base class constructor is to be called by the function; before the base class constructor is called, pushing, by the instrumenter, object related information onto a local storage registry; analyzing, by the instrumenter, the local storage registry to determine whether an object associated with the function was created based on information in the local storage registry; and responsive to determining that the object was created, applying, by the instrumenter, a security rule to the function.
    Type: Grant
    Filed: October 27, 2016
    Date of Patent: February 25, 2020
    Assignee: Micro Focus LLC
    Inventor: Philip Edward Hamer
  • Patent number: 10339207
    Abstract: A functional fragment of a document object model (DOM) tree is identified based on detecting at least one handler associated with at least one corresponding element of the DOM tree. In response to determining that the identified functional fragment matches a previously processed functional fragment, the identified functional fragment is excluded from further processing.
    Type: Grant
    Filed: April 22, 2014
    Date of Patent: July 2, 2019
    Assignee: ENTIT SOFTWARE LLC
    Inventors: Philip Edward Hamer, Shawn Morgan Simpson, Stephen Daniel Hardeman
  • Patent number: 10243679
    Abstract: In some examples, a system receives a response from a web server, the response being responsive to a web request sent to the web server. The system executes a script in the response with a web browser, links a document object model (DOM) method to application code executed during the executing of the script, and determines a vulnerability based on the DOM method linked during the executing of the script.
    Type: Grant
    Filed: May 25, 2017
    Date of Patent: March 26, 2019
    Assignee: ENTIT SOFTWARE LLC
    Inventors: Shawn Morgan Simpson, Philip Edward Hamer
  • Patent number: 9990500
    Abstract: Disclosed herein are techniques for determining vulnerabilities in applications under testing. It is determined whether a first database instruction of an application enters information into a database and whether a second database instruction thereof obtains said information from the database. If the first database instruction enters the information in the database and the second database instruction obtains the information therefrom, it is determined whether the application is vulnerable to entry of malicious code via the database.
    Type: Grant
    Filed: July 25, 2012
    Date of Patent: June 5, 2018
    Assignee: ENTIT SOFTWARE LLC
    Inventors: Sasi Siddharth Muthurajan, Prajakta Subhash Jagdale, Leonid Promyshlyansky Bensman, Iftach Ragoler, Philip Edward Hamer
  • Publication number: 20180121648
    Abstract: Examples disclosed herein relate to detecting object creation when instrumenting an application for security purposes. The examples enable determining, by an instrumenter implemented by a physical processor that implements machine readable instructions, whether to instrument a function; responsive to determining that the function should be instrumented, determining, by the instrumenter, that a base class constructor is to be called by the function; before the base class constructor is called, pushing, by the instrumenter, object related information onto a local storage registry; analyzing, by the instrumenter, the local storage registry to determine whether an object associated with the function was created based on information in the local storage registry; and responsive to determining that the object was created, applying, by the instrumenter, a security rule to the function.
    Type: Application
    Filed: October 27, 2016
    Publication date: May 3, 2018
    Inventor: Philip Edward HAMER
  • Patent number: 9910992
    Abstract: Example embodiments disclosed herein relate to present part of a web application with one or more user interface elements of the part highlighted based on updated rules. A web application is loaded in a browser layout engine. User actions are simulated on user interface elements of the web application to update the rules. The part of the web application is presented with one or more user interface elements highlighted.
    Type: Grant
    Filed: February 25, 2013
    Date of Patent: March 6, 2018
    Assignee: EntIT Software LLC
    Inventors: Shawn Morgan Simpson, Kirill Mendelev, Philip Edward Hamer
  • Publication number: 20170264378
    Abstract: In some examples, a system receives a response from a web server, the response being responsive to a web request sent to the web server. The system executes a script in the response with a web browser, links a document object model (DOM) method to application code executed during the executing of the script, and determines a vulnerability based on the DOM method linked during the executing of the script.
    Type: Application
    Filed: May 25, 2017
    Publication date: September 14, 2017
    Inventors: Shawn Morgan Simpson, Philip Edward Hamer
  • Patent number: 9736177
    Abstract: A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The web request may be attacked and sent to a web server. A response from the web server based on the web request is received, and the response of the web server is processed to determine any vulnerabilities.
    Type: Grant
    Filed: January 21, 2016
    Date of Patent: August 15, 2017
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Shawn Morgan Simpson, Philip Edward Hamer
  • Publication number: 20170220531
    Abstract: A functional fragment of a document object model (DOM) tree is identified based on detecting at least one handler associated with at least one corresponding element of the DOM tree. In response to determining that the identified functional fragment matches a previously processed functional fragment, the identified functional fragment is excluded from further processing.
    Type: Application
    Filed: April 22, 2014
    Publication date: August 3, 2017
    Inventor: Philip Edward Hamer
  • Patent number: 9501650
    Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: November 22, 2016
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdale
  • Publication number: 20160142434
    Abstract: A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The web request may be attacked and sent to a web server. A response from the web server based on the web request is received, and the response of the web server is processed to determine any vulnerabilities.
    Type: Application
    Filed: January 21, 2016
    Publication date: May 19, 2016
    Inventors: Shawn Morgan Simpson, Philip Edward Hamer
  • Patent number: 9276952
    Abstract: A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The web request may be attacked and sent to a web server. A response from the web server based on the web request is received, and the response of the web server is processed to determine any vulnerabilities.
    Type: Grant
    Filed: May 31, 2011
    Date of Patent: March 1, 2016
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Shawn Morgan Simpson, Philip Edward Hamer
  • Publication number: 20150379273
    Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.
    Type: Application
    Filed: September 4, 2015
    Publication date: December 31, 2015
    Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdale
  • Patent number: 9215247
    Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.
    Type: Grant
    Filed: May 31, 2011
    Date of Patent: December 15, 2015
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdate
  • Publication number: 20150356302
    Abstract: Example embodiments disclosed herein relate to present part of a web application with one or more user interface elements of the part highlighted based on updated rules. A web application is loaded in a browser layout engine. User actions are simulated on user interface elements of the web application to update the rules. The part of the web application is presented with one or more user interface elements highlighted.
    Type: Application
    Filed: February 25, 2013
    Publication date: December 10, 2015
    Inventors: Shawn Morgan Simpson, Kirill Mendelev, Philip Edward Hamer
  • Publication number: 20150128281
    Abstract: Disclosed herein are techniques for determining vulnerabilities in applications under testing. It is determined whether a first database instruction of an application enters information into a database and whether a second database instruction thereof obtains said information from the database. If the first database instruction enters the information in the database and the second database instruction obtains the information therefrom, it is determined whether the application is vulnerable to entry of malicious code via the database.
    Type: Application
    Filed: July 25, 2012
    Publication date: May 7, 2015
    Inventors: Sasi Siddharth Muthurajan, Prajakta Subhash Jagdale, Leonid Promyshlyansky Bensman, Iftach Ragoler, Philip Edward Hamer
  • Publication number: 20140082739
    Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.
    Type: Application
    Filed: May 31, 2011
    Publication date: March 20, 2014
    Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdate
  • Publication number: 20140075563
    Abstract: A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The web request may be attacked and sent to a web server. A response from the web server based on the web request is received, and the response of the web server is processed to determine any vulnerabilities.
    Type: Application
    Filed: May 31, 2011
    Publication date: March 13, 2014
    Inventors: Shawn Morgan Simpson, Philip Edward Hamer