Patents by Inventor Philip Edward Hamer
Philip Edward Hamer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10572657Abstract: Examples disclosed herein relate to detecting object creation when instrumenting an application for security purposes. The examples enable determining, by an instrumenter implemented by a physical processor that implements machine readable instructions, whether to instrument a function; responsive to determining that the function should be instrumented, determining, by the instrumenter, that a base class constructor is to be called by the function; before the base class constructor is called, pushing, by the instrumenter, object related information onto a local storage registry; analyzing, by the instrumenter, the local storage registry to determine whether an object associated with the function was created based on information in the local storage registry; and responsive to determining that the object was created, applying, by the instrumenter, a security rule to the function.Type: GrantFiled: October 27, 2016Date of Patent: February 25, 2020Assignee: Micro Focus LLCInventor: Philip Edward Hamer
-
Patent number: 10339207Abstract: A functional fragment of a document object model (DOM) tree is identified based on detecting at least one handler associated with at least one corresponding element of the DOM tree. In response to determining that the identified functional fragment matches a previously processed functional fragment, the identified functional fragment is excluded from further processing.Type: GrantFiled: April 22, 2014Date of Patent: July 2, 2019Assignee: ENTIT SOFTWARE LLCInventors: Philip Edward Hamer, Shawn Morgan Simpson, Stephen Daniel Hardeman
-
Patent number: 10243679Abstract: In some examples, a system receives a response from a web server, the response being responsive to a web request sent to the web server. The system executes a script in the response with a web browser, links a document object model (DOM) method to application code executed during the executing of the script, and determines a vulnerability based on the DOM method linked during the executing of the script.Type: GrantFiled: May 25, 2017Date of Patent: March 26, 2019Assignee: ENTIT SOFTWARE LLCInventors: Shawn Morgan Simpson, Philip Edward Hamer
-
Patent number: 9990500Abstract: Disclosed herein are techniques for determining vulnerabilities in applications under testing. It is determined whether a first database instruction of an application enters information into a database and whether a second database instruction thereof obtains said information from the database. If the first database instruction enters the information in the database and the second database instruction obtains the information therefrom, it is determined whether the application is vulnerable to entry of malicious code via the database.Type: GrantFiled: July 25, 2012Date of Patent: June 5, 2018Assignee: ENTIT SOFTWARE LLCInventors: Sasi Siddharth Muthurajan, Prajakta Subhash Jagdale, Leonid Promyshlyansky Bensman, Iftach Ragoler, Philip Edward Hamer
-
Publication number: 20180121648Abstract: Examples disclosed herein relate to detecting object creation when instrumenting an application for security purposes. The examples enable determining, by an instrumenter implemented by a physical processor that implements machine readable instructions, whether to instrument a function; responsive to determining that the function should be instrumented, determining, by the instrumenter, that a base class constructor is to be called by the function; before the base class constructor is called, pushing, by the instrumenter, object related information onto a local storage registry; analyzing, by the instrumenter, the local storage registry to determine whether an object associated with the function was created based on information in the local storage registry; and responsive to determining that the object was created, applying, by the instrumenter, a security rule to the function.Type: ApplicationFiled: October 27, 2016Publication date: May 3, 2018Inventor: Philip Edward HAMER
-
Patent number: 9910992Abstract: Example embodiments disclosed herein relate to present part of a web application with one or more user interface elements of the part highlighted based on updated rules. A web application is loaded in a browser layout engine. User actions are simulated on user interface elements of the web application to update the rules. The part of the web application is presented with one or more user interface elements highlighted.Type: GrantFiled: February 25, 2013Date of Patent: March 6, 2018Assignee: EntIT Software LLCInventors: Shawn Morgan Simpson, Kirill Mendelev, Philip Edward Hamer
-
Publication number: 20170264378Abstract: In some examples, a system receives a response from a web server, the response being responsive to a web request sent to the web server. The system executes a script in the response with a web browser, links a document object model (DOM) method to application code executed during the executing of the script, and determines a vulnerability based on the DOM method linked during the executing of the script.Type: ApplicationFiled: May 25, 2017Publication date: September 14, 2017Inventors: Shawn Morgan Simpson, Philip Edward Hamer
-
Patent number: 9736177Abstract: A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The web request may be attacked and sent to a web server. A response from the web server based on the web request is received, and the response of the web server is processed to determine any vulnerabilities.Type: GrantFiled: January 21, 2016Date of Patent: August 15, 2017Assignee: Hewlett Packard Enterprise Development LPInventors: Shawn Morgan Simpson, Philip Edward Hamer
-
Publication number: 20170220531Abstract: A functional fragment of a document object model (DOM) tree is identified based on detecting at least one handler associated with at least one corresponding element of the DOM tree. In response to determining that the identified functional fragment matches a previously processed functional fragment, the identified functional fragment is excluded from further processing.Type: ApplicationFiled: April 22, 2014Publication date: August 3, 2017Inventor: Philip Edward Hamer
-
Patent number: 9501650Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.Type: GrantFiled: September 4, 2015Date of Patent: November 22, 2016Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdale
-
Publication number: 20160142434Abstract: A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The web request may be attacked and sent to a web server. A response from the web server based on the web request is received, and the response of the web server is processed to determine any vulnerabilities.Type: ApplicationFiled: January 21, 2016Publication date: May 19, 2016Inventors: Shawn Morgan Simpson, Philip Edward Hamer
-
Patent number: 9276952Abstract: A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The web request may be attacked and sent to a web server. A response from the web server based on the web request is received, and the response of the web server is processed to determine any vulnerabilities.Type: GrantFiled: May 31, 2011Date of Patent: March 1, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Shawn Morgan Simpson, Philip Edward Hamer
-
Publication number: 20150379273Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.Type: ApplicationFiled: September 4, 2015Publication date: December 31, 2015Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdale
-
Patent number: 9215247Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.Type: GrantFiled: May 31, 2011Date of Patent: December 15, 2015Assignee: Hewlett Packard Enterprise Development LPInventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdate
-
Publication number: 20150356302Abstract: Example embodiments disclosed herein relate to present part of a web application with one or more user interface elements of the part highlighted based on updated rules. A web application is loaded in a browser layout engine. User actions are simulated on user interface elements of the web application to update the rules. The part of the web application is presented with one or more user interface elements highlighted.Type: ApplicationFiled: February 25, 2013Publication date: December 10, 2015Inventors: Shawn Morgan Simpson, Kirill Mendelev, Philip Edward Hamer
-
Publication number: 20150128281Abstract: Disclosed herein are techniques for determining vulnerabilities in applications under testing. It is determined whether a first database instruction of an application enters information into a database and whether a second database instruction thereof obtains said information from the database. If the first database instruction enters the information in the database and the second database instruction obtains the information therefrom, it is determined whether the application is vulnerable to entry of malicious code via the database.Type: ApplicationFiled: July 25, 2012Publication date: May 7, 2015Inventors: Sasi Siddharth Muthurajan, Prajakta Subhash Jagdale, Leonid Promyshlyansky Bensman, Iftach Ragoler, Philip Edward Hamer
-
Publication number: 20140082739Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.Type: ApplicationFiled: May 31, 2011Publication date: March 20, 2014Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdate
-
Publication number: 20140075563Abstract: A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The web request may be attacked and sent to a web server. A response from the web server based on the web request is received, and the response of the web server is processed to determine any vulnerabilities.Type: ApplicationFiled: May 31, 2011Publication date: March 13, 2014Inventors: Shawn Morgan Simpson, Philip Edward Hamer