Patents by Inventor Robert A. Stone
Robert A. Stone has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9239745Abstract: Vulnerability testing of a web application can be done using external testing, wherein an external test system runs with permissions of a user of the web application and interacts with the web application over a network, the external test system might obtain a schedule for a vulnerability test, execute the schedule using the external test system, log at least portions of responses of the web application to interactions of the external test system with the web application, compare portions of the responses to expected possible responses associated with particular possible vulnerabilities of the web application, thereby detecting possible vulnerabilities of the web application and, for at least one detected possible vulnerability, generating a retest script that comprises at least instructions to place the web application in a state at least similar to the state at which the at least one detected possible vulnerability was detected during execution of the schedule and that comprises at least instructions to intType: GrantFiled: September 28, 2007Date of Patent: January 19, 2016Assignee: Whitehat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Publication number: 20150328789Abstract: A razor blade having a substrate with a cutting edge being defined by a sharpened tip. The substrate has thicknesses of 1.60-1.75 micrometers and 9.25-10.00 micrometers measured at a distance of four and forty micrometers from the blade tip, respectively. A ratio of the thickness measured at four micrometers to the thickness measured at forty micrometers is between 0.165-0.185. The substrate thickness is about 2.70-3.00 micrometers at eight micrometers from the blade tip, about 4.44-5.00 micrometers at sixteen micrometers from the blade tip with a thickness ratio measured at four micrometers and eight micrometers between 0.56-0.62, and a thickness ratio measured at four micrometers and sixteen micrometers between 0.32-0.40. The blade edge shape is defined by equation w=adn where “a” is between 0.50-0.62 and “n” is between 0.76-0.80. An included angle of less than 7° is measured at a distance of forty micrometers or greater from the blade tip. A nitrided substrate may also be provided.Type: ApplicationFiled: May 19, 2014Publication date: November 19, 2015Applicant: The Gillette CompanyInventors: Kenneth James Skrobis, Bin Shen, Yongqing Ju, Matthew Robert Stone
-
Publication number: 20150059568Abstract: A hydraulic circuit for controlling a component of a hydraulic machine includes an actuator having a head end chamber and a rod end chamber, the actuator having an extended position for moving the component in a first direction and a retracted position for moving the component in a second direction. The hydraulic circuit includes a regeneration valve having an open position for fluidly connecting the head end chamber to the rod end chamber, a first control valve having a first open position, a second open position for fluidly connecting the regeneration valve to the return tank and substantially fluidly the rod end chamber from the fluid source, and a closed position, and a second control disconnecting valve having a first open position, a second open position, and a closed position for substantially fluidly disconnecting the rod end chamber from the fluid source.Type: ApplicationFiled: August 29, 2013Publication date: March 5, 2015Applicant: Caterpillar Global Mining LLCInventors: Christopher A. Williamson, Michael Chiaramonte, Sean Johnson, Justin Ayers, Robert Stone, Brett J. Janson
-
Patent number: 8925051Abstract: A web application security scanner (WASS) includes a login manager configured to perform an automated login to a web site. The automated login may be performed when the login manager detects that a login session has ended. The login manager is configured to determine credentials for the web site to allow the WASS to access the web site. The WASS may then use the credentials to continue scanning the web site. Thus, previously unscannable web pages may be accessed in the web site because of the automated login process.Type: GrantFiled: November 20, 2012Date of Patent: December 30, 2014Assignee: WhiteHat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Publication number: 20140371523Abstract: A power management system provides wireless power to operate components of a remotely adjustable gastric banding system. The power management system comprises an external power component transmitting power, and an implantable power management component receiving power and converting the power for use in powering one or more components of the remotely adjustable gastric banding system, such as a pump. The internal power management component and the external power component may be tunable. By utilizing the power management system, implantable batteries may be eliminated.Type: ApplicationFiled: June 24, 2014Publication date: December 18, 2014Applicant: APOLLO ENDOSURGERY, INC.Inventors: Sean Snow, Janel A. Birk, Robert Stone
-
Patent number: 8893282Abstract: An improved method and apparatus for client-side application analysis is provided. Client-side application analysis involves determining and testing, using client-side application interfaces and the like, data input points and analyzing client requests and server responses. A security vulnerability analyzer can be employed to analyze content for client-side application files, such as Flash files and Java applets, extract addresses and data parameters embedded in the client-side application file, and modify the data parameters according to user-defined test criteria. The modified data parameters are transmitted as part of a request to a respective server used to service requests from the client-side application files. The security vulnerability analyzer analyzes the response from the server to ascertain if there are any security vulnerabilities associated with the interface between the client-side application file and the server.Type: GrantFiled: August 27, 2012Date of Patent: November 18, 2014Assignee: WhiteHat Security, Inc.Inventors: Bill Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 8863280Abstract: A method of testing a web application, wherein a web application is a program that operates on a server and interacts with clients that access the program over a network, wherein further the web application accepts parameters that define results generated from the web application, the method comprising determining which web application uniform resource identifiers (URIs) are used to access various web applications on a system, determining if more than a threshold of the URIs are for a common web application, selecting a subset of less than all of the URIs for the common web application when the threshold is exceeded for that common web application, wherein the subset is selected at least in part independently of the order generated and performing a security scan on the selected subset.Type: GrantFiled: January 2, 2013Date of Patent: October 14, 2014Assignee: Whitehat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Publication number: 20140301032Abstract: A reduced length memory card is provided. The memory card, comprising a memory circuit, a housing for said memory circuit, said housing defining a first end, a second end opposite the first end and insertable into a port of a digital device, and opposing sidewalls between the first end and the second end, and a plurality of electrical contacts in electrical communication with said memory circuit, said contacts exposed through apertures formed in a bottom surface of the housing extending between the first end and the second end, wherein the memory card is electrically compatible with a Secure Digital (SD) standard, and wherein a length of the card extending between the first end and the second end is less than a width of the card extending between the opposing sidewalls. The memory could comprise an extraction ridge along the first end of the card and exposed when the card is inserted into the port of the digital device.Type: ApplicationFiled: April 4, 2014Publication date: October 9, 2014Applicant: PNY Technologies, Inc.Inventors: Robert Stone, Joseph Pluchino
-
Patent number: 8789187Abstract: An apparatus and method of managing vulnerability testing of a web application is provided for running a set of one or more scripted tests against a web application, recording results of the one or more scripted tests, providing an interface for a human evaluator to review the recorded results, and accepting from the human evaluator custom test parameters based on observations of the recorded results, wherein custom test parameters include at least one context usable by a future tester in deciding whether to run the custom test, and also includes at least one instruction for automatically running custom test steps of the custom test.Type: GrantFiled: September 28, 2007Date of Patent: July 22, 2014Assignee: Whitehat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 8764624Abstract: A power management system provides wireless power to operate components of a remotely adjustable gastric banding system. The power management system comprises an external power component transmitting power, and an implantable power management component receiving power and converting the power for use in powering one or more components of the remotely adjustable gastric banding system, such as a pump. The internal power management component and the external power component may be tunable. By utilizing the power management system, implantable batteries may be eliminated.Type: GrantFiled: February 25, 2010Date of Patent: July 1, 2014Assignee: Apollo Endosurgery, Inc.Inventors: Sean Snow, Janel A. Birk, Robert Stone
-
Patent number: 8621639Abstract: A system provides for fuzzy classification in comparisons of scanner responses. A web application test suite performs tests against a web application by sending client requests from a testing computer to the server running the web application and checking how the web application responds. A thorough web application security scan might involve thousands of checks and responses. As a result, some sort of programmatic analysis is needed. One such evaluation involves comparing one response against another. Response matching that compares two HTTP responses might use fuzzy classification processes.Type: GrantFiled: November 30, 2011Date of Patent: December 31, 2013Assignee: WhiteHat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 8401632Abstract: The present invention involves a system and methods for performing neurophysiologic assessments including, but not necessarily limited to, pedicle integrity assessments, neuromuscular pathway assessments, nerve proximity assessments, and spinal cord assessments, and methods for filtering EMG signal data to reject noise.Type: GrantFiled: November 27, 2009Date of Patent: March 19, 2013Assignee: NuVasive, Inc.Inventors: Robert Stone, Allen Farquhar
-
Publication number: 20130055403Abstract: An improved method and apparatus for client-side web application analysis is provided. Client-side web application analysis involves determining and testing, using client-side application interfaces and the like, data input points and analyzing client requests and server responses. In one embodiment, a security vulnerability analyzer is employed to analyze web page content for client-side application files, such as Flash files and Java applets, extract web addresses and data parameters embedded in the client-side application file, and modify the data parameters according to user-defined test criteria. The modified data parameters are transmitted as part of a request to a respective web server used to service the client-side application files. The security vulnerability analyzer analyzes the response from the server to ascertain if there are any security vulnerabilities associated with the interface between the client-side application file and the web server.Type: ApplicationFiled: August 27, 2012Publication date: February 28, 2013Applicant: WhiteHat Security, Inc.Inventors: Bill Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 8370929Abstract: A method of testing a web application, wherein a web application is a program that operates on a server and interacts with clients that access the program over a network, wherein further the web application accepts parameters that define results generated from the web application, the method comprising determining which web application uniform resource identifiers (URIs) are used to access various web applications on a system, determining if more than a threshold of the URIs are for a common web application, selecting a subset of less than all of the URIs for the common web application when the threshold is exceeded for that common web application, wherein the subset is selected at least in part independently of the order generated and performing a security scan on the selected subset.Type: GrantFiled: September 28, 2007Date of Patent: February 5, 2013Assignee: WhiteHat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Publication number: 20130014396Abstract: A razor blade including a substrate with a coating joined to the substrate defining a coated blade. The coated blade including a cutting edge being defined by a blade tip having a tip radius of from 50 to 350 angstroms. The coated blade having a pair of first facets extending from the blade tip and a pair of second facets extending from the respective first facets, a facet angle from 90° to 135°, a facet width from 0.38 micrometers to 0.65 micrometers a wedge angle from 5° to 30°, and a thickness of between 0.8 and 1.5 micrometers measured at a distance of 1 micrometer from the blade tip.Type: ApplicationFiled: March 14, 2012Publication date: January 17, 2013Inventors: Kenneth James Skrobis, Jeffrey Stuart Parker, Bin Shen, Matthew Robert Stone, John Joseph Nisby, Jason Scott Slattery, Yongqing Ju
-
Patent number: 8341711Abstract: A web application security scanner (WASS) includes a login manager configured to perform an automated login to a web site. The automated login may be performed when the login manager detects that a login session has ended. The login manager is configured to determine credentials for the web site to allow the WASS to access the web site. The WASS may then use the credentials to continue scanning the web site. Thus, previously unscannable web pages may be accessed in the web site because of the automated login process.Type: GrantFiled: November 7, 2008Date of Patent: December 25, 2012Assignee: Whitehat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 8294292Abstract: An irrigation power system is provided for use with a conventional irrigation conduit having water flow therethrough as a source of hydro energy. In order to convert the hydro energy of the water flow to electrical energy, a power generation module is provided along the irrigation conduit. The electrical energy provided by the power generation module is then provided to a power conditioner to alter the electrical energy to produce a predetermined current. The predetermined current is then sent to a storage device for later use. An irrigation system component then communicates with the storage device to receive electrical power for selective operation of the component.Type: GrantFiled: April 22, 2009Date of Patent: October 23, 2012Assignee: Rain Bird CorporationInventors: Kevin M. Irwin, Carlos Antonio Lopez Abundis, David Addai-Gyansa, JeanPaul Vitali Bell, Jonathan Heitzinger, Juan Carlos Lopez, Scott A. McLeod, John Stuart Saenz, Christopher J. Sandy, Dustin Robert Stone, Brett J. Wham
-
Patent number: 8281401Abstract: An improved method and apparatus for client-side web application analysis is provided. Client-side web application analysis involves determining and testing, using client-side application interfaces and the like, data input points and analyzing client requests and server responses. A security vulnerability analyzer can analyze web page content for client-side application files, such as Flash files and Java applets, extract web addresses and data parameters embedded in the client-side application file, and modify the data parameters according to user-defined test criteria. The modified data parameters are transmitted as part of a request to a respective web server used to service the client-side application files. The security vulnerability analyzer analyzes the response from the server to ascertain if there are any security vulnerabilities associated with the interface between the client-side application file and the web server.Type: GrantFiled: January 24, 2006Date of Patent: October 2, 2012Assignee: Whitehat Security, Inc.Inventors: Bill Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Publication number: 20120124087Abstract: A system is provided that polls one or more caching nameservers and compares their results to a trusted or standard set of data. The set of data may be, for example, stored in a computer system or distributed among several computer systems. In one aspect, the system comprises a discrepancy detector that detects discrepancies between one or more copies of mapping information. Mapping information may be, for example, mapping stored on a Domain Name System (DNS).Type: ApplicationFiled: August 11, 2011Publication date: May 17, 2012Applicant: Arbor NetworksInventors: Gerald R. Malan, Robert Stone
-
Patent number: D734756Type: GrantFiled: April 4, 2014Date of Patent: July 21, 2015Assignee: PNY Technologies, Inc.Inventors: Robert Stone, Joseph Pluchino