Patents by Inventor Robert Chifamba
Robert Chifamba has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11734433Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application. An application, that uses code libraries, and information regarding known library vulnerabilities are received, then it is determined if one or more libraries in the application are vulnerable based upon the information. For each of the one or more vulnerable libraries, a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If an application test score on the test application is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each of the one or more vulnerable libraries.Type: GrantFiled: March 30, 2022Date of Patent: August 22, 2023Assignee: Visa International Service AssociationInventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu
-
Publication number: 20220222353Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application are disclosed. An application that uses code libraries and information regarding known library vulnerabilities is received, then it can be determined if one or more libraries in the application is vulnerable based upon the information. For each of the one or more vulnerable libraries a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If the application test is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each vulnerable library.Type: ApplicationFiled: March 30, 2022Publication date: July 14, 2022Inventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu
-
Publication number: 20220217144Abstract: Provided are computer-implemented methods that may include receiving, via a communication network, a request to perform an online action from a user device; retrieving data associated with a number of times the user device performed the online action within at least one time interval; determining whether a dataset associated with a number of times a plurality of user devices have performed the online action within the at least one time interval is normally distributed; and determining a standard deviation associated with the number of times the user device performed the online action within the at least one time interval in response to determining that the dataset is normally distributed, and performing a control operation associated with the request to conduct the online action based on a threshold of standard deviation. Systems and computer program products are also provided.Type: ApplicationFiled: March 25, 2022Publication date: July 7, 2022Inventors: Robert Chifamba, Krishnaram Muthusamy
-
Publication number: 20220141658Abstract: Authentication of an Internet-of-Things (IoT) device comprises receiving, by a proxy application executing on a mobile device during a registration process, a device identifier associated with the IoT device. The proxy application transmits the device identifier to a router of the wireless network. The proxy application receives the device identifier from the router in response to the router receiving an authorization request with no network password from the IoT device for access to the wireless network, where the router forwards the device identifier to the proxy application. The proxy application prompts the user of the mobile device to enter the password, and transmits the entered network password to the router, such that the router validates the password and grants the IoT device access to the wireless network, the IoT device transmits the IoT device identifier to the router for subsequent network connection without a need for the mobile device.Type: ApplicationFiled: November 5, 2020Publication date: May 5, 2022Applicant: Visa International Service AssociationInventors: Krishnaram MUTHUSAMY, Robert CHIFAMBA
-
Patent number: 11308218Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application. An application that uses code libraries and information regarding known library vulnerabilities are received, then it identifies one or more libraries in the application that are vulnerable based upon the information. For each of the one or more vulnerable libraries, a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If an application test score on the test application is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each of the one or more vulnerable libraries.Type: GrantFiled: December 20, 2018Date of Patent: April 19, 2022Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu
-
Patent number: 11303637Abstract: Provided are computer-implemented methods that may include receiving, via a communication network, a request to perform an online action from a user device; retrieving data associated with a number of times the user device performed the online action within at least one time interval; determining whether a dataset associated with a number of times a plurality of user devices have performed the online action within the at least one time interval is normally distributed; and determining a standard deviation associated with the number of times the user device performed the online action within the at least one time interval in response to determining that the dataset is normally distributed, and performing a control operation associated with the request to conduct the online action based on a threshold of standard deviation. Systems and computer program products are also provided.Type: GrantFiled: February 4, 2020Date of Patent: April 12, 2022Assignee: Visa International Service AssociationInventors: Robert Chifamba, Krishnaram Muthusamy
-
Publication number: 20210243189Abstract: Provided are computer-implemented methods that may include receiving, via a communication network, a request to perform an online action from a user device; retrieving data associated with a number of times the user device performed the online action within at least one time interval; determining whether a dataset associated with a number of times a plurality of user devices have performed the online action within the at least one time interval is normally distributed; and determining a standard deviation associated with the number of times the user device performed the online action within the at least one time interval in response to determining that the dataset is normally distributed, and performing a control operation associated with the request to conduct the online action based on a threshold of standard deviation. Systems and computer program products are also provided.Type: ApplicationFiled: February 4, 2020Publication date: August 5, 2021Inventors: Robert Chifamba, Krishnaram Muthusamy
-
Publication number: 20200202007Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application are disclosed. The method includes receiving an application that uses code libraries and information regarding known library vulnerabilities, then determining if one or more libraries in the application is vulnerable based upon the information. For each of the one or more vulnerable libraries a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If the application test is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each vulnerable library.Type: ApplicationFiled: December 20, 2018Publication date: June 25, 2020Inventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu