Patents by Inventor Sam Ng
Sam Ng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11928204Abstract: A TEE system that includes a first platform that runs a first TEE, a second platform that runs a second TEE, and a merging unit that is adapted to merge a first output from the first TEE of the first platform, with a second output from the second TEE of the second platform, so as to form an output of the TEE system. The first TEE and the second TEE are based on different implementations. In this way, the security of the system is improved, as a malicious actor even be able to access âtâ machines, still would not be able to retrieve the secret unless there are multiple exploitable TEE vulnerabilities on all executing TEE platforms at the same time.Type: GrantFiled: December 13, 2021Date of Patent: March 12, 2024Assignee: Foris Technology Pte LtdInventors: Kian Chuan Yap, Ming Sum Sam Ng, Jason Wai King Lau, Chun Ting Yip, Tung Ling Terry Young, Durgesh Pandey
-
Publication number: 20240038333Abstract: The presently described techniques relate generally to configuration and use of a software platform that provides tools for users to store, arrange, and visualize genetic data, such as may be derived from a nucleic acid sequencing device. In addition, such a software platform may include one or more tools that allow a user to annotate genetic data with information available from external and/or internal genetic databases and to create custom reports based on such information. In practice, the software platform may be generic with respect to the sequencing device generating the sequence data, one or more upstream analytic packages, such as may perform variant identification or calling, and one or more external or internal data stores (e.g., knowledge bases or databases) used to access information about the sequence and/or variants identified therein.Type: ApplicationFiled: July 24, 2023Publication date: February 1, 2024Inventors: Sam Ng, Dylan Barfield, Jing Gao, Kevin P. Rhodes, Sachin Parikh, Akshay Kotadia, Kim Pelak
-
Patent number: 11831753Abstract: A distributed key management system, which contains a server, a plurality of key-holding devices adapted to communicate with the server; and a key-requesting device adapted to communicate with the server. Each one of the plurality of key-holding devices is adapted to hold a different fragment of a private key. The server is adapted to reconstruct the private key based on the fragments received from the plurality of key-holding devices. The key-requesting device is adapted to obtain the private key from the server. The systems according to the invention provide a zero-trust model key management scheme and would eliminate the risk of key leakage to unauthorized person while providing flexibility of authorizing devices.Type: GrantFiled: December 3, 2019Date of Patent: November 28, 2023Assignee: Foris LimitedInventors: Ming Sum Sam Ng, Matthew David Chan, Wai King Jason Lau, Siu Kei Thomas Kung
-
Patent number: 11695793Abstract: A method includes: identifying, by a runtime instrumentation agent of a web server, a plurality of attack surfaces of a web application executed on the web server; generating, by the runtime instrumentation agent, a plurality of hash values, where each hash value is generated based on one of the plurality of attack surfaces; and transmitting, by the runtime instrumentation agent, the plurality of hash values to an attack server external to the web server, where the attack server is to determine whether to scan each attack surface based on the plurality of hash values.Type: GrantFiled: October 31, 2017Date of Patent: July 4, 2023Assignee: MICRO FOCUS LLCInventors: Ming Sum Sam Ng, Sasi Siddharth Muthurajan, Nidhi Govindram Kejriwal, Gerald E. Sullivan, II, Alexander Hoole
-
Patent number: 11449638Abstract: Examples herein disclose via use of a physical processor, detecting a specific application programming interface (API) call to interact with an application running on a production server. Based on the detection of the specific API call, die examples assist, using the physical processor, a scanning session based on the specific API call Using the physical processor, the examples identify a modification to the application based on the scanning session.Type: GrantFiled: March 18, 2016Date of Patent: September 20, 2022Assignee: MICRO FOCUS LLCInventors: Ming Sum Sam Ng, Sasi Siddharth Muthurajan, Barak Raz
-
Publication number: 20220188404Abstract: A TEE system that includes a first platform that runs a first TEE, a second platform that runs a second TEE, and a merging unit that is adapted to merge a first output from the first TEE of the first platform, with a second output from the second TEE of the second platform, so as to form an output of the TEE system. The first TEE and the second TEE are based on different implementations. In this way, the security of the system is improved, as a malicious actor even be able to access âtâ machines, still would not be able to retrieve the secret unless there are multiple exploitable TEE vulnerabilities on all executing TEE platforms at the same time.Type: ApplicationFiled: December 13, 2021Publication date: June 16, 2022Inventors: Kian Chuan YAP, Ming Sum Sam NG, Jason Wai King LAU, Chun Ting YIP, Tung Ling Terry YOUNG, Durgesh PANDEY
-
Publication number: 20210350368Abstract: A method for preventing blockchain intrusion includes the steps of detecting a transaction broadcasted to a blockchain network, determining if the transaction is authorized or unauthorized, and taking a prevention action if the transaction is unauthorized. The proposed system and method are not only adapted to detect unauthorized transactions but they can also cancel unauthorized transactions if the system prepare some data/arrangements in advance.Type: ApplicationFiled: April 21, 2021Publication date: November 11, 2021Inventors: Tung Ling Terry YOUNG, Matthew David CHAN, Jason Wai King LAU, Ming Sum Sam NG, King Yin TAM
-
Patent number: 11055416Abstract: In some examples, a method may include detecting a vulnerability in an application during execution on a first computing device. The method may include triggering a breakpoint based on the detecting, thereby pausing the execution of the application before execution of a portion of code that exploits the vulnerability. The method may include communicating a message indicating occurrence of the breakpoint. The method may include receiving a connection request from a second computing device in response to the message. The method may include resuming execution of the application from the breakpoint subject to a signal from the second computing device.Type: GrantFiled: October 24, 2017Date of Patent: July 6, 2021Assignee: Micro Focus LLCInventors: Alexander Michael Hoole, Ming Sum Sam Ng
-
Patent number: 11057395Abstract: Information stored in a Hypertext Transfer Protocol (HTTP) session is monitored. Based on the monitoring, authentication information in the information stored in the HTTP session is identified.Type: GrantFiled: March 24, 2014Date of Patent: July 6, 2021Assignee: Micro Focus LLCInventors: Ming Sum Sam Ng, Ronald Joseph Sechman, Matias Madou
-
Patent number: 11044266Abstract: In some examples, a system includes a scan execution engine and a scan adaptation engine. The scan execution engine may execute a scan of a web application hosted on a web host. During scan execution, the scan adaptation engine may adapt a subsequent scan portion for later execution based on a scan metric received from a monitoring agent that monitors the web application, the web host, or both.Type: GrantFiled: February 26, 2016Date of Patent: June 22, 2021Assignee: Micro Focus LLCInventors: Sasi Siddharth Muthurajan, Ming Sum Sam Ng, Jeremy C. Brooks
-
Publication number: 20210028931Abstract: A distributed key management system, which contains a server, a plurality of key-holding devices adapted to communicate with the server; and a key-requesting device adapted to communicate with the server. Each one of the plurality of key-holding devices is adapted to hold a different fragment of a private key. The server is adapted to reconstruct the private key based on the fragments received from the plurality of key-holding devices. The key-requesting device is adapted to obtain the private key from the server. The systems according to the invention provide a zero-trust model key management scheme and would eliminate the risk of key leakage to unauthorized person while providing flexibility of authorizing devices.Type: ApplicationFiled: December 3, 2019Publication date: January 28, 2021Inventors: Ming Sum Sam NG, Matthew David CHAN, Wai King Jason LAU, Siu Kei Thomas KUNG
-
Patent number: 10810213Abstract: The present invention relates to methods, systems and apparatus for capturing, integrating, organizing, navigating and querying large-scale data from high-throughput biological and chemical assay platforms. It provides a highly efficient meta-analysis infrastructure for performing research queries across a large number of studies and experiments from different biological and chemical assays, data types and organisms, as well as systems to build and add to such an infrastructure. According to various embodiments, methods, systems and interfaces for identifying genes that are potentially associated with a biological, chemical or medical concept of interest.Type: GrantFiled: October 2, 2017Date of Patent: October 20, 2020Assignee: Illumina, Inc.Inventors: Marc Jung, Sam Ng, Joseph R. Delaney
-
Publication number: 20200293673Abstract: Examples herein disclose via use of a physical processor, detecting a specific application programming interface (API) call to interact with an application running on a production server. Based on the detection of the specific API call, die examples assist, using the physical processor, a scanning session based on the specific API call Using the physical processor, the examples identify a modification to the application based on the scanning session.Type: ApplicationFiled: March 18, 2016Publication date: September 17, 2020Inventors: Ming Sum Sam Ng, Sasi Siddharth Muthurajan, Barak Raz
-
Patent number: 10678910Abstract: Examples disclosed herein relate to modifying a web page. In one example, in response to beginning execution of a process initiating generation of a web page of a web application at a server, a runtime agent is executed. In this example, the runtime agent modifies code of the web page to inject code to protect output of the web page. In the example, the process can be executed using the modified code to generate a modified web page.Type: GrantFiled: April 10, 2015Date of Patent: June 9, 2020Assignee: Micro Focus LLCInventors: Ming Sum Sam Ng, Alvaro Munoz, Oleksandr Mirosh
-
Patent number: 10587641Abstract: Example embodiments disclosed herein relate to generating a point-wise protection based on dynamic security analysis. Vulnerability solution recommendation are provided based on the dynamic security analysis. A point-wise protection is generated based on a selection of the vulnerability solution recommendation.Type: GrantFiled: May 20, 2014Date of Patent: March 10, 2020Assignee: MICRO FOCUS LLCInventors: Matias Madou, Ronald Joseph Sechman, Sam Ng Ming Sum
-
Patent number: 10581878Abstract: A method for attack detection includes: intercepting, by a runtime security agent, a request for a web resource; determining whether the intercepted request was triggered from an external website; determining whether the intercepted request was triggered from a current session; determining whether the intercepted request is requesting a static file type; and in response to a determination that the intercepted request was triggered from an external website and was not triggered from a current session, or a determination that the intercepted request was triggered from an external website and is not requesting a static file type, providing, by the runtime security agent, an indication of a potential attack.Type: GrantFiled: June 8, 2017Date of Patent: March 3, 2020Assignee: Micro Focus LLCInventors: Ming Sum Sam Ng, Oleksandr Mirosh, Alvaro Munoz Sanchez
-
Patent number: 10515220Abstract: Example embodiments disclosed herein relate to determining a secure activity of an application under test (AUT). Execution of an application under test is monitored. During an attack vector, an application programming interface associated with a secure activity is determined. A message is sent to a security test that secure activity occurred.Type: GrantFiled: September 25, 2014Date of Patent: December 24, 2019Assignee: MICRO FOCUS LLCInventors: Sam Ng, Ronald J. Sechman, Matias Madou
-
Publication number: 20190371430Abstract: Systems and methods are provided for identifying genes with outlier expression across multiple samples, including: at least one processor; and at least one non-transitory computer readable medium containing instructions that, when executed by the at least one processor, cause the at least one processor to perform operations including: receiving gene expression data of a plurality of samples, the samples comprising gene expression values corresponding to genes; standardizing the gene expression data using the median and median absolute deviation of each gene; determining a value of a distribution statistic for the standardized gene expression observations based on a probability of outlier gene expression data; determining a null distribution of the distribution statistic using the standardized gene expression data; and outputting a significance value of the genes across the multiple samples, the significance value based on the value of the distribution statistic and the null distribution.Type: ApplicationFiled: November 2, 2017Publication date: December 5, 2019Inventors: Sam NG, Hong GAO, Hendrikus Jaspar GIERMAN
-
Patent number: 10423793Abstract: Example embodiments disclosed herein relate to an approach for installing a runtime agent during a security test. A security test is initiated or performed on an application under test executing on a server. An application vulnerability associated with the application under test is determined. The application vulnerability is exploited to install the runtime agent on the server. The security test is continued using the runtime agent to receive additional information about the application under test.Type: GrantFiled: June 19, 2014Date of Patent: September 24, 2019Assignee: ENTIT SOFTWARE LLCInventors: Matias Madou, Ronald J. Sechman, Sam Ng Ming Sum
-
Publication number: 20190132348Abstract: A method includes: identifying, by a runtime instrumentation agent of a web server, a plurality of attack surfaces of a web application executed on the web server; generating, by the runtime instrumentation agent, a plurality of hash values, where each hash value is generated based on one of the plurality of attack surfaces; and transmitting, by the runtime instrumentation agent, the plurality of hash values to an attack server external to the web server, where the attack server is to determine whether to scan each attack surface based on the plurality of hash values.Type: ApplicationFiled: October 31, 2017Publication date: May 2, 2019Inventors: Ming Sum Sam Ng, Sasi Siddharth Muthurajan, Nidhi Govindram Kejriwal, Gerald E. Sullivan, II, Alexander Hoole