Patents by Inventor Sean Fay

Sean Fay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11513853
    Abstract: Methods, systems, and other embodiments for protecting a shared resource in a data processing system are described herein. In one embodiment, when responding to a request that requires use of the shared resource, determine whether a previously established sleep period for the shared resource has expired. If so, determine a health status of the shared resource based on one or more of applying an asymptotic transform to a percentage of time that a processing unit is idle and applying a linear transform to a session count for the shared resource. Then, determine whether the health status is sufficient to permit responding to the request; and if not, (i) determining an appropriate sleep period for the shared resource, (ii) initiating a sleep state for the shared resource for a period substantially equal to the determined appropriate sleep period; and (iii) exiting the sleep state and responding to the request.
    Type: Grant
    Filed: November 22, 2019
    Date of Patent: November 29, 2022
    Assignee: Netsuite Inc.
    Inventors: John Cherniavsky, Sean Fay, Xi (Scott) Liu, Theodore Ray Rice
  • Publication number: 20200089538
    Abstract: Methods, systems, and other embodiments for protecting a shared resource in a data processing system are described herein. In one embodiment, when responding to a request that requires use of the shared resource, determine whether a previously established sleep period for the shared resource has expired. If so, determine a health status of the shared resource based on one or more of applying an asymptotic transform to a percentage of time that a processing unit is idle and applying a linear transform to a session count for the shared resource. Then, determine whether the health status is sufficient to permit responding to the request; and if not, (i) determining an appropriate sleep period for the shared resource, (ii) initiating a sleep state for the shared resource for a period substantially equal to the determined appropriate sleep period; and (iii) exiting the sleep state and responding to the request.
    Type: Application
    Filed: November 22, 2019
    Publication date: March 19, 2020
    Inventors: John CHERNIAVSKY, Sean FAY, Xi (Scott) LIU, Theodore Ray RICE
  • Patent number: 10489202
    Abstract: Systems, apparatuses, and methods for preventing the use of a shared resource (such as a database) by a user or group of users from causing other users to experience unsatisfactory or unreliable access to that resource or to related, impacted resources (such as a communications network or processor). In some embodiments, the invention is directed to systems, apparatuses, and methods that may be implemented in a multi-tenant system in order to prevent a single user or the users associated with an account from degrading the system performance experienced by other users, either by intentional or inadvertant misuse of a shared database, and to prevent an overload condition from causing the system or database to fail abruptly.
    Type: Grant
    Filed: November 18, 2015
    Date of Patent: November 26, 2019
    Assignee: NETSUITE INC.
    Inventors: John Cherniavsky, Sean Fay, Xi (Scott) Liu, Theodore Ray Rice
  • Publication number: 20170235606
    Abstract: Systems, apparatuses, and methods for preventing the use of a shared resource (such as a database) by a user or group of users from causing other users to experience unsatisfactory or unreliable access to that resource or to related, impacted resources (such as a communications network or processor). In some embodiments, the invention is directed to systems, apparatuses, and methods that may be implemented in a multi-tenant system in order to prevent a single user or the users associated with an account from degrading the system performance experienced by other users, either by intentional or inadvertant misuse of a shared database, and to prevent an overload condition from causing the system or database to fail abruptly.
    Type: Application
    Filed: November 18, 2015
    Publication date: August 17, 2017
    Inventors: John Cherniavsky, Sean Fay, Xi (Scott) Liu, Theodore Ray Rice
  • Patent number: 9491164
    Abstract: A method is disclosed for migrating a client domain involving identifying a user account entry in a client domain's password table, where the entry includes a user identifier and a first hashed password value, where the first hashed password value is derived from hashing a user password with a client domain hash algorithm. The first hashed password value is re-hashed using a multi-tenant system hash algorithm to obtain a second hashed password value. Another user account entry is created and stored in a multi-tenant system password table along with the second hashed password value and metadata from which the client domain hash algorithm can be determined.
    Type: Grant
    Filed: August 20, 2014
    Date of Patent: November 8, 2016
    Assignee: NetSuite Inc.
    Inventors: Sean Fay, Brian Chess
  • Patent number: 9400889
    Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.
    Type: Grant
    Filed: April 9, 2007
    Date of Patent: July 26, 2016
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
  • Patent number: 8527975
    Abstract: A computer readable storage medium includes executable instructions to identify a memory operation in target source code. A set of constraints associated with the memory operation are developed. The constraints are converted into a Boolean expression. The Boolean expression is processed with a Boolean satisfiability engine to determine whether the memory operation is potentially unsafe.
    Type: Grant
    Filed: November 2, 2007
    Date of Patent: September 3, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Brian Chess, Sean Fay, Ayee Kannan Goundan
  • Patent number: 8209646
    Abstract: A computer readable storage medium includes executable instructions to identify a path in target source code. Constraints associated with the path are extracted. The constraints are converted to a Boolean expression. The Boolean expression is processed with a Boolean satisfiability engine to identify either a feasible path or an infeasible path. A feasible path is statically analyzed, while an infeasible path is not statically analyzed.
    Type: Grant
    Filed: November 2, 2007
    Date of Patent: June 26, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Brian Chess, Sean Fay, Ayee Kannan Goundan
  • Patent number: 7975306
    Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions perform a security audit of program instructions. Based upon the security audit, sensors are inserted into the program instructions. The program instructions are executable and the sensors generate a stream of security events. The stream of security events is monitored and security performance results are reported.
    Type: Grant
    Filed: December 10, 2004
    Date of Patent: July 5, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
  • Publication number: 20090119624
    Abstract: A computer readable storage medium includes executable instructions to identify a path in target source code. Constraints associated with the path are extracted. The constraints are converted to a Boolean expression. The Boolean expression is processed with a Boolean satisfiability engine to identify either a feasible path or an infeasible path. A feasible path is statically analyzed, while an infeasible path is not statically analyzed.
    Type: Application
    Filed: November 2, 2007
    Publication date: May 7, 2009
    Applicant: Fortify Software, Inc.
    Inventors: Brian CHESS, Sean Fay, Ayee Kannan Goundan
  • Publication number: 20090119648
    Abstract: A computer readable storage medium includes executable instructions to identify a memory operation in target source code. A set of constraints associated with the memory operation are developed. The constraints are converted into a Boolean expression. The Boolean expression is processed with a Boolean satisfiability engine to determine whether the memory operation is potentially unsafe.
    Type: Application
    Filed: November 2, 2007
    Publication date: May 7, 2009
    Applicant: Fortify Software, Inc.
    Inventors: Brian Chess, Sean Fay, Ayee Kannan Goundan
  • Publication number: 20070240138
    Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.
    Type: Application
    Filed: April 9, 2007
    Publication date: October 11, 2007
    Applicant: FORTIFY SOFTWARE, INC.
    Inventors: Brian CHESS, Arthur DO, Sean FAY, Roger THORNTON
  • Patent number: 7207065
    Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.
    Type: Grant
    Filed: December 10, 2004
    Date of Patent: April 17, 2007
    Assignee: Fortify Software, Inc.
    Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
  • Publication number: 20050273854
    Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.
    Type: Application
    Filed: December 10, 2004
    Publication date: December 8, 2005
    Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
  • Publication number: 20050273860
    Abstract: A method of analyzing program instructions for security vulnerabilities includes applying a static analysis to program instructions during a development phase of the program instructions to identify security vulnerabilities. The security vulnerabilities are used to apply a security test to the program instructions during a testing phase of the program instructions. The security vulnerabilities are analyzed to develop security monitoring criteria to apply to the program instructions during a deployment phase of the program instructions.
    Type: Application
    Filed: December 10, 2004
    Publication date: December 8, 2005
    Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
  • Publication number: 20050273859
    Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. Executable instructions identify potential security vulnerabilities within program instructions based upon input from an attack database and information derived during a static analysis of the program instructions. Vulnerability tests are applied to the program instructions in view of the security vulnerabilities. Performance results from the vulnerability tests are analyzed. The performance results are then reported.
    Type: Application
    Filed: December 10, 2004
    Publication date: December 8, 2005
    Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
  • Publication number: 20050273861
    Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions perform a security audit of program instructions. Based upon the security audit, sensors are inserted into the program instructions. The program instructions are executable and the sensors generate a stream of security events. The stream of security events is monitored and security performance results are reported.
    Type: Application
    Filed: December 10, 2004
    Publication date: December 8, 2005
    Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
  • Publication number: 20040145608
    Abstract: Under the present invention, a user interface for conducting chats over a network is provided. The user interface includes a list tab for revealing a list of receiving chat partners and a status of each of the receiving chat partners, a status tab for selecting a status of a sending chat partner, and a chat tab for revealing information pertaining to a set of active chats between the sending chat partner and the receiving chat partners.
    Type: Application
    Filed: January 24, 2003
    Publication date: July 29, 2004
    Applicant: International Business Machines Corporation
    Inventors: Sean Fay, Glen E. Salmon, Dan J. Smith, Lynn L. Wu