Patents by Inventor Sean Fay
Sean Fay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11513853Abstract: Methods, systems, and other embodiments for protecting a shared resource in a data processing system are described herein. In one embodiment, when responding to a request that requires use of the shared resource, determine whether a previously established sleep period for the shared resource has expired. If so, determine a health status of the shared resource based on one or more of applying an asymptotic transform to a percentage of time that a processing unit is idle and applying a linear transform to a session count for the shared resource. Then, determine whether the health status is sufficient to permit responding to the request; and if not, (i) determining an appropriate sleep period for the shared resource, (ii) initiating a sleep state for the shared resource for a period substantially equal to the determined appropriate sleep period; and (iii) exiting the sleep state and responding to the request.Type: GrantFiled: November 22, 2019Date of Patent: November 29, 2022Assignee: Netsuite Inc.Inventors: John Cherniavsky, Sean Fay, Xi (Scott) Liu, Theodore Ray Rice
-
Publication number: 20200089538Abstract: Methods, systems, and other embodiments for protecting a shared resource in a data processing system are described herein. In one embodiment, when responding to a request that requires use of the shared resource, determine whether a previously established sleep period for the shared resource has expired. If so, determine a health status of the shared resource based on one or more of applying an asymptotic transform to a percentage of time that a processing unit is idle and applying a linear transform to a session count for the shared resource. Then, determine whether the health status is sufficient to permit responding to the request; and if not, (i) determining an appropriate sleep period for the shared resource, (ii) initiating a sleep state for the shared resource for a period substantially equal to the determined appropriate sleep period; and (iii) exiting the sleep state and responding to the request.Type: ApplicationFiled: November 22, 2019Publication date: March 19, 2020Inventors: John CHERNIAVSKY, Sean FAY, Xi (Scott) LIU, Theodore Ray RICE
-
Patent number: 10489202Abstract: Systems, apparatuses, and methods for preventing the use of a shared resource (such as a database) by a user or group of users from causing other users to experience unsatisfactory or unreliable access to that resource or to related, impacted resources (such as a communications network or processor). In some embodiments, the invention is directed to systems, apparatuses, and methods that may be implemented in a multi-tenant system in order to prevent a single user or the users associated with an account from degrading the system performance experienced by other users, either by intentional or inadvertant misuse of a shared database, and to prevent an overload condition from causing the system or database to fail abruptly.Type: GrantFiled: November 18, 2015Date of Patent: November 26, 2019Assignee: NETSUITE INC.Inventors: John Cherniavsky, Sean Fay, Xi (Scott) Liu, Theodore Ray Rice
-
Publication number: 20170235606Abstract: Systems, apparatuses, and methods for preventing the use of a shared resource (such as a database) by a user or group of users from causing other users to experience unsatisfactory or unreliable access to that resource or to related, impacted resources (such as a communications network or processor). In some embodiments, the invention is directed to systems, apparatuses, and methods that may be implemented in a multi-tenant system in order to prevent a single user or the users associated with an account from degrading the system performance experienced by other users, either by intentional or inadvertant misuse of a shared database, and to prevent an overload condition from causing the system or database to fail abruptly.Type: ApplicationFiled: November 18, 2015Publication date: August 17, 2017Inventors: John Cherniavsky, Sean Fay, Xi (Scott) Liu, Theodore Ray Rice
-
Patent number: 9491164Abstract: A method is disclosed for migrating a client domain involving identifying a user account entry in a client domain's password table, where the entry includes a user identifier and a first hashed password value, where the first hashed password value is derived from hashing a user password with a client domain hash algorithm. The first hashed password value is re-hashed using a multi-tenant system hash algorithm to obtain a second hashed password value. Another user account entry is created and stored in a multi-tenant system password table along with the second hashed password value and metadata from which the client domain hash algorithm can be determined.Type: GrantFiled: August 20, 2014Date of Patent: November 8, 2016Assignee: NetSuite Inc.Inventors: Sean Fay, Brian Chess
-
Patent number: 9400889Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.Type: GrantFiled: April 9, 2007Date of Patent: July 26, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
-
Patent number: 8527975Abstract: A computer readable storage medium includes executable instructions to identify a memory operation in target source code. A set of constraints associated with the memory operation are developed. The constraints are converted into a Boolean expression. The Boolean expression is processed with a Boolean satisfiability engine to determine whether the memory operation is potentially unsafe.Type: GrantFiled: November 2, 2007Date of Patent: September 3, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Brian Chess, Sean Fay, Ayee Kannan Goundan
-
Patent number: 8209646Abstract: A computer readable storage medium includes executable instructions to identify a path in target source code. Constraints associated with the path are extracted. The constraints are converted to a Boolean expression. The Boolean expression is processed with a Boolean satisfiability engine to identify either a feasible path or an infeasible path. A feasible path is statically analyzed, while an infeasible path is not statically analyzed.Type: GrantFiled: November 2, 2007Date of Patent: June 26, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Brian Chess, Sean Fay, Ayee Kannan Goundan
-
Patent number: 7975306Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions perform a security audit of program instructions. Based upon the security audit, sensors are inserted into the program instructions. The program instructions are executable and the sensors generate a stream of security events. The stream of security events is monitored and security performance results are reported.Type: GrantFiled: December 10, 2004Date of Patent: July 5, 2011Assignee: Hewlett-Packard Development Company, L.P.Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
-
Publication number: 20090119624Abstract: A computer readable storage medium includes executable instructions to identify a path in target source code. Constraints associated with the path are extracted. The constraints are converted to a Boolean expression. The Boolean expression is processed with a Boolean satisfiability engine to identify either a feasible path or an infeasible path. A feasible path is statically analyzed, while an infeasible path is not statically analyzed.Type: ApplicationFiled: November 2, 2007Publication date: May 7, 2009Applicant: Fortify Software, Inc.Inventors: Brian CHESS, Sean Fay, Ayee Kannan Goundan
-
Publication number: 20090119648Abstract: A computer readable storage medium includes executable instructions to identify a memory operation in target source code. A set of constraints associated with the memory operation are developed. The constraints are converted into a Boolean expression. The Boolean expression is processed with a Boolean satisfiability engine to determine whether the memory operation is potentially unsafe.Type: ApplicationFiled: November 2, 2007Publication date: May 7, 2009Applicant: Fortify Software, Inc.Inventors: Brian Chess, Sean Fay, Ayee Kannan Goundan
-
Publication number: 20070240138Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.Type: ApplicationFiled: April 9, 2007Publication date: October 11, 2007Applicant: FORTIFY SOFTWARE, INC.Inventors: Brian CHESS, Arthur DO, Sean FAY, Roger THORNTON
-
Patent number: 7207065Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.Type: GrantFiled: December 10, 2004Date of Patent: April 17, 2007Assignee: Fortify Software, Inc.Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
-
Publication number: 20050273854Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.Type: ApplicationFiled: December 10, 2004Publication date: December 8, 2005Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
-
Publication number: 20050273860Abstract: A method of analyzing program instructions for security vulnerabilities includes applying a static analysis to program instructions during a development phase of the program instructions to identify security vulnerabilities. The security vulnerabilities are used to apply a security test to the program instructions during a testing phase of the program instructions. The security vulnerabilities are analyzed to develop security monitoring criteria to apply to the program instructions during a deployment phase of the program instructions.Type: ApplicationFiled: December 10, 2004Publication date: December 8, 2005Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
-
Publication number: 20050273859Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. Executable instructions identify potential security vulnerabilities within program instructions based upon input from an attack database and information derived during a static analysis of the program instructions. Vulnerability tests are applied to the program instructions in view of the security vulnerabilities. Performance results from the vulnerability tests are analyzed. The performance results are then reported.Type: ApplicationFiled: December 10, 2004Publication date: December 8, 2005Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
-
Publication number: 20050273861Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions perform a security audit of program instructions. Based upon the security audit, sensors are inserted into the program instructions. The program instructions are executable and the sensors generate a stream of security events. The stream of security events is monitored and security performance results are reported.Type: ApplicationFiled: December 10, 2004Publication date: December 8, 2005Inventors: Brian Chess, Arthur Do, Sean Fay, Roger Thornton
-
Publication number: 20040145608Abstract: Under the present invention, a user interface for conducting chats over a network is provided. The user interface includes a list tab for revealing a list of receiving chat partners and a status of each of the receiving chat partners, a status tab for selecting a status of a sending chat partner, and a chat tab for revealing information pertaining to a set of active chats between the sending chat partner and the receiving chat partners.Type: ApplicationFiled: January 24, 2003Publication date: July 29, 2004Applicant: International Business Machines CorporationInventors: Sean Fay, Glen E. Salmon, Dan J. Smith, Lynn L. Wu