Patents by Inventor Stephen D. Teilhet
Stephen D. Teilhet has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10592405Abstract: Vulnerability testing of applications may include one or more of identifying a number of paths from a software application being tested, identifying a number of nodes associated with the paths, determining one or more of the paths which share one or more of the nodes, designating the paths which share the nodes as overlapping paths, and displaying the overlapping paths and the shared nodes as an interactive visualization to identify to identify optimal locations to fix one or more vulnerability findings.Type: GrantFiled: October 3, 2017Date of Patent: March 17, 2020Assignee: International Business Machines CorporationInventors: Kristofer A. Duer, John T. Peyton, Stephen D. Teilhet, Lin Tan, Jinqiu Yang
-
Patent number: 10324825Abstract: A source code processing application may process source code and realize the results of the code in a map configuration. In one example, the map may be displayed with a number of stations and pathways between the stations to illustrate associations with classes of the source code. An example method of operation may include one or more of retrieving source code comprising a class from memory, processing the source code to identify an error associated with the class, creating a map with a station linked to the error, and displaying the map on a device.Type: GrantFiled: August 14, 2018Date of Patent: June 18, 2019Assignee: International Business Machines CorporationInventors: Kristofer A. Duer, John T. Peyton, Johnathan D. Smith, Stephen D. Teilhet, Jason N. Todd, Lin Tan, Jinqiu Yang
-
Publication number: 20190102286Abstract: Vulnerability testing of applications may include one or more of identifying a number of paths from a software application being tested, identifying a number of nodes associated with the paths, determining one or more of the paths which share one or more of the nodes, designating the paths which share the nodes as overlapping paths, and displaying the overlapping paths and the shared nodes as an interactive visualization to identify to identify optimal locations to fix one or more vulnerability findings.Type: ApplicationFiled: October 3, 2017Publication date: April 4, 2019Inventors: Kristofer A. Duer, John T. Peyton, Stephen D. Teilhet, Lin Tan, Jinqiu Yang
-
Publication number: 20180357151Abstract: A source code processing application may process source code and realize the results of the code in a map configuration. In one example, the map may be displayed with a number of stations and pathways between the stations to illustrate associations with classes of the source code. An example method of operation may include one or more of retrieving source code comprising a class from memory, processing the source code to identify an error associated with the class, creating a map with a station linked to the error, and displaying the map on a device.Type: ApplicationFiled: August 14, 2018Publication date: December 13, 2018Inventors: Kristofer A. Duer, John T. Peyton, Johnathan D. Smith, Stephen D. Teilhet, Jason N. Todd, Lin Tan, Jinqiu Yang
-
Patent number: 10089215Abstract: A source code processing application may process source code and realize the results of the code in a map configuration. In one example, the map may be displayed with a number of stations and pathways between the stations to illustrate associations with classes of the source code. An example method of operation may include one or more of retrieving source code comprising a class from memory, processing the source code to identify an error associated with the class, creating a map with a station linked to the error, and displaying the map on a device.Type: GrantFiled: September 23, 2016Date of Patent: October 2, 2018Assignee: International Business Machines CorporationInventors: Kristofer A. Duer, John T. Peyton, Stephen D. Teilhet, Jason N. Todd, Lin Tan, Jinqui Yang
-
Publication number: 20180089064Abstract: A source code processing application may process source code and realize the results of the code in a map configuration. In one example, the map may be displayed with a number of stations and pathways between the stations to illustrate associations with classes of the source code. An example method of operation may include one or more of retrieving source code comprising a class from memory, processing the source code to identify an error associated with the class, creating a map with a station linked to the error, and displaying the map on a device.Type: ApplicationFiled: September 23, 2016Publication date: March 29, 2018Inventors: Kristofer A. Duer, John T. Peyton, Jonathan D. Smith, Stephen D. Teilhet, Jason N. Todd, Lin Tan, Jinqiu Yang
-
Patent number: 9749345Abstract: A computer-implemented method, computer program product, and computing system is provided for reporting security vulnerabilities. In an embodiment, a method may include receiving a set of potential security vulnerabilities associated with a program. The method may also include filtering the set of potential security vulnerabilities by eliminating one or more spurious security vulnerabilities to generate a set of likely security vulnerabilities. The method may further include consolidating the set of likely security vulnerabilities into one or more solution categories, each of the one or more solutions categories defining a solution for remedying each of the likely security vulnerabilities within the solution category.Type: GrantFiled: April 22, 2015Date of Patent: August 29, 2017Assignee: International Business Machines CorporationInventors: Kristofer A. Duer, Omer Tripp, Stephen D. Teilhet, John T. Peyton, Jr.
-
Publication number: 20160315961Abstract: A computer-implemented method, computer program product, and computing system is provided for reporting security vulnerabilities. In an embodiment, a method may include receiving a set of potential security vulnerabilities associated with a program. The method may also include filtering the set of potential security vulnerabilities by eliminating one or more spurious security vulnerabilities to generate a set of likely security vulnerabilities. The method may further include consolidating the set of likely security vulnerabilities into one or more solution categories, each of the one or more solutions categories defining a solution for remedying each of the likely security vulnerabilities within the solution category.Type: ApplicationFiled: April 22, 2015Publication date: October 27, 2016Inventors: Kristofer A. Duer, Omer Tripp, Stephen D. Teilhet, John T. Peyton, JR.
-
Patent number: 8881300Abstract: Mechanisms for evaluating downgrader code in application code with regard to a target deployment environment. Downgrader code in the application code is identified. Based on an input string, an output string that the downgrader code outputs in response to receiving the input string is identified. One or more sets of illegal string patterns are retrieved. Each of the one or more sets of illegal string patterns is associated with a corresponding deployment environment. The illegal string patterns are string patterns that a downgrader identifies in the information flow for security purposes. A determination is made as to whether the downgrader code is compatible with the target deployment environment based on the one or more sets of illegal string patterns and the output string. An output indicative of the results of the determining is generated.Type: GrantFiled: March 5, 2013Date of Patent: November 4, 2014Assignee: International Business Machines CorporationInventors: Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp
-
Patent number: 8769696Abstract: Mechanisms for evaluating downgrader code in application code with regard to a target deployment environment. Downgrader code in the application code is identified. Based on an input string, an output string that the downgrader code outputs in response to receiving the input string is identified. One or more sets of illegal string patterns are retrieved. Each of the one or more sets of illegal string patterns is associated with a corresponding deployment environment. The illegal string patterns are string patterns that a downgrader identifies in the information flow for security purposes. A determination is made as to whether the downgrader code is compatible with the target deployment environment based on the one or more sets of illegal string patterns and the output string. An output indicative of the results of the determining is generated.Type: GrantFiled: September 29, 2011Date of Patent: July 1, 2014Assignee: International Business Machines CorporationInventors: Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp
-
Patent number: 8701186Abstract: Mechanisms for evaluating downgrader code in application code with regard to one or more security guidelines are provided. Downgrader code in application code is identified, where the downgrader code is a portion of code in the application code that operates on an information flow of the application code to ensure confidentiality of information input to the downgrader code, in the output of the downgrader code. Processes of the downgrader code are evaluated against security guidelines to determine if the processes violate the security guidelines. A notification is generated in response to the evaluation indicating that the processes of the downgrader code violate the security guidelines. The notification is output to a computing device for consideration.Type: GrantFiled: March 14, 2013Date of Patent: April 15, 2014Assignee: International Business Machines CorporationInventors: Ryan J. Berg, Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp
-
Patent number: 8667584Abstract: Mechanisms for evaluating downgrader code in application code with regard to one or more security guidelines are provided. Downgrader code in application code is identified, where the downgrader code is a portion of code in the application code that operates on an information flow of the application code to ensure confidentiality of information input to the downgrader code, in the output of the downgrader code. Processes of the downgrader code are evaluated against security guidelines to determine if the processes violate the security guidelines. A notification is generated in response to the evaluation indicating that the processes of the downgrader code violate the security guidelines. The notification is output to a computing device for consideration.Type: GrantFiled: December 15, 2010Date of Patent: March 4, 2014Assignee: International Business Machines CorporationInventors: Ryan J. Berg, Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp
-
Publication number: 20130086686Abstract: Mechanisms for evaluating downgrader code in application code with regard to a target deployment environment. Downgrader code in the application code is identified. Based on an input string, an output string that the downgrader code outputs in response to receiving the input string is identified. One or more sets of illegal string patterns are retrieved. Each of the one or more sets of illegal string patterns is associated with a corresponding deployment environment. The illegal string patterns are string patterns that a downgrader identifies in the information flow for security purposes. A determination is made as to whether the downgrader code is compatible with the target deployment environment based on the one or more sets of illegal string patterns and the output string. An output indicative of the results of the determining is generated.Type: ApplicationFiled: September 29, 2011Publication date: April 4, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp
-
Publication number: 20120159619Abstract: Mechanisms for evaluating downgrader code in application code with regard to one or more security guidelines are provided. Downgrader code in application code is identified, where the downgrader code is a portion of code in the application code that operates on an information flow of the application code to ensure confidentiality of information input to the downgrader code, in the output of the downgrader code. Processes of the downgrader code are evaluated against security guidelines to determine if the processes violate the security guidelines. A notification is generated in response to the evaluation indicating that the processes of the downgrader code violate the security guidelines. The notification is output to a computing device for consideration.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ryan J. Berg, Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp