Patents by Inventor Thomas Peyton

Thomas Peyton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10586050
    Abstract: A static analysis tool is augmented to provide a mechanism by which a large set (and potentially all) security warnings output from the tool may be represented to the user in a manner that is manageable for consumption by the user. According to this disclosure, a static analysis is run on a program to generate a set of security warnings. Using dynamic programming, the set of security warnings output by the static analysis are mapped onto a collection of fix points, wherein a fix point captures a location within the program that should be visited to fix a set of warnings that map to that fix point. The fix points represent the highest probable locations of particular potential vulnerabilities in the program. They are computed in a parametric manner, preferably according to user preferences, by solving an instance of a “knapsack” problem.
    Type: Grant
    Filed: December 5, 2016
    Date of Patent: March 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Kristofer Alyn Duer, Jonathan J. Butler, John Thomas Peyton, Jr., Stephen Darwin Teilhet, Omer Tripp
  • Patent number: 10482262
    Abstract: An application analysis platform enables automatic generation of abstract program representations (APRs) that are amenable to static analyses for finding security vulnerabilities. The APR is generated automatically, preferably from an existing build system or a source repository, and then encapsulated into a binary archival format for consumption by a static analysis tool, which operates on-premises or in the cloud. The abstract program representation is a highly compact version of the actual source code it represents. The archival format obfuscates the source code that is subjected to the analysis, thus protecting it from being reverse-engineered when moved off-premises or otherwise shared with other users, teams and even organizations.
    Type: Grant
    Filed: October 9, 2017
    Date of Patent: November 19, 2019
    Assignee: International Business Machines Corporation
    Inventors: Babita Sharma, Andrew Mak, Richard Myer Goldberg, John Thomas Peyton, Jr., Jeffrey Charles Turnham, Matthew Francis Murphy, Hua Xiao
  • Patent number: 10091232
    Abstract: A new paradigm for security analysis is provided by transitioning code analysis reporting from the problem space (the warnings themselves), to a solution space (potential solutions to the identified problems). Thus, instead of reporting raw findings to the user, the automated system as described here outputs proposed solutions to eliminate the defects identified in the security analysis. A consequence of this approach is that the report generated by the analysis tool is much more consumable, and thus much more actionable. Preferably, the report provides the user with one or more candidate location(s) at which to apply a fix to an identified security problem. These locations preferably are identified by processing overlapping nodes to identify one or more solution groupings that represent an API for a sanitization fix. The report also includes one or more recommendations for the fix, and preferably the report is generated on a per-vulnerability type basis.
    Type: Grant
    Filed: August 7, 2017
    Date of Patent: October 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Stephen Darwin Teilhet, Kristofer Alyn Duer, John Thomas Peyton, Jr., Omer Tripp
  • Publication number: 20180157844
    Abstract: A static analysis tool is augmented to provide a mechanism by which a large set (and potentially all) security warnings output from the tool may be represented to the user in a manner that is manageable for consumption by the user. According to this disclosure, a static analysis is run on a program to generate a set of security warnings. Using dynamic programming, the set of security warnings output by the static analysis are mapped onto a collection of fix points, wherein a fix point captures a location within the program that should be visited to fix a set of warnings that map to that fix point. The fix points represent the highest probable locations of particular potential vulnerabilities in the program. They are computed in a parametric manner, preferably according to user preferences, by solving an instance of a “knapsack” problem.
    Type: Application
    Filed: December 5, 2016
    Publication date: June 7, 2018
    Inventors: Kristofer Alyn Duer, Jonathan J. Butler, John Thomas Peyton, JR., Stephen Darwin Teilhet, Omer Tripp
  • Publication number: 20180091544
    Abstract: A new paradigm for security analysis is provided by transitioning code analysis reporting from the problem space (the warnings themselves), to a solution space (potential solutions to the identified problems). Thus, instead of reporting raw findings to the user, the automated system as described here outputs proposed solutions to eliminate the defects identified in the security analysis. A consequence of this approach is that the report generated by the analysis tool is much more consumable, and thus much more actionable. Preferably, the report provides the user with one or more candidate location(s) at which to apply a fix to an identified security problem. These locations preferably are identified by processing overlapping nodes to identify one or more solution groupings that represent an API for a sanitization fix. The report also includes one or more recommendations for the fix, and preferably the report is generated on a per-vulnerability type basis.
    Type: Application
    Filed: August 7, 2017
    Publication date: March 29, 2018
    Inventors: Stephen Darwin Teilhet, Kristofer Alyn Duer, John Thomas Peyton, JR., Omer Tripp
  • Publication number: 20180032737
    Abstract: An application analysis platform enables automatic generation of abstract program representations (APRs) that are amenable to static analyses for finding security vulnerabilities. The APR is generated automatically, preferably from an existing build system or a source repository, and then encapsulated into a binary archival format for consumption by a static analysis tool, which operates on-premises or in the cloud. The abstract program representation is a highly compact version of the actual source code it represents. The archival format obfuscates the source code that is subjected to the analysis, thus protecting it from being reverse-engineered when moved off-premises or otherwise shared with other users, teams and even organizations.
    Type: Application
    Filed: October 9, 2017
    Publication date: February 1, 2018
    Inventors: Babita Sharma, Andrew Mak, Richard Myer Goldberg, John Thomas Peyton, JR., Jeffrey Charles Turnham, Matthew Francis Murphy, Hua Xiao
  • Patent number: 9785777
    Abstract: An application analysis platform enables automatic generation of abstract program representations (APRs) that are amenable to static analyzes for finding security vulnerabilities. The APR is generated automatically, preferably from an existing build system or a source repository, and then encapsulated into a binary archival format for consumption by a static analysis tool, which operates on-premises or in the cloud. The abstract program representation is a highly compact version of the actual source code it represents. The archival format obfuscates the source code that is subjected to the analysis, thus protecting it from being reverse-engineered when moved off-premises or otherwise shared with other users, teams and even organizations.
    Type: Grant
    Filed: December 19, 2014
    Date of Patent: October 10, 2017
    Assignee: International Business Machines Corporation
    Inventors: Babita Sharma, Andrew Mak, Richard Myer Goldberg, John Thomas Peyton, Jr., Jeffrey Charles Turnham, Matthew Francis Murphy, Hua Xiao
  • Patent number: 9729569
    Abstract: A new paradigm for security analysis is provided by transitioning code analysis reporting from the problem space (the warnings themselves), to a solution space (potential solutions to the identified problems). Thus, instead of reporting raw findings to the user, the automated system as described here outputs proposed solutions to eliminate the defects identified in the security analysis. A consequence of this approach is that the report generated by the analysis tool is much more consumable, and thus much more actionable. Preferably, the report provides the user with one or more candidate location(s) at which to apply a fix to an identified security problem. These locations preferably are identified by processing overlapping nodes to identify one or more solution groupings that represent an API for a sanitization fix. The report also includes one or more recommendations for the fix, and preferably the report is generated on a per-vulnerability type basis.
    Type: Grant
    Filed: April 21, 2015
    Date of Patent: August 8, 2017
    Assignee: International Business Machines Corporation
    Inventors: Stephen Darwin Teilhet, Kristofer Alyn Duer, John Thomas Peyton, Jr., Omer Tripp
  • Publication number: 20160315960
    Abstract: A new paradigm for security analysis is provided by transitioning code analysis reporting from the problem space (the warnings themselves), to a solution space (potential solutions to the identified problems). Thus, instead of reporting raw findings to the user, the automated system as described here outputs proposed solutions to eliminate the defects identified in the security analysis. A consequence of this approach is that the report generated by the analysis tool is much more consumable, and thus much more actionable. Preferably, the report provides the user with one or more candidate location(s) at which to apply a fix to an identified security problem. These locations preferably are identified by processing overlapping nodes to identify one or more solution groupings that represent an API for a sanitization fix. The report also includes one or more recommendations for the fix, and preferably the report is generated on a per-vulnerability type basis.
    Type: Application
    Filed: April 21, 2015
    Publication date: October 27, 2016
    Inventors: Stephen Darwin Teilhet, Kristofer Alyn Duer, John Thomas Peyton, Jr., Omer Tripp
  • Publication number: 20160180096
    Abstract: An application analysis platform enables automatic generation of abstract program representations (APRs) that are amenable to static analyses for finding security vulnerabilities. The APR is generated automatically, preferably from an existing build system or a source repository, and then encapsulated into a binary archival format for consumption by a static analysis tool, which operates on-premises or in the cloud. The abstract program representation is a highly compact version of the actual source code it represents. The archival format obfuscates the source code that is subjected to the analysis, thus protecting it from being reverse-engineered when moved off-premises or otherwise shared with other users, teams and even organizations.
    Type: Application
    Filed: December 19, 2014
    Publication date: June 23, 2016
    Inventors: Babita Sharma, Andrew Mak, Richard Myer Goldberg, John Thomas Peyton, JR., Jeffrey Charles Turnham, Matthew Francis Murphy, Hua Xiao
  • Publication number: 20070199894
    Abstract: The disclosed invention is an improved method for treating ethanol distillation still bottoms by recovering, through solids separation and pressurized membrane filtration, pure water from still bottoms for human consumption or reuse, and concentrating the solids with beneficial properties recovered before anaerobic digestion. The invention is an improved process because it can reduce the volume of solids to manage, recovers the water from the fermentation still bottoms while pasteurized, maintains the chemical and physical properties of solids for beneficial property recovery, improves ethanol and energy efficiency, and results in clean discharge to the environment including carbon dioxide recovery. A bioreactor produces a gas rich in methane fuel from the concentrate to power the pressurized filtration process and an aqueous ammonia solution to recover or recycle.
    Type: Application
    Filed: April 27, 2007
    Publication date: August 30, 2007
    Inventors: Thomas Peyton, Birgitte Ahring, Lars Rohold
  • Publication number: 20050252858
    Abstract: The disclosed invention is an improved method for treating ethanol distillery discharge by recovering, through pressurized membrane filtration, pure water from still bottoms for human consumption and concentrating the solids before anaerobic fermentation. The invention is an improved process because it retains the heat to operate at high temperatures and recovers the water from the fermentation still bottoms while pasteurized in a sanitary manner and simultaneously concentrates the solids for digestion in a completely stirred tank reactor at thermophilic temperatures. The reactor produces a gas rich in methane fuel to power the pressurized filtration process, produces a reduced volume of reactor waste to manage, and an aqueous ammonia solution to recycle to the process. This invention improves environmental quality, conserves energy and produces a beverage of reliable source and quality.
    Type: Application
    Filed: May 12, 2005
    Publication date: November 17, 2005
    Inventors: Thomas Peyton, Birgitte Ahring, Lars Rohold
  • Patent number: 5840260
    Abstract: Dangers of catalyst removal are decreased while the efficiency of the process is increased by provision of a new nozzle. The nozzle is two concentric pipes connected at one end, with the inner pipe extending slightly beyond the outer pipe at the other end. The outer pipe has orifices provided at the connected end which communicate with the exterior of the outer pipe and the space between the inner and outer pipes. A vacuum is pulled on the inner pipe which, in turn, causes gas to enter the space between the inner and outer pipes via the orifices. As the gas sweeps around the end of the inner pipe, it entrains catalyst particles and carries the particles into the inner pipe. The inner pipe extends beyond the reaches of the outer pipe to a distance such that the angle formed between the ends of the inner and outer pipes is approximately equal to the angle of repose of the catalyst.
    Type: Grant
    Filed: October 31, 1996
    Date of Patent: November 24, 1998
    Assignee: Shell Oil Company
    Inventors: Thomas Peyton Easterly, William Ogle Jones
  • Patent number: 5837062
    Abstract: The present invention involves the removal of catalyst particles adhering to catalyst tubes by means of automated ram rods. The rods are moved up and down in the catalyst tubes by means of rotating wheels having cams which cyclically raise and drop the rods.
    Type: Grant
    Filed: October 31, 1996
    Date of Patent: November 17, 1998
    Assignee: Shell Oil Company
    Inventor: Thomas Peyton Easterly
  • Patent number: 5792429
    Abstract: Problems with pressure in a catalyst bed contained within a vessel arise where there is some sort of blockage in the bed such as a crust formed by a layer of catalyst particles sticking together. To overcome this problem control means is provided to coordinate the flow of nitrogen gas into the vessel and the resulting gas pressure build up and maintenance in the catalyst bed and in the bottom of the vessel as well as in the vapor space of the vessel above the catalyst bed.
    Type: Grant
    Filed: December 27, 1996
    Date of Patent: August 11, 1998
    Assignee: Catalyst Technology
    Inventors: Thomas Peyton Easterly, William Ogle Jones