Patents by Inventor Xonia Ivonne McLaughlin

Xonia Ivonne McLaughlin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11921844
    Abstract: A novel compiler is described. The compiler is able to view source code of the application in its entirety and can do so from the inside. Unlike other tools which examine the forensic data from an application crash after the fact, from the outside, the compiler of the present invention can provide novel data on function call stacks and function profiles during runtime. The application may be stopped immediately during runtime to prevent further or potential damage, but the forensic data that is collected is focused and can be used to show where vulnerabilities exists in the application and how they were exploited. Hashes are taken of function call stacks and used as unique identifiers or thumbprints which can be used to reduce the volume of forensic data that needs to be analyzed after an attack.
    Type: Grant
    Filed: December 20, 2022
    Date of Patent: March 5, 2024
    Assignee: Dellfer, Inc.
    Inventors: Brian H. Pescatore, James Blaisdell, Xonia Ivonne McLaughlin, Chetin Ersoy, Kenneth J. Wante
  • Patent number: 11687646
    Abstract: A novel compiler is described. The compiler is able to view source code of the application in its entirety and can do so from the inside. Unlike other tools which examine the forensic data from an application crash after the fact, from the outside, the compiler of the present invention can provide novel data on function call stacks and function profiles during runtime. The application may be stopped immediately during runtime to prevent further or potential damage, but the forensic data that is collected is focused and can be used to show where vulnerabilities exists in the application and how they were exploited. Hashes are taken of function call stacks and used as unique identifiers or thumbprints which can be used to reduce the volume of forensic data that needs to be analyzed after an attack.
    Type: Grant
    Filed: August 14, 2020
    Date of Patent: June 27, 2023
    Assignee: Dellfer, Inc.
    Inventors: Brian H. Pescatore, James Blaisdell, Xonia Ivonne McLaughlin, Chetin Ersoy, Kenneth J. Wante
  • Publication number: 20230117901
    Abstract: A novel compiler is described. The compiler is able to view source code of the application in its entirety and can do so from the inside. Unlike other tools which examine the forensic data from an application crash after the fact, from the outside, the compiler of the present invention can provide novel data on function call stacks and function profiles during runtime. The application may be stopped immediately during runtime to prevent further or potential damage, but the forensic data that is collected is focused and can be used to show where vulnerabilities exists in the application and how they were exploited. Hashes are taken of function call stacks and used as unique identifiers or thumbprints which can be used to reduce the volume of forensic data that needs to be analyzed after an attack.
    Type: Application
    Filed: December 20, 2022
    Publication date: April 20, 2023
    Inventors: Brian H. Pescatore, James Blaisdell, Xonia Ivonne McLaughlin, Chetin Ersoy, Kenneth J. Wante
  • Publication number: 20210049265
    Abstract: A novel compiler is described. The compiler is able to view source code of the application in its entirety and can do so from the inside. Unlike other tools which examine the forensic data from an application crash after the fact, from the outside, the compiler of the present invention can provide novel data on function call stacks and function profiles during runtime. The application may be stopped immediately during runtime to prevent further or potential damage, but the forensic data that is collected is focused and can be used to show where vulnerabilities exists in the application and how they were exploited. Hashes are taken of function call stacks and used as unique identifiers or thumbprints which can be used to reduce the volume of forensic data that needs to be analyzed after an attack.
    Type: Application
    Filed: August 14, 2020
    Publication date: February 18, 2021
    Inventors: Brian H. Pescatore, James Blaisdell, Xonia Ivonne McLaughlin, Chetin Ersoy, Kenneth J. Wante