Preventing Errors By Testing Or Debugging Software (epo) Patents (Class 714/E11.207)
  • Patent number: 11316892
    Abstract: Systems and methods are disclosed that minimize ongoing risk to an organization from user behaviors which magnify the severity of a spoofed domain. Systems and method are provided which enable an entity and users of an entity to identify potential harmful domains, combining search, discovery, reporting, the generation of risk indicators, end-user risk assessments, and training into a security awareness system.
    Type: Grant
    Filed: May 4, 2020
    Date of Patent: April 26, 2022
    Assignee: KnowBe4, Inc.
    Inventors: Stu Sjouwerman, Alin Irimie, Greg Kras
  • Patent number: 11307948
    Abstract: A fault injection method and apparatus, an electronic device and a storage medium are provided, which are related to the technical fields of computers and cloud computing, in particular to the field of testing. The fault injection method includes: acquiring a fault injection task, which includes at least one target service identification and a fault scenario corresponding to the target service identification; determining a target service according to each target service identification, and acquiring a state of the target service; and injecting the fault scenario corresponding to the target service identification into the target service in a case that the state of the target service is a normal state. The application is beneficial to reduction of labor cost.
    Type: Grant
    Filed: December 16, 2020
    Date of Patent: April 19, 2022
    Assignee: Beijing Baidu Netcom Science and Technology Co., Ltd.
    Inventor: Yu Guan
  • Patent number: 11295013
    Abstract: An apparatus, a computer program product and a method for dimensionality reduction comprising: obtaining a set of Application Programming Interface (API) functions of a system invocable by a program, and a set of artifacts. Each artifact is associated with at least one API function and indicative of a functionality thereof. The method further comprising: clustering the API functions based on an analysis of the artifacts to create a set of clusters smaller than the set of API functions, such that each cluster comprises API functions having a similar functionality; and performing a dimensionality reduction to a feature vector using the set of clusters.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: April 5, 2022
    Assignee: International Business Machines Corporation
    Inventors: Fady Copty, Ayman Jarrous, Tamer Salman, Maksim Shudrak
  • Patent number: 11294682
    Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: April 5, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ben Niu, Gregory John Colombo, Weidong Cui, Jason Lin, Kenneth Dean Johnson
  • Patent number: 11263070
    Abstract: Generating targeted analysis results in a support system is disclosed. Computing device information about a supported computing device in which a problem was encountered is received. Identification of a designated subset of tags of a plurality of tags is received. A plurality of analyzers is initiated to analyze the computing device information. The plurality of analyzers is configured to generate a plurality of results based on the computing device information. Tags of the plurality of tags are associated with the plurality of results. A subset of results are generated by discarding each result from the plurality of results that have no associated tags that match a tag in the designated subset of tags. The subset of results is output.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: March 1, 2022
    Assignee: Red Hat, Inc.
    Inventors: Wesley H. Duffee-Braun, Jonathan F. Newton, Jesse H. Jaggars
  • Patent number: 11263033
    Abstract: A system may include an application server and one or more tenants served by the application server. The application server may host a virtual machine with multiple isolated sub-environments. Each tenant of the application server may request to run a program in a tenant-specific sub-environment of the virtual machine. The sub-environments may be configured so the execution of one tenant's code does not affect execution of another tenant's code or the hosting virtual machine, for example, by considering the resources used to execute the code. The application server may implement techniques to securely execute “untrusted” code, programmed using one or more different programming languages, in the sub-environments by enforcing resource restrictions and restricting the sub-environments from accessing the host's local file system. In this way, one tenant's code does not negatively impact execution of another tenant's code by using too many resources of the virtual machine.
    Type: Grant
    Filed: December 28, 2018
    Date of Patent: March 1, 2022
    Assignee: salesforce.com, inc.
    Inventors: Michael Goldberg Boilen, James Bock Wunderlich, Nathan Edward Lipke
  • Patent number: 11237889
    Abstract: An infrastructure management system automatically determines a configuration of infrastructure services for the execution of applications that best satisfies predefined target criteria based on receiving annotated application programming interface (API) schemas associated with the applications. The system extracts information from customized annotations in a received API schema, sets up an API gateway with an existing configuration of infrastructure services, and logs requests received at this existing configuration via the gateway. The system generates a set of alternate configurations based on the extracted information, simulates execution of a set of logged requests to determine a set of valid configurations, and subsequently selects a new configuration that satisfies threshold predefined target criteria. The system may update the existing configuration to the new configuration without interrupting application services.
    Type: Grant
    Filed: January 8, 2021
    Date of Patent: February 1, 2022
    Assignee: salesforce.com, inc.
    Inventor: Billy Ma
  • Patent number: 11151244
    Abstract: A method in a computer system having an operating system providing isolation between software processes executable in the operating system such that a first process executing in the operating system is prevented from accessing resources of a second process executing in the operating system, the method including receiving a software component for execution as an isolated process in the operating system; receiving a baseline profile for the software component defining one or more characteristics of the software component at a runtime for identifying performance of the software component; generating a runtime profile of the software component in execution in the operating system defining characteristics of the component in execution; and flagging the software component in execution based on a comparison of the baseline profile and the runtime profile so as to identify an undesirable performance of the software component.
    Type: Grant
    Filed: May 10, 2017
    Date of Patent: October 19, 2021
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Fadi El-Moussa
  • Patent number: 11151268
    Abstract: An access control method for a restricted resource in a computer system having an operating system providing isolation between software processes executable in the operating system such that a first process executing in the operating system is prevented from accessing resources of a second process executing in the operating system, the method including receiving a software component for execution as an isolated process in the operating system; receiving a baseline profile for the software component defining characteristics of the software component at a runtime for identifying performance of the software component; generating a runtime profile of the software component in execution in the operating system defining characteristics of the component in execution; and permitting access by the software component to the restricted resource based on a comparison of the baseline profile and the runtime profile such that the software component exhibiting undesirable performance is precluded from accessing the restrict
    Type: Grant
    Filed: May 10, 2017
    Date of Patent: October 19, 2021
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Fadi El-Moussa
  • Patent number: 11134084
    Abstract: The invention provides for an improved and diversified system, apparatus and method for authenticating and/or authorizing an identity of an action requester within a secure environment. The invention provides for human and non-human agents as authentication factors that can be communicated with in real time via a communications network, such as via the Internet. The invention also provides for facilitating authorization of action requests that are received from non-human action requesters.
    Type: Grant
    Filed: November 27, 2018
    Date of Patent: September 28, 2021
    Assignee: HID Global Corporation
    Inventors: Darren Tuadleng Koh, Arun Suresh Prabhu
  • Patent number: 11076022
    Abstract: Systems, methods, and non-transitory computer-readable media can initiate a robotics framework configured to enable inter-process communications between a plurality of services implemented on the robotics framework, the plurality of services configured to operate at least some features of a vehicle. A function call is received from a first service of the plurality of services. The function call instructs the robotics framework to generate a network socket. A virtual network socket configured to receive data from a data log is generated based on the function call. The virtual network socket simulates data transmission with a hardware device over a real network socket.
    Type: Grant
    Filed: December 31, 2018
    Date of Patent: July 27, 2021
    Assignee: Lyft, Inc.
    Inventors: Tirthkumar Nilaykumar Pandya, Siliang Li, Jonathan Nichols
  • Patent number: 11003575
    Abstract: In one embodiment, a method for continuous integration automated testing in a distributed computing environment may include receiving data for a computer application into an automated testing schema; at least one computer processor executing a baseline test run and storing baseline test run results; receiving new code for the computer application at a test environment; the at least one computer processor executing a test run and storing test run results; the at least one computer processor comparing the test run results to the baseline test run results; and the at least one computer processor generating at least one report based on the comparing.
    Type: Grant
    Filed: October 19, 2016
    Date of Patent: May 11, 2021
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Vladimir Knajtner, Michel Victor, Shahin Mahmoud Shahin
  • Patent number: 10996947
    Abstract: A debugging and diagnostics system allow for dynamic code generation that inserts code into a production application to identify snappoints that cause snapshots to be taken if predefined conditionals are satisfied. The snappoints are associated with locations in source code for the production application and include conditional statements that must be met to create a snapshot of the production application. The snappoints are used to generate a collection plan that is provided to the server running the production application. The server rewrites the code of the production application based upon the collection plan to insert instructions that create snapshots when the conditional statements are met.
    Type: Grant
    Filed: May 11, 2020
    Date of Patent: May 4, 2021
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventor: Jackson Davis
  • Patent number: 10963369
    Abstract: A software as a service platform employing novel means and methods to do demographic and behavioral data collection on and analysis of human UI/UX interactions. By utilizing adaptive testing, adaptive tester selection, and persistent tester pools with verified demographic data and ongoing behavioral data collection via a wide range of manual and algorithmic methods, decomposing, recomposing, and delivering optimized UI or UX data sources, collecting, integrating, delivering, and analyzing demographic and behavioral data regarding human interaction with interactive user interfaces and experiences using manual, hybrid, or algorithmic methods such as machine learning algorithms or path-finding algorithms, the present invention provides a novel framework for the extraction of comprehensive, consistent, and dynamic insights into the demographic and behavioral interactions of humans with interactive digital media sources.
    Type: Grant
    Filed: April 18, 2018
    Date of Patent: March 30, 2021
    Inventors: Ashkan Ziaee, Felix Skyler Hamilton
  • Patent number: 10915432
    Abstract: A test case management system includes an input and output (I/O) interface for receiving a first test case, a database (DB) for storing a second test case, and a controller for comparing the first test case with the second test case based on a similarity score between a string of the first test case and a string of the second test case.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: February 9, 2021
    Assignees: HYUNDAI MOTOR COMPANY, KIA MOTORS CORPORATION
    Inventors: Seok Ki Hong, Yon-Soo Jong, Kyung-Hwa Choi, Hyun-Seop Bae, Seung-Uk Oh
  • Patent number: 10896196
    Abstract: Various example embodiments for supporting data retrieval flexibility are presented. Various example embodiments for supporting data retrieval flexibility may include supporting data retrieval flexibility for retrieval of data from a device that does not maintain that data using a relational database data format by supporting operation of the device as a device that supports retrieval of that data in a relational database data format using a structured query language. Various example embodiments for supporting data retrieval flexibility may include supporting data retrieval flexibility for retrieval of data from a device by supporting retrieval of data maintained at the device based on a first data format based on generation of a database storing that data in a second data format different than the first data format and using a structured query language configured to support retrieval of the data in the second data format from the database.
    Type: Grant
    Filed: March 14, 2019
    Date of Patent: January 19, 2021
    Assignee: Nokia Solutions and Networks Oy
    Inventors: Jayant Kotalwar, Suresh Kannan Durai Samy, Kendall Harvey
  • Patent number: 10867037
    Abstract: Examples disclosed herein relate to selecting a security mitigation action based on device usage. In one implementation, a processor selects a security mitigation action for a device based on information related to usage of the device and associated usage limitations associated with the selected security mitigation action. The processor may output information related to the selected security mitigation action.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: December 15, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jonathan Griffin, Adrian Baldwin
  • Patent number: 10846198
    Abstract: Automatic navigation of a user from a log statement that is selected by the user from a log to a code expression that was executed to generate the selected log statement. The computing system automatically identifies one or more code expressions as candidates for having generated the log statement, and then maps the log statement to these identified candidate code expressions in the code. In response to input from the user selecting the log expression, the computing system uses the mapping to visually provide a correlation between the log statement and the particular code expression, where the one or more mapped code expressions includes the particular code expression that actually generated the log statement.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: November 24, 2020
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Jackson Michael Davis, Andrew R. Sterland, Patrick Fenelon, Esteban Herrera
  • Patent number: 10817408
    Abstract: Systems and techniques are described for generating test cases. In one example, a manual test of code is performed. The manual test uses proxy code to detect at least one input to the code and a data transfer between the code and other code. The data transfer includes an input to the other code and an output from the other code. A file is generated that includes the at least one input to the code, the input to the other code, the output from the other code, and data that specifies that the manual test of the code resulted in an expected output. A mock test automates the manual test of the code based at least in part on the file.
    Type: Grant
    Filed: July 26, 2017
    Date of Patent: October 27, 2020
    Assignee: VMWARE, INC.
    Inventors: Dattathreya Sathyamurthy, Akhil Sadashiv Hingane, Piyush Bharat Masrani, Amarnath Palavalli, Hemanth Kumar Pannem
  • Patent number: 10779165
    Abstract: A method for pre-authenticating a user on the user's mobile device is provided. The method may be implemented on the device. The method may include tracking commonly accessed applications over a pre-determined amount of time. The method may include tracking and storing on the mobile device, application data associated with each commonly accessed application. When a determined current time of day is a pre-determined amount of time prior to the tracked start time of access to a one or more commonly accessed applications, the method may include capturing, autonomously, via each of a plurality of sensors, an attribute associated with the user. The method may further include comparing a value of the attribute captured to a historically stored attribute value. The method may further include verifying and pre-authenticating the user based on the comparing. The method may also include pre-loading the user's mobile device with the commonly accessed application.
    Type: Grant
    Filed: November 7, 2019
    Date of Patent: September 15, 2020
    Assignee: Bank of America Corporation
    Inventors: Brandon Sloane, Monika Kapur, Crystal M. Sundaramoorthy, Ryan Davis, Kevin A. Delson
  • Patent number: 10725890
    Abstract: A device to be utilized for testing a program is connected to a device host operating in a service provider network via a peripheral bus. A network connection is established between a testing host, which might be a virtual machine, and the device host using a peripheral-bus-over-network-protocol. A secure network connection is established between the developer computing device and the testing host. A network port utilized by a debugging client application executing on the developer computing device is forwarded to the testing host over the secure network connection. Data packets generated by the debugging client application executing on the developer computing device are forwarded to a debugging server application execution on the testing host. Peripheral devices (e.g. the requested device) accessible to the testing host can then be utilized by the developer computing device for testing execution of the program as if the device were locally connected thereto.
    Type: Grant
    Filed: July 12, 2017
    Date of Patent: July 28, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Anurag Goyal, Hongda Zhao, Billy Morales, Bommasamudra Chandra Shekar, Rohan Deshpande
  • Patent number: 10679211
    Abstract: Intelligent authentication is disclosed. According to one embodiment, a system includes a transaction logic configured to receive transaction metadata associated with an attempted transaction. The transaction logic is also configured to identify a user attempting the attempted transaction. The system further includes an activity logic configured to access an activity log associated with the user. The activity log includes values corresponding to previous transactions made by the user and any additional information provided by 3rd party feeds. The activity logic is also configured to compare transaction metadata to the values. The system also includes an authentication logic configured to select an authentication level for the transaction based, at least in part, on the comparison.
    Type: Grant
    Filed: June 3, 2019
    Date of Patent: June 9, 2020
    Assignee: WELLS FARGO BANK, N.A.
    Inventors: Darrell Lee Suen, Sridhar Kotamraju, Christopher P. Clausen, Melody Su-Shin Kao, Christina Z. Ongpin, Kevin R. Cieslak
  • Patent number: 10656973
    Abstract: A method of evaluating and selecting an application programming interface (API). The method includes accessing source-code in computer programming languages from an API repository. The method includes training a machine learning classifier using generalized, extracted API-calls to learn variations of API-call programming language syntaxes through usage of the API-call programming language syntaxes in the source-code. The method includes building API-call models suitable for the computer programming languages and building a parameter relations graph based on backtracking data-flow from API-calls that are extracted from public project repositories based on the API-call model. The method includes retrieving sample parameter values from the parameter relations graph. The method includes implementing the sample parameter values in an evaluation interface to evaluate functionality of an API in a software application.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: May 19, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Junhee Park, Mehdi Bahrami, Wei-Peng Chen
  • Patent number: 10635808
    Abstract: A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secured software agent is provided for embedding within the abstraction layer forming the operating system. The secured software agent is configured to limit access to the abstraction layer by either blocking loadable kernel modules from loading, blocking writing to the system call table or blocking requests to attach debug utilities to certified applications or kernel components.
    Type: Grant
    Filed: November 6, 2017
    Date of Patent: April 28, 2020
    Assignee: IRDETO B.V.
    Inventor: Ron Vandergeest
  • Patent number: 10621063
    Abstract: A system, method and computer-readable storage devices for enhancing the presentation of structured log files. A system configured according to this disclosure can track events of a computing entity. The computing entity can be a state machine, a virtual machine, a thread, a process, a software component, or a hardware component. The computing entity can be any device that generates or contributes to an event log. The events can be tracked from at least one of a structured log file and a stream of event data, for example. The system can identify event types for the events. The system can identify relationships between the events, and generate a sequence diagram of the events. The sequence diagram can include visual indications of the relationships based on the event types. The system can further select an icon for each event from an event-specific icon directory based on event type.
    Type: Grant
    Filed: July 10, 2015
    Date of Patent: April 14, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventor: Roberto Attias
  • Patent number: 10609014
    Abstract: A method for determining a dynamic pairing code for use in exchanging information between a first and a second communications entity. At the at the first communications entity, determining a first authentication score associated with a first information exchange session between the first and second communications entities, determining a second authentication score associated with a second information exchange session between the first and second communications entities, (the second information exchange spaced apart in time from the first information exchange), combining the first and second authentication scores to create a cumulative risk analysis score, and responsive to the cumulative risk analysis score, generating a dynamic pairing code for use in governing exchange of information during subsequent communications between the first and second communications entities.
    Type: Grant
    Filed: July 2, 2018
    Date of Patent: March 31, 2020
    Assignee: NXT-ID, INC.
    Inventors: David Tunnell, Justin Mitchell, Jacob Zurasky
  • Patent number: 10585796
    Abstract: Aspects of an application program's execution which might be subject to non-determinism are performed in a deterministic manner while the application program's execution is being recorded in a virtual machine environment so that the application program's behavior, when played back in that virtual machine environment, will duplicate the behavior that the application program exhibited when originally executed and recorded. Techniques disclosed herein take advantage of the recognition that only minimal data needs to be recorded in relation to the execution of deterministic operations, which actually can be repeated “verbatim” during replay, and that more highly detailed data should be recorded only in relation to non-deterministic operations, so that those non-deterministic operations can be deterministically simulated (rather than attempting to re-execute those operations under circumstances where the outcome of the re-execution might differ) based on the detailed data during replay.
    Type: Grant
    Filed: February 15, 2017
    Date of Patent: March 10, 2020
    Assignee: CA, Inc.
    Inventors: Jeffrey Daudel, Suman Cherukuri, Humberto Yeverino, Dickey Singh, Arpad Jakab, Marvin Justice, Jonathan Lindo
  • Patent number: 10567413
    Abstract: A packet-filtering device may receive packet-filtering rules configured to cause the packet-filtering device to identify packets corresponding to network-threat indicators. The packet-filtering device may receive packets and, for each packet, may determine that the packet corresponds to criteria specified by a packet-filtering rule. The criteria may correspond to one or more of the network-threat indicators. The packet-filtering device may apply an operator specified by the packet-filtering rule. The operator may be configured to cause the packet-filtering device to either prevent the packet from continuing toward its destination or allow the packet to continue toward its destination.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: February 18, 2020
    Assignee: Centripetal Networks, Inc.
    Inventors: David K. Ahn, Keith A. George, Peter P. Geremia, Pierre Mallett, III, Sean Moore, Robert T. Perry, Jonathan R. Rogers
  • Patent number: 10466970
    Abstract: Various embodiments of systems and methods are described herein for executing software programs deployed in a distributed network. The enterprise application specific to a geographical jurisdiction may request for the software programs deployed in the distributed network to execute a specific business process. The enterprise application sends a service request to the distributed network for completion of a business process specific to the given jurisdiction. An application executing in the distributed network receives such service requests from multiple enterprise applications. The application retrieves the appropriate software program(s) deployed in the distributed network and generates the localization software program based on the received service request. Execution of the localization software program facilitates completion of the requested business process by generating reports specific to the given jurisdiction.
    Type: Grant
    Filed: December 2, 2015
    Date of Patent: November 5, 2019
    Assignee: SAP SE
    Inventors: Arun Subramanian, Praveenkumar Arangotte Kozhisseri, Rachit Mathur
  • Patent number: 10454968
    Abstract: Testing a system against fuzzing attacks includes negating all regular expressions used in the corresponding language, and applying those negated regular expressions to a system interface. Only expressions definitively outside the scope of protocol specification implicate vulnerabilities to fuzzing attacks. The system detects fuzzing attacks by continuously monitoring packets of data and only passing through packets that conform to regular expressions of the language.
    Type: Grant
    Filed: September 12, 2016
    Date of Patent: October 22, 2019
    Assignee: Rockwell Collins, Inc.
    Inventors: Mark A. Bortz, David S. Hardin, James N. Potts, Konrad L. Slind
  • Patent number: 10430321
    Abstract: Provided are systems, methods, and media for concurrency conflict testing for shared resources. An example method includes identifying shared resources that are to be accessed by an application. Generating a plurality of concurrency test scenarios based on the shared resources. Analyzing a plurality of concurrency test cases to detect which concurrency test cases include a reference to the shared resources. Executing a concurrency test scenario.
    Type: Grant
    Filed: August 21, 2018
    Date of Patent: October 1, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Li Li, Li Xiang, Chang Zhi G Z Zhang, Ting Xie, Xin Zheng, Yan Wang, Hai He, Si Bin Fan
  • Patent number: 10360094
    Abstract: Generating targeted analysis results in a support system is disclosed. Computing device information about a supported computing device in which a problem was encountered is received. Identification of a designated subset of tags of a plurality of tags is received. A plurality of analyzers is initiated to analyze the computing device information. The plurality of analyzers is configured to generate a plurality of results based on the computing device information. Tags of the plurality of tags are associated with the plurality of results. A subset of results are generated by discarding each result from the plurality of results that have no associated tags that match a tag in the designated subset of tags. The subset of results is output.
    Type: Grant
    Filed: February 23, 2017
    Date of Patent: July 23, 2019
    Assignee: Red Hat, Inc.
    Inventors: Wesley H. Duffee-Braun, Jonathan F. Newton, Jesse H. Jaggars
  • Patent number: 10346140
    Abstract: A method for model-based design of safety-critical software is disclosed. The method includes receiving natural-language software requirements, developing a specification model by implementing either semantic modeling or graphical modeling, applying formal requirements analysis to the specification model, auto generating requirements based and robustness test cases from the specification model, developing a design model based on the specification model, applying test cases to the design model, auto-generating source code using the design model, verifying the source code using both test cases and static analysis technology, and compiling executable object code from the verified source code. If a result of the analysis of the software specification or design models is not satisfactory then adjusting the specification or design model to correct any inconsistency, and repeating applying the analysis and test cases.
    Type: Grant
    Filed: August 5, 2015
    Date of Patent: July 9, 2019
    Assignee: General Electric Company
    Inventors: Timothy Lee Johnson, Andrew Walter Crapo, Michael Richard Durling, Alexander Walsch, Kit Yan Siu, Luca Parolini, Panagiotis Manolios, Meng Li, Han Yu, Scott Alan Stacey, Gregory Reed Sykes
  • Patent number: 10339294
    Abstract: Methods, systems and computer program products for confidence-based user authentication are provided.
    Type: Grant
    Filed: July 13, 2016
    Date of Patent: July 2, 2019
    Assignee: JPMorgan Chase Bank, N.A.
    Inventors: John D. Rouse, Raymond P. Delaney
  • Patent number: 10338990
    Abstract: In a crash analysis system, a method for analyzing a core dump corresponding to a crash of a computer system is disclosed. A core dump is received wherein the core dump corresponds to a crash of a computer system. A culprit module responsible for the crash of the computer system is determined. A signature back trace, which pertains to a symptom of the crash of the computer system is generated.
    Type: Grant
    Filed: January 25, 2017
    Date of Patent: July 2, 2019
    Assignee: VMware, Inc.
    Inventors: Ayoob Khan, Sowgandh Sunil Gadi
  • Patent number: 10324823
    Abstract: A debugging and diagnostics system allows users to take lightweight process snapshots of running debuggee processes so the users may analyze those snapshots at a later time. The snapshot mechanism allows debugging tools to compare an original process or one or more process snapshots or to compare any of a series of snapshots to each other. The snapshot mechanism further allows users to inspect a snapshot of process memory while allowing the original process to continue running with minimal impact. A user may do historical debugging using process snapshots of a debuggee process taken over time. This allows the user to view the state of the debuggee process as it existed when the snapshot was taken. The lightweight process snapshot is less invasive because it does not require a full copy of the memory and allows the original process to run un-interrupted while specific collections and inspections are completed.
    Type: Grant
    Filed: December 8, 2014
    Date of Patent: June 18, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jackson Davis, Tae Hyung Kim, Colin A. Thomsen, Steve Carroll
  • Patent number: 10311432
    Abstract: Systems, methods, and other embodiments associated with intelligent authentication. According to one embodiment, a system includes a transaction logic configured to receive transaction metadata associated with an attempted transaction. The transaction logic is also configured to identify a user attempting the attempted transaction. The system further includes an activity logic configured to access an activity log associated with the user. The activity log includes values corresponding to previous transactions made by the user and any additional information provided by 3rd party feeds. The activity logic is also configured to compare transaction metadata to the values. The system also includes an authentication logic configured to select an authentication level for the transaction based, at least in part, on the comparison.
    Type: Grant
    Filed: February 19, 2018
    Date of Patent: June 4, 2019
    Assignee: WELLS FARGO BANK, N.A.
    Inventors: Darrell Lee Suen, Sridhar Kotamraju, Christopher P. Clausen, Melody Su-Shin Kao, Christina Z. Ongpin, Kevin R. Cieslak
  • Patent number: 10284591
    Abstract: In non-limiting examples, anti-exploit systems and methods described herein monitor a memory space of a process for execution of functions. Stack walk processing is executed upon invocation of one of the functions in the monitored memory space. During execution of the stack walk processing, at least one memory check is performed to detect suspicious behavior. An alert of suspicious behavior is triggered when the performing of the memory check detects at least one of: code execution attempted from non-executable memory, identification of an invalid base pointer, identification of an invalid stack return address, attempted execution of a return-oriented programming technique, the base pointer is outside a current thread stack, and a return address is detected as being inside a virtual memory area. If an alert of suspicious behavior is triggered, execution of a payload is prevented for the invoked function.
    Type: Grant
    Filed: January 27, 2015
    Date of Patent: May 7, 2019
    Assignee: WEBROOT INC.
    Inventors: Marco Giuliani, Marco Bizzarri, Benedetto Voltattorni, Johannes Mayr
  • Patent number: 10229029
    Abstract: Systems and methods for allowing software developers and the like to embed various different types of code and/or data manipulations into a software product. The embedded code manipulation instructions may be accessed and executed by test engineers or other users to induce fault paths and the like in the software product at run-time for analyzing the software's response to the induced fault paths. For instance, a user application of a software manipulation framework may expose a list of all of the instruction sets to a test engineer or the like in conjunction with one or more testing procedures to be performed on the software. Unless accessed by the test engineer, all of the testing probes may be represented by noops or placeholders at runtime to limit performance impact on the software.
    Type: Grant
    Filed: April 8, 2014
    Date of Patent: March 12, 2019
    Assignee: Oracle International Corporation
    Inventors: Erwin Tsaur, Xiangtao You, Xiao-dong Zhao
  • Patent number: 10223245
    Abstract: A system, method, and computer program product are provided for identifying tests to automate in a software testing project. In operation, a request for a recommendation for at least one test to automate in a software testing project including a plurality of tests is received. Additionally, a plurality of parameters associated with the software testing project are identified to identify the at least one test to automate. Further, the at least one test to automate is identified from the plurality of tests associated with the software testing project, based on the plurality of parameters. Moreover, the at least one test to automate is presented as the recommendation utilizing at least one user interface.
    Type: Grant
    Filed: May 18, 2017
    Date of Patent: March 5, 2019
    Assignee: AMDOCS DEVELOPMENT LIMITED
    Inventors: Sharon Elgarat, Ohad Mezner, Itsik David, Erez Shacham
  • Patent number: 10169491
    Abstract: A method and system for servicing a data query in a relational database management system (RDBMS). Access path security corresponding to a user originating the data query is configured. The data query requests data from the RDBMS pursuant to a received configuration query associated with the user. The data query requests a value stored in a result field by specifying the result field and a result table of a database in the RDBMS. The configuration query specifies a usable index field associated with the result table. The access path security mandates the user to provide a search key in the data query in searching the result table. The search key includes a name identical to the usable index field specified in the configuration query such that the access path security enables users to search the result table only when the users specify the usable index field in the data query.
    Type: Grant
    Filed: November 20, 2012
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventor: John Kliewe
  • Patent number: 10169465
    Abstract: Techniques are disclosed for allowing users to access data libraries associated with multiple, isolated runtime environments (RTEs). A web query application receives a query and determines an RTE to execute the query against. The web query application determines whether a current RTE matches the determined RTE. If the web query application determines that the current RTE does not match the determined RTE, the web query application configures a server computing system to access the determined RTE and execute the query against data libraries associated with the determined RTE. If the web query application determines that the current RTE matches the determined RTE, the web query application executes the query against the data libraries associated with the current RTE.
    Type: Grant
    Filed: December 15, 2014
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Robert D. Andrews, Robert J. Bestgen, Gene R. Cobb, Kathryn R. Steinbrink
  • Patent number: 10152314
    Abstract: Systems and methods are disclosed for provisioning software in computing networks. For example, methods may include invoking one or more discovery probes; retrieving software usage data based at least on the one or more discovery probes; determining software usage predictions based on the software usage data; allocating, based on the software usage predictions, per user software entitlements and per device software entitlements to obtain an allocation of software entitlements; and invoking installation or uninstallation of software responsive to the allocation of software entitlements.
    Type: Grant
    Filed: March 29, 2018
    Date of Patent: December 11, 2018
    Assignee: ServiceNow, Inc.
    Inventors: Apolak Borthakur, Manish Srivastava, Yu Xia
  • Patent number: 10146662
    Abstract: A system for recording the interaction of a computer program via graphical user interface (GUI) is disclosed in which one or more operating system event queues are monitored and GUI interaction data logged.
    Type: Grant
    Filed: September 22, 2016
    Date of Patent: December 4, 2018
    Assignee: International Business Machines Corporation
    Inventors: Adrian P. Kyte, Joseph R. Winchester
  • Patent number: 10122764
    Abstract: This disclosure describes techniques that facilitate granting an access privilege to a client device based on selectively authenticating biometric data. Particularly, a biometric authentication system may generate an authentication policy that authenticates a client identity via biometric authentication protocols. The authentication policy may be based on a security policy of the computing resource associated with the access privilege. The biometric authentication protocols may be based on a kinematic behavior, body chemistry, or physical features of the client. Each biometric authentication protocol may be assigned an authentication score that reflects a confidence that a biometric sample used to gain an access privilege does in fact correspond to the client. Further, an authentication policy may include a random selection of biometric authentication protocols that comply with a security policy of the computing resource.
    Type: Grant
    Filed: April 25, 2017
    Date of Patent: November 6, 2018
    Assignee: T-Mobile USA, Inc.
    Inventor: Ahmad Arash Obaidi
  • Patent number: 10095602
    Abstract: A system for analyzing source code may include a computer including a memory and a processor. A discoverer may be stored on the memory and may be configured to automatically identify applications of an infrastructure and extract at least one input source code file corresponding to the identified applications. A file reader may be stored on the memory and may be configured to read the input source code file containing source code written in at least one computer programming language. A metrics accumulator may be stored on the memory and may be configured to analyze the source code components according to one or more rules to generate application metadata. A reporting engine may be stored on the memory and configured to generate a report based on the generated application metadata.
    Type: Grant
    Filed: January 8, 2016
    Date of Patent: October 9, 2018
    Assignee: Syntel, Inc.
    Inventors: Ritesh Gautam, Maneesh Misra, Ritesh Bhinde, Swapnil Jadhao
  • Patent number: 10097570
    Abstract: A method for detecting a preset type of real-time event is provided. The method includes steps of: (a) a server loading or supporting other server to load a detection policy; and (b) the server detecting or supporting other server to detect an event in real-time from multiple input data by referring to the detection policy.
    Type: Grant
    Filed: November 11, 2016
    Date of Patent: October 9, 2018
    Assignee: Seculayer Co., Ltd.
    Inventors: Jong Seoung Won, Jin Sang Ryu
  • Patent number: 10096025
    Abstract: In a platform comprising a service tier, an enabling tier, and a personalization tier, applying an expert engine to analyze one or more mobile device user and transaction environment requirements and configuring one or more platform features in accordance with the analysis.
    Type: Grant
    Filed: January 14, 2014
    Date of Patent: October 9, 2018
    Assignee: MASTERCARD MOBILE TRANSACTIONS SOLUTIONS, INC.
    Inventors: Mehul Desai, Satyan G. Pitroda, Nehal Maniar
  • Patent number: 10061604
    Abstract: A computer system receives a first instruction identifier identifying a first instruction being executed by a first thread associated with a first virtual machine and receives a second instruction identifier identifying a second instruction being executed by a second thread associated with the first virtual machine. The system produces an execution record comprising the first instruction identifier, a first thread identifier identifying the first thread, a first timestamp reflecting a first real-time clock value associated with executing the first instruction, the second instruction identifier, a second thread identifier identifying the second thread, and a second timestamp reflecting a second real-time clock value associated with executing the second instruction.
    Type: Grant
    Filed: August 9, 2016
    Date of Patent: August 28, 2018
    Assignee: Red Hat, Inc.
    Inventors: Marek Baluch, Jiri Sedlacek
  • Patent number: 10057289
    Abstract: A system and method and computer program product for user authentication that uses information about a user's context or context of their personal device(s) to dynamically modify that user's authentication or login requirements to an application in a computer or mobile device. The system is configured to run methods that detect and make use of a user's context that includes: a current environment or personal context, and uses this capability to enable variable strength authentication when attempting to log in or enter another application or resource. In one embodiment, the system implements methods to dynamically adjust the authentication challenge as a differential of all accumulated user contexts (e.g., providing a shorter password or pin-code).
    Type: Grant
    Filed: August 12, 2013
    Date of Patent: August 21, 2018
    Assignee: International Business Machines Corporation
    Inventors: Tamer E. Abuelsaad, Vishal C. Aslot, Adekunle Bello, Gregory J. Boss