Application attack monitoring
C Hebert, MA Rahaman, M Vogel - US Patent 9,350,749, 2016 - Google Patents
BACKGROUND The detection of intrusions into distributed applications is a complex
problem. Current security tools primarily often focus on detecting attack patterns visible on …
problem. Current security tools primarily often focus on detecting attack patterns visible on …
Penetration test attack tree generator
Implementations of the present disclosure include methods, systems, and computer-
readable storage mediums for receiving goal data and start-up information, the goal data …
readable storage mediums for receiving goal data and start-up information, the goal data …
Assessing vulnerability impact using call graphs
Implementations are directed to enhancing assessment of one or more known vulnerabilities
inside one or more third-party libraries used within an application program that interacts with …
inside one or more third-party libraries used within an application program that interacts with …
Secure mobile data sharing
Implementations of the present disclosure include methods, systems, and computer-
readable storage mediums for providing secure mobile data sharing. Actions can include …
readable storage mediums for providing secure mobile data sharing. Actions can include …
Techniques and system for optimization driven by dynamic resilience
B Gudka, E Barnum - US Patent 10,936,458, 2021 - Google Patents
Disclosed are hardware and techniques for testing computer processes in a network system
by simulating computer process faults and identifying risk associated with correcting the …
by simulating computer process faults and identifying risk associated with correcting the …
Software patch evaluator
Automated systems and methods for assessing the urgency of installing a patch for a
component of a software application are described. The systems and methods involve …
component of a software application are described. The systems and methods involve …
Techniques and system for optimization driven by dynamic resilience
B Gudka, E Barnum - US Patent 10,824,528, 2020 - Google Patents
Disclosed are hardware and techniques for testing computer processes in a network system
by simulating computer process faults and identifying risk associated with correcting the …
by simulating computer process faults and identifying risk associated with correcting the …
Systems, devices, and methods for generation of contextual objects mapped by dimensional data to data measures
A Vivalda, F Del Franco, S Costantini, A Pratico… - US Patent …, 2014 - Google Patents
This disclosure in part describes systems, devices, and methods for implementing a
unification mechanism that enables the unification of various data sets, which can permit …
unification mechanism that enables the unification of various data sets, which can permit …
Tracing software execution of a business process
Y Liu, HG Beuter, P Deora, M Schnack… - US Patent …, 2014 - Google Patents
Various embodiments of systems and methods to trace an execution of a business process
are disclosed. Business rules and corresponding business objects required to execute the …
are disclosed. Business rules and corresponding business objects required to execute the …
Identifier-based application security
Abstract Systems, methods, and computer media for securing software applications are
provided herein. Through the use of an identifier such as a digital fingerprint, application …
provided herein. Through the use of an identifier such as a digital fingerprint, application …