Wysopal
Christopher J. Wysopal, Concord, MA US
Patent application number | Description | Published |
---|---|---|
20080209567 | ASSESSMENT AND ANALYSIS OF SOFTWARE SECURITY FLAWS - Security assessment and vulnerability testing of software applications is performed based at least in part on application metadata in order to determine an appropriate assurance level and associated test plan that includes multiple types of analysis. Steps from each test are combined into a “custom” or “application-specific” workflow, and the results of each test may then be correlated with other results to identify potential vulnerabilities and/or faults. | 08-28-2008 |
20100281248 | ASSESSMENT AND ANALYSIS OF SOFTWARE SECURITY FLAWS - Security assessment and vulnerability testing of software applications is performed based at least in part on application metadata in order to determine an appropriate assurance level and associated test plan that includes multiple types of analysis. Steps from each test are combined into a “custom” or “application-specific” workflow, and the results of each test may then be correlated with other results to identify potential vulnerabilities and/or faults. | 11-04-2010 |
20110173693 | Assessment and analysis of software security flaws - Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports. | 07-14-2011 |
20120072968 | ASSESSMENT AND ANALYSIS OF SOFTWARE SECURITY FLAWS IN VIRTUAL MACHINES - Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports. | 03-22-2012 |
Christopher J. Wysopal, Bedford, MA US
Patent application number | Description | Published |
---|---|---|
20130097706 | AUTOMATED BEHAVIORAL AND STATIC ANALYSIS USING AN INSTRUMENTED SANDBOX AND MACHINE LEARNING CLASSIFICATION FOR MOBILE SECURITY - The present system includes a computer-networked system that allows mobile subscribers, and others, to submit mobile applications to be analyzed for anomalous and malicious behavior using data acquired during the execution of the application within a highly instrumented and controlled environment for which the analysis relies on per-execution as well as comparative aggregate data across many such executions from one or more subscribers. | 04-18-2013 |
Jan Wysopal, Livermore, CA US
Patent application number | Description | Published |
---|---|---|
20150190278 | Vacuum Loss Detection During Laser Eye Surgery - Apparatus to treat an eye with an ophthalmic laser system comprises a patient interface having an annular retention structure to couple to an anterior surface of the eye. The retention structure is coupled to a suction line to couple the retention structure to the eye with suction. Liquid is added above the eye to act as a transmissive medium. A coupling sensor is coupled to the suction line to determine coupling of the retention structure to the eye. A separate pressure monitoring circuit having a much smaller volume than the suction line is connected to the annular retention structure to measure suction pressure therein. A system processor coupled to the monitoring pressure sensor includes instructions to interrupt firing of a laser when the pressure measured with a monitoring pressure sensor rises above a threshold amount. | 07-09-2015 |
Jan C. Wysopal, Livermore, CA US
Patent application number | Description | Published |
---|---|---|
20140128851 | LOW VOLTAGE COMMUNICATION BETWEEN SUBSYSTEMS IN A LASER EYE SURGERY SYSTEM - A laser eye surgery system comprises subsystems which communicate with one another through low voltage differential signaling (LVDS). The laser eye surgery system may comprise a first subsystem interface, including an LVDS driver or transmitter coupled to and in communication with an LVDS receiver of a first subsystem of the laser eye surgery system. The first laser eye surgery subsystem itself may comprise an LVDS transmitter coupled to and in communication with an LVDS receiver to return data to the first subsystem. Further laser eye surgery subsystems may also include the same arrangement of drivers and receivers with respective subsystem interfaces. LVDS lowers power consumption and the risk of error in communication between laser eye surgery systems, leading to safer and more reliable surgical procedures performed. | 05-08-2014 |
20140128856 | MONITORING LASER PULSE ENERGY IN A LASER EYE SURGERY SYSTEM - A photo detector is selectively coupled to a first integrator or a second integrator with switching circuitry when the laser pulses. An integration time of the signal from the photo detector can be substantially greater than an amount of time between successive laser beam pulses in order to provide an accurate measurement of each laser beam pulse of a high repetition rate pulsed laser. The laser may comprise a clock coupled to an optical switch of the laser system, and control circuitry can control switching and coupling of the detector to the first integrator or the second integrator in response to the clock signal. The first integrator and the second integrator can be selectively coupled to an output such that the first integrator or the second integrator is coupled to the output of the energy detection circuitry when the other integrator is coupled to the detector. | 05-08-2014 |