Patent application number | Description | Published |
20080282352 | Modification of Messages for Analyzing the Security of Communication Protocols and Channels - A system is used to analyze the implementation of a protocol by a device-under-analysis (DUA). The system includes a source endpoint, a destination endpoint (the DUA), and a message generator. The source endpoint generates an original message and attempts to send it to the DUA. The original message is intercepted by the message generator, which generates a replacement message. The replacement message is then sent to the DUA instead of the original message. The replacement message is deliberately improper so as to analyze the DUA's implementation of the protocol. The message generator includes a structure recognition system and a mutation system. The structure recognition system determines the underlying structure and/or semantics of a message. After the structure recognition system has determined the structure, it creates a description of the structure (a structure description). The mutation system modifies the message based on the structure description to generate a replacement message. | 11-13-2008 |
20090083854 | Syntax-Based Security Analysis Using Dynamically Generated Test Cases - A security analysis methodology is used to analyze the security of a device-under-analysis (DUA) with respect to a particular protocol message exchange. First, the mutation points that exist in the message exchange are determined. Then, the message exchange is executed multiple times—once for each mutation point. Each execution applies the mutation associated with that particular mutation point (e.g., a particular message during the exchange is modified in a particular way) to create a mutated message exchange. In other words, each message exchange with an applied mutation point corresponds to a test case. | 03-26-2009 |
20100293415 | META-INSTRUMENTATION FOR SECURITY ANALYSIS - A system and method for analyzing and/or testing member devices in a multi-device system. The multi-device system includes a device-under-analysis (DUA) and a device-under-observation (DUO). An analyzer that is external to the multi-device system generates and sends test messages to the DUA. The analyzer monitors the health of the multi-device system through the DUO and detects a system-wide impact of the DUA caused by the test messages. The analyzer analyzes the DUA based on the test messages and the system-wide impact. | 11-18-2010 |
Patent application number | Description | Published |
20090259748 | SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING - A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing. | 10-15-2009 |
20120144476 | SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING - A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing. | 06-07-2012 |
20120151594 | SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING - A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing. | 06-14-2012 |
20120151595 | SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING - A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing. | 06-14-2012 |
20120151596 | SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING - A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing. | 06-14-2012 |
Patent application number | Description | Published |
20120136728 | NETWORKED ADVERTISEMENT EXCHANGE - A networked advertisement exchange system is described. The system includes a memory comprising a set of exchange rules, and a processor. The processor is configured to receive, from a client, an advertisement request, send, to each of a plurality of advertisement servers, a right-to-bid request, and receive, from each of the plurality of advertisement servers, a response to the right-to-bid request, each response comprising a bid price or a pass. The processor is also configured to select, based on the set of exchange rules, the winning response from the plurality of responses, and provide, to the client in response to the advertisement request, information for an advertisement associated with the winning response. The advertisement is a video. Methods and machine-readable media are also described. | 05-31-2012 |
20140282634 | AUDITED PIPELINED DISTRIBUTED SYSTEM FOR VIDEO ADVERTISEMENT EXCHANGES - Techniques and systems for operating a video ad exchange includes controlling an ad server to receive ad requests from viewer devices, provide ad responses to viewer devices, generate an ad delivery data file that includes information about delivery of ads to the viewer devices, and transfer the ad delivery data file to a distributed computing cloud. The technique further includes controlling an ad data infrastructure mechanism to download the cloud-based ad delivery data file into a local memory, and process the copied ad delivery data file to generate billing data. An ad data infrastructure mechanism receives a configuration file from the ad server, verifies that all items in the configuration file from the ad server were used in the generation of the first billing data, and removes non-verifiable items from the first billing data to generate a final billing data. | 09-18-2014 |
20140282716 | GEO, SEGMENT, UNIQUES DISTRIBUTED COMPUTING SYSTEM - A distributed computing system is configured to compute operational data for a video advertisement delivery system. Cloud-based resource are used to calculate operational parameters such as geographical data, unique advertisement delivery instances and segments of consumers that received the video advertisements. | 09-18-2014 |