Using static analysis for vulnerability detection
PW O'hearn, TM Reed, Y Chen… - US Patent 12,034,754, 2024 - Google Patents
Using static analysis for vulnerability detection, including: inspecting, using an
underapproximate static code analysis, a non-executable representation of an application to …
underapproximate static code analysis, a non-executable representation of an application to …
Hierarchical graph analysis
Y Chen, HKB Singh, M Bog, V Kapoor - US Patent 11,256,759, 2022 - Google Patents
the invention can be implemented in numerous ways, including as a process; an apparatus;
a system; a composition of matter; a computer program product embodied on a computer …
a system; a composition of matter; a computer program product embodied on a computer …
Using data transformations for monitoring a cloud compute environment
AK Nanduri, P Jalan, MA Vanninen, AG Ekbote… - US Patent …, 2023 - Google Patents
Example systems and methods monitor a cloud compute environment. An example method
includes an agent obtaining a data packet from an interface in the cloud compute …
includes an agent obtaining a data packet from an interface in the cloud compute …
User session-based generation of logical graphs and detection of anomalies
HKB Singh, V Kapoor, M Bog, Y Chen - US Patent 11,689,553, 2023 - Google Patents
Log data associated with at least one user session in a network environment associated with
an original user is received. A logical graph is generated using at least a portion of the …
an original user is received. A logical graph is generated using at least a portion of the …
Monitoring communications in a containerized environment
R Sachdeva, V Kapoor - US Patent 11,770,464, 2023 - Google Patents
A frame is received at an agent. The frame is analyzed to determine that the frame is
associated with a first known pod. IP information is reported to a backend process. The …
associated with a first known pod. IP information is reported to a backend process. The …
Graph-based query composition
Y Chen, S Kalra, V Kapoor - US Patent 11,637,849, 2023 - Google Patents
Businesses and other entities often make use of datacenters to provide a variety of
computing resources. Increasingly, those resources are being virtualized. Such virtualization …
computing resources. Increasingly, those resources are being virtualized. Such virtualization …
Using graph-based models to identify anomalies in a network environment
V Kapoor, SJ Pullara III, M Bog, Y Chen… - US Patent …, 2023 - Google Patents
US11677772B1 - Using graph-based models to identify anomalies in a network
environment - Google Patents US11677772B1 - Using graph-based models to identify …
environment - Google Patents US11677772B1 - Using graph-based models to identify …
Random walking and cluster-based random walking method, apparatus and device
Embodiments of the present specification disclose random walking and a cluster-based
random walking method, apparatus and device. A solution includes: obtaining information …
random walking method, apparatus and device. A solution includes: obtaining information …
Determining intent from a historical vector of a to-be-analyzed statement
HU Yuxiang - US Patent 11,551,007, 2023 - Google Patents
The disclosure relates to identifying a user intent of a statement. When a user intent of a to-
be-analyzed statement needs to be determined, at least one historical statement of the to-be …
be-analyzed statement needs to be determined, at least one historical statement of the to-be …
Tracking of user login sessions
M Bog, V Kapoor, SJ Pullara III, Y Chen… - US Patent …, 2024 - Google Patents
An illustrative method includes determining that a first user login session and a second user
login session have a parent-child relationship that indicates that a particular user is …
login session have a parent-child relationship that indicates that a particular user is …