Using static analysis for vulnerability detection

PW O'hearn, TM Reed, Y Chen… - US Patent 12,034,754, 2024 - Google Patents
Using static analysis for vulnerability detection, including: inspecting, using an
underapproximate static code analysis, a non-executable representation of an application to …

Consumer insights analysis using word embeddings

JM Arfa, NG Nawathe, B Kauder… - US Patent …, 2020 - Google Patents
In one embodiment, a method includes receiving a request to generate a visualization of
public sentiments regarding a particular subject by a plurality of clusters, where each cluster …

Hierarchical graph analysis

Y Chen, HKB Singh, M Bog, V Kapoor - US Patent 11,256,759, 2022 - Google Patents
the invention can be implemented in numerous ways, including as a process; an apparatus;
a system; a composition of matter; a computer program product embodied on a computer …

Using data transformations for monitoring a cloud compute environment

AK Nanduri, P Jalan, MA Vanninen, AG Ekbote… - US Patent …, 2023 - Google Patents
Example systems and methods monitor a cloud compute environment. An example method
includes an agent obtaining a data packet from an interface in the cloud compute …

User session-based generation of logical graphs and detection of anomalies

HKB Singh, V Kapoor, M Bog, Y Chen - US Patent 11,689,553, 2023 - Google Patents
Log data associated with at least one user session in a network environment associated with
an original user is received. A logical graph is generated using at least a portion of the …

Monitoring communications in a containerized environment

R Sachdeva, V Kapoor - US Patent 11,770,464, 2023 - Google Patents
A frame is received at an agent. The frame is analyzed to determine that the frame is
associated with a first known pod. IP information is reported to a backend process. The …

Graph-based query composition

Y Chen, S Kalra, V Kapoor - US Patent 11,637,849, 2023 - Google Patents
Businesses and other entities often make use of datacenters to provide a variety of
computing resources. Increasingly, those resources are being virtualized. Such virtualization …

Using graph-based models to identify anomalies in a network environment

V Kapoor, SJ Pullara III, M Bog, Y Chen… - US Patent …, 2023 - Google Patents
US11677772B1 - Using graph-based models to identify anomalies in a network
environment - Google Patents US11677772B1 - Using graph-based models to identify …

Tracking of user login sessions

M Bog, V Kapoor, SJ Pullara III, Y Chen… - US Patent …, 2024 - Google Patents
An illustrative method includes determining that a first user login session and a second user
login session have a parent-child relationship that indicates that a particular user is …

Enhancing security of a cloud deployment based on learnings from other cloud deployments

Ú Erlingsson, Y Chen - US Patent 12,126,695, 2024 - Google Patents
Learning from other cloud deployments to combat security threats, including: identifying, for
at least a portion of a first cloud deployment, one or more additional cloud deployments to …