Patents by Inventor Malek Ben Salem
Malek Ben Salem has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11924174Abstract: Methods, systems and apparatus, including computer programs encoded on computer storage medium, for implementation of secret superposition protocols. In one aspect a method includes, performing, by a sender party, quantum operations on one or more qubits, comprising preparing, according to a predetermined secret superposition protocol, one or more qubits in respective uniform superposition quantum states; transmitting, by the sender party, to a recipient party, and through a secure channel, data indicating use of the predetermined secret superposition protocol; and transmitting, by the sender party and to the recipient party, one or more of the qubits, to wherein the recipient party performs one or more measurements on the qubits to verify use of the predetermined secret superposition protocol.Type: GrantFiled: September 23, 2022Date of Patent: March 5, 2024Assignee: Accenture Global Solutions LimitedInventors: Benjamin Glen McCarty, Malek Ben Salem
-
Publication number: 20240045971Abstract: In some examples, scalable source code vulnerability remediation may include receiving source code that includes at least one vulnerability, and receiving remediated code that remediates the at least one vulnerability associated with the source code. At least one machine learning model may be trained to analyze a vulnerable code snippet of the source code. The vulnerable code snippet may correspond to the at least one vulnerability associated with the source code. The machine learning model may be trained to generate, for the vulnerable code snippet, a remediated code snippet to remediate the at least one vulnerability associated with the source code. The remediated code snippet may be validated based on an analysis of whether the remediated code snippet remediates the at least one vulnerability associated with the source code.Type: ApplicationFiled: November 4, 2021Publication date: February 8, 2024Applicant: Accenture Global Solutions LimitedInventors: Malek BEN SALEM, Mário Lauande LACROIX, Bai Chien KAO, Karthik RAJKUMAR KANNAN, Young Ki LEE
-
Publication number: 20240012623Abstract: A code remediation system accesses a programming code including vulnerabilities such as potential secrets and remediates at least a subset of the potential secrets to generate modified programming code wherein the subset of potential secrets which are determined to be actual secrets are replaced with access mechanisms to storage locations on a vault wherein the actual secrets are secured. To identify the subset of potential secrets forming the actual secrets to be remediated, the code remediation system is configured to filter out false positives among the potential secrets and identify true positives. When an application executing the modified code encounters an access mechanism, it accesses the vault to retrieve the actual secrets.Type: ApplicationFiled: July 3, 2023Publication date: January 11, 2024Applicant: Accenture Global Solutions LimitedInventors: Malek BEN SALEM, Ganesh Devarajan, John Donovan Delmare, JR., Krishna Mohan Dasari, Mário Lauande Lacroix, Cristian Daniel Ariza, Mohnish Gahlot
-
Patent number: 11863668Abstract: Methods, systems, and apparatus for transmitting qubits encoding quantum information with reduced risk of interception from an eavesdropper. In one aspect, a method includes encoding quantum information into an information qubit; encrypting the information qubit, comprising performing i) a parity operation on the information qubit and a parity control qubit and ii) a phase operation on the information qubit and a phase control qubit; performing, by a sender party, a sequence of one or more quantum logic gates on the phase control qubit; sending the information qubit, parity control qubit, and phase control qubit to a recipient party; and sending data identifying the sequence of one or more quantum logic gates to the recipient party, wherein the recipient party obtains the quantum information encoded into the information qubit using the information qubit, parity control qubit, phase control qubit, and data identifying the sequence of one or more quantum logic gates.Type: GrantFiled: June 9, 2022Date of Patent: January 2, 2024Assignee: Accenture Global Solutions LimitedInventors: Benjamin Glen McCarty, Malek Ben Salem
-
Publication number: 20230274003Abstract: A device may receive a machine learning model and training data utilized to train the machine learning model, and may perform a data veracity assessment of the training data to identify and remove poisoned data from the training data. The device may perform an adversarial assessment of the machine learning model to generate adversarial attacks and to provide defensive capabilities for the adversarial attacks, and may perform a membership inference assessment of the machine learning model to generate membership inference attacks and to provide secure training data as a defense for the membership inference attacks. The device may perform a model extraction assessment of the machine learning model to identify model extraction vulnerabilities and to provide a secure application programming interface as a defense to the model extraction vulnerabilities, and may perform actions based on results of one or more of the assessments.Type: ApplicationFiled: February 28, 2022Publication date: August 31, 2023Inventors: Changwei LIU, Louis DIVALENTIN, Neil Hayden LIBERMAN, Amin HASSANZADEH, Benjamin Glen MCCARTY, Malek BEN SALEM
-
Patent number: 11657466Abstract: A device may receive content data identifying content created by users and metadata associated with the content. The device may receive rules data identifying rules associated with utilization of the content. The device may utilize the metadata to generate digital DNA signatures for the content in near-real time. The device may store, in a repository, the rules data, the content, the digital DNA signatures, and relationships between the digital DNA signatures. The device may receive, from a client device, new content that is generated based on particular content of the content data and new metadata associated with the new content. The device may utilize the new metadata to generate a new digital DNA signature for the new content. The device may process the new digital DNA signature, the rules data, and the digital DNA signatures to determine whether the new content violates one or more rules of the rules data.Type: GrantFiled: August 31, 2020Date of Patent: May 23, 2023Assignee: Accenture Global Solutions LimitedInventors: Mohamed Aftkhar, Teresa Sheausan Tung, Kirby James Linvill, Malek Ben Salem, Zhijie Wang, Aritomo Shinozaki, Steven R. Roberts
-
Publication number: 20230067766Abstract: Methods, systems and apparatus, including computer programs encoded on computer storage medium, for implementation of secret superposition protocols. In one aspect a method includes, performing, by a sender party, quantum operations on one or more qubits, comprising preparing, according to a predetermined secret superposition protocol, one or more qubits in respective uniform superposition quantum states; transmitting, by the sender party, to a recipient party, and through a secure channel, data indicating use of the predetermined secret superposition protocol; and transmitting, by the sender party and to the recipient party, one or more of the qubits, wherein the recipient party performs one or more measurements on the qubits to verify use of the predetermined secret superposition protocol.Type: ApplicationFiled: September 23, 2022Publication date: March 2, 2023Inventors: Benjamin Glen McCarty, Malek Ben Salem
-
Publication number: 20230025754Abstract: Aspects of the present disclosure provide systems, methods, and computer-readable storage media that support secure training of machine learning (ML) models that preserves privacy in untrusted environments using distributed executable file packages. The executable file packages may include files, libraries, scripts, and the like that enable a cloud service provider configured to provide ML model training based on non-encrypted data to also support homomorphic encryption of data and ML model training with one or more clients, particularly for a diagnosis prediction model trained using medical data. Because the training is based on encrypted client data, private client data such as patient medical data may be used to train the diagnosis prediction model without exposing the client data to the cloud service provider or others. Using homomorphic encryption enables training of the diagnosis prediction model using encrypted data without requiring decryption prior to training.Type: ApplicationFiled: July 22, 2021Publication date: January 26, 2023Inventors: Amin Hassanzadeh, Neil Hayden Liberman, Aolin Ding, Malek Ben Salem
-
Publication number: 20220414661Abstract: Aspects of the present disclosure provide systems, methods, and computer-readable storage media that support cooperative training of machine learning (ML) models that preserves privacy in untrusted environments using distributed executable file packages. The executable file packages may include files, libraries, scripts, and the like that enable a cloud service provider configured to provide server-side ML model training to also support cooperative ML model training with multiple clients, particularly for a fraud prediction model for financial transactions. Because the cooperative training includes the clients training respective ML models and the server aggregating the trained ML models, private client data such as financial transaction data may be used to train the fraud prediction model without exposing the client data to others. Such cooperative ML model training enables offloading of computing resource-intensive training from client devices to the server and may train a more robust fraud detection model.Type: ApplicationFiled: June 23, 2021Publication date: December 29, 2022Inventors: Amin Hassanzadeh, Neil Hayden Liberman, Aolin Ding, Malek Ben Salem
-
Patent number: 11516190Abstract: Methods, systems and apparatus, including computer programs encoded on computer storage medium, for implementation of secret superposition protocols. In one aspect a method includes, performing, by a sender party, quantum operations on one or more qubits, comprising preparing, according to a predetermined secret superposition protocol, one or more qubits in respective uniform superposition quantum states; transmitting, by the sender party, to a recipient party, and through a secure channel, data indicating use of the predetermined secret superposition protocol; and transmitting, by the sender party and to the recipient party, one or more of the qubits, wherein the recipient party performs one or more measurements on the qubits to verify use of the predetermined secret superposition protocol.Type: GrantFiled: August 26, 2021Date of Patent: November 29, 2022Assignee: Accenture Global Solutions LimitedInventors: Benjamin Glen McCarty, Malek Ben Salem
-
Publication number: 20220321334Abstract: Methods, systems, and apparatus for transmitting qubits encoding quantum information with reduced risk of interception from an eavesdropper. In one aspect, a method includes encoding quantum information into an information qubit; encrypting the information qubit, comprising performing i) a parity operation on the information qubit and a parity control qubit and ii) a phase operation on the information qubit and a phase control qubit; performing, by a sender party, a sequence of one or more quantum logic gates on the phase control qubit; sending the information qubit, parity control qubit, and phase control qubit to a recipient party; and sending data identifying the sequence of one or more quantum logic gates to the recipient party, wherein the recipient party obtains the quantum information encoded into the information qubit using the information qubit, parity control qubit, phase control qubit, and data identifying the sequence of one or more quantum logic gates.Type: ApplicationFiled: June 9, 2022Publication date: October 6, 2022Inventors: Benjamin Glen McCarty, Malek Ben Salem
-
Patent number: 11387993Abstract: Methods, systems, and apparatus for transmitting qubits encoding quantum information with reduced risk of interception from an eavesdropper. In one aspect, a method includes encoding quantum information into an information qubit; encrypting the information qubit, comprising performing i) a parity operation on the information qubit and a parity control qubit and ii) a phase operation on the information qubit and a phase control qubit; performing, by a sender party, a sequence of one or more quantum logic gates on the phase control qubit; sending the information qubit, parity control qubit, and phase control qubit to a recipient party; and sending data identifying the sequence of one or more quantum logic gates to the recipient party, wherein the recipient party obtains the quantum information encoded into the information qubit using the information qubit, parity control qubit, phase control qubit, and data identifying the sequence of one or more quantum logic gates.Type: GrantFiled: July 10, 2020Date of Patent: July 12, 2022Assignee: Accenture Global Solutions LimitedInventors: Benjamin Glen McCarty, Malek Ben Salem
-
Publication number: 20220014364Abstract: Methods, systems, and apparatus for transmitting qubits encoding quantum information with reduced risk of interception from an eavesdropper. In one aspect, a method includes encoding quantum information into an information qubit; encrypting the information qubit, comprising performing i) a parity operation on the information qubit and a parity control qubit and ii) a phase operation on the information qubit and a phase control qubit; performing, by a sender party, a sequence of one or more quantum logic gates on the phase control qubit; sending the information qubit, parity control qubit, and phase control qubit to a recipient party; and sending data identifying the sequence of one or more quantum logic gates to the recipient party, wherein the recipient party obtains the quantum information encoded into the information qubit using the information qubit, parity control qubit, phase control qubit, and data identifying the sequence of one or more quantum logic gates.Type: ApplicationFiled: July 10, 2020Publication date: January 13, 2022Inventors: Benjamin Glen McCarty, Malek Ben Salem
-
Publication number: 20210233190Abstract: A device may receive content data identifying content created by users and metadata associated with the content. The device may receive rules data identifying rules associated with utilization of the content. The device may utilize the metadata to generate digital DNA signatures for the content in near-real time. The device may store, in a repository, the rules data, the content, the digital DNA signatures, and relationships between the digital DNA signatures. The device may receive, from a client device, new content that is generated based on particular content of the content data and new metadata associated with the new content. The device may utilize the new metadata to generate a new digital DNA signature for the new content. The device may process the new digital DNA signature, the rules data, and the digital DNA signatures to determine whether the new content violates one or more rules of the rules data.Type: ApplicationFiled: August 31, 2020Publication date: July 29, 2021Inventors: Mohamed AFTKHAR, Teresa Sheausan TUNG, Kirby James LINVILL, Malek BEN SALEM, Zhijie WANG, Aritomo SHINOZAKI, Steven R. ROBERTS
-
Publication number: 20210209203Abstract: A device may receive digital content and may process the digital content, with at least one of an optimization-based poisoning model or a statistical-based poisoning model, to generate at least one of first poisoning data or second poisoning data, respectively. The device may generate new digital content based on the digital content and the at least one of the first poisoning data or the second poisoning data. The device may provide the new digital content to one or more devices to be accessed by at least one deepfake model used to create fake digital content and may perform one or more actions based on the new digital content.Type: ApplicationFiled: January 5, 2021Publication date: July 8, 2021Inventors: Leah DING, Xiaoyong YUAN, Malek BEN SALEM
-
Patent number: 11023295Abstract: A device may extract content, path data, and query data from API requests, and may identify events based on the extracted data. The device may combine a sequence of the events with the events to generate sequence-embedded events, and may train a neural network model with the sequence-embedded events to generate a trained neural network model. The device may receive an API request, may extract new content, new path data, and new query data from the API request, and may identify new events based on the newly extracted data. The device may process the new events, with the trained neural network model, to generate predicted events, and may calculate an anomaly score based on the predicted events. The device may compare the anomaly score with a threshold to determine a risk for the API request, and may cause the API request to be blocked or permitted based on the risk.Type: GrantFiled: October 25, 2019Date of Patent: June 1, 2021Assignee: Accenture Global Solutions LimitedInventors: Lei Ding, Xiaoyong Yuan, Malek Ben Salem
-
Patent number: 11019104Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for service oriented software-defined security framework are disclosed. In one aspect, a system includes a security control device, one or more assets, and a security controller that communicates with the security control device and the one or more assets. The security controller includes a processing engine configured to register the security control device by creating a physical-logical attribute mapping for the security control device, and generating a security service description associated with the security control device. The processing engine is further configured to register the one or more assets by creating a physical-logical attribute mapping for each of the one or more assets, and generating security service requirements for each of the one or more assets. The processing engine is further configured to generate a security service binding based on a request for service.Type: GrantFiled: April 20, 2020Date of Patent: May 25, 2021Assignee: Accenture Global Solutions LimitedInventors: Song Luo, Malek Ben Salem
-
Publication number: 20210124628Abstract: A device may extract content, path data, and query data from API requests, and may identify events based on the extracted data. The device may combine a sequence of the events with the events to generate sequence-embedded events, and may train a neural network model with the sequence-embedded events to generate a trained neural network model. The device may receive an API request, may extract new content, new path data, and new query data from the API request, and may identify new events based on the newly extracted data. The device may process the new events, with the trained neural network model, to generate predicted events, and may calculate an anomaly score based on the predicted events. The device may compare the anomaly score with a threshold to determine a risk for the API request, and may cause the API request to be blocked or permitted based on the risk.Type: ApplicationFiled: October 25, 2019Publication date: April 29, 2021Inventors: Lei DING, Xiaoyong YUAN, Malek BEN SALEM
-
Patent number: 10880328Abstract: Examples of malware detection are provided. In an example, to detect malwares, a first subset of features may be determined from a binary file. The binary file may be analyzed based on machine learning model to determine a category of malware, which is based on a degree of detectability of the category. A first category may have a lower detectability of malware in the binary file and a second category may have a higher detectability than the first. A model may then be created to analyze the first category of malware and an analysis of the binary may be performed. The analysis may be performed using the model. Thereafter, a confidence score may be generated for the binary file. The confidence score may be indicative of certainty of determining whether the binary file is goodware or includes malware. Malware may be detected upon the confidence score exceeding a threshold value.Type: GrantFiled: November 16, 2018Date of Patent: December 29, 2020Assignee: ACCENTURE GLOBAL SOLUTIONS LIMITEDInventors: Nahid Farhady, Malek Ben Salem
-
Publication number: 20200252432Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for service oriented software-defined security framework are disclosed. In one aspect, a system includes a security control device, one or more assets, and a security controller that communicates with the security control device and the one or more assets. The security controller includes a processing engine configured to register the security control device by creating a physical-logical attribute mapping for the security control device, and generating a security service description associated with the security control device. The processing engine is further configured to register the one or more assets by creating a physical-logical attribute mapping for each of the one or more assets, and generating security service requirements for each of the one or more assets. The processing engine is further configured to generate a security service binding based on a request for service.Type: ApplicationFiled: April 20, 2020Publication date: August 6, 2020Inventors: Song Luo, Malek Ben Salem