Patents by Inventor Shimon Modi
Shimon Modi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10944772Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for obtaining, processing, and presenting data related to security events, and for implementing courses of action to protect assets in response to the security events. An event management module identifies malicious activity present on a first network domain and/or a second network domain based on received network domain activity. A threat intelligence module receives data identifying the malicious activity in first data constructs of a predefined data structure. The threat intelligence module obtains additional data related to the identified malicious activity and generates second data constructs that include enriched data regarding the malicious activity. The enriched data includes data describing a campaign in which at least a portion of the malicious activity is involved and one or more courses of action. A course of action module receives the second data constructs and implements a given course of action.Type: GrantFiled: November 15, 2018Date of Patent: March 9, 2021Assignee: Accenture Global Solutions LimitedInventors: Shaan Mulchandani, Amin Hassanzadeh, Elvis Hovor, Shimon Modi, Walid Negm
-
Patent number: 10880320Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for creating structured data using data received from unstructured textual data sources. One of the methods includes receiving unstructured textual data, identifying one or more keywords in the unstructured textual data, determining one or more patterns included in the unstructured textual data using the identified keywords, identifying one or more intelligence types that correspond with the unstructured textual data using the determined patterns, and associating, for each of the identified intelligence types, a data subset from the unstructured textual data with the respective intelligence type.Type: GrantFiled: July 26, 2018Date of Patent: December 29, 2020Assignee: Accenture Global Services LimitedInventors: Elvis Hovor, Shimon Modi, Shubhashis Sengupta, Roshni Ramesh Ramnani, Annervaz Karukapadath Mohamedrasheed
-
Patent number: 10824736Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for facilitating communication in an industrial control network. A system includes an industrial control network, one or more controller devices, one or more emulators, and an encryption relay processor. Each controller device can be operable to control one or more operational devices connected to the industrial control network. Each emulator can be configured to communicate with a respective controller device, and each emulator can be configured to reference a respective profile that includes information about security capabilities of the respective controller device. The encryption relay processor can be operable to facilitate communication to and from each emulator over the industrial control network.Type: GrantFiled: November 27, 2017Date of Patent: November 3, 2020Assignee: Accenture Global Services LimitedInventors: Song Luo, Walid Negm, James J. Solderitsch, Shaan Mulchandani, Amin Hassanzadeh, Shimon Modi
-
Patent number: 10776398Abstract: Techniques are described for receiving data generated by multiple platforms of different types, and managing the data in multiple stages of a data lifecycle associated with a super-platform. An end-user (e.g., data discloser) may interact with multiple individual (e.g., siloed) platforms of different types. The individual platforms may generate data describing, and/or resulting from, these interactions with end-user(s). The data from the various individual platforms may be received, ingested, stored, analyzed, aggregated, and/or otherwise processed by a super-platform during various stages of a data lifecycle. In some implementations, the end-user, the super-platform, and/or the individual platform(s) may provide one or more restrictions on how the data may be handled in each of the stages of the data lifecycle.Type: GrantFiled: April 11, 2016Date of Patent: September 15, 2020Assignee: Accenture Global Solutions LimitedInventors: Steven Tiell, Shimon Modi, Chetan R. Kundavaram
-
Patent number: 10678814Abstract: Techniques are described for receiving data generated by multiple platforms of different types, and managing the data in multiple stages of a data lifecycle associated with a super-platform. An end-user (e.g., data discloser) may interact with multiple individual (e.g., siloed) platforms of different types. The individual platforms may generate data describing, and/or resulting from, these interactions with end-user(s). The data from the various individual platforms may be received, ingested, stored, analyzed, aggregated, and/or otherwise processed by a super-platform during various stages of a data lifecycle. In some implementations, the end-user, the super-platform, and/or the individual platform(s) may provide one or more restrictions on how the data may be handled in each of the stages of the data lifecycle.Type: GrantFiled: April 11, 2016Date of Patent: June 9, 2020Assignee: Accenture Global Solutions LimitedInventors: Steven Tiell, Shimon Modi, Chetan R. Kundavaram
-
Patent number: 10599679Abstract: Techniques are described for aggregating data generated by multiple platforms of different types. A particular user (e.g., end-user) may interact with multiple individual (e.g., siloed) platforms of different types and/or that support different business purposes or industries. The individual platforms may generate data describing and/or resulting from these interactions. The data may be received, ingested, and processed by a super-platform. The super-platform may generate aggregate data by aggregating the data received from different individual platforms. Data aggregation may be performed on data that is generated by different individual platforms and that is associated with a particular user or multiple users. Aggregation may also be performed on data that is independent of any particular user, such as sensor data that describes an environment in proximity to the platform.Type: GrantFiled: April 7, 2016Date of Patent: March 24, 2020Assignee: Accenture Global Solutions LimitedInventors: Steven C. Tiell, Edy S. Liongosari, Chetan R. Kundavaram, Shimon Modi
-
Patent number: 10509806Abstract: Techniques are described for receiving data generated by multiple platforms of different types, and determining recommendations for end-user(s) of the multiple platforms based on an analysis of the received data. An end-user may interact with multiple individual platforms of different types. The individual platforms may generate data describing, and/or resulting from, such interactions. The data may be received, ingested, stored, analyzed, and/or otherwise processed by a super-platform. The data may be aggregated and the data and/or aggregate data may be analyzed by a recommendation engine executing on the super-platform to determine one or more recommendations for a particular end-user based on an analysis of the data and/or aggregate data associated with that end-user. Such recommendation(s) may be provided to the end-user through an end-user interface and/or search engine provided by the super-platform, or through a third-party entity.Type: GrantFiled: April 7, 2016Date of Patent: December 17, 2019Assignee: Accenture Global Solutions LimitedInventors: Steven C. Tiell, Edy S. Liongosari, Chetan R. Kundavaram, Shimon Modi
-
Publication number: 20190089727Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for obtaining, processing, and presenting data related to security events, and for implementing courses of action to protect assets in response to the security events. An event management module identifies malicious activity present on a first network domain and/or a second network domain based on received network domain activity. A threat intelligence module receives data identifying the malicious activity in first data constructs of a predefined data structure. The threat intelligence module obtains additional data related to the identified malicious activity and generates second data constructs that include enriched data regarding the malicious activity. The enriched data includes data describing a campaign in which at least a portion of the malicious activity is involved and one or more courses of action. A course of action module receives the second data constructs and implements a given course of action.Type: ApplicationFiled: November 15, 2018Publication date: March 21, 2019Inventors: Shaan Mulchandani, Amin Hassanzadeh, Elvis Hovor, Shimon Modi, Walid Negm
-
Publication number: 20180359267Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for creating structured data using data received from unstructured textual data sources. One of the methods includes receiving unstructured textual data, identifying one or more keywords in the unstructured textual data, determining one or more patterns included in the unstructured textual data using the identified keywords, identifying one or more intelligence types that correspond with the unstructured textual data using the determined patterns, and associating, for each of the identified intelligence types, a data subset from the unstructured textual data with the respective intelligence type.Type: ApplicationFiled: July 26, 2018Publication date: December 13, 2018Inventors: Elvis Hovor, Shimon Modi, Shubhashis Sengupta, Roshni Ramesh Ramnani, Annervaz Karukapadath Mohamedrasheed
-
Patent number: 10148679Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for obtaining, processing, and presenting data related to security events, and for implementing courses of action to protect assets in response to the security events. An event management module identifies malicious activity present on a first network domain and/or a second network domain based on received network domain activity. A threat intelligence module receives data identifying the malicious activity in first data constructs of a predefined data structure. The threat intelligence module obtains additional data related to the identified malicious activity and generates second data constructs that include enriched data regarding the malicious activity. The enriched data includes data describing a campaign in which at least a portion of the malicious activity is involved and one or more courses of action. A course of action module receives the second data constructs and implements a given course of action.Type: GrantFiled: February 23, 2016Date of Patent: December 4, 2018Assignee: Accenture Global Solutions LimitedInventors: Shaan Mulchandani, Amin Hassanzadeh, Elvis Hovor, Shimon Modi, Walid Negm
-
Patent number: 10148685Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network security threat response. A data structure that represents communication events between computing devices of two or more network domains is received. The data structure is analyzed and a threat scenario that is based on a chain of communication events that indicates a potential attack path is determined. The chain of communication events include a sequence of communication events between computing devices proceeding from an originating computing device to a destination computing device, wherein the originating computing device and the destination computing device exist on different network domains. Attack pattern data, for the threat scenario and from a threat intelligence data source, that is associated with communications between computing devices that occurred during one or more prior attacks is received.Type: GrantFiled: July 17, 2017Date of Patent: December 4, 2018Assignee: Accenture Global Services LimitedInventors: Amin Hassanzadeh, Shimon Modi, Shaan Mulchandani, Walid Negm
-
Patent number: 10063573Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for creating structured data using data received from unstructured textual data sources. One of the methods includes receiving unstructured textual data, identifying one or more keywords in the unstructured textual data, determining one or more patterns included in the unstructured textual data using the identified keywords, identifying one or more intelligence types that correspond with the unstructured textual data using the determined patterns, and associating, for each of the identified intelligence types, a data subset from the unstructured textual data with the respective intelligence type.Type: GrantFiled: February 13, 2017Date of Patent: August 28, 2018Assignee: Accenture Global Services LimitedInventors: Elvis Hovor, Shimon Modi, Shubhashis Sengupta, Roshni Ramesh Ramnani, Annervaz Karukapadath Mohamedrasheed
-
Publication number: 20180144144Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for facilitating communication in an industrial control network. A system includes an industrial control network, one or more controller devices, one or more emulators, and an encryption relay processor. Each controller device can be operable to control one or more operational devices connected to the industrial control network. Each emulator can be configured to communicate with a respective controller device, and each emulator can be configured to reference a respective profile that includes information about security capabilities of the respective controller device. The encryption relay processor can be operable to facilitate communication to and from each emulator over the industrial control network.Type: ApplicationFiled: November 27, 2017Publication date: May 24, 2018Inventors: Song Luo, Walid Negm, James J. Solderitsch, Shaan Mulchandani, Amin Hassanzadeh, Shimon Modi
-
Patent number: 9870476Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for facilitating secure communication. A system for facilitating secure communication includes an enterprise network, one or more operational technology networks, and a management server. Each of the operational technology networks can include one or more controller devices operable to control one or more operational devices, and can include a respective site security server and a respective security relay server. The security relay server can be operable to facilitate secure communication between controller devices of the operational technology network and its corresponding site security server. The management server can be a node on the enterprise network and can be operable to communicate with each site security server.Type: GrantFiled: August 28, 2015Date of Patent: January 16, 2018Assignee: Accenture Global Services LimitedInventors: Song Luo, Walid Negm, James J. Solderitsch, Shaan Mulchandani, Amin Hassanzadeh, Shimon Modi
-
Patent number: 9864864Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for facilitating communication in an industrial control network. A system includes an industrial control network, one or more controller devices, one or more emulators, and an encryption relay processor. Each controller device can be operable to control one or more operational devices connected to the industrial control network. Each emulator can be configured to communicate with a respective controller device, and each emulator can be configured to reference a respective profile that includes information about security capabilities of the respective controller device. The encryption relay processor can be operable to facilitate communication to and from each emulator over the industrial control network.Type: GrantFiled: August 28, 2015Date of Patent: January 9, 2018Assignee: Accenture Global Services LimitedInventors: Song Luo, Walid Negm, James J. Solderitsch, Shaan Mulchandani, Amin Hassanzadeh, Shimon Modi
-
Publication number: 20170318050Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network security threat response. A data structure that represents communication events between computing devices of two or more network domains is received. The data structure is analyzed and a threat scenario that is based on a chain of communication events that indicates a potential attack path is determined. The chain of communication events include a sequence of communication events between computing devices proceeding from an originating computing device to a destination computing device, wherein the originating computing device and the destination computing device exist on different network domains. Attack pattern data, for the threat scenario and from a threat intelligence data source, that is associated with communications between computing devices that occurred during one or more prior attacks is received.Type: ApplicationFiled: July 17, 2017Publication date: November 2, 2017Inventors: Amin Hassanzadeh, Shimon Modi, Shaan Mulchandani, Walid Negm
-
Patent number: 9762617Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing data that includes security threat information. One of the methods includes identifying intelligence types that each categorizes a subset of data, associating, for each of the intelligence types, each of the subsets of data, which are categorized by the respective intelligence type, with the respective intelligence type, determining rules for a third party that each indicate that the third party should receive data associated with particular types of potential security threats and priority information for the data, determining, for each of the potential security threats indicated in the rules, a group of the subsets that include information associated with the respective potential security threat, assigning, for each subset in each of the groups, a priority to the respective subset using the priority information, and providing the determined subsets to the third party using the respective priorities.Type: GrantFiled: May 16, 2016Date of Patent: September 12, 2017Assignee: Accenture Global Services LimitedInventors: Shimon Modi, Stephen A. Schall
-
Patent number: 9742788Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for correlating domain activity data. First domain activity data from a first network domain and second domain activity data from a second network domain is received. The first domain activity data and the second domain activity data is filtered to remove irrelevant activity data, based on a first set of profile data for devices in the first network domain and a second set of profile data for devices in the second network domain. Unfiltered first and second domain activity data is aggregated. Aggregated unfiltered first and second domain activity data is correlated to determine an attack path for an attack that occurs across the first network domain and the second network domain, based on attack signatures and profiles associated with previously identified attacks. A visualization of the attack path is generated.Type: GrantFiled: August 31, 2015Date of Patent: August 22, 2017Assignee: Accenture Global Services LimitedInventors: Amin Hassanzadeh, Shimon Modi, Shaan Mulchandani, Walid Negm
-
Patent number: 9716721Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for creating structured data using data received from unstructured textual data sources. One of the methods includes receiving unstructured textual data, identifying one or more keywords in the unstructured textual data, determining one or more patterns included in the unstructured textual data using the identified keywords, identifying one or more intelligence types that correspond with the unstructured textual data using the determined patterns, and associating, for each of the identified intelligence types, a data subset from the unstructured textual data with the respective intelligence type.Type: GrantFiled: August 29, 2014Date of Patent: July 25, 2017Assignee: Accenture Global Services LimitedInventors: Elvis Hovor, Shimon Modi, Shubhashis Sengupta, Roshni Ramesh Ramnani, Annervaz Karukapadath Mohamedrasheed
-
Patent number: 9712554Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for transforming representations of network activity data. A data structure that represents communication events between computing devices of one or more networks is received. The data structure is analyzed and a set of potential attack paths represented in the data structure is determined. A score is assigned to each potential attack path in the set of potential attack paths. Potential attack paths that have scores that do not meet a predetermined threshold are removed from the set of potential attack paths. Potential attack paths that remain in the set of potential attack paths are ranked, based on each score assigned to each potential attack path, and the data structure that includes a ranked set of potential attack paths is provided.Type: GrantFiled: August 31, 2015Date of Patent: July 18, 2017Assignee: Accenture Global Services LimitedInventors: Amin Hassanzadeh, Shimon Modi, Shaan Mulchandani, Walid Negm