Patents by Inventor Anoop Singhal
Anoop Singhal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9325729Abstract: Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.Type: GrantFiled: July 7, 2014Date of Patent: April 26, 2016Assignees: George Mason Research Foundation, Inc., The United States of America, as represented by the Secretary of Commerce, The National Institute of Standards and TechnologyInventors: Sushil Jajodia, Lingyu Wang, Steven Noel, Anoop Singhal
-
Patent number: 8918884Abstract: Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.Type: GrantFiled: January 11, 2012Date of Patent: December 23, 2014Assignees: The United States of America, as represented by the Secretary of Commerce, The National Institute of Standards and Technology, George Mason Intellectual Properties, Inc.Inventors: Sushil Jajodia, Lingyu Wang, Steven Noel, Anoop Singhal
-
Publication number: 20140325660Abstract: Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.Type: ApplicationFiled: July 7, 2014Publication date: October 30, 2014Inventors: Sushil JAJODIA, Lingyu WANG, Steven NOEL, Anoop SINGHAL
-
Patent number: 8566269Abstract: An attack graph analysis tool that includes a network configuration information input module, a domain knowledge input module, a network configuration information storage module, a domain knowledge storage module, and a result generation module. The network configuration information input module inputs network configuration information. The domain knowledge input module inputs domain knowledge for the network. The network configuration information storage module stores network configuration information in a network database table. The domain knowledge storage module stores the domain knowledge in an exploit database table. The result generation module generates a result using the network database table and exploit database table. The result may be generated in response to a query to a database management system that has access to the network database table and exploit database table.Type: GrantFiled: July 31, 2007Date of Patent: October 22, 2013Assignee: George Mason Intellectual Properties, Inc.Inventors: Sushil Jajodia, Lingyu Wang, Anoop Singhal
-
Publication number: 20120233699Abstract: Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.Type: ApplicationFiled: January 11, 2012Publication date: September 13, 2012Inventors: Sushil JAJODIA, Lingyu Wang, Steven Noel, Anoop Singhal
-
Patent number: 7378287Abstract: The invention provides a method for matching micromirror wafers and electrode wafers so as to form micromirror array devices while the production yield is maximized. Each micromirror wafer and/or electrode wafer may have one or more non-passing dies and a plurality of good dies. A set of matching schemes are defined for matching each micromirror wafer with an electrode wafer. For each matching scheme, a cost is calculated with the cost being defined as a total number of unmatched die assemblies resulted from the matching scheme, wherein the unmatched die assembly is defined as an assembly consisting of a passing and non-passing die. Then a matching scheme is selected from the defined matching scheme such that the calculated cost is the minimum among the calculated costs of the defined matching schemes.Type: GrantFiled: June 23, 2004Date of Patent: May 27, 2008Assignee: Texas Instruments IncorporatedInventors: Y. Dan Rubinstein, Anoop Singhal
-
Publication number: 20080046393Abstract: An attack graph analysis tool that includes a network configuration information input module, a domain knowledge input module, a network configuration information storage module, a domain knowledge storage module, and a result generation module. The network configuration information input module inputs network configuration information. The domain knowledge input module inputs domain knowledge for the network. The network configuration information storage module stores network configuration information in a network database table. The domain knowledge storage module stores the domain knowledge in an exploit database table. The result generation module generates a result using the network database table and exploit database table. The result may be generated in response to a query to a database management system that has access to the network database table and exploit database table.Type: ApplicationFiled: July 31, 2007Publication date: February 21, 2008Inventors: Sushil Jajodia, Lingyu Wang, Anoop Singhal
-
Patent number: 7233928Abstract: A method for computing a price quote for a product using a contract. The method includes identifying the set of price rules for a plurality of products associated with the contract. Each price rule in the set of price rules is either a hard price rule or a soft price rule. Each hard price rule includes a price rule expression and a price rule type and each soft price rule comprises a price rule type. A collection of price rules is generated including, for each soft rule in the set of price rules, hard price rules that are associated with the product and that have the same price rule type as the soft price rule. Hard price rules that are associated with the contract are also added to the collection of price rules. A pricing scheme that is to be used in order to determine the price quote for the product is selected and used to resolve the hard price rules in the collection of price rules in order to determine the price quote.Type: GrantFiled: April 12, 2002Date of Patent: June 19, 2007Assignee: Vendavo, Inc.Inventors: Anamarie E. Huerta, Anoop Singhal, James Louis Keesey, Sri Raghupathy, Narayanan Vijaykumar
-
Publication number: 20050287694Abstract: The invention provides a method for matching micromirror wafers and electrode wafers so as to form micromirror array devices while the production yield is maximized. Each micromirror wafer and/or electrode wafer may have one or more non-passing dies and a plurality of good dies. A set of matching schemes are defined for matching each micromirror wafer with an electrode wafer. For each matching scheme, a cost is calculated with the cost being defined as a total number of unmatched die assemblies resulted from the matching scheme, wherein the unmatched die assembly is defined as an assembly consisting of a passing and non-passing die. Then a matching scheme is selected from the defined matching scheme such that the calculated cost is the minimum among the calculated costs of the defined matching schemes.Type: ApplicationFiled: June 23, 2004Publication date: December 29, 2005Inventors: Y. Dan Rubinstein, Anoop Singhal
-
Publication number: 20030200185Abstract: A method for computing a price quote for a product using a contract. The method includes identifying the set of price rules for a plurality of products associated with the contract. Each price rule in the set of price rules is either a hard price rule or a soft price rule. Each hard price rule includes a price rule expression and a price rule type and each soft price rule comprises a price rule type. A collection of price rules is generated including, for each soft rule in the set of price rules, hard price rules that are associated with the product and that have the same price rule type as the soft price rule. Hard price rules that are associated with the contract are also added to the collection of price rules. A pricing scheme that is to be used in order to determine the price quote for the product is selected and used to resolve the hard price rules in the collection of price rules in order to determine the price quote.Type: ApplicationFiled: April 12, 2002Publication date: October 23, 2003Inventors: Anamarie E. Huerta, Anoop Singhal, James Louis Keesey, Sri Raghupathy, Narayanan Vijaykumar