Patents by Inventor Anoop Singhal

Anoop Singhal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9325729
    Abstract: Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.
    Type: Grant
    Filed: July 7, 2014
    Date of Patent: April 26, 2016
    Assignees: George Mason Research Foundation, Inc., The United States of America, as represented by the Secretary of Commerce, The National Institute of Standards and Technology
    Inventors: Sushil Jajodia, Lingyu Wang, Steven Noel, Anoop Singhal
  • Patent number: 8918884
    Abstract: Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.
    Type: Grant
    Filed: January 11, 2012
    Date of Patent: December 23, 2014
    Assignees: The United States of America, as represented by the Secretary of Commerce, The National Institute of Standards and Technology, George Mason Intellectual Properties, Inc.
    Inventors: Sushil Jajodia, Lingyu Wang, Steven Noel, Anoop Singhal
  • Publication number: 20140325660
    Abstract: Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.
    Type: Application
    Filed: July 7, 2014
    Publication date: October 30, 2014
    Inventors: Sushil JAJODIA, Lingyu WANG, Steven NOEL, Anoop SINGHAL
  • Patent number: 8566269
    Abstract: An attack graph analysis tool that includes a network configuration information input module, a domain knowledge input module, a network configuration information storage module, a domain knowledge storage module, and a result generation module. The network configuration information input module inputs network configuration information. The domain knowledge input module inputs domain knowledge for the network. The network configuration information storage module stores network configuration information in a network database table. The domain knowledge storage module stores the domain knowledge in an exploit database table. The result generation module generates a result using the network database table and exploit database table. The result may be generated in response to a query to a database management system that has access to the network database table and exploit database table.
    Type: Grant
    Filed: July 31, 2007
    Date of Patent: October 22, 2013
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Sushil Jajodia, Lingyu Wang, Anoop Singhal
  • Publication number: 20120233699
    Abstract: Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.
    Type: Application
    Filed: January 11, 2012
    Publication date: September 13, 2012
    Inventors: Sushil JAJODIA, Lingyu Wang, Steven Noel, Anoop Singhal
  • Patent number: 7378287
    Abstract: The invention provides a method for matching micromirror wafers and electrode wafers so as to form micromirror array devices while the production yield is maximized. Each micromirror wafer and/or electrode wafer may have one or more non-passing dies and a plurality of good dies. A set of matching schemes are defined for matching each micromirror wafer with an electrode wafer. For each matching scheme, a cost is calculated with the cost being defined as a total number of unmatched die assemblies resulted from the matching scheme, wherein the unmatched die assembly is defined as an assembly consisting of a passing and non-passing die. Then a matching scheme is selected from the defined matching scheme such that the calculated cost is the minimum among the calculated costs of the defined matching schemes.
    Type: Grant
    Filed: June 23, 2004
    Date of Patent: May 27, 2008
    Assignee: Texas Instruments Incorporated
    Inventors: Y. Dan Rubinstein, Anoop Singhal
  • Publication number: 20080046393
    Abstract: An attack graph analysis tool that includes a network configuration information input module, a domain knowledge input module, a network configuration information storage module, a domain knowledge storage module, and a result generation module. The network configuration information input module inputs network configuration information. The domain knowledge input module inputs domain knowledge for the network. The network configuration information storage module stores network configuration information in a network database table. The domain knowledge storage module stores the domain knowledge in an exploit database table. The result generation module generates a result using the network database table and exploit database table. The result may be generated in response to a query to a database management system that has access to the network database table and exploit database table.
    Type: Application
    Filed: July 31, 2007
    Publication date: February 21, 2008
    Inventors: Sushil Jajodia, Lingyu Wang, Anoop Singhal
  • Patent number: 7233928
    Abstract: A method for computing a price quote for a product using a contract. The method includes identifying the set of price rules for a plurality of products associated with the contract. Each price rule in the set of price rules is either a hard price rule or a soft price rule. Each hard price rule includes a price rule expression and a price rule type and each soft price rule comprises a price rule type. A collection of price rules is generated including, for each soft rule in the set of price rules, hard price rules that are associated with the product and that have the same price rule type as the soft price rule. Hard price rules that are associated with the contract are also added to the collection of price rules. A pricing scheme that is to be used in order to determine the price quote for the product is selected and used to resolve the hard price rules in the collection of price rules in order to determine the price quote.
    Type: Grant
    Filed: April 12, 2002
    Date of Patent: June 19, 2007
    Assignee: Vendavo, Inc.
    Inventors: Anamarie E. Huerta, Anoop Singhal, James Louis Keesey, Sri Raghupathy, Narayanan Vijaykumar
  • Publication number: 20050287694
    Abstract: The invention provides a method for matching micromirror wafers and electrode wafers so as to form micromirror array devices while the production yield is maximized. Each micromirror wafer and/or electrode wafer may have one or more non-passing dies and a plurality of good dies. A set of matching schemes are defined for matching each micromirror wafer with an electrode wafer. For each matching scheme, a cost is calculated with the cost being defined as a total number of unmatched die assemblies resulted from the matching scheme, wherein the unmatched die assembly is defined as an assembly consisting of a passing and non-passing die. Then a matching scheme is selected from the defined matching scheme such that the calculated cost is the minimum among the calculated costs of the defined matching schemes.
    Type: Application
    Filed: June 23, 2004
    Publication date: December 29, 2005
    Inventors: Y. Dan Rubinstein, Anoop Singhal
  • Publication number: 20030200185
    Abstract: A method for computing a price quote for a product using a contract. The method includes identifying the set of price rules for a plurality of products associated with the contract. Each price rule in the set of price rules is either a hard price rule or a soft price rule. Each hard price rule includes a price rule expression and a price rule type and each soft price rule comprises a price rule type. A collection of price rules is generated including, for each soft rule in the set of price rules, hard price rules that are associated with the product and that have the same price rule type as the soft price rule. Hard price rules that are associated with the contract are also added to the collection of price rules. A pricing scheme that is to be used in order to determine the price quote for the product is selected and used to resolve the hard price rules in the collection of price rules in order to determine the price quote.
    Type: Application
    Filed: April 12, 2002
    Publication date: October 23, 2003
    Inventors: Anamarie E. Huerta, Anoop Singhal, James Louis Keesey, Sri Raghupathy, Narayanan Vijaykumar