Patents by Inventor Anurag Agarwal
Anurag Agarwal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11883228Abstract: An electronic stethoscope system comprising a device to capture an acoustic heart signal from a patient and a neural network to classify the data into heart sound categories to provide time series sound category data comprising, for each of a succession of time intervals, category probability data representing a probability of the acoustic signal falling into each of the categories. The stethoscope also includes one or more heart state models each having a sequence of heart cardiac cycle states, a system to fit the time series sound category data to the models and determine timing data for the sequence of heart states and a confidence value for the model fit, and an output to output one or both of a model fit indication dependent upon the confidence value and an indication of the timing data.Type: GrantFiled: February 20, 2019Date of Patent: January 30, 2024Assignee: CAMBRIDGE ENTERPRISE LIMITEDInventors: Anurag Agarwal, Edmund Kay, Andrew McDonald
-
Patent number: 11620386Abstract: Threat modeling methods include providing one or more data stores storing threat model components, threats, and security requirements, each threat associated with at least one of the threat model components, each security requirement including a stored indication of whether it is a compensating control, and each compensating control associated with one of the threats. One or more computing devices communicatively coupled with the one or more data stores display a relational diagram of a system, an application, and/or a process, using visual representations of the threat model components, the diagram defining a threat model. The one or more computing devices display a threat report displaying each threat associated with one of the threat model components included in the threat model. The one or more computing devices further display a compensating control report displaying each compensating control that is associated with one of the threats included in the threat report.Type: GrantFiled: March 15, 2021Date of Patent: April 4, 2023Assignee: ThreatModeler Software Inc.Inventor: Anurag Agarwal
-
Patent number: 11568059Abstract: Threat modeling systems include one or more computing device(s) coupled with one or more data store(s), the computing device(s) including a first software application. The data store(s) associate threats with threat model components. One or more mapping files may couple with the data store(s) to correlate the threat model components with visual diagram components of a second software application (“second software diagram components”). A machine learning (ML) algorithm may alternatively or additionally be configured to select, for each second software diagram component, a corresponding threat model component. An import interface initiates reading of a data file generated by the second software application, the data file including a subset of the second software diagram components and defining relationships therebetween.Type: GrantFiled: July 9, 2020Date of Patent: January 31, 2023Assignee: ThreatModeler Software Inc.Inventor: Anurag Agarwal
-
Patent number: 11468173Abstract: Threat modeling systems include one or more computing device(s) coupled with one or more data store(s), the computing device(s) including a first software application. The data store(s) associate threats with threat model components. One or more mapping files may couple with the data store(s) to correlate the threat model components with visual diagram components of a second software application (“second software diagram components”). A machine learning (ML) algorithm may alternatively or additionally be configured to select, for each second software diagram component, a corresponding threat model component. An import interface initiates reading of a data file generated by the second software application, the data file including a subset of the second software diagram components and defining relationships therebetween.Type: GrantFiled: July 9, 2020Date of Patent: October 11, 2022Assignee: ThreatModeler Software Inc.Inventor: Anurag Agarwal
-
Patent number: 11396825Abstract: A turbine diagnostic machine learning system builds one or more turbine engine performance models using one or more parameter or parameter characteristics. A model of turbine engine performance includes ranked parameters or parameter characteristics, the ranking of which is calculated by a model builder based upon a function of AIC, AUC and p-value, resulting in a corresponding importance rank. These raw parameters and raw parameter characteristics are then sorted according to their importance rank, and selected by a selection component to form one or more completed models. The one or more models are operatively coupled to one or more other models to facilitate further machine learning capabilities by the system.Type: GrantFiled: August 14, 2017Date of Patent: July 26, 2022Assignee: GENERAL ELECTRIC COMPANYInventors: Anurag Agarwal, Rajesh Alla, Frank Gruber, Lorenzo Escriche
-
Patent number: 11295339Abstract: In general, this specification relates to content presentation. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of presenting an ad within a mobile application interface of a mobile device; receiving a user selection of the ad; determining that a browser session is to be initiated in response to the user selection of the ad; generating a request URL, using one or more processors, where the request URL includes a device identifier for the mobile device; and submitting the URL request using the browser including: determining whether an ad cookie associated with the ad exists on the browser, and if the cookie associated with the ad exists, sending an ad cookie identifier along with the request. Other embodiments of this aspect include corresponding systems, apparatus, and computer program products.Type: GrantFiled: November 30, 2020Date of Patent: April 5, 2022Assignee: Google LLCInventors: Ping Wu, Anurag Agarwal
-
Publication number: 20210294898Abstract: Threat modeling methods include providing one or more data stores storing threat model components, threats, and security requirements, each threat associated with at least one of the threat model components, each security requirement including a stored indication of whether it is a compensating control, and each compensating control associated with one of the threats. One or more computing devices communicatively coupled with the one or more data stores display a relational diagram of a system, an application, and/or a process, using visual representations of the threat model components, the diagram defining a threat model. The one or more computing devices display a threat report displaying each threat associated with one of the threat model components included in the threat model. The one or more computing devices further display a compensating control report displaying each compensating control that is associated with one of the threats included in the threat report.Type: ApplicationFiled: March 15, 2021Publication date: September 23, 2021Applicant: ThreatModeler Software Inc.Inventor: Anurag Agarwal
-
Publication number: 20210169442Abstract: An electronic stethoscope system comprising a device to capture an acoustic heart signal from a patient and a neural network to classify the data into heart sound categories to provide time series sound category data comprising, for each of a succession of time intervals, category probability data representing a probability of the acoustic signal falling into each of the categories. The stethoscope also includes one or more heart state models each having a sequence of heart cardiac cycle states, a system to fit the time series sound category data to the models and determine timing data for the sequence of heart states and a confidence value for the model fit, and an output to output one or both of a model fit indication dependent upon the confidence value and an indication of the timing data.Type: ApplicationFiled: February 20, 2019Publication date: June 10, 2021Inventors: Anurag Agarwal, Edmund Kay, Andrew McDonald
-
Patent number: 10984112Abstract: Automated threat modeling methods include providing one or more servers and one or more data stores communicatively coupled with the server(s). The data store(s) may include a plurality of threat model components stored therein (stored components) and a plurality of threats stored therein (stored threats), each stored threat associated through the data store(s) with at least one of the stored components. Using one or more input fields displayed on one or more computing devices communicatively coupled with at least one of the server(s), one or more inputs are received, the input(s) including access credentials associated with an existing computing environment and one or more inputs configured to initiate, using the server(s) and the access credentials, automatic generation of a relational diagram (diagram) of the existing computing environment and automatic generation of a threat report. Automated modeling systems include systems configured to carry out automated modeling of an existing computing environment.Type: GrantFiled: August 17, 2020Date of Patent: April 20, 2021Assignee: ThreatModeler Software Inc.Inventor: Anurag Agarwal
-
Publication number: 20200380138Abstract: Automated threat modeling methods include providing one or more servers and one or more data stores communicatively coupled with the server(s). The data store(s) may include a plurality of threat model components stored therein (stored components) and a plurality of threats stored therein (stored threats), each stored threat associated through the data store(s) with at least one of the stored components. Using one or more input fields displayed on one or more computing devices communicatively coupled with at least one of the server(s), one or more inputs are received, the input(s) including access credentials associated with an existing computing environment and one or more inputs configured to initiate, using the server(s) and the access credentials, automatic generation of a relational diagram (diagram) of the existing computing environment and automatic generation of a threat report. Automated modeling systems include systems configured to carry out automated modeling of an existing computing environment.Type: ApplicationFiled: August 17, 2020Publication date: December 3, 2020Applicant: ThreatModeler Software Inc.Inventor: Anurag Agarwal
-
Publication number: 20200342116Abstract: Threat modeling systems include one or more computing device(s) coupled with one or more data store(s), the computing device(s) including a first software application. The data store(s) associate threats with threat model components. One or more mapping files may couple with the data store(s) to correlate the threat model components with visual diagram components of a second software application (“second software diagram components”). A machine learning (ML) algorithm may alternatively or additionally be configured to select, for each second software diagram component, a corresponding threat model component. An import interface initiates reading of a data file generated by the second software application, the data file including a subset of the second software diagram components and defining relationships therebetween.Type: ApplicationFiled: July 9, 2020Publication date: October 29, 2020Applicant: ThreatModeler Software Inc.Inventor: Anurag Agarwal
-
Patent number: 10747876Abstract: Modeling methods include providing one or more data stores storing model components and in some cases threats, each threat associated with at least one model components. A relational diagram of a system, application or process is displayed on one or more user interfaces. The diagram includes visual representations of the model components and defines a model. In response to adding a model component to the model, a list of one or more model components associated with the added model component is displayed, along with an indication of whether the model components are required to be added to the model. In some implementations a threat report is displayed on a threat report interface and includes each threat that is associated through the data store(s) with one of the model components in the model. Modeling systems and threat modeling systems include systems configured to carry out the modeling and threat modeling methods.Type: GrantFiled: October 25, 2019Date of Patent: August 18, 2020Assignee: ThreatModeler Software Inc.Inventor: Anurag Agarwal
-
Publication number: 20200258017Abstract: Systems and methods for allocating flights to aircraft stands are provided. In one example aspect, a system includes one or more computing devices. The computing devices are configured to generate a stand recovery plan that reallocates flights to available aircraft stands following a flight schedule disruption. Flights associated with an aircraft stand conflict can be reallocated to aircraft stands that are available within a determined time slot, by ensuring that the available aircraft stands meet one or more scheduling constraints or criteria, and based at least in part on a determined weighted total walk time. The weighted total walk time takes into account the estimated walk time between aircraft stands and/or their associated gates as well as the connecting time between flights. Once aircraft stands are reallocated to flights associated with the identified aircraft stand conflict(s), a stand recovery plan can be generated in real time.Type: ApplicationFiled: February 11, 2020Publication date: August 13, 2020Inventors: Aparna Rajaguru, Anurag Agarwal
-
Patent number: 10713366Abstract: Threat modeling systems include one or more computing devices communicatively coupled with one or more databases, the database(s) including threat model components and threats associated with one another. One or more mapping files coupled with the database(s) correlate the threat model components with visual diagram components of a third party software application. An import interface initiates reading of a third party generated data file by the computing device(s), the data file including a subset of the third party diagram components and relationships between the subset. An interface receiving input initiates a determination of threat model components correlated with the subset. A diagram interface displays a relational diagram using visual representations of threat model components correlated with the subset, the relational diagram defining a threat model.Type: GrantFiled: August 15, 2019Date of Patent: July 14, 2020Assignee: ThreatModeler Software Inc.Inventor: Anurag Agarwal
-
Patent number: 10699008Abstract: Threat model chaining methods include providing one or more databases including a threat model components, threats, each threat associated with at least one of the threat model components, and compensating controls, each compensating control associate with one of the threats, providing a diagram interface configured to display a relational diagram defining a first threat model, and configuring the diagram interface to add a component group to the first threat model include in it a second threat model. Attack simulation methods include providing the one or more databases and diagram interface and configuring the diagram interface to visually display attack paths of threats associated with diagrammed threat model components which compromise a selected threat model component.Type: GrantFiled: December 20, 2018Date of Patent: June 30, 2020Assignee: ThreatModeler Software Inc.Inventor: Anurag Agarwal
-
Patent number: 10664603Abstract: Threat modeling methods include, in response to receiving user input using computing device interfaces: storing threat model components, threats, and security requirements in a one or more database(s); associating each threat with a component; storing an indication of whether each security requirement is a compensating control; associating each compensating control with one of the threats; displaying a diagram of one of a system, an application, and a process, using visual representations of the components, the diagram defining a threat model, displaying a threat report displaying each threat associated with one of the components included in the threat model; and; displaying a report displaying each compensating control associated with one of the threats included in the threat report.Type: GrantFiled: February 7, 2019Date of Patent: May 26, 2020Assignee: ThreatModeler Software Inc.Inventor: Anurag Agarwal
-
Publication number: 20200057851Abstract: Modeling methods include providing one or more data stores storing model components and in some cases threats, each threat associated with at least one model components. A relational diagram of a system, application or process is displayed on one or more user interfaces. The diagram includes visual representations of the model components and defines a model. In response to adding a model component to the model, a list of one or more model components associated with the added model component is displayed, along with an indication of whether the model components are required to be added to the model. In some implementations a threat report is displayed on a threat report interface and includes each threat that is associated through the data store(s) with one of the model components in the model. Modeling systems and threat modeling systems include systems configured to carry out the modeling and threat modeling methods.Type: ApplicationFiled: October 25, 2019Publication date: February 20, 2020Applicant: ThreatModeler Software Inc.Inventor: Anurag Agarwal
-
Publication number: 20190370477Abstract: Threat modeling systems include one or more computing devices communicatively coupled with one or more databases, the database(s) including threat model components and threats associated with one another. One or more mapping files coupled with the database(s) correlate the threat model components with visual diagram components of a third party software application. An import interface initiates reading of a third party generated data file by the computing device(s), the data file including a subset of the third party diagram components and relationships between the subset. An interface receiving input initiates a determination of threat model components correlated with the subset. A diagram interface displays a relational diagram using visual representations of threat model components correlated with the subset, the relational diagram defining a threat model.Type: ApplicationFiled: August 15, 2019Publication date: December 5, 2019Applicant: ThreatModeler Software Inc.Inventor: Anurag Agarwal
-
Publication number: 20190205544Abstract: Threat modeling methods include, in response to receiving user input using computing device interfaces: storing threat model components, threats, and security requirements in a one or more database(s); associating each threat with a component; storing an indication of whether each security requirement is a compensating control; associating each compensating control with one of the threats; displaying a diagram of one of a system, an application, and a process, using visual representations of the components, the diagram defining a threat model, displaying a threat report displaying each threat associated with one of the components included in the threat model; and; displaying a report displaying each compensating control associated with one of the threats included in the threat report.Type: ApplicationFiled: February 7, 2019Publication date: July 4, 2019Applicant: ThreatModeler Software Inc.Inventor: Anurag Agarwal
-
Publication number: 20190147161Abstract: Threat model chaining methods include providing one or more databases including a threat model components, threats, each threat associated with at least one of the threat model components, and compensating controls, each compensating control associate with one of the threats, providing a diagram interface configured to display a relational diagram defining a first threat model, and configuring the diagram interface to add a component group to the first threat model include in it a second threat model. Attack simulation methods include providing the one or more databases and diagram interface and configuring the diagram interface to visually display attack paths of threats associated with diagrammed threat model components which compromise a selected threat model component.Type: ApplicationFiled: December 20, 2018Publication date: May 16, 2019Applicant: ThreatModeler Software Inc.Inventor: Anurag Agarwal