Patents by Inventor Baha Masoud

Baha Masoud has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220286304
    Abstract: To write forgettable data to a blockchain, the forgettable data is transmitted to a server, from which encrypted data corresponding to the forgettable data are received. A hash of the forgettable data is generated. A data block including the encrypted data and control data including the hash is added to the blockchain.
    Type: Application
    Filed: December 23, 2019
    Publication date: September 8, 2022
    Applicant: MICRO FOCUS LLC
    Inventors: Lloyd L. Burch, Michael F. Angelo, Baha Masoud, Larry Hal Henderson
  • Patent number: 11372980
    Abstract: A method includes, by a computer associated with a security reporter, updating a component vulnerability entry blockchain to represent a state of a component vulnerability entry of a software component vulnerability database. The method includes, by the computer, providing the updated component vulnerability entry blockchain to a management authority so that the management authority updates a master blockchain for the software component vulnerability database. The updated master blockchain includes a plurality of component vulnerability entry blockchains, which represent corresponding states of component vulnerability entries of the software component vulnerability database, including the updated component vulnerability entry.
    Type: Grant
    Filed: June 14, 2019
    Date of Patent: June 28, 2022
    Assignee: NETIQ CORPORATION
    Inventors: Michael F. Angelo, Lloyd L. Burch, Baha Masoud
  • Patent number: 11277261
    Abstract: In some examples, in response to detecting addition or update of a program component of a program, a system creates a blockchain entry for addition to a blockchain register, generates a hash based on the program component, and adds in the blockchain entry a signed hash produced by encrypting the generated hash. The system publishes the blockchain entry for the blockchain, the signed hash in a blockchain entry useable to detect tampering with the program component.
    Type: Grant
    Filed: September 21, 2018
    Date of Patent: March 15, 2022
    Assignee: NETIQ CORPORATION
    Inventors: Michael F. Angelo, Lloyd Leon Burch, Baha Masoud
  • Patent number: 11210404
    Abstract: A technique includes determining, by a computer, entries of a software vulnerability database that is associated with a plurality of components associated with a release of a software product. The technique includes determining, by the computer, a block of a blockchain representing a vulnerability state of the plurality of components; and associating, by the computer, the block of the blockchain with the product release.
    Type: Grant
    Filed: June 14, 2019
    Date of Patent: December 28, 2021
    Assignee: NETIQ CORPORATION
    Inventors: Michael F. Angelo, Lloyd L. Burch, Baha Masoud
  • Patent number: 10992706
    Abstract: Response to incorrect passwords being entered for usernames in attempts to access a computing system, each incorrect password is one-way hashed. The hashed incorrect passwords are stored within a database. High-frequency hashed incorrect passwords are determined from the stored hashed incorrect passwords. Each high-frequency hashed incorrect password corresponds to an incorrect password that was entered more than a threshold number of the attempts, regardless of the username for which the incorrect password was entered in any attempt. That the computing system is being subjected to a cyber attack is detected based on the determined high-frequency hashed incorrect passwords.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: April 27, 2021
    Assignee: NETIQ CORPORATION
    Inventors: Lloyd Burch, Michael F. Angelo, Baha Masoud
  • Publication number: 20200394308
    Abstract: A technique includes determining, by a computer, entries of a software vulnerability database that is associated with a plurality of components associated with a release of a software product. The technique includes determining, by the computer, a block of a blockchain representing a vulnerability state of the plurality of components; and associating, by the computer, the block of the blockchain with the product release.
    Type: Application
    Filed: June 14, 2019
    Publication date: December 17, 2020
    Inventors: Michael F. Angelo, Lloyd L. Burch, Baha Masoud
  • Publication number: 20200394309
    Abstract: A method includes, by a computer associated with a security reporter, updating a component vulnerability entry blockchain to represent a state of a component vulnerability entry of a software component vulnerability database. The method includes, by the computer, providing the updated component vulnerability entry blockchain to a management authority so that the management authority updates a master blockchain for the software component vulnerability database. The updated master blockchain includes a plurality of component vulnerability entry blockchains, which represent corresponding states of component vulnerability entries of the software component vulnerability database, including the updated component vulnerability entry.
    Type: Application
    Filed: June 14, 2019
    Publication date: December 17, 2020
    Inventors: Michael F. Angelo, Lloyd L. Burch, Baha Masoud
  • Publication number: 20200351299
    Abstract: Response to incorrect passwords being entered for usernames in attempts to access a computing system, each incorrect password is one-way hashed. The hashed incorrect passwords are stored within a database. High-frequency hashed incorrect passwords are determined from the stored hashed incorrect passwords. Each high-frequency hashed incorrect password corresponds to an incorrect password that was entered more than a threshold number of the attempts, regardless of the username for which the incorrect password was entered in any attempt. That the computing system is being subjected to a cyber attack is detected based on the determined high-frequency hashed incorrect passwords.
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Inventors: Lloyd Burch, Michael F. Angelo, Baha Masoud
  • Patent number: 10817614
    Abstract: A pool of files are analyzed for relationships between the files. At least some of the files in the pool are encrypted files. The relationships are represented by distances between the files plotted on a graph in two or more dimensions. A point on the graph representing a particular file. The graph includes an interactive interface, such that points or clusters of points can be selected for re-analyzing and re-plotting on a refreshed graph for just those selected points or clusters.
    Type: Grant
    Filed: August 27, 2015
    Date of Patent: October 27, 2020
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Baha Masoud
  • Patent number: 10798068
    Abstract: A secure server detects a login from a user originating from a first device. A second user-registered device is sent a message. The second device: translates the message into light-based communication that is captured by a camera of the first device, translates the message back into the original message, and sends the translated message to the secure server. The secure server authenticates the message and sends an indication to the first device that the second device is permitted to access the first device. In an embodiment, information passed between the first and second devices continue using light-based communications.
    Type: Grant
    Filed: May 4, 2018
    Date of Patent: October 6, 2020
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Baha Masoud
  • Publication number: 20200099513
    Abstract: In some examples, in response to detecting addition or update of a program component of a program, a system creates a blockchain entry for addition to a blockchain register, generates a hash based on the program component, and adds in the blockchain entry a signed hash produced by encrypting the generated hash. The system publishes the blockchain entry for the blockchain, the signed hash in a blockchain entry useable to detect tampering with the program component.
    Type: Application
    Filed: September 21, 2018
    Publication date: March 26, 2020
    Inventors: Michael F. Angelo, Lloyd Leon Burch, Baha Masoud
  • Patent number: 10530763
    Abstract: A late-binding token (LBT) is securely generated and provided to a device application. When the LBT is presented and validated, a resource associated with the presentation is bound to the LBT and authenticated for access to a service and provided valid credentials for accessing that service.
    Type: Grant
    Filed: April 13, 2017
    Date of Patent: January 7, 2020
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Atul Mahajan, Stuart Jensen, Baha Masoud
  • Patent number: 10432619
    Abstract: An app of a mobile device registers the mobile device for a remote credential server (RCS) and receives a device token. When a credential for a remote asset is supplied on the mobile device it is routed to the RCS and stored external to the mobile device but referenced on the mobile device via an asset token. When the credential is needed, the device token and the asset token permit the RCS to authenticate and return the credential to or on behalf of the mobile device so that the mobile device can authenticate to and access the remote asset.
    Type: Grant
    Filed: March 12, 2018
    Date of Patent: October 1, 2019
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Michael F. Angelo, Baha Masoud
  • Patent number: 10380331
    Abstract: Multi-touch groupings of characters are detected for device authentication and access. In an embodiment, one or more non-character based factors are used in combination with an inputted authentication code (character based) for device authentication and access.
    Type: Grant
    Filed: October 14, 2014
    Date of Patent: August 13, 2019
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Baha Masoud
  • Patent number: 10305995
    Abstract: Techniques for device independent session migration are presented. A secure mechanism is presented for a target device to receive a current authenticated communication session from an original device with minimal user interaction while automated security is enforced during session migration. In an embodiment, the target device is a mobile device and the original device is a desktop; the target device captures a data glyph that is visually presented on a display of the original device and the data glyph is then seamlessly communicated to a server manager for authentication and session migration.
    Type: Grant
    Filed: February 29, 2016
    Date of Patent: May 28, 2019
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Baha Masoud, Michael F. Angelo
  • Patent number: 10270741
    Abstract: A user of a system defines a limited use access token for an external user for that external user to access defined resources of the system based on the user's account with the system. An access control system validates the access token when the external user attempts to access the defined resources and grants the external principal access to the defined resources.
    Type: Grant
    Filed: January 25, 2016
    Date of Patent: April 23, 2019
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Robert Skousen Stilmar, Duane Fredrick Buss, Baha Masoud
  • Patent number: 10171470
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: January 1, 2019
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Patent number: 10097994
    Abstract: Techniques for resetting authentication for touch-enabled devices are presented. When a user authenticates to a mobile device a touch profile (TP) is recorded. Each subsequent time the user unlocks a locked mobile device via touch, a new TP is noted. The new TP is compared to the recorded TP and if the deviation is within an acceptable tolerance, the user is permitted access to the mobile device without re-authentication. When the new TP is not within the acceptable tolerance of the recorded TP, the user is forced to re-authenticate before access is granted to the mobile device.
    Type: Grant
    Filed: March 14, 2016
    Date of Patent: October 9, 2018
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Michael F. Angelo, Baha Masoud
  • Publication number: 20180270225
    Abstract: An app of a mobile device registers the mobile device for a remote credential server (RCS) and receives a device token. When a credential for a remote asset is supplied on the mobile device it is routed to the RCS and stored external to the mobile device but referenced on the mobile device via an asset token. When the credential is needed, the device token and the asset token permit the RCS to authenticate and return the credential to or on behalf of the mobile device so that the mobile device can authenticate to and access the remote asset.
    Type: Application
    Filed: March 12, 2018
    Publication date: September 20, 2018
    Inventors: Lloyd Leon Burch, Michael F. Angelo, Baha Masoud
  • Publication number: 20180255032
    Abstract: A secure server detects a login from a user originating from a first device. A second user-registered device is sent a message. The second device: translates the message into light-based communication that is captured by a camera of the first device, translates the message back into the original message, and sends the translated message to the secure server. The secure server authenticates the message and sends an indication to the first device that the second device is permitted to access the first device. In an embodiment, information passed between the first and second devices continue using light-based communications.
    Type: Application
    Filed: May 4, 2018
    Publication date: September 6, 2018
    Inventors: Lloyd Leon Burch, Baha Masoud