Patents by Inventor Bugra Karabey

Bugra Karabey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11924250
    Abstract: Disclosed herein is a system for minimizing the amount of time it takes to process and understand an unstructured, text-heavy document that includes important security-related information. The system uses a model that implements natural language processing techniques to semantically analyze an unstructured, text-heavy document, in order to identify notable security features useable to resolve the security issues in a more effective and efficient manner (e.g., without the need for a technical security professional). More specifically, the system receives an unstructured document that includes text which may be provided by multiple different security providers. The system is configured to apply the model to various text segments (e.g., a phrase, a sentence, a paragraph, etc.) included in the unstructured document to identify notable security features. The model can then associate the notable security features with a prescribed set of mitigation actions that can be implemented to resolve a security issue.
    Type: Grant
    Filed: April 21, 2021
    Date of Patent: March 5, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Bugra Karabey, Muhammad Ali Siddiqui, Jing Han Shiau, Meenal Srivastva, Subramanian Nagarajan
  • Publication number: 20230224324
    Abstract: Generally discussed herein are devices, systems, and methods for improved cyber attack response. A method can include receiving, at a compute device, a natural language description of activity on a computer network, executing, based on the natural language description, a natural language processing (NLP) model to provide a tactic and technique of a cyber attack associated with the natural language description, determining, based on the provided tactic and technique, a response to mitigate the cyber attack, and implementing the determined response on the computer network.
    Type: Application
    Filed: January 13, 2022
    Publication date: July 13, 2023
    Inventors: Bugra KARABEY, Tvisha Gangwani, Houtan Faridi, Priyatham Allala
  • Publication number: 20220345489
    Abstract: Disclosed herein is a system for minimizing the amount of time it takes to process and understand an unstructured, text-heavy document that includes important security-related information. The system uses a model that implements natural language processing techniques to semantically analyze an unstructured, text-heavy document, in order to identify notable security features useable to resolve the security issues in a more effective and efficient manner (e.g., without the need for a technical security professional). More specifically, the system receives an unstructured document that includes text which may be provided by multiple different security providers. The system is configured to apply the model to various text segments (e.g., a phrase, a sentence, a paragraph, etc.) included in the unstructured document to identify notable security features. The model can then associate the notable security features with a prescribed set of mitigation actions that can be implemented to resolve a security issue.
    Type: Application
    Filed: April 21, 2021
    Publication date: October 27, 2022
    Inventors: Bugra KARABEY, Muhammad Ali SIDDIQUI, Jing Han SHIAU, Meenal SRIVASTVA, Subramanian NAGARAJAN
  • Patent number: 8353045
    Abstract: In one aspect, a method to assess information security vulnerability of an enterprise includes storing enterprise objectives in a computer system, storing enterprise resources determined using a value criterion, a rareness criterion, an inimitability criterion and a non-substitutability criterion in the computer system and storing enterprise information assets in the computer system. The method also includes mapping the enterprise objectives with the enterprise resources and mapping the enterprise information assets with the enterprise resources. The method further includes determining a threat analysis using an attack tree using the enterprise resources and the information assets and determining a risk value using the attack tree.
    Type: Grant
    Filed: June 29, 2009
    Date of Patent: January 8, 2013
    Inventors: Bugra Karabey, Nazife Baykal
  • Publication number: 20100333002
    Abstract: In one aspect, a method to assess information security vulnerability of an enterprise includes storing enterprise objectives in a computer system, storing enterprise resources determined using a value criterion, a rareness criterion, an inimitability criterion and a non-substitutability criterion in the computer system and storing enterprise information assets in the computer system. The method also includes mapping the enterprise objectives with the enterprise resources and mapping the enterprise information assets with the enterprise resources. The method further includes determining a threat analysis using an attack tree using the enterprise resources and the information assets and determining a risk value using the attack tree.
    Type: Application
    Filed: June 29, 2009
    Publication date: December 30, 2010
    Inventors: Bugra Karabey, Nazife Baykal