Patents by Inventor Bugra Karabey

Bugra Karabey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12278734
    Abstract: Embodiments provide for the self-registration and automatic inventorying of enterprise Internet-of-Things (IoT) devices in an enterprise environment. An asset inventory agent on a network among many networks (i.e., within the enterprise environment) can receive a data packet from a computing device. The data packet is communicated via the network shared between the asset inventory agent and the computing device. The asset inventory agent can analyze the data packet, which can reveal a communication protocol associated with the computing device. A discovery rule associated with the protocol can be selected to extract inventory information from the data packet. The inventory information can be utilized to generate a distributed ledger transaction, which is communicated to a set of nodes adapted to collectively store the inventory information associated with the computing device onto the distributed ledger.
    Type: Grant
    Filed: January 27, 2023
    Date of Patent: April 15, 2025
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Bugra Karabey, Andre Oneal Alfred, Tvisha Rajesh Gangwani, Priyatham Reddy Allala, Sasikumar Natarajan
  • Patent number: 11924250
    Abstract: Disclosed herein is a system for minimizing the amount of time it takes to process and understand an unstructured, text-heavy document that includes important security-related information. The system uses a model that implements natural language processing techniques to semantically analyze an unstructured, text-heavy document, in order to identify notable security features useable to resolve the security issues in a more effective and efficient manner (e.g., without the need for a technical security professional). More specifically, the system receives an unstructured document that includes text which may be provided by multiple different security providers. The system is configured to apply the model to various text segments (e.g., a phrase, a sentence, a paragraph, etc.) included in the unstructured document to identify notable security features. The model can then associate the notable security features with a prescribed set of mitigation actions that can be implemented to resolve a security issue.
    Type: Grant
    Filed: April 21, 2021
    Date of Patent: March 5, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Bugra Karabey, Muhammad Ali Siddiqui, Jing Han Shiau, Meenal Srivastva, Subramanian Nagarajan
  • Patent number: 8353045
    Abstract: In one aspect, a method to assess information security vulnerability of an enterprise includes storing enterprise objectives in a computer system, storing enterprise resources determined using a value criterion, a rareness criterion, an inimitability criterion and a non-substitutability criterion in the computer system and storing enterprise information assets in the computer system. The method also includes mapping the enterprise objectives with the enterprise resources and mapping the enterprise information assets with the enterprise resources. The method further includes determining a threat analysis using an attack tree using the enterprise resources and the information assets and determining a risk value using the attack tree.
    Type: Grant
    Filed: June 29, 2009
    Date of Patent: January 8, 2013
    Inventors: Bugra Karabey, Nazife Baykal
  • Publication number: 20100333002
    Abstract: In one aspect, a method to assess information security vulnerability of an enterprise includes storing enterprise objectives in a computer system, storing enterprise resources determined using a value criterion, a rareness criterion, an inimitability criterion and a non-substitutability criterion in the computer system and storing enterprise information assets in the computer system. The method also includes mapping the enterprise objectives with the enterprise resources and mapping the enterprise information assets with the enterprise resources. The method further includes determining a threat analysis using an attack tree using the enterprise resources and the information assets and determining a risk value using the attack tree.
    Type: Application
    Filed: June 29, 2009
    Publication date: December 30, 2010
    Inventors: Bugra Karabey, Nazife Baykal