Patents by Inventor Ehsan Masud

Ehsan Masud has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11048738
    Abstract: A method in one embodiment comprises defining a plurality of fields in a plurality of electronic documents, wherein the plurality of fields respectively correspond to governance, risk and compliance system data structures, identifying a plurality of relationships between the electronic documents based on one or more cross-references between fields of two or more different electronic documents of the plurality of electronic documents, and assigning respective ranks to the plurality of electronic documents based on the relationships. In the method, a query is received from a user device, and a listing of candidate documents of the plurality of electronic documents is retrieved in response to the query. Scores for respective ones of the candidate documents are computed based on at least the assigned ranks, and a response to the query is transmitted to the user device, wherein the response comprises the listing of candidate documents sorted according to the computed scores.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: June 29, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Zohar Duchin, Ehsan Masud, Michelle Zhong
  • Patent number: 10819733
    Abstract: A method includes scanning a subset of a plurality of processing nodes in a network for vulnerabilities, selecting a first one of the processing nodes not in the subset, and determining a similarity measure between the first processing node and at least a second one of the processing nodes in the subset identified as having a given vulnerability. Determining the similarity measure comprises determining a first similarity between vulnerabilities previously detected on the first and second processing nodes and determining a second similarity between attributes of the first and second processing nodes, the similarity measure being based at least in part on the first and second similarities. The method also includes identifying that the first processing node has the given vulnerability based at least in part on the similarity measure, and modifying access to the first processing node responsive to identifying that the first processing node has the given vulnerability.
    Type: Grant
    Filed: July 24, 2018
    Date of Patent: October 27, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Zohar Duchin, Michelle Zhong, Ehsan Masud, Yassine Ouhssain
  • Publication number: 20200250213
    Abstract: A method in one embodiment comprises defining a plurality of fields in a plurality of electronic documents, wherein the plurality of fields respectively correspond to governance, risk and compliance system data structures, identifying a plurality of relationships between the electronic documents based on one or more cross-references between fields of two or more different electronic documents of the plurality of electronic documents, and assigning respective ranks to the plurality of electronic documents based on the relationships. In the method, a query is received from a user device, and a listing of candidate documents of the plurality of electronic documents is retrieved in response to the query. Scores for respective ones of the candidate documents are computed based on at least the assigned ranks, and a response to the query is transmitted to the user device, wherein the response comprises the listing of candidate documents sorted according to the computed scores.
    Type: Application
    Filed: January 31, 2019
    Publication date: August 6, 2020
    Inventors: Zohar Duchin, Ehsan Masud, Michelle Zhong
  • Publication number: 20200036741
    Abstract: A method includes scanning a subset of a plurality of processing nodes in a network for vulnerabilities, selecting a first one of the processing nodes not in the subset, and determining a similarity measure between the first processing node and at least a second one of the processing nodes in the subset identified as having a given vulnerability. Determining the similarity measure comprises determining a first similarity between vulnerabilities previously detected on the first and second processing nodes and determining a second similarity between attributes of the first and second processing nodes, the similarity measure being based at least in part on the first and second similarities. The method also includes identifying that the first processing node has the given vulnerability based at least in part on the similarity measure, and modifying access to the first processing node responsive to identifying that the first processing node has the given vulnerability.
    Type: Application
    Filed: July 24, 2018
    Publication date: January 30, 2020
    Inventors: Zohar Duchin, Michelle Zhong, Ehsan Masud, Yassine Ouhssain