Patents by Inventor Faud Khan

Faud Khan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9451036
    Abstract: A system and method for identifying the number of computer hosts and types of operating systems behind a network address translation is provided. The method includes processing an internet protocol packet associated with the host computer system. The process may involve capturing the internet protocol packet and extracting key fields from the internet protocol packet to produce a fingerprint. The method continues with analyzing the fields in order to determine if a network address translator is connected between the host computer and a public network (e.g. the internet). If there is a network address translator connected, fields may be analyzed in order to determine the number of computers using the network address translator. The fields may also be analyzing in order to determine with a level of probability that the fingerprint identifies the correct operating system running the host computers.
    Type: Grant
    Filed: January 15, 2008
    Date of Patent: September 20, 2016
    Assignee: Alcatel Lucent
    Inventors: Faud Khan, Gerald Batten, Yong Sun
  • Patent number: 9419995
    Abstract: Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address.
    Type: Grant
    Filed: January 18, 2012
    Date of Patent: August 16, 2016
    Assignee: Alcatel Lucent
    Inventors: Stanley Chow, Bassem Abdel-Aziz, Faud Khan
  • Publication number: 20150339943
    Abstract: A system for training to help a student pilot or general aviation pilot learn providing a digital record of training and flight sessions recorded. This system compromises of two components; one of software run on mobile device such as a tablet; and two, an electronic system that contains many sensors to collect flight data in real-time. The system for training student pilots generally includes a method to collect flight data and present it visually to be viewed after the flight. This data can use to provide a detailed analysis to flight techniques with the goal to making a pilot more effective or to archive data as proof of flight hours in support of a flight log. This system can also provide data than be used in other modes of travel including automobiles, transport trucks, or just walking where a digital record is required for the travel taken.
    Type: Application
    Filed: April 29, 2015
    Publication date: November 26, 2015
    Inventor: FAUD KHAN
  • Patent number: 8769682
    Abstract: Mechanism for identifying malicious content, DoS attacks, and illegal IPTV services. By monitoring the characteristics of various control messages being transmitted within a network that services Internet protocol television (IPTV) content to identify suspicious behavior (e.g., such as that associated with malicious content, denial of service (DoS) attacks, IPTV service stealing, etc.). In addition to monitoring control messages within such a network, deep packet inspection (DPI) may be performed for individual packets within an IPTV stream to identify malicious content therein (e.g., worms, viruses, etc. actually within the IPTV stream itself). By monitoring control messages and/or actual IPTV content within a network (e.g., vs. at the perimeter of a network only), protection against both outside and inside attacks can be effectuated. This network level basis of operation effectively guards against promulgation of malicious content to other devices within the network.
    Type: Grant
    Filed: September 18, 2008
    Date of Patent: July 1, 2014
    Assignee: Alcatel Lucent
    Inventors: Vinod K. Choyi, Pierrick Guingo, Faud A. Khan
  • Patent number: 8181249
    Abstract: Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address.
    Type: Grant
    Filed: February 29, 2008
    Date of Patent: May 15, 2012
    Assignee: Alcatel Lucent
    Inventors: Stanley Chow, Bassem Abdel-Aziz, Faud Khan
  • Publication number: 20120117653
    Abstract: Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address.
    Type: Application
    Filed: January 18, 2012
    Publication date: May 10, 2012
    Applicant: ALCATEL-LUCENT
    Inventors: Stanley Chow, Bassem Abdel-Aziz, Faud Khan
  • Publication number: 20100071065
    Abstract: Infiltration of malware communications. Malicious programs infecting individual devices within a network oftentimes communicate with another infected device (e.g., a master device by which the infection was established on a slave device in the first place). During this call home to a master device (or receiving a call from the master device), vital information about the attack, target, master device, etc. may be transmitted. The call home may include information acquired/retrieved from the infected device, or it may request additional information from the infecting device. By monitoring the network messages associated with such call home attempts (including any errors associated therewith), an infected device may be identified and appropriate action be taken (e.g., continue monitoring, isolate infected device from network, generate call to network help desk, etc.). This approach may be implemented at a network level to help prevent further promulgation of the malicious program to other devices.
    Type: Application
    Filed: September 18, 2008
    Publication date: March 18, 2010
    Applicant: ALCATEL LUCENT
    Inventors: Faud A. Khan, Stanley T. Chow, Bassem Abdel-Aziz
  • Publication number: 20100071062
    Abstract: Mechanism for identifying malicious content, DoS attacks, and illegal IPTV services. By monitoring the characteristics of various control messages being transmitted within a network that services Internet protocol television (IPTV) content to identify suspicious behavior (e.g., such as that associated with malicious content, denial of service (DoS) attacks, IPTV service stealing, etc.). In addition to monitoring control messages within such a network, deep packet inspection (DPI) may be performed for individual packets within an IPTV stream to identify malicious content therein (e.g., worms, viruses, etc. actually within the IPTV stream itself). By monitoring control messages and/or actual IPTV content within a network (e.g., vs. at the perimeter of a network only), protection against both outside and inside attacks can be effectuated. This network level basis of operation effectively guards against promulgation of malicious content to other devices within the network.
    Type: Application
    Filed: September 18, 2008
    Publication date: March 18, 2010
    Applicant: ALCATEL LUCENT
    Inventors: VINOD K. CHOYI, PIERRICK GUINGO, FAUD A. KHAN
  • Publication number: 20090222920
    Abstract: Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address.
    Type: Application
    Filed: February 29, 2008
    Publication date: September 3, 2009
    Applicant: ALCATEL-LUCENT
    Inventors: Stanley Chow, Bassem Abdel-Aziz, Faud Khan
  • Publication number: 20090182864
    Abstract: A system and method for identifying the number of computer hosts and types of operating systems behind a network address translation is provided. The method includes processing an internet protocol packet associated with the host computer system. The process may involve capturing the internet protocol packet and extracting key fields from the internet protocol packet to produce a fingerprint. The method continues with analyzing the fields in order to determine if a network address translator is connected between the host computer and a public network (e.g. the internet). If there is a network address translator connected, fields may be analyzed in order to determine the number of computers using the network address translator. The fields may also be analyzing in order to determine with a level of probability that the fingerprint identifies the correct operating system running the host computers.
    Type: Application
    Filed: January 15, 2008
    Publication date: July 16, 2009
    Inventors: Faud Khan, Gerald Batten, Yong Sun
  • Publication number: 20090106156
    Abstract: A method of network-based digital rights enforcement, and related enforcement device, the method including one or more of the following: embedding information into digital content requested by an end user; providing a signature for the digital content to a service provider; providing a key to the service provider, the key being necessary for reading the information embedded into the digital content; providing an algorithm to the service provider for extracting the information embedded into the digital content; providing an identification to the service provider of a content provider that provides the digital content; extracting the signature from the digital content requested by the end user; analyzing the signature to determine whether a signature match exists; and determining whether the end user is a legitimate authorized user of the requested digital content or capable of distributing content.
    Type: Application
    Filed: October 23, 2007
    Publication date: April 23, 2009
    Applicant: ALCATEL LUCENT
    Inventors: Vinod K. Choyi, Faud Khan, Dmitri Vinokurov
  • Publication number: 20090077663
    Abstract: A score-based method of preventing intrusion, and related apparatus and systems, including one or more of the following: receiving traffic including new packets; decoding a protocol for same; determining that no session exists to which the packets are associated; creating a session entry for a session corresponding to the packets; setting a total score for the session to zero; performing an anomaly analysis on the packets identifying an anomaly; adding an anomaly score for the anomaly to the total score for the session; determining that the total score for the session does not exceed a threshold; determining that the anomaly analysis is finished; determining that the signature of the received new packets matches a threat signatures; adding a score assigned to the threat signature to the total score for the session; determining that the total score for the session exceeds the threshold; and triggering a threat response action.
    Type: Application
    Filed: September 17, 2007
    Publication date: March 19, 2009
    Applicant: ALCATEL LUCENT
    Inventors: Yong Sun, Faud Khan