Patents by Inventor Faud Khan
Faud Khan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9451036Abstract: A system and method for identifying the number of computer hosts and types of operating systems behind a network address translation is provided. The method includes processing an internet protocol packet associated with the host computer system. The process may involve capturing the internet protocol packet and extracting key fields from the internet protocol packet to produce a fingerprint. The method continues with analyzing the fields in order to determine if a network address translator is connected between the host computer and a public network (e.g. the internet). If there is a network address translator connected, fields may be analyzed in order to determine the number of computers using the network address translator. The fields may also be analyzing in order to determine with a level of probability that the fingerprint identifies the correct operating system running the host computers.Type: GrantFiled: January 15, 2008Date of Patent: September 20, 2016Assignee: Alcatel LucentInventors: Faud Khan, Gerald Batten, Yong Sun
-
Patent number: 9419995Abstract: Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address.Type: GrantFiled: January 18, 2012Date of Patent: August 16, 2016Assignee: Alcatel LucentInventors: Stanley Chow, Bassem Abdel-Aziz, Faud Khan
-
Publication number: 20150339943Abstract: A system for training to help a student pilot or general aviation pilot learn providing a digital record of training and flight sessions recorded. This system compromises of two components; one of software run on mobile device such as a tablet; and two, an electronic system that contains many sensors to collect flight data in real-time. The system for training student pilots generally includes a method to collect flight data and present it visually to be viewed after the flight. This data can use to provide a detailed analysis to flight techniques with the goal to making a pilot more effective or to archive data as proof of flight hours in support of a flight log. This system can also provide data than be used in other modes of travel including automobiles, transport trucks, or just walking where a digital record is required for the travel taken.Type: ApplicationFiled: April 29, 2015Publication date: November 26, 2015Inventor: FAUD KHAN
-
Patent number: 8769682Abstract: Mechanism for identifying malicious content, DoS attacks, and illegal IPTV services. By monitoring the characteristics of various control messages being transmitted within a network that services Internet protocol television (IPTV) content to identify suspicious behavior (e.g., such as that associated with malicious content, denial of service (DoS) attacks, IPTV service stealing, etc.). In addition to monitoring control messages within such a network, deep packet inspection (DPI) may be performed for individual packets within an IPTV stream to identify malicious content therein (e.g., worms, viruses, etc. actually within the IPTV stream itself). By monitoring control messages and/or actual IPTV content within a network (e.g., vs. at the perimeter of a network only), protection against both outside and inside attacks can be effectuated. This network level basis of operation effectively guards against promulgation of malicious content to other devices within the network.Type: GrantFiled: September 18, 2008Date of Patent: July 1, 2014Assignee: Alcatel LucentInventors: Vinod K. Choyi, Pierrick Guingo, Faud A. Khan
-
Patent number: 8181249Abstract: Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address.Type: GrantFiled: February 29, 2008Date of Patent: May 15, 2012Assignee: Alcatel LucentInventors: Stanley Chow, Bassem Abdel-Aziz, Faud Khan
-
Publication number: 20120117653Abstract: Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address.Type: ApplicationFiled: January 18, 2012Publication date: May 10, 2012Applicant: ALCATEL-LUCENTInventors: Stanley Chow, Bassem Abdel-Aziz, Faud Khan
-
Publication number: 20100071065Abstract: Infiltration of malware communications. Malicious programs infecting individual devices within a network oftentimes communicate with another infected device (e.g., a master device by which the infection was established on a slave device in the first place). During this call home to a master device (or receiving a call from the master device), vital information about the attack, target, master device, etc. may be transmitted. The call home may include information acquired/retrieved from the infected device, or it may request additional information from the infecting device. By monitoring the network messages associated with such call home attempts (including any errors associated therewith), an infected device may be identified and appropriate action be taken (e.g., continue monitoring, isolate infected device from network, generate call to network help desk, etc.). This approach may be implemented at a network level to help prevent further promulgation of the malicious program to other devices.Type: ApplicationFiled: September 18, 2008Publication date: March 18, 2010Applicant: ALCATEL LUCENTInventors: Faud A. Khan, Stanley T. Chow, Bassem Abdel-Aziz
-
Publication number: 20100071062Abstract: Mechanism for identifying malicious content, DoS attacks, and illegal IPTV services. By monitoring the characteristics of various control messages being transmitted within a network that services Internet protocol television (IPTV) content to identify suspicious behavior (e.g., such as that associated with malicious content, denial of service (DoS) attacks, IPTV service stealing, etc.). In addition to monitoring control messages within such a network, deep packet inspection (DPI) may be performed for individual packets within an IPTV stream to identify malicious content therein (e.g., worms, viruses, etc. actually within the IPTV stream itself). By monitoring control messages and/or actual IPTV content within a network (e.g., vs. at the perimeter of a network only), protection against both outside and inside attacks can be effectuated. This network level basis of operation effectively guards against promulgation of malicious content to other devices within the network.Type: ApplicationFiled: September 18, 2008Publication date: March 18, 2010Applicant: ALCATEL LUCENTInventors: VINOD K. CHOYI, PIERRICK GUINGO, FAUD A. KHAN
-
Publication number: 20090222920Abstract: Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address.Type: ApplicationFiled: February 29, 2008Publication date: September 3, 2009Applicant: ALCATEL-LUCENTInventors: Stanley Chow, Bassem Abdel-Aziz, Faud Khan
-
Publication number: 20090182864Abstract: A system and method for identifying the number of computer hosts and types of operating systems behind a network address translation is provided. The method includes processing an internet protocol packet associated with the host computer system. The process may involve capturing the internet protocol packet and extracting key fields from the internet protocol packet to produce a fingerprint. The method continues with analyzing the fields in order to determine if a network address translator is connected between the host computer and a public network (e.g. the internet). If there is a network address translator connected, fields may be analyzed in order to determine the number of computers using the network address translator. The fields may also be analyzing in order to determine with a level of probability that the fingerprint identifies the correct operating system running the host computers.Type: ApplicationFiled: January 15, 2008Publication date: July 16, 2009Inventors: Faud Khan, Gerald Batten, Yong Sun
-
Publication number: 20090106156Abstract: A method of network-based digital rights enforcement, and related enforcement device, the method including one or more of the following: embedding information into digital content requested by an end user; providing a signature for the digital content to a service provider; providing a key to the service provider, the key being necessary for reading the information embedded into the digital content; providing an algorithm to the service provider for extracting the information embedded into the digital content; providing an identification to the service provider of a content provider that provides the digital content; extracting the signature from the digital content requested by the end user; analyzing the signature to determine whether a signature match exists; and determining whether the end user is a legitimate authorized user of the requested digital content or capable of distributing content.Type: ApplicationFiled: October 23, 2007Publication date: April 23, 2009Applicant: ALCATEL LUCENTInventors: Vinod K. Choyi, Faud Khan, Dmitri Vinokurov
-
Publication number: 20090077663Abstract: A score-based method of preventing intrusion, and related apparatus and systems, including one or more of the following: receiving traffic including new packets; decoding a protocol for same; determining that no session exists to which the packets are associated; creating a session entry for a session corresponding to the packets; setting a total score for the session to zero; performing an anomaly analysis on the packets identifying an anomaly; adding an anomaly score for the anomaly to the total score for the session; determining that the total score for the session does not exceed a threshold; determining that the anomaly analysis is finished; determining that the signature of the received new packets matches a threat signatures; adding a score assigned to the threat signature to the total score for the session; determining that the total score for the session exceeds the threshold; and triggering a threat response action.Type: ApplicationFiled: September 17, 2007Publication date: March 19, 2009Applicant: ALCATEL LUCENTInventors: Yong Sun, Faud Khan