Patents by Inventor Hamed Soroush

Hamed Soroush has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230272712
    Abstract: A tool (100) for measuring direct in-situ stress in rock (10) surrounding a borehole (12) includes: a slot cutting system (136), a flat-jack stress measurement device (134), a hydraulic system (124), and a sensor (514). The slot cutting system (136) cuts a slot (502) having an original width in the rock (10) surrounding the borehole (12). The flat-jack stress measurement device (134) fits into the slot (502). The hydraulic system (124) expands the flat jack stress measurement device (134) when it is in the slot to the original width of the slot (502). The sensor (514) measures pressure in the hydraulic system (124) when the flat-jack stress measurement device (134) has expanded to the original width of the slot (502).
    Type: Application
    Filed: July 30, 2021
    Publication date: August 31, 2023
    Inventor: Hamed Soroush
  • Publication number: 20230266500
    Abstract: In a method of generating a geomechanical model of a wellbore, at least one vibration sensor (422) is affixed to a drill bit unit (420). Electronic drilling recorder data (412) regarding drilling of the wellbore is received. Bit vibration data is received from the vibration sensor (422). A transform is applied to the electronic drilling recorder data and to the bit vibration data so as to generate filterable data. At least one undesirable component is filtered from the filterable data, thereby generating clean data. The clean data is applied to an artificial intelligence model trained to associate data with a plurality of geomechanical model components, thereby generating geomechanical model corresponding to the electronic drilling recorder data and the bit vibration data.
    Type: Application
    Filed: July 30, 2021
    Publication date: August 24, 2023
    Inventor: Hamed Soroush
  • Patent number: 11729222
    Abstract: Embodiments provide a system and method for extracting configuration-related information for reasoning about the security and functionality of a composed system. During operation, the system determines, by a computing device, information sources associated with hardware and software components of a system, wherein the information sources include at least specification sheets, standard operating procedures, user manuals, and vulnerability databases. The system selects a set of categories of vulnerabilities in a vulnerability database, and ingests the information sources to obtain data in a normalized format. The system extracts, from the ingested information sources, configuration information, vulnerability information, dependency information, and functionality requirements to create a model for the system.
    Type: Grant
    Filed: July 1, 2020
    Date of Patent: August 15, 2023
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Hamed Soroush, Milad Asgari Mehrabadi, Shantanu Rane, Marc E. Mosko
  • Patent number: 11483354
    Abstract: Embodiments provide a system and method for reasoning about the optimality of a configuration parameter of a distributed system. During operation, the system obtains a multi-layer graph for a system with a plurality of components, wherein the multi-layer graph comprises a configuration subgraph, a vulnerability subgraph, and a dependency subgraph. The system determines, based on the multi-layer graph, constraint relationships associated with configuration parameters for the components, wherein the constraint relationships include security constraints and functionality constraints. The system computes an unsatisfiable core which comprises a set of mutually incompatible constraints.
    Type: Grant
    Filed: July 8, 2020
    Date of Patent: October 25, 2022
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Hamed Soroush, Shantanu Rane
  • Publication number: 20220237443
    Abstract: One embodiment provides a system which facilitates reasoning about classifiers. During operation, the system determines a plurality of neural networks. The system derives, from a respective neural network, a linear model, wherein the linear model is constructed based on an output of a penultimate layer of the respective neural network. The system trains the linear model based on activations of the penultimate layer. The system maps parameters of the trained linear model into a version space.
    Type: Application
    Filed: January 26, 2021
    Publication date: July 28, 2022
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Shantanu Rane, Alejandro E. Brito, Hamed Soroush
  • Patent number: 11290498
    Abstract: The system generates evidence of a recommended configuration for a distributed system based on a plurality of configuration parameters. The system displays, on a screen of a user device, the evidence, which includes a list of configuration parameters, including a name, a current value, and a recommended value for a respective configuration parameter. The recommended value is obtained based on a strategy for optimizing security, functionality, or both. The system further displays interactive elements which allow the user to: view a resolution of a pair of mutually incompatible constraints resulting in the recommended value for the respective configuration parameter, wherein the resolution includes a name of the configuration parameter removed from the list and a reason for the removal; and view information associated with each of the pair of mutually incompatible constraints, wherein the information includes a name, a goal, a security impact, and a description of the constraint.
    Type: Grant
    Filed: July 9, 2020
    Date of Patent: March 29, 2022
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Hamed Soroush, Shantanu Rane
  • Patent number: 11025661
    Abstract: One embodiment provides a method for facilitating security in a system of networked components. During operation, the system constructs a configuration graph that stores a first set of relationships between configuration parameters within a component and a second set of relationships between configuration parameters across different components. A relationship corresponds to a constraint and is indicated by one or more of: a range for a configuration parameter; and a conjunction or a disjunction of logical relationships between two or more configuration parameters. The system generates a set of candidate configuration parameter values that satisfy the constraints of the relationships in the configuration graph. The system selects, from the set of candidate configuration parameter values, a first set of configuration parameter values that optimizes a security objective function.
    Type: Grant
    Filed: December 13, 2018
    Date of Patent: June 1, 2021
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Hamed Soroush, Shantanu Rane
  • Publication number: 20210012012
    Abstract: Embodiments provide a system and method for constructing a graph-based model for optimizing the security posture of a composed system. During operation, the system constructs a multi-layer graph for a system with a plurality of components, wherein the multi-layer graph comprises a configuration subgraph, a vulnerability subgraph, and a dependency subgraph. The system constructs the multi-layer graph by the following. The system generates nodes in the configuration subgraph, including: nodes in a first class which encode information associated with a configuration parameter for a respective component, wherein the encoded information includes a name, a default value, a range of values, and a data type; and nodes in a second class which encode value assignments for configuration parameters and relationships between configuration parameters. The system generates nodes in the vulnerability subgraph based on known vulnerabilities associated with a component, bad security practices, and best security practices.
    Type: Application
    Filed: July 1, 2020
    Publication date: January 14, 2021
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Hamed Soroush, Milad Asgari Mehrabadi, Shantanu Rane
  • Publication number: 20210014283
    Abstract: The system generates evidence of a recommended configuration for a distributed system based on a plurality of configuration parameters. The system displays, on a screen of a user device, the evidence, which includes a list of configuration parameters, including a name, a current value, and a recommended value for a respective configuration parameter. The recommended value is obtained based on a strategy for optimizing security, functionality, or both. The system further displays interactive elements which allow the user to: view a resolution of a pair of mutually incompatible constraints resulting in the recommended value for the respective configuration parameter, wherein the resolution includes a name of the configuration parameter removed from the list and a reason for the removal; and view information associated with each of the pair of mutually incompatible constraints, wherein the information includes a name, a goal, a security impact, and a description of the constraint.
    Type: Application
    Filed: July 9, 2020
    Publication date: January 14, 2021
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Hamed Soroush, Shantanu Rane
  • Publication number: 20210014264
    Abstract: Embodiments provide a system and method for reasoning about the optimality of a configuration parameter of a distributed system. During operation, the system obtains a multi-layer graph for a system with a plurality of components, wherein the multi-layer graph comprises a configuration subgraph, a vulnerability subgraph, and a dependency subgraph. The system determines, based on the multi-layer graph, constraint relationships associated with configuration parameters for the components, wherein the constraint relationships include security constraints and functionality constraints. The system computes an unsatisfiable core which comprises a set of mutually incompatible constraints.
    Type: Application
    Filed: July 8, 2020
    Publication date: January 14, 2021
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Hamed Soroush, Shantanu Rane
  • Publication number: 20210014263
    Abstract: Embodiments provide a system and method for extracting configuration-related information for reasoning about the security and functionality of a composed system. During operation, the system determines, by a computing device, information sources associated with hardware and software components of a system, wherein the information sources include at least specification sheets, standard operating procedures, user manuals, and vulnerability databases. The system selects a set of categories of vulnerabilities in a vulnerability database, and ingests the information sources to obtain data in a normalized format. The system extracts, from the ingested information sources, configuration information, vulnerability information, dependency information, and functionality requirements to create a model for the system.
    Type: Application
    Filed: July 1, 2020
    Publication date: January 14, 2021
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Hamed Soroush, Milad Asgari Mehrabadi, Shantanu Rane, Marc E. Mosko
  • Patent number: 10855578
    Abstract: A network is organized into a plurality of broadcast domains. Each broadcast domain includes a plurality of nodes each configured to cause messages to be sent to two or more other of the nodes within the broadcast domain. The broadcast domains are coupled via bridging connections. Each bridging connection couples at least one of the nodes from a first of the broadcast domains to at least one of the nodes of a second of the broadcast domains. The messages are caused to be sent through the plurality of broadcast domains via a subset of the bridging connections. The subset of the bridging connections is selected non-deterministically via the plurality of broadcast domains.
    Type: Grant
    Filed: June 25, 2019
    Date of Patent: December 1, 2020
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Marc E. Mosko, Alejandro E. Brito, Hamed Soroush, Shantanu Rane
  • Publication number: 20200053116
    Abstract: One embodiment provides a method for facilitating security in a system of networked components. During operation, the system constructs a configuration graph that stores a first set of relationships between configuration parameters within a component and a second set of relationships between configuration parameters across different components. A relationship corresponds to a constraint and is indicated by one or more of: a range for a configuration parameter; and a conjunction or a disjunction of logical relationships between two or more configuration parameters. The system generates a set of candidate configuration parameter values that satisfy the constraints of the relationships in the configuration graph. The system selects, from the set of candidate configuration parameter values, a first set of configuration parameter values that optimizes a security objective function.
    Type: Application
    Filed: December 13, 2018
    Publication date: February 13, 2020
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Hamed Soroush, Shantanu Rane