Patents by Inventor Hesham MAHROUS

Hesham MAHROUS has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10089473
    Abstract: Systems and methods for securing a computer system are described herein. The systems and methods, which are computer-implemented, involve receiving, by a computing device, a name of a software vulnerability. The computing device measures a lexical similarity distance between the vulnerability name and each name in a list of names of software systems and components of the computer system. The computing device further identifies the software system and component names that are within a predetermined similarity distance of the vulnerability name as corresponding to software systems and components having the software vulnerability. Once the vulnerabilities are detected and mapped to corresponding software systems and components, the systems and methods can generate derivative works (e.g., reports, charts, and other derivative data) for further data processing, storage or analysis by different stake holders and/or other computing devices.
    Type: Grant
    Filed: December 24, 2014
    Date of Patent: October 2, 2018
    Assignee: SAP SE
    Inventors: Hesham Mahrous, Navjot Singh, Govind Preet Singh, Shiu Kung, Justine Shan, Baljeet Singh Malhotra
  • Publication number: 20160188882
    Abstract: Systems and methods for securing a computer system are described herein. The systems and methods, which are computer-implemented, involve receiving, by a computing device, a name of a software vulnerability. The computing device measures a lexical similarity distance between the vulnerability name and each name in a list of names of software systems and components of the computer system. The computing device further identifies the software system and component names that are within a predetermined similarity distance of the vulnerability name as corresponding to software systems and components having the software vulnerability. Once the vulnerabilities are detected and mapped to corresponding software systems and components, the systems and methods can generate derivative works (e.g., reports, charts, and other derivative data) for further data processing, storage or analysis by different stake holders and/or other computing devices.
    Type: Application
    Filed: December 24, 2014
    Publication date: June 30, 2016
    Inventors: Hesham MAHROUS, Navjot SINGH, Govind Preet SINGH, Shiu KUNG, Justine SHAN, Baljeet Singh MALHOTRA