Patents by Inventor Khaled Khan

Khaled Khan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230185925
    Abstract: A method of quantifying the satisfaction of security requirements is provided via characterizing a security feature; matching the security feature to a security metric; computing a quantification score that indicates the exploitability of a system to which the security feature is applied; and outputting the quantification score to a security analyst.
    Type: Application
    Filed: November 23, 2022
    Publication date: June 15, 2023
    Inventors: Armstrong Nhlabatsi, Khaled Khan, Jin Hong, Dong Seong Kim, Rachel Fernandez, Noora Fetais
  • Publication number: 20200082072
    Abstract: Certain embodiments may generally relate to controlling access to data held in the cloud. A method for controlling access to data held in the cloud may include determining, at a cloud server, the validity of user credentials received from a user device. The method may also include receiving context data related to the user device based on the validity of the user credentials. The method may further include synchronizing the context data with the cloud server. In addition, the method may include enforcing context-sensitive security checks on requests made by the user for resources based on the sensor data collected by the user device.
    Type: Application
    Filed: November 15, 2019
    Publication date: March 12, 2020
    Inventors: Bashar NUSEIBEH, Arosha BANDARA, Khaled KHAN, Niamul Haque KHAN, Armstrong NHLABATSI, Thein Than TUN, Yijun YU
  • Publication number: 20190190955
    Abstract: A computer-implemented method for monitoring the security of a computing network which includes a plurality of hosts and a plurality of edges which link connected hosts. The method comprises capturing and storing first and second network state information at first and second times respectively. The method comprises comparing the first and second network state information to detect a change in the security of the network during the time window between the first and second times. The method further comprises storing security change data which is indicative of the change in the security of the network during the time window for a user to monitor the change in the security of the network.
    Type: Application
    Filed: December 6, 2018
    Publication date: June 20, 2019
    Inventors: Khaled Khan, Dong Seong Kim, Jin Bum Hong, Simon Enoch Yusuf, Mengmeng Ge, Huy Kang Kim, Paul Kim, Armstrong Nhlabatsi, Noora Fetais