Patents by Inventor KHALED M. KHAN

KHALED M. KHAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11228616
    Abstract: A computer-implemented method for monitoring the security of a computing network which includes a plurality of hosts and a plurality of edges which link connected hosts. The method comprises capturing and storing first and second network state information at first and second times respectively. The method comprises comparing the first and second network state information to detect a change in the security of the network during the time window between the first and second times. The method further comprises storing security change data which is indicative of the change in the security of the network during the time window for a user to monitor the change in the security of the network.
    Type: Grant
    Filed: December 6, 2018
    Date of Patent: January 18, 2022
    Assignee: Qatar Foundation
    Inventors: Khaled M. Khan, Dong Seong Kim, Jin Bum Hong, Simon Enoch Yusuf, Mengmeng Ge, Huy Kang Kim, Paul Kim, Armstrong Nhlabatsi, Noora Fetais
  • Patent number: 11146583
    Abstract: The presently disclosed technology provides a threat-specific network risk evaluation tailored to a client's security objectives. The present technology may include identifying a plurality of threats to a first component of a networked system and assigning a plurality of weighting values to the plurality of threats according to the client's security objectives. The present technology may include identifying a plurality of vulnerabilities of the first component and determining a set of relevant threats for the first vulnerability based on the nature of the vulnerability and the weighting values assigned to the plurality of threats. The set of relevant threats includes one or more of the plurality of threats. The present technology may include determining a set of relevant threats for each of the identified vulnerabilities of the first component and calculating a risk of the first component based on the sets of the relevant threats.
    Type: Grant
    Filed: May 1, 2019
    Date of Patent: October 12, 2021
    Assignees: QATAR FOUNDATION FOR EDUCATION, SCIENCE AND COMMUNITY DEVELOPMENT, QATAR UNIVERSITY
    Inventors: Armstrong Nhlabatsi, Jin Hong, Dong Seong Kim, Rachael Fernandez, Alaa Hussein, Noora Fetais, Khaled M. Khan
  • Publication number: 20200351295
    Abstract: The presently disclosed technology provides a threat-specific network risk evaluation tailored to a client's security objectives. The present technology may include identifying a plurality of threats to a first component of a networked system and assigning a plurality of weighting values to the plurality of threats according to the client's security objectives. The present technology may include identifying a plurality of vulnerabilities of the first component and determining a set of relevant threats for the first vulnerability based on the nature of the vulnerability and the weighting values assigned to the plurality of threats. The set of relevant threats includes one or more of the plurality of threats. The present technology may include determining a set of relevant threats for each of the identified vulnerabilities of the first component and calculating a risk of the first component based on the sets of the relevant threats.
    Type: Application
    Filed: May 1, 2019
    Publication date: November 5, 2020
    Inventors: Armstrong Nhlabatsi, Jin Hong, Dong Seong Kim, Rachael Fernandez, Alaa Hussein, Noora Fetais, Khaled M. Khan
  • Patent number: 10713355
    Abstract: Certain embodiments may generally relate to controlling access to data held in the cloud. A method for controlling access to data held in the cloud may include determining, at a cloud server, the validity of user credentials received from a user device. The method may also include receiving context data related to the user device based on the validity of the user credentials. The method may further include synchronizing the context data with the cloud server. In addition, the method may include enforcing context-sensitive security checks on requests made by the user for resources based on the sensor data collected by the user device.
    Type: Grant
    Filed: October 17, 2017
    Date of Patent: July 14, 2020
    Assignee: QATAR UNIVERSITY
    Inventors: Bashar Nuseibeh, Arosha Bandara, Khaled M. Khan, Niamul Haque Khan, Armstrong Nhlabatsi, Thein Than Tun, Yijun Yu
  • Publication number: 20180114015
    Abstract: Certain embodiments may generally relate to controlling access to data held in the cloud. A method for controlling access to data held in the cloud may include determining, at a cloud server, the validity of user credentials received from a user device. The method may also include receiving context data related to the user device based on the validity of the user credentials. The method may further include synchronizing the context data with the cloud server. In addition, the method may include enforcing context-sensitive security checks on requests made by the user for resources based on the sensor data collected by the user device.
    Type: Application
    Filed: October 17, 2017
    Publication date: April 26, 2018
    Inventors: BASHAR NUSEIBEH, AROSHA BANDARA, KHALED M. KHAN, NIAMUL HAQUE KHAN, ARMSTRONG NHLABATSI, THEIN THAN TUN, YIJUN YU