Patents by Inventor Rajesh Kumar Sharma
Rajesh Kumar Sharma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230398503Abstract: A nanopore sensing system includes a cis well, a trans well, and a metal based membrane positioned between the cis and trans wells so that a channel defined in the metal based membrane fluidically connects the cis and trans wells. The metal based membrane has a thickness ranging from about 1 nm to about 3 nm and is selected from the group consisting of a metal oxide, a metal sulfide, a metal nitride, a metal phosphide, a metal arsenide, a metal antimonide, a metal selenide, and a metal telluride.Type: ApplicationFiled: June 9, 2023Publication date: December 14, 2023Inventors: Rajesh Kumar Sharma, Gerald Kreindl, Anthony Flannery
-
Patent number: 11637851Abstract: A cyber security assessment platform is provided. The platform can assess the security posture of a network by deploying one or more scenarios to be executed on one or more assets on the network and analyzing the outcomes of the scenarios. A scenario can be configured to validate a device or network status, and/or mimic an unauthorized cyber-attack. Each scenario can include one or more phases defining an execution path. Related method, apparatus, systems, techniques and articles are also described.Type: GrantFiled: September 17, 2020Date of Patent: April 25, 2023Assignee: AttackIQ, Inc.Inventors: Stephan Chenette, Rajesh Kumar Sharma
-
Publication number: 20210075821Abstract: A cyber security assessment platform is provided. The platform can assess the security posture of a network by deploying one or more scenarios to be executed on one or more assets on the network and analyzing the outcomes of the scenarios. A scenario can be configured to validate a device or network status, and/or mimic an unauthorized cyber-attack. Each scenario can include one or more phases defining an execution path. Related method, apparatus, systems, techniques and articles are also described.Type: ApplicationFiled: September 17, 2020Publication date: March 11, 2021Inventors: Stephan Chenette, Rajesh Kumar Sharma
-
Patent number: 10812516Abstract: A cyber security assessment platform is provided. The platform can assess the security posture of a network by deploying one or more scenarios to be executed on one or more assets on the network and analyzing the outcomes of the scenarios. A scenario can be configured to validate a device or network status, and/or mimic an unauthorized cyber-attack. Each scenario can include one or more phases defining an execution path. Related method, apparatus, systems, techniques and articles are also described.Type: GrantFiled: August 5, 2015Date of Patent: October 20, 2020Assignee: AttackIQ, Inc.Inventors: Stephan Chenette, Rajesh Kumar Sharma
-
Publication number: 20160044057Abstract: A cyber security assessment platform is provided. The platform can assess the security posture of a network by deploying one or more scenarios to be executed on one or more assets on the network and analyzing the outcomes of the scenarios. A scenario can be configured to validate a device or network status, and/or mimic an unauthorized cyber-attack. Each scenario can include one or more phases defining an execution path. Related method, apparatus, systems, techniques and articles are also described.Type: ApplicationFiled: August 5, 2015Publication date: February 11, 2016Inventors: Stephan Chenette, Rajesh Kumar Sharma
-
Patent number: 9230098Abstract: A system and method that trusts software executables existent on a machine prior to activation for different types of accesses e.g. execution, network, and registry. The system detects new executables added to the machine as well as previously existent executables that have been modified, moved, renamed or deleted. In certain embodiments, the system will tag the file with a flag as modified or newly added. Once tagged, the system intercepts particular types of file accesses for execution, network or registry. The system determines if the file performing the access is flagged and may apply one or more policies based on the requested access. In certain embodiments, the system intercepts I/O operations by file systems or file system volumes and flags metadata associated with the file. For example, the NT File System and its extended attributes and alternate streams may be utilized to implement the system.Type: GrantFiled: February 13, 2015Date of Patent: January 5, 2016Assignee: Websense, Inc.Inventors: Rajesh Kumar Sharma, Winping Lo, Joseph Papa
-
Publication number: 20150161380Abstract: A system and method that trusts software executables existent on a machine prior to activation for different types of accesses e.g. execution, network, and registry. The system detects new executables added to the machine as well as previously existent executables that have been modified, moved, renamed or deleted. In certain embodiments, the system will tag the file with a flag as modified or newly added. Once tagged, the system intercepts particular types of file accesses for execution, network or registry. The system determines if the file performing the access is flagged and may apply one or more policies based on the requested access. In certain embodiments, the system intercepts I/O operations by file systems or file system volumes and flags metadata associated with the file. For example, the NT File System and its extended attributes and alternate streams may be utilized to implement the system.Type: ApplicationFiled: February 13, 2015Publication date: June 11, 2015Inventors: Rajesh Kumar Sharma, Winping Lo, Joseph Papa
-
Patent number: 8959642Abstract: A system and method that trusts software executables existent on a machine prior to activation for different types of accesses e.g. execution, network, and registry. The system detects new executables added to the machine as well as previously existent executables that have been modified, moved, renamed or deleted. In certain embodiments, the system will tag the file with a flag as modified or newly added. Once tagged, the system intercepts particular types of file accesses for execution, network or registry. The system determines if the file performing the access is flagged and may apply one or more policies based on the requested access. In certain embodiments, the system intercepts I/O operations by file systems or file system volumes and flags metadata associated with the file. For example, the NT File System and its extended attributes and alternate streams may be utilized to implement the system.Type: GrantFiled: May 23, 2013Date of Patent: February 17, 2015Assignee: Websense, Inc.Inventors: Rajesh Kumar Sharma, Winping Lo, Joseph Papa
-
Publication number: 20130254839Abstract: A system and method that trusts software executables existent on a machine prior to activation for different types of accesses e.g. execution, network, and registry. The system detects new executables added to the machine as well as previously existent executables that have been modified, moved, renamed or deleted. In certain embodiments, the system will tag the file with a flag as modified or newly added. Once tagged, the system intercepts particular types of file accesses for execution, network or registry. The system determines if the file performing the access is flagged and may apply one or more policies based on the requested access. In certain embodiments, the system intercepts I/O operations by file systems or file system volumes and flags metadata associated with the file. For example, the NT File System and its extended attributes and alternate streams may be utilized to implement the system.Type: ApplicationFiled: May 23, 2013Publication date: September 26, 2013Applicant: Websense, Inc.Inventors: Rajesh Kumar Sharma, Winping Lo, Joseph Papa
-
Patent number: 8453243Abstract: A system and method that trusts software executables existent on a machine prior to activation for different types of accesses e.g. execution, network, and registry. The system detects new executables added to the machine as well as previously existent executables that have been modified, moved, renamed or deleted. In certain embodiments, the system will tag the file with a flag as modified or newly added. Once tagged, the system intercepts particular types of file accesses for execution, network or registry. The system determines if the file performing the access is flagged and may apply one or more policies based on the requested access. In certain embodiments, the system intercepts I/O operations by file systems or file system volumes and flags metadata associated with the file. For example, the NT File System and its extended attributes and alternate streams may be utilized to implement the system.Type: GrantFiled: December 28, 2005Date of Patent: May 28, 2013Assignee: Websense, Inc.Inventors: Rajesh Kumar Sharma, Winping Lo, Joseph Papa