Patents by Inventor Rohit Kumar Sethi
Rohit Kumar Sethi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12130930Abstract: A system and method for automation and managing of security requirements and software supply chain in a software development lifecycle in a service-oriented architecture. Shared components can be used in the implementation of multiple software applications and each component has a functionality in the application and a set of controls for its implementation. A requirements library provides a list task requirements for each application which are applicable to the software application based on application context which is adjusted based on the controls required for implementation or controls addressed by the component. The shared components in the component library can be pre-authorized for use and applied to various software projects and applications with tracking, versioning, and dependency management.Type: GrantFiled: August 25, 2022Date of Patent: October 29, 2024Inventors: Deepu Filji, Farbod Hosseyndoust Foomany, Ehsan Foroughi, Rohit Kumar Sethi, Geoffrey Whittington, Trevor Young
-
Patent number: 11853430Abstract: A system and method for security risk identification in a secure software lifecycle. A knowledge database has a plurality of security elements which are identified for a particular software application depending on software environment and prioritized in a task list. Code vulnerabilities are identified using code scanners, with security requirements updated based on identified vulnerabilities, lack of vulnerabilities for weaknesses covered by a code scanner, potential weaknesses not adequately covered by code scanners, and software environment changes.Type: GrantFiled: May 22, 2020Date of Patent: December 26, 2023Assignee: SECURITY COMPASS TECHNOLOGIES LTD.Inventors: Nishchal Bhalla, Rohit Kumar Sethi, Ramanan Sivaranjan, Ehsan Foroughi, Geoffrey Charles Whittington
-
Patent number: 11810469Abstract: An electronic just-in-time learning and training system that is integrated into a user workflow to provide users with the knowledge they require to complete the tasks in the workflow and to provide meaningful and impactful training to users or advancement along a learning or training path. User tasks are matched to training modules in a training database to assist with completion of a task while a user profile tracks user training to deliver the most appropriate training modules. The system tracks completion of training modules to guide the user with training and advancement and to offer the user opportunities for additional certification and learning.Type: GrantFiled: October 27, 2021Date of Patent: November 7, 2023Assignee: SECURITY COMPASS TECHNOLOGIES LTD.Inventors: Ehsan Foroughi, Houssam Haidar, Calvin Lo, Lauren Park, Rohit Kumar Sethi, Emin Tham, Geoffrey Charles Whittington
-
Patent number: 11748095Abstract: A system and method for automation of task identification and control in a software lifecycle. Software context for a software asset is extracted from context repositories of the software asset during software development and operation, the extracted context data is matched to relevant tasks in a knowledge database to select tasks for the software asset, and task prioritization and orchestration are presented in a prioritized task list during a software lifecycle.Type: GrantFiled: May 26, 2022Date of Patent: September 5, 2023Assignee: Security Compass Technologies Ltd.Inventors: Nishchal Bhalla, Rohit Kumar Sethi, Ramanan Sivaranjan, Ehsan Foroughi, Geoffrey Charles Whittington
-
Patent number: 11604883Abstract: A system and method for security risk identification in a secure software lifecycle. A knowledge database has a plurality of security elements which are identified for a particular software application depending on software environment and prioritized in a task list. Code vulnerabilities are identified using code scanners, with security requirements updated based on identified vulnerabilities, lack of vulnerabilities for weaknesses covered by a code scanner, potential weaknesses not adequately covered by code scanners, and software environment changes. The system identifies a security requirement that has passed the test of the code scanner, identifies the strength of the code scanner to discover a particular code vulnerability associated with the security requirement, and updates the security requirement to indicate a verified compliance state.Type: GrantFiled: May 22, 2020Date of Patent: March 14, 2023Assignee: SECURITY COMPASS TECHNOLOGIES LTD.Inventors: Nishchal Bhalla, Rohit Kumar Sethi, Ramanan Sivaranjan, Ehsan Foroughi, Geoffrey Charles Whittington
-
Publication number: 20230067222Abstract: A system and method for automation and managing of security requirements and software supply chain in a software development lifecycle in a service-oriented architecture. Shared components can be used in the implementation of multiple software applications and each component has a functionality in the application and a set of controls for its implementation. A requirements library provides a list task requirements for each application which are applicable to the software application based on application context which is adjusted based on the controls required for implementation or controls addressed by the component. The shared components in the component library can be pre-authorized for use and applied to various software projects and applications with tracking, versioning, and dependency management.Type: ApplicationFiled: August 25, 2022Publication date: March 2, 2023Inventors: Deepu Filji, Farbod Hosseyndoust Foomany, Ehsan Foroughi, Rohit Kumar Sethi, Geoffrey Whittington, Trevor Young
-
Publication number: 20220283802Abstract: A system and method for automation of task identification and control in a software lifecycle. Software context for a software asset is extracted from context repositories of the software asset during software development and operation, the extracted context data is matched to relevant tasks in a knowledge database to select tasks for the software asset, and task prioritization and orchestration are presented in a prioritized task list during a software lifecycle.Type: ApplicationFiled: May 26, 2022Publication date: September 8, 2022Inventors: Nishchal Bhalla, Rohit Kumar Sethi, Ramanan Sivaranjan, Ehsan Foroughi, Geoffrey Charles Whittington
-
Patent number: 11379219Abstract: A system and method for automation of task identification and control in a software lifecycle. Software context for a software asset is extracted from context repositories of the software asset during software development and operation, the extracted context data is matched to relevant tasks in a knowledge database to select tasks for the software asset, and task prioritization and orchestration are presented in a prioritized task list during a software lifecycle.Type: GrantFiled: November 18, 2019Date of Patent: July 5, 2022Assignee: Security Compass Technologies Ltd.Inventors: Nishchal Bhalla, Rohit Kumar Sethi, Ramanan Sivaranjan, Ehsan Foroughi, Geoffrey Charles Whittington
-
Publication number: 20220130272Abstract: An electronic just-in-time learning and training system that is integrated into a user workflow to provide users with the knowledge they require to complete the tasks in the workflow and to provide meaningful and impactful training to users or advancement along a learning or training path. User tasks are matched to training modules in a training database to assist with completion of a task while a user profile tracks user training to deliver the most appropriate training modules. The system tracks completion of training modules to guide the user with training and advancement and to offer the user opportunities for additional certification and learning.Type: ApplicationFiled: October 27, 2021Publication date: April 28, 2022Inventors: Ehsan FOROUGHI, Houssam HAIDAR, Calvin LO, Lauren PARK, Rohit Kumar SETHI, Emin THAM, Geoffrey Charles WHITTINGTON
-
Publication number: 20210019706Abstract: An organization framework system and method for compliance with non-functional requirements is described. The system has a regulatory standards database with a plurality of regulatory standards, each regulatory standard comprising a set of regulatory non-functional requirements, an organization standards database with a plurality of organization standards, each organization standard comprising a set of organization non-functional requirements, and an organization framework comprising a master set of regulatory non-functional requirements and organization non-functional requirements.Type: ApplicationFiled: July 17, 2020Publication date: January 21, 2021Inventors: Nischal BHALLA, Rohit Kumar SETHI, Ramanan SIVARANJAN, Ehsan FOROUGHI, Geoffrey Charles WHITTINGTON, Leta MONTOPOLI, Emin THAM, Hanif VIRANI
-
Publication number: 20200285757Abstract: A system and method for security risk identification in a secure software lifecycle. A knowledge database has a plurality of security elements which are identified for a particular software application depending on software environment and prioritized in a task list. Code vulnerabilities are identified using code scanners, with security requirements updated based on identified vulnerabilities, lack of vulnerabilities for weaknesses covered by a code scanner, potential weaknesses not adequately covered by code scanners, and software environment changes. The system identifies a security requirement that has passed the test of the code scanner, identifies the strength of the code scanner to discover a particular code vulnerability associated with the security requirement, and updates the security requirement to indicate a verified compliance state.Type: ApplicationFiled: May 22, 2020Publication date: September 10, 2020Inventors: Nishchal Bhalla, Rohit Kumar Sethi, Ramanan Sivaranjan, Ehsan Foroughi, Geoffrey Charles Whittington
-
Publication number: 20200285756Abstract: A system and method for security risk identification in a secure software lifecycle. A knowledge database has a plurality of security elements which are identified for a particular software application depending on software environment and prioritized in a task list. Code vulnerabilities are identified using code scanners, with security requirements updated based on identified vulnerabilities, lack of vulnerabilities for weaknesses covered by a code scanner, potential weaknesses not adequately covered by code scanners, and software environment changes.Type: ApplicationFiled: May 22, 2020Publication date: September 10, 2020Inventors: Nishchal Bhalla, Rohit Kumar Sethi, Ramanan Sivaranjan, Ehsan Foroughi, Geoffrey Charles Whittington
-
Patent number: 10706156Abstract: A system and method for security risk identification in a secure software lifecycle. A knowledge database has a plurality of security elements which are identified for a particular software application depending on software environment and prioritized in a task list. Code vulnerabilities are identified using code scanners, with security requirements updated based on identified vulnerabilities, lack of vulnerabilities for weaknesses covered by a code scanner, potential weaknesses not adequately covered by code scanners, and software environment changes.Type: GrantFiled: October 13, 2017Date of Patent: July 7, 2020Inventors: Nishchal Bhalla, Rohit Kumar Sethi, Ramanan Sivaranjan, Ehsan Foroughi, Geoffrey Charles Whittington
-
Publication number: 20200159525Abstract: A system and method for automation of task identification and control in a software lifecycle. Software context for a software asset is extracted from context repositories of the software asset during software development and operation, the extracted context data is matched to relevant tasks in a knowledge database to select tasks for the software asset, and task prioritization and orchestration are presented in a prioritized task list during a software lifecycle.Type: ApplicationFiled: November 18, 2019Publication date: May 21, 2020Applicant: SD Elements Inc.Inventors: Nishchal Bhalla, Rohit Kumar Sethi, Ramanan Sivaranjan, Ehsan Foroughi, Geoffrey Charles Whittington
-
Publication number: 20190114435Abstract: A system and method for security risk identification in a secure software lifecycle. A knowledge database has a plurality of security elements which are identified for a particular software application depending on software environment and prioritized in a task list. Code vulnerabilities are identified using code scanners, with security requirements updated based on identified vulnerabilities, lack of vulnerabilities for weaknesses covered by a code scanner, potential weaknesses not adequately covered by code scanners, and software environment changes.Type: ApplicationFiled: October 13, 2017Publication date: April 18, 2019Inventors: Nishchal Bhalla, Rohit Kumar Sethi, Ramanan Sivaranjan, Ehsan Foroughi, Geoffrey Charles Whittington
-
Publication number: 20120254829Abstract: This invention relates to a method and system of providing security guidance in writing software applications. More particularly this invention relates to accessing guidance application linked to a computer and a data base of security features to present a user with suggestive security content in writing software applications. The invention also relates to a non-transitory computer program for use on the computer in writing the software applications.Type: ApplicationFiled: April 1, 2011Publication date: October 4, 2012Applicant: Infotek Solutions Inc. doing business as Security CompassInventors: Nishchal Bhalla, Rohit Kumar Sethi, Sahba Kazeroonizadeh, Ramanan Sivaranjan