Patents by Inventor Shaan Mulchandani

Shaan Mulchandani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10944772
    Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for obtaining, processing, and presenting data related to security events, and for implementing courses of action to protect assets in response to the security events. An event management module identifies malicious activity present on a first network domain and/or a second network domain based on received network domain activity. A threat intelligence module receives data identifying the malicious activity in first data constructs of a predefined data structure. The threat intelligence module obtains additional data related to the identified malicious activity and generates second data constructs that include enriched data regarding the malicious activity. The enriched data includes data describing a campaign in which at least a portion of the malicious activity is involved and one or more courses of action. A course of action module receives the second data constructs and implements a given course of action.
    Type: Grant
    Filed: November 15, 2018
    Date of Patent: March 9, 2021
    Assignee: Accenture Global Solutions Limited
    Inventors: Shaan Mulchandani, Amin Hassanzadeh, Elvis Hovor, Shimon Modi, Walid Negm
  • Patent number: 10824736
    Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for facilitating communication in an industrial control network. A system includes an industrial control network, one or more controller devices, one or more emulators, and an encryption relay processor. Each controller device can be operable to control one or more operational devices connected to the industrial control network. Each emulator can be configured to communicate with a respective controller device, and each emulator can be configured to reference a respective profile that includes information about security capabilities of the respective controller device. The encryption relay processor can be operable to facilitate communication to and from each emulator over the industrial control network.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: November 3, 2020
    Assignee: Accenture Global Services Limited
    Inventors: Song Luo, Walid Negm, James J. Solderitsch, Shaan Mulchandani, Amin Hassanzadeh, Shimon Modi
  • Patent number: 10313389
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network path between computer assets. One of the methods includes receiving an asset topology that includes an identifier for each computer-related asset that may be an entry point for an attack simulation, receiving threat data that identifies vulnerabilities of computer-related assets, determining a first computer-related asset that may be an entry point for an attack simulation, identifying one or more first vulnerabilities of the first computer-related asset, determining a path from the first computer-related asset to a second computer-related asset, determining one or more second vulnerabilities of the second computer-related asset, determining a probability that the second computer-related asset will be compromised by an adversary, and determining a change to the asset topology to reduce the probability that the second computer-related asset will be compromised by an adversary.
    Type: Grant
    Filed: March 6, 2018
    Date of Patent: June 4, 2019
    Assignee: Accenture Global Services Limited
    Inventors: Elvis Hovor, Shaan Mulchandani, Matthew Carver
  • Publication number: 20190089727
    Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for obtaining, processing, and presenting data related to security events, and for implementing courses of action to protect assets in response to the security events. An event management module identifies malicious activity present on a first network domain and/or a second network domain based on received network domain activity. A threat intelligence module receives data identifying the malicious activity in first data constructs of a predefined data structure. The threat intelligence module obtains additional data related to the identified malicious activity and generates second data constructs that include enriched data regarding the malicious activity. The enriched data includes data describing a campaign in which at least a portion of the malicious activity is involved and one or more courses of action. A course of action module receives the second data constructs and implements a given course of action.
    Type: Application
    Filed: November 15, 2018
    Publication date: March 21, 2019
    Inventors: Shaan Mulchandani, Amin Hassanzadeh, Elvis Hovor, Shimon Modi, Walid Negm
  • Patent number: 10152598
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for categorizing a process using crowdsourcing are described. The methods include the action of receiving data indicating resources allocated upon execution of each of one or more processes. The methods further include the action of receiving data indicating a configuration of the client device. The methods further include receiving data indicating a user selection whether to execute each of the one or more processes. The methods further include the action of determining a risk score that reflects a likelihood that the process is a malicious process. The methods further include the action of identifying a particular process. The methods further include the action of performing additional processing on the particular process. The methods further include the action of determining an updated risk score for the particular process.
    Type: Grant
    Filed: June 21, 2017
    Date of Patent: December 11, 2018
    Assignee: Accenture Global Services Limited
    Inventor: Shaan Mulchandani
  • Patent number: 10148685
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network security threat response. A data structure that represents communication events between computing devices of two or more network domains is received. The data structure is analyzed and a threat scenario that is based on a chain of communication events that indicates a potential attack path is determined. The chain of communication events include a sequence of communication events between computing devices proceeding from an originating computing device to a destination computing device, wherein the originating computing device and the destination computing device exist on different network domains. Attack pattern data, for the threat scenario and from a threat intelligence data source, that is associated with communications between computing devices that occurred during one or more prior attacks is received.
    Type: Grant
    Filed: July 17, 2017
    Date of Patent: December 4, 2018
    Assignee: Accenture Global Services Limited
    Inventors: Amin Hassanzadeh, Shimon Modi, Shaan Mulchandani, Walid Negm
  • Patent number: 10148686
    Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for analyzing telemetry data from physical process sensors to detect anomalies within the physical process. A telemetry analytics system is disclosed as a process level anomaly detection system based on operational telemetrics and domain-specific knowledge that protects cyber physical system (CPS) devices against zero-day exploits not detectable through traditional system log or network packet inspection. The telemetry analytics system operates as a security component comparable to intrusion detection or anti-virus/anti-malware that generates alerts upon detecting anomalies in the sensor and/or activity data ingested from system or network data sources.
    Type: Grant
    Filed: February 10, 2017
    Date of Patent: December 4, 2018
    Assignee: Accenture Global Solutions Limited
    Inventors: Amin Hassanzadeh, Shaan Mulchandani, Malek Ben Salem, Chien An Chen
  • Patent number: 10148679
    Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for obtaining, processing, and presenting data related to security events, and for implementing courses of action to protect assets in response to the security events. An event management module identifies malicious activity present on a first network domain and/or a second network domain based on received network domain activity. A threat intelligence module receives data identifying the malicious activity in first data constructs of a predefined data structure. The threat intelligence module obtains additional data related to the identified malicious activity and generates second data constructs that include enriched data regarding the malicious activity. The enriched data includes data describing a campaign in which at least a portion of the malicious activity is involved and one or more courses of action. A course of action module receives the second data constructs and implements a given course of action.
    Type: Grant
    Filed: February 23, 2016
    Date of Patent: December 4, 2018
    Assignee: Accenture Global Solutions Limited
    Inventors: Shaan Mulchandani, Amin Hassanzadeh, Elvis Hovor, Shimon Modi, Walid Negm
  • Patent number: 10049219
    Abstract: In one implementation, a computer-implemented method includes receiving, at a process risk classifier running on a computer system, a request to determine a risk level for a particular process; accessing one or more signatures that provide one or more snapshots of characteristics of the particular process at one or more previous times; identifying one or more differences between the particular process in its current form and the one or more signatures; accessing information identifying previous usage of the computer system's resources by the particular process; determining a current risk score for the particular process based, at least in part, on (i) the one or more signatures for the particular process, (ii) the one or more differences between the particular process in its current form and the one or more signatures, and (iii) the previous usage of the resources; and providing the current risk score for the particular process.
    Type: Grant
    Filed: August 8, 2017
    Date of Patent: August 14, 2018
    Assignee: Accenture Global Services Limited
    Inventor: Shaan Mulchandani
  • Publication number: 20180198815
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network path between computer assets. One of the methods includes receiving an asset topology that includes an identifier for each computer-related asset that may be an entry point for an attack simulation, receiving threat data that identifies vulnerabilities of computer-related assets, determining a first computer-related asset that may be an entry point for an attack simulation, identifying one or more first vulnerabilities of the first computer-related asset, determining a path from the first computer-related asset to a second computer-related asset, determining one or more second vulnerabilities of the second computer-related asset, determining a probability that the second computer-related asset will be compromised by an adversary, and determining a change to the asset topology to reduce the probability that the second computer-related asset will be compromised by an adversary.
    Type: Application
    Filed: March 6, 2018
    Publication date: July 12, 2018
    Inventors: Elvis Hovor, Shaan Mulchandani, Matthew Carver
  • Publication number: 20180144144
    Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for facilitating communication in an industrial control network. A system includes an industrial control network, one or more controller devices, one or more emulators, and an encryption relay processor. Each controller device can be operable to control one or more operational devices connected to the industrial control network. Each emulator can be configured to communicate with a respective controller device, and each emulator can be configured to reference a respective profile that includes information about security capabilities of the respective controller device. The encryption relay processor can be operable to facilitate communication to and from each emulator over the industrial control network.
    Type: Application
    Filed: November 27, 2017
    Publication date: May 24, 2018
    Inventors: Song Luo, Walid Negm, James J. Solderitsch, Shaan Mulchandani, Amin Hassanzadeh, Shimon Modi
  • Patent number: 9979743
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network path between computer assets. One of the methods includes receiving an asset topology that includes an identifier for each computer-related asset that may be an entry point for an attack simulation, receiving threat data that identifies vulnerabilities of computer-related assets, determining a first computer-related asset that may be an entry point for an attack simulation, identifying one or more first vulnerabilities of the first computer-related asset, determining a path from the first computer-related asset to a second computer-related asset, determining one or more second vulnerabilities of the second computer-related asset, determining a probability that the second computer-related asset will be compromised by an adversary, and determining a change to the asset topology to reduce the probability that the second computer-related asset will be compromised by an adversary.
    Type: Grant
    Filed: August 31, 2015
    Date of Patent: May 22, 2018
    Assignee: Accenture Global Services Limited
    Inventors: Elvis Hovor, Shaan Mulchandani, Matthew Carver
  • Patent number: 9870476
    Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for facilitating secure communication. A system for facilitating secure communication includes an enterprise network, one or more operational technology networks, and a management server. Each of the operational technology networks can include one or more controller devices operable to control one or more operational devices, and can include a respective site security server and a respective security relay server. The security relay server can be operable to facilitate secure communication between controller devices of the operational technology network and its corresponding site security server. The management server can be a node on the enterprise network and can be operable to communicate with each site security server.
    Type: Grant
    Filed: August 28, 2015
    Date of Patent: January 16, 2018
    Assignee: Accenture Global Services Limited
    Inventors: Song Luo, Walid Negm, James J. Solderitsch, Shaan Mulchandani, Amin Hassanzadeh, Shimon Modi
  • Patent number: 9864864
    Abstract: Systems, methods, and apparatus, including computer programs encoded on computer storage media, for facilitating communication in an industrial control network. A system includes an industrial control network, one or more controller devices, one or more emulators, and an encryption relay processor. Each controller device can be operable to control one or more operational devices connected to the industrial control network. Each emulator can be configured to communicate with a respective controller device, and each emulator can be configured to reference a respective profile that includes information about security capabilities of the respective controller device. The encryption relay processor can be operable to facilitate communication to and from each emulator over the industrial control network.
    Type: Grant
    Filed: August 28, 2015
    Date of Patent: January 9, 2018
    Assignee: Accenture Global Services Limited
    Inventors: Song Luo, Walid Negm, James J. Solderitsch, Shaan Mulchandani, Amin Hassanzadeh, Shimon Modi
  • Publication number: 20170357806
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for categorizing a process using crowdsourcing are described. The methods include the action of receiving data indicating resources allocated upon execution of each of one or more processes. The methods further include the action of receiving data indicating a configuration of the client device. The methods further include receiving data indicating a user selection whether to execute each of the one or more processes. The methods further include the action of determining a risk score that reflects a likelihood that the process is a malicious process. The methods further include the action of identifying a particular process. The methods further include the action of performing additional processing on the particular process. The methods further include the action of determining an updated risk score for the particular process.
    Type: Application
    Filed: June 21, 2017
    Publication date: December 14, 2017
    Inventor: Shaan Mulchandani
  • Publication number: 20170337381
    Abstract: In one implementation, a computer-implemented method includes receiving, at a process risk classifier running on a computer system, a request to determine a risk level for a particular process; accessing one or more signatures that provide one or more snapshots of characteristics of the particular process at one or more previous times; identifying one or more differences between the particular process in its current form and the one or more signatures; accessing information identifying previous usage of the computer system's resources by the particular process; determining a current risk score for the particular process based, at least in part, on (i) the one or more signatures for the particular process, (ii) the one or more differences between the particular process in its current form and the one or more signatures, and (iii) the previous usage of the resources; and providing the current risk score for the particular process.
    Type: Application
    Filed: August 8, 2017
    Publication date: November 23, 2017
    Inventor: Shaan Mulchandani
  • Publication number: 20170318050
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network security threat response. A data structure that represents communication events between computing devices of two or more network domains is received. The data structure is analyzed and a threat scenario that is based on a chain of communication events that indicates a potential attack path is determined. The chain of communication events include a sequence of communication events between computing devices proceeding from an originating computing device to a destination computing device, wherein the originating computing device and the destination computing device exist on different network domains. Attack pattern data, for the threat scenario and from a threat intelligence data source, that is associated with communications between computing devices that occurred during one or more prior attacks is received.
    Type: Application
    Filed: July 17, 2017
    Publication date: November 2, 2017
    Inventors: Amin Hassanzadeh, Shimon Modi, Shaan Mulchandani, Walid Negm
  • Patent number: 9798877
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for allocating resources to processes based on security risk. The methods include actions of receiving a request from a process executing on a system for an allocation of resources and identifying other processes executing on the system. Additional actions include determining, for each of the processes, a risk score that reflects a likelihood that the process is a malicious process and determining a resource allocation priority based on the risk scores of each of the processes. Further actions include allocating resources to the processes based on the resource allocation priority.
    Type: Grant
    Filed: August 28, 2015
    Date of Patent: October 24, 2017
    Assignee: Accenture Global Services Limited
    Inventor: Shaan Mulchandani
  • Patent number: 9767285
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for categorizing a process using crowdsourcing are described. The methods include the action of receiving data indicating resources allocated upon execution of each of one or more processes. The methods further include the action of receiving data indicating a configuration of the client device. The methods further include receiving data indicating a user selection whether to execute each of the one or more processes. The methods further include the action of determining a risk score that reflects a likelihood that the process is a malicious process. The methods further include the action of identifying a particular process. The methods further include the action of performing additional processing on the particular process. The methods further include the action of determining an updated risk score for the particular process.
    Type: Grant
    Filed: August 28, 2015
    Date of Patent: September 19, 2017
    Assignee: Accenture Global Services Limited
    Inventor: Shaan Mulchandani
  • Patent number: 9760716
    Abstract: In one implementation, a computer-implemented method includes receiving, at a process risk classifier running on a computer system, a request to determine a risk level for a particular process; accessing one or more signatures that provide one or more snapshots of characteristics of the particular process at one or more previous times; identifying one or more differences between the particular process in its current form and the one or more signatures; accessing information identifying previous usage of the computer system's resources by the particular process; determining a current risk score for the particular process based, at least in part, on (i) the one or more signatures for the particular process, (ii) the one or more differences between the particular process in its current form and the one or more signatures, and (iii) the previous usage of the resources; and providing the current risk score for the particular process.
    Type: Grant
    Filed: May 8, 2017
    Date of Patent: September 12, 2017
    Assignee: Accenture Global Services Limited
    Inventor: Shaan Mulchandani