Patents by Inventor Sultan Saadaldean Alsharif
Sultan Saadaldean Alsharif has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12212698Abstract: Implementations provide a computer-implemented method that includes: accessing, by a node of a blockchain network, a first set of data encoding a set of transaction records, wherein the blockchain network comprises a plurality of consensus nodes; at least based on the first set of data, generating, by the node, a transaction hash for the set of transaction; accessing a second set of data encoding a compliance status of the node of the blockchain network; at least based on the second set of data; generating, by the node, a compliance hash for the node of blockchain network; generating, by the node, a root hash that combines the transaction hash and the compliance hash; and submitting, by the node and to the plurality of consensus nodes of the blockchain network, a block that includes the root hash for entry into the blockchain.Type: GrantFiled: August 17, 2022Date of Patent: January 28, 2025Assignee: Saudi Arabian Oil CompanyInventors: John Gwilliams, Sultan Saadaldean Alsharif
-
Publication number: 20240419819Abstract: Systems and methods include a computer-implemented method for blocking the transfer of sensitive information. A document is analyzed by a leakage prevention system for sensitive information. The document is sent by a sender to at least one receiver. A context in which sensitive information is used in the document is determined. A sender risk profile of the sender and receiver risk profiles of the at least one receiver are determined. Risk scores for the sender and the at least one receiver are determined using predefined rules and the sender/receiver risk profiles. The risk scores identify a use level of sensitive information in the document. A determination is made by the leakage prevention system, based at least on the risk scores, whether to block a transfer of the document or to allow a transfer of the document. The document is transferred or blocked based on the determination.Type: ApplicationFiled: June 13, 2023Publication date: December 19, 2024Inventor: Sultan Saadaldean Alsharif
-
Patent number: 12111930Abstract: Implementations can provide a method that includes: accessing the source code of a script hosted by a remote server; extracting features from the source code in accordance with a machine-learning model comprising one or more layers of logic; at least based on the machine-learning model, determining, for each of the extracted features, a corresponding probability conditioned on the source code containing ransomware; and at least based on the machine-learning model, determining a combined probability for the extracted features conditioned on the source code containing ransomware when the extracted features are jointly present; comparing the combined probability with a threshold; in response to determining that the combined probability exceeds the threshold, flagging the source code as containing ransomware; and in response to determining that the combined probability does not exceed the threshold, flagging the source code as not containing ransomware.Type: GrantFiled: August 8, 2022Date of Patent: October 8, 2024Assignee: Saudi Arabian Oil CompanyInventors: Maha Nasser Alasmari, Abdullah Abdulaziz Alturaifi, Sultan Saadaldean Alsharif
-
Patent number: 12015522Abstract: The present disclosure relates to systems and methods for detecting unauthorized system configuration changes. For example, metadata can be extracted from network traffic captured by one or more different network tools and/or network devices and provided to a metadata evaluator. As an example, the one or more different network tools and/or devices can include a switch port analyzer tool, a security information and event management tool, and/or a test access port device. The metadata evaluator can process the extracted metadata to detect a system configuration change in a system on a network that includes the network traffic. The metadata evaluator can determine whether the system configuration change is an authorized system configuration change. In some examples, the metadata evaluator can determine whether the system configuration change is an authorized system configuration change based on change management data from a change management system.Type: GrantFiled: August 16, 2022Date of Patent: June 18, 2024Assignee: SAUDI ARABIAN OIL COMPANYInventors: Mohammed Adel Alfraih, Sultan Saadaldean Alsharif, John Gwilliams
-
Publication number: 20240152614Abstract: Described herein is a prediction engine for aiding decision support. In some examples, the prediction engine can be used in aiding cyber security applications. The prediction engine can include multiple prediction layers that each include a number of machine learning models that contribute to an overall prediction of the prediction engine in predicting whether a respective system or system user poses a cyber-threat. The prediction engine can provide prediction data that can indicate that the respective system or system user is a cyber-threat. In some examples, a decision engine can be employed to use the prediction data to mitigate or eliminate the cyber-threat.Type: ApplicationFiled: November 9, 2022Publication date: May 9, 2024Applicant: SAUDI ARABIAN OIL COMPANYInventors: Sultan Saadaldean ALSHARIF, Nada Essa AL-NOAIMI, Nora A. ALGARAWI
-
Publication number: 20240143781Abstract: A security tool includes a vulnerability classifier for classifying vulnerabilities based on an assessment report, an exploitability classifier for determining an exploitability level for a vulnerability of a list of vulnerabilities of the assessment report based on data of an intelligence feed, a risk classifier for calculating an overall risk level for a computer application associated with the vulnerability of the list of vulnerabilities based on an impact score for the computer application, and a remediation prioritizer to determine an order of remediation for the computer application and to generate a remediation prioritization report including the order of remediation.Type: ApplicationFiled: November 1, 2022Publication date: May 2, 2024Applicant: SAUDI ARABIAN OIL COMPANYInventors: Mariam Fahad BUBSHAIT, Sultan Saadaldean ALSHARIF, Abdullah ALTURAIFI
-
Publication number: 20240064060Abstract: The present disclosure relates to systems and methods for detecting unauthorized system configuration changes. For example, metadata can be extracted from network traffic captured by one or more different network tools and/or network devices and provided to a metadata evaluator. As an example, the one or more different network tools and/or devices can include a switch port analyzer tool, a security information and event management tool, and/or a test access port device. The metadata evaluator can process the extracted metadata to detect a system configuration change in a system on a network that includes the network traffic. The metadata evaluator can determine whether the system configuration change is an authorized system configuration change. In some examples, the metadata evaluator can determine whether the system configuration change is an authorized system configuration change based on change management data from a change management system.Type: ApplicationFiled: August 16, 2022Publication date: February 22, 2024Applicant: SAUDI ARABIAN OIL COMPANYInventors: Mohammed Adel Alfraih, Sultan Saadaldean Alsharif, John Gwilliams
-
Publication number: 20240064031Abstract: Implementations provide a computer-implemented method that includes: accessing, by a node of a blockchain network, a first set of data encoding a set of transaction records, wherein the blockchain network comprises a plurality of consensus nodes; at least based on the first set of data, generating, by the node, a transaction hash for the set of transaction; accessing a second set of data encoding a compliance status of the node of the blockchain network; at least based on the second set of data; generating, by the node, a compliance hash for the node of blockchain network; generating, by the node, a root hash that combines the transaction hash and the compliance hash; and submitting, by the node and to the plurality of consensus nodes of the blockchain network, a block that includes the root hash for entry into the blockchain.Type: ApplicationFiled: August 17, 2022Publication date: February 22, 2024Inventors: John Gwilliams, Sultan Saadaldean Alsharif
-
Patent number: 11907376Abstract: Methods and systems, including computer programs encoded on a computer storage medium, implement compliance testing to evaluate controls used to protect assets of a target system. A respective first score is generated for each control based on compliance tests performed to detect each of the controls at the target system. A compliance model is generated that integrates machine-learning algorithms to classify inputs corresponding to a compliance test and to enable predictive analytics of the compliance model using the classified inputs. The compliance model derives a negative compliance test (nCT) for each of the compliance tests by applying the predictive analytics to a data set that includes the first score for each control. An nCT is performed for each control detected at the target system and a second score is generated for each nCT. An assurance score characterizing effectiveness of the control is generated based on the first and second scores.Type: GrantFiled: April 13, 2021Date of Patent: February 20, 2024Assignee: Saudi Arabian Oil CompanyInventors: John Gwilliams, Sultan Saadaldean Alsharif
-
Publication number: 20240045957Abstract: Implementations can provide a method that includes: accessing the source code of a script hosted by a remote server; extracting features from the source code in accordance with a machine-learning model comprising one or more layers of logic; at least based on the machine-learning model, determining, for each of the extracted features, a corresponding probability conditioned on the source code containing ransomware; and at least based on the machine-learning model, determining a combined probability for the extracted features conditioned on the source code containing ransomware when the extracted features are jointly present; comparing the combined probability with a threshold; in response to determining that the combined probability exceeds the threshold, flagging the source code as containing ransomware; and in response to determining that the combined probability does not exceed the threshold, flagging the source code as not containing ransomware.Type: ApplicationFiled: August 8, 2022Publication date: February 8, 2024Inventors: Maha Nasser Alasmari, Abdullah Abdulaziz Alturaifi, Sultan Saadaldean Alsharif
-
Patent number: 11853450Abstract: Methods for detection of web application anomalies include receiving, by processors of a web server, web application logs and database logs. A machine learning algorithm is executed by the processors to segment the web application logs and the database logs into clusters based on probability density modeling, such that a variance of features within each cluster is less than a threshold variance. Each cluster corresponds to authorized access of backend databases or unauthorized access of the backend databases. The processors compare each cluster to baseline clusters corresponding to the authorized access of the backend databases. The processors determine that a particular cluster corresponds to the unauthorized access of the backend databases based on the comparison. Responsive to determining that the particular cluster corresponds to the unauthorized access of the backend databases, a display device of the web server generates a graphical user interface representing the particular cluster.Type: GrantFiled: October 26, 2020Date of Patent: December 26, 2023Assignee: Saudi Arabian Oil CompanyInventors: Sultan Saadaldean Alsharif, Mohammed Ahmad Ababtain, Adrian Francis Goodhead
-
Patent number: 11748685Abstract: An automated method for improving application developers' cybersecurity competencies is provided.Type: GrantFiled: January 13, 2022Date of Patent: September 5, 2023Assignee: SAUDI ARABIAN OIL COMPANYInventors: Sultan Saadaldean Alsharif, Bandar Abdulaziz Almashari, Abdullah Abdulaziz Alturaifi, Abdulmohsen Nasser Alotaibi
-
Publication number: 20230262084Abstract: Systems and methods include a computer-implemented method for presenting a model of cybersecurity. Questionnaire answers corresponding to individual components of each of three elements contributing to cybersecurity risk and maturity for a computer system are received by a four-dimensional cybersecurity assurance model application. Three scores corresponding to dimensions of cybersecurity assurance for the computer system are generated by the four-dimensional cybersecurity assurance model application using the questionnaire answers. A three-dimensional graph presenting a four-dimensional model of cybersecurity assurance for the computer system is generated by the four-dimensional cybersecurity assurance model application using the three scores and temporal information.Type: ApplicationFiled: February 11, 2022Publication date: August 17, 2023Inventors: John Gwilliams, Sultan Saadaldean Alsharif
-
Patent number: 11711393Abstract: A method may include obtaining a request to unblock a predetermined website in a network and that is associated with a predetermined list. The predetermined list may be used to determine whether a respective user device among various user devices can access one or more websites. The method may further include determining an impact level of the predetermined website for an organization using a machine-learning algorithm and website gateway data. The method may further include determining a probability of a security breach using the machine-learning algorithm and threat data. The method may further include determining whether to unblock the predetermined website based on the impact level and the probability of a security breach. The method may further include transmitting, in response to determining that the predetermined website should be unblocked, a command that modifies the predetermined list to enable the respective user device to access the predetermined website.Type: GrantFiled: October 19, 2020Date of Patent: July 25, 2023Assignee: SAUDI ARABIAN OIL COMPANYInventors: Ibrahim Uthman Assiry, Sultan Saadaldean Alsharif, John A. Gwilliams, Nada Essa Alnoaimi
-
Publication number: 20230222429Abstract: An automated method for improving application developers' cybersecurity competencies is provided.Type: ApplicationFiled: January 13, 2022Publication date: July 13, 2023Inventors: Sultan Saadaldean Alsharif, Bandar Abdulaziz Almashari, Abdullah Abdulaziz Alturaifi, Abdulmohsen Nasser Alotaibi
-
Patent number: 11483342Abstract: A method for detecting Command and Control (C&C) toward a web application in a network includes: obtaining, using a Web Application Firewall (WAF) of the network, network traffic between the web application and a server outside the network; transmitting the network traffic from the WAF to a machine learning model; determining, using the machine learning model, whether the network traffic includes a command signature; in response to determining that the network traffic includes a command signature, generating a notification; and determining, based on the notification, whether the server is a C&C.Type: GrantFiled: May 29, 2020Date of Patent: October 25, 2022Assignee: SAUDI ARABIAN OIL COMPANYInventors: Mohammed Adel Alfraih, Khalid A. Hazmi, Ziad I. Omair, Sultan Saadaldean Alsharif
-
Patent number: 11477228Abstract: A method may include obtaining various votes for a blockchain transaction from various blockchain nodes. The method may further include determining various weighted votes using the votes and respective cybersecurity states of the blockchain nodes. The respective cybersecurity states may correspond to whether a predetermined security vulnerability is associated with the blockchain nodes. The respective cybersecurity states may be dynamic values that are updated based on changes among predetermined security vulnerabilities. The method may further include determining whether to validate the blockchain transaction based on the weighted votes.Type: GrantFiled: January 3, 2020Date of Patent: October 18, 2022Assignee: SAUDI ARABIAN OIL COMPANYInventors: Sultan Saadaldean Alsharif, Wael Mohammed Alagi
-
Patent number: 11381588Abstract: A system, a method, and a computer program for remediating a cyberattack risk for a computing resource located at a node in a computer network having a plurality of nodes. The solution includes receiving vulnerability score data that has a severity level for a vulnerability in the computing resource at the node, receiving a number of installations value (NCRi) that indicates a number of instances the computing resource is included in the plurality of nodes, determining a percentile of occurrence value (POCRi) for the computing resource based on the number of installations value (NCRi), applying a severity adjustment matrix to the severity level to determine a true severity level for the vulnerability in the computing resource, reprioritized the vulnerability in the computing resource based on the true severity level, and mitigating the cyberattack risk for the computing resource based on the true severity level.Type: GrantFiled: July 30, 2019Date of Patent: July 5, 2022Assignee: Saudi Arabian Oil CompanyInventors: Sultan Saadaldean Alsharif, Wael Mohammed Alagi
-
Publication number: 20220124114Abstract: A method may include obtaining a request to unblock a predetermined website in a network and that is associated with a predetermined list. The predetermined list may be used to determine whether a respective user device among various user devices can access one or more websites. The method may further include determining an impact level of the predetermined website for an organization using a machine-learning algorithm and website gateway data. The method may further include determining a probability of a security breach using the machine-learning algorithm and threat data. The method may further include determining whether to unblock the predetermined website based on the impact level and the probability of a security breach. The method may further include transmitting, in response to determining that the predetermined website should be unblocked, a command that modifies the predetermined list to enable the respective user device to access the predetermined website.Type: ApplicationFiled: October 19, 2020Publication date: April 21, 2022Applicant: SAUDI ARABIAN OIL COMPANYInventors: Ibrahim Uthman Assiry, Sultan Saadaldean Alsharif, John A. Gwilliams, Nada Essa Alnoaimi
-
Patent number: 11277429Abstract: A technology solution for remediating a cyberattack risk in a computing resource asset in a network system.Type: GrantFiled: November 20, 2018Date of Patent: March 15, 2022Assignee: Saudi Arabian Oil CompanyInventors: Mohammed Ahmad Ababtain, Sultan Saadaldean Alsharif