Patents by Inventor Sushil Jajodia

Sushil Jajodia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100054481
    Abstract: Embodiments of the present invention store application data and associated encryption key(s) on at least k+1 remote servers using LH* addressing. At least k+1 buckets are created on separate remote servers. At least k+1 key shares are generated for each of at least one encryption key. Each encryption key has a unique key number. Each key share is stored in a different key share record. Each of the key share records is stored in a different bucket using LH* addressing. Encrypted application data is generated by encrypting the application data with the encryption key(s). The encrypted application data is stored in encrypted data record(s). Each of the encrypted data records is stored in a different bucket among the buckets using LH* addressing.
    Type: Application
    Filed: August 27, 2009
    Publication date: March 4, 2010
    Inventors: Sushil Jajodia, Witold Litwin, Thomas Schwarz
  • Publication number: 20100058456
    Abstract: Embodiments of the present invention identify locations to deploy IDS sensor(s) within a network infrastructure and prioritize IDS alerts using attack graph analysis. An attack graph that describes exploitable vulnerability(ies) within a network infrastructure is aggregated into protection domains. Edge(s) that have exploit(s) between two protection domains are identified. Sets that contain edge(s) serviced by a common network traffic device are defined. Set(s) that collectively contain all of the edge(s) are selected. The common network traffic device(s) that service the selected sets are identified as the location(s) to deploy IDS sensor(s) within the network infrastructure.
    Type: Application
    Filed: August 26, 2009
    Publication date: March 4, 2010
    Inventors: Sushil Jajodia, Steven E. Noel
  • Publication number: 20100057869
    Abstract: An email revocation in which transmitted email can be recalled before a recipient is able to read the transmitted email is provided. An event server stores a transmitted email for a given time period or until being retrieved by a receiving email client. If the given time period expires or the email is recalled, the receiving email client is unable to retrieve the email.
    Type: Application
    Filed: August 26, 2009
    Publication date: March 4, 2010
    Inventors: Angelos Stavrou, Sushil Jajodia, Lei Zhang
  • Patent number: 7627900
    Abstract: Disclosed is framework for aggregating network attack graphs. A network may be represented as a dependency graph. Condition set(s), exploit set(s) and machine set(s) may be generated using information from the dependency graph. Exploit-condition set(s) may be generated using the condition set(s) and the exploit set(s). Machine-exploit set(s) may be generated using the exploit-condition set(s) and machine set(s).
    Type: Grant
    Filed: March 10, 2006
    Date of Patent: December 1, 2009
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Steven E. Noel, Sushil Jajodia
  • Patent number: 7555778
    Abstract: Disclosed is a network hardening mechanism. The mechanism: generates a dependency graph from a multitude of exploits; constructs a goal conditions expression which may then be used to determine set(s) of safe network configurations. A subset of these safe network configuration sets may then be selected for implementation using hardening costs as a criterion.
    Type: Grant
    Filed: October 17, 2005
    Date of Patent: June 30, 2009
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Steven E. Noel, Sushil Jajodia, Brian C. O'Berry, Michael A. Jacobs
  • Publication number: 20090125902
    Abstract: An on-demand disposable virtual work system that includes: a virtual machine monitor to host virtual machines, a virtual machine pool manager, a host operating system, a host program permissions list, and a request handler module. The virtual machine pool manager manages virtual machine resources. The host operating system interfaces with a user and virtual machines created with an image of a reference operating system. The host program permissions list may be a black list and/or a white list used to indicate allowable programs. The request handler module allows execution of the program if the program is allowable. If the program is not allowable, the host request handler module: denies program execution and urges a virtual machine specified by the virtual machine pool manager to execute the program. The virtual machine is terminated when the program closes.
    Type: Application
    Filed: February 26, 2008
    Publication date: May 14, 2009
    Inventors: Anup K. Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang
  • Publication number: 20080137841
    Abstract: Sensitive data associations for related data values are protected. A set of related data values is received. The set of related data values include at least a first data value and a second data value. The first data value is associated with a first data field and the second data value is associated to a second data field. First encrypted data is created by encrypting the first data value using a first encryption key and a second encrypted data is created by encrypting the second data value using a second encryption key. The first data value is stored in a first data table, the second data value is stored in a second data table, the first encrypted data is stored in the second table, and the second encrypted data is stored in the first table.
    Type: Application
    Filed: November 29, 2007
    Publication date: June 12, 2008
    Inventor: Sushil Jajodia
  • Publication number: 20080080558
    Abstract: A packet flow side channel encoder and decoder embeds and extracts a side channel communication in an overt communication data stream transmitted over a network. The encoder selects more than one group of related packets being transmitted on the network, relates a packet of one group to a packet of another group to form a pair of packets; and delays the timing of at least one packet from each pair of packets The decoder determines inter-packet delays that are the difference in timing between two packets in a pair of packets; determines at least one inter-packet delay difference between two or more determined inter-packet delays; and extracts a bit using the at least one interpacket delay difference.
    Type: Application
    Filed: November 3, 2006
    Publication date: April 3, 2008
    Inventors: Xinyuan Wang, Shiping Chen, Sushil Jajodia
  • Publication number: 20080046393
    Abstract: An attack graph analysis tool that includes a network configuration information input module, a domain knowledge input module, a network configuration information storage module, a domain knowledge storage module, and a result generation module. The network configuration information input module inputs network configuration information. The domain knowledge input module inputs domain knowledge for the network. The network configuration information storage module stores network configuration information in a network database table. The domain knowledge storage module stores the domain knowledge in an exploit database table. The result generation module generates a result using the network database table and exploit database table. The result may be generated in response to a query to a database management system that has access to the network database table and exploit database table.
    Type: Application
    Filed: July 31, 2007
    Publication date: February 21, 2008
    Inventors: Sushil Jajodia, Lingyu Wang, Anoop Singhal
  • Publication number: 20060277410
    Abstract: A watermarking system embeds a watermark into data values that may be streamed. A data hash is calculated using data values and a hash key. The data values are grouped. The groups include a first group and a second group. A first group hash is calculated using data values in the first group and a first group hash key. A second group hash is calculated using data values in the second group and a second group hash key. A watermark is constructed based on the first group hash and the second group hash. The value of at least one of the data values in the first group is modified using the watermark.
    Type: Application
    Filed: May 23, 2006
    Publication date: December 7, 2006
    Inventors: Sushil Jajodia, Huiping Guo, YingJiu Li
  • Patent number: 7127106
    Abstract: Disclosed is a method and apparatus for fingerprinting a first and second image and using the fingerprints of the first and second image to determine if the second image is derived from the first image.
    Type: Grant
    Filed: October 28, 2002
    Date of Patent: October 24, 2006
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Johnson Neil, Zoran Duric, Sushil Jajodia
  • Publication number: 20060095775
    Abstract: Disclosed is a fragile watermarking scheme for detecting and localizing malicious alterations made to a database relation with categorical attributes without introducing distortions to cover data. A watermark for a tuple group may be inserted by selectively switching the position of tuples in tuple pairs using a tuple hash associated with each tuple in the tuple pair; and a corresponding bit in a watermark derived from the tuple group using a embedding key, a primary key and hash functions.
    Type: Application
    Filed: October 17, 2005
    Publication date: May 4, 2006
    Inventors: Sushil Jajodia, Huiping Guo, Yingjiu Li
  • Publication number: 20060085858
    Abstract: Disclosed is a network hardening mechanism. The mechanism: generates a dependency graph from a multitude of exploits; constructs a goal conditions expression which may then be used to determine set(s) of safe network configurations. A subset of these safe network configuration sets may then be selected for implementation using hardening costs as a criterion.
    Type: Application
    Filed: October 17, 2005
    Publication date: April 20, 2006
    Inventors: Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs