Patents by Inventor Svetlana Radosavac

Svetlana Radosavac has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8316428
    Abstract: A method and apparatus is disclosed herein for security risk-based admission control. In one embodiment, the method comprises: receiving a request from the user device to access the network; determining whether to admit the user device based on a security-based admission control policy that admits user devices based on a constraint optimization that attempts to maximize the sum utility of the currently admitted user devices in view of a security assessment of the user device and security risk imposed on the network and already admitted user devices if the user device is admitted to the network, wherein the constraint optimization is based on a utility associated with admitting the user device to the network, a reputation value associated with the user device, and a botnet damage estimation on the network associated with the user device; and admitting the user device to the network based on results of determining whether to admit the user device.
    Type: Grant
    Filed: August 7, 2009
    Date of Patent: November 20, 2012
    Assignee: NTT DoCoMo, Inc.
    Inventors: Ulas C. Kozat, Svetlana Radosavac, James Kempf
  • Publication number: 20100077470
    Abstract: A method and apparatus is disclosed herein for security risk-based admission control. In one embodiment, the method comprises: receiving a request from the user device to access the network; determining whether to admit the user device based on a security-based admission control policy that admits user devices based on a constraint optimization that attempts to maximize the sum utility of the currently admitted user devices in view of a security assessment of the user device and security risk imposed on the network and already admitted user devices if the user device is admitted to the network, wherein the constraint optimization is based on a utility associated with admitting the user device to the network, a reputation value associated with the user device, and a botnet damage estimation on the network associated with the user device; and admitting the user device to the network based on results of determining whether to admit the user device.
    Type: Application
    Filed: August 7, 2009
    Publication date: March 25, 2010
    Inventors: Ulas C. Kozat, Svetlana Radosavac, James Kempf
  • Publication number: 20090205046
    Abstract: Security attacks on network entities can be compensated for and reduced through insurance that modifies incentives. In one example, a virtual slice provider includes a secure and non-secure slice having resources to provide network access to users through a service provider. The secure slice is assigned a first security level and a non-secure slice is assigned a second lower security level. In one embodiment, the second slice is isolated from the first slice. The virtual slice provider also has a risk policy between the slice provider and the service provider to establish different rates charged to the service provider for access to the secure and non-secure slices and to provide different levels of payment to the service provider for losses resulting from a lack of security in each slice.
    Type: Application
    Filed: November 13, 2008
    Publication date: August 13, 2009
    Applicant: DOCOMO Communications Laboratories USA, Inc.
    Inventors: Svetlana Radosavac, James Kempf, Ulas C. Kozat