Patents by Inventor Alaa S. Youssef
Alaa S. Youssef has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200174842Abstract: Technology for selecting job characteristics to determine the similarity among jobs in terms of performance. Technology based on similarity among jobs calculated by selected characteristics for determining jobs that are likely to lead to successful performance of a requested new job by a cloud. Also, technology based on similarity among jobs calculated by selected characteristics for determining jobs that are likely to lead to failure when performing a requested new job by the cloud. When the new job request is accepted, because its characteristics of the new job matches job characteristics characterized by success and/or fails to match job characteristics characterized by failure, then the new job is said to lead to a “reward” or an “expected reward” because the new job will be rewarded by being allowed to use, by an admission controller of a cloud management system, use of cloud computing resources of the cloud.Type: ApplicationFiled: November 29, 2018Publication date: June 4, 2020Inventors: Chen Wang, Ali Kanso, Stefania V. Costache, Alaa S. Youssef, Malgorzata Steinder
-
Patent number: 10382257Abstract: Embodiments for fault detection in an end-to-end communication flow between microservices within a cloud computing environment by one or more processors. A communication pattern may be established between an invoking microservice and one or more microservices to enable fault detection of a failure of an end-to-end communication flow between the invoking microservice and the one or more microservices, wherein the communication pattern includes a request to self-monitor for the fault detection by the one or more microservices, and an acknowledgement response provided by the invoking microservice to the one or more microservices indicating success or failure of the end-to-end communication flow between the invoking microservice and the one or more microservices.Type: GrantFiled: March 16, 2017Date of Patent: August 13, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nader M. Nassar, Tamer M. Nassar, Hesham E. Soultan, Alaa S. Youssef
-
Patent number: 10275845Abstract: A computer-implemented method, system, and computer program product for distributing luggage among a plurality of outlet ports of a luggage distribution unit is provided. The method includes associating, using a processor system, a passenger key and a luggage identification (ID) device of a luggage unit, and assigning, using the processor system, the luggage ID device to a dispensing unit based at least in part on a determination of a desired distribution of luggage units among the plurality of outlet ports. The method also includes detecting a location of the passenger key, providing a status of the luggage ID device of the luggage unit, and signaling the presence of the luggage ID device and the luggage unit at the dispensing unit. The method includes receiving the association to access the at least one luggage unit, and releasing the luggage unit responsive to receiving the association.Type: GrantFiled: June 16, 2016Date of Patent: April 30, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tamer A. Mahfouz, Nader M. Nassar, Tamer M. Nassar, Hesham E. M. Soultan, Alaa S. Youssef
-
Publication number: 20180300464Abstract: Embodiments of the invention are directed to a computer-implemented method, computer system, and computer program product for authenticating a user. The method includes receiving a userID. The method further includes retrieving a password entry pattern associated with the userID. Each password in the set of password entries is compared to the pre-established password entry pattern.Type: ApplicationFiled: April 13, 2017Publication date: October 18, 2018Inventors: Tamer A. Mahfouz, Nader M. Nassar, Tamer M. Nassar, Hesham E. Soultan, Alaa S. Youssef
-
Publication number: 20180270107Abstract: Embodiments for fault detection in an end-to-end communication flow between microservices within a cloud computing environment by one or more processors. A communication pattern may be established between an invoking microservice and one or more microservices to enable fault detection of a failure of an end-to-end communication flow between the invoking microservice and the one or more microservices, wherein the communication pattern includes a request to self-monitor for the fault detection by the one or more microservices, and an acknowledgement response provided by the invoking microservice to the one or more microservices indicating success or failure of the end-to-end communication flow between the invoking microservice and the one or more microservices.Type: ApplicationFiled: March 16, 2017Publication date: September 20, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nader M. NASSAR, Tamer M. NASSAR, Hesham E. SOULTAN, Alaa S. YOUSSEF
-
Patent number: 9906520Abstract: In an approach to multi-user authentication, one or more computer processors receive a first user login. The one or more computer processors determine whether at least one additional user login is received. The one or more computer processors receive an access request from the first user. The one or more computer processors receive an access request from the at least one additional user. In response to receiving the access request from the first user and the access request from the at least one additional user, the one or more computer processors determine whether the access request from the first user and the access request from the at least one additional user meet pre-defined criteria. In response to determining the access requests meet pre-defined criteria, the one or more computer processors authorize the access request of the first user and the access request of the at least one additional user.Type: GrantFiled: December 2, 2015Date of Patent: February 27, 2018Assignee: International Business Machines CorporationInventors: Ahmed Fouad, Tamer A. Mahfouz, Nader M. Nassar, Tamer M. Nassar, Alaa S. Youssef
-
Publication number: 20170362033Abstract: A computer-implemented method, system, and computer program product for distributing luggage among a plurality of outlet ports of a luggage distribution unit is provided. The method includes associating, using a processor system, a passenger key and a luggage identification (ID) device of a luggage unit, and assigning, using the processor system, the luggage ID device to a dispensing unit based at least in part on a determination of a desired distribution of luggage units among the plurality of outlet ports. The method also includes detecting a location of the passenger key, providing a status of the luggage ID device of the luggage unit, and signaling the presence of the luggage ID device and the luggage unit at the dispensing unit. The method includes receiving the association to access the at least one luggage unit, and releasing the luggage unit responsive to receiving the association.Type: ApplicationFiled: June 16, 2016Publication date: December 21, 2017Inventors: TAMER A. MAHFOUZ, NADER M. NASSAR, TAMER M. NASSAR, HESHAM E.M. SOULTAN, ALAA S. YOUSSEF
-
Publication number: 20170163623Abstract: In an approach to multi-user authentication, one or more computer processors receive a first user login. The one or more computer processors determine whether at least one additional user login is received. The one or more computer processors receive an access request from the first user. The one or more computer processors receive an access request from the at least one additional user. In response to receiving the access request from the first user and the access request from the at least one additional user, the one or more computer processors determine whether the access request from the first user and the access request from the at least one additional user meet pre-defined criteria. In response to determining the access requests meet pre-defined criteria, the one or more computer processors authorize the access request of the first user and the access request of the at least one additional user.Type: ApplicationFiled: December 2, 2015Publication date: June 8, 2017Inventors: Ahmed Fouad, Tamer A. Mahfouz, Nader M. Nassar, Tamer M. Nassar, Alaa S. Youssef
-
Patent number: 7827613Abstract: A digital rights management (DRM) system and methodology for a Java client implementing a Java Runtime Environment (JRE). The JRE comprises a Java Virtual Machine (JVM) and Java runtime libraries components and is capable of executing a player application for presenting content that can be presented through a Java program (e.g., a Java application, applet, servlet, bean, etc.) and downloaded from a content server to the client. The DRM system includes an acquisition component for receiving downloaded protected contents; and a dynamic rights management layer located between the JRE and player application for receiving requests to view or play downloaded protected contents from the player, and, in response to each request, determining the rights associated with protected content and enabling viewing or playing of the protected contents via the player application if permitted according to the rights.Type: GrantFiled: October 31, 2007Date of Patent: November 2, 2010Assignee: International Business Machines CorporationInventors: Lawrence Koved, Magda M. Mourad, Jonathan P. Munson, Giovanni Pacifici, Marco Pistoia, Alaa S. Youssef
-
Patent number: 7308717Abstract: A digital rights management (DRM) system and methodology for a Java client implementing a Java Runtime Environment (JRE). The JRE comprises a Java Virtual Machine (JVM) and Java runtime libraries components and is capable of executing a player application for presenting content that can be presented through a Java program (e.g., a Java application, applet, servlet, bean, etc.) and downloaded from a content server to the client. The DRM system includes an acquisition component for receiving downloaded protected contents; and a dynamic rights management layer located between the JRE and player application for receiving requests to view or play downloaded protected contents from the player, and, in response to each request, determining the rights associated with protected content and enabling viewing or playing of the protected contents via the player application if permitted according to the rights.Type: GrantFiled: February 23, 2001Date of Patent: December 11, 2007Assignee: International Business Machines CorporationInventors: Lawrence Koved, Magda M. Mourad, Jonathan P. Munson, Giovanni Pacifici, Marco Pistoia, Alaa S. Youssef
-
Patent number: 7305431Abstract: The invention deals with the enforcement of Service Level Agreement for the services provided over a client-server network. The invention discloses a method, system and a program product for automatic enforcement of SLAs. This is achieved by automatic metering of requests for service and allocation of resources of the server based on the SLA, current available resources and the needs of the customer.Type: GrantFiled: September 30, 2002Date of Patent: December 4, 2007Assignee: International Business Machines CorporationInventors: Neeran M Karnik, Arun Kumar, Girish B Chafle, Alaa S Youssef, Ruby Arora
-
Patent number: 7277870Abstract: A method of securely receiving data on a user's system from a web broadcast infrastructure with a plurality of channels. The method comprising receiving promotional metadata from a first web broadcast channel, the promotional metadata related to data available for reception; assembling at least part of the promotional metadata into a promotional offering for review by a user; selecting by a user, data to be received related to the promotional metadata; receiving data from a second web broadcast channel, the data selected from the promotional metadata, and wherein the data has been previously encrypted using a first encrypting key; and receiving the first decrypting key via a computer readable medium, the first decrypting key for decrypting at least some of the data received via the second web broadcast channel. In another embodiment, a method and system to transmit data securely from a web broadcast center is disclosed.Type: GrantFiled: October 14, 2005Date of Patent: October 2, 2007Assignee: International Business Machines CorporationInventors: Magda Mourad, Jonathan P. Munson, Giovanni Pacifici, Ahmed Tantawy, Alaa S. Youssef
-
Patent number: 7213005Abstract: A method, a system and computer readable medium of securely receiving data on a user's system from a web broadcast infrastructure with a plurality of channels. The method includes encrypting the data using a first encrypting key, wherein the first encrypting key is self-contained with all the information necessary to decrypt the data encrypted with the first encrypting key and encrypting the first decrypting key, using a second encrypting key. Next promotional metadata related to at least part of the encrypted data on a first web broadcast channel for reception by at least one user's system is broadcasted. Broadcasting at least part of the encrypted data over a second broadcast channel and transferring the encrypted first decrypting key, which has been encrypted with the second encrypting key, to the user's system via a computer readable medium.Type: GrantFiled: January 20, 2000Date of Patent: May 1, 2007Assignee: International Business Machines CorporationInventors: Magda Mourad, Jonathan P. Munson, Giovanni Pacifici, Ahmed Tantawy, Alaa S. Youssef
-
Patent number: 7171558Abstract: A digital rights management system for controlling the distribution of digital content to player applications. The system comprises a verification system, a trusted content handler, and a user interface control. The verification system is provided to validate the integrity of the player applications; and the trusted content handler is used to decrypt content and to transmit the decrypted content to the player applications, and to enforce usage rights associated with the content. The user interface control module is provided to ensure that users of the player applications are not exposed to actions that violate the usage rights. The preferred embodiment of the present invention provides a system that enables existing content viewers, such as Web browsers, document viewers, and Java Virtual Machines running content-viewing applications, with digital rights management capabilities, in a manner that is transparent to the viewer.Type: GrantFiled: September 22, 2000Date of Patent: January 30, 2007Assignee: International Business Machines CorporationInventors: Magda M. Mourad, Jonathan P. Munson, Tamer Nadeem, Giovanni Pacifici, Marco Pistoia, Alaa S. Youssef
-
Patent number: 6834110Abstract: A method of securely providing data to a user's system over a broadcast infrastructure. The method comprising the steps of: encrypting the data using a first encrypting key; encrypting a first decrypting key using a second encrypting key; dividing at least part of the encrypted data into a series of logical packages; placing at least some of the logical packages into a broadcast carousel for cyclical broadcast over the broadcast infrastructure; broadcasting the packages in broadcast carousel so that they can be received by at least one user's system, wherein the broadcast is cyclical and repeats periodically; and transferring the encrypted first decrypting key, which has been encrypted with the second encrypting key, to the user's system. In another embodiment, a system is disclosed to carry out the above method in a broadcast infrastructure and an image overlaid on top of a primary image being displayed isused to denote that additional logical packages are available for receipt by broadcast.Type: GrantFiled: December 10, 1999Date of Patent: December 21, 2004Assignee: International Business Machines CorporationInventors: Franco Marconcini, Jonathan P. Munson, Giovanni Pacifici, Ahmed Tantawy, Alaa S. Youssef
-
Publication number: 20040111506Abstract: A performance management system and method for cluster-based web services comprising a gateway for receiving a user request, assigning the user request to a class, queuing the user request based on said class, and dispatching the user request to one of a plurality of server resources based on the assigned class and control parameters. The control parameters are continuously updated by a global resource manager which tracks and evaluates system performance.Type: ApplicationFiled: December 10, 2002Publication date: June 10, 2004Applicant: International Business Machines CorporationInventors: Ashish Kundu, Vijay K. Naik, Mangala Gowri Nanda, Giovanni Pacifici, Michael Joseph Spreitzer, Asser N. Tantawi, Pradeep Varma, Alaa S. Youssef
-
Publication number: 20040064557Abstract: The invention deals with the enforcement of Service Level Agreement for the services provided over a client-server network. The invention discloses a method, system and a program product for automatic enforcement of SLAs. This is achieved by automatic metering of requests for service and allocation of resources of the server based on the SLA, current available resources and the needs of the customer.Type: ApplicationFiled: September 30, 2002Publication date: April 1, 2004Inventors: Neeran M. Karnik, Arun Kumar, Girish B. Chafle, Alaa S. Youssef, Ruby Arora
-
Publication number: 20030196114Abstract: A system for providing persistent access control of protected content is disclosed. The method on a client system includes sending a first request for authentication of the client to a server system. Subsequently, the client is authenticated by the server. Next, a user on the client attempts to access a file comprising a trailer and content encrypted with an encrypting key. Then, a second request for access to the content is sent to the server by the client, wherein an identifier from the trailer is included in the second request. The identifier identifies the content or an access control policy of the content. The server determines that the second request is in accordance with an access control policy associated with the content, and grants access to the content. Lastly, the client accesses the content in accordance with the access control policy.Type: ApplicationFiled: April 10, 2002Publication date: October 16, 2003Applicant: INTERNATIONAL BUSINESS MACHINESInventors: Glenn E. Brew, Marco M. Hurtado, David Medina, Jonathan P. Munson, Stefan Nusser, Giovanni Pacifici, Alaa S. Youssef
-
Publication number: 20030135464Abstract: A method of securely receiving data on a user's system from a web broadcast infrastructure with a plurality of channels. The method comprising the steps of: receiving promotional metadata from a first web broadcast channel, the promotional metadata related to data available for reception; assembling at least part of the promotional metadata into a promotional offering for review by a user; selecting by a user, data to be received related to the promotional metadata; receiving data from a second web broadcast channel, the data selected from the promotional metadata, and wherein the data has been previously encrypted using a first encrypting key; and receiving the first decrypting key via a computer readable medium, the first decrypting key for decrypting at least some of the data received via the second web broadcast channel.Type: ApplicationFiled: January 20, 2000Publication date: July 17, 2003Applicant: International Business Machines CorporationInventors: Magda Mourad, Joseph P. Munson, Giovanni Pacifici, Ahmed Tantawy, Alaa S. Youssef
-
Publication number: 20030079133Abstract: The invention described herein introduces a system which binds the content to a person or any other entity like a company. So duplication of the content and rendering of content is only allowed to a well defined number of devices. The devices used in a system according to the present invention are provided for playing unencrypted content as well. Thus, users are enabled to play their currently existing audio CDs with the same device.Type: ApplicationFiled: October 18, 2001Publication date: April 24, 2003Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gerd Breiter, Oliver Petrik, Werner Ederer, Jonathan Munson, Giovanni Pacifici, Alaa S. Youssef, Abdelsalam Helal