Patents by Inventor Kelly Abuelsaad

Kelly Abuelsaad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9678746
    Abstract: In general, embodiments of the invention provide an approach to discover and enforce coding conventions among a group of developers. Specifically, source code files for a group of developers are imported from a code repository. The source code files are analyzed to discover the commonly used coding conventions of the group. Convention templates are generated based on these coding conventions. Each convention template is assigned a weighted value, and the convention templates are reviewed and approved based on the weighted value.
    Type: Grant
    Filed: July 31, 2014
    Date of Patent: June 13, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Shane B. McElligott, Hien Q. Nguyen, Jeffrey D. Young
  • Publication number: 20170163562
    Abstract: Approaches for automatically managing user privileges for computer resources based on determined levels of expertise in a networked computing environment (e.g., a cloud computing environment) are provided. In a typical approach, a user profile associated with a prospective user of a set of computer resources in the networked computing environment may be accessed. The user profile may include information pertaining to a skill level of the prospective user with respect to the set of computer resources. Based on the information contained in the user profile, an expertise level of the prospective user with respect to the set of computer resources may be determined, and a corresponding score may be calculated. Based on the score, a level of user privileges for the set of computer resources may be provided.
    Type: Application
    Filed: February 16, 2017
    Publication date: June 8, 2017
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9654358
    Abstract: Approaches for automatically managing user privileges for computer resources based on determined levels of expertise in a networked computing environment (e.g., a cloud computing environment) are provided. In a typical approach, a user profile associated with a prospective user of a set of computer resources in the networked computing environment may be accessed. The user profile may include information pertaining to a skill level of the prospective user with respect to the set of computer resources. Based on the information contained in the user profile, an expertise level of the prospective user with respect to the set of computer resources may be determined, and a corresponding score may be calculated. Based on the score, a level of user privileges for the set of computer resources may be provided.
    Type: Grant
    Filed: January 15, 2013
    Date of Patent: May 16, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20170126739
    Abstract: An approach is provided for managing a message in a transfer from a computer. A level of security protecting the transfer of the data is determined. The level of security is determined to satisfy or not satisfy a threshold level. If the level of security satisfies the threshold level, the computer is connected and the message is transferred using the level of security. If the level of security does not satisfy the threshold level, then based on the level of security, an action to change the level of security is determined so that the changed level of security satisfies the threshold level. The action changes a method of network layer encryption for the transfer and/or a protocol specifying whether application layer encryption is utilized for the transfer. The action is executed to connect the computer and transfer the message using the changed level of security.
    Type: Application
    Filed: January 11, 2017
    Publication date: May 4, 2017
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20170063895
    Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.
    Type: Application
    Filed: November 15, 2016
    Publication date: March 2, 2017
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9584491
    Abstract: An approach is provided for managing a message being transferred from a mobile device. A sensitivity level of data in the message payload is determined prior to sending the message to a wireless access point (WAP) en route to a destination device. If the payload data has a first sensitivity level, the mobile device sends the message to a first secure WAP having encryption at a threshold strength at a network layer and utilizes a protocol having encryption at an application layer. If the data has a second sensitivity level, the mobile device (a) sends the message to the first secure WAP without utilizing the protocol or (b) sends the message to a second, less secure WAP having encryption at a lesser strength and utilizes the protocol. If the data has a third sensitivity level, the mobile device sends the message to the second WAP without utilizing the protocol.
    Type: Grant
    Filed: November 4, 2015
    Date of Patent: February 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9569598
    Abstract: An approach for managing licenses for software installations on virtual machine (VM) instances in a networked computing environment (e.g., a cloud computing environment) is provided. Specifically, in one example, data (e.g., real-time and/or historical) pertaining to usage of a set of software installations on a set of (VM) instances in the networked computing environment is collected. When a request is received (e.g., from a requester) for a license for a particular software installation of the set of software installations, it is determined whether the license is available. If not, it is then determined whether the license is obtainable based on the collected data and a current configuration of the networked computing environment. Then, responsive to the license being obtainable, the requested license may be allocated.
    Type: Grant
    Filed: November 18, 2015
    Date of Patent: February 14, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang
  • Patent number: 9565206
    Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: February 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20170026326
    Abstract: An approach for delaying social media messages is provided herein. A first computing device receives user preferences. The first computing device detects a social media message of a user. The first computing device determines that the user is not in the physical location. The first computing device determines whether to delay the posting of the social media message based on a comparison of the content of the social media message with the received user preferences.
    Type: Application
    Filed: October 12, 2016
    Publication date: January 26, 2017
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20170026327
    Abstract: An approach for delaying social media messages is provided herein. A first computing device receives user preferences. The first computing device detects a social media message of a user. The first computing device determines that the user is not in the physical location. The first computing device determines whether to delay the posting of the social media message based on a comparison of the content of the social media message with the received user preferences.
    Type: Application
    Filed: October 12, 2016
    Publication date: January 26, 2017
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9534917
    Abstract: In an approach to providing navigation assistance, one or more computer processors receive a request for navigation assistance to a destination from a first user. The one or more computer processors dispatch a navigation assistance UAV to the first user. The one or more computer processors determine a route for the first user to follow to the destination. The one or more computer processors provide navigation assistance for the route to the first user using the navigation assistance UAV.
    Type: Grant
    Filed: July 7, 2015
    Date of Patent: January 3, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Gregory J. Boss, Kevin C. McConnell, Shane B. McElligott
  • Patent number: 9521122
    Abstract: An approach is provided for managing a message in a transfer from a computer. A level of sensitivity of data in a payload of the message is determined. A level of security protecting the transfer of the data is determined. Based on the level of sensitivity, the level of security is determined to satisfy or not satisfy a threshold level. If the level of security satisfies the threshold level, the computer is connected and the message is transferred using the level of security. If the level of security does not satisfy the threshold level, then based on the levels of sensitivity and security, an action to change the level of security is determined so that the changed level of security satisfies the threshold level. The action is executed to connect the computer and transfer the message using the changed level of security.
    Type: Grant
    Filed: May 9, 2014
    Date of Patent: December 13, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20160359920
    Abstract: Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, computer code and data of an application is annotated with metadata defining a set of runtime policies for executing the computer code and data. Once a request is received to run the application, a set of parameters (e.g., geographic location) corresponding to the execution of the computer code and data of the application is dynamically determined, and compared to the runtime policies. The runtime policies for executing the computer code and data are then enforced at runtime. This includes either running the application, or preventing the running of the application in the case that the set of parameters corresponding to the execution of the computer code and data of the application do not satisfy the runtime policies.
    Type: Application
    Filed: August 19, 2016
    Publication date: December 8, 2016
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9515975
    Abstract: An approach for delaying social media messages is provided herein. A first computing device receives user preferences. The first computing device detects a social media message of a user. The first computing device determines that the user is not in the physical location. The first computing device determines whether to delay the posting of the social media message based on a comparison of the content of the social media message with the received user preferences.
    Type: Grant
    Filed: April 7, 2016
    Date of Patent: December 6, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20160325835
    Abstract: In an approach to hazard detection, one or more computer processors receive a request from a first vehicle user for assistance from an unmanned aerial vehicle (UAV). The one or more computer processors locate a UAV. The one or more computer processors determine the location of the first vehicle. The one or more computer processors deploy the UAV to the location of the first vehicle. The one or more computer processors determine whether one or more hazards associated with a path of the first vehicle are detected.
    Type: Application
    Filed: July 19, 2016
    Publication date: November 10, 2016
    Inventors: Kelly Abuelsaad, Gregory J. Boss, Kevin C. McConnell, Shane B. McElligott
  • Publication number: 20160314021
    Abstract: Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and be provided with a set of suggested commands that are typically utilized for similar and/or previous instances of the virtual resource.
    Type: Application
    Filed: July 1, 2016
    Publication date: October 27, 2016
    Inventors: Kelly Abuelsaad, Gregory J. Boss, Lisa Seacat DeLuca, Soobaek Jang
  • Patent number: 9479398
    Abstract: Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, computer code and data of an application is annotated with metadata defining a set of runtime policies for executing the computer code and data. Once a request is received to run the application, a set of parameters (e.g., geographic location) corresponding to the execution of the computer code and data of the application is dynamically determined, and compared to the runtime policies. The runtime policies for executing the computer code and data are then enforced at runtime. This includes either running the application, or preventing the running of the application in the case that the set of parameters corresponding to the execution of the computer code and data of the application do not satisfy the runtime policies.
    Type: Grant
    Filed: July 3, 2013
    Date of Patent: October 25, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9463875
    Abstract: In an approach to hazard detection, one or more computer processors determine whether an obstruction of view for a user in a first vehicle is detected. Responsive to determining the obstruction is detected, the one or more computer processors deploy a first unmanned aerial vehicle (UAV) associated with the first vehicle. The one or more computer processors determine whether one or more hazards associated with a path of the first vehicle are detected.
    Type: Grant
    Filed: September 3, 2014
    Date of Patent: October 11, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Gregory J. Boss, Kevin C. McConnell, Shane B. McElligott
  • Patent number: 9451033
    Abstract: Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and be provided with a set of suggested commands that are typically utilized for similar and/or previous instances of the virtual resource.
    Type: Grant
    Filed: October 20, 2015
    Date of Patent: September 20, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Gregory J. Boss, Lisa Seacat DeLuca, Soobaek Jang
  • Publication number: 20160269499
    Abstract: An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration.
    Type: Application
    Filed: May 25, 2016
    Publication date: September 15, 2016
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook