Patents by Inventor Mohamed Sohail

Mohamed Sohail has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11941155
    Abstract: Techniques are provided for secure data management in a network computing environment. A security management system receives data from a device which operates in a device network that is managed by the security management system. The security management system performs a data classification process to determine a data sensitivity level of the received data. The security management system determines a type of encryption to apply to the received data based on the determined data sensitivity level. The type of encryption is determined from a plurality of different types of encryption that are supported by a cloud system. The security management system sends the received data to the cloud system to at least one of store the data and perform secured data analytic processing of the data, in a format according to the determined type of encryption.
    Type: Grant
    Filed: March 15, 2021
    Date of Patent: March 26, 2024
    Assignee: EMC IP Holding Company LLC
    Inventors: Mohamed Sohail, Said Tabet
  • Patent number: 11803426
    Abstract: An apparatus comprises a processing device configured to generate a model of a plurality of devices characterizing relationships between the devices, to build a device dependency chain for the devices based on the model, to predict workload for each of the devices in one or more time slots of a given time period, and to determine a deployment schedule for the devices based on the device dependency chain and the predicted workload. The processing device is also configured to utilize the deployment schedule to select a device of the devices on which to perform an operation, to determine whether the selected device corresponds to an additional device of the devices configured to operate in place of the selected device during performance of the operation, and to control performance of the operation on the selected device responsive to the determination of whether the selected device corresponds to the additional device.
    Type: Grant
    Filed: December 30, 2020
    Date of Patent: October 31, 2023
    Assignee: Dell Products L.P.
    Inventors: Mohamed Sohail, Hung Dinh, Parminder Singh Sethi, Mohammad Rafey, Bijan Kumar Mohanty
  • Patent number: 11722472
    Abstract: One example method includes correlating trust scoring with authentication levels. Trust scores are protected in a computing system such that devices can be validated. Authentication levels are based on the verified trust scores.
    Type: Grant
    Filed: December 31, 2020
    Date of Patent: August 8, 2023
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Mohamed Sohail, Robert A. Lincourt, Said Tabet
  • Patent number: 11507698
    Abstract: A method, comprising: obtaining a data item that is associated with an IoT device, the IoT device including one or more of a sensor, an actuator, or an energy source; obtaining, from a blockchain-based attestation system, a trust score that is associated with the data item, the trust score being generated by using a consensus-building mechanism that is provided by the blockchain-based attestation system; when the trust score satisfies a predetermined condition, using the data item; and when the trust score fails to satisfy the predetermined condition, discarding the data item, wherein the IoT device is configured to operate as a node in the blockchain-based attestation system, and the blockchain-based attestation system includes one or more other IoT devices that are part of the same IoT device network as the IoT device.
    Type: Grant
    Filed: January 19, 2021
    Date of Patent: November 22, 2022
    Assignee: Dell Products L.P.
    Inventors: Mohamed Sohail, Said Tabet
  • Publication number: 20220292221
    Abstract: Techniques are provided for secure data management in a network computing environment. A security management system receives data from a device which operates in a device network that is managed by the security management system. The security management system performs a data classification process to determine a data sensitivity level of the received data. The security management system determines a type of encryption to apply to the received data based on the determined data sensitivity level. The type of encryption is determined from a plurality of different types of encryption that are supported by a cloud system. The security management system sends the received data to the cloud system to at least one of store the data and perform secured data analytic processing of the data, in a format according to the determined type of encryption.
    Type: Application
    Filed: March 15, 2021
    Publication date: September 15, 2022
    Inventors: Mohamed Sohail, Said Tabet
  • Patent number: 11438413
    Abstract: Systems and methods are provided for implementing an intelligent data management system for data storage and data management in a cloud computing environment. For example, a system includes an application server, a distributed data storage system, and an intelligent data management system. The application server is configured to host a data processing application. The distributed data storage system is configured to store data generated by a network of devices associated with the data processing application. The intelligent data management system is configured to manage data storage operations for storing the data generated by the network of devices in the distributed data storage system. For example, the intelligent data management system is configured to determine one or more data types of the data generated by the network of devices and select one of a plurality of repositories within the distributed data storage system to store the data based on the determined data types.
    Type: Grant
    Filed: April 29, 2019
    Date of Patent: September 6, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Mohamed Sohail, Junping Zhao
  • Publication number: 20220229936
    Abstract: A method, comprising: obtaining a data item that is associated with an IoT device, the IoT device including one or more of a sensor, an actuator, or an energy source; obtaining, from a blockchain-based attestation system, a trust score that is associated with the data item, the trust score being generated by using a consensus-building mechanism that is provided by the blockchain-based attestation system; when the trust score satisfies a predetermined condition, using the data item; and when the trust score fails to satisfy the predetermined condition, discarding the data item, wherein the IoT device is configured to operate as a node in the blockchain-based attestation system, and the blockchain-based attestation system includes one or more other IoT devices that are part of the same IoT device network as the IoT device.
    Type: Application
    Filed: January 19, 2021
    Publication date: July 21, 2022
    Applicant: Dell Products L.P.
    Inventors: Mohamed Sohail, Said Tabet
  • Publication number: 20220206877
    Abstract: An apparatus comprises a processing device configured to generate a model of a plurality of devices characterizing relationships between the devices, to build a device dependency chain for the devices based on the model, to predict workload for each of the devices in one or more time slots of a given time period, and to determine a deployment schedule for the devices based on the device dependency chain and the predicted workload. The processing device is also configured to utilize the deployment schedule to select a device of the devices on which to perform an operation, to determine whether the selected device corresponds to an additional device of the devices configured to operate in place of the selected device during performance of the operation, and to control performance of the operation on the selected device responsive to the determination of whether the selected device corresponds to the additional device.
    Type: Application
    Filed: December 30, 2020
    Publication date: June 30, 2022
    Inventors: Mohamed Sohail, Hung Dinh, Parminder Singh Sethi, Mohammad Rafey, Bijan Kumar Mohanty
  • Publication number: 20220210142
    Abstract: One example method includes correlating trust scoring with authentication levels. Trust scores are protected in a computing system such that devices can be validated. Authentication levels are based on the verified trust scores.
    Type: Application
    Filed: December 31, 2020
    Publication date: June 30, 2022
    Inventors: Mohamed Sohail, Robert A. Lincourt, Said Tabet
  • Publication number: 20220129426
    Abstract: One example method includes collaborative deduplication. A deduplication engine implemented at a cloud level collaborates or coordinates with an extension engine of the deduplication at an edge node. This allows data ingested at a node to be collaboratively deduplicated prior to transfer to the cloud and after transfer to the cloud.
    Type: Application
    Filed: October 27, 2020
    Publication date: April 28, 2022
    Inventors: Mohamed Sohail, Karim Fathy, Robert A. Lincourt
  • Patent number: 11316851
    Abstract: Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security mechanisms for network environments. For example, a method includes collecting power consumption data of a plurality of devices operating within a network and determining trust scores for the plurality of devices based, at least in part, on the collected power consumption data. The trust score for a device provides a measure of trustworthiness of the device exhibiting normal operating behavior within the network. Each device is assigned to one of a plurality of trust tiers based on the determined trust scores, wherein each trust tier specifies an authentication level for devices assigned to the trust tier. One or more authentication procedures are applied to authenticate a given device operating within the network based on the authentication level specified by the trust tier to which the given device is assigned.
    Type: Grant
    Filed: June 19, 2019
    Date of Patent: April 26, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Mohamed Sohail, Said Tabet
  • Patent number: 11146626
    Abstract: Systems and methods are provided to configure a replication system to reduce latency of data read access operations in a cloud computing environment. Intelligent routing decision systems and methods are implemented in conjunction with a distributed replication system in a cloud computing environment to direct write requests to a primary site (e.g., production site) by default, and to automatically and intelligently direct read requests to a target site (e.g., primary site or replica site) to reduce data read latency and/or bandwidth. A reduction in read delay is achieved, in part, by intelligently selecting a target site (e.g., data center) in a cloud computing environment which is close or closest in distance to a requesting entity (e.g., user or application) requesting data, thereby reducing a propagation delay and/or latency in accessing and downloading data from the target site.
    Type: Grant
    Filed: November 1, 2018
    Date of Patent: October 12, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Mohamed Sohail, Junping Zhao
  • Patent number: 11109229
    Abstract: Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security for a network environment using a centralized smart security system. For example, a method includes implementing a network comprising a plurality of network devices which collectively generate data that is utilized by a computing system to execute an application, and implementing a centralized security system as a computing node within the network to manage security operations within the network and to establish secured and trusted communications between the network devices and the computing system. The network devices may comprise wireless sensor devices operating in a wireless sensor network, wherein the computing system executes an IoT (Internet of Things) application which processes the data that is generated by the wireless sensor devices.
    Type: Grant
    Filed: July 9, 2019
    Date of Patent: August 31, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Mohamed Sohail, Stephen Todd, Said Tabet, Khaled Ahmed
  • Publication number: 20200403991
    Abstract: Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security mechanisms for network environments. For example, a method includes collecting power consumption data of a plurality of devices operating within a network and determining trust scores for the plurality of devices based, at least in part, on the collected power consumption data. The trust score for a device provides a measure of trustworthiness of the device exhibiting normal operating behavior within the network. Each device is assigned to one of a plurality of trust tiers based on the determined trust scores, wherein each trust tier specifies an authentication level for devices assigned to the trust tier. One or more authentication procedures are applied to authenticate a given device operating within the network based on the authentication level specified by the trust tier to which the given device is assigned.
    Type: Application
    Filed: June 19, 2019
    Publication date: December 24, 2020
    Inventors: Mohamed Sohail, Said Tabet
  • Publication number: 20200344299
    Abstract: Systems and methods are provided for implementing an intelligent data management system for data storage and data management in a cloud computing environment. For example, a system includes an application server, a distributed data storage system, and an intelligent data management system. The application server is configured to host a data processing application. The distributed data storage system is configured to store data generated by a network of devices associated with the data processing application. The intelligent data management system is configured to manage data storage operations for storing the data generated by the network of devices in the distributed data storage system. For example, the intelligent data management system is configured to determine one or more data types of the data generated by the network of devices and select one of a plurality of repositories within the distributed data storage system to store the data based on the determined data types.
    Type: Application
    Filed: April 29, 2019
    Publication date: October 29, 2020
    Inventors: Mohamed Sohail, Junping Zhao
  • Patent number: 10659533
    Abstract: An apparatus in one embodiment comprises a plurality of container host devices of at least one processing platform. The container host devices implement a plurality of containers for executing applications on behalf of one or more tenants of cloud infrastructure. The containers have associated layer structures each characterizing container images of respective different ones of the containers. Movement of container data between different storage devices by at least one of the container host devices for at least one of the containers is controlled based at least in part on one or more characteristics of a corresponding one of the layer structures. For example, controlling movement of container data between the different storage devices may comprise assigning at least one of different prefetching priority weights and different cache-swapping priority weights to different layers of the given layer structure.
    Type: Grant
    Filed: April 26, 2017
    Date of Patent: May 19, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Junping Zhao, Kevin Xu, Mohamed Sohail, Wei Cui
  • Publication number: 20200145480
    Abstract: Systems and methods are provided to configure a replication system to reduce latency of data read access operations in a cloud computing environment. Intelligent routing decision systems and methods are implemented in conjunction with a distributed replication system in a cloud computing environment to direct write requests to a primary site (e.g., production site) by default, and to automatically and intelligently direct read requests to a target site (e.g., primary site or replica site) to reduce data read latency and/or bandwidth. A reduction in read delay is achieved, in part, by intelligently selecting a target site (e.g., data center) in a cloud computing environment which is close or closest in distance to a requesting entity (e.g., user or application) requesting data, thereby reducing a propagation delay and/or latency in accessing and downloading data from the target site.
    Type: Application
    Filed: November 1, 2018
    Publication date: May 7, 2020
    Inventors: Mohamed Sohail, Junping Zhao
  • Publication number: 20190335333
    Abstract: Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security for a network environment using a centralized smart security system. For example, a method includes implementing a network comprising a plurality of network devices which collectively generate data that is utilized by a computing system to execute an application, and implementing a centralized security system as a computing node within the network to manage security operations within the network and to establish secured and trusted communications between the network devices and the computing system. The network devices may comprise wireless sensor devices operating in a wireless sensor network, wherein the computing system executes an IoT (Internet of Things) application which processes the data that is generated by the wireless sensor devices.
    Type: Application
    Filed: July 9, 2019
    Publication date: October 31, 2019
    Inventors: Mohamed Sohail, Stephen Todd, Said Tabet, Khaled Ahmed
  • Publication number: 20190334701
    Abstract: An apparatus in one embodiment comprises a processing platform configured to communicate over a network with a plurality of Internet of Things (IoT) devices. The processing platform receives at least a first intermediate message from a first gateway of the network, receives one or more additional intermediate messages from each of one or more additional gateways of the network, associates the first and additional intermediate messages with one another based at least in part on a common message identifier detected in each such intermediate message, and processes the associated first and additional intermediate messages to recover a device message from a given one of the IoT devices. The first intermediate message is based at least in part on at least one application of a designated cryptographic function to the device message utilizing a corresponding key. At least one of the one or more additional intermediate messages provides at least a portion of the key.
    Type: Application
    Filed: April 25, 2018
    Publication date: October 31, 2019
    Inventors: Junping Zhao, Mohamed Sohail
  • Patent number: 10419931
    Abstract: Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security for a network environment using a centralized smart security system. For example, a method includes implementing a network comprising a plurality of network devices which collectively generate data that is utilized by a computing system to execute an application, and implementing a centralized security system as a computing node within the network to manage security operations within the network and to establish secured and trusted communications between the network devices and the computing system. The network devices may comprise wireless sensor devices operating in a wireless sensor network, wherein computing system executes an IoT (Internet of Things) application which processes the data that is generated by the wireless sensor devices.
    Type: Grant
    Filed: August 25, 2016
    Date of Patent: September 17, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Mohamed Sohail, Stephen Todd, Said Tabet, Khaled Ahmed