Patents by Inventor Said Tabet
Said Tabet has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11516109Abstract: Techniques described herein relate to a method for performing data services. The method may include receiving, from a monitor agent, a global name and metadata corresponding to data written to a data structure of storage of a data host; performing a services assessment using the global name, the metadata, and a data service policy rule to obtain at least one data service to perform on the data; and performing the at least one data service based on the services assessment.Type: GrantFiled: July 27, 2021Date of Patent: November 29, 2022Assignee: EMC IP Holding Company LLCInventors: William Jeffery White, John S. Harwood, Robert Anthony Lincourt, Jr., Said Tabet
-
Patent number: 11507698Abstract: A method, comprising: obtaining a data item that is associated with an IoT device, the IoT device including one or more of a sensor, an actuator, or an energy source; obtaining, from a blockchain-based attestation system, a trust score that is associated with the data item, the trust score being generated by using a consensus-building mechanism that is provided by the blockchain-based attestation system; when the trust score satisfies a predetermined condition, using the data item; and when the trust score fails to satisfy the predetermined condition, discarding the data item, wherein the IoT device is configured to operate as a node in the blockchain-based attestation system, and the blockchain-based attestation system includes one or more other IoT devices that are part of the same IoT device network as the IoT device.Type: GrantFiled: January 19, 2021Date of Patent: November 22, 2022Assignee: Dell Products L.P.Inventors: Mohamed Sohail, Said Tabet
-
Publication number: 20220345217Abstract: An information handling system includes a plurality of network nodes and a processor. Each network node includes an optical link and a reflectometry analyzer. The reflection analyzers provide a plurality of reflectometry results that each provide a characterization of physical properties of the optical link. The processor receives the reflectometry results, analyzes the reflectometry results to define a fingerprint of the physical properties of the optical link, and determines a status for each of the optical links based upon the associated fingerprints. The status for each of the optical links includes one of a plurality of graded statuses. Each graded status represents a qualitative measure of the physical properties of the associated optical link. A first graded status represents a better qualitative measure than a second graded status. The processor further receives a request to route a data flow from a first one of the network nodes to a second one of the network nodes.Type: ApplicationFiled: September 30, 2021Publication date: October 27, 2022Inventors: Qing Ye, Rowland Shaw, Said Tabet
-
Publication number: 20220345214Abstract: A data communication network includes a plurality of network nodes and a processor. The network nodes each include an optical link and a reflectometry analyzer. The reflection analyzers provide reflectometry results that each provide a characterization of physical and operational properties of the associated optical link. The processor receives the reflectometry results from the reflectometry analyzers, and, for each optical link, analyzes the reflectometry results to determine a fingerprint of the physical and operational properties of the associated optical link. The processor further determines a status for each of the optical links based upon the associated fingerprints, and determines a first path between a first one of the network nodes and a second one of the network nodes based upon a first status of a first optical link in the first path and a second status of a second optical link in the path.Type: ApplicationFiled: September 30, 2021Publication date: October 27, 2022Inventors: Said Tabet, Qing Ye, Rowland Shaw
-
Publication number: 20220345213Abstract: A data communication network includes a network node and a processor. The network node includes an optical link and a reflectometry analyzer. The reflection analyzer provides a plurality of reflectometry results that each provide a characterization of physical and operational properties of the optical link at the time of the reflectometry result. The processor receives a first set of the reflectometry results, analyzes the first set of reflectometry results to define a fingerprint of the physical and operational properties of the optical link, receives a second set of the reflectometry results, compares the second set of reflectometry results with the fingerprint, and determines whether or not the optical link is secure based upon the comparison of the second set of reflectometry results with the fingerprint.Type: ApplicationFiled: September 30, 2021Publication date: October 27, 2022Inventors: Said Tabet, Qing Ye, Rowland Shaw
-
Publication number: 20220345212Abstract: A data communication network includes a network node and a processor. The network node includes an optical link and a reflectometry analyzer to provide a plurality of reflectometry results, each reflectometry result providing a characterization of physical and operational properties of the optical link at the time of the reflectometry result. The processor receives a first set of the reflectometry results, and calculates a federated fingerprint of the physical and operational properties of the optical link based on the plurality of fingerprints in first set of the reflectometry results. The federated fingerprint is a combination of fingerprints from every section of the optical link. The processor receives a second set of the reflectometry results, and compares each of a plurality of fingerprints in the second set of reflectometry results with a respective corresponding fingerprint in the federated fingerprint.Type: ApplicationFiled: September 30, 2021Publication date: October 27, 2022Inventors: Rowland Shaw, Qing Ye, Said Tabet
-
Publication number: 20220345801Abstract: A data communication network includes a plurality of network nodes coupled together via optical links and a network controller. Each network node includes a reflectometry analyzer that provides a characterization of physical properties of the optical links coupled to the associated network node. The characterization for each particular optical link provides a unique fingerprint of the physical properties of the particular optical link.Type: ApplicationFiled: May 9, 2022Publication date: October 27, 2022Inventors: Rowland Shaw, Qing Ye, Said Tabet
-
Publication number: 20220345215Abstract: An information handling system includes a plurality of network nodes and a processor. The network nodes each include an optical link and a reflectometry analyzer. The reflection analyzers provide reflectometry results that each provide a characterization of physical properties of the associated optical link. The processor receives the reflectometry results, and, for each optical link, analyzes the reflectometry results to determine a fingerprint of the physical properties of the associated optical link. The processor further determines a status for each of the optical links based upon the associated fingerprints, and displays a map of the information handling system including each network node and the associated optical link, wherein the map provides an indication of the status for each of the optical links.Type: ApplicationFiled: September 30, 2021Publication date: October 27, 2022Inventors: Qing Ye, Rowland Shaw, Said Tabet
-
Publication number: 20220292221Abstract: Techniques are provided for secure data management in a network computing environment. A security management system receives data from a device which operates in a device network that is managed by the security management system. The security management system performs a data classification process to determine a data sensitivity level of the received data. The security management system determines a type of encryption to apply to the received data based on the determined data sensitivity level. The type of encryption is determined from a plurality of different types of encryption that are supported by a cloud system. The security management system sends the received data to the cloud system to at least one of store the data and perform secured data analytic processing of the data, in a format according to the determined type of encryption.Type: ApplicationFiled: March 15, 2021Publication date: September 15, 2022Inventors: Mohamed Sohail, Said Tabet
-
Publication number: 20220229936Abstract: A method, comprising: obtaining a data item that is associated with an IoT device, the IoT device including one or more of a sensor, an actuator, or an energy source; obtaining, from a blockchain-based attestation system, a trust score that is associated with the data item, the trust score being generated by using a consensus-building mechanism that is provided by the blockchain-based attestation system; when the trust score satisfies a predetermined condition, using the data item; and when the trust score fails to satisfy the predetermined condition, discarding the data item, wherein the IoT device is configured to operate as a node in the blockchain-based attestation system, and the blockchain-based attestation system includes one or more other IoT devices that are part of the same IoT device network as the IoT device.Type: ApplicationFiled: January 19, 2021Publication date: July 21, 2022Applicant: Dell Products L.P.Inventors: Mohamed Sohail, Said Tabet
-
Patent number: 11392733Abstract: A physical event to be modeled is selected. A profile for the physical event is generated based on an event type of the physical event. Data is obtained from a plurality of data sources, wherein the obtained data comprises data relevant to the physical event that is collected by the plurality of data sources, and further wherein at least a portion of the obtained data comprises one or more of spatial and temporal references associated with the collection of the data. A digital representation of the physical event is generated based on at least a portion of the obtained data and the generated profile. The digital representation is utilized to analyze one or more other physical events associated with the modeled physical event.Type: GrantFiled: August 3, 2018Date of Patent: July 19, 2022Assignee: EMC IP Holding Company LLCInventors: Stephen J. Todd, Assaf Natanzon, Dragan Savic, Said Tabet
-
Patent number: 11388493Abstract: A data communication network includes a plurality of network nodes coupled together via optical links and a network controller. Each network node includes a reflectometry analyzer that provides a characterization of physical properties of the optical links coupled to the associated network node. The characterization for each particular optical link provides a unique fingerprint of the physical properties of the particular optical link.Type: GrantFiled: April 27, 2021Date of Patent: July 12, 2022Assignee: Dell Products L.P.Inventors: Rowland Shaw, Qing Ye, Said Tabet
-
Publication number: 20220210142Abstract: One example method includes correlating trust scoring with authentication levels. Trust scores are protected in a computing system such that devices can be validated. Authentication levels are based on the verified trust scores.Type: ApplicationFiled: December 31, 2020Publication date: June 30, 2022Inventors: Mohamed Sohail, Robert A. Lincourt, Said Tabet
-
Patent number: 11316851Abstract: Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security mechanisms for network environments. For example, a method includes collecting power consumption data of a plurality of devices operating within a network and determining trust scores for the plurality of devices based, at least in part, on the collected power consumption data. The trust score for a device provides a measure of trustworthiness of the device exhibiting normal operating behavior within the network. Each device is assigned to one of a plurality of trust tiers based on the determined trust scores, wherein each trust tier specifies an authentication level for devices assigned to the trust tier. One or more authentication procedures are applied to authenticate a given device operating within the network based on the authentication level specified by the trust tier to which the given device is assigned.Type: GrantFiled: June 19, 2019Date of Patent: April 26, 2022Assignee: EMC IP Holding Company LLCInventors: Mohamed Sohail, Said Tabet
-
Patent number: 11194745Abstract: One example method includes receiving an IO request from an application, determining if an affinity policy applies to the application that transmitted the IO request, when an affinity policy applies to the application, directing the IO request to a specified site of a replication system, when no affinity policy applies to the application, determining if a lag in replication of the IO request from a primary site to a replication site is acceptable, if a lag in replication of the IO request is acceptable, processing the IO request using performance based parameters and/or load balancing parameters, and if a lag in replication of the IO request is not acceptable, either directing the IO request to a most up to date replica site, or requesting a clone copy of a volume to which the IO request was initially directed and directing the IO request to the cloned copy.Type: GrantFiled: October 28, 2020Date of Patent: December 7, 2021Assignee: EMC IP HOLDING COMPANY LLCInventors: Mohamed Abdullah Gommaa Sohail, Said Tabet
-
Patent number: 11109229Abstract: Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security for a network environment using a centralized smart security system. For example, a method includes implementing a network comprising a plurality of network devices which collectively generate data that is utilized by a computing system to execute an application, and implementing a centralized security system as a computing node within the network to manage security operations within the network and to establish secured and trusted communications between the network devices and the computing system. The network devices may comprise wireless sensor devices operating in a wireless sensor network, wherein the computing system executes an IoT (Internet of Things) application which processes the data that is generated by the wireless sensor devices.Type: GrantFiled: July 9, 2019Date of Patent: August 31, 2021Assignee: EMC IP Holding Company LLCInventors: Mohamed Sohail, Stephen Todd, Said Tabet, Khaled Ahmed
-
Patent number: 10956377Abstract: Techniques are disclosed for decentralized data management using a geographic location-based consensus protocol in a network of computing resources such as, by way of example, a highly distributed system. For example, at a given consensus node of a consensus network comprising a plurality of consensus nodes configured to participate in a consensus protocol wherein at least a portion of the consensus nodes are mobile, a list is obtained of at least a subset of the plurality of consensus nodes that are predicted to be currently available to participate in the consensus protocol based on geographic location information. A message comprising a transaction to be validated is sent from the given consensus node to the subset of the plurality of consensus nodes in the obtained list. Techniques are also disclosed for adjusting a data protection policy based on the number of computing nodes, some of which are mobile, available to participate.Type: GrantFiled: July 12, 2018Date of Patent: March 23, 2021Assignee: EMC IP Holding Company LLCInventors: Stephen J. Todd, Assaf Natanzon, Said Tabet, Dragan Savic
-
Publication number: 20200403991Abstract: Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security mechanisms for network environments. For example, a method includes collecting power consumption data of a plurality of devices operating within a network and determining trust scores for the plurality of devices based, at least in part, on the collected power consumption data. The trust score for a device provides a measure of trustworthiness of the device exhibiting normal operating behavior within the network. Each device is assigned to one of a plurality of trust tiers based on the determined trust scores, wherein each trust tier specifies an authentication level for devices assigned to the trust tier. One or more authentication procedures are applied to authenticate a given device operating within the network based on the authentication level specified by the trust tier to which the given device is assigned.Type: ApplicationFiled: June 19, 2019Publication date: December 24, 2020Inventors: Mohamed Sohail, Said Tabet
-
Patent number: 10841237Abstract: In a system environment comprising a plurality of computing resources, wherein at least a portion of the computing resources are mobile, a method maintains a decentralized messaging network of interconnected messaging nodes and a decentralized data network of interconnected data nodes. Each of the plurality of computing resources is associated with a given messaging node and a given data node. The method manages transfer of a data set between the plurality of computing resources in association with the decentralized messaging network and the decentralized data network. Managing transfer of the data set comprises inserting a policy file into the decentralized data network specifying one or more policies for managing the transfer of the data set and inserting a message into the decentralized messaging network instructing implementation of the one or more policies.Type: GrantFiled: April 23, 2018Date of Patent: November 17, 2020Assignee: EMC IP Holding Company LLCInventors: Stephen J. Todd, Said Tabet, Assaf Natanzon, Dragan Savic
-
Patent number: 10841240Abstract: In a system environment comprising a plurality of computing resources, wherein at least a portion of the computing resources are mobile, a method manages a transfer of one or more portions of a data set between at least a subset of the plurality of computing resources in accordance with a data distribution process. The data distribution process comprises computing one or more probability values to estimate whether or not a given mobile computing resource that is seeking at least a portion of the data set will be in a vicinity of at least one other computing resource that currently has or can obtain the portion of the data set, and based on the computation step, causing a transfer of the portion of the data set to the given mobile computing resource over a communication link locally established between the two computing resources when in the vicinity of one another.Type: GrantFiled: July 18, 2018Date of Patent: November 17, 2020Assignee: EMC IP Holding Company LLCInventors: Stephen J. Todd, Dragan Savic, Assaf Natanzon, Said Tabet