Patents by Inventor Ahmed Saad Alsalim

Ahmed Saad Alsalim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11768599
    Abstract: The present disclosure describes a method to manage an enterprise data storage system, the method including: dividing storage disks of the enterprise data storage system into multiple virtual storage subsystems, wherein each virtual storage subsystem hosts a non-overlapping subset of the storage disks, and wherein each virtual storage subsystem includes a level-2 cache memory dedicated thereto; establishing a communication path between the level-2 cache memory dedicated to each virtual storage subsystem and a main cache of the enterprise-level data storage system; and maintaining a copy of transaction data from the non-overlapping subset of the storage disks hosted by each virtual storage subsystem in the level-2 cache memory dedicated thereto such that when the main cache searches for the copy of the transaction data, the main cache fetches, over the communication path, the copy of the transaction data from the level-2 cache memory of the virtual storage subsystem.
    Type: Grant
    Filed: July 13, 2021
    Date of Patent: September 26, 2023
    Assignee: Saudi Arabian Oil Company
    Inventors: Ahmed Saad Alsalim, Ali Ahmed Hussain
  • Patent number: 11729162
    Abstract: A system and method for providing cable security in a network is generally described. The method includes receiving a request to remove a cable, where the request includes a first password and a second password, and wherein the cable connects a first port and a second port. The method further includes determining a first authenticity of the first password. After determining the first authenticity of the first password, the method further includes suspending a data flow through the cable, virtually mapping, by a storage device configuration unit, the first port to a third port, and transmitting the data flow from the third port to the second port. The method further includes determining an authenticity of the second password. After determining the authenticity of the second password, the method includes unlocking a physical lock connected to the cable.
    Type: Grant
    Filed: August 11, 2020
    Date of Patent: August 15, 2023
    Assignee: SAUDI ARABIAN OIL COMPANY
    Inventor: Ahmed Saad Alsalim
  • Patent number: 11693994
    Abstract: A system and method for securing data storage devices in an information technology (IT) network storage system is provided. The security system comprises a security control computer and electronic locks, which are mounted in a data center cabinet to slots for holding respective data storage devices. The security protocol implemented by the control computer requires an authorized administrator to execute a lock/unlock command identifying a particular device, and to provide a first part of a combination key. Additionally, an on-site hardware engineer is required to input a second part of the key at a terminal on-site at the data center. Upon verification of the first key, and then the second key, the control computer unlocks or locks the appropriate electronic lock. The control computer also implements a data backup/flushing process prior to allowing removal of an online cache board to avoid data corruption, loss, or system interruption.
    Type: Grant
    Filed: April 29, 2021
    Date of Patent: July 4, 2023
    Assignee: SAUDI ARABIAN OIL COMPANY
    Inventor: Ahmed Saad Alsalim
  • Patent number: 11580235
    Abstract: A security solution having a system, a method, or a computer program for protecting contents in a target storage device that is arranged to be removable from a storage system having a unique combination of a system complex key (SCK) and a system identification (SID). The solution includes receiving a request to remove the target storage device from the storage system, where the storage system may have a plurality of storage devices each containing the identical combination of system complex key (SCK) and system identification (SID), and receiving a system complex key password (SCKP). The solution includes comparing the system complex key password (SCKP) to the system complex key (SCK) in the storage system, determining whether the system complex key password (SCKP) matches the system complex key (SCK) in the storage system, and suspending all read or write operations to the target storage device when the system complex key password (SCKP) matches the system complex key (SCK) in the storage system.
    Type: Grant
    Filed: January 2, 2020
    Date of Patent: February 14, 2023
    Assignee: Saudi Arabian Oil Company
    Inventors: Ahmed Saad Alsalim, Ali Ahmad Alhussain
  • Publication number: 20230016745
    Abstract: The present disclosure describes a method to manage an enterprise data storage system, the method including: dividing storage disks of the enterprise data storage system into multiple virtual storage subsystems, wherein each virtual storage subsystem hosts a non-overlapping subset of the storage disks, and wherein each virtual storage subsystem includes a level-2 cache memory dedicated thereto; establishing a communication path between the level-2 cache memory dedicated to each virtual storage subsystem and a main cache of the enterprise-level data storage system; and maintaining a copy of transaction data from the non-overlapping subset of the storage disks hosted by each virtual storage subsystem in the level-2 cache memory dedicated thereto such that when the main cache searches for the copy of the transaction data, the main cache fetches, over the communication path, the copy of the transaction data from the level-2 cache memory of the virtual storage subsystem.
    Type: Application
    Filed: July 13, 2021
    Publication date: January 19, 2023
    Inventors: Ahmed Saad Alsalim, Ali Ahmed Hussain
  • Publication number: 20220350934
    Abstract: A system and method for securing data storage devices in an information technology (IT) network storage system is provided. The security system comprises a security control computer and electronic locks, which are mounted in a data center cabinet to slots for holding respective data storage devices. The security protocol implemented by the control computer requires an authorized administrator to execute a lock/unlock command identifying a particular device, and to provide a first part of a combination key. Additionally, an on-site hardware engineer is required to input a second part of the key at a terminal on-site at the data center. Upon verification of the first key, and then the second key, the control computer unlocks or locks the appropriate electronic lock. The control computer also implements a data backup/flushing process prior to allowing removal of an online cache board to avoid data corruption, loss, or system interruption.
    Type: Application
    Filed: April 29, 2021
    Publication date: November 3, 2022
    Inventor: Ahmed Saad Alsalim
  • Publication number: 20220052990
    Abstract: A system and method for providing cable security in a network is generally described. The method includes receiving a request to remove a cable, where the request includes a first password and a second password, and wherein the cable connects a first port and a second port. The method further includes determining a first authenticity of the first password. After determining the first authenticity of the first password, the method further includes suspending a data flow through the cable, virtually mapping, by a storage device configuration unit, the first port to a third port, and transmitting the data flow from the third port to the second port. The method further includes determining an authenticity of the second password. After determining the authenticity of the second password, the method includes unlocking a physical lock connected to the cable.
    Type: Application
    Filed: August 11, 2020
    Publication date: February 17, 2022
    Inventor: Ahmed Saad Alsalim
  • Publication number: 20210209234
    Abstract: A security solution having a system, a method, or a computer program for protecting contents in a target storage device that is arranged to be removable from a storage system having a unique combination of a system complex key (SCK) and a system identification (SID). The solution includes receiving a request to remove the target storage device from the storage system, where the storage system may have a plurality of storage devices each containing the identical combination of system complex key (SCK) and system identification (SID), and receiving a system complex key password (SCKP). The solution includes comparing the system complex key password (SCKP) to the system complex key (SCK) in the storage system, determining whether the system complex key password (SCKP) matches the system complex key (SCK) in the storage system, and suspending all read or write operations to the target storage device when the system complex key password (SCKP) matches the system complex key (SCK) in the storage system.
    Type: Application
    Filed: January 2, 2020
    Publication date: July 8, 2021
    Inventors: Ahmed Saad Alsalim, Ali Ahmad Alhussain
  • Patent number: 10936436
    Abstract: A computer-implemented method includes the following. A start time for a backup of data in a system is received. At the start time, a snapshot of the data in the system is captured. When an environment of the system is a database environment, the capturing includes setting a status of a database to backup mode and freezing data files in the database while permitting applications to run. When the environment of the system is a non-database environment, and when a file system type is general parallel file system (GPFS), the capturing includes caching new input/output operations to a cache and starting a timer (counter) for flushing the cache. At a specified time, the snapshot is copied to media, setting the status of the database to normal mode, and providing copying notifications to users.
    Type: Grant
    Filed: August 7, 2018
    Date of Patent: March 2, 2021
    Assignee: Saudi Arabian Oil Company
    Inventor: Ahmed Saad Alsalim
  • Publication number: 20200050516
    Abstract: A computer-implemented method includes the following. A start time for a backup of data in a system is received. At the start time, a snapshot of the data in the system is captured. When an environment of the system is a database environment, the capturing includes setting a status of a database to backup mode and freezing data files in the database while permitting applications to run. When the environment of the system is a non-database environment, and when a file system type is general parallel file system (GPFS), the capturing includes caching new input/output operations to a cache and starting a timer (counter) for flushing the cache. At a specified time, the snapshot is copied to media, setting the status of the database to normal mode, and providing copying notifications to users.
    Type: Application
    Filed: August 7, 2018
    Publication date: February 13, 2020
    Inventor: Ahmed Saad Alsalim