Patents by Inventor Ahmed Saad Alsalim
Ahmed Saad Alsalim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11768599Abstract: The present disclosure describes a method to manage an enterprise data storage system, the method including: dividing storage disks of the enterprise data storage system into multiple virtual storage subsystems, wherein each virtual storage subsystem hosts a non-overlapping subset of the storage disks, and wherein each virtual storage subsystem includes a level-2 cache memory dedicated thereto; establishing a communication path between the level-2 cache memory dedicated to each virtual storage subsystem and a main cache of the enterprise-level data storage system; and maintaining a copy of transaction data from the non-overlapping subset of the storage disks hosted by each virtual storage subsystem in the level-2 cache memory dedicated thereto such that when the main cache searches for the copy of the transaction data, the main cache fetches, over the communication path, the copy of the transaction data from the level-2 cache memory of the virtual storage subsystem.Type: GrantFiled: July 13, 2021Date of Patent: September 26, 2023Assignee: Saudi Arabian Oil CompanyInventors: Ahmed Saad Alsalim, Ali Ahmed Hussain
-
Patent number: 11729162Abstract: A system and method for providing cable security in a network is generally described. The method includes receiving a request to remove a cable, where the request includes a first password and a second password, and wherein the cable connects a first port and a second port. The method further includes determining a first authenticity of the first password. After determining the first authenticity of the first password, the method further includes suspending a data flow through the cable, virtually mapping, by a storage device configuration unit, the first port to a third port, and transmitting the data flow from the third port to the second port. The method further includes determining an authenticity of the second password. After determining the authenticity of the second password, the method includes unlocking a physical lock connected to the cable.Type: GrantFiled: August 11, 2020Date of Patent: August 15, 2023Assignee: SAUDI ARABIAN OIL COMPANYInventor: Ahmed Saad Alsalim
-
Patent number: 11693994Abstract: A system and method for securing data storage devices in an information technology (IT) network storage system is provided. The security system comprises a security control computer and electronic locks, which are mounted in a data center cabinet to slots for holding respective data storage devices. The security protocol implemented by the control computer requires an authorized administrator to execute a lock/unlock command identifying a particular device, and to provide a first part of a combination key. Additionally, an on-site hardware engineer is required to input a second part of the key at a terminal on-site at the data center. Upon verification of the first key, and then the second key, the control computer unlocks or locks the appropriate electronic lock. The control computer also implements a data backup/flushing process prior to allowing removal of an online cache board to avoid data corruption, loss, or system interruption.Type: GrantFiled: April 29, 2021Date of Patent: July 4, 2023Assignee: SAUDI ARABIAN OIL COMPANYInventor: Ahmed Saad Alsalim
-
Patent number: 11580235Abstract: A security solution having a system, a method, or a computer program for protecting contents in a target storage device that is arranged to be removable from a storage system having a unique combination of a system complex key (SCK) and a system identification (SID). The solution includes receiving a request to remove the target storage device from the storage system, where the storage system may have a plurality of storage devices each containing the identical combination of system complex key (SCK) and system identification (SID), and receiving a system complex key password (SCKP). The solution includes comparing the system complex key password (SCKP) to the system complex key (SCK) in the storage system, determining whether the system complex key password (SCKP) matches the system complex key (SCK) in the storage system, and suspending all read or write operations to the target storage device when the system complex key password (SCKP) matches the system complex key (SCK) in the storage system.Type: GrantFiled: January 2, 2020Date of Patent: February 14, 2023Assignee: Saudi Arabian Oil CompanyInventors: Ahmed Saad Alsalim, Ali Ahmad Alhussain
-
Publication number: 20230016745Abstract: The present disclosure describes a method to manage an enterprise data storage system, the method including: dividing storage disks of the enterprise data storage system into multiple virtual storage subsystems, wherein each virtual storage subsystem hosts a non-overlapping subset of the storage disks, and wherein each virtual storage subsystem includes a level-2 cache memory dedicated thereto; establishing a communication path between the level-2 cache memory dedicated to each virtual storage subsystem and a main cache of the enterprise-level data storage system; and maintaining a copy of transaction data from the non-overlapping subset of the storage disks hosted by each virtual storage subsystem in the level-2 cache memory dedicated thereto such that when the main cache searches for the copy of the transaction data, the main cache fetches, over the communication path, the copy of the transaction data from the level-2 cache memory of the virtual storage subsystem.Type: ApplicationFiled: July 13, 2021Publication date: January 19, 2023Inventors: Ahmed Saad Alsalim, Ali Ahmed Hussain
-
Publication number: 20220350934Abstract: A system and method for securing data storage devices in an information technology (IT) network storage system is provided. The security system comprises a security control computer and electronic locks, which are mounted in a data center cabinet to slots for holding respective data storage devices. The security protocol implemented by the control computer requires an authorized administrator to execute a lock/unlock command identifying a particular device, and to provide a first part of a combination key. Additionally, an on-site hardware engineer is required to input a second part of the key at a terminal on-site at the data center. Upon verification of the first key, and then the second key, the control computer unlocks or locks the appropriate electronic lock. The control computer also implements a data backup/flushing process prior to allowing removal of an online cache board to avoid data corruption, loss, or system interruption.Type: ApplicationFiled: April 29, 2021Publication date: November 3, 2022Inventor: Ahmed Saad Alsalim
-
Publication number: 20220052990Abstract: A system and method for providing cable security in a network is generally described. The method includes receiving a request to remove a cable, where the request includes a first password and a second password, and wherein the cable connects a first port and a second port. The method further includes determining a first authenticity of the first password. After determining the first authenticity of the first password, the method further includes suspending a data flow through the cable, virtually mapping, by a storage device configuration unit, the first port to a third port, and transmitting the data flow from the third port to the second port. The method further includes determining an authenticity of the second password. After determining the authenticity of the second password, the method includes unlocking a physical lock connected to the cable.Type: ApplicationFiled: August 11, 2020Publication date: February 17, 2022Inventor: Ahmed Saad Alsalim
-
Publication number: 20210209234Abstract: A security solution having a system, a method, or a computer program for protecting contents in a target storage device that is arranged to be removable from a storage system having a unique combination of a system complex key (SCK) and a system identification (SID). The solution includes receiving a request to remove the target storage device from the storage system, where the storage system may have a plurality of storage devices each containing the identical combination of system complex key (SCK) and system identification (SID), and receiving a system complex key password (SCKP). The solution includes comparing the system complex key password (SCKP) to the system complex key (SCK) in the storage system, determining whether the system complex key password (SCKP) matches the system complex key (SCK) in the storage system, and suspending all read or write operations to the target storage device when the system complex key password (SCKP) matches the system complex key (SCK) in the storage system.Type: ApplicationFiled: January 2, 2020Publication date: July 8, 2021Inventors: Ahmed Saad Alsalim, Ali Ahmad Alhussain
-
Patent number: 10936436Abstract: A computer-implemented method includes the following. A start time for a backup of data in a system is received. At the start time, a snapshot of the data in the system is captured. When an environment of the system is a database environment, the capturing includes setting a status of a database to backup mode and freezing data files in the database while permitting applications to run. When the environment of the system is a non-database environment, and when a file system type is general parallel file system (GPFS), the capturing includes caching new input/output operations to a cache and starting a timer (counter) for flushing the cache. At a specified time, the snapshot is copied to media, setting the status of the database to normal mode, and providing copying notifications to users.Type: GrantFiled: August 7, 2018Date of Patent: March 2, 2021Assignee: Saudi Arabian Oil CompanyInventor: Ahmed Saad Alsalim
-
Publication number: 20200050516Abstract: A computer-implemented method includes the following. A start time for a backup of data in a system is received. At the start time, a snapshot of the data in the system is captured. When an environment of the system is a database environment, the capturing includes setting a status of a database to backup mode and freezing data files in the database while permitting applications to run. When the environment of the system is a non-database environment, and when a file system type is general parallel file system (GPFS), the capturing includes caching new input/output operations to a cache and starting a timer (counter) for flushing the cache. At a specified time, the snapshot is copied to media, setting the status of the database to normal mode, and providing copying notifications to users.Type: ApplicationFiled: August 7, 2018Publication date: February 13, 2020Inventor: Ahmed Saad Alsalim