Patents by Inventor ASMAHAN A. ALI

ASMAHAN A. ALI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230385889
    Abstract: Provided is a computer-implemented method, system, and computer program product for predictive service orchestration using threat modeling analytics. A processor may identify a plurality of attributes of a client computing environment. The processor may collect threat modeling content for a plurality of vendor computing environments. The processor may analyze the threat modeling content for the plurality of vendor computing environments. The processor may compare the analyzed threat modeling content for the plurality of vendor computing environments with the plurality of attributes of the client computing environment. The processor may generate, based on the comparing, a client threat model for the client computing environment.
    Type: Application
    Filed: May 24, 2022
    Publication date: November 30, 2023
    Inventors: ASMAHAN ALI, Mustafa Mah, Abhishek Jain, Sasikanth Eda
  • Publication number: 20230297417
    Abstract: A method, system, and computer program product for context relevant data migration to a cloud server with job rescheduling are provided. The method identifies a contextual situation associated with at least a portion of data sets available for migration to a cloud server by a set of data sources. The method identifies an application associated with the contextual situation. A set of use characteristics are determined for the data sets based on the contextual situation and the application. Bandwidths are determined for one or more data sources. One or more data sets are selected for prioritization based on a contextual relevance, the set of use characteristics, and the bandwidths for the one or more data sources. The method schedules a job processing sequence of the selected one or more data sets based, at least in part, on the contextual relevancy, the set of use characteristics, and the bandwidths.
    Type: Application
    Filed: March 15, 2022
    Publication date: September 21, 2023
    Inventors: Asmahan Ali, Daniel De Souza Casali, Abhishek Jain, Sarbajit K. Rakshit
  • Patent number: 11650975
    Abstract: Online file system consistency check for container data on a clustered file system is provided via identifying inodes (index nodes) of a group of files in a clustered file system based on a cyber-resiliency for the clustered file system; grouping the inodes based on a buffer size allocated to a FSCK (File System Consistency Check) operation; passing the inodes of to the FSCK operation in a single iteration when a total size of the inodes is less than the buffer size; or when the total size of the inodes is greater than the buffer size, identifying inodes that belong to a first container and that belong to a second container; passing the inodes that belong to the first container to the FSCK operation in a first iteration; and passing, after the first iteration completes, the inodes that belong to the second container to the FSCK operation in a second iteration.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: May 16, 2023
    Assignee: International Business Machines Corporation
    Inventors: Asmahan Ali, Christina Lara, Abhishek Jain, Sasikanth Eda
  • Publication number: 20220391353
    Abstract: A computer-implemented method, according to one embodiment, includes: receiving, at a clustered filesystem from a formatted filesystem, a request to perform a data integrity check for a portion of data. A determination is made as to whether the request includes a filesystem type of the portion of data, and in response to determining that the request includes a filesystem type of the portion of data, another determination is made as to whether the clustered filesystem supports the data integrity check for the filesystem type. In response to determining the clustered filesystem supports the data integrity check, another determination is made as to whether the portion of data is currently available. Furthermore, the computer-implemented method includes causing the data integrity check to be performed in response to determining that the portion of data is currently available. Results of performing the data integrity check are also sent to the formatted filesystem.
    Type: Application
    Filed: June 2, 2021
    Publication date: December 8, 2022
    Inventors: Asmahan Ali, Christina Lara, Sasikanth Eda, Abhishek Jain, Sanjay Vipin Gandhi
  • Publication number: 20220188289
    Abstract: Online file system consistency check for container data on a clustered file system is provided via identifying inodes (index nodes) of a group of files in a clustered file system based on a cyber-resiliency for the clustered file system; grouping the inodes based on a buffer size allocated to a FSCK (File System Consistency Check) operation; passing the inodes of to the FSCK operation in a single iteration when a total size of the inodes is less than the buffer size; or when the total size of the inodes is greater than the buffer size, identifying inodes that belong to a first container and that belong to a second container; passing the inodes that belong to the first container to the FSCK operation in a first iteration; and passing, after the first iteration completes, the inodes that belong to the second container to the FSCK operation in a second iteration.
    Type: Application
    Filed: December 11, 2020
    Publication date: June 16, 2022
    Inventors: Asmahan ALI, Christina LARA, Abhishek JAIN, Sasikanth EDA
  • Patent number: 11360939
    Abstract: Testing is performed to ensure integrity of a file system auditing component and of a file system. A list of file access events is built. This list includes expected events that should be triggered by the file system and found in a log. The events in the list are run on the file system and logged. The log of expected events is then compared with actual events logged by the file system to determine the integrity of the file system auditing component and the file system.
    Type: Grant
    Filed: May 22, 2018
    Date of Patent: June 14, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ali Y. Duale, Mustafa Mah, Asmahan Ali
  • Patent number: 11164663
    Abstract: Embodiments include method, systems and computer program products for minimizing errors in prescription medication dispensing. Aspects include obtaining, by a processor, a prescription of a medication for a patient. Then, aspects include obtaining, by the processor, a patient profile associated with the patient and obtaining, by the processor, medication details for the medication. Aspects also include displaying to the patient, by a first device, the medication details.
    Type: Grant
    Filed: November 17, 2016
    Date of Patent: November 2, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
  • Patent number: 10776640
    Abstract: A method for an enhanced vehicle monitoring system that utilizes cameras and other sensors to determine the state of the interior and/or exterior of a vehicle is provided. The method comprises detecting that a driver has exited a vehicle. The method further comprises monitoring a state of the vehicle. The method further comprises determining based, at least in part, on the monitoring, if an object has been left in the vehicle unintentionally or if the vehicle has been left running unattended. The method further comprises, upon determining that the object has been left in the vehicle or the vehicle has been left running unattended, sending a notification to the driver.
    Type: Grant
    Filed: January 6, 2017
    Date of Patent: September 15, 2020
    Assignee: International Business Machines Corporation
    Inventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
  • Patent number: 10764788
    Abstract: In one embodiment, in accordance with the present invention, a method, computer program product, and system for managing and redistributing unused bandwidth between devices connected to a mobile telecommunications network is provided. One or more computer processors determine a predicted amount of data to be used by a mobile device. The one or more computer processors determine a surplus of allocated data based on whether the predicted amount of data is less than an allocated amount of data. The one or more computer processors, upon determining that there is a surplus of allocated data, move the surplus of allocated data to a data pool to be used by one or more additional mobile devices.
    Type: Grant
    Filed: November 29, 2017
    Date of Patent: September 1, 2020
    Assignee: International Business Machines Corporation
    Inventors: Asmahan Ali, Ali Y. Duale, Mustafa Mah
  • Patent number: 10755122
    Abstract: A method for an enhanced vehicle monitoring system that utilizes cameras and other sensors to determine the state of the interior and/or exterior of a vehicle is provided. The method comprises detecting that a driver has exited a vehicle. The method further comprises monitoring a state of the vehicle. The method further comprises determining based, at least in part, on the monitoring, if an object has been left in the vehicle unintentionally or if the vehicle has been left running unattended. The method further comprises, upon determining that the object has been left in the vehicle or the vehicle has been left running unattended, sending a notification to the driver.
    Type: Grant
    Filed: December 8, 2017
    Date of Patent: August 25, 2020
    Assignee: International Business Machines Corporation
    Inventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
  • Patent number: 10740631
    Abstract: A method for an enhanced vehicle monitoring system that utilizes cameras and other sensors to determine the state of the interior and/or exterior of a vehicle is provided. The method comprises detecting that a driver has exited a vehicle. The method further comprises monitoring a state of the vehicle. The method further comprises determining based, at least in part, on the monitoring, if an object has been left in the vehicle unintentionally or if the vehicle has been left running unattended. The method further comprises, upon determining that the object has been left in the vehicle or the vehicle has been left running unattended, sending a notification to the driver.
    Type: Grant
    Filed: October 26, 2017
    Date of Patent: August 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
  • Patent number: 10743140
    Abstract: In an approach to sending an alert based on a user's location, one or more computer processors identify a position of a target device as a first location based, at least in part, on data provided by one or more geolocation systems; identify a location category for the first location; determine that the identified location category is among a predetermined set of location categories; identify a time threshold for the identified location category; identify an alert that is associated with the identified location category within the database; determine an amount of time that the target device is present at the first location; and determine that the amount of time the target device is present at the first location exceeds the time threshold, and in response, sending the alert to the one or more recipient devices for the purpose of notifying users of the first location of the target device.
    Type: Grant
    Filed: May 16, 2018
    Date of Patent: August 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Asmahan Ali, Ali Y. Duale, Mustafa Mah
  • Patent number: 10715473
    Abstract: Provided are systems, methods, and media for optimized processing of message responses from multiple email recipients. An example method includes receiving, by a message exchange system, an email message from a sender that is to be transmitted to a plurality of recipients. The method includes receiving, by the message exchange system, a number of commitment messages from one or more recipients of the plurality of recipients. The method includes transmitting by the message exchange system, in response to detecting that the number of received commitment messages is equal to a requested number of responses, a first alert to a subset of recipients of the plurality of recipients indicating that the subset of recipients do not need to respond to the email message, in which the subset of recipients are the recipients who did not transmit a commitment message to the message exchange system.
    Type: Grant
    Filed: July 24, 2018
    Date of Patent: July 14, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ali Y. Duale, Asmahan Ali, Mustafa Mah
  • Publication number: 20200036669
    Abstract: Provided are systems, methods, and media for optimized processing of message responses from multiple email recipients. An example method includes receiving, by a message exchange system, an email message from a sender that is to be transmitted to a plurality of recipients. The method includes receiving, by the message exchange system, a number of commitment messages from one or more recipients of the plurality of recipients. The method includes transmitting by the message exchange system, in response to detecting that the number of received commitment messages is equal to a requested number of responses, a first alert to a subset of recipients of the plurality of recipients indicating that the subset of recipients do not need to respond to the email message, in which the subset of recipients are the recipients who did not transmit a commitment message to the message exchange system.
    Type: Application
    Filed: July 24, 2018
    Publication date: January 30, 2020
    Inventors: Ali Y. Duale, Asmahan Ali, Mustafa Mah
  • Publication number: 20190361990
    Abstract: Testing is performed to ensure integrity of a file system auditing component and of a file system. A list of file access events is built. This list includes expected events that should be triggered by the file system and found in a log. The events in the list are run on the file system and logged. The log of expected events is then compared with actual events logged by the file system to determine the integrity of the file system auditing component and the file system.
    Type: Application
    Filed: May 22, 2018
    Publication date: November 28, 2019
    Inventors: Ali Y. Duale, Mustafa Mah, Asmahan Ali
  • Publication number: 20190357010
    Abstract: In an approach to sending an alert based on a user's location, one or more computer processors identify a position of a target device as a first location based, at least in part, on data provided by one or more geolocation systems; identify a location category for the first location; determine that the identified location category is among a predetermined set of location categories; identify a time threshold for the identified location category; identify an alert that is associated with the identified location category within the database; determine an amount of time that the target device is present at the first location; and determine that the amount of time the target device is present at the first location exceeds the time threshold, and in response, sending the alert to the one or more recipient devices for the purpose of notifying users of the first location of the target device.
    Type: Application
    Filed: May 16, 2018
    Publication date: November 21, 2019
    Inventors: Asmahan Ali, Ali Y. Duale, Mustafa Mah
  • Patent number: 10419527
    Abstract: The described herein relates to repairing a file system. Repairing the file system includes identifying a corrupted node of a tree corresponding to the file system and determining a status of a parent node of the corrupted node based on a status bit of the parent node. Repairing the file system also includes disabling the parent node to an off-line mode when the status bit indicates that the parent node is in an on-line mode; fixing the corrupted node while the parent node is in the off-line mode; and enabling the parent node to the on-line mode in response to fixing the at least one corrupted node.
    Type: Grant
    Filed: June 8, 2016
    Date of Patent: September 17, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
  • Patent number: 10412152
    Abstract: The described herein relates to repairing a file system. Repairing the file system includes identifying a corrupted node of a tree corresponding to the file system and determining a status of a parent node of the corrupted node based on a status bit of the parent node. Repairing the file system also includes disabling the parent node to an off-line mode when the status bit indicates that the parent node is in an on-line mode; fixing the corrupted node while the parent node is in the off-line mode; and enabling the parent node to the on-line mode in response to fixing the at least one corrupted node.
    Type: Grant
    Filed: November 24, 2015
    Date of Patent: September 10, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
  • Patent number: 10332347
    Abstract: Methods, systems and computer program products for utilizing wearable devices in an entertainment environment are provided. Aspects include creating associations between a plurality of individuals and a plurality of wearable devices and classifying each of the plurality of individuals into one or more groups, wherein each group includes at least one child and at least one parent. Aspects also include tracking a location of one of the plurality of wearable devices associated with a first child of a first group and based on a determination that the first child is attempting to leave a predetermined area, determining whether the first child is accompanied by a first adult, wherein the first adult is a member of the first group.
    Type: Grant
    Filed: July 25, 2016
    Date of Patent: June 25, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
  • Publication number: 20190166521
    Abstract: In one embodiment, in accordance with the present invention, a method, computer program product, and system for managing and redistributing unused bandwidth between devices connected to a mobile telecommunications network is provided. One or more computer processors determine a predicted amount of data to be used by a mobile device. The one or more computer processors determine a surplus of allocated data based on whether the predicted amount of data is less than an allocated amount of data. The one or more computer processors, upon determining that there is a surplus of allocated data, move the surplus of allocated data to a data pool to be used by one or more additional mobile devices.
    Type: Application
    Filed: November 29, 2017
    Publication date: May 30, 2019
    Inventors: Asmahan Ali, Ali Y. Duale, Mustafa Mah