Patents by Inventor Engy A. Ali

Engy A. Ali has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190005255
    Abstract: Aspects extend to methods, systems, and computer program products for protecting sensitive data when importing and exporting resources. When a user exports resources from a source environment into a package, restricted information (e.g., privacy settings, security settings, resource identifiers, customer information, etc.) from the source environment can be replaced with unrestricted surrogate information. When a user imports resources into a target environment from a package, unrestricted surrogate information can be replaced with restricted information from the target environment. When a user imports resources, suggestions can be provided to help the user select the appropriate resource based on prior import selects. Aspects of the invention can include at least two phases. A first phase can include exporting a package from a source environment and a second phase can include importing the package into a target environment.
    Type: Application
    Filed: December 22, 2017
    Publication date: January 3, 2019
    Inventors: Engy Ali Mohamed Morsy Ali, Kyle Anthony Werner, David J. Messner
  • Publication number: 20180213048
    Abstract: Methods, systems, apparatuses, and computer program products are described herein for the development of applications and/or workflows that are enabled to transmit and/or push notifications to end-users. The developer (or “maker” or “creator”) of the application(s) and/or workflow(s) are enabled to develop such application(s) and/or workflow(s) without having to be expert programmers (i.e., such a developer may be a business user with little to no programming experience). The techniques described herein enable the transmission of cross-application push notifications to end-users of a target application in a secure manner. For example, push notification requests may be monitored to determine whether they are authorized to be transmitted in accordance with an administrator-configurable policy rule, thereby preventing unwanted push notifications from being transmitted. Moreover, computing resources may be scaled up (or scaled down) depending on how many users are to receive a particular push notification.
    Type: Application
    Filed: September 7, 2017
    Publication date: July 26, 2018
    Inventors: David J. Messner, Mohamed A. Aboubakr, Laura S. Onu, Engy A. Ali