Patents by Inventor Farida Shafik

Farida Shafik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11915294
    Abstract: One example method includes data orchestration. Data sets are available to users in an online marketplace. Based on requests for data sets, other data sets may be recommended. The recommended data sets are moved or copied to recommended locations. This ensures that the data sets are available to the user more quickly if subsequently requested.
    Type: Grant
    Filed: July 23, 2021
    Date of Patent: February 27, 2024
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Farida Shafik, Nicole Reineke, Joel Christner, Omar Abdulaal, Shary Beshara
  • Patent number: 11797702
    Abstract: One example method includes extracting content metadata from data, storing the content metadata in a data catalogue, receiving at the data catalogue, from a user, a request to access the data, transmitting, by the data catalogue to a security service provider, an access request that includes the extracted content metadata and metadata relating to the access request, accessing, by the security service provider, identity metadata concerning an identity of the user, and a data access policy, and transmitting, by the security service provider to the data catalogue, a decision as to whether or not access can be granted to the data, and the decision is based on the data access policy, the identity metadata, and the metadata in the access request.
    Type: Grant
    Filed: March 11, 2021
    Date of Patent: October 24, 2023
    Assignee: EMC IP Holding Company LLC
    Inventors: Nicole Reineke, Hanna Yehuda, Omar Abdul Aal, Farida Shafik, Joel Christner, Shary Beshara, Ahmad Refaat Abdel Fadeel Ahmad El Rouby
  • Publication number: 20230127865
    Abstract: One example method includes determining representation bias in a data set. A bias detection engine is trained using a data set that is sufficiently diversified and/or unbiased. Once trained, test data sets can be evaluated by the bias detection engine to determine an amount of representation bias in the test data sets. The representation bias can be visually conveyed to a user and suggestions on how to reduce the representation bias may be provided and/or implemented to reduce the representation bias in the test data set. Suggestions can be implemented by adding or removing data from the test data that will reduce the representation bias.
    Type: Application
    Filed: October 22, 2021
    Publication date: April 27, 2023
    Inventors: Farida Shafik, Shary Beshara, Amy N. Seibel, Eric Bruno, Megan Hyland
  • Publication number: 20230068691
    Abstract: One example method includes integrating user space applications with kernel space events including primitives. The events are intercepted in kernel space and processed in user space. The events can be stored in a session cache that allows a holistic view of behavior to be determined with regard to resources of the computing system. The events in the session cache can be correlated to user or process behavior by provided a time-based view of the events.
    Type: Application
    Filed: August 31, 2021
    Publication date: March 2, 2023
    Inventors: Joel Christner, Nicole Reineke, Farida Shafik
  • Publication number: 20230036220
    Abstract: One example method includes data orchestration. Data sets are available to users in an online marketplace. Based on requests for data sets, other data sets may be recommended. The recommended data sets are moved or copied to recommended locations. This ensures that the data sets are available to the user more quickly if subsequently requested.
    Type: Application
    Filed: July 23, 2021
    Publication date: February 2, 2023
    Inventors: Farida Shafik, Nicole Reineke, Joel Christner, Omar Abdulaal, Shary Beshara
  • Publication number: 20230004663
    Abstract: One example method includes receiving a request from a user to access data stored in a filesystem, in response to the request, retrieving metadata of the data and metadata of the user, validating the metadata of the data and the metadata of the user against a data access rule, and granting the user access to the data upon successful validation of the metadata of the data and the metadata of the user.
    Type: Application
    Filed: June 30, 2021
    Publication date: January 5, 2023
    Inventors: Farida Shafik, Joel Christner, Nicole Reineke
  • Publication number: 20220414210
    Abstract: One example method includes monitoring a data access pattern, registering a data access request directed to data, comparing metadata associated with the data access request to a rule, based on a result of the comparing, sending a trigger to a graph service, and using information in the trigger to generate a visual representation of the data access request, wherein the visual representation indicates an extent to which the data access request is considered to constitute a potential threat to the data.
    Type: Application
    Filed: June 29, 2021
    Publication date: December 29, 2022
    Inventors: Ahmad Refaat Abdel Fadeel Ahmad El Rouby, Omar Abdulaal, Nicole Reineke, Joel Christner, Farida Shafik, Shary Beshara
  • Publication number: 20220345471
    Abstract: One example method includes extracting an expected communication specification of a service that is in development in a build pipeline, stimulating the service to exercise communication variations of the service, capturing communication traffic involving the service and one or more endpoints, comparing the captured communication traffic to the expected communication specification, and based on the comparing, detecting, in the captured communication traffic, and flagging, any anomalous communication behavior of the service.
    Type: Application
    Filed: April 21, 2021
    Publication date: October 27, 2022
    Inventors: Farida Shafik, Shary Beshara, Michael Estrin
  • Publication number: 20220292211
    Abstract: One example method includes extracting content metadata from data, storing the content metadata in a data catalogue, receiving at the data catalogue, from a user, a request to access the data, transmitting, by the data catalogue to a security service provider, an access request that includes the extracted content metadata and metadata relating to the access request, accessing, by the security service provider, identity metadata concerning an identity of the user, and a data access policy, and transmitting, by the security service provider to the data catalogue, a decision as to whether or not access can be granted to the data, and the decision is based on the data access policy, the identity metadata, and the metadata in the access request.
    Type: Application
    Filed: March 11, 2021
    Publication date: September 15, 2022
    Inventors: Nicole Reineke, Hanna Yehuda, Omar Abdul Aal, Farida Shafik, Joel Christner, Shary Beshara, Ahmad Refaat Abdel Fadeel Ahmad El Rouby