Patents by Inventor Mohamed Zouhaier RAMADHANE
Mohamed Zouhaier RAMADHANE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12160749Abstract: A method includes generating, by a computing device, SSID aliases; propagating, by the computing device, the SSID aliases to access points; receiving, by the computing device, data from an access point, the data including a selected SSID alias and a media access control (MAC) address of a user device; creating, by the computing device, a record containing the selected SSID alias and the MAC address of the user device; propagating, by the computing device, the selected SSID alias to remaining access points; and sending, by the computing device, a message to the access points to delete the selected SSID alias after a time period.Type: GrantFiled: October 28, 2021Date of Patent: December 3, 2024Assignee: Kyndryl, Inc.Inventors: Cesar Augusto Rodriguez Bravo, Mohamed Zouhaier Ramadhane, David Alonso Campos Batista, Desilda Toska
-
Patent number: 12141316Abstract: In an approach to obfuscation of sensitive information through non-visual feedback, responsive to receiving a signal from a user to start a session requiring input of sensitive data, one or more dummy character positions are determined, where the one or more dummy character positions represent characters that are not part of the sensitive data. Responsive to a current character position is any dummy character position of the one or more dummy character positions, the user is signaled that a next input character will be ignored, where the user is signaled using non-visual feedback. Responsive to receiving the next input character from the user, where the current character position is any dummy character position of the one or more dummy character positions, the next input character is ignored.Type: GrantFiled: October 11, 2021Date of Patent: November 12, 2024Assignee: International Business Machines CorporationInventors: Mohamed Zouhaier Ramadhane, Jose Luis Rodriguez Gomez, Cesar Augusto Rodriguez Bravo, Susanna Ting, Ana Paola Hentze Veerkamp
-
Patent number: 12132858Abstract: Real time audio stream validation is provided. An audio stream of a voice communication corresponding to a call is segmented into a plurality of blocks in response to receiving the audio stream from a user. The plurality of blocks is modified to generate a first modified audio stream corresponding to the call that includes hashed values of the plurality of blocks. The first modified audio stream along with the hashed values of the plurality of blocks is sent via a network.Type: GrantFiled: November 11, 2021Date of Patent: October 29, 2024Assignee: International Business Machines CorporationInventors: Mohamed Zouhaier Ramadhane, Cesar Augusto Rodriguez Bravo, Ana Vialeny Mota Gómez, Desilda Toska
-
Publication number: 20240329944Abstract: A first function of a first microservice and a second function of a second microservice are derived from data of an application using a plurality of microservices. From the first function and the second function, an embodiment determines that the first microservice and the second microservice have above a threshold similarity with each other. An embodiment determines a set of differences between the first microservice and the second microservice. New source code of the application is generated, the new source code utilizing the first microservice instead of the second microservice, the first microservice selected using the set of differences.Type: ApplicationFiled: March 31, 2023Publication date: October 3, 2024Applicant: International Business Machines CorporationInventors: Andrea Cabrera Galindo, Catalina Albornoz Anzola, Ana Vialeny Mota Gómez, Mohamed Zouhaier Ramadhane
-
Publication number: 20240305441Abstract: According to one embodiment, a method, computer system, and computer program product for privacy-enhanced, biometrics-based authentication is provided. The embodiment may include capturing credential information on a credential medium and biometric information for a user, each provided by the user, by one or more information capture devices. The embodiment may also include identifying a hash stored on the credential medium based on the captured credential information. The embodiment may further include calculating, locally, a hash of the biometric information using a preconfigured hashing algorithm. The embodiment may also include, in response to the identified hash matching the calculated hash, authenticating the user.Type: ApplicationFiled: March 9, 2023Publication date: September 12, 2024Inventors: Mohamed Zouhaier RAMADHANE, Ricardo RAMOS, Syed ALI, Mauro Marzorati, Fernando R Zuliani
-
Patent number: 12039843Abstract: A method includes: monitoring outputs of sensors in a machine that receives magnetic stripe cards; determining the outputs of sensors indicate normal usage of the machine or abnormal usage of the machine; in response to determining the outputs of the sensors indicate abnormal usage of the machine, initiating a security action; in response to determining the outputs of the sensors indicate normal usage of the machine, determining the machine is in use or not in use; in response to determining the machine is not in use, initiating the security action; in response to determining the machine is in use, determining whether the use ends within a predefined monitor time; in response to determining the use does not end within the predefined monitor time, initiating the security action; and in response to determining the use does end within the predefined monitor time, returning to monitoring the outputs of the sensors.Type: GrantFiled: October 22, 2021Date of Patent: July 16, 2024Assignee: KYNDRYL, INC.Inventors: Mohamed Zouhaier Ramadhane, Cesar Augusto Rodriguez Bravo, Desilda Toska, David Alonso Campos Batista
-
Patent number: 11972623Abstract: An approach for enhancing a video stream. The approach processes a video stream and identifies frames comprising text. The approach marks text extraction locations and extracts the text from the frames. The approach determines if a mirroring effect should be applied to the text and applies if applicable, creating enhanced text. The approach inserts the enhanced text and smooths the edges of the inserted enhanced text. The approach merges the frames with the enhanced text into the video stream, creating an enhanced video stream and sends the enhanced video stream to requesting users.Type: GrantFiled: July 23, 2021Date of Patent: April 30, 2024Assignee: International Business Machines CorporationInventors: Mohamed Zouhaier Ramadhane, Juan Manuel Avalos Vega, Daniela Ofelia Rojas Barrientos, Cesar Augusto Rodriguez Bravo
-
Patent number: 11875652Abstract: A computer-implemented method includes: monitoring, by a computing device, outputs of sensors associated with a machine that receives magnetic stripe cards; in response to the monitoring, detecting, by the computing device, the output of at least one of the sensors indicates an event; in response to the detecting the event, determining, by the computing device, a number of the sensors whose output indicates a respective event during a predefined time period; selecting, by the computing device, a security action from a plurality of predefined security actions based on the determined number of the sensors whose output indicates a respective event during the predefined time period; and initiating, by the computing device, the security action.Type: GrantFiled: October 22, 2021Date of Patent: January 16, 2024Assignee: KYNDRYL, INC.Inventors: Cesar Augusto Rodriguez Bravo, Mohamed Zouhaier Ramadhane, Desilda Toska
-
Patent number: 11856147Abstract: A computer-implemented method for detecting and concealing confidential communications is disclosed. The computer-implemented method includes determining an audio output source used by a participant of an audio conference is unidentifiable. The computer-implemented method further includes responsive to determining that the audio output source used by the participant of the audio conference is unidentifiable, transmitting a high frequency signal via audio conference software used by the participant to conduct the audio conference. The computer-implemented method further includes responsive to detecting the high frequency signal via a microphone of a user device used by the participant to listen to the audio conference, determining that the participant is using a speaker to listen to the audio conference.Type: GrantFiled: January 4, 2022Date of Patent: December 26, 2023Assignee: International Business Machines CorporationInventors: Mohamed Zouhaier Ramadhane, Cesar Augusto Rodriguez Bravo, Daniela Ofelia Rojas Barrientos, Carolina Garcia Delgado
-
Patent number: 11789691Abstract: A method can include identifying an audio output device having a first audio status. In the first audio status, the audio output device can be configured to receive first audio data of at least one software application of a set of software applications of a computing device. In the first audio status, the audio output device can be configured to emit, based on the first audio data, first audio content corresponding to the at least one software application. The method can include identifying a priority software application of the computing device. The method can include assigning, in response to the identifying the priority software application, a second audio status to the audio output device. The assigning can include preventing the audio output device from emitting the first audio content. The assigning can further include configuring the audio output device to emit second audio content of the priority software application.Type: GrantFiled: June 16, 2021Date of Patent: October 17, 2023Assignee: KYNDRYL, INC.Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, Mohamed Zouhaier Ramadhane, Adan Edoardo Herrera Hidalgo
-
Publication number: 20230216964Abstract: A computer-implemented method for detecting and concealing confidential communications is disclosed. The computer-implemented method includes determining an audio output source used by a participant of an audio conference is unidentifiable. The computer-implemented method further includes responsive to determining that the audio output source used by the participant of the audio conference is unidentifiable, transmitting a high frequency signal via audio conference software used by the participant to conduct the audio conference. The computer-implemented method further includes responsive to detecting the high frequency signal via a microphone of a user device used by the participant to listen to the audio conference, determining that the participant is using a speaker to listen to the audio conference.Type: ApplicationFiled: January 4, 2022Publication date: July 6, 2023Inventors: Mohamed Zouhaier Ramadhane, Cesar Augusto Rodriguez Bravo, Daniela Ofelia Rojas Barrientos, Carolina Garcia Delgado
-
Publication number: 20230188162Abstract: A computer-implemented method of data compression leveraging quantum computing and classical computing includes extracting metadata from a binary data to be compressed. The binary data is compressed by iteratively performing a compression operation including selecting a hashing function and hashing the binary data. The quantum computer device performs an inverting of the hashing function and generates a finite number of one or more resultant files associated with the hashed data. A compressed file including the hashes and the metadata used for the decompression is stored upon determining that the one or more resultant files is a single file.Type: ApplicationFiled: December 15, 2021Publication date: June 15, 2023Inventors: Mohamed Zouhaier Ramadhane, Catalina Albornoz
-
Publication number: 20230141773Abstract: Real time audio stream validation is provided. An audio stream of a voice communication corresponding to a call is segmented into a plurality of blocks in response to receiving the audio stream from a user. The plurality of blocks is modified to generate a first modified audio stream corresponding to the call that includes hashed values of the plurality of blocks. The first modified audio stream along with the hashed values of the plurality of blocks is sent via a network.Type: ApplicationFiled: November 11, 2021Publication date: May 11, 2023Inventors: Mohamed Zouhaier Ramadhane, Cesar Augusto Rodriguez Bravo, Ana Vialeny Mota Gómez, Desilda Toska
-
Publication number: 20230135589Abstract: A method includes generating, by a computing device, SSID aliases; propagating, by the computing device, the SSID aliases to access points; receiving, by the computing device, data from an access point, the data including a selected SSID alias and a media access control (MAC) address of a user device; creating, by the computing device, a record containing the selected SSID alias and the MAC address of the user device; propagating, by the computing device, the selected SSID alias to remaining access points; and sending, by the computing device, a message to the access points to delete the selected SSID alias after a time period.Type: ApplicationFiled: October 28, 2021Publication date: May 4, 2023Inventors: Cesar Augusto RODRIGUEZ BRAVO, Mohamed Zouhaier RAMADHANE, David Alonso CAMPOS BATISTA, Desilda TOSKA
-
Publication number: 20230129964Abstract: A computer-implemented method includes: monitoring, by a computing device, outputs of sensors associated with a machine that receives magnetic stripe cards; in response to the monitoring, detecting, by the computing device, the output of at least one of the sensors indicates an event; in response to the detecting the event, determining, by the computing device, a number of the sensors whose output indicates a respective event during a predefined time period; selecting, by the computing device, a security action from a plurality of predefined security actions based on the determined number of the sensors whose output indicates a respective event during the predefined time period; and initiating, by the computing device, the security action.Type: ApplicationFiled: October 22, 2021Publication date: April 27, 2023Inventors: Cesar Augusto Rodriguez Bravo, MOHAMED ZOUHAIER RAMADHANE, DESILDA TOSKA
-
Publication number: 20230132132Abstract: A method includes: monitoring outputs of sensors in a machine that receives magnetic stripe cards; determining the outputs of sensors indicate normal usage of the machine or abnormal usage of the machine; in response to determining the outputs of the sensors indicate abnormal usage of the machine, initiating a security action; in response to determining the outputs of the sensors indicate normal usage of the machine, determining the machine is in use or not in use; in response to determining the machine is not in use, initiating the security action; in response to determining the machine is in use, determining whether the use ends within a predefined monitor time; in response to determining the use does not end within the predefined monitor time, initiating the security action; and in response to determining the use does end within the predefined monitor time, returning to monitoring the outputs of the sensors.Type: ApplicationFiled: October 22, 2021Publication date: April 27, 2023Inventors: MOHAMED ZOUHAIER RAMADHANE, CESAR AUGUSTO RODRIGUEZ BRAVO, DESILDA TOSKA, DAVID ALONSO CAMPOS BATISTA
-
Publication number: 20230116384Abstract: In an approach to obfuscation of sensitive information through non-visual feedback, responsive to receiving a signal from a user to start a session requiring input of sensitive data, one or more dummy character positions are determined, where the one or more dummy character positions represent characters that are not part of the sensitive data. Responsive to a current character position is any dummy character position of the one or more dummy character positions, the user is signaled that a next input character will be ignored, where the user is signaled using non-visual feedback. Responsive to receiving the next input character from the user, where the current character position is any dummy character position of the one or more dummy character positions, the next input character is ignored.Type: ApplicationFiled: October 11, 2021Publication date: April 13, 2023Inventors: MOHAMED ZOUHAIER RAMADHANE, JOSE LUIS RODRIGUEZ GOMEZ, Cesar Augusto Rodriguez Bravo, Susanna Ting, Ana Paola Hentze Veerkamp
-
Publication number: 20230026706Abstract: An approach for enhancing a video stream. The approach processes a video stream and identifies frames comprising text. The approach marks text extraction locations and extracts the text from the frames. The approach determines if a mirroring effect should be applied to the text and applies if applicable, creating enhanced text. The approach inserts the enhanced text and smooths the edges of the inserted enhanced text. The approach merges the frames with the enhanced text into the video stream, creating an enhanced video stream and sends the enhanced video stream to requesting users.Type: ApplicationFiled: July 23, 2021Publication date: January 26, 2023Inventors: Mohamed Zouhaier Ramadhane, Juan Manuel Avalos Vega, Daniela Ofelia Rojas Barrientos, Cesar Augusto Rodriguez Bravo
-
Publication number: 20220405042Abstract: A method can include identifying an audio output device having a first audio status. In the first audio status, the audio output device can be configured to receive first audio data of at least one software application of a set of software applications of a computing device. In the first audio status, the audio output device can be configured to emit, based on the first audio data, first audio content corresponding to the at least one software application. The method can include identifying a priority software application of the computing device. The method can include assigning, in response to the identifying the priority software application, a second audio status to the audio output device. The assigning can include preventing the audio output device from emitting the first audio content. The assigning can further include configuring the audio output device to emit second audio content of the priority software application.Type: ApplicationFiled: June 16, 2021Publication date: December 22, 2022Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, MOHAMED ZOUHAIER RAMADHANE, ADAN EDOARDO HERRERA HIDALGO
-
Publication number: 20220358494Abstract: In an approach for enabling communication between offline devices to perform secure transaction, a processor sends information in an optically recognizable first code including a response type, an identity of the first device and a type of optical reader associated with the first device. A processor receives encoded information in an optically recognizable second code. A processor extracts a user identifier and the one-time password associated with the registered second device. A processor determines that a user certificate associated with the user identifier exists in a local repository. A processor validates the one-time password associated with the registered second device with the user certificate using a public certificate associated with the first device, the one-time password associated with the registered second device and the one-time password seed. A processor authenticates the user.Type: ApplicationFiled: May 6, 2021Publication date: November 10, 2022Inventors: MOHAMED ZOUHAIER RAMADHANE, Cesar Augusto Rodriguez Bravo, Susanna Ting, Juan Manuel Avalos Vega, Daniela Ofelia Rojas Barrientos