Patents by Inventor Mustafa Mah

Mustafa Mah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230385889
    Abstract: Provided is a computer-implemented method, system, and computer program product for predictive service orchestration using threat modeling analytics. A processor may identify a plurality of attributes of a client computing environment. The processor may collect threat modeling content for a plurality of vendor computing environments. The processor may analyze the threat modeling content for the plurality of vendor computing environments. The processor may compare the analyzed threat modeling content for the plurality of vendor computing environments with the plurality of attributes of the client computing environment. The processor may generate, based on the comparing, a client threat model for the client computing environment.
    Type: Application
    Filed: May 24, 2022
    Publication date: November 30, 2023
    Inventors: ASMAHAN ALI, Mustafa Mah, Abhishek Jain, Sasikanth Eda
  • Patent number: 11360939
    Abstract: Testing is performed to ensure integrity of a file system auditing component and of a file system. A list of file access events is built. This list includes expected events that should be triggered by the file system and found in a log. The events in the list are run on the file system and logged. The log of expected events is then compared with actual events logged by the file system to determine the integrity of the file system auditing component and the file system.
    Type: Grant
    Filed: May 22, 2018
    Date of Patent: June 14, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ali Y. Duale, Mustafa Mah, Asmahan Ali
  • Patent number: 10764788
    Abstract: In one embodiment, in accordance with the present invention, a method, computer program product, and system for managing and redistributing unused bandwidth between devices connected to a mobile telecommunications network is provided. One or more computer processors determine a predicted amount of data to be used by a mobile device. The one or more computer processors determine a surplus of allocated data based on whether the predicted amount of data is less than an allocated amount of data. The one or more computer processors, upon determining that there is a surplus of allocated data, move the surplus of allocated data to a data pool to be used by one or more additional mobile devices.
    Type: Grant
    Filed: November 29, 2017
    Date of Patent: September 1, 2020
    Assignee: International Business Machines Corporation
    Inventors: Asmahan Ali, Ali Y. Duale, Mustafa Mah
  • Patent number: 10743140
    Abstract: In an approach to sending an alert based on a user's location, one or more computer processors identify a position of a target device as a first location based, at least in part, on data provided by one or more geolocation systems; identify a location category for the first location; determine that the identified location category is among a predetermined set of location categories; identify a time threshold for the identified location category; identify an alert that is associated with the identified location category within the database; determine an amount of time that the target device is present at the first location; and determine that the amount of time the target device is present at the first location exceeds the time threshold, and in response, sending the alert to the one or more recipient devices for the purpose of notifying users of the first location of the target device.
    Type: Grant
    Filed: May 16, 2018
    Date of Patent: August 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Asmahan Ali, Ali Y. Duale, Mustafa Mah
  • Patent number: 10715473
    Abstract: Provided are systems, methods, and media for optimized processing of message responses from multiple email recipients. An example method includes receiving, by a message exchange system, an email message from a sender that is to be transmitted to a plurality of recipients. The method includes receiving, by the message exchange system, a number of commitment messages from one or more recipients of the plurality of recipients. The method includes transmitting by the message exchange system, in response to detecting that the number of received commitment messages is equal to a requested number of responses, a first alert to a subset of recipients of the plurality of recipients indicating that the subset of recipients do not need to respond to the email message, in which the subset of recipients are the recipients who did not transmit a commitment message to the message exchange system.
    Type: Grant
    Filed: July 24, 2018
    Date of Patent: July 14, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ali Y. Duale, Asmahan Ali, Mustafa Mah
  • Publication number: 20200036669
    Abstract: Provided are systems, methods, and media for optimized processing of message responses from multiple email recipients. An example method includes receiving, by a message exchange system, an email message from a sender that is to be transmitted to a plurality of recipients. The method includes receiving, by the message exchange system, a number of commitment messages from one or more recipients of the plurality of recipients. The method includes transmitting by the message exchange system, in response to detecting that the number of received commitment messages is equal to a requested number of responses, a first alert to a subset of recipients of the plurality of recipients indicating that the subset of recipients do not need to respond to the email message, in which the subset of recipients are the recipients who did not transmit a commitment message to the message exchange system.
    Type: Application
    Filed: July 24, 2018
    Publication date: January 30, 2020
    Inventors: Ali Y. Duale, Asmahan Ali, Mustafa Mah
  • Publication number: 20190361990
    Abstract: Testing is performed to ensure integrity of a file system auditing component and of a file system. A list of file access events is built. This list includes expected events that should be triggered by the file system and found in a log. The events in the list are run on the file system and logged. The log of expected events is then compared with actual events logged by the file system to determine the integrity of the file system auditing component and the file system.
    Type: Application
    Filed: May 22, 2018
    Publication date: November 28, 2019
    Inventors: Ali Y. Duale, Mustafa Mah, Asmahan Ali
  • Publication number: 20190357010
    Abstract: In an approach to sending an alert based on a user's location, one or more computer processors identify a position of a target device as a first location based, at least in part, on data provided by one or more geolocation systems; identify a location category for the first location; determine that the identified location category is among a predetermined set of location categories; identify a time threshold for the identified location category; identify an alert that is associated with the identified location category within the database; determine an amount of time that the target device is present at the first location; and determine that the amount of time the target device is present at the first location exceeds the time threshold, and in response, sending the alert to the one or more recipient devices for the purpose of notifying users of the first location of the target device.
    Type: Application
    Filed: May 16, 2018
    Publication date: November 21, 2019
    Inventors: Asmahan Ali, Ali Y. Duale, Mustafa Mah
  • Publication number: 20190166521
    Abstract: In one embodiment, in accordance with the present invention, a method, computer program product, and system for managing and redistributing unused bandwidth between devices connected to a mobile telecommunications network is provided. One or more computer processors determine a predicted amount of data to be used by a mobile device. The one or more computer processors determine a surplus of allocated data based on whether the predicted amount of data is less than an allocated amount of data. The one or more computer processors, upon determining that there is a surplus of allocated data, move the surplus of allocated data to a data pool to be used by one or more additional mobile devices.
    Type: Application
    Filed: November 29, 2017
    Publication date: May 30, 2019
    Inventors: Asmahan Ali, Ali Y. Duale, Mustafa Mah