Patents by Inventor Nader M. Nassar
Nader M. Nassar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9970862Abstract: Polarized light characteristics are detected and mapped to an application, such as product identification. A process of reflecting a directed light emission through a polarizing filter, and sensing the processed light emission having particular characteristics is provided. The characteristics of the sensed light emission is associated with a “color code” that is cross-referenced within a database of color codes.Type: GrantFiled: July 16, 2014Date of Patent: May 15, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gabriel P. Borges, Claude Falbriard, Grant D. Miller, Nader M. Nassar
-
Patent number: 9906520Abstract: In an approach to multi-user authentication, one or more computer processors receive a first user login. The one or more computer processors determine whether at least one additional user login is received. The one or more computer processors receive an access request from the first user. The one or more computer processors receive an access request from the at least one additional user. In response to receiving the access request from the first user and the access request from the at least one additional user, the one or more computer processors determine whether the access request from the first user and the access request from the at least one additional user meet pre-defined criteria. In response to determining the access requests meet pre-defined criteria, the one or more computer processors authorize the access request of the first user and the access request of the at least one additional user.Type: GrantFiled: December 2, 2015Date of Patent: February 27, 2018Assignee: International Business Machines CorporationInventors: Ahmed Fouad, Tamer A. Mahfouz, Nader M. Nassar, Tamer M. Nassar, Alaa S. Youssef
-
Publication number: 20180039931Abstract: A calendar conflict resolving method, system, and non-transitory computer readable medium, include processing a request for an event for a time slot of a calendar to correlate the requested event with user data, comparing the requested event with a scheduled event to determine a conflict between the scheduled event and the requested event, and resolving the conflict between the requested event and the scheduled event according to a set of rules, the set of rules being based on the user data.Type: ApplicationFiled: August 4, 2016Publication date: February 8, 2018Inventors: Christopher Ray Dotson, Nader M. Nassar, Annette Suzanne Hoag Riffe, William H. Tworek
-
Patent number: 9887842Abstract: According to one embodiment, a method for binding an application bundle. The method includes receiving a download request for an application bundle. The method also includes retrieving the application bundle from a master data store within an application store. The method further includes encrypting the retrieved application bundle based on a device specific encryption key associated with a device. The method also includes transmitting the encrypted application bundle to the device. The method further includes receiving an execution request for the transmitted application bundle. The method also includes decrypting the transmitted application bundle based on a device specific decryption key associated with the device. The method further includes sending the decrypted application bundle to an execution interface.Type: GrantFiled: June 30, 2015Date of Patent: February 6, 2018Assignee: International Business Machines CorporationInventors: Stephen Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
-
Patent number: 9882959Abstract: In an approach to managing requests to a high utilization website, one or more computer processors receive a first resource usage load status from a first server computer. The one or more computer processors receive a request for content on the first server computer from a client. The one or more computer processors determine whether the first resource usage load is above a pre-defined threshold. Responsive to determining the first resource usage load is above the pre-defined threshold, the one or more computer processors create a queue of a plurality of content requesters, wherein the client is one of the plurality of content requesters. The one or more computer processors establish a bidirectional communication channel with the client.Type: GrantFiled: September 30, 2014Date of Patent: January 30, 2018Assignee: International Business Machines CorporationInventors: Stephen Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich Walls
-
Patent number: 9866562Abstract: An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information.Type: GrantFiled: February 15, 2017Date of Patent: January 9, 2018Assignee: International Business Machines CorporationInventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Patent number: 9852482Abstract: An embodiment of the invention provides a method for a utility consumption advisor, wherein a target electricity consumption for a predefined time period is received with a user interface. User parameters are also received with the user interface, the user parameters including a list of electricity consumption items that may not be modified, a list of electricity consumption items that may be modified, and a range of modification for each of the listed electricity consumption items that may be modified. The user's electricity consumption history is determined; and, an electricity utilization plan is generated for the predefined time period with a processor. The electricity utilization plan is generated based on the target electricity consumption, the user parameters, and the user's electricity consumption history. The electricity utilization plan is implemented by wirelessly controlling the electricity consumption items that may be modified.Type: GrantFiled: March 5, 2014Date of Patent: December 26, 2017Assignee: International Business Machines CorporationInventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer Nassar
-
Patent number: 9852636Abstract: Traffic event data source identification embodiments comprise a first monitoring system that detects a traffic event, a communication device that broadcasts a discovery signal and receives back response signals from any second monitoring systems within the vicinity of the traffic event, and a memory that stores a list of responding second monitoring systems. Traffic event data collection embodiments incorporate the identification embodiments and additional features. In this case, the first monitoring system captures data recorded at the time of the traffic event and a second communication device transmits this data and, optionally, the list to a traffic event database in a traffic event data storage system. The first communication device also transmits a data capture request signal to the second monitoring system(s) requesting capture of any data recorded at the time of the traffic event and, optionally, requesting that such data be transmitted to the database.Type: GrantFiled: May 18, 2012Date of Patent: December 26, 2017Assignee: International Business Machines CorproationInventors: Stephen Y. Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
-
Publication number: 20170362033Abstract: A computer-implemented method, system, and computer program product for distributing luggage among a plurality of outlet ports of a luggage distribution unit is provided. The method includes associating, using a processor system, a passenger key and a luggage identification (ID) device of a luggage unit, and assigning, using the processor system, the luggage ID device to a dispensing unit based at least in part on a determination of a desired distribution of luggage units among the plurality of outlet ports. The method also includes detecting a location of the passenger key, providing a status of the luggage ID device of the luggage unit, and signaling the presence of the luggage ID device and the luggage unit at the dispensing unit. The method includes receiving the association to access the at least one luggage unit, and releasing the luggage unit responsive to receiving the association.Type: ApplicationFiled: June 16, 2016Publication date: December 21, 2017Inventors: TAMER A. MAHFOUZ, NADER M. NASSAR, TAMER M. NASSAR, HESHAM E.M. SOULTAN, ALAA S. YOUSSEF
-
Patent number: 9824336Abstract: A method to identify and manage recyclable materials. The method includes the steps of: (i) identifying, using a mobile device, a recyclable material based on a detected oscillation frequency of an oscillator associated with the recyclable material; (ii) communicating, using the mobile device, information about the recyclable material to a controller, the information comprising an identification of the recyclable material and a location of the recyclable material; and (iii) creating, by the controller, scheduling instructions for the identified recyclable material.Type: GrantFiled: September 1, 2016Date of Patent: November 21, 2017Assignee: International Business Machines CorporationInventors: Gabriel P. Borges, Claude Falbriard, Grant D. Miller, Nader M. Nassar
-
Publication number: 20170249817Abstract: Changes of a vertical and horizontal position of an item are programmatically monitored relative to at least one three-dimensional (3D) item-specific proximity exclusion attribute that precludes movement of the item into a defined 3D item-configured prohibited region by iteratively querying an item tag of the item for measured vertical and horizontal coordinates of the item tag. In response to determining that a detected change of at least one of the vertical and horizontal position of the item results in the item being located within the defined 3D item-configured prohibited region, an item-specific proximity exclusion alert is generated indicating that the item is located within the defined 3D item-configured prohibited region.Type: ApplicationFiled: May 15, 2017Publication date: August 31, 2017Inventors: Nader M. Nassar, Annette S. H. Riffe, Robert J. Spremulli, Bernie K. K. Wong
-
Patent number: 9742761Abstract: A method, computer program product, and computer system for authenticating user access to a computing system using dynamic tokens are provided. A login request from a client is received, and in response, a token request from the client is issued. The token request identifies one or more sequence positions. One or more client tokens generated by the client are received based on the one or more sequence positions of the tokens. A sequence of tokens based on a first seed and a first algorithm are generated. The login request is authenticated by comparing the one or more client tokens with the sequence of tokens, based at least in part, on the one or more sequence positions.Type: GrantFiled: November 10, 2015Date of Patent: August 22, 2017Assignee: International Business Machines CorporationInventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Patent number: 9719224Abstract: In a vehicle skid recovery system skid recovery can be accelerated when an automotive vehicle begins to skid as a result of ice accumulation on the road surface. The system can control operation of ice removers (e.g., blades or heaters), which are mounted within the wheel wells forward of the wheel, based on information received from the vehicle's outside temperature sensor and anti-lock braking system (ABS). When the temperature sensor indicates that the outside temperature is below a predetermined temperature and when the anti-lock braking system is activated as a result of detected skid, a controller activates the ice remover in one or more of the wheel wells and, thereby cause the ice remover to remove ice from the road surface forward of the corresponding wheel. Clearing the ice allows the vehicle's tires to gain traction on the road surface and, thereby stops the skid.Type: GrantFiled: June 12, 2015Date of Patent: August 1, 2017Assignee: International Business Machines CorproationInventors: Gabriel P. Borges, Scott R. Crowther, Abraham G. Guerra, Grant D. Miller, Nader M. Nassar, Tamer M. Nassar
-
Patent number: 9712601Abstract: A computer system and associated method and software where communications between the cloud and a sensor device (for example, a temperature sensor) pass through and are processed by a middleware appliance. The middleware appliance creates data structures called cloud event data objects (cEDOs). A cEDO may include, for example: event data, device data, sensor data, geo key data, payload key data and data value pairs.Type: GrantFiled: July 22, 2013Date of Patent: July 18, 2017Assignee: International Business Machines CorporationInventors: Gabriel P. Borges, Claude Falbriard, Grant D. Miller, Nader M. Nassar
-
Patent number: 9703616Abstract: Executing a command on an optimal smart device. One aspect of the present invention provides a method for executing a command. The method includes: receiving a command at a plurality of smart devices; determining a score for each smart device of the plurality of smart devices; communicating the score between each smart device of the plurality of smart devices; comparing the score between each smart device of the plurality of smart devices; and executing the command at one smart device of the plurality of smart devices based on comparing the score between each smart device.Type: GrantFiled: August 5, 2014Date of Patent: July 11, 2017Assignee: International Business Machines CorporationInventors: Frank Richard Bauerle, Grant Douglas Miller, Nader M Nassar, Tamer Nassar, Irene Robin Penney
-
Publication number: 20170163623Abstract: In an approach to multi-user authentication, one or more computer processors receive a first user login. The one or more computer processors determine whether at least one additional user login is received. The one or more computer processors receive an access request from the first user. The one or more computer processors receive an access request from the at least one additional user. In response to receiving the access request from the first user and the access request from the at least one additional user, the one or more computer processors determine whether the access request from the first user and the access request from the at least one additional user meet pre-defined criteria. In response to determining the access requests meet pre-defined criteria, the one or more computer processors authorize the access request of the first user and the access request of the at least one additional user.Type: ApplicationFiled: December 2, 2015Publication date: June 8, 2017Inventors: Ahmed Fouad, Tamer A. Mahfouz, Nader M. Nassar, Tamer M. Nassar, Alaa S. Youssef
-
Publication number: 20170163648Abstract: An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information.Type: ApplicationFiled: February 15, 2017Publication date: June 8, 2017Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Patent number: 9674203Abstract: An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information.Type: GrantFiled: March 16, 2015Date of Patent: June 6, 2017Assignee: International Business Machines CorporationInventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Patent number: 9672710Abstract: A proximity exclusion is configured for at least one item in a commercial environment that precludes movement of the at least one item into a defined prohibited region within a structure associated with the commercial environment. Movement of the at least one item is detected within the structure associated with the commercial environment. A determination is made as to whether the movement of the at least one item results in the at least one item being located within the defined prohibited region within the structure associated with the commercial environment. In response to determining that the movement of the at least one item results in the at least one item being located within the defined prohibited region, a proximity exclusion alert is generated indicating that the at least one item is located within the prohibited region.Type: GrantFiled: February 26, 2015Date of Patent: June 6, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nader M. Nassar, Annette S. H. Riffe, Robert J. Spremulli, Bernie K. K. Wong
-
Publication number: 20170134363Abstract: A method, computer program product, and computer system for authenticating user access to a computing system using dynamic tokens are provided. A login request from a client is received, and in response, a token request from the client is issued. The token request identifies one or more sequence positions. One or more client tokens generated by the client are received based on the one or more sequence positions of the tokens. A sequence of tokens based on a first seed and a first algorithm are generated. The login request is authenticated by comparing the one or more client tokens with the sequence of tokens, based at least in part, on the one or more sequence positions.Type: ApplicationFiled: November 10, 2015Publication date: May 11, 2017Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar