Patents by Inventor Nader M. Nassar

Nader M. Nassar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170091832
    Abstract: Embodiments of the invention provide a method, system and computer program product for product component driven review aggregation. A product component driven review aggregation method includes receiving a request in an interface to an aggregator executing in memory of a computer, identifying a product from the request and determining an underlying component of the product. The method also includes generating a query based upon the underlying component and executing the query in a search engine. The method yet further includes receiving from the search engine a multiplicity of content pertaining to the underlying component and aggregating the multiplicity of the content by the aggregator into a single document. Finally, the method includes displaying by the aggregator the single document in a display of the computer.
    Type: Application
    Filed: September 27, 2015
    Publication date: March 30, 2017
    Inventors: Nader M. Nassar, Annette S. Riffe, Robert Spremulli
  • Publication number: 20170005798
    Abstract: According to one embodiment, a method for binding an application bundle. The method includes receiving a download request for an application bundle. The method also includes retrieving the application bundle from a master data store within an application store. The method further includes encrypting the retrieved application bundle based on a device specific encryption key associated with a device. The method also includes transmitting the encrypted application bundle to the device. The method further includes receiving an execution request for the transmitted application bundle. The method also includes decrypting the transmitted application bundle based on a device specific decryption key associated with the device. The method further includes sending the decrypted application bundle to an execution interface.
    Type: Application
    Filed: June 30, 2015
    Publication date: January 5, 2017
    Inventors: Stephen Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
  • Publication number: 20160379157
    Abstract: An apparatus, termed a destination validation device (DVD), comprises a sensor configured to sense physical presence of a parcel and to obtain metadata from said parcel; at least one data processor connected with at least one memory storing software instructions that when executed causes the DVD to at least determine from reading the obtained metadata whether a signature is required for delivery of the parcel, and prepare a destination delivery acknowledgement indicating whether said signature is required; and a transmitter configured to communicate the prepared destination delivery acknowledgement external of the DVD. In this manner a delivery service can verify that the parcel is at the physical delivery location. Further details provide for also obtaining the (digital) signature when the metadata indicates it is required for delivery of the parcel. Other embodiments include a method and a computer program product comprised of software instructions on a computer-readable medium.
    Type: Application
    Filed: June 23, 2015
    Publication date: December 29, 2016
    Inventors: Nader M. Nassar, Grant D. Miller, Erich D. Walls, Richard Newhook, Stephen Y. Chow
  • Publication number: 20160371658
    Abstract: A method to identify and manage recyclable materials. The method includes the steps of: (i) identifying, using a mobile device, a recyclable material based on a detected oscillation frequency of an oscillator associated with the recyclable material; (ii) communicating, using the mobile device, information about the recyclable material to a controller, the information comprising an identification of the recyclable material and a location of the recyclable material; and (iii) creating, by the controller, scheduling instructions for the identified recyclable material.
    Type: Application
    Filed: September 1, 2016
    Publication date: December 22, 2016
    Inventors: Gabriel P. Borges, Claude Falbriard, Grant D. Miller, Nader M. Nassar
  • Patent number: 9524033
    Abstract: Embodiments include a wireless keyboard having a plurality of keys and a plurality of radio frequency identification (RFID) tags, wherein each of the plurality of RFID tags are coupled to one of the plurality of keys. Each of the RFID tags are configured to transmit a signal when one of the plurality of keys coupled to RFID tag is pressed.
    Type: Grant
    Filed: March 8, 2013
    Date of Patent: December 20, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Grant D. Miller, Nader M. Nassar, Dennis M. Newns
  • Publication number: 20160328553
    Abstract: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.
    Type: Application
    Filed: July 22, 2016
    Publication date: November 10, 2016
    Inventors: Peter Daniel BIRK, Cesar Eduardo GONZALEZ BORJON, Nader M. NASSAR
  • Patent number: 9465010
    Abstract: A method to identify and manage recyclable materials provides a recyclable material with a quartz crystal identification element configured to oscillate at a predetermined frequency associated with the recyclable material. A mobile device detects the oscillation frequency of the quartz crystal, identifies the recyclable material based on the detected oscillation frequency, and sends that information to a controller.
    Type: Grant
    Filed: August 17, 2015
    Date of Patent: October 11, 2016
    Assignee: International Business Machines Corporation
    Inventors: Gabriel P. Borges, Claude Falbriard, Grant D. Miller, Nader M. Nassar
  • Patent number: 9460279
    Abstract: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.
    Type: Grant
    Filed: November 12, 2014
    Date of Patent: October 4, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peter Daniel Birk, Cesar Eduardo Gonzalez Borjon, Nader M. Nassar
  • Publication number: 20160277420
    Abstract: An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information.
    Type: Application
    Filed: March 16, 2015
    Publication date: September 22, 2016
    Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
  • Publication number: 20160253885
    Abstract: A proximity exclusion is configured for at least one item in a commercial environment that precludes movement of the at least one item into a defined prohibited region within a structure associated with the commercial environment. Movement of the at least one item is detected within the structure associated with the commercial environment. A determination is made as to whether the movement of the at least one item results in the at least one item being located within the defined prohibited region within the structure associated with the commercial environment. In response to determining that the movement of the at least one item results in the at least one item being located within the defined prohibited region, a proximity exclusion alert is generated indicating that the at least one item is located within the prohibited region.
    Type: Application
    Filed: February 26, 2015
    Publication date: September 1, 2016
    Inventors: Nader M. Nassar, Annette S. H. Riffe, Robert J. Spremulli, Bernie K. K. Wong
  • Patent number: 9378357
    Abstract: A user's required password change is postponed according to context information determined to indicate that the current password change timing is at an inconvenient time for the user. A user is permitted to extend the use of an expired password when a pre-determined password validity period ends.
    Type: Grant
    Filed: September 5, 2014
    Date of Patent: June 28, 2016
    Assignee: International Business Machines Corporation
    Inventors: Tamer E. Abuelsaad, Carlos A. Hoyos, Nader M. Nassar
  • Publication number: 20160132673
    Abstract: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.
    Type: Application
    Filed: November 12, 2014
    Publication date: May 12, 2016
    Inventors: Peter Daniel BIRK, Cesar Eduardo GONZALEZ BORJON, Nader M. NASSAR
  • Publication number: 20160104360
    Abstract: A method includes pairing at least two tags and attaching each one of the at least two tags to objects; a computer device sensing the proximity of each tagged object; and the computer device issuing alerts depending on the sensed proximity of each tagged object, wherein a first alert is triggered when one of the tagged objects leaves a secured area without a corresponding paired tagged object.
    Type: Application
    Filed: October 11, 2014
    Publication date: April 14, 2016
    Inventors: Galina Grunin, David Edward Nachman, Nader M. Nassar, Tamer Nassar
  • Publication number: 20160094611
    Abstract: In an approach to managing requests to a high utilization website, one or more computer processors receive a first resource usage load status from a first server computer. The one or more computer processors receive a request for content on the first server computer from a client. The one or more computer processors determine whether the first resource usage load is above a pre-defined threshold. Responsive to determining the first resource usage load is above the pre-defined threshold, the one or more computer processors create a queue of a plurality of content requesters, wherein the client is one of the plurality of content requesters. The one or more computer processors establish a bidirectional communication channel with the client.
    Type: Application
    Filed: September 30, 2014
    Publication date: March 31, 2016
    Inventors: Stephen Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich Walls
  • Publication number: 20160087978
    Abstract: A method including a computer device receiving a first authentication input from at least one user to start a multi-layered security protocol; the computer device receiving secondary authentication inputs from the at least one user to continue the multi-layered security protocol to determine if a security protocol has been met, wherein the secondary authentication inputs include receiving a first feature input from the at least one user and receiving a second feature from the at least one user; and the computer device determining if the first and secondary authentication inputs pass or fail the multi-layered security protocol.
    Type: Application
    Filed: September 23, 2014
    Publication date: March 24, 2016
    Inventors: Stephen Chow, Grant Douglas Miller, Nader M. Nassar, Richard John Newhook, Erich Walls
  • Patent number: 9286557
    Abstract: A system and methods are provided. A method includes determining a set of Grayscale bands providing an increase in a Quick Response Code data capacity that is an integer multiple of the Quick Response Code data capacity provided by a Black and White Quick Response Code that uses only Black and White to represent data. The method further includes generating, using a processor, a Grayscale Quick Response Code using the determined set of Grayscale bands to represent the data.
    Type: Grant
    Filed: March 6, 2014
    Date of Patent: March 15, 2016
    Assignee: International Business Machines Corporation
    Inventors: Suzanne C. Deffeyes, Grant D. Miller, Nader M. Nassar, Richard J. Newhook
  • Publication number: 20160069840
    Abstract: A method to identify and manage recyclable materials provides a recyclable material with a quartz crystal identification element configured to oscillate at a predetermined frequency associated with the recyclable material. A mobile device detects the oscillation frequency of the quartz crystal, identifies the recyclable material based on the detected oscillation frequency, and sends that information to a controller.
    Type: Application
    Filed: August 17, 2015
    Publication date: March 10, 2016
    Applicant: International Business Machines Corporation
    Inventors: Gabriel P. Borges, Claude Falbriard, Grant D. Miller, Nader M. Nassar
  • Publication number: 20160070903
    Abstract: A user's required password change is postponed according to context information determined to indicate that the current password change timing is at an inconvenient time for the user. A user is permitted to extend the use of an expired password when a pre-determined password validity period ends.
    Type: Application
    Filed: September 5, 2014
    Publication date: March 10, 2016
    Inventors: Tamer E. Abuelsaad, Carlos A. Hoyos, Nader M. Nassar
  • Patent number: 9275227
    Abstract: Policy-driven administration of mobile applications includes receiving a policy defined by a client system. The policy is defined by rules configured for implementation by a scanner and a compliance definition indicative of a threshold acceptability value for output of the implementation of the scanner on a mobile application. The policy-driven administration also includes executing the scanner for the mobile application and identifying an association between a mobile device and the client system. The policy-driven administration of mobile applications further includes controlling access to the mobile application by the mobile device based on results of executing the scanner using the compliance definition.
    Type: Grant
    Filed: April 5, 2012
    Date of Patent: March 1, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tamer E. Abuelsaad, William Bodin, David Jaramillo, Nader M. Nassar
  • Patent number: 9264393
    Abstract: Embodiments of the present invention provide a method, system, and program product for managing the flow of electronic mail. A computing device receives from a sender a first electronic mail addressed to first and second recipients in a serial propagation mode, and in response, the computing device transmits the first electronic mail en route to the first but not the second recipient. A computing device receives a second electronic mail from the first recipient as a response to the first electronic mail, and in response, a computing device transmits the first electronic email to the second recipient.
    Type: Grant
    Filed: February 13, 2013
    Date of Patent: February 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar