Patents by Inventor Nader M. Nassar
Nader M. Nassar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160041851Abstract: Executing a command on an optimal smart device. One aspect of the present invention provides a method for executing a command. The method includes: receiving a command at a plurality of smart devices; determining a score for each smart device of the plurality of smart devices; communicating the score between each smart device of the plurality of smart devices; comparing the score between each smart device of the plurality of smart devices; and executing the command at one smart device of the plurality of smart devices based on comparing the score between each smart device.Type: ApplicationFiled: August 5, 2014Publication date: February 11, 2016Inventors: Frank Richard Bauerle, Grant Douglas Miller, Nader M. Nassar, Tamer Nassar, Irene Robin Penney
-
Publication number: 20160018318Abstract: Polarized light characteristics are detected and mapped to an application, such as product identification. A process of reflecting a directed light emission through a polarizing filter, and sensing the processed light emission having particular characteristics is provided. The characteristics of the sensed light emission is associated with a “color code” that is cross-referenced within a database of color codes.Type: ApplicationFiled: July 16, 2014Publication date: January 21, 2016Inventors: Gabriel P. Borges, Claude Falbriard, Grant D. Miller, Nader M. Nassar
-
Publication number: 20150310368Abstract: A method includes a computing device receiving historical data for a portion of a road; the computing device receiving current data for road conditions using sensors; the computing device predicting future hazardous road conditions for the portion of the road using the received historical and current data; and the computing device scheduling road management actions for the portion of the road as a result of the predicted road conditions.Type: ApplicationFiled: April 25, 2014Publication date: October 29, 2015Applicant: International Business Machines CorporationInventors: Scott Ryan Crowther, Grant Douglas Miller, Nader M Nassar, Tamer Nassar
-
Publication number: 20150284921Abstract: In a vehicle skid recovery system skid recovery can be accelerated when an automotive vehicle begins to skid as a result of ice accumulation on the road surface. The system can control operation of ice removers (e.g., blades or heaters), which are mounted within the wheel wells forward of the wheel, based on information received from the vehicle's outside temperature sensor and anti-lock braking system (ABS). When the temperature sensor indicates that the outside temperature is below a predetermined temperature and when the anti-lock braking system is activated as a result of detected skid, a controller activates the ice remover in one or more of the wheel wells and, thereby cause the ice remover to remove ice from the road surface forward of the corresponding wheel. Clearing the ice allows the vehicle's tires to gain traction on the road surface and, thereby stops the skid.Type: ApplicationFiled: June 12, 2015Publication date: October 8, 2015Inventors: Gabriel P. Borges, Scott R. Crowther, Abraham G. Guerra, Grant D. Miller, Nader M. Nassar, Tamer M. Nassar
-
Patent number: 9139175Abstract: In a vehicle skid recovery system skid recovery can be accelerated when an automotive vehicle begins to skid as a result of ice accumulation on the road surface. The system can control operation of ice removers (e.g., blades or heaters), which are mounted within the wheel wells forward of the wheel, based on information received from the vehicle's outside temperature sensor and anti-lock braking system (ABS). When the temperature sensor indicates that the outside temperature is below a predetermined temperature and when the anti-lock braking system is activated as a result of detected skid, a controller activates the ice remover in one or more of the wheel wells and, thereby cause the ice remover to remove ice from the road surface forward of the corresponding wheel. Clearing the ice allows the vehicle's tires to gain traction on the road surface and, thereby stops the skid.Type: GrantFiled: April 25, 2012Date of Patent: September 22, 2015Assignee: International Business Machines CorporationInventors: Gabriel Pereira Borges, Scott R. Crowther, Abraham G. Guerra, Grant D. Miller, Nader M. Nassar, Tamer M. Nassar
-
Publication number: 20150261951Abstract: A system and method for sharing data and a risk assessment of the data comprises receiving data in a first application and obtaining a risk level of the data, performing an action in the first application necessitating passing a message comprising at least the data and the risk level to a second application, passing the message from the first application to the second application, receiving, at the second application, the message, determining by said second application whether the risk level exceeds a predetermined threshold, when the risk level exceed the predetermined threshold, implementing a protocol to perform actions in the second application using the data in accordance with the protocol, and when the risk level does not exceed the predetermined threshold, running the second application using the data.Type: ApplicationFiled: March 14, 2014Publication date: September 17, 2015Applicant: International Business Machines CorporationInventors: Tamer E. Abuelsaad, Carlos A. Hoyos, Nader M. Nassar
-
Publication number: 20150254542Abstract: A system and methods are provided. A method includes determining a set of Grayscale bands providing an increase in a Quick Response Code data capacity that is an integer multiple of the Quick Response Code data capacity provided by a Black and White Quick Response Code that uses only Black and White to represent data. The method further includes generating, using a processor, a Grayscale Quick Response Code using the determined set of Grayscale bands to represent the data.Type: ApplicationFiled: March 6, 2014Publication date: September 10, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Suzanne C. Deffeyes, Grant D. Miller, Nader M. Nassar, Richard J. Newhook
-
Publication number: 20150253745Abstract: An embodiment of the invention provides a method for a utility consumption advisor, wherein a target electricity consumption for a predefined time period is received with a user interface. User parameters are also received with the user interface, the user parameters including a list of electricity consumption items that may not be modified, a list of electricity consumption items that may be modified, and a range of modification for each of the listed electricity consumption items that may be modified. The user's electricity consumption history is determined; and, an electricity utilization plan is generated for the predefined time period with a processor. The electricity utilization plan is generated based on the target electricity consumption, the user parameters, and the user's electricity consumption history. The electricity utilization plan is implemented by wirelessly controlling the electricity consumption items that may be modified.Type: ApplicationFiled: March 5, 2014Publication date: September 10, 2015Applicant: International Business Machines CorporationInventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer Nassar
-
Patent number: 9108797Abstract: A method to identify and manage recyclable materials provides a recyclable material with a quartz crystal identification element configured to oscillate at a predetermined frequency associated with the recyclable material. A mobile device detects the oscillation frequency of the quartz crystal, identifies the recyclable material based on the detected oscillation frequency, and sends that information to a controller. The controller creates handling instructions for the pickup of the identified recyclable material.Type: GrantFiled: September 9, 2014Date of Patent: August 18, 2015Assignee: International Business Machines CorporationInventors: Gabriel P. Borges, Claude Falbriard, Grant D. Miller, Nader M. Nassar
-
Patent number: 9104875Abstract: Policy-driven administration of mobile applications includes receiving a policy defined by a client system. The policy is defined by rules configured for implementation by a scanner and a compliance definition indicative of a threshold acceptability value for output of the implementation of the scanner on a mobile application. The policy-driven administration also includes executing the scanner for the mobile application and identifying an association between a mobile device and the client system. The policy-driven administration of mobile applications further includes controlling access to the mobile application by the mobile device based on results of executing the scanner using the compliance definition.Type: GrantFiled: July 31, 2012Date of Patent: August 11, 2015Assignee: International Business Machines CorporationInventors: Tamer E. Abuelsaad, William Bodin, David Jaramillo, Nader M. Nassar
-
Publication number: 20150206236Abstract: In a hierarchical multiple-node supply chain, a commodity is sold a first time at a first end of the supply chain and is resold multiple times across the supply chain before being sold a final time at a second end of the supply chain opposite the first end. A user who is a buyer and/or a seller within the supply chain is interacted with by exchanging text messages with a mobile phone device of the user to provide the user with a current price of the commodity for a type of the user within the supply chain, and to receive from the user an actual price of the commodity in a current transaction in which the user was involved. The type of the user includes a node within the supply chain to which the user corresponds.Type: ApplicationFiled: January 21, 2014Publication date: July 23, 2015Applicant: International Business Machines CorporationInventors: Frank Richard Bauerle, Grant Douglas Miller, Nader M. Nassar, Tamer M. Nassar, Irene Robin Penney
-
Publication number: 20150206127Abstract: In a hierarchical multiple-node supply chain, a commodity is sold a first time at a first end of the supply chain and is resold multiple times across the supply chain before being sold a final time at a second end of the supply chain opposite the first end. A user who is a buyer and/or a seller within the supply chain is interacted with by exchanging text messages with a mobile phone device of the user to provide the user with a current price of the commodity for a type of the user within the supply chain, and to receive from the user an actual price of the commodity in a current transaction in which the user was involved. The type of the user includes a node within the supply chain to which the user corresponds.Type: ApplicationFiled: October 22, 2014Publication date: July 23, 2015Inventors: Frank R. Bauerle, Grant D. Miller, Nader M. Nassar, Tamer M. Nassar, Irene R. Penney
-
Publication number: 20150039361Abstract: Techniques that leverage social media to proactively respond to inclement weather conditions such as snow that affect road conditions and, for example, coordinate snow removal from the roads are provided. In one aspect, a method for sharing road condition information is provided. The method includes the following steps. Data is collected from vehicles related to road conditions at various locations. The data is stored in an off-vehicle system. The data is processed to determine what type of maintenance activity is needed based on the road conditions. The maintenance activity and the locations are provided to dispatchers to enable routing of municipal vehicles to the locations to address the road conditions. A system for sharing road conditions is also provided.Type: ApplicationFiled: August 5, 2013Publication date: February 5, 2015Applicant: International Business Machines CorporationInventors: Scott R. Crowther, Grant D. Miller, Nader M. Nassar, Tamer M. Nassar
-
Publication number: 20150026343Abstract: A computer system and associated method and software where communications between the cloud and a sensor device (for example, a temperature sensor) pass through and are processed by a middleware appliance. The middleware appliance creates data structures called cloud event data objects (cEDOs). A cEDO may include, for example: event data, device data, sensor data, geo key data, payload key data and data value pairs.Type: ApplicationFiled: July 22, 2013Publication date: January 22, 2015Applicant: International Business Machines CorporationInventors: Gabriel P. Borges, Claude Falbriard, Grant D. Miller, Nader M. Nassar
-
Publication number: 20150020176Abstract: Techniques for advanced login security using personalized, user-specific urls are provided. In one aspect, a method for authenticating a user is provided. The method includes the following steps. A personalized login url and credentials (e.g., username and password) are stored for the user. Upon receipt of a login url from the user, it is verified whether the login url matches the personalized url stored for the user. If the login url matches the personalized url for the user, then the user is provided with a user-specific login page where the user can enter credentials, otherwise access is denied. The user is authenticated only if the credentials the user enters match the credentials stored for the user, otherwise denying access.Type: ApplicationFiled: September 20, 2013Publication date: January 15, 2015Applicant: International Business Machines CorporationInventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Publication number: 20150020178Abstract: Techniques for advanced login security using personalized, user-specific urls are provided. In one aspect, a method for authenticating a user is provided. The method includes the following steps. A personalized login url and credentials (e.g., username and password) are stored for the user. Upon receipt of a login url from the user, it is verified whether the login url matches the personalized url stored for the user. If the login url matches the personalized url for the user, then the user is provided with a user-specific login page where the user can enter credentials, otherwise access is denied. The user is authenticated only if the credentials the user enters match the credentials stored for the user, otherwise denying access.Type: ApplicationFiled: July 12, 2013Publication date: January 15, 2015Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Patent number: 8910260Abstract: A method including: receiving, at a first device, a challenge provided from a second device, wherein the challenge includes an encoding algorithm and a request for credentials from the first device; and outputting, from the first device to the second device, a response to the challenge, wherein the response includes at least one image, the at least one image including an article of evidence arranged according to the encoding algorithm.Type: GrantFiled: September 26, 2012Date of Patent: December 9, 2014Assignee: International Business Machines CorporationInventors: Tamer E. Abuelsaad, William K. Bodin, David Jaramillo, Nader M. Nassar
-
Patent number: 8904508Abstract: A method including: receiving, at a first device, a challenge provided from a second device, wherein the challenge includes an encoding algorithm and a request for credentials from the first device; and outputting, from the first device to the second device, a response to the challenge, wherein the response includes at least one image, the at least one image including an article of evidence arranged according to the encoding algorithm.Type: GrantFiled: September 21, 2012Date of Patent: December 2, 2014Assignee: International Business Machines CorporationInventors: Tamer E. Abuelsaad, William K. Bodin, David Jaramillo, Nader M. Nassar
-
Patent number: 8875239Abstract: Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request. The administering includes randomly selecting a set of related images from a database of images, randomly selecting one image that is unrelated to the set of related images, displaying the set of related images along with the image that is unrelated to the set of related images, and prompting a user to identify the image that is unrelated to the set of related images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed.Type: GrantFiled: August 10, 2011Date of Patent: October 28, 2014Assignee: International Business Machines CorporationInventors: Stephen Y. Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
-
Publication number: 20140253452Abstract: Embodiments include a wireless keyboard having a plurality of keys and a plurality of radio frequency identification (RFID) tags, wherein each of the plurality of RFID tags are coupled to one of the plurality of keys. Each of the RFID tags are configured to transmit a signal when one of the plurality of keys coupled to RFID tag is pressed.Type: ApplicationFiled: March 8, 2013Publication date: September 11, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Grant D. Miller, Nader M. Nassar, Dennis M. Newns