Patents by Inventor Nader M. Nassar

Nader M. Nassar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140229554
    Abstract: Embodiments of the present invention provide a method, system, and program product for managing the flow of electronic mail. A computing device receives from a sender a first electronic mail addressed to first and second recipients in a serial propagation mode, and in response, the computing device transmits the first electronic mail en route to the first but not the second recipient. A computing device receives a second electronic mail from the first recipient as a response to the first electronic mail, and in response, a computing device transmits the first electronic email to the second recipient.
    Type: Application
    Filed: February 13, 2013
    Publication date: August 14, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
  • Publication number: 20140230040
    Abstract: An embodiment of the invention provides a method for disabling at least one application in a mobile device, wherein a communications component of the mobile device receives a request to disable the application and a certificate. The certificate defines a geographic area in which the application is to be disabled. The geographic location of the mobile device is determined with a location component in the mobile device; and, a processor in the mobile device compares the geographic location of the mobile device to the geographic area defined in the certificate to determine whether the geographic location of the mobile device is within the geographic area. The processor validates the certificate to determine whether the request to disable the application is authorized. When the certificate is valid and when the geographic location of the mobile device is within the geographic area, a controller in the mobile device disables the application.
    Type: Application
    Filed: March 7, 2013
    Publication date: August 14, 2014
    Applicant: International Business Machines Corporation
    Inventors: Scott Ryan Crowther, Grant Douglas Miller, Nader M. Nassar, Tamer Nasser
  • Publication number: 20140229603
    Abstract: An embodiment of the invention provides a method for disabling at least one application in a mobile device, wherein a communications component of the mobile device receives a request to disable the application and a certificate. The certificate defines a geographic area in which the application is to be disabled. The geographic location of the mobile device is determined with a location component in the mobile device; and, a processor in the mobile device compares the geographic location of the mobile device to the geographic area defined in the certificate to determine whether the geographic location of the mobile device is within the geographic area. The processor validates the certificate to determine whether the request to disable the application is authorized. When the certificate is valid and when the geographic location of the mobile device is within the geographic area, a controller in the mobile device disables the application.
    Type: Application
    Filed: February 8, 2013
    Publication date: August 14, 2014
    Applicant: International Business Machines Corporation
    Inventors: Scott Ryan Crowther, Grant Douglas Miller, Nader M. Nassar, Tamer Nasser
  • Patent number: 8793761
    Abstract: Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request that includes a set of images and an instruction to identify a cognitive pattern in the set of images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed.
    Type: Grant
    Filed: August 10, 2011
    Date of Patent: July 29, 2014
    Assignee: International Business Machines Corporation
    Inventors: Stephen Y. Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
  • Publication number: 20140200904
    Abstract: A method, a system and a computer program product for generating a personalized shopping recommendation includes steps and structure for for creating a shopping plan, for one or more persons, on a computing device of a user, and using corresponding prescription data advised for the one or more persons by a doctor to identifying recommended products that best fit each person's requirements.
    Type: Application
    Filed: January 11, 2013
    Publication date: July 17, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Barry A. Kritt, Nader M. Nassar, Sarbajit K. Rakshit
  • Publication number: 20140090040
    Abstract: A method including: receiving, at a first device, a challenge provided from a second device, wherein the challenge includes an encoding algorithm and a request for credentials from the first device; and outputting, from the first device to the second device, a response to the challenge, wherein the response includes at least one image, the at least one image including an article of evidence arranged according to the encoding algorithm.
    Type: Application
    Filed: September 26, 2012
    Publication date: March 27, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tamer E. Abuelsaad, William K. Bodin, David Jaramillo, Nader M. Nassar
  • Publication number: 20140090032
    Abstract: A method including: receiving, at a first device, a challenge provided from a second device, wherein the challenge includes an encoding algorithm and a request for credentials from the first device; and outputting, from the first device to the second device, a response to the challenge, wherein the response includes at least one image, the at least one image including an article of evidence arranged according to the encoding algorithm.
    Type: Application
    Filed: September 21, 2012
    Publication date: March 27, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tamer E. Abuelsaad, William K. Bodin, David Jaramillo, Nader M. Nassar
  • Publication number: 20130311641
    Abstract: Traffic event data source identification embodiments comprise a first monitoring system that detects a traffic event, a communication device that broadcasts a discovery signal and receives back response signals from any second monitoring systems within the vicinity of the traffic event, and a memory that stores a list of responding second monitoring systems. Traffic event data collection embodiments incorporate the identification embodiments and additional features. In this case, the first monitoring system captures data recorded at the time of the traffic event and a second communication device transmits this data and, optionally, the list to a traffic event database in a traffic event data storage system. The first communication device also transmits a data capture request signal to the second monitoring system(s) requesting capture of any data recorded at the time of the traffic event and, optionally, requesting that such data be transmitted to the database.
    Type: Application
    Filed: May 18, 2012
    Publication date: November 21, 2013
    Applicant: International Business Machines Corporation
    Inventors: Stephen Y. Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
  • Publication number: 20130283647
    Abstract: Disclosed is a vehicle skid recovery system, which is able to accelerate skid recovery, when an automotive vehicle begins to skid as a result of ice accumulation on the road surface. The embodiments control operation of ice removers (e.g., blades or heaters), which are mounted within the wheel wells forward of the wheel, based on information received from the vehicle's outside temperature sensor and anti-lock braking system (ABS). When the temperature sensor indicates that the outside temperature is below a predetermined temperature (e.g., below freezing) and when the anti-lock braking system is activated as a result of detected skid, a controller activates the ice remover in one or more of the wheel wells and, thereby cause the ice remover to remove ice from the road surface forward of the corresponding wheel. Clearing the ice allows the vehicle's tires to gain traction on the road surface and, thereby stops the skid.
    Type: Application
    Filed: April 25, 2012
    Publication date: October 31, 2013
    Applicant: International Business Machines Corporation
    Inventors: Gabriel P. Borges, Scott R. Crowther, Abraham G. Guerra, Grant D. Miller, Nader M. Nassar, Tamer M. Nassar
  • Publication number: 20130268667
    Abstract: Policy-driven administration of mobile applications includes receiving a policy defined by a client system. The policy is defined by rules configured for implementation by a scanner and a compliance definition indicative of a threshold acceptability value for output of the implementation of the scanner on a mobile application. The policy-driven administration also includes executing the scanner for the mobile application and identifying an association between a mobile device and the client system. The policy-driven administration of mobile applications further includes controlling access to the mobile application by the mobile device based on results of executing the scanner using the compliance definition.
    Type: Application
    Filed: April 5, 2012
    Publication date: October 10, 2013
    Applicant: International Business Machines Corporation
    Inventors: Tamer E. Abuelsaad, William Bodin, David Jaramillo, Nader M. Nassar
  • Publication number: 20130268668
    Abstract: Policy-driven administration of mobile applications includes receiving a policy defined by a client system. The policy is defined by rules configured for implementation by a scanner and a compliance definition indicative of a threshold acceptability value for output of the implementation of the scanner on a mobile application. The policy-driven administration also includes executing the scanner for the mobile application and identifying an association between a mobile device and the client system. The policy-driven administration of mobile applications further includes controlling access to the mobile application by the mobile device based on results of executing the scanner using the compliance definition.
    Type: Application
    Filed: July 31, 2012
    Publication date: October 10, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tamer E. Abuelsaad, William Bodin, David Jaramillo, Nader M. Nassar
  • Publication number: 20130212662
    Abstract: Implementing security access includes creating a coordinate system that includes a first axis and a second axis. Points on the first axis and the second axis specify corresponding coordinates. The security access also includes randomly selecting values from a database and populating the coordinate system with the values and selecting a set of the coordinates from the coordinate system. The set of coordinates is indicative of an instruction. The security access further includes generating an image from the coordinate system and the values, the image including labels for the coordinates along respective first axis and second axis, and identifying values corresponding to the set of coordinates. The values correspond to the set of coordinates indicative of an answer to the instruction. The security access also includes transmitting the image and the instruction to a user device, and using the image, the instruction, and the answer as a security access mechanism.
    Type: Application
    Filed: February 14, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Stephen Y. Chow, Grant D. Miller, Nader M. Nassar, Richard Newhook, Erich D. Walls
  • Publication number: 20130042302
    Abstract: Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request that includes a set of images and an instruction to identify a cognitive pattern in the set of images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed.
    Type: Application
    Filed: August 10, 2011
    Publication date: February 14, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Stephen Y. Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
  • Publication number: 20130042303
    Abstract: Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request. The administering includes randomly selecting a set of related images from a database of images, randomly selecting one image that is unrelated to the set of related images, displaying the set of related images along with the image that is unrelated to the set of related images, and prompting a user to identify the image that is unrelated to the set of related images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed.
    Type: Application
    Filed: August 10, 2011
    Publication date: February 14, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Stephen Y. Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls