Patents by Inventor Said Tabet

Said Tabet has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220345212
    Abstract: A data communication network includes a network node and a processor. The network node includes an optical link and a reflectometry analyzer to provide a plurality of reflectometry results, each reflectometry result providing a characterization of physical and operational properties of the optical link at the time of the reflectometry result. The processor receives a first set of the reflectometry results, and calculates a federated fingerprint of the physical and operational properties of the optical link based on the plurality of fingerprints in first set of the reflectometry results. The federated fingerprint is a combination of fingerprints from every section of the optical link. The processor receives a second set of the reflectometry results, and compares each of a plurality of fingerprints in the second set of reflectometry results with a respective corresponding fingerprint in the federated fingerprint.
    Type: Application
    Filed: September 30, 2021
    Publication date: October 27, 2022
    Inventors: Rowland Shaw, Qing Ye, Said Tabet
  • Publication number: 20220345801
    Abstract: A data communication network includes a plurality of network nodes coupled together via optical links and a network controller. Each network node includes a reflectometry analyzer that provides a characterization of physical properties of the optical links coupled to the associated network node. The characterization for each particular optical link provides a unique fingerprint of the physical properties of the particular optical link.
    Type: Application
    Filed: May 9, 2022
    Publication date: October 27, 2022
    Inventors: Rowland Shaw, Qing Ye, Said Tabet
  • Publication number: 20220345215
    Abstract: An information handling system includes a plurality of network nodes and a processor. The network nodes each include an optical link and a reflectometry analyzer. The reflection analyzers provide reflectometry results that each provide a characterization of physical properties of the associated optical link. The processor receives the reflectometry results, and, for each optical link, analyzes the reflectometry results to determine a fingerprint of the physical properties of the associated optical link. The processor further determines a status for each of the optical links based upon the associated fingerprints, and displays a map of the information handling system including each network node and the associated optical link, wherein the map provides an indication of the status for each of the optical links.
    Type: Application
    Filed: September 30, 2021
    Publication date: October 27, 2022
    Inventors: Qing Ye, Rowland Shaw, Said Tabet
  • Publication number: 20220292221
    Abstract: Techniques are provided for secure data management in a network computing environment. A security management system receives data from a device which operates in a device network that is managed by the security management system. The security management system performs a data classification process to determine a data sensitivity level of the received data. The security management system determines a type of encryption to apply to the received data based on the determined data sensitivity level. The type of encryption is determined from a plurality of different types of encryption that are supported by a cloud system. The security management system sends the received data to the cloud system to at least one of store the data and perform secured data analytic processing of the data, in a format according to the determined type of encryption.
    Type: Application
    Filed: March 15, 2021
    Publication date: September 15, 2022
    Inventors: Mohamed Sohail, Said Tabet
  • Publication number: 20220229936
    Abstract: A method, comprising: obtaining a data item that is associated with an IoT device, the IoT device including one or more of a sensor, an actuator, or an energy source; obtaining, from a blockchain-based attestation system, a trust score that is associated with the data item, the trust score being generated by using a consensus-building mechanism that is provided by the blockchain-based attestation system; when the trust score satisfies a predetermined condition, using the data item; and when the trust score fails to satisfy the predetermined condition, discarding the data item, wherein the IoT device is configured to operate as a node in the blockchain-based attestation system, and the blockchain-based attestation system includes one or more other IoT devices that are part of the same IoT device network as the IoT device.
    Type: Application
    Filed: January 19, 2021
    Publication date: July 21, 2022
    Applicant: Dell Products L.P.
    Inventors: Mohamed Sohail, Said Tabet
  • Patent number: 11392733
    Abstract: A physical event to be modeled is selected. A profile for the physical event is generated based on an event type of the physical event. Data is obtained from a plurality of data sources, wherein the obtained data comprises data relevant to the physical event that is collected by the plurality of data sources, and further wherein at least a portion of the obtained data comprises one or more of spatial and temporal references associated with the collection of the data. A digital representation of the physical event is generated based on at least a portion of the obtained data and the generated profile. The digital representation is utilized to analyze one or more other physical events associated with the modeled physical event.
    Type: Grant
    Filed: August 3, 2018
    Date of Patent: July 19, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Stephen J. Todd, Assaf Natanzon, Dragan Savic, Said Tabet
  • Patent number: 11388493
    Abstract: A data communication network includes a plurality of network nodes coupled together via optical links and a network controller. Each network node includes a reflectometry analyzer that provides a characterization of physical properties of the optical links coupled to the associated network node. The characterization for each particular optical link provides a unique fingerprint of the physical properties of the particular optical link.
    Type: Grant
    Filed: April 27, 2021
    Date of Patent: July 12, 2022
    Assignee: Dell Products L.P.
    Inventors: Rowland Shaw, Qing Ye, Said Tabet
  • Publication number: 20220210142
    Abstract: One example method includes correlating trust scoring with authentication levels. Trust scores are protected in a computing system such that devices can be validated. Authentication levels are based on the verified trust scores.
    Type: Application
    Filed: December 31, 2020
    Publication date: June 30, 2022
    Inventors: Mohamed Sohail, Robert A. Lincourt, Said Tabet
  • Patent number: 11316851
    Abstract: Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security mechanisms for network environments. For example, a method includes collecting power consumption data of a plurality of devices operating within a network and determining trust scores for the plurality of devices based, at least in part, on the collected power consumption data. The trust score for a device provides a measure of trustworthiness of the device exhibiting normal operating behavior within the network. Each device is assigned to one of a plurality of trust tiers based on the determined trust scores, wherein each trust tier specifies an authentication level for devices assigned to the trust tier. One or more authentication procedures are applied to authenticate a given device operating within the network based on the authentication level specified by the trust tier to which the given device is assigned.
    Type: Grant
    Filed: June 19, 2019
    Date of Patent: April 26, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Mohamed Sohail, Said Tabet
  • Patent number: 11194745
    Abstract: One example method includes receiving an IO request from an application, determining if an affinity policy applies to the application that transmitted the IO request, when an affinity policy applies to the application, directing the IO request to a specified site of a replication system, when no affinity policy applies to the application, determining if a lag in replication of the IO request from a primary site to a replication site is acceptable, if a lag in replication of the IO request is acceptable, processing the IO request using performance based parameters and/or load balancing parameters, and if a lag in replication of the IO request is not acceptable, either directing the IO request to a most up to date replica site, or requesting a clone copy of a volume to which the IO request was initially directed and directing the IO request to the cloned copy.
    Type: Grant
    Filed: October 28, 2020
    Date of Patent: December 7, 2021
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Mohamed Abdullah Gommaa Sohail, Said Tabet
  • Patent number: 11109229
    Abstract: Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security for a network environment using a centralized smart security system. For example, a method includes implementing a network comprising a plurality of network devices which collectively generate data that is utilized by a computing system to execute an application, and implementing a centralized security system as a computing node within the network to manage security operations within the network and to establish secured and trusted communications between the network devices and the computing system. The network devices may comprise wireless sensor devices operating in a wireless sensor network, wherein the computing system executes an IoT (Internet of Things) application which processes the data that is generated by the wireless sensor devices.
    Type: Grant
    Filed: July 9, 2019
    Date of Patent: August 31, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Mohamed Sohail, Stephen Todd, Said Tabet, Khaled Ahmed
  • Patent number: 10956377
    Abstract: Techniques are disclosed for decentralized data management using a geographic location-based consensus protocol in a network of computing resources such as, by way of example, a highly distributed system. For example, at a given consensus node of a consensus network comprising a plurality of consensus nodes configured to participate in a consensus protocol wherein at least a portion of the consensus nodes are mobile, a list is obtained of at least a subset of the plurality of consensus nodes that are predicted to be currently available to participate in the consensus protocol based on geographic location information. A message comprising a transaction to be validated is sent from the given consensus node to the subset of the plurality of consensus nodes in the obtained list. Techniques are also disclosed for adjusting a data protection policy based on the number of computing nodes, some of which are mobile, available to participate.
    Type: Grant
    Filed: July 12, 2018
    Date of Patent: March 23, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Stephen J. Todd, Assaf Natanzon, Said Tabet, Dragan Savic
  • Publication number: 20200403991
    Abstract: Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security mechanisms for network environments. For example, a method includes collecting power consumption data of a plurality of devices operating within a network and determining trust scores for the plurality of devices based, at least in part, on the collected power consumption data. The trust score for a device provides a measure of trustworthiness of the device exhibiting normal operating behavior within the network. Each device is assigned to one of a plurality of trust tiers based on the determined trust scores, wherein each trust tier specifies an authentication level for devices assigned to the trust tier. One or more authentication procedures are applied to authenticate a given device operating within the network based on the authentication level specified by the trust tier to which the given device is assigned.
    Type: Application
    Filed: June 19, 2019
    Publication date: December 24, 2020
    Inventors: Mohamed Sohail, Said Tabet
  • Patent number: 10841237
    Abstract: In a system environment comprising a plurality of computing resources, wherein at least a portion of the computing resources are mobile, a method maintains a decentralized messaging network of interconnected messaging nodes and a decentralized data network of interconnected data nodes. Each of the plurality of computing resources is associated with a given messaging node and a given data node. The method manages transfer of a data set between the plurality of computing resources in association with the decentralized messaging network and the decentralized data network. Managing transfer of the data set comprises inserting a policy file into the decentralized data network specifying one or more policies for managing the transfer of the data set and inserting a message into the decentralized messaging network instructing implementation of the one or more policies.
    Type: Grant
    Filed: April 23, 2018
    Date of Patent: November 17, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Stephen J. Todd, Said Tabet, Assaf Natanzon, Dragan Savic
  • Patent number: 10841240
    Abstract: In a system environment comprising a plurality of computing resources, wherein at least a portion of the computing resources are mobile, a method manages a transfer of one or more portions of a data set between at least a subset of the plurality of computing resources in accordance with a data distribution process. The data distribution process comprises computing one or more probability values to estimate whether or not a given mobile computing resource that is seeking at least a portion of the data set will be in a vicinity of at least one other computing resource that currently has or can obtain the portion of the data set, and based on the computation step, causing a transfer of the portion of the data set to the given mobile computing resource over a communication link locally established between the two computing resources when in the vicinity of one another.
    Type: Grant
    Filed: July 18, 2018
    Date of Patent: November 17, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Stephen J. Todd, Dragan Savic, Assaf Natanzon, Said Tabet
  • Patent number: 10644936
    Abstract: An ad-hoc computation system is formed from one or more clusters of idle mobile computing resources to execute an application program within a given time period. The forming step further comprises: (i) determining at least a subset of idle mobile computing resources from the one or more clusters of idle mobile computing resources that are available, or likely to be available, to execute the application program within the given time period, and that collectively comprise computing resource capabilities sufficient to execute the application program within the given time period; and (ii) distributing a workload associated with the execution of the application program to the subset of idle mobile computing resources. The workload associated with the application program is executed via the subset of idle mobile computing resources forming the ad-hoc computation system.
    Type: Grant
    Filed: July 27, 2018
    Date of Patent: May 5, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Stephen J. Todd, Assaf Natanzon, Dragan Savic, Said Tabet
  • Patent number: 10616751
    Abstract: Systems and methods are provided for generating and managing ad-hoc mobile computing networks. For example, a method includes discovering, by a first mobile compute node, an existence of a second mobile compute node within a geographic location monitored by the first mobile compute node, and exchanging data between the first and second mobile compute nodes to negotiate conditions for forming a cluster of a mobile ad-hoc network. The conditions include, for example, a target purpose for forming the cluster, criteria for compute node membership within the cluster, and designation of one of the first and second mobile compute nodes as a master compute node for the cluster. The cluster including the first and second mobile compute nodes is then formed based on the negotiated conditions.
    Type: Grant
    Filed: February 17, 2018
    Date of Patent: April 7, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Kelly G. Kanellakis, Said Tabet, Dragan Savic, Adrian Michaud
  • Publication number: 20200042657
    Abstract: A physical event to be modeled is selected. A profile for the physical event is generated based on an event type of the physical event. Data is obtained from a plurality of data sources, wherein the obtained data comprises data relevant to the physical event that is collected by the plurality of data sources, and further wherein at least a portion of the obtained data comprises one or more of spatial and temporal references associated with the collection of the data. A digital representation of the physical event is generated based on at least a portion of the obtained data and the generated profile. The digital representation is utilized to analyze one or more other physical events associated with the modeled physical event.
    Type: Application
    Filed: August 3, 2018
    Publication date: February 6, 2020
    Inventors: Stephen J. Todd, Assaf Natanzon, Dragan Savic, Said Tabet
  • Publication number: 20200036585
    Abstract: An ad-hoc computation system is formed from one or more clusters of idle mobile computing resources to execute an application program within a given time period. The forming step further comprises: (i) determining at least a subset of idle mobile computing resources from the one or more clusters of idle mobile computing resources that are available, or likely to be available, to execute the application program within the given time period, and that collectively comprise computing resource capabilities sufficient to execute the application program within the given time period; and (ii) distributing a workload associated with the execution of the application program to the subset of idle mobile computing resources. The workload associated with the application program is executed via the subset of idle mobile computing resources forming the ad-hoc computation system.
    Type: Application
    Filed: July 27, 2018
    Publication date: January 30, 2020
    Inventors: Stephen J. Todd, Assaf Natanzon, Dragan Savic, Said Tabet
  • Publication number: 20200028799
    Abstract: In a system environment comprising a plurality of computing resources, wherein at least a portion of the computing resources are mobile, a method manages a transfer of one or more portions of a data set between at least a subset of the plurality of computing resources in accordance with a data distribution process. The data distribution process comprises computing one or more probability values to estimate whether or not a given mobile computing resource that is seeking at least a portion of the data set will be in a vicinity of at least one other computing resource that currently has or can obtain the portion of the data set, and based on the computation step, causing a transfer of the portion of the data set to the given mobile computing resource over a communication link locally established between the two computing resources when in the vicinity of one another.
    Type: Application
    Filed: July 18, 2018
    Publication date: January 23, 2020
    Inventors: Stephen J. Todd, Dragan Savic, Assaf Natanzon, Said Tabet