Patents by Inventor Tarek Saadawi

Tarek Saadawi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11729186
    Abstract: A computer security system comprises at least one authorized node constructed and arranged to execute a consensus protocol for validating and verifying a blockchain transaction and to extract at least one of a signature or feature of a detected cyberattack for the blockchain transaction and mining the transaction to a blockchain network; at least one unauthorized node prohibited from executing the consensus protocol and from validating and verifying a blockchain transaction but authorized to retrieve the at least one of the signature or feature from the blockchain network; and a special-purpose processor of the blockchain network that facilitates a distribution of the at least one of signature or feature for cooperative intrusion detection between the at least one authorized node and the at least one unauthorized node.
    Type: Grant
    Filed: October 3, 2019
    Date of Patent: August 15, 2023
    Assignee: Research Foundation of the City University of New York
    Inventors: Oluwaseyi Ajayi, Tarek Saadawi, Obinna Igbe
  • Publication number: 20220342982
    Abstract: A malicious process detection system comprises a Virtual Machine Introspection (VMI) module that performs an introspection operation on at least one virtual machine; and an Intrusion Detection System (IDS) that communicates with the VW module to generate data that is analyzed by the IDS using a negative selection algorithm (NSA) and that identifies suspicious processes at the VM based on the analyzed data.
    Type: Application
    Filed: April 19, 2022
    Publication date: October 27, 2022
    Inventors: Huseyn Huseynov, Kenichi Kourai, Tarek Saadawi, Obinna Igbe
  • Publication number: 20200112572
    Abstract: A computer security system comprises at least one authorized node constructed and arranged to execute a consensus protocol for validating and verifying a blockchain transaction and to extract at least one of a signature or feature of a detected cyberattack for the blockchain transaction and mining the transaction to a blockchain network; at least one unauthorized node prohibited from executing the consensus protocol and from validating and verifying a blockchain transaction but authorized to retrieve the at least one of the signature or feature from the blockchain network; and a special-purpose processor of the blockchain network that facilitates a distribution of the at least one of signature or feature for cooperative intrusion detection between the at least one authorized node and the at least one unauthorized node.
    Type: Application
    Filed: October 3, 2019
    Publication date: April 9, 2020
    Inventors: Oluwaseyi Ajayi, Tarek Saadawi, Obinna Igbe
  • Patent number: 10609057
    Abstract: A method for detecting intrusion is provided using a combination of two AIS algorithms: Negative Selection Algorithm (NSA) and Dendritic Cell Algorithm (DCA). The method includes the following steps, or some functional subset of these steps: periodic monitoring of a data processing system for anomalous behavior that may indicate the presence of an intruder or an undesirable software; using the NSA for the generation of a population of detectors that are used for detecting anomalies in the monitored system via a matching criterion; using the DCA (which runs in parallel to the NSA) to sample traffic and signals coming in or out of the data processing system; using an aggregation system to combine the individual decisions of the NSA and the DCA to form a single final decision.
    Type: Grant
    Filed: June 26, 2017
    Date of Patent: March 31, 2020
    Assignee: Research Foundation of the City University of New York
    Inventors: Obinna Igbe, Tarek Saadawi, Ihab Darwish
  • Publication number: 20170374091
    Abstract: A method for detecting intrusion is provided using a combination of two AIS algorithms: Negative Selection Algorithm (NSA) and Dendritic Cell Algorithm (DCA). The method includes the following steps, or some functional subset of these steps: periodic monitoring of a data processing system for anomalous behavior that may indicate the presence of an intruder or an undesirable software; using the NSA for the generation of a population of detectors that are used for detecting anomalies in the monitored system via a matching criterion; using the DCA (which runs in parallel to the NSA) to sample traffic and signals coming in or out of the data processing system; using an aggregation system to combine the individual decisions of the NSA and the DCA to form a single final decision.
    Type: Application
    Filed: June 26, 2017
    Publication date: December 28, 2017
    Inventors: Obinna Igbe, Tarek Saadawi, Ihab Darwish
  • Patent number: 7012982
    Abstract: The present invention relates to an improved method of de-jittering MPEG-2 and MPEG-4 data that is transmitted over a network. First, a network system jitter associated with periodic reference data packets is estimated. Then, the estimated system jitter is used to adjust clock-stamped reference values in the data packets before they are provided to the PLL for clock synchronization. The invented de-jittering method improves the PLL's ability to synchronize the MPEG data and provides for a better quality playback.
    Type: Grant
    Filed: June 20, 2000
    Date of Patent: March 14, 2006
    Assignee: Verizon Laboratories Inc.
    Inventors: Evert Basch, Khaled Shuaib, Tarek Saadawi, Steven Gringeri, Myung Lee
  • Publication number: 20050286464
    Abstract: The present invention provides a method for selecting and routing data in an ad-hoc mobile wireless network having a plurality of Nodes including multiple sources and destinations. The method includes sending a forward control packet from a source to the destination via at least one intermediate Node at intervals of time, where the intermediate Node is randomly selected. Each of the intermediate Nodes store weights of the neighbor Nodes. When the forward control packets reach the destination Node, they are evaluated in accordance with one or more given parameters and send back as backward control packets storing the evaluation results. As each of the intermediate Nodes receive the backward control packets, the weights of the corresponding neighbor Nodes are modified based on the stored evaluation results. Similarly, as the backward control packets are received at the source Nodes and the weights of the corresponding neighbor Nodes are modified based on the stored evaluation results.
    Type: Application
    Filed: June 29, 2005
    Publication date: December 29, 2005
    Inventors: Tarek Saadawi, Osama Hussein
  • Patent number: 6940832
    Abstract: The present invention provides a method for selecting and routing data in an ad-hoc mobile wireless network having a plurality of Nodes including multiple sources and destinations. The method includes sending a forward control packet from a source to the destination via at least one intermediate Node at intervals of time, where the intermediate Node is randomly selected. Each of the intermediate Nodes store weights of the neighbor Nodes. When the forward control packets reach the destination Node, they are evaluated in accordance with one or more given parameters and send back as backward control packets storing the evaluation results. As each of the intermediate Nodes receive the backward control packets, the weights of the corresponding neighbor Nodes are modified based on the stored evaluation results. Similarly, as the backward control packets are received at the source Nodes and the weights of the corresponding neighbor Nodes are modified based on the stored evaluation results.
    Type: Grant
    Filed: January 17, 2003
    Date of Patent: September 6, 2005
    Assignee: The Research Foundation of the City University of New York
    Inventors: Tarek Saadawi, Osama Hussein
  • Publication number: 20040146007
    Abstract: The present invention provides a method for selecting and routing data in an ad-hoc mobile wireless network having a plurality of Nodes including multiple sources and destinations. The method includes sending a forward control packet from a source to the destination via at least one intermediate Node at intervals of time, where the intermediate Node is randomly selected. Each of the intermediate Nodes store weights of the neighbor Nodes. When the forward control packets reach the destination Node, they are evaluated in accordance with one or more given parameters and send back as backward control packets storing the evaluation results. As each of the intermediate Nodes receive the backward control packets, the weights of the corresponding neighbor Nodes are modified based on the stored evaluation results. Similarly, as the backward control packets are received at the source Nodes and the weights of the corresponding neighbor Nodes are modified based on the stored evaluation results.
    Type: Application
    Filed: January 17, 2003
    Publication date: July 29, 2004
    Applicant: The City University of New York
    Inventors: Tarek Saadawi, Osama Hussein