Search

Baha S Masoud

from Orem, UT
Age ~53

Baha Masoud Phones & Addresses

  • 1641 350, Orem, UT 84058 (801) 221-0848 (801) 358-5683
  • 1754 Village Ln, Orem, UT 84058 (801) 225-1198
  • 1756 Village Ln, Orem, UT 84058 (801) 225-1198
  • 1772 N 450 W #308, Provo, UT 84604 (801) 344-5304
  • 375 W 1720 N #W, Provo, UT 84604
  • 724 W 1720 N, Provo, UT 84604
  • 1641 S 350 W, Orem, UT 84058

Work

Company: Netiq 2013 to 2014 Position: Senior director of engineering

Education

School / High School: Harvard Business School 2010 to 2011 Specialities: Management

Skills

Security • Cloud Computing • Enterprise Software • Software Engineering • Identity Management • Software Development • Linux • Integration • Unix • Agile Methodologies • Saas • Enterprise Architecture • Software Project Management • Virtualization • Product Management • Solution Architecture • Scrum • Web Services • Product Strategy • System Architecture • Agile Project Management • Sdlc • Server Architecture • Automation • Architecture • System Deployment • Architectures • Agile • Configuration Management • Deployment • Virtual Teams • Quality Assurance • Hardware

Emails

g***t@oasisdancecompany.com

Industries

Computer Software

Resumes

Resumes

Baha Masoud Photo 1

Vice President Of Engineering And General Manager Idc

View page
Location:
1641 south 350 west, Orem, UT 84058
Industry:
Computer Software
Work:
Netiq 2013 - 2014
Senior Director of Engineering

Micro Focus/Netiq 2013 - 2014
Vice President of Engineering and General Manager Idc

Novell 2010 - 2013
Director of Software Engineering

Novell 2008 - 2010
Senior Software Engineering Manager

Novell 2007 - 2008
Software Engineering Manager
Education:
Harvard Business School 2010 - 2011
Brigham Young University 1992 - 1996
Bachelors, Bachelor of Science, Computer Engineering
Utah Valley University 1991 - 1992
The University of Toledo 1989 - 1991
Skills:
Security
Cloud Computing
Enterprise Software
Software Engineering
Identity Management
Software Development
Linux
Integration
Unix
Agile Methodologies
Saas
Enterprise Architecture
Software Project Management
Virtualization
Product Management
Solution Architecture
Scrum
Web Services
Product Strategy
System Architecture
Agile Project Management
Sdlc
Server Architecture
Automation
Architecture
System Deployment
Architectures
Agile
Configuration Management
Deployment
Virtual Teams
Quality Assurance
Hardware

Publications

Us Patents

Federated Timeout

View page
US Patent:
20140068094, Mar 6, 2014
Filed:
Aug 30, 2012
Appl. No.:
13/599718
Inventors:
Lloyd Leon Burch - Payson UT, US
Baha Masoud - Orem UT, US
Douglas Gary Earl - Orem UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 15/16
US Classification:
709229, 709227
Abstract:
Techniques for workload federated timeout are presented, A federated service manages communications between service components of a system. Each component queries the federated service to determine a last activity time by the other components of the system before timing out during a session. Each component can update its last activity time based on the discovered last activity time of one of the components to prevent a premature time out from the session.

Blockchain-Based State Verifications Of Software Component Vulnerability Database For Software Products

View page
US Patent:
20200394308, Dec 17, 2020
Filed:
Jun 14, 2019
Appl. No.:
16/441310
Inventors:
- Sanford NC, US
Lloyd L. Burch - Provo UT, US
Baha Masoud - Orem UT, US
International Classification:
G06F 21/57
G06F 16/182
H04L 9/06
H04L 9/32
Abstract:
A technique includes determining, by a computer, entries of a software vulnerability database that is associated with a plurality of components associated with a release of a software product. The technique includes determining, by the computer, a block of a blockchain representing a vulnerability state of the plurality of components; and associating, by the computer, the block of the blockchain with the product release.

Blockchains For Software Component Vulnerability Databases

View page
US Patent:
20200394309, Dec 17, 2020
Filed:
Jun 14, 2019
Appl. No.:
16/441330
Inventors:
- Sanford NC, US
Lloyd L. Burch - Provo UT, US
Baha Masoud - Orem UT, US
International Classification:
G06F 21/57
G06F 16/22
G06F 16/23
G06F 21/60
H04L 9/30
Abstract:
A method includes, by a computer associated with a security reporter, updating a component vulnerability entry blockchain to represent a state of a component vulnerability entry of a software component vulnerability database. The method includes, by the computer, providing the updated component vulnerability entry blockchain to a management authority so that the management authority updates a master blockchain for the software component vulnerability database. The updated master blockchain includes a plurality of component vulnerability entry blockchains, which represent corresponding states of component vulnerability entries of the software component vulnerability database, including the updated component vulnerability entry.

Blockchain-Based Tracking Of Program Changes

View page
US Patent:
20200099513, Mar 26, 2020
Filed:
Sep 21, 2018
Appl. No.:
16/138268
Inventors:
- Houston TX, US
Lloyd Leon Burch - Payson UT, US
Baha Masoud - Orem UT, US
International Classification:
H04L 9/06
G06F 17/30
G06F 21/16
H04L 9/32
H04L 29/06
Abstract:
In some examples, in response to detecting addition or update of a program component of a program, a system creates a blockchain entry for addition to a blockchain register, generates a hash based on the program component, and adds in the blockchain entry a signed hash produced by encrypting the generated hash. The system publishes the blockchain entry for the blockchain, the signed hash in a blockchain entry useable to detect tampering with the program component.

Remote Keychain For Mobile Devices

View page
US Patent:
20180270225, Sep 20, 2018
Filed:
Mar 12, 2018
Appl. No.:
15/918721
Inventors:
- Provo UT, US
Michael F. Angelo - Spring TX, US
Baha Masoud - Orem UT, US
International Classification:
H04L 29/06
H04W 12/04
H04W 4/60
H04W 12/06
Abstract:
An app of a mobile device registers the mobile device for a remote credential server (RCS) and receives a device token. When a credential for a remote asset is supplied on the mobile device it is routed to the RCS and stored external to the mobile device but referenced on the mobile device via an asset token. When the credential is needed, the device token and the asset token permit the RCS to authenticate and return the credential to or on behalf of the mobile device so that the mobile device can authenticate to and access the remote asset.

Wireless Information Passing And Authentication

View page
US Patent:
20180255032, Sep 6, 2018
Filed:
May 4, 2018
Appl. No.:
15/971177
Inventors:
- Provo UT, US
Baha Masoud - Orem UT, US
International Classification:
H04L 29/06
H04W 12/06
H04W 12/02
Abstract:
A secure server detects a login from a user originating from a first device. A second user-registered device is sent a message. The second device: translates the message into light-based communication that is captured by a camera of the first device, translates the message back into the original message, and sends the translated message to the secure server. The secure server authenticates the message and sends an indication to the first device that the second device is permitted to access the first device. In an embodiment, information passed between the first and second devices continue using light-based communications.

Proximity-Based Authentication

View page
US Patent:
20170353442, Dec 7, 2017
Filed:
Jul 31, 2017
Appl. No.:
15/664123
Inventors:
- Provo UT, US
Michael F. Angelo - Spring TX, US
Baha Masoud - Orem UT, US
International Classification:
H04L 29/06
H04W 12/06
Abstract:
A first device requests a protected resource (managed by a second device). A first authentication is performed by the second device upon receipt of the request. The second device provides an audio message back to the first device, which plays the audio message over a speaker. A third device captures the audio message as audio and uses the audio message to request a second authentication from the second device. The second device provides an authenticated session handle back to the first device for accessing the protected resource when both the first and second authentications are successful.

Techniques For Secure Debugging And Monitoring

View page
US Patent:
20170353464, Dec 7, 2017
Filed:
Jul 31, 2017
Appl. No.:
15/664165
Inventors:
- Provo UT, US
Carolyn B. McClain - Springville UT, US
Robert Skousen Stilmar - Payson UT, US
Dipto Chakravarty - Potomac MD, US
Baha Masoud - Orem UT, US
Michael F. Angelo - Spring TX, US
International Classification:
H04L 29/06
G06F 21/00
G06F 21/60
G01R 31/317
Abstract:
Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
Baha S Masoud from Orem, UT, age ~53 Get Report