Patents by Inventor Amer Haider

Amer Haider has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230388126
    Abstract: Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.
    Type: Application
    Filed: May 30, 2023
    Publication date: November 30, 2023
    Inventors: Amer Haider, Ali Ahmed
  • Publication number: 20230368221
    Abstract: An example method for facilitating a discussion session between two devices includes acquiring a checklist from a first provider. A set of questions and answers is determined from the checklist, where each question is associated with respective answer(s). The method includes acquiring another checklist and selecting a process associated with the checklist based, at least in part, on a selection from a first device. The method includes providing a question of the set to the first device and providing answer(s) of the first set to the second device, the answer(s) being associated with the first question. The method includes receiving a selected answer from the second device, where the selected answer is associated with the question. The method includes determining another question from the set and associated answer(s) based, at least in part, on the question and the selected answer.
    Type: Application
    Filed: May 25, 2023
    Publication date: November 16, 2023
    Inventor: Amer Haider
  • Patent number: 11706029
    Abstract: Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.
    Type: Grant
    Filed: October 13, 2021
    Date of Patent: July 18, 2023
    Assignee: Masimo Corporation
    Inventors: Amer Haider, Ali Ahmed
  • Publication number: 20220191031
    Abstract: Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.
    Type: Application
    Filed: October 13, 2021
    Publication date: June 16, 2022
    Inventors: Amer Haider, Ali Ahmed
  • Patent number: 11153089
    Abstract: Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.
    Type: Grant
    Filed: March 30, 2020
    Date of Patent: October 19, 2021
    Assignee: Masimo Corporation
    Inventors: Amer Haider, Ali Ahmed
  • Publication number: 20200295937
    Abstract: Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.
    Type: Application
    Filed: March 30, 2020
    Publication date: September 17, 2020
    Inventors: Amer Haider, Ali Ahmed
  • Patent number: 10608817
    Abstract: Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.
    Type: Grant
    Filed: July 6, 2017
    Date of Patent: March 31, 2020
    Assignee: Masimo Corporation
    Inventors: Amer Haider, Ali Ahmed
  • Publication number: 20180013562
    Abstract: Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.
    Type: Application
    Filed: July 6, 2017
    Publication date: January 11, 2018
    Inventors: Amer Haider, Ali Ahmed
  • Patent number: 9729320
    Abstract: A semiconductor includes a set of protected hardware resources, where at least one protected hardware resource stores a secure key. The semiconductor also includes a computation kernel and a memory to store a resource enablement module executed by the computation kernel. The resource enablement module selectively enables a protected hardware resource in response to a delivered key corresponding to the secure key.
    Type: Grant
    Filed: February 24, 2015
    Date of Patent: August 8, 2017
    Assignee: Cavium, Inc.
    Inventors: Amer Haider, Muhammad Raghib Hussain, Richard Eugene Kessler
  • Publication number: 20170024748
    Abstract: An example method for facilitating a discussion session between two devices includes acquiring a checklist from a first provider. A set of questions and answers is determined from the checklist, where each question is associated with respective answer(s). The method includes acquiring another checklist and selecting a process associated with the checklist based, at least in part, on a selection from a first device. The method includes providing a question of the set to the first device and providing answer(s) of the first set to the second device, the answer(s) being associated with the first question. The method includes receiving a selected answer from the second device, where the selected answer is associated with the question. The method includes determining another question from the set and associated answer(s) based, at least in part, on the question and the selected answer.
    Type: Application
    Filed: July 22, 2015
    Publication date: January 26, 2017
    Applicant: Patient Doctor Technologies, Inc.
    Inventor: Amer Haider
  • Publication number: 20150242655
    Abstract: A semiconductor includes a set of protected hardware resources, where at least one protected hardware resource stores a secure key. The semiconductor also includes a computation kernel and a memory to store a resource enablement module executed by the computation kernel. The resource enablement module selectively enables a protected hardware resource in response to a delivered key corresponding to the secure key.
    Type: Application
    Filed: February 24, 2015
    Publication date: August 27, 2015
    Applicant: Cavium, Inc.
    Inventors: Amer Haider, Muhammad Raghib Hussain, Richard Eugene Kessler
  • Patent number: 8677144
    Abstract: In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. This cryptographic binding technique is referred to herein as secure software and hardware association (SSHA).
    Type: Grant
    Filed: February 24, 2009
    Date of Patent: March 18, 2014
    Assignee: Cavium, Inc.
    Inventors: Amer Haider, Muhammad R. Hussain, Richard E. Kessler, Imran Badr
  • Patent number: 8661266
    Abstract: Disclosed are systems and methods for protecting secret device keys, such as High-bandwidth Digital Content Protection (HDCP) device keys. Instead of storing secret device keys in the plain, a security algorithm and one or more protection keys are stored on the device. The security algorithm is applied to the secret device keys and the one or more protection keys to produce encrypted secret device keys. The encrypted secret device keys are then stored either on chip or off-chip.
    Type: Grant
    Filed: April 20, 2011
    Date of Patent: February 25, 2014
    Assignee: Cavium, Inc.
    Inventors: Harri Hakkarainen, Amer Haider, Muhammad Hussain, Trent Parker
  • Patent number: 8544106
    Abstract: Systems and methods are disclosed for enabling access to a protected hardware resource. A hardware component includes at least one protected hardware resource. A unique hardware ID and a unique cryptographically secure or randomly generated enable value (EV) are integrated in the hardware component at the time of manufacturing. At run-time, special software generates or receives from an external source an enable register (ER) value and a comparison is made with the stored enable value. If the ER value and the EV match, access to the protected hardware resource is allowed.
    Type: Grant
    Filed: August 1, 2010
    Date of Patent: September 24, 2013
    Assignee: Cavium, Inc.
    Inventors: Amer Haider, Steven Craig Barner, Richard Eugene Kessler
  • Patent number: 8356194
    Abstract: Embodiments of the present invention relate to limiting maximum power dissipation occurred in a processor. Therefore, when an application that requires excessive amounts of power is being executed, the execution of the application may be prevented to reduce dissipated or consumed power. Example embodiments may stall the issue or execution of instructions by the processor, allowing software or hardware to reduce the power of an application by imposing a decrease in the performance of the application.
    Type: Grant
    Filed: January 28, 2010
    Date of Patent: January 15, 2013
    Assignee: Cavium, Inc.
    Inventors: David A. Carlson, Richard E. Kessler, Amer Haider
  • Publication number: 20120027199
    Abstract: Systems and methods are disclosed for enabling access to a protected hardware resource. A hardware component includes at least one protected hardware resource. A unique hardware ID and a unique cryptographically secure or randomly generated enable value (EV) are integrated in the hardware component at the time of manufacturing. At run-time, special software generates or receives from an external source an enable register (ER) value and a comparison is made with the stored enable value. If the ER value and the EV match, access to the protected hardware resource is allowed.
    Type: Application
    Filed: August 1, 2010
    Publication date: February 2, 2012
    Applicant: CAVIUM NETWORKS
    Inventors: Amer Haider, Steven Craig Barner, Richard Eugene Kessler
  • Publication number: 20120011373
    Abstract: Disclosed are systems and methods for protecting secret device keys, such as High-bandwidth Digital Content Protection (HDCP) device keys. Instead of storing secret device keys in the plain, a security algorithm and one or more protection keys are stored on the device. The security algorithm is applied to the secret device keys and the one or more protection keys to produce encrypted secret device keys. The encrypted secret device keys are then stored either on chip or off-chip.
    Type: Application
    Filed: April 20, 2011
    Publication date: January 12, 2012
    Applicant: CAVIUM NETWORKS
    Inventors: Harri Hakkarainen, Amer Haider, Muhammad Hussain, Trent Parker
  • Publication number: 20110185203
    Abstract: Embodiments of the present invention relate to limiting maximum power dissipation occurred in a processor. Therefore, when an application that requires excessive amounts of power is being executed, the execution of the application may be prevented to reduce dissipated or consumed power. Example embodiments may stall the issue or execution of instructions by the processor, allowing software or hardware to reduce the power of an application by imposing a decrease in the performance of the application.
    Type: Application
    Filed: January 28, 2010
    Publication date: July 28, 2011
    Applicant: Cavium Networks, Inc.
    Inventors: David A. Carlson, Richard E. Kessler, Amer Haider
  • Publication number: 20090217054
    Abstract: In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. This cryptographic binding technique is referred to herein as secure software and hardware association (SSHA).
    Type: Application
    Filed: February 24, 2009
    Publication date: August 27, 2009
    Applicant: Cavium Networks, Inc.
    Inventors: Amer Haider, Muhammad R. Hussain, Richard E. Kessler, Imran Badr