Patents by Inventor Amer Haider
Amer Haider has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230388126Abstract: Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.Type: ApplicationFiled: May 30, 2023Publication date: November 30, 2023Inventors: Amer Haider, Ali Ahmed
-
Publication number: 20230368221Abstract: An example method for facilitating a discussion session between two devices includes acquiring a checklist from a first provider. A set of questions and answers is determined from the checklist, where each question is associated with respective answer(s). The method includes acquiring another checklist and selecting a process associated with the checklist based, at least in part, on a selection from a first device. The method includes providing a question of the set to the first device and providing answer(s) of the first set to the second device, the answer(s) being associated with the first question. The method includes receiving a selected answer from the second device, where the selected answer is associated with the question. The method includes determining another question from the set and associated answer(s) based, at least in part, on the question and the selected answer.Type: ApplicationFiled: May 25, 2023Publication date: November 16, 2023Inventor: Amer Haider
-
Patent number: 11706029Abstract: Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.Type: GrantFiled: October 13, 2021Date of Patent: July 18, 2023Assignee: Masimo CorporationInventors: Amer Haider, Ali Ahmed
-
Publication number: 20220191031Abstract: Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.Type: ApplicationFiled: October 13, 2021Publication date: June 16, 2022Inventors: Amer Haider, Ali Ahmed
-
Patent number: 11153089Abstract: Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.Type: GrantFiled: March 30, 2020Date of Patent: October 19, 2021Assignee: Masimo CorporationInventors: Amer Haider, Ali Ahmed
-
Publication number: 20200295937Abstract: Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.Type: ApplicationFiled: March 30, 2020Publication date: September 17, 2020Inventors: Amer Haider, Ali Ahmed
-
Patent number: 10608817Abstract: Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.Type: GrantFiled: July 6, 2017Date of Patent: March 31, 2020Assignee: Masimo CorporationInventors: Amer Haider, Ali Ahmed
-
Publication number: 20180013562Abstract: Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.Type: ApplicationFiled: July 6, 2017Publication date: January 11, 2018Inventors: Amer Haider, Ali Ahmed
-
Patent number: 9729320Abstract: A semiconductor includes a set of protected hardware resources, where at least one protected hardware resource stores a secure key. The semiconductor also includes a computation kernel and a memory to store a resource enablement module executed by the computation kernel. The resource enablement module selectively enables a protected hardware resource in response to a delivered key corresponding to the secure key.Type: GrantFiled: February 24, 2015Date of Patent: August 8, 2017Assignee: Cavium, Inc.Inventors: Amer Haider, Muhammad Raghib Hussain, Richard Eugene Kessler
-
Publication number: 20170024748Abstract: An example method for facilitating a discussion session between two devices includes acquiring a checklist from a first provider. A set of questions and answers is determined from the checklist, where each question is associated with respective answer(s). The method includes acquiring another checklist and selecting a process associated with the checklist based, at least in part, on a selection from a first device. The method includes providing a question of the set to the first device and providing answer(s) of the first set to the second device, the answer(s) being associated with the first question. The method includes receiving a selected answer from the second device, where the selected answer is associated with the question. The method includes determining another question from the set and associated answer(s) based, at least in part, on the question and the selected answer.Type: ApplicationFiled: July 22, 2015Publication date: January 26, 2017Applicant: Patient Doctor Technologies, Inc.Inventor: Amer Haider
-
Publication number: 20150242655Abstract: A semiconductor includes a set of protected hardware resources, where at least one protected hardware resource stores a secure key. The semiconductor also includes a computation kernel and a memory to store a resource enablement module executed by the computation kernel. The resource enablement module selectively enables a protected hardware resource in response to a delivered key corresponding to the secure key.Type: ApplicationFiled: February 24, 2015Publication date: August 27, 2015Applicant: Cavium, Inc.Inventors: Amer Haider, Muhammad Raghib Hussain, Richard Eugene Kessler
-
Patent number: 8677144Abstract: In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. This cryptographic binding technique is referred to herein as secure software and hardware association (SSHA).Type: GrantFiled: February 24, 2009Date of Patent: March 18, 2014Assignee: Cavium, Inc.Inventors: Amer Haider, Muhammad R. Hussain, Richard E. Kessler, Imran Badr
-
Patent number: 8661266Abstract: Disclosed are systems and methods for protecting secret device keys, such as High-bandwidth Digital Content Protection (HDCP) device keys. Instead of storing secret device keys in the plain, a security algorithm and one or more protection keys are stored on the device. The security algorithm is applied to the secret device keys and the one or more protection keys to produce encrypted secret device keys. The encrypted secret device keys are then stored either on chip or off-chip.Type: GrantFiled: April 20, 2011Date of Patent: February 25, 2014Assignee: Cavium, Inc.Inventors: Harri Hakkarainen, Amer Haider, Muhammad Hussain, Trent Parker
-
Patent number: 8544106Abstract: Systems and methods are disclosed for enabling access to a protected hardware resource. A hardware component includes at least one protected hardware resource. A unique hardware ID and a unique cryptographically secure or randomly generated enable value (EV) are integrated in the hardware component at the time of manufacturing. At run-time, special software generates or receives from an external source an enable register (ER) value and a comparison is made with the stored enable value. If the ER value and the EV match, access to the protected hardware resource is allowed.Type: GrantFiled: August 1, 2010Date of Patent: September 24, 2013Assignee: Cavium, Inc.Inventors: Amer Haider, Steven Craig Barner, Richard Eugene Kessler
-
Patent number: 8356194Abstract: Embodiments of the present invention relate to limiting maximum power dissipation occurred in a processor. Therefore, when an application that requires excessive amounts of power is being executed, the execution of the application may be prevented to reduce dissipated or consumed power. Example embodiments may stall the issue or execution of instructions by the processor, allowing software or hardware to reduce the power of an application by imposing a decrease in the performance of the application.Type: GrantFiled: January 28, 2010Date of Patent: January 15, 2013Assignee: Cavium, Inc.Inventors: David A. Carlson, Richard E. Kessler, Amer Haider
-
Publication number: 20120027199Abstract: Systems and methods are disclosed for enabling access to a protected hardware resource. A hardware component includes at least one protected hardware resource. A unique hardware ID and a unique cryptographically secure or randomly generated enable value (EV) are integrated in the hardware component at the time of manufacturing. At run-time, special software generates or receives from an external source an enable register (ER) value and a comparison is made with the stored enable value. If the ER value and the EV match, access to the protected hardware resource is allowed.Type: ApplicationFiled: August 1, 2010Publication date: February 2, 2012Applicant: CAVIUM NETWORKSInventors: Amer Haider, Steven Craig Barner, Richard Eugene Kessler
-
Publication number: 20120011373Abstract: Disclosed are systems and methods for protecting secret device keys, such as High-bandwidth Digital Content Protection (HDCP) device keys. Instead of storing secret device keys in the plain, a security algorithm and one or more protection keys are stored on the device. The security algorithm is applied to the secret device keys and the one or more protection keys to produce encrypted secret device keys. The encrypted secret device keys are then stored either on chip or off-chip.Type: ApplicationFiled: April 20, 2011Publication date: January 12, 2012Applicant: CAVIUM NETWORKSInventors: Harri Hakkarainen, Amer Haider, Muhammad Hussain, Trent Parker
-
Publication number: 20110185203Abstract: Embodiments of the present invention relate to limiting maximum power dissipation occurred in a processor. Therefore, when an application that requires excessive amounts of power is being executed, the execution of the application may be prevented to reduce dissipated or consumed power. Example embodiments may stall the issue or execution of instructions by the processor, allowing software or hardware to reduce the power of an application by imposing a decrease in the performance of the application.Type: ApplicationFiled: January 28, 2010Publication date: July 28, 2011Applicant: Cavium Networks, Inc.Inventors: David A. Carlson, Richard E. Kessler, Amer Haider
-
Publication number: 20090217054Abstract: In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. This cryptographic binding technique is referred to herein as secure software and hardware association (SSHA).Type: ApplicationFiled: February 24, 2009Publication date: August 27, 2009Applicant: Cavium Networks, Inc.Inventors: Amer Haider, Muhammad R. Hussain, Richard E. Kessler, Imran Badr