Patents by Inventor Khaled Soliman Alghathbar
Khaled Soliman Alghathbar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9825761Abstract: In one aspect, systems and methods to improve a cryptosystem include computer-implemented operations such as scanning a biometric attribute for comparison with stored biometric data, and generating a keystream based upon the stored biometric data if the scanned biometric attribute substantially matches the stored biometric data. The computer-implemented method may also include operations for encrypting object data, and encrypting final data based upon the keystream and the encrypted object data.Type: GrantFiled: April 6, 2010Date of Patent: November 21, 2017Assignee: King Saud UniversityInventors: Maqsood Mahmud, Muhammad Khurram Khan, Khaled Soliman Alghathbar
-
Patent number: 9355303Abstract: Face recognition using multilayered discriminant analysis includes systems and methods applying an initial linear discriminate analysis to a database of face images in a more-or less conventional manner. Initial fuzzy logic then is applied to the results of the initial linear discriminate analysis to produce a subset of the database of face images. Thereafter, a subsequent linear discriminate analysis is applied to the subset of the database of face images and subsequent fuzzy logic is applied to the results of the subsequent linear discriminate analysis to produce a further subset of the subset of the database of face images. The application of the subsequent linear discriminate analysis and application of the subsequent fuzzy logic may be repeated until the further subset contains only one, or zero, face images.Type: GrantFiled: December 4, 2011Date of Patent: May 31, 2016Assignee: King Saud UniversityInventors: Muhammad Imran Razzak, Khaled Soliman Alghathbar, Muhammad Khurram Khan
-
Patent number: 8862888Abstract: In one aspect, systems and methods for three-factor authentication include receiving a user's identification and password transmitted from the user's mobile device, generating a One Time Password (OTP), encrypting the OTP, and encoding the encrypted OTP in a two-dimensional barcode. The two-dimensional barcode of the encrypted OTP is transmitted to a computing device of the user, and an image of the two-dimensional barcode of the encrypted OTP displayed on the user's computing device is captured using the user's mobile device. The two-dimensional barcode of the encrypted OTP is decoded using the user's mobile device to obtain the encrypted OTP. The encrypted OTP is decrypted using the user's mobile device and displayed. The OTP then is spoken by the user, and the user's voice and the OTP are recognized to authenticate the user.Type: GrantFiled: January 11, 2012Date of Patent: October 14, 2014Assignee: King Saud UniversityInventors: Ahmed Saleh Mohamed Tolba, Muhammad Khurram Khan, Khaled Soliman Alghathbar
-
Patent number: 8683564Abstract: Systems and methods for One-Time Password (OTP) authentication with infinite nested hash chains are described. In one aspect, a methodology includes a client device that provides a one-time password (OTP) authentication server with certain registration information. The client device generates, via the OTP authentication server, an authenticated OTP with infinite nested hash chains, These generating operations use a first hash function (hA (?)) for updating a seed chain, a second hash function (hB (•)) for OTP production, an OTP seed number stOTP for a tth authentication, and two authentication seeds of numbers s2t?1Auth and s2tAuth, for the tth authentication.Type: GrantFiled: November 17, 2010Date of Patent: March 25, 2014Assignee: King Saud UniversityInventors: Muhammad Khurram Khan, Mohamed Hamdy Khalil Eldefrawy, Khaled Soliman Alghathbar
-
Patent number: 8549314Abstract: Password generation and extraction is described. In one aspect, a user inputs multiple characters, including a user password, variable characters, and multiple terminator characters. Locations of the terminator characters are identified and used to extract the user password from the multiple characters input by the user.Type: GrantFiled: April 29, 2010Date of Patent: October 1, 2013Assignee: King Saud UniversityInventors: Hanan Ahmed Hossni Mahmoud Abd Alla, Khaled Soliman Alghathbar
-
Publication number: 20130191899Abstract: Systems and methods for One-Time Password (OTP) authentication with infinite nested hash chains are described. In one aspect, a methodology includes a client device that provides a one-time password (OTP) authentication server with certain registration information. The client device generates, via the OTP authentication server, an authenticated OTP with infinite nested hash chains, These generating operations use a first hash function (hA (?)) for updating a seed chain, a second hash function (hB (•)) for OTP production, an OTP seed number stOTP for a tth authentication, and two authentication seeds of numbers s2t?1Auth and s2tAuth, for the tth authentication.Type: ApplicationFiled: November 17, 2010Publication date: July 25, 2013Applicant: KING SAUD UNIVERSITYInventors: Mohamed Hamdy Khalil Eldefrawy, Khaled Soliman Alghathbar, Muhammad Khurram Khan
-
Publication number: 20130179692Abstract: In one aspect, systems and methods for three-factor authentication include receiving a user's identification and password transmitted from the user's mobile device, generating a One Time Password (OTP), encrypting the OTP, and encoding the encrypted OTP in a two-dimensional barcode. The two-dimensional barcode of the encrypted OTP is transmitted to a computing device of the user, and an image of the two-dimensional barcode of the encrypted OTP displayed on the user's computing device is captured using the user's mobile device. The two-dimensional barcode of the encrypted OTP is decoded using the user's mobile device to obtain the encrypted OTP. The encrypted OTP is decrypted using the user's mobile device and displayed. The OTP then is spoken by the user, and the user's voice and the OTP are recognized to authenticate the user.Type: ApplicationFiled: January 11, 2012Publication date: July 11, 2013Applicant: King Saud UniversityInventors: Ahmed Saleh Mohamed Tolba, Muhammad Khurram Khan, Khaled Soliman Alghathbar
-
Publication number: 20130142399Abstract: Face recognition using multilayered discriminant analysis includes systems and methods applying an initial linear discriminate analysis to a database of face images in a more-or less conventional manner. Initial fuzzy logic then is applied to the results of the initial linear discriminate analysis to produce a subset of the database of face images. Thereafter, a subsequent linear discriminate analysis is applied to the subset of the database of face images and subsequent fuzzy logic is applied to the results of the subsequent linear discriminate analysis to produce a further subset of the subset of the database of face images. The application of the subsequent linear discriminate analysis and application of the subsequent fuzzy logic may be repeated until the further subset contains only one, or zero, face images.Type: ApplicationFiled: December 4, 2011Publication date: June 6, 2013Applicant: King Saud UniversityInventors: Muhammad Imran Razzak, Khaled Soliman Alghathbar, Muhammad Khurram Khan
-
Patent number: 8413906Abstract: The present disclosure introduces a new technique for hiding sensitive information in smart cards. A smartcard system relying on stegnography rather than cryptography may act as a countermeasure to prevent extraction of cryptographic information such as passwords. In one embodiment, the smart card system of the present disclosure may be used to authenticate a smart card user. A password may be stored within a hidden memory location of a smart card. A smart card may interface with an external device. Data representing the hidden memory location of the stored password may be transmitted to an external device. Access to the hidden memory location of the smart card by the external device may be allowed. The password stored within the smart card memory is compared to input data entered into the external device. If the input data matches the password stored within the smart card, a user may be authenticated.Type: GrantFiled: May 22, 2011Date of Patent: April 9, 2013Assignee: King Saud UniversityInventors: Hanan Ahmed Hossni Mahmoud Abd Alla, Khaled Soliman Alghathbar
-
Publication number: 20120292391Abstract: The present disclosure introduces a new technique for hiding sensitive information in smart cards. A smartcard system relying on stegnography rather than cryptography may act as a countermeasure to prevent extraction of cryptographic information such as passwords. In one embodiment, the smart card system of the present disclosure may be used to authenticate a smart card user. A password may be stored within a hidden memory location of a smart card. A smart card may interface with an external device. Data representing the hidden memory location of the stored password may be transmitted to an external device. Access to the hidden memory location of the smart card by the external device may be allowed. The password stored within the smart card memory is compared to input data entered into the external device. If the input data matches the password stored within the smart card, a user may be authenticated.Type: ApplicationFiled: May 22, 2011Publication date: November 22, 2012Applicant: King Saud UniversityInventors: Hanan Ahmed Hossni Mahmoud Abd Alla, Khaled Soliman Alghathbar
-
Publication number: 20110296193Abstract: Code-based hashing for message authentication code generation is described. In one aspect, a computer-implemented method receives a message and a secret key. A hash function is built based on respective portions of the secret key and a language interpreter. A formatted message is hashed using the hash function to generate a message authentication code for authentication of the message.Type: ApplicationFiled: May 28, 2010Publication date: December 1, 2011Applicant: King Saud UniversityInventors: Khaled Soliman Alghathbar, Alaaeldin M. Hafez, Hanan Ahmed Hossni Mahmoud Abd Alla
-
Publication number: 20110271118Abstract: Password generation and extraction is described. In one aspect, a user inputs multiple characters, including a user password, variable characters, and multiple terminator characters. Locations of the terminator characters are identified and used to extract the user password from the multiple characters input by the user.Type: ApplicationFiled: April 29, 2010Publication date: November 3, 2011Applicant: King Saud UniversityInventors: Hanan Ahmed Hossni Mahmoud Abd Alla, Khaled Soliman Alghathbar
-
Publication number: 20110246768Abstract: In one aspect, systems and methods to improve a cryptosystem include computer-implemented operations such as scanning a biometric attribute for comparison with stored biometric data, and generating a keystream based upon the stored biometric data if the scanned biometric attribute substantially matches the stored biometric data. The computer-implemented method may also include operations for encrypting object data, and encrypting final data based upon the keystream and the encrypted object data.Type: ApplicationFiled: April 6, 2010Publication date: October 6, 2011Applicant: King Saud UniversityInventors: Maqsood Mahmud, Muhammad Khurram Khan, Khaled Soliman Alghathbar