Patents by Inventor Usman Amir Din

Usman Amir Din has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11677758
    Abstract: Techniques for minimizing data flow from a first computing infrastructure hosting an email service platform to a second computing infrastructure at least partly hosting an email security platform that provides security analysis on emails of the email service. The email security platform may extract metadata from emails received at the first computing infrastructure, and send that metadata to the second computing infrastructure that is hosting a back end of the email service platform. The metadata extracted from the emails may include less confidential contained in an email, but enough information for the email security platform to determine whether an email is potentially malicious. Thus, the security analysis performed on emails to detect malicious attacks may be offloaded to the second computing infrastructure, but the metadata that leaves the first computing infrastructure and flows to the second computing infrastructure may be minimized by extracting meaningful metadata.
    Type: Grant
    Filed: May 5, 2020
    Date of Patent: June 13, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Jason Peter Rasmussen, Adam Joseph O'Donnell, Usman Amir Din
  • Publication number: 20210281586
    Abstract: Techniques for minimizing data flow from a first computing infrastructure hosting an email service platform to a second computing infrastructure at least partly hosting an email security platform that provides security analysis on emails of the email service. The email security platform may extract metadata from emails received at the first computing infrastructure, and send that metadata to the second computing infrastructure that is hosting a back end of the email service platform. The metadata extracted from the emails may include less confidential contained in an email, but enough information for the email security platform to determine whether an email is potentially malicious. Thus, the security analysis performed on emails to detect malicious attacks may be offloaded to the second computing infrastructure, but the metadata that leaves the first computing infrastructure and flows to the second computing infrastructure may be minimized by extracting meaningful metadata.
    Type: Application
    Filed: May 5, 2020
    Publication date: September 9, 2021
    Inventors: Jason Peter Rasmussen, Adam Joseph O'Donnell, Usman Amir Din