Patents by Inventor Asadullah ANSARI

Asadullah ANSARI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11961310
    Abstract: Examples are provided for traffic sign detection systems. In one example, a traffic detection system in a vehicle includes an image sensor, a communication system, a processor, and a storage device storing instructions executable by the processor to capture an image of an environment of the vehicle via the image sensor, process the image to detect visual information regarding a traffic sign in the image, the visual information indicating a recognized sign, receive cryptographic data via the communication system from a transmitter associated with the traffic sign, the cryptographic data including a cryptographic representation of a traffic sign signal for controlling the traffic sign, and selectively control one or more vehicle systems of the vehicle based on a cryptographic verification of the recognized sign using the cryptographic data.
    Type: Grant
    Filed: April 24, 2019
    Date of Patent: April 16, 2024
    Assignee: HARMAN INTERNATIONAL INDUSTRIES, INCORPORATED
    Inventors: Asadullah Ansari, Sharath Yadav Doddamane Hemantharaja, Jipin Jose
  • Patent number: 11892872
    Abstract: Techniques are disclosed for the protection and accuracy of system time used in systems, such as automotive systems, from attacks. In some embodiments, a cumulative trustworthiness score is determined for available time sources, other than a real time clock, by adding together trustworthiness scores associated with the available time sources after a system time is initialized to time of the real time clock during booting. The cumulative trustworthiness score is then used to determine an appropriate technique for updating the system time based on time from one of the available time sources, depending on whether the cumulative trustworthiness score is greater than a maximum threshold, between a minimum threshold and the maximum threshold, or less than the minimum threshold.
    Type: Grant
    Filed: February 9, 2021
    Date of Patent: February 6, 2024
    Assignee: Harman International Industries, Incorporated
    Inventors: Asadullah Ansari, Sharath Yadav Doddamane Hemantharaja
  • Publication number: 20230342456
    Abstract: A system and method to secure lane and traffic management AI models used in an advanced driver assistance system. (ADAS) or in an autonomous vehicle. Only lane and traffic management data recognized from a verifiable source is allowed for testing and training the AI model. All other data is blocked. Controllable parameters of the AI model are encrypted prior to deployment. After deployment, the controllable parameters are decrypted and only signature verified dynamic learning data is applied to the AI model for continuous learning.
    Type: Application
    Filed: September 21, 2020
    Publication date: October 26, 2023
    Applicant: Harman International Industries, Incorporated
    Inventors: Asadullah Ansari, Sharath Yadav Doddamane Hemantharaja, Shyju Thekkumbadan
  • Publication number: 20230327883
    Abstract: A bootloader authentication system with a multimedia device to mount within a vehicle, a memory device, and a processor. The memory device stores data indicative of a public key associated with the vehicle and a signed hash bootloader image indicative of a signature of a private key.
    Type: Application
    Filed: September 10, 2020
    Publication date: October 12, 2023
    Applicant: HARMAN INTERNATIONAL INDUSTRIES, INCORPORATED
    Inventors: Asadullah ANSARI, Vivek AGRAWAL, Naveen THENKANI
  • Publication number: 20230267834
    Abstract: Examples are provided for traffic pole verification systems.
    Type: Application
    Filed: July 10, 2020
    Publication date: August 24, 2023
    Inventors: Asadullah Ansari, Sharath Hemantharaja
  • Publication number: 20230015693
    Abstract: Various embodiments include techniques for recovering a cryptographic key in a system that includes secure storage. A computer system implementing these techniques determines that the cryptographic key stored in a first secure storage is corrupted. The computer system retrieves an emergency key from a second secure storage. The computer system establishes communications with a server by using the emergency key.
    Type: Application
    Filed: July 8, 2022
    Publication date: January 19, 2023
    Inventors: Asadullah ANSARI, Sharath Yadav Doddamane HEMANTHARAJA
  • Publication number: 20220207885
    Abstract: Examples are provided for traffic sign detection systems. In one example, a traffic detection system in a vehicle includes an image sensor, a communication system, a processor, and a storage device storing instructions executable by the processor to capture an image of an environment of the vehicle via the image sensor, process the image to detect visual information regarding a traffic sign in the image, the visual information indicating a recognized sign, receive cryptographic data via the communication system from a transmitter associated with the traffic sign, the cryptographic data including a cryptographic representation of a traffic sign signal for controlling the traffic sign, and selectively control one or more vehicle systems of the vehicle based on a cryptographic verification of the recognized sign using the cryptographic data.
    Type: Application
    Filed: April 24, 2019
    Publication date: June 30, 2022
    Inventors: Asadullah Ansari, Sharath Yadav Doddamane Hemantharaja, Jipin Jose
  • Publication number: 20210247800
    Abstract: Techniques are disclosed for the protection and accuracy of system time used in systems, such as automotive systems, from attacks. In some embodiments, a cumulative trustworthiness score is determined for available time sources, other than a real time clock, by adding together trustworthiness scores associated with the available time sources after a system time is initialized to time of the real time clock during booting. The cumulative trustworthiness score is then used to determine an appropriate technique for updating the system time based on time from one of the available time sources, depending on whether the cumulative trustworthiness score is greater than a maximum threshold, between a minimum threshold and the maximum threshold, or less than the minimum threshold.
    Type: Application
    Filed: February 9, 2021
    Publication date: August 12, 2021
    Inventors: Asadullah ANSARI, Sharath Yadav Doddamane HEMANTHARAJA