Patents by Inventor Cheman Shaik

Cheman Shaik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10928932
    Abstract: A computer mouse is provided which includes a housing; a lateral vertical wheel attached to the housing and configured to rotate with respect to the housing and in a first plane to control lateral vertical planar rotation of a visual object on a computer screen; a horizontal turn wheel attached to the housing and configured to rotate with respect to the housing and in a second plane which is perpendicular to the first plane to control horizontal planar rotation of the visual object on the computer screen; and a straight vertical turn wheel attached to the housing and configured to rotate with respect to the housing and in a third plane which is perpendicular to the first plane and the second plane to control rotation of the visual object on the computer screen in a direction which appears on the computer screen to be substantially perpendicular to vertical and horizontal directions.
    Type: Grant
    Filed: November 22, 2019
    Date of Patent: February 23, 2021
    Inventor: Cheman Shaik
  • Patent number: 10880331
    Abstract: A counter challenge authentication system and method is provided for authentication of online users of web applications. The authentication method involves a counter challenge from a user to a web application asking to provide certain information from one or more user details recorded at the time of registration. The user enters his password and logs into the web application only in case he receives the correct answer from the web application. This advanced authentication method protects online application users from phishing attacks. An incorrect answer to the user's challenge or inability of the web application to provide an answer to the challenge is a clear indication of a phishing attack, thereby alerting the user and stopping him from submitting his sensitive password information to phishers. The authentication method is computer independent and eliminates dependency on two-factor authentication, hardware tokens, client software installations, digital certificates, and user defined seals.
    Type: Grant
    Filed: November 15, 2019
    Date of Patent: December 29, 2020
    Inventor: Cheman Shaik
  • Publication number: 20200089339
    Abstract: A computer mouse is provided which includes a housing; a lateral vertical wheel attached to the housing and configured to rotate with respect to the housing and in a first plane to control lateral vertical planar rotation of a visual object on a computer screen; a horizontal turn wheel attached to the housing and configured to rotate with respect to the housing and in a second plane which is perpendicular to the first plane to control horizontal planar rotation of the visual object on the computer screen; and a straight vertical turn wheel attached to the housing and configured to rotate with respect to the housing and in a third plane which is perpendicular to the first plane and the second plane to control rotation of the visual object on the computer screen in a direction which appears on the computer screen to be substantially perpendicular to vertical and horizontal directions.
    Type: Application
    Filed: November 22, 2019
    Publication date: March 19, 2020
    Inventor: CHEMAN SHAIK
  • Publication number: 20200084237
    Abstract: A counter challenge authentication system and method is provided for authentication of online users of web applications. The authentication method involves a counter challenge from a user to a web application asking to provide certain information from one or more user details recorded at the time of registration. The user enters his password and logs into the web application only in case he receives the correct answer from the web application. This advanced authentication method protects online application users from phishing attacks. An incorrect answer to the user's challenge or inability of the web application to provide an answer to the challenge is a clear indication of a phishing attack, thereby alerting the user and stopping him from submitting his sensitive password information to phishers. The authentication method is computer independent and eliminates dependency on two-factor authentication, hardware tokens, client software installations, digital certificates, and user defined seals.
    Type: Application
    Filed: November 15, 2019
    Publication date: March 12, 2020
    Inventor: CHEMAN SHAIK
  • Patent number: 8831214
    Abstract: A public key cryptographic system and method is provided for a password or any other predefined personal secret information that defeats key factoring and spoofing attacks. The method adopts a new technique of encrypting a password or any predefined secret information by a numeric function of itself, replacing the fixed public key of the conventional RSA encryption. The whole process involving key generation, encryption, decryption and password handling is discussed in detail. Mathematical and cryptanalytical proofs of defeating factoring and spoofing attacks are furnished.
    Type: Grant
    Filed: March 12, 2009
    Date of Patent: September 9, 2014
    Inventor: Cheman Shaik
  • Patent number: 8023647
    Abstract: A public key cryptographic system and method is provided for a password or any other predefined personal secret information that defeats key factoring and spoofing attacks. The method adopts a new technique of encrypting a password or any predefined secret information by a numeric function of itself, replacing the fixed public key of the conventional RSA encryption. The whole process involving key generation, encryption, decryption and password handling is discussed in detail. Mathematical and cryptanalytical proofs of defeating factoring and spoofing attacks are furnished.
    Type: Grant
    Filed: March 12, 2009
    Date of Patent: September 20, 2011
    Inventor: Cheman Shaik
  • Patent number: 7770122
    Abstract: A method is provided which includes transmitting a template web page from a server computer to a user computer via the internet. The template web page may be received at the user computer. The template web page may be stored in a temporary computer memory of the user computer. The method may further include causing the template web page to be displayed on a computer monitor of the user computer by use of the user computer. The template web page may include a plurality of control buttons, a plurality of visible boxes and a plurality of hidden boxes. The method may further include modifying the template web page in response to activation of one or more control buttons to form a modified template web page. The template web page allows a user to further add more visible items such as boxes, lines and images. Data concerning the modified template web page may be transmitted to the server computer, and stored in a database of the server computer as text.
    Type: Grant
    Filed: April 29, 2010
    Date of Patent: August 3, 2010
    Inventor: Cheman Shaik
  • Patent number: 7721222
    Abstract: A non-English text generation system and method is presented by which text can be generated in any language without a keyboard. Initially, only a few base characters or radicals of a language are displayed. A desired character or derivative symbol is reached by lookup through successive menus. When a desired character or symbol is reached, it can be displayed on a computer monitor using a computer mouse or a similar interactive device. This system and method can be applied to any non-English language such as Chinese, Japanese, Korean, Indian, That, Lao, etc. The system and method has significant utility in internet searching, authentication, email, chat, wireless messaging, document preparation, online advertisement creation, form filling in e-commerce etc, in non-English languages.
    Type: Grant
    Filed: June 10, 2009
    Date of Patent: May 18, 2010
    Inventor: Cheman Shaik
  • Publication number: 20090300362
    Abstract: A public key cryptographic system and method is provided for a password or any other predefined personal secret information that defeats key factoring and spoofing attacks. The method adopts a new technique of encrypting a password or any predefined secret information by a numeric function of itself, replacing the fixed public key of the conventional RSA encryption. The whole process involving key generation, encryption, decryption and password handling is discussed in detail. Mathematical and cryptanalytical proofs of defeating factoring and spoofing attacks are furnished.
    Type: Application
    Filed: March 12, 2009
    Publication date: December 3, 2009
    Inventor: Cheman Shaik
  • Publication number: 20090296927
    Abstract: A public key cryptographic system and method is provided for a password or any other predefined personal secret information that defeats key factoring and spoofing attacks. The method adopts a new technique of encrypting a password or any predefined secret information by a numeric function of itself, replacing the fixed public key of the conventional RSA encryption. The whole process involving key generation, encryption, decryption and password handling is discussed in detail. Mathematical and cryptanalytical proofs of defeating factoring and spoofing attacks are furnished.
    Type: Application
    Filed: March 12, 2009
    Publication date: December 3, 2009
    Inventor: Cheman Shaik
  • Patent number: 7522723
    Abstract: A public key cryptographic system and method is provided for a password or any other predefined personal secret information that defeats key factoring and spoofing attacks. The method adopts a new technique of encrypting a password or any predefined secret information by a numeric function of itself, replacing the fixed public key of the conventional RSA encryption. The whole process involving key generation, encryption, decryption and password handling is discussed in detail. Mathematical and cryptanalytical proofs of defeating factoring and spoofing attacks are furnished.
    Type: Grant
    Filed: July 10, 2008
    Date of Patent: April 21, 2009
    Inventor: Cheman Shaik
  • Patent number: 7088821
    Abstract: The present invention presents a public key cryptographic system and method called Absolute Public Key Cryptography that survives private key compromise and offers two-way communication security. Communications are secured even when the private key is revealed. It provides security to the private-to-public side communications and also allows short keys to be used with mobile devices that have low processing power. The system uses keys with two or more components and encrypts a message into the same number of cipher versions. The cipher versions are delivered to the destination in source routing mode, or hop-by-hop routing mode with a small time gap. The recipient performs certain mathematical operations on all the cipher versions and obtains the original message. All the versions are necessary for obtaining the original message. Even a single version missing leads to produce a junk for an attacker.
    Type: Grant
    Filed: May 3, 2001
    Date of Patent: August 8, 2006
    Inventor: Cheman Shaik
  • Publication number: 20020186848
    Abstract: The present invention presents a public key cryptographic system and method called Absolute Public Key Cryptography that survives private key compromise and offers two-way communication security. Communications are secured even when the private key is revealed. It provides security to the private-to-public side communications and also allows short keys to be used with mobile devices that have low processing power. The system uses keys with two or more components and encrypts a message into the same number of cipher versions. The cipher versions are delivered to the destination in source routing mode, or hop-by-hop routing mode with a small time gap. The recipient performs certain mathematical operations on all the cipher versions and obtains the original message. All the versions are necessary for obtaining the original message. Even a single version missing leads to produce a junk for an attacker.
    Type: Application
    Filed: May 3, 2001
    Publication date: December 12, 2002
    Inventor: Cheman Shaik