Patents by Inventor Mohamed Khalid

Mohamed Khalid has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210256519
    Abstract: A computer system for single and consolidated real-time processing of event data relating to VAT tax refunds requests. The system communicates with multiple retailer systems and multiple user devices in connection with the processing of that event data in accordance with an adaptive processing rules schema. The system includes a distributed system interface that receives the event data from the plurality of distributed retailer networks in the form of event data transactions. The system is operated in accordance with a rules schema database that contains tax models applicable to various event data transactions. An event data processor receives the event data transactions and applies the tax models in the rules schema database and is then operable through a payment gateway processor to direct electronic transactions to occur in responding to the processing of the event data based at least in part on rules stored in the rules schema database in communication with the event data processor.
    Type: Application
    Filed: February 12, 2021
    Publication date: August 19, 2021
    Inventor: Shaikh Abdulla Mohamed Khalid Ahmed Al Qasimi
  • Patent number: 9544282
    Abstract: In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and provided first keying information; sending, to a key server computer, an update message that comprises both the first network address and the second network address; using the first keying information to encrypt messages that the computer node sends from the second network address to one or more other members of a group.
    Type: Grant
    Filed: December 29, 2015
    Date of Patent: January 10, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Aamer S. Akhter, Rajiv Asati, Brian Weis, Mohamed Khalid
  • Patent number: 9444789
    Abstract: An example method includes receiving a request for a cloud capability set during an Internet Key Exchange negotiation associated with a virtual private network (VPN) tunnel between a subscriber and a cloud, wherein the cloud capability set comprises one or more cloud capabilities, mapping the request to one or more cryptographic modules that can support the cloud capability set, and offloading the VPN tunnel to the one or more cryptographic modules. The request can be an Internet Security Association and Key Management Protocol (ISAKMP) packet listing the one or more cloud capabilities in a private payload. The method may further include splitting the VPN tunnel between the cryptographic modules if no single cryptographic module can support substantially all the cloud capabilities in the cloud capability set. In some embodiments, the request is compared with a service catalog comprising authorized cloud capabilities.
    Type: Grant
    Filed: August 27, 2014
    Date of Patent: September 13, 2016
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Sunil Cherukuri, Mohamed Khalid, Brian Cinque
  • Publication number: 20160134606
    Abstract: In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and provided first keying information; sending, to a key server computer, an update message that comprises both the first network address and the second network address; using the first keying information to encrypt messages that the computer node sends from the second network address to one or more other members of a group.
    Type: Application
    Filed: December 29, 2015
    Publication date: May 12, 2016
    Inventors: AAMER S. AKHTER, RAJIV ASATI, BRIAN WEIS, MOHAMED KHALID
  • Patent number: 9281951
    Abstract: Systems, methods, and other embodiments associated with any-to-any multicasting in a tunnel based virtual private network (VPN) are described. One example method includes calculating a resolved address for an unknown reverse path forwarding (RPF) neighbor in an any-to-any multicasting route. The resolved address is calculated using next hop resolution protocol (NHRP) resolution. The address is to be resolved based on control plane traffic. The NHRP address resolution is not to affect unicast routing. The example method may also include establishing the any-to-any multicasting route. Since the multicasting route is any-to-any (e.g., spoke-to-spoke), the multicasting route is not required to include a hub in the logical hub-and-spoke network.
    Type: Grant
    Filed: December 3, 2008
    Date of Patent: March 8, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Rajiv Asati, Mohamed Khalid, Manikchand R. Bafna
  • Patent number: 9253172
    Abstract: In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and provided first keying information; sending, to a key server computer, an update message that comprises both the first network address and the second network address; using the first keying information to encrypt messages that the computer node sends from the second network address to one or more other members of a group.
    Type: Grant
    Filed: April 8, 2015
    Date of Patent: February 2, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Aamer S. Akhter, Rajiv Asati, Brian Weis, Mohamed Khalid
  • Patent number: 9210223
    Abstract: In one embodiment, a first network device receives a priority message from a second network device, wherein the priority message conforms to a connection establishment protocol and indicates a priority associated with the second network device. The first network device obtains the priority from the priority message and stores the priority. The first network device allocates resources for at least one of control or data plane processing to the second network device in accordance with the priority.
    Type: Grant
    Filed: August 23, 2014
    Date of Patent: December 8, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Mohamed Khalid, Sunil Cherukuri, Haseeb Sarwar Niazi, Muhammad Afaq Khan
  • Patent number: 9185033
    Abstract: In an example embodiment, a method for selecting a communication path is provided. The method may comprise receiving data encapsulated in a transport protocol. In addition, a classification type and exit path information associated with the classification type may be received. The data is associated with the classification type and then is encapsulated in Stream Control Transmission Protocol (SCTP) based on the exit path information. This exit path information is associated with the classification type that is associated with the data.
    Type: Grant
    Filed: July 18, 2014
    Date of Patent: November 10, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Mohamed Khalid, Aamer Saeed Akhter, Kenneth Alan Durazzo
  • Patent number: 9112816
    Abstract: In one example, an Edge Quadrature Amplitude Modulation (EQAM) communicates EQAM information to a Modular Cable Modem Termination System (M-CMTS) core using a routing protocol that is configured on a packet switched network coupling the EQAM to the M-CMTS core. The EQAM generates a routing message according to the routing protocol and inserts EQAM information, such as a description of a modulated channel extending from the EQAM, the service-group information, etc., into the routing message. The EQAM then floods the EQAM information over at least portions of a routing domain by transmitting the routing message to an adjacent intermediary device.
    Type: Grant
    Filed: May 22, 2013
    Date of Patent: August 18, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Rajiv Asati, John Chapman, Mohamed Khalid
  • Publication number: 20150215298
    Abstract: In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and provided first keying information; sending, to a key server computer, an update message that comprises both the first network address and the second network address; using the first keying information to encrypt messages that the computer node sends from the second network address to one or more other members of a group.
    Type: Application
    Filed: April 8, 2015
    Publication date: July 30, 2015
    Inventors: AAMER S. AKHTER, RAJIV ASATI, BRIAN WEIS, MOHAMED KHALID
  • Patent number: 9027114
    Abstract: In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and provided first keying information; sending, to a key server computer, an update message that comprises both the first network address and the second network address; using the first keying information to encrypt messages that the computer node sends from the second network address to one or more other members of a group.
    Type: Grant
    Filed: March 12, 2013
    Date of Patent: May 5, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Aamer S. Akhter, Rajiv Asati, Brian Weis, Mohamed Khalid
  • Publication number: 20140372761
    Abstract: An example method includes receiving a request for a cloud capability set during an Internet Key Exchange negotiation associated with a virtual private network (VPN) tunnel between a subscriber and a cloud, wherein the cloud capability set comprises one or more cloud capabilities, mapping the request to one or more cryptographic modules that can support the cloud capability set, and offloading the VPN tunnel to the one or more cryptographic modules. The request can be an Internet Security Association and Key Management Protocol (ISAKMP) packet listing the one or more cloud capabilities in a private payload. The method may further include splitting the VPN tunnel between the cryptographic modules if no single cryptographic module can support substantially all the cloud capabilities in the cloud capability set. In some embodiments, the request is compared with a service catalog comprising authorized cloud capabilities.
    Type: Application
    Filed: August 27, 2014
    Publication date: December 18, 2014
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Sunil Cherukuri, Mohamed Khalid, Brian Cinque
  • Publication number: 20140365672
    Abstract: In one embodiment, a first network device receives a priority message from a second network device, wherein the priority message conforms to a connection establishment protocol and indicates a priority associated with the second network device. The first network device obtains the priority from the priority message and stores the priority. The first network device allocates resources for at least one of control or data plane processing to the second network device in accordance with the priority.
    Type: Application
    Filed: August 23, 2014
    Publication date: December 11, 2014
    Inventors: Mohamed KHALID, Sunil CHERUKURI, Haseeb Sarwar NIAZI, Muhammad Afaq Khan
  • Publication number: 20140328341
    Abstract: In an example embodiment, a method for selecting a communication path is provided. The method may comprise receiving data encapsulated in a transport protocol. In addition, a classification type and exit path information associated with the classification type may be received. The data is associated with the classification type and then is encapsulated in Stream Control Transmission Protocol (SCTP) based on the exit path information. This exit path information is associated with the classification type that is associated with the data.
    Type: Application
    Filed: July 18, 2014
    Publication date: November 6, 2014
    Inventors: Mohamed Khalid, Aamer Saeed Akhter, Kenneth Alan Durazzo
  • Patent number: 8862095
    Abstract: In an embodiment, a care-of address associated with a first node coupled to a communications network via an access node is received. The care-of address may be contained in a notification message sent by a home agent associated with the first node or by a binding update message sent by the first agent. The access node is identified using the care-of address. A request to tap communications associated with the first node at the access node is generated and the request is forwarded to the access node to cause communications associated with the first node to be tapped at the access node.
    Type: Grant
    Filed: June 19, 2007
    Date of Patent: October 14, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Ciprian P. Popoviciu, Mohamed Khalid, John M. Gavin, William J. Wei
  • Patent number: 8862883
    Abstract: An example method includes receiving a request for a cloud capability set during an Internet Key Exchange negotiation associated with a virtual private network (VPN) tunnel between a subscriber and a cloud, wherein the cloud capability set comprises one or more cloud capabilities, mapping the request to one or more cryptographic modules that can support the cloud capability set, and offloading the VPN tunnel to the one or more cryptographic modules. The request can be an Internet Security Association and Key Management Protocol (ISAKMP) packet listing the one or more cloud capabilities in a private payload. The method may further include splitting the VPN tunnel between the cryptographic modules if no single cryptographic module can support substantially all the cloud capabilities in the cloud capability set. In some embodiments, the request is compared with a service catalog comprising authorized cloud capabilities.
    Type: Grant
    Filed: May 16, 2012
    Date of Patent: October 14, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Sunil Cherukuri, Mohamed Khalid, Brian Cinque
  • Patent number: 8850521
    Abstract: In one embodiment, a first network device receives a priority message from a second network device, wherein the priority message conforms to a connection establishment protocol and indicates a priority associated with the second network device. The first network device obtains the priority from the priority message and stores the priority. The first network device allocates resources for at least one of control or data plane processing to the second network device in accordance with the priority.
    Type: Grant
    Filed: August 4, 2009
    Date of Patent: September 30, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Mohamed Khalid, Sunil Cherukuri, Haseeb Sarwar Niazi, Muhammad Afaq Khan
  • Publication number: 20140281508
    Abstract: In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and provided first keying information; sending, to a key server computer, an update message that comprises both the first network address and the second network address; using the first keying information to encrypt messages that the computer node sends from the second network address to one or more other members of a group.
    Type: Application
    Filed: March 12, 2013
    Publication date: September 18, 2014
    Applicant: Cisco Technology, Inc.
    Inventors: AAMER S. AKHTER, RAJIV ASATI, BRIAN WEIS, MOHAMED KHALID
  • Patent number: 8812726
    Abstract: Apparatus, methods and computer programs enable carrying service insertion architecture data plane packets in IPv4 or IPv6 networks by packaging destination addresses using IPv6 mechanisms. For example, a data processing apparatus is configured for receiving, from a service broker, a service label and an Internet Protocol version 6 (IPv6) address of a first service node; receiving an IPv4 packet requesting a service associated with the first service node; creating an IPv6 packet comprising a service label in a Flow Label field of the IPv6 packet, the IPv6 address of the first service node in a destination address field of the IPv6 packet, and the IPv4 packet in a payload field of the IPv6 packet; forwarding the IPv6 packet to the first service node. Approaches allow service insertion architecture support for all-IPv6 traffic including tunneled and non-tunneled techniques for environments in which user applications place data in the flow label field.
    Type: Grant
    Filed: September 9, 2008
    Date of Patent: August 19, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Mohamed Khalid, Ciprian Popoviciu, Patrick Grossetete, Kenneth Durazzo
  • Patent number: 8792487
    Abstract: In an example embodiment, a method for selecting a communication path is provided. The method may comprise receiving data encapsulated in a transport protocol. In addition, a classification type and exit path information associated with the classification type may be received. The data is associated with the classification type and then is encapsulated in Stream Control Transmission Protocol (SCTP) based on the exit path information. This exit path information is associated with the classification type that is associated with the data.
    Type: Grant
    Filed: August 21, 2007
    Date of Patent: July 29, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Mohamed Khalid, Aamer Saeed Akhter, Kenneth Alan Durazzo