Patents by Inventor Muhammad Jawad Alam Wahla

Muhammad Jawad Alam Wahla has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11251975
    Abstract: Apparatus and method for distributed authentication in a data storage system using block chain technology. In some embodiments, a requested transaction is generated to perform a selected security operation upon a data processing device in a computer network. The requested transaction is validated and propagated to a plurality of nodes. The nodes use a consensus mechanism to quasi-randomly select a particular node to generate a new block listing the requested transaction. The new block is validated, propagated among the plurality of nodes, and added to a block chain data structure. A processing node processes the requested transaction from the block chain data structure to authorize the selected security operation. Credits may be debited and credited between requesting nodes and the processing node for each transaction. Different types of credits may be used for different types of security operations.
    Type: Grant
    Filed: September 27, 2017
    Date of Patent: February 15, 2022
    Inventors: Muhammad Jawad Alam Wahla, Nino Wicaksono, Meherzad Firoze Aga, Monty Aaron Forehand
  • Patent number: 11005663
    Abstract: Apparatus and method for managing data objects in a distributed data storage system, such as a cloud computing environment. In some embodiments, a data object is encrypted using a user encryption key to generate ciphertext. A first hash function is applied to the ciphertext and an audit encryption key to generate a first hash value. An audit value is formed by combining the ciphertext and the first hash value, and the audit value is locally encrypted and stored to non-volatile memory (NVM) of each of a plurality of storage nodes. An audit process is performed to confirm each of the encrypted replicas store identical copies of the ciphertext. This is carried out by decrypting the ciphertext and applying a second hash function to the ciphertext and the audit encryption key by each storage node to form a plurality of second hash values which are then compared by an audit processor.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: May 11, 2021
    Assignee: Seagate Technology LLC
    Inventors: Nino Wicaksono, Jeetandra Kella, Muhammad Jawad Alam Wahla
  • Patent number: 10824367
    Abstract: Apparatus and method for data security using adaptive selection of intrusion traps in relation to workload. In some embodiments, a data storage device has a non-volatile memory (NVM). A device controller circuit services data transfer commands received from a host device to transfer data between the host device and the NVM. A security controller circuit monitors the received data transfer commands and enacts a change in security policy to implement one or more intrusion traps associated with the NVM in response to the received data transfer commands. The intrusion traps constitute memory locations that are configured to normally store user data, but are not normally accessed during the servicing of the currently received data transfer commands.
    Type: Grant
    Filed: October 19, 2017
    Date of Patent: November 3, 2020
    Assignee: Seagate Technology LLC
    Inventors: Muhammad Jawad Alam Wahla, Monty Aaron Forehand
  • Publication number: 20200052901
    Abstract: Apparatus and method for managing data objects in a distributed data storage system, such as a cloud computing environment. In some embodiments, a data object is encrypted using a user encryption key to generate ciphertext. A first hash function is applied to the ciphertext and an audit encryption key to generate a first hash value. An audit value is formed by combining the ciphertext and the first hash value, and the audit value is locally encrypted and stored to non-volatile memory (NVM) of each of a plurality of storage nodes. An audit process is performed to confirm each of the encrypted replicas store identical copies of the ciphertext. This is carried out by decrypting the ciphertext and applying a second hash function to the ciphertext and the audit encryption key by each storage node to form a plurality of second hash values which are then compared by an audit processor.
    Type: Application
    Filed: August 13, 2018
    Publication date: February 13, 2020
    Inventors: Nino Wicaksono, Jeetandra Kella, Muhammad Jawad Alam Wahla
  • Publication number: 20190121571
    Abstract: Apparatus and method for data security using adaptive selection of intrusion traps in relation to workload. In some embodiments, a data storage device has a non-volatile memory (NVM). A device controller circuit services data transfer commands received from a host device to transfer data between the host device and the NVM. A security controller circuit monitors the received data transfer commands and enacts a change in security policy to implement one or more intrusion traps associated with the NVM in response to the received data transfer commands. The intrusion traps constitute memory locations that are configured to normally store user data, but are not normally accessed during the servicing of the currently received data transfer commands.
    Type: Application
    Filed: October 19, 2017
    Publication date: April 25, 2019
    Inventors: Muhammad Jawad Alam Wahla, Monty Aaron Forehand