Patents by Inventor Muhammad Khurram Khan

Muhammad Khurram Khan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11874752
    Abstract: A method of facilitating cyber inspection of connected and autonomous electrical vehicles using smart charging stations. Accordingly, the method comprises receiving an information associated with a connected and autonomous electrical vehicle (CAEV) connected to a smart charging station, identifying an operation comprising a scanning operation based on the information, generating a request for facilitating the scanning operation comprising a cyber security threats scan, a cyber-attacks scan, an antivirus scan, an antimalware, an anti-ransomware, and a security scan, transmitting the request to a service provider device of a service provider comprising a cyber security provider, receiving a scanning operation information from the service provider device, performing the scanning operation on ECUs of the CAEV for facilitating the cyber inspection of the CAEV using the scanning information, generating a status of the CAEV based on the performing, transmitting the status to a device, and storing the status.
    Type: Grant
    Filed: March 21, 2023
    Date of Patent: January 16, 2024
    Assignee: King Saud University
    Inventors: Muhammad Khurram Khan, Wazir Zada Khan
  • Patent number: 11762969
    Abstract: The present disclosure provides a method for facilitating biometric recognition. Further, the method includes receiving, using a communication device, a biometric data from a user device. Further, the biometric data includes an eyeball image data. Further, the eyeball image data includes a periocular region image and an iris image. Further, the method includes processing, using a processing device, the biometric data using a machine learning model. Further, the method includes determining, using the processing device, an iris feature based on the processing. Further, the method includes determining, using the processing device, a periocular feature based on the processing. Further, the method includes concatenating, using the processing device, the iris feature and the periocular feature. Further, the method includes generating, using the processing device, an enrolled image data based on the concatenating. Further, the method includes storing, using a storage device, the enrolled image data in a database.
    Type: Grant
    Filed: January 12, 2023
    Date of Patent: September 19, 2023
    Assignee: King Saud University
    Inventors: Muhammad Khurram Khan, Saiyed Umer, Ranjeet Kumar Rout, Alamgir Sardar
  • Patent number: 11501580
    Abstract: The present disclosure provides a method for facilitating implementing biometric recognition. Further, the method may include receiving two or more biometric images of one or more biometric identifiers of one or more individuals from one or more devices. Further, the two or more biometric images may be in two or more spectrums. Further, the method may include analyzing the two or more biometric images using one or more deep hashing network models. Further, the method may include extracting two or more discriminative deep hashing codes from the two or more biometric images based on the analyzing. Further, the method may include generating a biometric template based on the two or more discriminative deep hashing codes. Further, the method may include generating a biometric key for the one or more biometric identifiers using a fuzzy commitment scheme based on the biometric template. Further, the method may include storing the biometric key.
    Type: Grant
    Filed: March 30, 2022
    Date of Patent: November 15, 2022
    Assignee: King Saud University
    Inventors: Muhammad Khurram Khan, Tengfei Wu, Leng Lu
  • Patent number: 11271971
    Abstract: Disclosed herein is a device for facilitating managing cyber security health of a connected and autonomous vehicle (CAV). Accordingly, the device may include a communication interface configured for transmitting a request for updating an electronic control unit (ECU) to a connected and autonomous vehicle (CAV) manufacturer server and receiving a security update and a security patch for the ECU from the CAV manufacturer server. Further, the device may include a processing device communicatively coupled with the communication interface. Further, the processing device may be configured for applying the security update and the security patch to the ECU for updating the ECU, determining an update status for each ECU, and generating a cyber security health status report of the CAV. Further, the device may include a storage device communicatively coupled with the processing device. Further, the storage device may be configured for storing the cyber security health status report.
    Type: Grant
    Filed: March 19, 2021
    Date of Patent: March 8, 2022
    Assignee: KING SAUD UNIVERSITY
    Inventors: Muhammad Khurram Khan, Wazir Zada Khan
  • Patent number: 9825761
    Abstract: In one aspect, systems and methods to improve a cryptosystem include computer-implemented operations such as scanning a biometric attribute for comparison with stored biometric data, and generating a keystream based upon the stored biometric data if the scanned biometric attribute substantially matches the stored biometric data. The computer-implemented method may also include operations for encrypting object data, and encrypting final data based upon the keystream and the encrypted object data.
    Type: Grant
    Filed: April 6, 2010
    Date of Patent: November 21, 2017
    Assignee: King Saud University
    Inventors: Maqsood Mahmud, Muhammad Khurram Khan, Khaled Soliman Alghathbar
  • Patent number: 9355303
    Abstract: Face recognition using multilayered discriminant analysis includes systems and methods applying an initial linear discriminate analysis to a database of face images in a more-or less conventional manner. Initial fuzzy logic then is applied to the results of the initial linear discriminate analysis to produce a subset of the database of face images. Thereafter, a subsequent linear discriminate analysis is applied to the subset of the database of face images and subsequent fuzzy logic is applied to the results of the subsequent linear discriminate analysis to produce a further subset of the subset of the database of face images. The application of the subsequent linear discriminate analysis and application of the subsequent fuzzy logic may be repeated until the further subset contains only one, or zero, face images.
    Type: Grant
    Filed: December 4, 2011
    Date of Patent: May 31, 2016
    Assignee: King Saud University
    Inventors: Muhammad Imran Razzak, Khaled Soliman Alghathbar, Muhammad Khurram Khan
  • Patent number: 8931688
    Abstract: A system and method for currency validation of a bank note with a radio frequency identification device therein utilizes a computer, server and communication link and a smartphone including an RFID reader, transmitter/receiver and an internet connection. A bank note is issued with a value, a serial number and a secret seed message that is also saved on the issuer's server. A tamper proof RFID mu-chip is embedded in the currency note and includes the value, serial number, plus the secret message for making a calculation. The smartphone reads the information on the chip and requests an issuer/authenticator to validate the note. The issuer/authenticator transmits a challenge and the mu-chip calculates an answer that is sent to the issuer/authenticator. An approval or disapproval is then sent to the smartphone.
    Type: Grant
    Filed: September 12, 2012
    Date of Patent: January 13, 2015
    Assignee: King Saud University
    Inventors: Mohamed Hamdy Khalil Eldefrawy, Muhammad Khurram Khan
  • Patent number: 8862888
    Abstract: In one aspect, systems and methods for three-factor authentication include receiving a user's identification and password transmitted from the user's mobile device, generating a One Time Password (OTP), encrypting the OTP, and encoding the encrypted OTP in a two-dimensional barcode. The two-dimensional barcode of the encrypted OTP is transmitted to a computing device of the user, and an image of the two-dimensional barcode of the encrypted OTP displayed on the user's computing device is captured using the user's mobile device. The two-dimensional barcode of the encrypted OTP is decoded using the user's mobile device to obtain the encrypted OTP. The encrypted OTP is decrypted using the user's mobile device and displayed. The OTP then is spoken by the user, and the user's voice and the OTP are recognized to authenticate the user.
    Type: Grant
    Filed: January 11, 2012
    Date of Patent: October 14, 2014
    Assignee: King Saud University
    Inventors: Ahmed Saleh Mohamed Tolba, Muhammad Khurram Khan, Khaled Soliman Alghathbar
  • Patent number: 8683564
    Abstract: Systems and methods for One-Time Password (OTP) authentication with infinite nested hash chains are described. In one aspect, a methodology includes a client device that provides a one-time password (OTP) authentication server with certain registration information. The client device generates, via the OTP authentication server, an authenticated OTP with infinite nested hash chains, These generating operations use a first hash function (hA (?)) for updating a seed chain, a second hash function (hB (•)) for OTP production, an OTP seed number stOTP for a tth authentication, and two authentication seeds of numbers s2t?1Auth and s2tAuth, for the tth authentication.
    Type: Grant
    Filed: November 17, 2010
    Date of Patent: March 25, 2014
    Assignee: King Saud University
    Inventors: Muhammad Khurram Khan, Mohamed Hamdy Khalil Eldefrawy, Khaled Soliman Alghathbar
  • Publication number: 20140069997
    Abstract: A system and method for currency validation of a bank note with a radio frequency identification device therein utilizes a computer, server and communication link and a smartphone including an RFID reader, transmitter/receiver and an internet connection. A bank note is issued with a value, a serial number and a secret seed message that is also saved on the issuer's server. A tamper proof RFID mu-chip is embedded in the currency note and includes the value, serial number, plus the secret message for making a calculation. The smartphone reads the information on the chip and requests an issuer/authenticator to validate the note. The issuer/authenticator transmits a challenge and the mu-chip calculates an answer that is sent to the issuer/authenticator. An approval or disapproval is then sent to the smartphone.
    Type: Application
    Filed: September 12, 2012
    Publication date: March 13, 2014
    Applicant: KING SAUD UNIVERSITY
    Inventors: Mohamed Hamdy Khalil Eldefrawy, Muhammad Khurram Khan
  • Patent number: 8660322
    Abstract: The passive continuous authentication method uses biometric feedback to perform the authentication processes. Computer software and sensors are provided to acquire, memorize, and authenticate both the user's hard (facial) and soft (clothing) biometric information. A registration phase compels the user to register his/her face image into a registration database. Subsequently, the system permits the user to login the system based on facial recognition of the image presented by an attached webcam of the system. During a computing session the system repetitively authenticates the user's identity by comparing the user's acquired face image (hard biometric) to the registered face image in the database. A clothes color histogram (soft biometric) is also computed. The hard biometric recognition mainly decides the authentication result. Otherwise, clothes color histogram matching takes place to decide the result. When the user leaves the terminal the screen locks up.
    Type: Grant
    Filed: August 25, 2011
    Date of Patent: February 25, 2014
    Assignee: King Saud University
    Inventors: Pei-Wei Tsai, Muhammad Khurram Khan
  • Publication number: 20130191899
    Abstract: Systems and methods for One-Time Password (OTP) authentication with infinite nested hash chains are described. In one aspect, a methodology includes a client device that provides a one-time password (OTP) authentication server with certain registration information. The client device generates, via the OTP authentication server, an authenticated OTP with infinite nested hash chains, These generating operations use a first hash function (hA (?)) for updating a seed chain, a second hash function (hB (•)) for OTP production, an OTP seed number stOTP for a tth authentication, and two authentication seeds of numbers s2t?1Auth and s2tAuth, for the tth authentication.
    Type: Application
    Filed: November 17, 2010
    Publication date: July 25, 2013
    Applicant: KING SAUD UNIVERSITY
    Inventors: Mohamed Hamdy Khalil Eldefrawy, Khaled Soliman Alghathbar, Muhammad Khurram Khan
  • Publication number: 20130179692
    Abstract: In one aspect, systems and methods for three-factor authentication include receiving a user's identification and password transmitted from the user's mobile device, generating a One Time Password (OTP), encrypting the OTP, and encoding the encrypted OTP in a two-dimensional barcode. The two-dimensional barcode of the encrypted OTP is transmitted to a computing device of the user, and an image of the two-dimensional barcode of the encrypted OTP displayed on the user's computing device is captured using the user's mobile device. The two-dimensional barcode of the encrypted OTP is decoded using the user's mobile device to obtain the encrypted OTP. The encrypted OTP is decrypted using the user's mobile device and displayed. The OTP then is spoken by the user, and the user's voice and the OTP are recognized to authenticate the user.
    Type: Application
    Filed: January 11, 2012
    Publication date: July 11, 2013
    Applicant: King Saud University
    Inventors: Ahmed Saleh Mohamed Tolba, Muhammad Khurram Khan, Khaled Soliman Alghathbar
  • Publication number: 20130142399
    Abstract: Face recognition using multilayered discriminant analysis includes systems and methods applying an initial linear discriminate analysis to a database of face images in a more-or less conventional manner. Initial fuzzy logic then is applied to the results of the initial linear discriminate analysis to produce a subset of the database of face images. Thereafter, a subsequent linear discriminate analysis is applied to the subset of the database of face images and subsequent fuzzy logic is applied to the results of the subsequent linear discriminate analysis to produce a further subset of the subset of the database of face images. The application of the subsequent linear discriminate analysis and application of the subsequent fuzzy logic may be repeated until the further subset contains only one, or zero, face images.
    Type: Application
    Filed: December 4, 2011
    Publication date: June 6, 2013
    Applicant: King Saud University
    Inventors: Muhammad Imran Razzak, Khaled Soliman Alghathbar, Muhammad Khurram Khan
  • Publication number: 20130051632
    Abstract: The passive continuous authentication method uses biometric feedback to perform the authentication processes. Computer software and sensors are provided to acquire, memorize, and authenticate both the user's hard (facial) and soft (clothing) biometric information. A registration phase compels the user to register his/her face image into a registration database. Subsequently, the system permits the user to login the system based on facial recognition of the image presented by an attached webcam of the system. During a computing session the system repetitively authenticates the user's identity by comparing the user's acquired face image (hard biometric) to the registered face image in the database. A clothes color histogram (soft biometric) is also computed. The hard biometric recognition mainly decides the authentication result. Otherwise, clothes color histogram matching takes place to decide the result. When the user leaves the terminal the screen locks up.
    Type: Application
    Filed: August 25, 2011
    Publication date: February 28, 2013
    Applicant: KING SAUD UNIVERSITY
    Inventors: PEI-WEI TSAI, MUHAMMAD KHURRAM KHAN
  • Publication number: 20110246768
    Abstract: In one aspect, systems and methods to improve a cryptosystem include computer-implemented operations such as scanning a biometric attribute for comparison with stored biometric data, and generating a keystream based upon the stored biometric data if the scanned biometric attribute substantially matches the stored biometric data. The computer-implemented method may also include operations for encrypting object data, and encrypting final data based upon the keystream and the encrypted object data.
    Type: Application
    Filed: April 6, 2010
    Publication date: October 6, 2011
    Applicant: King Saud University
    Inventors: Maqsood Mahmud, Muhammad Khurram Khan, Khaled Soliman Alghathbar