Patents by Inventor Muhammad Khurram Khan
Muhammad Khurram Khan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11874752Abstract: A method of facilitating cyber inspection of connected and autonomous electrical vehicles using smart charging stations. Accordingly, the method comprises receiving an information associated with a connected and autonomous electrical vehicle (CAEV) connected to a smart charging station, identifying an operation comprising a scanning operation based on the information, generating a request for facilitating the scanning operation comprising a cyber security threats scan, a cyber-attacks scan, an antivirus scan, an antimalware, an anti-ransomware, and a security scan, transmitting the request to a service provider device of a service provider comprising a cyber security provider, receiving a scanning operation information from the service provider device, performing the scanning operation on ECUs of the CAEV for facilitating the cyber inspection of the CAEV using the scanning information, generating a status of the CAEV based on the performing, transmitting the status to a device, and storing the status.Type: GrantFiled: March 21, 2023Date of Patent: January 16, 2024Assignee: King Saud UniversityInventors: Muhammad Khurram Khan, Wazir Zada Khan
-
Patent number: 11762969Abstract: The present disclosure provides a method for facilitating biometric recognition. Further, the method includes receiving, using a communication device, a biometric data from a user device. Further, the biometric data includes an eyeball image data. Further, the eyeball image data includes a periocular region image and an iris image. Further, the method includes processing, using a processing device, the biometric data using a machine learning model. Further, the method includes determining, using the processing device, an iris feature based on the processing. Further, the method includes determining, using the processing device, a periocular feature based on the processing. Further, the method includes concatenating, using the processing device, the iris feature and the periocular feature. Further, the method includes generating, using the processing device, an enrolled image data based on the concatenating. Further, the method includes storing, using a storage device, the enrolled image data in a database.Type: GrantFiled: January 12, 2023Date of Patent: September 19, 2023Assignee: King Saud UniversityInventors: Muhammad Khurram Khan, Saiyed Umer, Ranjeet Kumar Rout, Alamgir Sardar
-
Patent number: 11501580Abstract: The present disclosure provides a method for facilitating implementing biometric recognition. Further, the method may include receiving two or more biometric images of one or more biometric identifiers of one or more individuals from one or more devices. Further, the two or more biometric images may be in two or more spectrums. Further, the method may include analyzing the two or more biometric images using one or more deep hashing network models. Further, the method may include extracting two or more discriminative deep hashing codes from the two or more biometric images based on the analyzing. Further, the method may include generating a biometric template based on the two or more discriminative deep hashing codes. Further, the method may include generating a biometric key for the one or more biometric identifiers using a fuzzy commitment scheme based on the biometric template. Further, the method may include storing the biometric key.Type: GrantFiled: March 30, 2022Date of Patent: November 15, 2022Assignee: King Saud UniversityInventors: Muhammad Khurram Khan, Tengfei Wu, Leng Lu
-
Patent number: 11271971Abstract: Disclosed herein is a device for facilitating managing cyber security health of a connected and autonomous vehicle (CAV). Accordingly, the device may include a communication interface configured for transmitting a request for updating an electronic control unit (ECU) to a connected and autonomous vehicle (CAV) manufacturer server and receiving a security update and a security patch for the ECU from the CAV manufacturer server. Further, the device may include a processing device communicatively coupled with the communication interface. Further, the processing device may be configured for applying the security update and the security patch to the ECU for updating the ECU, determining an update status for each ECU, and generating a cyber security health status report of the CAV. Further, the device may include a storage device communicatively coupled with the processing device. Further, the storage device may be configured for storing the cyber security health status report.Type: GrantFiled: March 19, 2021Date of Patent: March 8, 2022Assignee: KING SAUD UNIVERSITYInventors: Muhammad Khurram Khan, Wazir Zada Khan
-
Patent number: 9825761Abstract: In one aspect, systems and methods to improve a cryptosystem include computer-implemented operations such as scanning a biometric attribute for comparison with stored biometric data, and generating a keystream based upon the stored biometric data if the scanned biometric attribute substantially matches the stored biometric data. The computer-implemented method may also include operations for encrypting object data, and encrypting final data based upon the keystream and the encrypted object data.Type: GrantFiled: April 6, 2010Date of Patent: November 21, 2017Assignee: King Saud UniversityInventors: Maqsood Mahmud, Muhammad Khurram Khan, Khaled Soliman Alghathbar
-
Patent number: 9355303Abstract: Face recognition using multilayered discriminant analysis includes systems and methods applying an initial linear discriminate analysis to a database of face images in a more-or less conventional manner. Initial fuzzy logic then is applied to the results of the initial linear discriminate analysis to produce a subset of the database of face images. Thereafter, a subsequent linear discriminate analysis is applied to the subset of the database of face images and subsequent fuzzy logic is applied to the results of the subsequent linear discriminate analysis to produce a further subset of the subset of the database of face images. The application of the subsequent linear discriminate analysis and application of the subsequent fuzzy logic may be repeated until the further subset contains only one, or zero, face images.Type: GrantFiled: December 4, 2011Date of Patent: May 31, 2016Assignee: King Saud UniversityInventors: Muhammad Imran Razzak, Khaled Soliman Alghathbar, Muhammad Khurram Khan
-
Patent number: 8931688Abstract: A system and method for currency validation of a bank note with a radio frequency identification device therein utilizes a computer, server and communication link and a smartphone including an RFID reader, transmitter/receiver and an internet connection. A bank note is issued with a value, a serial number and a secret seed message that is also saved on the issuer's server. A tamper proof RFID mu-chip is embedded in the currency note and includes the value, serial number, plus the secret message for making a calculation. The smartphone reads the information on the chip and requests an issuer/authenticator to validate the note. The issuer/authenticator transmits a challenge and the mu-chip calculates an answer that is sent to the issuer/authenticator. An approval or disapproval is then sent to the smartphone.Type: GrantFiled: September 12, 2012Date of Patent: January 13, 2015Assignee: King Saud UniversityInventors: Mohamed Hamdy Khalil Eldefrawy, Muhammad Khurram Khan
-
Patent number: 8862888Abstract: In one aspect, systems and methods for three-factor authentication include receiving a user's identification and password transmitted from the user's mobile device, generating a One Time Password (OTP), encrypting the OTP, and encoding the encrypted OTP in a two-dimensional barcode. The two-dimensional barcode of the encrypted OTP is transmitted to a computing device of the user, and an image of the two-dimensional barcode of the encrypted OTP displayed on the user's computing device is captured using the user's mobile device. The two-dimensional barcode of the encrypted OTP is decoded using the user's mobile device to obtain the encrypted OTP. The encrypted OTP is decrypted using the user's mobile device and displayed. The OTP then is spoken by the user, and the user's voice and the OTP are recognized to authenticate the user.Type: GrantFiled: January 11, 2012Date of Patent: October 14, 2014Assignee: King Saud UniversityInventors: Ahmed Saleh Mohamed Tolba, Muhammad Khurram Khan, Khaled Soliman Alghathbar
-
Patent number: 8683564Abstract: Systems and methods for One-Time Password (OTP) authentication with infinite nested hash chains are described. In one aspect, a methodology includes a client device that provides a one-time password (OTP) authentication server with certain registration information. The client device generates, via the OTP authentication server, an authenticated OTP with infinite nested hash chains, These generating operations use a first hash function (hA (?)) for updating a seed chain, a second hash function (hB (•)) for OTP production, an OTP seed number stOTP for a tth authentication, and two authentication seeds of numbers s2t?1Auth and s2tAuth, for the tth authentication.Type: GrantFiled: November 17, 2010Date of Patent: March 25, 2014Assignee: King Saud UniversityInventors: Muhammad Khurram Khan, Mohamed Hamdy Khalil Eldefrawy, Khaled Soliman Alghathbar
-
Publication number: 20140069997Abstract: A system and method for currency validation of a bank note with a radio frequency identification device therein utilizes a computer, server and communication link and a smartphone including an RFID reader, transmitter/receiver and an internet connection. A bank note is issued with a value, a serial number and a secret seed message that is also saved on the issuer's server. A tamper proof RFID mu-chip is embedded in the currency note and includes the value, serial number, plus the secret message for making a calculation. The smartphone reads the information on the chip and requests an issuer/authenticator to validate the note. The issuer/authenticator transmits a challenge and the mu-chip calculates an answer that is sent to the issuer/authenticator. An approval or disapproval is then sent to the smartphone.Type: ApplicationFiled: September 12, 2012Publication date: March 13, 2014Applicant: KING SAUD UNIVERSITYInventors: Mohamed Hamdy Khalil Eldefrawy, Muhammad Khurram Khan
-
Patent number: 8660322Abstract: The passive continuous authentication method uses biometric feedback to perform the authentication processes. Computer software and sensors are provided to acquire, memorize, and authenticate both the user's hard (facial) and soft (clothing) biometric information. A registration phase compels the user to register his/her face image into a registration database. Subsequently, the system permits the user to login the system based on facial recognition of the image presented by an attached webcam of the system. During a computing session the system repetitively authenticates the user's identity by comparing the user's acquired face image (hard biometric) to the registered face image in the database. A clothes color histogram (soft biometric) is also computed. The hard biometric recognition mainly decides the authentication result. Otherwise, clothes color histogram matching takes place to decide the result. When the user leaves the terminal the screen locks up.Type: GrantFiled: August 25, 2011Date of Patent: February 25, 2014Assignee: King Saud UniversityInventors: Pei-Wei Tsai, Muhammad Khurram Khan
-
Publication number: 20130191899Abstract: Systems and methods for One-Time Password (OTP) authentication with infinite nested hash chains are described. In one aspect, a methodology includes a client device that provides a one-time password (OTP) authentication server with certain registration information. The client device generates, via the OTP authentication server, an authenticated OTP with infinite nested hash chains, These generating operations use a first hash function (hA (?)) for updating a seed chain, a second hash function (hB (•)) for OTP production, an OTP seed number stOTP for a tth authentication, and two authentication seeds of numbers s2t?1Auth and s2tAuth, for the tth authentication.Type: ApplicationFiled: November 17, 2010Publication date: July 25, 2013Applicant: KING SAUD UNIVERSITYInventors: Mohamed Hamdy Khalil Eldefrawy, Khaled Soliman Alghathbar, Muhammad Khurram Khan
-
Publication number: 20130179692Abstract: In one aspect, systems and methods for three-factor authentication include receiving a user's identification and password transmitted from the user's mobile device, generating a One Time Password (OTP), encrypting the OTP, and encoding the encrypted OTP in a two-dimensional barcode. The two-dimensional barcode of the encrypted OTP is transmitted to a computing device of the user, and an image of the two-dimensional barcode of the encrypted OTP displayed on the user's computing device is captured using the user's mobile device. The two-dimensional barcode of the encrypted OTP is decoded using the user's mobile device to obtain the encrypted OTP. The encrypted OTP is decrypted using the user's mobile device and displayed. The OTP then is spoken by the user, and the user's voice and the OTP are recognized to authenticate the user.Type: ApplicationFiled: January 11, 2012Publication date: July 11, 2013Applicant: King Saud UniversityInventors: Ahmed Saleh Mohamed Tolba, Muhammad Khurram Khan, Khaled Soliman Alghathbar
-
Publication number: 20130142399Abstract: Face recognition using multilayered discriminant analysis includes systems and methods applying an initial linear discriminate analysis to a database of face images in a more-or less conventional manner. Initial fuzzy logic then is applied to the results of the initial linear discriminate analysis to produce a subset of the database of face images. Thereafter, a subsequent linear discriminate analysis is applied to the subset of the database of face images and subsequent fuzzy logic is applied to the results of the subsequent linear discriminate analysis to produce a further subset of the subset of the database of face images. The application of the subsequent linear discriminate analysis and application of the subsequent fuzzy logic may be repeated until the further subset contains only one, or zero, face images.Type: ApplicationFiled: December 4, 2011Publication date: June 6, 2013Applicant: King Saud UniversityInventors: Muhammad Imran Razzak, Khaled Soliman Alghathbar, Muhammad Khurram Khan
-
Publication number: 20130051632Abstract: The passive continuous authentication method uses biometric feedback to perform the authentication processes. Computer software and sensors are provided to acquire, memorize, and authenticate both the user's hard (facial) and soft (clothing) biometric information. A registration phase compels the user to register his/her face image into a registration database. Subsequently, the system permits the user to login the system based on facial recognition of the image presented by an attached webcam of the system. During a computing session the system repetitively authenticates the user's identity by comparing the user's acquired face image (hard biometric) to the registered face image in the database. A clothes color histogram (soft biometric) is also computed. The hard biometric recognition mainly decides the authentication result. Otherwise, clothes color histogram matching takes place to decide the result. When the user leaves the terminal the screen locks up.Type: ApplicationFiled: August 25, 2011Publication date: February 28, 2013Applicant: KING SAUD UNIVERSITYInventors: PEI-WEI TSAI, MUHAMMAD KHURRAM KHAN
-
Publication number: 20110246768Abstract: In one aspect, systems and methods to improve a cryptosystem include computer-implemented operations such as scanning a biometric attribute for comparison with stored biometric data, and generating a keystream based upon the stored biometric data if the scanned biometric attribute substantially matches the stored biometric data. The computer-implemented method may also include operations for encrypting object data, and encrypting final data based upon the keystream and the encrypted object data.Type: ApplicationFiled: April 6, 2010Publication date: October 6, 2011Applicant: King Saud UniversityInventors: Maqsood Mahmud, Muhammad Khurram Khan, Khaled Soliman Alghathbar