Patents by Inventor Muhammad Saad
Muhammad Saad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11978038Abstract: Methods and systems for digital hot wallet protection are provided. A payment channel is established via a Layer-2 network of a cryptocurrency blockchain for transferring a cryptocurrency balance from a first digital wallet of a service provider to a second digital wallet of a trusted entity over a plurality of commitment transactions. A transaction receipt for each commitment transaction is transmitted to the trusted entity via a secure communication channel previously established between the service provider and the trusted entity outside of the Layer-2 network. A transaction log of the service provider is modified so that it no longer represents the current transaction state of the payment channel Responsive to detecting a breach of the first wallet, a transaction is broadcast to a Layer-1 network of the blockchain for transferring the total cryptocurrency balance from the first wallet to the second wallet.Type: GrantFiled: May 6, 2022Date of Patent: May 7, 2024Assignee: PAYPAL, INC.Inventors: Jakub Burgis, Raoul Johnson, Andrew Marshall, Muhammad Saad
-
Patent number: 11953965Abstract: Techniques are described for adaptive device power management. The device interface application of a hardware computing unit detects a launch of an application by the operating system (OS) to be executed on the hardware computing unit, in an implementation. The device interface application identifies the launched application and determines whether a hardware profile exists that is associated with the application. The hardware profile includes one or more hardware parameters that yield the optimal performance for power consumption by the hardware computing unit when executing the launched application. Based on determining that the hardware profile exists, the power policy of the OS is updated for the launched application, and thereby, the driver updates the power state(s) of the hardware computing unit based on the new power policy.Type: GrantFiled: December 21, 2021Date of Patent: April 9, 2024Assignee: ATI Technologies ULCInventors: Mohammad Hamed Mousazadeh, Joohyun Lee, Omer Irshad, Xuetao Yan, Alexander Sabino Duenas, Muhammad Saad Musani
-
Publication number: 20240104568Abstract: Methods and systems are presented for cross-entity fraud mitigation. A refund request for a transaction between a first entity and a second entity is received via a network from a device of the first entity. A transaction history associated with an account of the first entity with a service provider is obtained. From the obtained transaction history, metadata relating to previous refund requests processed for previous transactions associated with the account of the first entity is extracted. The extracted metadata is evaluated to determine a risk score for the refund request received for the transaction, where the risk score indicating a risk of fraud associated with the refund request. A decision on authorization of the refund request is generated for the transaction, based on the risk score. A notification of the decision is transmitted via the network to a device of the second entity.Type: ApplicationFiled: September 22, 2022Publication date: March 28, 2024Inventors: Adam Oest, Raoul Johnson, Muhammad Saad
-
Patent number: 11917464Abstract: Apparatuses, systems, and methods for RACH procedures to avoid excessive handover/secondary cell group failures. A base station may declare a handover and/or secondary cell group (SCG) failure and may determine that a failure threshold has been met. The base station may perform a remedial action in response to meeting the failure threshold. The failure threshold may be multi-dimensional, where a first dimension is associated with a number of handover/SCG failures and where a second dimension is associated with a time period in which the number of handover/SCG failures occurred. Further, a third dimension may be associated with a UE mobility state and a fourth dimension may be associated with whether the UE is using FR1 or FR2. The remedial action in response to meeting the failure threshold may include the base station suspending transmission of measurement object configurations for a specified period of time.Type: GrantFiled: May 26, 2021Date of Patent: February 27, 2024Assignee: Apple Inc.Inventors: Muhammad Saad, Syed A Rahim, Sharad Garg, Vijay Venkataraman, Jia Tang, Wenping Lou, Thanigaivelu Elangovan, Pengkai Zhao, Tarakkumar G Dhanani
-
Patent number: 11902282Abstract: Disclosed herein are system, method, and computer program product embodiments for displaying roles of an identity and access management (IAM) together with their corresponding compliance status of the assigned security policies with respect to a set of security rules. The method includes selecting a first role and a second role administered by an entity of the IAM system. Afterwards, the method includes determining, based on a set of security rules, a first compliance status of the first role associated with a first set of security policies; and a second compliance status of the second role associated with a second set of security policies. In addition, the method includes displaying on a GUI, the first role and the second role together with a first compliance status and a second compliance status.Type: GrantFiled: May 28, 2021Date of Patent: February 13, 2024Assignee: Capital One Services, LLCInventors: Matthew A. Ghiold, Muhammad Saad Tahir, Gavin McGrew
-
Publication number: 20230394471Abstract: Methods and systems are presented for providing a framework for facilitating time-sensitive cryptocurrency transactions for users. When a request for processing a time-sensitive cryptocurrency transaction using funds from a cryptocurrency wallet is received from a user, a transaction system first verifies whether the cryptocurrency wallet has a balance to cover the cryptocurrency transaction. The transaction system also verifies the ownership of the cryptocurrency wallet based on an asynchronous method. The user generates verification data without any input from the transaction system, and based on a private key associated with the cryptocurrency wallet, a generator function, and a user-generated value. Without knowing the user-generated value, the transaction system verifies the ownership of the cryptocurrency wallet based on the verification data, and processes the transaction for the user.Type: ApplicationFiled: June 3, 2022Publication date: December 7, 2023Inventors: Muhammad Saad, Jakub Burgis, Raoul Johnson
-
Publication number: 20230360024Abstract: Methods and systems for digital hot wallet protection are provided. A payment channel is established via a Layer-2 network of a cryptocurrency blockchain for transferring a cryptocurrency balance from a first digital wallet of a service provider to a second digital wallet of a trusted entity over a plurality of commitment transactions. A transaction receipt for each commitment transaction is transmitted to the trusted entity via a secure communication channel previously established between the service provider and the trusted entity outside of the Layer-2 network. A transaction log of the service provider is modified so that it no longer represents the current transaction state of the payment channel Responsive to detecting a breach of the first wallet, a transaction is broadcast to a Layer-1 network of the blockchain for transferring the total cryptocurrency balance from the first wallet to the second wallet.Type: ApplicationFiled: May 6, 2022Publication date: November 9, 2023Inventors: Jakub Burgis, Raoul Johnson, Andrew Marshall, Muhammad Saad
-
Publication number: 20230344649Abstract: A method includes a first device receiving, from a second device, an interaction request message comprising an amount and a second device certificate. The first device can verify the second device certificate using a server computer public key corresponding to a server computer private key. A trusted application in a secure element of the first device can determine whether or not the amount is less than an offline amount stored in the secure element. If the amount is less than the offline amount, the trusted application can determine an updated offline amount based on the amount. The trusted application can generate an interaction response message comprising the amount and a trusted application certificate. The first device can then provide the interaction response message to the second device.Type: ApplicationFiled: July 21, 2021Publication date: October 26, 2023Applicant: Visa International Service AssociationInventors: Mahdi Zamani, Ranjit Kumaresan, Mihai Christodorescu, Cuy Sheffield, Benjamin Price, Wanyun Gu, Minghua Xu, Srinivasan Raghuraman, Muhammad Saad, Mustafa Ozdayi, Mohammad Mohsen Minaei Bidgoli, Sourav Das
-
Publication number: 20230298005Abstract: Methods and systems described herein may implement blockchain cryptocurrency transactions in a variety of environments. An online transaction processor may provide operations for cryptocurrency conversions. The transaction processor may detect that a user is involved in a cryptocurrency transaction with another entity, which is requested to be processed using an amount of cryptocurrency and using an off-chain amount of the cryptocurrency. The transaction processor may determine that the entity does not have a digital wallet, node, or the like on a layer two network to receive and/or process the off-chain balance for the cryptocurrency. The transaction processor may then, after a risk assessment, determine that the user may access the amount of the cryptocurrency from an on-chain balance available to a digital wallet of the cryptocurrency. The transaction processor may make that on-chain amount available and may request repayment via the user's off-chain balance.Type: ApplicationFiled: March 17, 2022Publication date: September 21, 2023Inventors: Muhammad Saad, Raoul Johnson, Jakub Burgis
-
Publication number: 20230289790Abstract: A method for generating a smart protocol includes providing, by a server computer system, a user interface to one or more of a plurality of users. The server computer system may receive, via the user interface, input specifying terms corresponding to a smart protocol that is to be deployed on a particular blockchain platform. The specified terms may include the plurality of users associated with the smart protocol and a web resource to be used to identify one or more external data. An execution of the smart protocol may be based on a value of the external data. Based on the specified terms, the server computer system may generate, without further input from the plurality of users, the smart protocol. The server computer system may deploy the smart protocol to the particular blockchain platform.Type: ApplicationFiled: March 14, 2022Publication date: September 14, 2023Inventors: Muhammad Saad, Raoul Johnson, Jakub Burgis
-
Publication number: 20230206231Abstract: Methods and systems are presented for tracking activities that occur off of a first layer blockchain in in a second layer network built on the first layer blockchain. In one embodiment, a computer system determines that a transfer of cryptocurrency from a first node to a second node has transpired in the second layer network based on querying channel capacities in the second layer network. The computer system determines a first public address for the first node based on information associated with a first channel that connects the computer system and the first node in the second layer network, and determines a second public address for the second node based on information associated with a second channel that connects the computer system and the second node in the second layer network. The first public address and the second public address are used to monitor activity in the first layer blockchain.Type: ApplicationFiled: December 27, 2021Publication date: June 29, 2023Inventors: Muhammad Saad, Jakub Burgis, Raoul Johnson
-
Publication number: 20230195197Abstract: Techniques are described for adaptive device power management. The device interface application of a hardware computing unit detects a launch of an application by the operating system (OS) to be executed on the hardware computing unit, in an implementation. The device interface application identifies the launched application and determines whether a hardware profile exists that is associated with the application. The hardware profile includes one or more hardware parameters that yield the optimal performance for power consumption by the hardware computing unit when executing the launched application. Based on determining that the hardware profile exists, the power policy of the OS is updated for the launched application, and thereby, the driver updates the power state(s) of the hardware computing unit based on the new power policy.Type: ApplicationFiled: December 21, 2021Publication date: June 22, 2023Inventors: MOHAMMAD HAMED MOUSAZADEH, JOOHYUN LEE, OMER IRSHAD, XUETAO YAN, ALEXANDER SABINO DUENAS, MUHAMMAD SAAD MUSANI
-
Publication number: 20230099276Abstract: Systems and processes are for measuring link metrics for a plurality of reference signals associated with a plurality of beams from a base station. The systems and methods are for determining that a link metric value is less than or equal to a predetermined threshold. The systems and process include detecting beam failure, classifying beam recovery as high priority, opportunistic beam failure recovery and performing an optimal random access channel (RACH) process through intelligent selection of beams and modules.Type: ApplicationFiled: September 15, 2022Publication date: March 30, 2023Inventors: Muhammad Saad, Syed A. Rahim, Nitin A. Naik, Gopi Krishna Koneru, Vijay Venkataraman, Neeraj D. Vaghela
-
Publication number: 20230078257Abstract: Disclosed are embodiments for reducing likelihood of selecting a cell identified by a Radio Access Network (RAN) Notification Area ID (RNA ID) that is different from that identifying a last or current serving cell so as to avoid an RNA update procedure; reducing Random Access Channel (RACH) transmissions for an RNA update procedure and a mobile originated (MO) data transmission in response to a Radio Resource Control (RRC) triggered RNA update procedure; and selecting a band or beam in a multi-band/beam cellular system that improves RACH efficiency.Type: ApplicationFiled: September 24, 2022Publication date: March 16, 2023Inventors: Vijay Venkataraman, Muthukumaran Dhanapal, Li Su, Sharad Garg, Syed A. Rahim, Sandeep K. Sunkesala, Jia Tang, Vijay Gadde, Tarakkumar G. Dhanani, Muhammad Saad
-
Publication number: 20220385667Abstract: Disclosed herein are system, method, and computer program product embodiments for displaying roles of an identity and access management (IAM) together with their corresponding compliance status of the assigned security policies with respect to a set of security rules. The method includes selecting a first role and a second role administered by an entity of the IAM system. Afterwards, the method includes determining, based on a set of security rules, a first compliance status of the first role associated with a first set of security policies; and a second compliance status of the second role associated with a second set of security policies. In addition, the method includes displaying on a GUI, the first role and the second role together with a first compliance status and a second compliance status.Type: ApplicationFiled: May 28, 2021Publication date: December 1, 2022Applicant: Capital One Services, LLCInventors: Matthew A. GHIOLD, Muhammad Saad TAHIR, Gavin MCGREW
-
Patent number: 11490306Abstract: Disclosed are embodiments for reducing likelihood of selecting a cell identified by a Radio Access Network (RAN) Notification Area ID (RNA ID) that is different from that identifying a last or current serving cell so as to avoid an RNA update procedure; reducing Random Access Channel (RACH) transmissions for an RNA update procedure and a mobile originated (MO) data transmission in response to a Radio Resource Control (RRC) triggered RNA update procedure; and selecting a band or beam in a multi-band/beam cellular system that improves RACH efficiency.Type: GrantFiled: June 29, 2020Date of Patent: November 1, 2022Assignee: APPLE INC.Inventors: Vijay Venkataraman, Muthukumaran Dhanapal, Li Su, Sharad Garg, Syed A. Rahim, Sandeep K. Sunkesala, Jia Tang, Vijay Gadde, Tarakkumar G. Dhanani, Muhammad Saad
-
Patent number: 11221393Abstract: A method and processor to determine spatial information regarding a vehicle. The method includes receiving at least one initial frame of FMCW radar data including spatial information regarding the vehicle associated with a radar signal reflected back from the vehicle via a surface of at least one stationary object other than the vehicle. The method also includes receiving at least one further frame of FMCW radar data including: spatial information regarding the vehicle associated with a radar signal reflected back from the vehicle via the surface of at least one stationary object other than the vehicle, and spatial information regarding the vehicle associated with a radar signal reflected directly back from the vehicle. The method further includes using the at least one initial frame of radar data to correct for static clutter associated with the at least one stationary object in the at least one further frame of radar data.Type: GrantFiled: December 6, 2019Date of Patent: January 11, 2022Assignee: NXP USA, Inc.Inventor: Muhammad Saad Nawaz
-
Publication number: 20210410030Abstract: Disclosed are embodiments for reducing likelihood of selecting a cell identified by a Radio Access Network (RAN) Notification Area ID (RNA ID) that is different from that identifying a last or current serving cell so as to avoid an RNA update procedure; reducing Random Access Channel (RACH) transmissions for an RNA update procedure and a mobile originated (MO) data transmission in response to a Radio Resource Control (RRC) triggered RNA update procedure; and selecting a band or beam in a multi-band/beam cellular system that improves RACH efficiency.Type: ApplicationFiled: June 29, 2020Publication date: December 30, 2021Inventors: Vijay Venkataraman, Muthukumaran Dhanapal, Li Su, Sharad Garg, Syed A. Rahim, Sandeep K. Sunkesala, Jia Tang, Vijay Gadde, Tarakkumar G. Dhanani, Muhammad Saad
-
Publication number: 20210385707Abstract: Apparatuses, systems, and methods for RACH procedures to avoid excessive handover/secondary cell group failures. A base station may declare a handover and/or secondary cell group (SCG) failure and may determine that a failure threshold has been met. The base station may perform a remedial action in response to meeting the failure threshold. The failure threshold may be multi-dimensional, where a first dimension is associated with a number of handover/SCG failures and where a second dimension is associated with a time period in which the number of handover/SCG failures occurred. Further, a third dimension may be associated with a UE mobility state and a fourth dimension may be associated with whether the UE is using FR1 or FR2. The remedial action in response to meeting the failure threshold may include the base station suspending transmission of measurement object configurations for a specified period of time.Type: ApplicationFiled: May 26, 2021Publication date: December 9, 2021Inventors: Muhammad Saad, Syed A. Rahim, Sharad Garg, Vijay Venkataraman, Jia Tang, Wenping Lou, Thanigaivelu Elangovan, Pengkai Zhao, Tarakkumar G. Dhanani
-
Patent number: 10955525Abstract: A method and apparatus for acquiring chirp data in a frequency modulated continuous wave (FMCW) radar system of a road vehicle. The method includes transmitting a FMCW signal comprising a plurality of ramping regions in which a frequency of the FMCW signal ramps up to a first frequency or ramps down to a second frequency. The method also includes receiving a reflected signal corresponding to the reflection of the FMCW signal from one or more physical objects. The reflected signal includes a plurality of ramping regions corresponding to the ramping regions of the transmitted FMCW signal. The method further includes sampling the reflected signal by: taking a plurality of samples in a ramping region in which the frequency of the reflected signal ramps up; and taking a plurality of samples in a ramping region in which the frequency of the reflected signal ramps down.Type: GrantFiled: September 28, 2018Date of Patent: March 23, 2021Assignee: NXP USA, INC.Inventors: Muhammad Saad Nawaz, Ralf Reuter