Patents by Inventor Muhammad Saad
Muhammad Saad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12182807Abstract: A method for generating a smart protocol includes providing, by a server computer system, a user interface to one or more of a plurality of users. The server computer system may receive, via the user interface, input specifying terms corresponding to a smart protocol that is to be deployed on a particular blockchain platform. The specified terms may include the plurality of users associated with the smart protocol and a web resource to be used to identify one or more external data. An execution of the smart protocol may be based on a value of the external data. Based on the specified terms, the server computer system may generate, without further input from the plurality of users, the smart protocol. The server computer system may deploy the smart protocol to the particular blockchain platform.Type: GrantFiled: March 14, 2022Date of Patent: December 31, 2024Assignee: PayPal, Inc.Inventors: Muhammad Saad, Raoul Johnson, Jakub Burgis
-
Publication number: 20240354743Abstract: Methods and systems for digital hot wallet protection are provided. A payment channel is established via a Layer-2 network of a cryptocurrency blockchain for transferring a cryptocurrency balance from a first digital wallet of a service provider to a second digital wallet of a trusted entity over a plurality of commitment transactions. A transaction receipt for each commitment transaction is transmitted to the trusted entity via a secure communication channel previously established between the service provider and the trusted entity outside of the Layer-2 network. A transaction log of the service provider is modified so that it no longer represents the current transaction state of the payment channel. Responsive to detecting a breach of the first wallet, a transaction is broadcast to a Layer-1 network of the blockchain for transferring the total cryptocurrency balance from the first wallet to the second wallet.Type: ApplicationFiled: April 9, 2024Publication date: October 24, 2024Inventors: Jakub Burgis, Raoul Johnson, Andrew Marshall, Muhammad Saad
-
Publication number: 20240323150Abstract: A computing system includes a processor; and memory storing instructions that, when executed by the processor, cause the processor to perform several acts. The acts include receiving multiple messages from multiple users in a messaging application that supports group conversations, where the multiple messages are included in a group conversation. The acts also include providing a prompt to a generative model, where the prompt includes the multiple messages. The acts additionally include receiving, from the generative model, an output generated by the generative model based upon the prompt and including the output as a turn in the group conversation.Type: ApplicationFiled: June 3, 2024Publication date: September 26, 2024Inventors: Ovidiu DAN, Ondrej STAROSTA, Guilherme ISCARO DE GODOY, Michal HANZLIK, Prateek TIWARI, Muhammad Saad SADIQ
-
Publication number: 20240305589Abstract: A computing system includes a processor; and memory storing instructions that, when executed by the processor, cause the processor to perform several acts. The acts include receiving multiple messages from multiple users in a messaging application that supports group conversations, where the multiple messages are included in a group conversation. The acts also include providing a prompt to a generative model, where the prompt includes the multiple messages. The acts additionally include receiving, from the generative model, an output generated by the generative model based upon the prompt and including the output as a turn in the group conversation.Type: ApplicationFiled: September 29, 2023Publication date: September 12, 2024Inventors: Ovidiu DAN, Ondrej STAROSTA, Guilherme ISCARO DE GODOY, Michal HANZLIK, Prateek TIWARI, Muhammad Saad SADIQ
-
Publication number: 20240255572Abstract: A test and measurement instrument includes one or more ports to allow the instrument to connect to a DUT, a memory, a user interface including a display to display waveform signals received from the DUT and controls to allow a user to select settings for the instrument, and one or more processors configured to execute code that causes the one or more processors to: receive a signal from the DUT having multiple signal levels and multiple jitter thresholds; and adjust each measurement of the signal from the DUT using a jitter compensation value for each jitter threshold to produce a final measurement. A method includes receiving a waveform signal having multiple signal levels and multiple jitter thresholds from a device under test (DUT), and adjusting measurements of each level of the signal using a jitter compensation value for each level to produce final measurements.Type: ApplicationFiled: January 8, 2024Publication date: August 1, 2024Inventors: Muhammad Saad Chughtai, Mark L. Guenther, Pavel R. Zivny
-
Publication number: 20240256842Abstract: A system, method, and computer readable medium for deploying neural networks in low bit environments. The system comprises a runtime platform, a first set of configuration parameters identifying limitations of the runtime platform, and a quantization platform for quantizing neural networks. The quantization platform receives a neural network associated with a framework and quantizing the neural network into a smaller neural network and generates a dataset comprising a second set of configuration parameters for compiling the smaller neural network into instructions for the runtime platform. The second set of configuration parameters are responsive to the limitations of the first set of configuration parameters. The runtime environment implements the smaller neural network in accordance with the second set of configuration parameters.Type: ApplicationFiled: January 26, 2023Publication date: August 1, 2024Applicant: Deeplite Inc.Inventors: Muhammad Saad ASHFAQ, MohammadHossein ASKARI HEMMAT, Sudhakar SAH, Ehsan SABOORI, Ahmed HASSANIEN, Olivier MASTROPIETRO, Alexander HOFFMAN
-
Patent number: 12052622Abstract: Disclosed are embodiments for reducing likelihood of selecting a cell identified by a Radio Access Network (RAN) Notification Area ID (RNA ID) that is different from that identifying a last or current serving cell so as to avoid an RNA update procedure; reducing Random Access Channel (RACH) transmissions for an RNA update procedure and a mobile originated (MO) data transmission in response to a Radio Resource Control (RRC) triggered RNA update procedure; and selecting a band or beam in a multi-band/beam cellular system that improves RACH efficiency.Type: GrantFiled: September 24, 2022Date of Patent: July 30, 2024Assignee: APPLE INC.Inventors: Vijay Venkataraman, Muthukumaran Dhanapal, Li Su, Sharad Garg, Syed A. Rahim, Sandeep K. Sunkesala, Jia Tang, Vijay Gadde, Tarakkumar G. Dhanani, Muhammad Saad
-
Publication number: 20240248523Abstract: Techniques are described for adaptive device power management. The device interface application of a hardware computing unit detects a launch of an application by the operating system (OS) to be executed on the hardware computing unit, in an implementation. The device interface application identifies the launched application and determines whether a hardware profile exists that is associated with the application. The hardware profile includes one or more hardware parameters that yield the optimal performance for power consumption by the hardware computing unit when executing the launched application. Based on determining that the hardware profile exists, the power policy of the OS is updated for the launched application, and thereby, the driver updates the power state(s) of the hardware computing unit based on the new power policy.Type: ApplicationFiled: April 6, 2024Publication date: July 25, 2024Inventors: Mohammad Hamed Mousazadeh, Joohyun Lee, Omer Irshad, Xuetao Yan, Alexander Sabino Duenas, Muhammad Saad Musani
-
Publication number: 20240249121Abstract: A system, method and computer readable medium for implementing neural networks. The method can include providing a neural network, providing a lookup table based on the neural network, packing weights and activations of the neural network associated with the at least one convolution with a first set of bitwise operations, unpacking the packed weights and activations, with a second set of bitwise operations, to determine one or more inputs for the look up table. The method includes accessing, within the lookup table, an output corresponding to the one or more inputs, and implement the at least one convolution based on the output.Type: ApplicationFiled: January 19, 2024Publication date: July 25, 2024Applicant: Deeplite Inc.Inventors: Muhammad Saad ASHFAQ, Saptarshi MITRA, Alexander HOFFMAN, Darshan Chandrashekhar GANJI, Ahmed HASSANIEN, Sudhakar SAH, Ehsan SABOORI, MohammadHossein ASKARI HEMMAT
-
Publication number: 20240187417Abstract: Disclosed herein are system, method, and computer program product embodiments for displaying roles of an identity and access management (IAM) together with their corresponding compliance status of the assigned security policies with respect to a set of security rules. The method includes selecting a first role and a second role administered by an entity of the IAM system. Afterwards, the method includes determining, based on a set of security rules, a first compliance status of the first role associated with a first set of security policies; and a second compliance status of the second role associated with a second set of security policies. In addition, the method includes displaying on a GUI, the first role and the second role together with a first compliance status and a second compliance status.Type: ApplicationFiled: February 12, 2024Publication date: June 6, 2024Applicant: Capital One Services, LLCInventors: Matthew A. GHIOLD, Muhammad Saad TAHIR, Gavin MCGREW
-
Patent number: 11978038Abstract: Methods and systems for digital hot wallet protection are provided. A payment channel is established via a Layer-2 network of a cryptocurrency blockchain for transferring a cryptocurrency balance from a first digital wallet of a service provider to a second digital wallet of a trusted entity over a plurality of commitment transactions. A transaction receipt for each commitment transaction is transmitted to the trusted entity via a secure communication channel previously established between the service provider and the trusted entity outside of the Layer-2 network. A transaction log of the service provider is modified so that it no longer represents the current transaction state of the payment channel Responsive to detecting a breach of the first wallet, a transaction is broadcast to a Layer-1 network of the blockchain for transferring the total cryptocurrency balance from the first wallet to the second wallet.Type: GrantFiled: May 6, 2022Date of Patent: May 7, 2024Assignee: PAYPAL, INC.Inventors: Jakub Burgis, Raoul Johnson, Andrew Marshall, Muhammad Saad
-
Patent number: 11953965Abstract: Techniques are described for adaptive device power management. The device interface application of a hardware computing unit detects a launch of an application by the operating system (OS) to be executed on the hardware computing unit, in an implementation. The device interface application identifies the launched application and determines whether a hardware profile exists that is associated with the application. The hardware profile includes one or more hardware parameters that yield the optimal performance for power consumption by the hardware computing unit when executing the launched application. Based on determining that the hardware profile exists, the power policy of the OS is updated for the launched application, and thereby, the driver updates the power state(s) of the hardware computing unit based on the new power policy.Type: GrantFiled: December 21, 2021Date of Patent: April 9, 2024Assignee: ATI Technologies ULCInventors: Mohammad Hamed Mousazadeh, Joohyun Lee, Omer Irshad, Xuetao Yan, Alexander Sabino Duenas, Muhammad Saad Musani
-
Publication number: 20240104568Abstract: Methods and systems are presented for cross-entity fraud mitigation. A refund request for a transaction between a first entity and a second entity is received via a network from a device of the first entity. A transaction history associated with an account of the first entity with a service provider is obtained. From the obtained transaction history, metadata relating to previous refund requests processed for previous transactions associated with the account of the first entity is extracted. The extracted metadata is evaluated to determine a risk score for the refund request received for the transaction, where the risk score indicating a risk of fraud associated with the refund request. A decision on authorization of the refund request is generated for the transaction, based on the risk score. A notification of the decision is transmitted via the network to a device of the second entity.Type: ApplicationFiled: September 22, 2022Publication date: March 28, 2024Inventors: Adam Oest, Raoul Johnson, Muhammad Saad
-
Patent number: 11917464Abstract: Apparatuses, systems, and methods for RACH procedures to avoid excessive handover/secondary cell group failures. A base station may declare a handover and/or secondary cell group (SCG) failure and may determine that a failure threshold has been met. The base station may perform a remedial action in response to meeting the failure threshold. The failure threshold may be multi-dimensional, where a first dimension is associated with a number of handover/SCG failures and where a second dimension is associated with a time period in which the number of handover/SCG failures occurred. Further, a third dimension may be associated with a UE mobility state and a fourth dimension may be associated with whether the UE is using FR1 or FR2. The remedial action in response to meeting the failure threshold may include the base station suspending transmission of measurement object configurations for a specified period of time.Type: GrantFiled: May 26, 2021Date of Patent: February 27, 2024Assignee: Apple Inc.Inventors: Muhammad Saad, Syed A Rahim, Sharad Garg, Vijay Venkataraman, Jia Tang, Wenping Lou, Thanigaivelu Elangovan, Pengkai Zhao, Tarakkumar G Dhanani
-
Patent number: 11902282Abstract: Disclosed herein are system, method, and computer program product embodiments for displaying roles of an identity and access management (IAM) together with their corresponding compliance status of the assigned security policies with respect to a set of security rules. The method includes selecting a first role and a second role administered by an entity of the IAM system. Afterwards, the method includes determining, based on a set of security rules, a first compliance status of the first role associated with a first set of security policies; and a second compliance status of the second role associated with a second set of security policies. In addition, the method includes displaying on a GUI, the first role and the second role together with a first compliance status and a second compliance status.Type: GrantFiled: May 28, 2021Date of Patent: February 13, 2024Assignee: Capital One Services, LLCInventors: Matthew A. Ghiold, Muhammad Saad Tahir, Gavin McGrew
-
Publication number: 20230394471Abstract: Methods and systems are presented for providing a framework for facilitating time-sensitive cryptocurrency transactions for users. When a request for processing a time-sensitive cryptocurrency transaction using funds from a cryptocurrency wallet is received from a user, a transaction system first verifies whether the cryptocurrency wallet has a balance to cover the cryptocurrency transaction. The transaction system also verifies the ownership of the cryptocurrency wallet based on an asynchronous method. The user generates verification data without any input from the transaction system, and based on a private key associated with the cryptocurrency wallet, a generator function, and a user-generated value. Without knowing the user-generated value, the transaction system verifies the ownership of the cryptocurrency wallet based on the verification data, and processes the transaction for the user.Type: ApplicationFiled: June 3, 2022Publication date: December 7, 2023Inventors: Muhammad Saad, Jakub Burgis, Raoul Johnson
-
Publication number: 20230360024Abstract: Methods and systems for digital hot wallet protection are provided. A payment channel is established via a Layer-2 network of a cryptocurrency blockchain for transferring a cryptocurrency balance from a first digital wallet of a service provider to a second digital wallet of a trusted entity over a plurality of commitment transactions. A transaction receipt for each commitment transaction is transmitted to the trusted entity via a secure communication channel previously established between the service provider and the trusted entity outside of the Layer-2 network. A transaction log of the service provider is modified so that it no longer represents the current transaction state of the payment channel Responsive to detecting a breach of the first wallet, a transaction is broadcast to a Layer-1 network of the blockchain for transferring the total cryptocurrency balance from the first wallet to the second wallet.Type: ApplicationFiled: May 6, 2022Publication date: November 9, 2023Inventors: Jakub Burgis, Raoul Johnson, Andrew Marshall, Muhammad Saad
-
Publication number: 20230344649Abstract: A method includes a first device receiving, from a second device, an interaction request message comprising an amount and a second device certificate. The first device can verify the second device certificate using a server computer public key corresponding to a server computer private key. A trusted application in a secure element of the first device can determine whether or not the amount is less than an offline amount stored in the secure element. If the amount is less than the offline amount, the trusted application can determine an updated offline amount based on the amount. The trusted application can generate an interaction response message comprising the amount and a trusted application certificate. The first device can then provide the interaction response message to the second device.Type: ApplicationFiled: July 21, 2021Publication date: October 26, 2023Applicant: Visa International Service AssociationInventors: Mahdi Zamani, Ranjit Kumaresan, Mihai Christodorescu, Cuy Sheffield, Benjamin Price, Wanyun Gu, Minghua Xu, Srinivasan Raghuraman, Muhammad Saad, Mustafa Ozdayi, Mohammad Mohsen Minaei Bidgoli, Sourav Das
-
Publication number: 20230298005Abstract: Methods and systems described herein may implement blockchain cryptocurrency transactions in a variety of environments. An online transaction processor may provide operations for cryptocurrency conversions. The transaction processor may detect that a user is involved in a cryptocurrency transaction with another entity, which is requested to be processed using an amount of cryptocurrency and using an off-chain amount of the cryptocurrency. The transaction processor may determine that the entity does not have a digital wallet, node, or the like on a layer two network to receive and/or process the off-chain balance for the cryptocurrency. The transaction processor may then, after a risk assessment, determine that the user may access the amount of the cryptocurrency from an on-chain balance available to a digital wallet of the cryptocurrency. The transaction processor may make that on-chain amount available and may request repayment via the user's off-chain balance.Type: ApplicationFiled: March 17, 2022Publication date: September 21, 2023Inventors: Muhammad Saad, Raoul Johnson, Jakub Burgis
-
Publication number: 20230289790Abstract: A method for generating a smart protocol includes providing, by a server computer system, a user interface to one or more of a plurality of users. The server computer system may receive, via the user interface, input specifying terms corresponding to a smart protocol that is to be deployed on a particular blockchain platform. The specified terms may include the plurality of users associated with the smart protocol and a web resource to be used to identify one or more external data. An execution of the smart protocol may be based on a value of the external data. Based on the specified terms, the server computer system may generate, without further input from the plurality of users, the smart protocol. The server computer system may deploy the smart protocol to the particular blockchain platform.Type: ApplicationFiled: March 14, 2022Publication date: September 14, 2023Inventors: Muhammad Saad, Raoul Johnson, Jakub Burgis