Patents by Inventor Muhammad Saad

Muhammad Saad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11978038
    Abstract: Methods and systems for digital hot wallet protection are provided. A payment channel is established via a Layer-2 network of a cryptocurrency blockchain for transferring a cryptocurrency balance from a first digital wallet of a service provider to a second digital wallet of a trusted entity over a plurality of commitment transactions. A transaction receipt for each commitment transaction is transmitted to the trusted entity via a secure communication channel previously established between the service provider and the trusted entity outside of the Layer-2 network. A transaction log of the service provider is modified so that it no longer represents the current transaction state of the payment channel Responsive to detecting a breach of the first wallet, a transaction is broadcast to a Layer-1 network of the blockchain for transferring the total cryptocurrency balance from the first wallet to the second wallet.
    Type: Grant
    Filed: May 6, 2022
    Date of Patent: May 7, 2024
    Assignee: PAYPAL, INC.
    Inventors: Jakub Burgis, Raoul Johnson, Andrew Marshall, Muhammad Saad
  • Patent number: 11953965
    Abstract: Techniques are described for adaptive device power management. The device interface application of a hardware computing unit detects a launch of an application by the operating system (OS) to be executed on the hardware computing unit, in an implementation. The device interface application identifies the launched application and determines whether a hardware profile exists that is associated with the application. The hardware profile includes one or more hardware parameters that yield the optimal performance for power consumption by the hardware computing unit when executing the launched application. Based on determining that the hardware profile exists, the power policy of the OS is updated for the launched application, and thereby, the driver updates the power state(s) of the hardware computing unit based on the new power policy.
    Type: Grant
    Filed: December 21, 2021
    Date of Patent: April 9, 2024
    Assignee: ATI Technologies ULC
    Inventors: Mohammad Hamed Mousazadeh, Joohyun Lee, Omer Irshad, Xuetao Yan, Alexander Sabino Duenas, Muhammad Saad Musani
  • Publication number: 20240104568
    Abstract: Methods and systems are presented for cross-entity fraud mitigation. A refund request for a transaction between a first entity and a second entity is received via a network from a device of the first entity. A transaction history associated with an account of the first entity with a service provider is obtained. From the obtained transaction history, metadata relating to previous refund requests processed for previous transactions associated with the account of the first entity is extracted. The extracted metadata is evaluated to determine a risk score for the refund request received for the transaction, where the risk score indicating a risk of fraud associated with the refund request. A decision on authorization of the refund request is generated for the transaction, based on the risk score. A notification of the decision is transmitted via the network to a device of the second entity.
    Type: Application
    Filed: September 22, 2022
    Publication date: March 28, 2024
    Inventors: Adam Oest, Raoul Johnson, Muhammad Saad
  • Patent number: 11917464
    Abstract: Apparatuses, systems, and methods for RACH procedures to avoid excessive handover/secondary cell group failures. A base station may declare a handover and/or secondary cell group (SCG) failure and may determine that a failure threshold has been met. The base station may perform a remedial action in response to meeting the failure threshold. The failure threshold may be multi-dimensional, where a first dimension is associated with a number of handover/SCG failures and where a second dimension is associated with a time period in which the number of handover/SCG failures occurred. Further, a third dimension may be associated with a UE mobility state and a fourth dimension may be associated with whether the UE is using FR1 or FR2. The remedial action in response to meeting the failure threshold may include the base station suspending transmission of measurement object configurations for a specified period of time.
    Type: Grant
    Filed: May 26, 2021
    Date of Patent: February 27, 2024
    Assignee: Apple Inc.
    Inventors: Muhammad Saad, Syed A Rahim, Sharad Garg, Vijay Venkataraman, Jia Tang, Wenping Lou, Thanigaivelu Elangovan, Pengkai Zhao, Tarakkumar G Dhanani
  • Patent number: 11902282
    Abstract: Disclosed herein are system, method, and computer program product embodiments for displaying roles of an identity and access management (IAM) together with their corresponding compliance status of the assigned security policies with respect to a set of security rules. The method includes selecting a first role and a second role administered by an entity of the IAM system. Afterwards, the method includes determining, based on a set of security rules, a first compliance status of the first role associated with a first set of security policies; and a second compliance status of the second role associated with a second set of security policies. In addition, the method includes displaying on a GUI, the first role and the second role together with a first compliance status and a second compliance status.
    Type: Grant
    Filed: May 28, 2021
    Date of Patent: February 13, 2024
    Assignee: Capital One Services, LLC
    Inventors: Matthew A. Ghiold, Muhammad Saad Tahir, Gavin McGrew
  • Publication number: 20230394471
    Abstract: Methods and systems are presented for providing a framework for facilitating time-sensitive cryptocurrency transactions for users. When a request for processing a time-sensitive cryptocurrency transaction using funds from a cryptocurrency wallet is received from a user, a transaction system first verifies whether the cryptocurrency wallet has a balance to cover the cryptocurrency transaction. The transaction system also verifies the ownership of the cryptocurrency wallet based on an asynchronous method. The user generates verification data without any input from the transaction system, and based on a private key associated with the cryptocurrency wallet, a generator function, and a user-generated value. Without knowing the user-generated value, the transaction system verifies the ownership of the cryptocurrency wallet based on the verification data, and processes the transaction for the user.
    Type: Application
    Filed: June 3, 2022
    Publication date: December 7, 2023
    Inventors: Muhammad Saad, Jakub Burgis, Raoul Johnson
  • Publication number: 20230360024
    Abstract: Methods and systems for digital hot wallet protection are provided. A payment channel is established via a Layer-2 network of a cryptocurrency blockchain for transferring a cryptocurrency balance from a first digital wallet of a service provider to a second digital wallet of a trusted entity over a plurality of commitment transactions. A transaction receipt for each commitment transaction is transmitted to the trusted entity via a secure communication channel previously established between the service provider and the trusted entity outside of the Layer-2 network. A transaction log of the service provider is modified so that it no longer represents the current transaction state of the payment channel Responsive to detecting a breach of the first wallet, a transaction is broadcast to a Layer-1 network of the blockchain for transferring the total cryptocurrency balance from the first wallet to the second wallet.
    Type: Application
    Filed: May 6, 2022
    Publication date: November 9, 2023
    Inventors: Jakub Burgis, Raoul Johnson, Andrew Marshall, Muhammad Saad
  • Publication number: 20230344649
    Abstract: A method includes a first device receiving, from a second device, an interaction request message comprising an amount and a second device certificate. The first device can verify the second device certificate using a server computer public key corresponding to a server computer private key. A trusted application in a secure element of the first device can determine whether or not the amount is less than an offline amount stored in the secure element. If the amount is less than the offline amount, the trusted application can determine an updated offline amount based on the amount. The trusted application can generate an interaction response message comprising the amount and a trusted application certificate. The first device can then provide the interaction response message to the second device.
    Type: Application
    Filed: July 21, 2021
    Publication date: October 26, 2023
    Applicant: Visa International Service Association
    Inventors: Mahdi Zamani, Ranjit Kumaresan, Mihai Christodorescu, Cuy Sheffield, Benjamin Price, Wanyun Gu, Minghua Xu, Srinivasan Raghuraman, Muhammad Saad, Mustafa Ozdayi, Mohammad Mohsen Minaei Bidgoli, Sourav Das
  • Publication number: 20230298005
    Abstract: Methods and systems described herein may implement blockchain cryptocurrency transactions in a variety of environments. An online transaction processor may provide operations for cryptocurrency conversions. The transaction processor may detect that a user is involved in a cryptocurrency transaction with another entity, which is requested to be processed using an amount of cryptocurrency and using an off-chain amount of the cryptocurrency. The transaction processor may determine that the entity does not have a digital wallet, node, or the like on a layer two network to receive and/or process the off-chain balance for the cryptocurrency. The transaction processor may then, after a risk assessment, determine that the user may access the amount of the cryptocurrency from an on-chain balance available to a digital wallet of the cryptocurrency. The transaction processor may make that on-chain amount available and may request repayment via the user's off-chain balance.
    Type: Application
    Filed: March 17, 2022
    Publication date: September 21, 2023
    Inventors: Muhammad Saad, Raoul Johnson, Jakub Burgis
  • Publication number: 20230289790
    Abstract: A method for generating a smart protocol includes providing, by a server computer system, a user interface to one or more of a plurality of users. The server computer system may receive, via the user interface, input specifying terms corresponding to a smart protocol that is to be deployed on a particular blockchain platform. The specified terms may include the plurality of users associated with the smart protocol and a web resource to be used to identify one or more external data. An execution of the smart protocol may be based on a value of the external data. Based on the specified terms, the server computer system may generate, without further input from the plurality of users, the smart protocol. The server computer system may deploy the smart protocol to the particular blockchain platform.
    Type: Application
    Filed: March 14, 2022
    Publication date: September 14, 2023
    Inventors: Muhammad Saad, Raoul Johnson, Jakub Burgis
  • Publication number: 20230206231
    Abstract: Methods and systems are presented for tracking activities that occur off of a first layer blockchain in in a second layer network built on the first layer blockchain. In one embodiment, a computer system determines that a transfer of cryptocurrency from a first node to a second node has transpired in the second layer network based on querying channel capacities in the second layer network. The computer system determines a first public address for the first node based on information associated with a first channel that connects the computer system and the first node in the second layer network, and determines a second public address for the second node based on information associated with a second channel that connects the computer system and the second node in the second layer network. The first public address and the second public address are used to monitor activity in the first layer blockchain.
    Type: Application
    Filed: December 27, 2021
    Publication date: June 29, 2023
    Inventors: Muhammad Saad, Jakub Burgis, Raoul Johnson
  • Publication number: 20230195197
    Abstract: Techniques are described for adaptive device power management. The device interface application of a hardware computing unit detects a launch of an application by the operating system (OS) to be executed on the hardware computing unit, in an implementation. The device interface application identifies the launched application and determines whether a hardware profile exists that is associated with the application. The hardware profile includes one or more hardware parameters that yield the optimal performance for power consumption by the hardware computing unit when executing the launched application. Based on determining that the hardware profile exists, the power policy of the OS is updated for the launched application, and thereby, the driver updates the power state(s) of the hardware computing unit based on the new power policy.
    Type: Application
    Filed: December 21, 2021
    Publication date: June 22, 2023
    Inventors: MOHAMMAD HAMED MOUSAZADEH, JOOHYUN LEE, OMER IRSHAD, XUETAO YAN, ALEXANDER SABINO DUENAS, MUHAMMAD SAAD MUSANI
  • Publication number: 20230099276
    Abstract: Systems and processes are for measuring link metrics for a plurality of reference signals associated with a plurality of beams from a base station. The systems and methods are for determining that a link metric value is less than or equal to a predetermined threshold. The systems and process include detecting beam failure, classifying beam recovery as high priority, opportunistic beam failure recovery and performing an optimal random access channel (RACH) process through intelligent selection of beams and modules.
    Type: Application
    Filed: September 15, 2022
    Publication date: March 30, 2023
    Inventors: Muhammad Saad, Syed A. Rahim, Nitin A. Naik, Gopi Krishna Koneru, Vijay Venkataraman, Neeraj D. Vaghela
  • Publication number: 20230078257
    Abstract: Disclosed are embodiments for reducing likelihood of selecting a cell identified by a Radio Access Network (RAN) Notification Area ID (RNA ID) that is different from that identifying a last or current serving cell so as to avoid an RNA update procedure; reducing Random Access Channel (RACH) transmissions for an RNA update procedure and a mobile originated (MO) data transmission in response to a Radio Resource Control (RRC) triggered RNA update procedure; and selecting a band or beam in a multi-band/beam cellular system that improves RACH efficiency.
    Type: Application
    Filed: September 24, 2022
    Publication date: March 16, 2023
    Inventors: Vijay Venkataraman, Muthukumaran Dhanapal, Li Su, Sharad Garg, Syed A. Rahim, Sandeep K. Sunkesala, Jia Tang, Vijay Gadde, Tarakkumar G. Dhanani, Muhammad Saad
  • Publication number: 20220385667
    Abstract: Disclosed herein are system, method, and computer program product embodiments for displaying roles of an identity and access management (IAM) together with their corresponding compliance status of the assigned security policies with respect to a set of security rules. The method includes selecting a first role and a second role administered by an entity of the IAM system. Afterwards, the method includes determining, based on a set of security rules, a first compliance status of the first role associated with a first set of security policies; and a second compliance status of the second role associated with a second set of security policies. In addition, the method includes displaying on a GUI, the first role and the second role together with a first compliance status and a second compliance status.
    Type: Application
    Filed: May 28, 2021
    Publication date: December 1, 2022
    Applicant: Capital One Services, LLC
    Inventors: Matthew A. GHIOLD, Muhammad Saad TAHIR, Gavin MCGREW
  • Patent number: 11490306
    Abstract: Disclosed are embodiments for reducing likelihood of selecting a cell identified by a Radio Access Network (RAN) Notification Area ID (RNA ID) that is different from that identifying a last or current serving cell so as to avoid an RNA update procedure; reducing Random Access Channel (RACH) transmissions for an RNA update procedure and a mobile originated (MO) data transmission in response to a Radio Resource Control (RRC) triggered RNA update procedure; and selecting a band or beam in a multi-band/beam cellular system that improves RACH efficiency.
    Type: Grant
    Filed: June 29, 2020
    Date of Patent: November 1, 2022
    Assignee: APPLE INC.
    Inventors: Vijay Venkataraman, Muthukumaran Dhanapal, Li Su, Sharad Garg, Syed A. Rahim, Sandeep K. Sunkesala, Jia Tang, Vijay Gadde, Tarakkumar G. Dhanani, Muhammad Saad
  • Patent number: 11221393
    Abstract: A method and processor to determine spatial information regarding a vehicle. The method includes receiving at least one initial frame of FMCW radar data including spatial information regarding the vehicle associated with a radar signal reflected back from the vehicle via a surface of at least one stationary object other than the vehicle. The method also includes receiving at least one further frame of FMCW radar data including: spatial information regarding the vehicle associated with a radar signal reflected back from the vehicle via the surface of at least one stationary object other than the vehicle, and spatial information regarding the vehicle associated with a radar signal reflected directly back from the vehicle. The method further includes using the at least one initial frame of radar data to correct for static clutter associated with the at least one stationary object in the at least one further frame of radar data.
    Type: Grant
    Filed: December 6, 2019
    Date of Patent: January 11, 2022
    Assignee: NXP USA, Inc.
    Inventor: Muhammad Saad Nawaz
  • Publication number: 20210410030
    Abstract: Disclosed are embodiments for reducing likelihood of selecting a cell identified by a Radio Access Network (RAN) Notification Area ID (RNA ID) that is different from that identifying a last or current serving cell so as to avoid an RNA update procedure; reducing Random Access Channel (RACH) transmissions for an RNA update procedure and a mobile originated (MO) data transmission in response to a Radio Resource Control (RRC) triggered RNA update procedure; and selecting a band or beam in a multi-band/beam cellular system that improves RACH efficiency.
    Type: Application
    Filed: June 29, 2020
    Publication date: December 30, 2021
    Inventors: Vijay Venkataraman, Muthukumaran Dhanapal, Li Su, Sharad Garg, Syed A. Rahim, Sandeep K. Sunkesala, Jia Tang, Vijay Gadde, Tarakkumar G. Dhanani, Muhammad Saad
  • Publication number: 20210385707
    Abstract: Apparatuses, systems, and methods for RACH procedures to avoid excessive handover/secondary cell group failures. A base station may declare a handover and/or secondary cell group (SCG) failure and may determine that a failure threshold has been met. The base station may perform a remedial action in response to meeting the failure threshold. The failure threshold may be multi-dimensional, where a first dimension is associated with a number of handover/SCG failures and where a second dimension is associated with a time period in which the number of handover/SCG failures occurred. Further, a third dimension may be associated with a UE mobility state and a fourth dimension may be associated with whether the UE is using FR1 or FR2. The remedial action in response to meeting the failure threshold may include the base station suspending transmission of measurement object configurations for a specified period of time.
    Type: Application
    Filed: May 26, 2021
    Publication date: December 9, 2021
    Inventors: Muhammad Saad, Syed A. Rahim, Sharad Garg, Vijay Venkataraman, Jia Tang, Wenping Lou, Thanigaivelu Elangovan, Pengkai Zhao, Tarakkumar G. Dhanani
  • Patent number: 10955525
    Abstract: A method and apparatus for acquiring chirp data in a frequency modulated continuous wave (FMCW) radar system of a road vehicle. The method includes transmitting a FMCW signal comprising a plurality of ramping regions in which a frequency of the FMCW signal ramps up to a first frequency or ramps down to a second frequency. The method also includes receiving a reflected signal corresponding to the reflection of the FMCW signal from one or more physical objects. The reflected signal includes a plurality of ramping regions corresponding to the ramping regions of the transmitted FMCW signal. The method further includes sampling the reflected signal by: taking a plurality of samples in a ramping region in which the frequency of the reflected signal ramps up; and taking a plurality of samples in a ramping region in which the frequency of the reflected signal ramps down.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: March 23, 2021
    Assignee: NXP USA, INC.
    Inventors: Muhammad Saad Nawaz, Ralf Reuter