Patents by Inventor Muhammad Saad

Muhammad Saad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12182807
    Abstract: A method for generating a smart protocol includes providing, by a server computer system, a user interface to one or more of a plurality of users. The server computer system may receive, via the user interface, input specifying terms corresponding to a smart protocol that is to be deployed on a particular blockchain platform. The specified terms may include the plurality of users associated with the smart protocol and a web resource to be used to identify one or more external data. An execution of the smart protocol may be based on a value of the external data. Based on the specified terms, the server computer system may generate, without further input from the plurality of users, the smart protocol. The server computer system may deploy the smart protocol to the particular blockchain platform.
    Type: Grant
    Filed: March 14, 2022
    Date of Patent: December 31, 2024
    Assignee: PayPal, Inc.
    Inventors: Muhammad Saad, Raoul Johnson, Jakub Burgis
  • Publication number: 20240354743
    Abstract: Methods and systems for digital hot wallet protection are provided. A payment channel is established via a Layer-2 network of a cryptocurrency blockchain for transferring a cryptocurrency balance from a first digital wallet of a service provider to a second digital wallet of a trusted entity over a plurality of commitment transactions. A transaction receipt for each commitment transaction is transmitted to the trusted entity via a secure communication channel previously established between the service provider and the trusted entity outside of the Layer-2 network. A transaction log of the service provider is modified so that it no longer represents the current transaction state of the payment channel. Responsive to detecting a breach of the first wallet, a transaction is broadcast to a Layer-1 network of the blockchain for transferring the total cryptocurrency balance from the first wallet to the second wallet.
    Type: Application
    Filed: April 9, 2024
    Publication date: October 24, 2024
    Inventors: Jakub Burgis, Raoul Johnson, Andrew Marshall, Muhammad Saad
  • Publication number: 20240323150
    Abstract: A computing system includes a processor; and memory storing instructions that, when executed by the processor, cause the processor to perform several acts. The acts include receiving multiple messages from multiple users in a messaging application that supports group conversations, where the multiple messages are included in a group conversation. The acts also include providing a prompt to a generative model, where the prompt includes the multiple messages. The acts additionally include receiving, from the generative model, an output generated by the generative model based upon the prompt and including the output as a turn in the group conversation.
    Type: Application
    Filed: June 3, 2024
    Publication date: September 26, 2024
    Inventors: Ovidiu DAN, Ondrej STAROSTA, Guilherme ISCARO DE GODOY, Michal HANZLIK, Prateek TIWARI, Muhammad Saad SADIQ
  • Publication number: 20240305589
    Abstract: A computing system includes a processor; and memory storing instructions that, when executed by the processor, cause the processor to perform several acts. The acts include receiving multiple messages from multiple users in a messaging application that supports group conversations, where the multiple messages are included in a group conversation. The acts also include providing a prompt to a generative model, where the prompt includes the multiple messages. The acts additionally include receiving, from the generative model, an output generated by the generative model based upon the prompt and including the output as a turn in the group conversation.
    Type: Application
    Filed: September 29, 2023
    Publication date: September 12, 2024
    Inventors: Ovidiu DAN, Ondrej STAROSTA, Guilherme ISCARO DE GODOY, Michal HANZLIK, Prateek TIWARI, Muhammad Saad SADIQ
  • Publication number: 20240255572
    Abstract: A test and measurement instrument includes one or more ports to allow the instrument to connect to a DUT, a memory, a user interface including a display to display waveform signals received from the DUT and controls to allow a user to select settings for the instrument, and one or more processors configured to execute code that causes the one or more processors to: receive a signal from the DUT having multiple signal levels and multiple jitter thresholds; and adjust each measurement of the signal from the DUT using a jitter compensation value for each jitter threshold to produce a final measurement. A method includes receiving a waveform signal having multiple signal levels and multiple jitter thresholds from a device under test (DUT), and adjusting measurements of each level of the signal using a jitter compensation value for each level to produce final measurements.
    Type: Application
    Filed: January 8, 2024
    Publication date: August 1, 2024
    Inventors: Muhammad Saad Chughtai, Mark L. Guenther, Pavel R. Zivny
  • Publication number: 20240256842
    Abstract: A system, method, and computer readable medium for deploying neural networks in low bit environments. The system comprises a runtime platform, a first set of configuration parameters identifying limitations of the runtime platform, and a quantization platform for quantizing neural networks. The quantization platform receives a neural network associated with a framework and quantizing the neural network into a smaller neural network and generates a dataset comprising a second set of configuration parameters for compiling the smaller neural network into instructions for the runtime platform. The second set of configuration parameters are responsive to the limitations of the first set of configuration parameters. The runtime environment implements the smaller neural network in accordance with the second set of configuration parameters.
    Type: Application
    Filed: January 26, 2023
    Publication date: August 1, 2024
    Applicant: Deeplite Inc.
    Inventors: Muhammad Saad ASHFAQ, MohammadHossein ASKARI HEMMAT, Sudhakar SAH, Ehsan SABOORI, Ahmed HASSANIEN, Olivier MASTROPIETRO, Alexander HOFFMAN
  • Patent number: 12052622
    Abstract: Disclosed are embodiments for reducing likelihood of selecting a cell identified by a Radio Access Network (RAN) Notification Area ID (RNA ID) that is different from that identifying a last or current serving cell so as to avoid an RNA update procedure; reducing Random Access Channel (RACH) transmissions for an RNA update procedure and a mobile originated (MO) data transmission in response to a Radio Resource Control (RRC) triggered RNA update procedure; and selecting a band or beam in a multi-band/beam cellular system that improves RACH efficiency.
    Type: Grant
    Filed: September 24, 2022
    Date of Patent: July 30, 2024
    Assignee: APPLE INC.
    Inventors: Vijay Venkataraman, Muthukumaran Dhanapal, Li Su, Sharad Garg, Syed A. Rahim, Sandeep K. Sunkesala, Jia Tang, Vijay Gadde, Tarakkumar G. Dhanani, Muhammad Saad
  • Publication number: 20240248523
    Abstract: Techniques are described for adaptive device power management. The device interface application of a hardware computing unit detects a launch of an application by the operating system (OS) to be executed on the hardware computing unit, in an implementation. The device interface application identifies the launched application and determines whether a hardware profile exists that is associated with the application. The hardware profile includes one or more hardware parameters that yield the optimal performance for power consumption by the hardware computing unit when executing the launched application. Based on determining that the hardware profile exists, the power policy of the OS is updated for the launched application, and thereby, the driver updates the power state(s) of the hardware computing unit based on the new power policy.
    Type: Application
    Filed: April 6, 2024
    Publication date: July 25, 2024
    Inventors: Mohammad Hamed Mousazadeh, Joohyun Lee, Omer Irshad, Xuetao Yan, Alexander Sabino Duenas, Muhammad Saad Musani
  • Publication number: 20240249121
    Abstract: A system, method and computer readable medium for implementing neural networks. The method can include providing a neural network, providing a lookup table based on the neural network, packing weights and activations of the neural network associated with the at least one convolution with a first set of bitwise operations, unpacking the packed weights and activations, with a second set of bitwise operations, to determine one or more inputs for the look up table. The method includes accessing, within the lookup table, an output corresponding to the one or more inputs, and implement the at least one convolution based on the output.
    Type: Application
    Filed: January 19, 2024
    Publication date: July 25, 2024
    Applicant: Deeplite Inc.
    Inventors: Muhammad Saad ASHFAQ, Saptarshi MITRA, Alexander HOFFMAN, Darshan Chandrashekhar GANJI, Ahmed HASSANIEN, Sudhakar SAH, Ehsan SABOORI, MohammadHossein ASKARI HEMMAT
  • Publication number: 20240187417
    Abstract: Disclosed herein are system, method, and computer program product embodiments for displaying roles of an identity and access management (IAM) together with their corresponding compliance status of the assigned security policies with respect to a set of security rules. The method includes selecting a first role and a second role administered by an entity of the IAM system. Afterwards, the method includes determining, based on a set of security rules, a first compliance status of the first role associated with a first set of security policies; and a second compliance status of the second role associated with a second set of security policies. In addition, the method includes displaying on a GUI, the first role and the second role together with a first compliance status and a second compliance status.
    Type: Application
    Filed: February 12, 2024
    Publication date: June 6, 2024
    Applicant: Capital One Services, LLC
    Inventors: Matthew A. GHIOLD, Muhammad Saad TAHIR, Gavin MCGREW
  • Patent number: 11978038
    Abstract: Methods and systems for digital hot wallet protection are provided. A payment channel is established via a Layer-2 network of a cryptocurrency blockchain for transferring a cryptocurrency balance from a first digital wallet of a service provider to a second digital wallet of a trusted entity over a plurality of commitment transactions. A transaction receipt for each commitment transaction is transmitted to the trusted entity via a secure communication channel previously established between the service provider and the trusted entity outside of the Layer-2 network. A transaction log of the service provider is modified so that it no longer represents the current transaction state of the payment channel Responsive to detecting a breach of the first wallet, a transaction is broadcast to a Layer-1 network of the blockchain for transferring the total cryptocurrency balance from the first wallet to the second wallet.
    Type: Grant
    Filed: May 6, 2022
    Date of Patent: May 7, 2024
    Assignee: PAYPAL, INC.
    Inventors: Jakub Burgis, Raoul Johnson, Andrew Marshall, Muhammad Saad
  • Patent number: 11953965
    Abstract: Techniques are described for adaptive device power management. The device interface application of a hardware computing unit detects a launch of an application by the operating system (OS) to be executed on the hardware computing unit, in an implementation. The device interface application identifies the launched application and determines whether a hardware profile exists that is associated with the application. The hardware profile includes one or more hardware parameters that yield the optimal performance for power consumption by the hardware computing unit when executing the launched application. Based on determining that the hardware profile exists, the power policy of the OS is updated for the launched application, and thereby, the driver updates the power state(s) of the hardware computing unit based on the new power policy.
    Type: Grant
    Filed: December 21, 2021
    Date of Patent: April 9, 2024
    Assignee: ATI Technologies ULC
    Inventors: Mohammad Hamed Mousazadeh, Joohyun Lee, Omer Irshad, Xuetao Yan, Alexander Sabino Duenas, Muhammad Saad Musani
  • Publication number: 20240104568
    Abstract: Methods and systems are presented for cross-entity fraud mitigation. A refund request for a transaction between a first entity and a second entity is received via a network from a device of the first entity. A transaction history associated with an account of the first entity with a service provider is obtained. From the obtained transaction history, metadata relating to previous refund requests processed for previous transactions associated with the account of the first entity is extracted. The extracted metadata is evaluated to determine a risk score for the refund request received for the transaction, where the risk score indicating a risk of fraud associated with the refund request. A decision on authorization of the refund request is generated for the transaction, based on the risk score. A notification of the decision is transmitted via the network to a device of the second entity.
    Type: Application
    Filed: September 22, 2022
    Publication date: March 28, 2024
    Inventors: Adam Oest, Raoul Johnson, Muhammad Saad
  • Patent number: 11917464
    Abstract: Apparatuses, systems, and methods for RACH procedures to avoid excessive handover/secondary cell group failures. A base station may declare a handover and/or secondary cell group (SCG) failure and may determine that a failure threshold has been met. The base station may perform a remedial action in response to meeting the failure threshold. The failure threshold may be multi-dimensional, where a first dimension is associated with a number of handover/SCG failures and where a second dimension is associated with a time period in which the number of handover/SCG failures occurred. Further, a third dimension may be associated with a UE mobility state and a fourth dimension may be associated with whether the UE is using FR1 or FR2. The remedial action in response to meeting the failure threshold may include the base station suspending transmission of measurement object configurations for a specified period of time.
    Type: Grant
    Filed: May 26, 2021
    Date of Patent: February 27, 2024
    Assignee: Apple Inc.
    Inventors: Muhammad Saad, Syed A Rahim, Sharad Garg, Vijay Venkataraman, Jia Tang, Wenping Lou, Thanigaivelu Elangovan, Pengkai Zhao, Tarakkumar G Dhanani
  • Patent number: 11902282
    Abstract: Disclosed herein are system, method, and computer program product embodiments for displaying roles of an identity and access management (IAM) together with their corresponding compliance status of the assigned security policies with respect to a set of security rules. The method includes selecting a first role and a second role administered by an entity of the IAM system. Afterwards, the method includes determining, based on a set of security rules, a first compliance status of the first role associated with a first set of security policies; and a second compliance status of the second role associated with a second set of security policies. In addition, the method includes displaying on a GUI, the first role and the second role together with a first compliance status and a second compliance status.
    Type: Grant
    Filed: May 28, 2021
    Date of Patent: February 13, 2024
    Assignee: Capital One Services, LLC
    Inventors: Matthew A. Ghiold, Muhammad Saad Tahir, Gavin McGrew
  • Publication number: 20230394471
    Abstract: Methods and systems are presented for providing a framework for facilitating time-sensitive cryptocurrency transactions for users. When a request for processing a time-sensitive cryptocurrency transaction using funds from a cryptocurrency wallet is received from a user, a transaction system first verifies whether the cryptocurrency wallet has a balance to cover the cryptocurrency transaction. The transaction system also verifies the ownership of the cryptocurrency wallet based on an asynchronous method. The user generates verification data without any input from the transaction system, and based on a private key associated with the cryptocurrency wallet, a generator function, and a user-generated value. Without knowing the user-generated value, the transaction system verifies the ownership of the cryptocurrency wallet based on the verification data, and processes the transaction for the user.
    Type: Application
    Filed: June 3, 2022
    Publication date: December 7, 2023
    Inventors: Muhammad Saad, Jakub Burgis, Raoul Johnson
  • Publication number: 20230360024
    Abstract: Methods and systems for digital hot wallet protection are provided. A payment channel is established via a Layer-2 network of a cryptocurrency blockchain for transferring a cryptocurrency balance from a first digital wallet of a service provider to a second digital wallet of a trusted entity over a plurality of commitment transactions. A transaction receipt for each commitment transaction is transmitted to the trusted entity via a secure communication channel previously established between the service provider and the trusted entity outside of the Layer-2 network. A transaction log of the service provider is modified so that it no longer represents the current transaction state of the payment channel Responsive to detecting a breach of the first wallet, a transaction is broadcast to a Layer-1 network of the blockchain for transferring the total cryptocurrency balance from the first wallet to the second wallet.
    Type: Application
    Filed: May 6, 2022
    Publication date: November 9, 2023
    Inventors: Jakub Burgis, Raoul Johnson, Andrew Marshall, Muhammad Saad
  • Publication number: 20230344649
    Abstract: A method includes a first device receiving, from a second device, an interaction request message comprising an amount and a second device certificate. The first device can verify the second device certificate using a server computer public key corresponding to a server computer private key. A trusted application in a secure element of the first device can determine whether or not the amount is less than an offline amount stored in the secure element. If the amount is less than the offline amount, the trusted application can determine an updated offline amount based on the amount. The trusted application can generate an interaction response message comprising the amount and a trusted application certificate. The first device can then provide the interaction response message to the second device.
    Type: Application
    Filed: July 21, 2021
    Publication date: October 26, 2023
    Applicant: Visa International Service Association
    Inventors: Mahdi Zamani, Ranjit Kumaresan, Mihai Christodorescu, Cuy Sheffield, Benjamin Price, Wanyun Gu, Minghua Xu, Srinivasan Raghuraman, Muhammad Saad, Mustafa Ozdayi, Mohammad Mohsen Minaei Bidgoli, Sourav Das
  • Publication number: 20230298005
    Abstract: Methods and systems described herein may implement blockchain cryptocurrency transactions in a variety of environments. An online transaction processor may provide operations for cryptocurrency conversions. The transaction processor may detect that a user is involved in a cryptocurrency transaction with another entity, which is requested to be processed using an amount of cryptocurrency and using an off-chain amount of the cryptocurrency. The transaction processor may determine that the entity does not have a digital wallet, node, or the like on a layer two network to receive and/or process the off-chain balance for the cryptocurrency. The transaction processor may then, after a risk assessment, determine that the user may access the amount of the cryptocurrency from an on-chain balance available to a digital wallet of the cryptocurrency. The transaction processor may make that on-chain amount available and may request repayment via the user's off-chain balance.
    Type: Application
    Filed: March 17, 2022
    Publication date: September 21, 2023
    Inventors: Muhammad Saad, Raoul Johnson, Jakub Burgis
  • Publication number: 20230289790
    Abstract: A method for generating a smart protocol includes providing, by a server computer system, a user interface to one or more of a plurality of users. The server computer system may receive, via the user interface, input specifying terms corresponding to a smart protocol that is to be deployed on a particular blockchain platform. The specified terms may include the plurality of users associated with the smart protocol and a web resource to be used to identify one or more external data. An execution of the smart protocol may be based on a value of the external data. Based on the specified terms, the server computer system may generate, without further input from the plurality of users, the smart protocol. The server computer system may deploy the smart protocol to the particular blockchain platform.
    Type: Application
    Filed: March 14, 2022
    Publication date: September 14, 2023
    Inventors: Muhammad Saad, Raoul Johnson, Jakub Burgis