Patents by Inventor Nazmus Sakib

Nazmus Sakib has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11961080
    Abstract: Method and systems for securely and accurately authenticating a payment card by using biometric information associated with an authorized user is provided. The method may be implemented by providing a payment card that includes a processor; a display area coupled to the processor and configured to hide account information when the payment card has not been authenticated and to display the account information for a predetermined time interval when the payment card is authenticated; a sensor coupled to the processor and configured to capture biometric information of a user; and a communication interface coupled to the processor and configured to facilitate wireless communication with a mobile smart phone.
    Type: Grant
    Filed: August 17, 2021
    Date of Patent: April 16, 2024
    Assignee: JPMORGAN CHASE BANK. N.A.
    Inventors: Syed Rizwan Ali, Ankita Mehta, Vandana S Dubay, Neela Mukherjee, A K M Nazmus Sakib, Marc Dilodovico, Robert Crooks, Howard Spector, John L Oliver, III
  • Publication number: 20240048615
    Abstract: An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.
    Type: Application
    Filed: July 5, 2023
    Publication date: February 8, 2024
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Scott R. Shell, Kinshumann Kinshumann, Thomas W. Caldwell, Jeffrey A. Sutherland, Jeffrey R. McKune, Deskin M. Miller, Scott D. Anderson, Md. Nazmus Sakib
  • Patent number: 11893118
    Abstract: Embodiments described herein are directed to transferring the ownership of a computing device from one entity to another entity. For example, a security processor is utilized to boot the computing device. During a boot session, the security processor loads and executes boot code, which determines whether specialized firmware authorized by the current owner indicates whether a transfer of ownership is to occur. In response to determining that the specialized firmware indicates that a transfer of ownership is to occur, the secure processor loads and executes the specialized firmware. The specialized firmware, when executed, causes the security processor to program a set of fuses with the public key of the new owner. Execution of the specialized firmware also causes the security processor to invalidate the public key of the original owner, which is stored in another set of fuses.
    Type: Grant
    Filed: May 25, 2021
    Date of Patent: February 6, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Md. Nazmus Sakib, Bryan David Kelly, Ling Tony Chen, Peter David Waxman
  • Patent number: 11853428
    Abstract: Embodiments described herein are directed to firmware policy enforcement of a computing device. For example, a security processor of the computing device is utilized to boot the computing device. During a boot session, the security processor loads and executes specialized firmware. The specialized firmware, when executed, causes the security processor to determine whether other types of firmware to be executed on the computing device is in compliance with a policy specified by the specialized firmware. Based at least on a determination that the other firmware is in compliance with the policy, the security processor executes the other firmware. Based at least on a determination that the other firmware is not in compliance with the policy, the security processor performs a mitigation with respect to the other firmware.
    Type: Grant
    Filed: June 2, 2021
    Date of Patent: December 26, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Md. Nazmus Sakib, Bryan David Kelly, Ling Tony Chen, Peter David Waxman
  • Patent number: 11722566
    Abstract: An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.
    Type: Grant
    Filed: July 19, 2021
    Date of Patent: August 8, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Scott R. Shell, Kinshumann Kinshumann, Thomas W. Caldwell, Jeffrey A. Sutherland, Jeffrey R. McKune, Deskin M. Miller, Scott D. Anderson, Md. Nazmus Sakib
  • Publication number: 20230051347
    Abstract: Methods, systems, apparatuses, and computer-readable storage mediums described herein enable executable code of a hardware security platform (HSP) circuit to communicate with a hypervisor in a separate processor. The hypervisor generates and manages virtual machines. The HSP code comprises trusted platform module (TPM) logic, that processes TPM commands received via the hypervisor, and in response to the processing, communicates security information (e.g., measurements, keys, authorization data) with the virtual machines via the hypervisor. The TPM logic receives security information related to a virtual machine from the hypervisor and stores the security information in non-volatile memory of the HSP circuit, where security information from a particular VM is distinguishable from security information from another VM in the HSP memory.
    Type: Application
    Filed: August 12, 2021
    Publication date: February 16, 2023
    Inventors: Md. Nazmus SAKIB, Ronald AIGNER, Ling Tony CHEN, Peter David WAXMAN, David Guy WESTON, Bryan David KELLY
  • Publication number: 20220391510
    Abstract: Embodiments described herein are directed to firmware policy enforcement of a computing device. For example, a security processor of the computing device is utilized to boot the computing device. During a boot session, the security processor loads and executes specialized firmware. The specialized firmware, when executed, causes the security processor to determine whether other types of firmware to be executed on the computing device is in compliance with a policy specified by the specialized firmware. Based at least on a determination that the other firmware is in compliance with the policy, the security processor executes the other firmware. Based at least on a determination that the other firmware is not in compliance with the policy, the security processor performs a mitigation with respect to the other firmware.
    Type: Application
    Filed: June 2, 2021
    Publication date: December 8, 2022
    Inventors: Md. Nazmus SAKIB, Bryan David KELLY, Ling Tony CHEN, Peter David WAXMAN
  • Publication number: 20220382872
    Abstract: Embodiments described herein are directed to transferring the ownership of a computing device from one entity to another entity. For example, a security processor is utilized to boot the computing device. During a boot session, the security processor loads and executes boot code, which determines whether specialized firmware authorized by the current owner indicates whether a transfer of ownership is to occur. In response to determining that the specialized firmware indicates that a transfer of ownership is to occur, the secure processor loads and executes the specialized firmware. The specialized firmware, when executed, causes the security processor to program a set of fuses with the public key of the new owner. Execution of the specialized firmware also causes the security processor to invalidate the public key of the original owner, which is stored in another set of fuses.
    Type: Application
    Filed: May 25, 2021
    Publication date: December 1, 2022
    Inventors: Md. Nazmus SAKIB, Bryan David KELLY, Ling Tony CHEN, Peter David WAXMAN
  • Publication number: 20220327547
    Abstract: Method and systems for securely and accurately authenticating a payment card by using biometric information associated with an authorized user is provided. The method may be implemented by providing a payment card that includes a processor; a display area coupled to the processor and configured to hide account information when the payment card has not been authenticated and to display the account information for a predetermined time interval when the payment card is authenticated; a sensor coupled to the processor and configured to capture biometric information of a user; and a communication interface coupled to the processor and configured to facilitate wireless communication with a mobile smart phone.
    Type: Application
    Filed: August 17, 2021
    Publication date: October 13, 2022
    Applicant: JPMorgan Chase Bank, N.A.
    Inventors: Syed Rizwan ALI, Ankita MEHTA, Vandana S DUBAY, Neela MUKHERJEE, A K M Nazmus SAKIB, Marc DILODOVICO, Robert CROOKS, Howard SPECTOR, John L OLIVER, III
  • Publication number: 20220221743
    Abstract: Techniques for termination for microring modulators are disclosed. In the illustrative embodiment, a microring modulator on a photonic integrated circuit (PIC) die is modulated by radiofrequency (RF) signals connected to electrodes across the microring modulator. A resistor is connected to each of the electrodes. The resistors both provide termination for the RF signals, preventing or reducing reflections, as well as forming part of a bias tee, allowing for a DC bias voltage to be applied across the electrodes.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 14, 2022
    Applicant: Intel Corporation
    Inventors: Sanjeev Gupta, Olufemi I. Dosunmu, Nikolai Fediakine, Jin Hong, David Chak Wang Hui, Christian Malouin, Meer Nazmus Sakib, Jianying Zhou
  • Publication number: 20220182149
    Abstract: Embodiments herein relate to techniques for baseline wander (BLW) compensation. The technique may include identifying a data stream that is to be modulated by a ring modulator of an optical transmitter, wherein the data stream has a frequency operable to cause thermal-based BLW of an optical output of the optical transmitter. The technique may further include adjusting a time-varying direct current (DC) voltage bias of the ring modulator based on the frequency of the data stream. Other embodiments may be described and/or claimed.
    Type: Application
    Filed: February 21, 2022
    Publication date: June 9, 2022
    Inventors: Taehwan KIM, Hao LI, Meer Nazmus SAKIB, Haisheng RONG, Ganesh BALAMURUGAN, Sanjeev GUPTA, Jin HONG, Nikolai FEDIAKINE
  • Patent number: 11320584
    Abstract: Accelerating photonic and opto-electronic technologies requires breaking current limits of modern chip-scale photonic devices. While electronics and computer technologies have benefited from “Moore's Law” scaling, photonic technologies are conventionally limited in scale by the wavelength of light. Recent sub-wavelength optical devices use nanostructures and plasmonic devices but still face fundamental performance limitations arising from metal-induced optical losses and resonance-induced narrow optical bandwidths. The present disclosure instead confines and guides light at deeply sub-wavelength dimensions while preserving low-loss and broadband operation. The wave nature of light is used while employing metal-free (all-dielectric) nanostructure geometries which effectively “pinch” light into ultra-small active volumes, for potentially about 100-1000× reduction in energy consumption of active photonic components such as phase-shifters.
    Type: Grant
    Filed: May 8, 2020
    Date of Patent: May 3, 2022
    Assignee: Clemson University
    Inventors: Judson D. Ryckman, Nazmus Sakib
  • Patent number: 11263309
    Abstract: Integrity verification of a containerized application using a block device signature is described. For example, a container deployed to a host system is signed with a single block device signature. The operating system of the host system implements an integrity policy to verify the integrity of the container when the container is loaded into memory and when its program code executes. During such events, the operating system verifies whether the block device signature is valid. If the block device signature is determined to be valid, the operating system enables the program code to successfully execute. Otherwise, the program code is prevented from being executed. By doing so, certain program code or processes that are not properly signed are prevented from executing, thereby protecting the host system from such processes. Moreover, by using a single block device signature for a container, the enforcement of the integrity policy is greatly simplified.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: March 1, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Md Nazmus Sakib, Jeffrey A. Sutherland, Deven Robert Desai, Jaskaran Singh Khurana, Scott Randall Shell, Jessica M. Krynitsky
  • Publication number: 20220011408
    Abstract: In one embodiment, an apparatus includes: a waveguide formed of a PN junction, the waveguide to propagate optical power, the PN junction having a P region adjacent to an N region; and a silicon monitor photodetector formed of the PN junction and in-line with the waveguide to measure the optical power. The silicon monitor photodetector may further be formed of a P-doped region adjacent to the P region and an N-doped region adjacent to the N region. Other embodiments are described and claimed.
    Type: Application
    Filed: September 24, 2021
    Publication date: January 13, 2022
    Inventors: Meer Nazmus Sakib, Ranjeet Kumar, Haisheng Rong, Chaoxuan Ma
  • Publication number: 20220014587
    Abstract: An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.
    Type: Application
    Filed: July 19, 2021
    Publication date: January 13, 2022
    Inventors: Scott R. Shell, Kinshumann Kinshumann, Thomas W. Caldwell, Jeffrey A. Sutherland, Jeffrey R. McKune, Deskin M. Miller, Scott D. Anderson, Md. Nazmus Sakib
  • Publication number: 20210318561
    Abstract: A method may include: forming a base layer on a substrate; forming a waveguide assembly on the base layer, where the waveguide assembly is surrounded by a cladding layer; forming a trench opening through the cladding layer and the base layer; forming an undercut void by etching the substrate through the trench opening, where the undercut void extends under the waveguide assembly and the base layer; and filling the trench opening with a filler to seal off the undercut void. Other embodiments are described and claimed.
    Type: Application
    Filed: June 25, 2021
    Publication date: October 14, 2021
    Inventors: Meer Nazmus Sakib, Saeed Fathololoumi, Harel Frish, John Heck, Eddie Bononcini, Reece Defrees, Stanley J. Dobek, Aliasghar Eftekhar, Walter Garay, Lingtao Liu, Wei Qian
  • Patent number: 11143818
    Abstract: Embodiments include apparatuses, methods, and systems including a laser device having a 1×3 MMI coupler within a semiconductor layer. A front arm is coupled to the MMI coupler and terminated by a front reflector. In addition, a coarse tuning arm is coupled to the MMI coupler and terminated by a first back reflector for coarse wavelength tuning, a fine tuning arm is coupled to the MMI coupler and terminated by a second back reflector for fine wavelength tuning, and a SMSR and power tuning arm is coupled to the MMI coupler and terminated by a third back reflector. A gain region is above the front arm and above the semiconductor layer. Other embodiments may also be described and claimed.
    Type: Grant
    Filed: June 28, 2019
    Date of Patent: October 12, 2021
    Assignees: INTEL CORPORATION, REGENTS OF THE UNIVERSITY OF CALIFORNIA
    Inventors: Meer Nazmus Sakib, Guan-Lin Su, John Heck, Haisheng Rong, Ming C. Wu
  • Patent number: 11137283
    Abstract: Embodiments of the present disclosure are directed toward techniques and configurations for a photonic apparatus with a photodetector with bias control to provide substantially constant responsivity. The apparatus includes a first photodetector, to receive an optical input and provide a corresponding electrical output; a second photodetector coupled with the first photodetector, wherein the second photodetector is free from receipt of the optical input; and circuitry coupled with the first and second photodetectors, to generate a bias voltage, based at least in part on a dark current generated by the second photodetector in an absence of the optical input, and provide the generated bias voltage to the first photodetector. The first photodetector is to provide a substantially constant ratio of the electrical output to optical input in response to the provision of the generated bias voltage. Additional embodiments may be described and claimed.
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: October 5, 2021
    Assignee: Intel Corporation
    Inventors: Ganesh Balamurugan, Haisheng Rong, Meer Nazmus Sakib, Hao Li
  • Patent number: 11086985
    Abstract: Examples described herein generally relate to a computer device including a memory, and at least one processor configured to determine whether to allow execution of an application file on the computer device. The processor receives a command to execute a file. The processor determines whether the file is associated with a package reputation of an installation package. The processor determines a file reputation of the file. The processor determines whether to allow execution of the file based on a combination of the file reputation of the file and whether the file is associated with the good package reputation.
    Type: Grant
    Filed: December 4, 2017
    Date of Patent: August 10, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Md. Nazmus Sakib, Thomas Walter Caldwell, III, Jeffrey Sutherland, Deskin Miller, Scott Anderson, Deepak Jagannathan Manohar, Adrian Marinescu
  • Patent number: 11082491
    Abstract: An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.
    Type: Grant
    Filed: October 7, 2016
    Date of Patent: August 3, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Scott R. Shell, Kinshumann Kinshumann, Thomas W. Caldwell, Jeffrey A. Sutherland, Jeffrey R. McKune, Deskin M. Miller, Scott D. Anderson, Md. Nazmus Sakib