Patents by Inventor Yassir Nawaz
Yassir Nawaz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160359631Abstract: A secure perfect hash function that has properties similar to those of cryptographic hash functions without compromising features of a perfect hash function such as speed and collision-free outputs is provided. A cryptographic hash function is utilized to process the set S and the. output is divided into three sub-outputs of required length. Each output can now be treated as a separate hash function (g(x), f1(x), f2(x)), S is split into r buckets Bi, 0?i<r, using the hash function g. Buckets Bi are permuted in a pseudorandom fashion. For each bucket Bi, a displacement pair (d0, d1) is chosen randomly from the sequence {(0,0), (0,1), . . . (0, m?1), (1,,0),(1,1), . . . , (1, m?1), . . . ,(m?1, m?1)} such that each element of Bi is placed in an empty bin given by (f1(x)+d0f2(x)+d1) mod m. The index of this displacement is stored in the sequence.Type: ApplicationFiled: June 8, 2015Publication date: December 8, 2016Applicant: Pitney Bowes Inc.Inventors: Yassir Nawaz, Femi Olumofin, Shi Hao Yuan
-
Patent number: 9443092Abstract: A system and method that allows two parties to find common records in their data sets without having to actually share the data sets with each other or a third party. Two primitives, perfect hash functions and public key cryptography, are combined in a unique way to obtain a secure and efficient private matching solution. Since the data that is exchanged is always encrypted during the match process, neither party reveals its data to the other party. This solution enables two parties to match sensitive data such as PII (Personally Identifiable Information) or PHI (Protected Health Information) without having to disclose the data to other or to any third party. One or both of the parties only learn of matching records without learning any information about the records that do not match.Type: GrantFiled: November 18, 2014Date of Patent: September 13, 2016Assignee: Pitney Bowes Inc.Inventors: Yassir Nawaz, Femi Olumofin
-
Publication number: 20160140348Abstract: A system and method that allows two parties to find common records in their data sets without having to actually share the data sets with each other or a third party. Two primitives, perfect hash functions and public key cryptography, are combined in a unique way to obtain a secure and efficient private matching solution. Since the data that is exchanged is always encrypted during the match process, neither party reveals its data to the other party. This solution enables two parties to match sensitive data such as PII (Personally Identifiable Information) or PHI (Protected Health Information) without having to disclose the data to other or to any third party. One or both of the parties only learn of matching records without learning any information about the records that do not match.Type: ApplicationFiled: November 18, 2014Publication date: May 19, 2016Applicant: PITNEY BOWES INC.Inventors: YASSIR NAWAZ, FEMI OLUMOFIN
-
Patent number: 9137631Abstract: Methods and systems that allow a user to receive location-based services for user selected businesses while maintaining the privacy of his/her location when not in the vicinity of a user selected business. A user designates selected businesses to the LBS provider. The user's mobile device sends its location, in encrypted form, to the LBS provider. The LBS provider performs a computation on the encrypted location and returns an encrypted result to the user's mobile device. The user's mobile device decrypts the result and determines whether the user is near any selected businesses based on the decrypted result. Only if the decrypted result indicates the user is near an approved location will the users mobile device return its location, in an unencrypted form, to the LBS provider. Thus, the LBS provider will only know the user's location if and only if the use is near a business selected by the user.Type: GrantFiled: December 27, 2012Date of Patent: September 15, 2015Assignee: Pitney Bowes Inc.Inventors: Yassir Nawaz, Jun Zhang, Christian A Geske
-
Patent number: 9084218Abstract: Methods and systems for a user to receive location-based services for user selected locations while maintaining the privacy of his/her location unless in the vicinity of a user selected location. A user designates selected locations to the LBS provider. The LBS provider digitally signs grid cell identifiers of approved locations and the signatures are stored in the user's mobile device. The mobile device determines the grid cell identifier of its current location, blinds the grid cell identifier, and sends the blinded grid cell identifier to the LBS provider. The LBS provider digitally signs the blinded grid cell identifier, and returns the signature to the mobile device. The mobile device removes the blinding from the blinded signature to obtain the digital signature for the grid cell identifier. The user's mobile device then compares the signature of the grid cell identifier with those stored in its memory to determine whether the user is near any approved locations.Type: GrantFiled: May 23, 2013Date of Patent: July 14, 2015Assignee: Pitney Bowes Inc.Inventor: Yassir Nawaz
-
Publication number: 20140349682Abstract: Methods and systems for a user to receive location-based services for user selected locations while maintaining the privacy of his/her location unless in the vicinity of a user selected location. A user designates selected locations to the LBS provider. The LBS provider digitally signs grid cell identifiers of approved locations and the signatures are stored in the user's mobile device. The mobile device determines the grid cell identifier of its current location, blinds the grid cell identifier, and sends the blinded grid cell identifier to the LBS provider. The LBS provider digitally signs the blinded grid cell identifier, and returns the signature to the mobile device. The mobile device removes the blinding from the blinded signature to obtain the digital signature for the grid cell identifier. The user's mobile device then compares the signature of the grid cell identifier with those stored in its memory to determine whether the user is near any approved locations.Type: ApplicationFiled: May 23, 2013Publication date: November 27, 2014Applicant: Pitney Bowes Inc.Inventor: YASSIR NAWAZ
-
Publication number: 20140337239Abstract: A system and methods that preserve the privacy of personal information of consumers as they seek to take advantage of offers advertised by sellers is provided. A seller can advertise services or benefits with some criteria prospective consumers must satisfy to qualify for such services or benefits. A consumer can make a statement that shows that he or she satisfies the criteria. The requesting party is able to verify the correctness of the statement without being able to learn any additional information about the value of the attributes contained in the statement, other than the information directly implied by the statement. A consumer can be enrolled for the benefit or service after a statement has been successfully verified.Type: ApplicationFiled: May 13, 2013Publication date: November 13, 2014Applicant: Pitney Bowes Inc.Inventors: YASSIR NAWAZ, Femi Olumofin
-
Publication number: 20140189018Abstract: Systems and methods for utilizing a digital mailbox to provide additional services with regard to physical mail are provided. A more efficient process for verification of address uses a corresponding digital mailbox to first identify potentially misdirected mailpieces before incurring the expense of a third party address record search. Additionally the system provides notifications related to physical mailpieces using a digital mailbox.Type: ApplicationFiled: December 28, 2012Publication date: July 3, 2014Applicant: PITNEY BOWES INC.Inventors: Yassir Nawaz, Frederick W. Ryan, JR., Femi Olumofin
-
Publication number: 20140187266Abstract: Methods and systems that allow a user to receive location-based services for user selected businesses while maintaining the privacy of his/her location when not in the vicinity of a user selected business. A user designates selected businesses to the LBS provider. The user's mobile device sends its location, in encrypted form, to the LBS provider. The LBS provider performs a computation on the encrypted location and returns an encrypted result to the user's mobile device. The user's mobile device decrypts the result and determines whether the user is near any selected businesses based on the decrypted result. Only if the decrypted result indicates the user is near an approved location will the users mobile device return its location, in an unencrypted form, to the LBS provider. Thus, the LBS provider will only know the user's location if and only if the use is near a business selected by the user.Type: ApplicationFiled: December 27, 2012Publication date: July 3, 2014Applicant: Pitney Bowes Inc.Inventors: Yassir Nawaz, Jun Zhang, Christian A. Geske
-
Patent number: 8705736Abstract: An image encryption method that includes receiving image data based on an image, wherein the image data comprises a plurality of pixel values, and permuting a plurality of, and preferably all of, the pixel values using at least a secret key to create permuted image data. Also, an image decryption method that includes scanning a printed image to create scanned image data. The printed image is generated from permuted image data that is generated by permuting a plurality of first pixel values of first image data using at least a secret key, obtaining a plurality of second pixel values from the scanned image data, and reverse-permuting a plurality of the second pixel values using at least the secret key to create reverse-permuted scanned image data.Type: GrantFiled: December 31, 2008Date of Patent: April 22, 2014Assignee: Pitney Bowes Inc.Inventors: Bertrand Haas, Ahmet E. Dirik, Yassir Nawaz
-
Patent number: 8208633Abstract: A method and system for securing the communication link between the accounting device and printer of a metering system by authenticating the data being sent via the link utilizing a Nonlinear Feedback Shift Register (NLFSR) based system is provided. A NLFSR is provided in each of the accounting unit and printing unit of a metering system. The NLFSR in the accounting unit is utilized to generate a message authentication code (MAC) for the image data being sent from the accounting unit to the printing unit. The printing unit generates a corresponding MAC for the received image data using the NLFSR in the printing unit. The MAC generated by the printing unit is compared with the MAC generated by the accounting unit. If the MACs are similar, the image data is accepted as authentic and the printing unit will print the image corresponding to the image data.Type: GrantFiled: November 24, 2008Date of Patent: June 26, 2012Assignee: Pitney Bowes Inc.Inventors: Robert A. Cordery, Frederick W. Ryan, Jr., Yassir Nawaz
-
Publication number: 20110093396Abstract: According to some embodiments, a power meter comprises an interface for a connection between a power outlet and a motor vehicle battery. A power measuring circuit may be coupled to the interface. A processor may be coupled to the power measuring circuit. The motor vehicle battery is installed in a motor vehicle. The power meter may be configured for installation in the motor vehicle. Furthermore, a computer-readable medium may be in communication with the processor and may store program instructions. The processor may be operative with the program instructions to receive identification information associated with the power outlet, record a measurement of an amount of electricity received by the motor vehicle battery from the power outlet during a charging transaction, and generate a receipt associated with the charging transaction. The identification information identifies an owner of the power outlet.Type: ApplicationFiled: October 16, 2009Publication date: April 21, 2011Applicant: Pitney Bowes Inc.Inventors: Arthur J. PARKOS, Maria Paz PARKOS, Yassir NAWAZ, Øivind SANN
-
Publication number: 20100169649Abstract: An image encryption method that includes receiving image data based on an image, wherein the image data comprises a plurality of pixel values, and permuting a plurality of, and preferably all of, the pixel values using at least a secret key to create permuted image data. Also, an image decryption method that includes scanning a printed image to create scanned image data. The printed image is generated from permuted image data that is generated by permuting a plurality of first pixel values of first image data using at least a secret key, obtaining a plurality of second pixel values from the scanned image data, and reverse-permuting a plurality of the second pixel values using at least the secret key to create reverse-permuted scanned image data.Type: ApplicationFiled: December 31, 2008Publication date: July 1, 2010Applicant: Pitney Bowes Inc.Inventors: Bertrand Haas, Ahmet E. Dirik, Yassir Nawaz
-
Publication number: 20100153011Abstract: An apparatus for evidencing an occurrence of a transaction is provided that includes a tamper indicating housing, a processing unit provided within the tamper indicating housing, and a cryptographic module also provided within the tamper indicating housing. The processing unit is adapted to: (i) determine current location information indicating a current location of the apparatus, (ii) obtain transaction information relating to the transaction, and (iii) compile a data block including at least the current location information and the transaction information. The cryptographic module is adapted to generate cryptographic evidence based on the data block. The processing unit may also be adapted to obtain current time information, and the data block may further include the current time information. The processing unit may also be adapted to obtain user authentication information, such as biometric information, and the data block may further include the user authentication information.Type: ApplicationFiled: December 17, 2008Publication date: June 17, 2010Applicant: Pitney Bowes Inc.Inventors: Andrei Obrea, Robert A. Cordery, Bradley R. Hammell, Yassir Nawaz, Frederick W. Ryan, JR.
-
Publication number: 20100146605Abstract: Methods and systems for authenticating website users without exposing passwords or other sensitive information to potential theft are provided. When the user's computer connects to a website server all communications are routed through a secure authentication device. When the authentication device identifies the need for user information to be submitted to the website server, the application retrieves the required information from memory and inserts the information into the appropriate location in the website forms. Since the secure connection to the website server is established in the secure boundary of the authentication device, the information is protected from being obtained by any malware that may reside in the user's computer.Type: ApplicationFiled: December 4, 2008Publication date: June 10, 2010Applicant: Pitney Bowes Inc.Inventors: Bradley R. Hammell, Yassir Nawaz, Frederick W. Ryan, JR.
-
Publication number: 20100128872Abstract: A method and system for securing the communication link between the accounting device and printer of a metering system by authenticating the data being sent via the link utilizing a Nonlinear Feedback Shift Register (NLFSR) based system is provided. A NLFSR is provided in each of the accounting unit and printing unit of a metering system. The NLFSR in the accounting unit is utilized to generate a message authentication code (MAC) for the image data being sent from the accounting unit to the printing unit. The printing unit generates a corresponding MAC for the received image data using the NLFSR in the printing unit. The MAC generated by the printing unit is compared with the MAC generated by the accounting unit. If the MACs are similar, the image data is accepted as authentic and the printing unit will print the image corresponding to the image data.Type: ApplicationFiled: November 24, 2008Publication date: May 27, 2010Applicant: Pitney Bowes Inc.Inventors: Robert A. Cordery, Frederick W. Ryan, JR., Yassir Nawaz