Patents by Inventor Zubair Ahmed

Zubair Ahmed has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8904232
    Abstract: Aspects of the subject matter described herein relate to auditing operations. In aspects, operations may be audited synchronously and/or asynchronously to one or more audit targets. When auditing synchronously, audit records may be written synchronously to an audit target. When auditing asynchronously, a buffer may be used to store audit records until the audit records are flushed to an audit target. If an error occurs in auditing, a policy may be evaluated to determine how to respond. One exemplary response includes failing an operation that triggered a subsequent audit record. Furthermore, if a buffer was unable to be copied to an audit target, the contents of the buffer may be preserved and one or more retries may be attempted to copy the buffer to the audit target.
    Type: Grant
    Filed: April 30, 2012
    Date of Patent: December 2, 2014
    Assignee: Microsoft Corporation
    Inventors: Zubair Ahmed Mughal, Jack S. Richins, Jerome R. Halmans
  • Patent number: 8898737
    Abstract: The authentication method for stateless address allocation in IPv6 networks provides a P2P trust-verification approach for identifying a rogue node. Alternatively, the authentication method provides an information hiding scheme to avoid being plagued by rogue nodes. In both cases, the authentication method is embodied in a computer software product having machine readable code.
    Type: Grant
    Filed: November 26, 2012
    Date of Patent: November 25, 2014
    Assignee: King Fahd University of Petroleum and Minerals
    Inventors: Zubair Ahmed Baig, Suli Charles Adeniye
  • Publication number: 20140149604
    Abstract: The authentication method for stateless address allocation in IPv6 networks provides a P2P trust-verification approach for identifying a rogue node. Alternatively, the authentication method provides an information hiding scheme to avoid being plagued by rogue nodes. In both cases, the authentication method is embodied in a computer software product having machine readable code.
    Type: Application
    Filed: November 26, 2012
    Publication date: May 29, 2014
    Applicant: KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS
    Inventors: ZUBAIR AHMED BAIG, SULI CHARLES ADENIYE
  • Publication number: 20140150058
    Abstract: The authentication method for stateless address allocation in IPv6 networks provides a P2P trust-verification approach for identifying a rogue node. Alternatively, the authentication method provides an information hiding scheme to avoid being plagued by rogue nodes. In both cases, the authentication method is embodied in a computer software product having machine readable code.
    Type: Application
    Filed: November 26, 2012
    Publication date: May 29, 2014
    Applicant: KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS
    Inventors: ZUBAIR AHMED BAIG, SULI CHARLES ADENIYE
  • Publication number: 20130290779
    Abstract: Aspects of the subject matter described herein relate to auditing operations. In aspects, operations may be audited synchronously and/or asynchronously to one or more audit targets. When auditing synchronously, audit records may be written synchronously to an audit target. When auditing asynchronously, a buffer may be used to store audit records until the audit records are flushed to an audit target. If an error occurs in auditing, a policy may be evaluated to determine how to respond. One exemplary response includes failing an operation that triggered a subsequent audit record. Furthermore, if a buffer was unable to be copied to an audit target, the contents of the buffer may be preserved and one or more retries may be attempted to copy the buffer to the audit target.
    Type: Application
    Filed: April 30, 2012
    Publication date: October 31, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Zubair Ahmed Mughal, Jack S. Richins, Jerome R. Halmans
  • Patent number: 7943755
    Abstract: The invention provides a gene silencing molecule, which is adapted to down-regulate expression of a gene encoding a peptide involved with the Rho-A inhibitory pathway. The gene silencing molecule is used to promote neuron survival and axon regeneration in the central nervous system (CNS). The invention also provides compositions and methods of using same to improve neural survival and promote axonal growth.
    Type: Grant
    Filed: October 22, 2004
    Date of Patent: May 17, 2011
    Assignee: Neuregenix Limited
    Inventors: Zubair Ahmed, Martin Berry, Ann Logan
  • Publication number: 20080253989
    Abstract: The invention provides a gene silencing molecule, which is adapted to down-regulate expression of a gene encoding a peptide involved with the Rho-A inhibitory pathway. The gene silencing molecule is used to promote neuron survival and axon regeneration in the central nervous system (CNS). The invention also provides compositions and methods of using same to improve neural survival and promote axonal growth.
    Type: Application
    Filed: October 22, 2004
    Publication date: October 16, 2008
    Applicant: NEUREGENIX LIMITED
    Inventors: Zubair Ahmed, Martin Berry, Ann Logan