Amer Haider

San Francisco Bay Area Contact Info
7K followers 500+ connections

Join to view profile

About

Experienced and goal-driven business leader with deep expertise in creating…

Articles by Amer

See all articles

Activity

Join now to see all activity

Experience & Education

  • Growing Stronger

View Amer’s full experience

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Volunteer Experience

  • Founder Parent

    www.pehlaqadam.org

    - Present 13 years 4 months

    Children

    Co-founded non-profit to eliminate untreated clubfoot from Pakistan and the world. Former board member of Ponseti International. We have treated over 2000 children.

Publications

Patents

  • Secure and zero knowledge data sharing for cloud applications

    Issued US US10608817B2

    Storing personal medical data in the cloud can be scary to users and in the case of a data breach a huge liability for companies and cloud providers. This patent covers the idea of giving patients the power to secure their data in the cloud using their own encryptions keys. The patient can decide who sees their data by granting access to temporary encryption keys. Since cloud providers or corporations do not have access to the patient's encryption keys they benefit from offering private storage…

    Storing personal medical data in the cloud can be scary to users and in the case of a data breach a huge liability for companies and cloud providers. This patent covers the idea of giving patients the power to secure their data in the cloud using their own encryptions keys. The patient can decide who sees their data by granting access to temporary encryption keys. Since cloud providers or corporations do not have access to the patient's encryption keys they benefit from offering private storage and sharing with additional protection against liability and PR nightmares.

    Other inventors
    See patent
  • Apparatus and method for software enabled access to protected hardware resources

    Issued US 9729320

    We created this patent so we can enable features on processors in the field. The idea was to offer chip features as a service. We could sell chips with a low number of cores. If a customer wanted more performance they could pay us more money and enable more cores in the field. We have to consider power, yeild and BOM but in general the idea could be revolutionary in terms of business model and disrupting the $50B processor market

    Other inventors
    See patent
  • Guided discussion platform for multiple parties

    Filed US US20170024748A1

    This idea enables consultants and experts to augment their client sessions with a realtime tool that can guide the experts to think of multiple options during a discussion. Imagine you are a consultant and after asking your client 3-5 questions you need to start focusing in on a solution or diagnosis. Instead of thinking of the obvious answer, a tool gave you 2-3 additional questions that you should ask the client before going down a certain path. This idea could reduce diagnositc errors…

    This idea enables consultants and experts to augment their client sessions with a realtime tool that can guide the experts to think of multiple options during a discussion. Imagine you are a consultant and after asking your client 3-5 questions you need to start focusing in on a solution or diagnosis. Instead of thinking of the obvious answer, a tool gave you 2-3 additional questions that you should ask the client before going down a certain path. This idea could reduce diagnositc errors, gather knowledge and ideas from other experts around the world and in general make consultant more powerful.

    See patent
  • Secure Software Hardware Association

    Issued US 8677144

    Abstract: In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. This…

    Abstract: In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. This cryptographic binding technique is referred to herein as secure software and hardware association (SSHA).

    Other inventors
    See patent
  • System and method for secure device key storage

    Issued US 8661266

    Abstract: Disclosed are systems and methods for protecting secret device keys, such as High-bandwidth Digital Content Protection (HDCP) device keys. Instead of storing secret device keys in the plain, a security algorithm and one or more protection keys are stored on the device. The security algorithm is applied to the secret device keys and the one or more protection keys to produce encrypted secret device keys. The encrypted secret device keys are then stored either on chip or off-chip.

    Other inventors
    See patent
  • System and method for enabling access to a protected hardware resource

    Issued US 8544106

    Abstract: Systems and methods are disclosed for enabling access to a protected hardware resource. A hardware component includes at least one protected hardware resource. A unique hardware ID and a unique cryptographically secure or randomly generated enable value (EV) are integrated in the hardware component at the time of manufacturing. At run-time, special software generates or receives from an external source an enable register (ER) value and a comparison is made with the stored enable…

    Abstract: Systems and methods are disclosed for enabling access to a protected hardware resource. A hardware component includes at least one protected hardware resource. A unique hardware ID and a unique cryptographically secure or randomly generated enable value (EV) are integrated in the hardware component at the time of manufacturing. At run-time, special software generates or receives from an external source an enable register (ER) value and a comparison is made with the stored enable value. If the ER value and the EV match, access to the protected hardware resource is allowed.

    Other inventors
    See patent
  • Method and apparatus for estimating overshoot power after estimating power of executing events

    Issued US US8356194

    Abstract: Embodiments of the present invention relate to limiting maximum power dissipation occurred in a processor. Therefore, when an application that requires excessive amounts of power is being executed, the execution of the application may be prevented to reduce dissipated or consumed power. Example embodiments may stall the issue or execution of instructions by the processor, allowing software or hardware to reduce the power of an application by imposing a decrease in the performance of…

    Abstract: Embodiments of the present invention relate to limiting maximum power dissipation occurred in a processor. Therefore, when an application that requires excessive amounts of power is being executed, the execution of the application may be prevented to reduce dissipated or consumed power. Example embodiments may stall the issue or execution of instructions by the processor, allowing software or hardware to reduce the power of an application by imposing a decrease in the performance of the application.

    Other inventors
    See patent
  • System and Method for Enabling Access to a Protected Hardware Resource

    Issued US 20120027199

    Abstract: Systems and methods are disclosed for enabling access to a protected hardware resource. A hardware component includes at least one protected hardware resource. A unique hardware ID and a unique cryptographically secure or randomly generated enable value (EV) are integrated in the hardware component at the time of manufacturing. At run-time, special software generates or receives from an external source an enable register (ER) value and a comparison is made with the stored enable…

    Abstract: Systems and methods are disclosed for enabling access to a protected hardware resource. A hardware component includes at least one protected hardware resource. A unique hardware ID and a unique cryptographically secure or randomly generated enable value (EV) are integrated in the hardware component at the time of manufacturing. At run-time, special software generates or receives from an external source an enable register (ER) value and a comparison is made with the stored enable value. If the ER value and the EV match, access to the protected hardware resource is allowed.

    Other inventors
    See patent
  • System and Method for Secure Device Key Storage

    Issued US 20120011373

    Abstract: Disclosed are systems and methods for protecting secret device keys, such as High-bandwidth Digital Content Protection (HDCP) device keys. Instead of storing secret device keys in the plain, a security algorithm and one or more protection keys are stored on the device. The security algorithm is applied to the secret device keys and the one or more protection keys to produce encrypted secret device keys. The encrypted secret device keys are then stored either on chip or off-chip.

    Other inventors
    See patent
  • METHOD AND APPARATUS FOR POWER CONTROL

    Issued US 20110185203

    Abstract: Embodiments of the present invention relate to limiting maximum power dissipation occurred in a processor. Therefore, when an application that requires excessive amounts of power is being executed, the execution of the application may be prevented to reduce dissipated or consumed power. Example embodiments may stall the issue or execution of instructions by the processor, allowing software or hardware to reduce the power of an application by imposing a decrease in the performance of…

    Abstract: Embodiments of the present invention relate to limiting maximum power dissipation occurred in a processor. Therefore, when an application that requires excessive amounts of power is being executed, the execution of the application may be prevented to reduce dissipated or consumed power. Example embodiments may stall the issue or execution of instructions by the processor, allowing software or hardware to reduce the power of an application by imposing a decrease in the performance of the application.

    Other inventors
    See patent
  • SECURE SOFTWARE AND HARDWARE ASSOCIATION TECHNIQUE

    Issued US 20090217054

    Abstract: In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. This…

    Abstract: In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. This cryptographic binding technique is referred to herein as secure software and hardware association (SSHA).

    Other inventors
    See patent

Languages

  • Urdu

    -

Recommendations received

More activity by Amer

View Amer’s full profile

  • See who you know in common
  • Get introduced
  • Contact Amer directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Amer Haider

Add new skills with these courses