About
Articles by Amer
-
Webinar: Real world challenges developing Apple CareKit Apps – August 24, 11:00 am EDT
Webinar: Real world challenges developing Apple CareKit Apps – August 24, 11:00 am EDT
By Amer Haider
-
Doctella Showcases Innovative Patient-Centered Engagement Solution at Exponential Medicine
Doctella Showcases Innovative Patient-Centered Engagement Solution at Exponential Medicine
By Amer Haider
Activity
-
Joining the Annual Forum 2024 conference would be a valuable opportunity to engage with industry experts, network with peers, and gain insights into…
Joining the Annual Forum 2024 conference would be a valuable opportunity to engage with industry experts, network with peers, and gain insights into…
Liked by Amer Haider
-
Thank you to everyone who has signed up for our upcoming golf tournament! We are excited and looking forward to a fun and competitive event. We…
Thank you to everyone who has signed up for our upcoming golf tournament! We are excited and looking forward to a fun and competitive event. We…
Liked by Amer Haider
-
celebrating Guardrails AI 0.5.0 release and a fantastic onsite. check it out https://lnkd.in/dHhSSuJm
celebrating Guardrails AI 0.5.0 release and a fantastic onsite. check it out https://lnkd.in/dHhSSuJm
Liked by Amer Haider
Experience & Education
Volunteer Experience
-
Founder Parent
www.pehlaqadam.org
- Present 13 years 4 months
Children
Co-founded non-profit to eliminate untreated clubfoot from Pakistan and the world. Former board member of Ponseti International. We have treated over 2000 children.
Publications
-
Open source can accelerate Healthcare Data Interoperability
Institute of Medicine - National Academy of Medicine
-
Capital-Lite Semiconductor Model: Revitalizing Semiconductor Startup Investment
Global Semiconductor Alliance
Ideas on how to restart innovation and start-ups in the semiconductor market
Other authorsSee publication
Patents
-
Secure and zero knowledge data sharing for cloud applications
Issued US US10608817B2
Storing personal medical data in the cloud can be scary to users and in the case of a data breach a huge liability for companies and cloud providers. This patent covers the idea of giving patients the power to secure their data in the cloud using their own encryptions keys. The patient can decide who sees their data by granting access to temporary encryption keys. Since cloud providers or corporations do not have access to the patient's encryption keys they benefit from offering private storage…
Storing personal medical data in the cloud can be scary to users and in the case of a data breach a huge liability for companies and cloud providers. This patent covers the idea of giving patients the power to secure their data in the cloud using their own encryptions keys. The patient can decide who sees their data by granting access to temporary encryption keys. Since cloud providers or corporations do not have access to the patient's encryption keys they benefit from offering private storage and sharing with additional protection against liability and PR nightmares.
Other inventorsSee patent -
Apparatus and method for software enabled access to protected hardware resources
Issued US 9729320
We created this patent so we can enable features on processors in the field. The idea was to offer chip features as a service. We could sell chips with a low number of cores. If a customer wanted more performance they could pay us more money and enable more cores in the field. We have to consider power, yeild and BOM but in general the idea could be revolutionary in terms of business model and disrupting the $50B processor market
Other inventorsSee patent -
Guided discussion platform for multiple parties
Filed US US20170024748A1
This idea enables consultants and experts to augment their client sessions with a realtime tool that can guide the experts to think of multiple options during a discussion. Imagine you are a consultant and after asking your client 3-5 questions you need to start focusing in on a solution or diagnosis. Instead of thinking of the obvious answer, a tool gave you 2-3 additional questions that you should ask the client before going down a certain path. This idea could reduce diagnositc errors…
This idea enables consultants and experts to augment their client sessions with a realtime tool that can guide the experts to think of multiple options during a discussion. Imagine you are a consultant and after asking your client 3-5 questions you need to start focusing in on a solution or diagnosis. Instead of thinking of the obvious answer, a tool gave you 2-3 additional questions that you should ask the client before going down a certain path. This idea could reduce diagnositc errors, gather knowledge and ideas from other experts around the world and in general make consultant more powerful.
-
Secure Software Hardware Association
Issued US 8677144
Abstract: In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. This…
Abstract: In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. This cryptographic binding technique is referred to herein as secure software and hardware association (SSHA).
Other inventorsSee patent -
System and method for secure device key storage
Issued US 8661266
Abstract: Disclosed are systems and methods for protecting secret device keys, such as High-bandwidth Digital Content Protection (HDCP) device keys. Instead of storing secret device keys in the plain, a security algorithm and one or more protection keys are stored on the device. The security algorithm is applied to the secret device keys and the one or more protection keys to produce encrypted secret device keys. The encrypted secret device keys are then stored either on chip or off-chip.
Other inventorsSee patent -
System and method for enabling access to a protected hardware resource
Issued US 8544106
Abstract: Systems and methods are disclosed for enabling access to a protected hardware resource. A hardware component includes at least one protected hardware resource. A unique hardware ID and a unique cryptographically secure or randomly generated enable value (EV) are integrated in the hardware component at the time of manufacturing. At run-time, special software generates or receives from an external source an enable register (ER) value and a comparison is made with the stored enable…
Abstract: Systems and methods are disclosed for enabling access to a protected hardware resource. A hardware component includes at least one protected hardware resource. A unique hardware ID and a unique cryptographically secure or randomly generated enable value (EV) are integrated in the hardware component at the time of manufacturing. At run-time, special software generates or receives from an external source an enable register (ER) value and a comparison is made with the stored enable value. If the ER value and the EV match, access to the protected hardware resource is allowed.
Other inventorsSee patent -
Method and apparatus for estimating overshoot power after estimating power of executing events
Issued US US8356194
Abstract: Embodiments of the present invention relate to limiting maximum power dissipation occurred in a processor. Therefore, when an application that requires excessive amounts of power is being executed, the execution of the application may be prevented to reduce dissipated or consumed power. Example embodiments may stall the issue or execution of instructions by the processor, allowing software or hardware to reduce the power of an application by imposing a decrease in the performance of…
Abstract: Embodiments of the present invention relate to limiting maximum power dissipation occurred in a processor. Therefore, when an application that requires excessive amounts of power is being executed, the execution of the application may be prevented to reduce dissipated or consumed power. Example embodiments may stall the issue or execution of instructions by the processor, allowing software or hardware to reduce the power of an application by imposing a decrease in the performance of the application.
Other inventorsSee patent -
System and Method for Enabling Access to a Protected Hardware Resource
Issued US 20120027199
Abstract: Systems and methods are disclosed for enabling access to a protected hardware resource. A hardware component includes at least one protected hardware resource. A unique hardware ID and a unique cryptographically secure or randomly generated enable value (EV) are integrated in the hardware component at the time of manufacturing. At run-time, special software generates or receives from an external source an enable register (ER) value and a comparison is made with the stored enable…
Abstract: Systems and methods are disclosed for enabling access to a protected hardware resource. A hardware component includes at least one protected hardware resource. A unique hardware ID and a unique cryptographically secure or randomly generated enable value (EV) are integrated in the hardware component at the time of manufacturing. At run-time, special software generates or receives from an external source an enable register (ER) value and a comparison is made with the stored enable value. If the ER value and the EV match, access to the protected hardware resource is allowed.
Other inventorsSee patent -
System and Method for Secure Device Key Storage
Issued US 20120011373
Abstract: Disclosed are systems and methods for protecting secret device keys, such as High-bandwidth Digital Content Protection (HDCP) device keys. Instead of storing secret device keys in the plain, a security algorithm and one or more protection keys are stored on the device. The security algorithm is applied to the secret device keys and the one or more protection keys to produce encrypted secret device keys. The encrypted secret device keys are then stored either on chip or off-chip.
Other inventorsSee patent -
METHOD AND APPARATUS FOR POWER CONTROL
Issued US 20110185203
Abstract: Embodiments of the present invention relate to limiting maximum power dissipation occurred in a processor. Therefore, when an application that requires excessive amounts of power is being executed, the execution of the application may be prevented to reduce dissipated or consumed power. Example embodiments may stall the issue or execution of instructions by the processor, allowing software or hardware to reduce the power of an application by imposing a decrease in the performance of…
Abstract: Embodiments of the present invention relate to limiting maximum power dissipation occurred in a processor. Therefore, when an application that requires excessive amounts of power is being executed, the execution of the application may be prevented to reduce dissipated or consumed power. Example embodiments may stall the issue or execution of instructions by the processor, allowing software or hardware to reduce the power of an application by imposing a decrease in the performance of the application.
Other inventorsSee patent -
SECURE SOFTWARE AND HARDWARE ASSOCIATION TECHNIQUE
Issued US 20090217054
Abstract: In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. This…
Abstract: In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. This cryptographic binding technique is referred to herein as secure software and hardware association (SSHA).
Other inventorsSee patent
Languages
-
Urdu
-
Recommendations received
3 people have recommended Amer
Join now to viewMore activity by Amer
-
Today I explored Guangzhou, walking through charming narrow streets and alleys looking for small businesses to understand how they collect payments…
Today I explored Guangzhou, walking through charming narrow streets and alleys looking for small businesses to understand how they collect payments…
Liked by Amer Haider
-
Joe Biden’s presidency has been the most consequential in modern times. Its accomplishments on climate action, chips manufacturing, and…
Joe Biden’s presidency has been the most consequential in modern times. Its accomplishments on climate action, chips manufacturing, and…
Liked by Amer Haider
-
🏓 OPEN Silicon Valley Table Tennis Tournament Recap 🏆 This past Saturday, over 40 players from South Bay, East Bay, Walnut Creek, and as far as…
🏓 OPEN Silicon Valley Table Tennis Tournament Recap 🏆 This past Saturday, over 40 players from South Bay, East Bay, Walnut Creek, and as far as…
Liked by Amer Haider
Other similar profiles
-
Raghib Hussain
Connect -
Osman Rashid
Connect -
Rehan Jalil
Connect -
Shama Khan
Connect -
Naeem Zamindar
Connect -
Mobashar Yazdani
Connect -
Asif Peer
Connect -
Moazzam Chaudry
Connect -
Areeba Yasin
Development Manager @ SF New Deal | Founder and President @ OPEN Young Professionals
Connect -
Faraz Hoodbhoy
Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More