Muhammed Jaber, Age 5310903 Centennial Trl, Austin, TX 78726

Muhammed Jaber Phones & Addresses

10903 Centennial Trl, Austin, TX 78726 (512) 331-8664

40 Forest Mesa, Round Rock, TX 78664 (512) 238-7228 (512) 341-7275

1173 Southern Pl, Round Rock, TX 78664 (512) 238-7228

Mentions for Muhammed Jaber

Public records

Vehicle Records

Muhammed Jaber

Address:
PO Box 203955, Austin, TX 78720
VIN:
5FNYF28587B037936
Make:
HONDA
Model:
PILOT
Year:
2007

Publications

Us Patents

Method And System For Operating System Quiescent State

US Patent:
7089433, Aug 8, 2006
Filed:
Sep 26, 2003
Appl. No.:
10/672129
Inventors:
Craig Chaiken - Pflugerville TX,
Muhammed K. Jaber - Round Rock TX,
Kendall C. Witte - Austin TX,
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
G06F 1/26
US Classification:
713300
Abstract:
Information handling system functions performed with an information handling system operating system in a quiescent state, such as ROM flashing, diagnostics BIOS warning screens and hard disc drive backup, are supported through an operating system quiescent state initiated by a simulated power down state which leaves one or more processing components of the information handling system operational. For instance, an operating system utility sets a BIOS flag and pointer so that an ACPI S3 power down state places the operating system in a quiescent state but an S3 suspend call from the operating system is intercepted and a quiescent state function called by the BIOS. Recovery of the operating system from the quiescent state is initiated with the BIOS so that a reboot of the information handling system is avoided.

System And Method For Managing Information Handling System Hard Disk Drive Password Protection

US Patent:
2007006, Mar 15, 2007
Filed:
Sep 15, 2005
Appl. No.:
11/227356
Inventors:
James Dailey - Round Rock TX,
Muhammed Jaber - Austin TX,
International Classification:
G06F 12/14
US Classification:
726019000
Abstract:
Denial of service attacks on information handling system processing components having password protection, such as a hard disk drive, are prevented by automatically setting a password on the processing component during start-up of the information handling system if a password is not set. The automatically set password prevents a malicious program from illicitly setting a password on the processing component during operation of the information handling system. At power down, the automatically set password is removed to avoid interference with operation of the processing component during a subsequent start-up. In the event of an abnormal power down that fails to remove the automatically set password, the start-up process includes an attempt to unlock the processing component with the automatically set password.

System And Method For Secure Provisioning Of An Information Handling System

US Patent:
2014006, Mar 6, 2014
Filed:
Nov 8, 2013
Appl. No.:
14/074940
Inventors:
Muhammed Jaber - Austin TX,
Sudhir Shetty - Cedar Park TX,
Theodore Webb, III - Austin TX,
John Wilson - Burnet TX,
International Classification:
H04L 9/32
US Classification:
713156
Abstract:
Systems and methods for reducing problems and disadvantages associated with provisioning of information handling systems, including without limitation those associated with bare metal provisioning of information handling systems, are disclosed. A system may include a processor, and a memory and an access controller each communicatively coupled to the processor. The access controller may store an enterprise public key associated with an enterprise private key and a platform private key associated with the system. The access controller may be configured to: (i) authenticate communications received from a provisioning server communicatively coupled to the access controller based at least on an enterprise public certificate associated with the provisioning server and (ii) establish an asymmetrically cryptographic communications channel between the access controller and the provisioning server based at least on a platform public key associated with the platform private key, the platform private key, the enterprise public key, and the enterprise private key.

Arbitrary Code Execution And Restricted Protected Storage Access To Trusted Code

US Patent:
2014006, Mar 6, 2014
Filed:
Aug 28, 2012
Appl. No.:
13/596558
Inventors:
Muhammed K. Jaber - Austin TX,
Quy N. Hoang - Round Rock TX,
Shawn J. Dube - Austin TX,
Assignee:
DELL PRODUCTS, LP - Round Rock TX
International Classification:
G06F 21/00
US Classification:
713 2, 713189
Abstract:
A method comprises signing boot code with a public/private cryptographic key pair, and writing to storage the boot code, the public cryptographic key, and the signed boot code.

Single Command Functionality For Providing Data Security And Preventing Data Access Within A Decommisioned Information Handling System

US Patent:
2014002, Jan 23, 2014
Filed:
Jul 17, 2012
Appl. No.:
13/551033
Inventors:
Muhammed Jaber - Austin TX,
Jon Hass - Austin TX,
Theodore Webb - Austin TX,
Assignee:
DELL PRODUCTS L.P. - Round Rock TX
International Classification:
G06F 21/24
US Classification:
713164
Abstract:
A computer-implemented method comprises a service processor: establishing a kill switch encryption key (KSEK) to provide data security for data within storage devices of configurable components within a system; automatically encrypting, with the KSEK, data that is written to one of the storage devices; configuring the configurable components to prevent access to the stored data unless a valid copy of the KSEK is received from the service processor along with the request for the data; automatically decrypting, with the KSEK, the KSEK-encrypted data that is read from storage device; and in response to receiving a verified request to decommission the system, performing the decommissioning by deleting/erasing the KSEK from a secure storage at which the only instance of the KSEK is maintained. Deletion of the KSEK results in a permanent loss of access to the stored encrypted data within the system because the stored encrypted data cannot be decrypted without the KSEK.

Methods And Systems For Information Assurance And Supply Chain Security

US Patent:
2013019, Jul 25, 2013
Filed:
Jan 23, 2012
Appl. No.:
13/355788
Inventors:
Muhammed Jaber - Austin TX,
Mukund Purshottam Khatri - Austin TX,
Richard Holmberg - Austin TX,
Assignee:
DELL PRODUCTS L.P. - Round Rock TX
International Classification:
G06F 21/00
US Classification:
726 1, 726 28
Abstract:
In accordance with additional embodiments of the present disclosure, a method may include storing information regarding one or more components of the information handling system to a database, the database stored on a basic input/output system (BIOS) of the information handling system prior to shipment of an information handling system. The method may also include, between the time of shipment of the information handling system to receipt of the information handling system by an intended customer of the information handling system: logging events associated with one or more components of the information handling system, and storing information associated with the events in the database. The method may further include interfacing with an authorized user of the information associated with the events to allow the authorized user to access the information associated with the events.

Systems And Methods For Multi-Layered Authentication/verification Of Trusted Platform Updates

US Patent:
2013018, Jul 18, 2013
Filed:
Jan 17, 2012
Appl. No.:
13/351872
Inventors:
Muhammed Jaber - Austin TX,
Mukund Khatri - Austin TX,
International Classification:
H04L 9/32
US Classification:
713176
Abstract:
In accordance with the present disclosure, a system and method for multilayered authentication of trusted platform updates is described. The method may include storing first cryptographic data in a personality module of an information handling system, with the first cryptographic data corresponding to a verified firmware component. A second cryptographic data may also be determined, with the second cryptographic data corresponding to an unverified firmware component. The unverified firmware component may be stored in a memory element of the information handling system, and the second cryptographic data may be determined using a processor of the information handling system. The method may further include determining if the first cryptographic data matches the second cryptographic data and updating firmware in the information handling system with the unverified firmware component if the first cryptographic data matches the second cryptographic data, and the unverified firmware component includes a digital signature of a manufacturer.

System And Method For Establishing Perpetual Trust Among Platform Domains

US Patent:
2013000, Jan 3, 2013
Filed:
Jun 30, 2011
Appl. No.:
13/174462
Inventors:
Muhammed Jaber - Austin TX,
Marshal Savage - Austin TX,
Mukund Purshottam Khatri - Austin TX,
Assignee:
DELL PRODUCTS L.P. - Round Rock TX
International Classification:
H04L 9/32
US Classification:
713171
Abstract:
A method may include generating a first shared secret for a present boot session of the information handling system and determining if a second shared secret existed for a prior boot session of the information handling system. If the second shared secret existed for the prior boot session, the method may include encrypting the first shared secret with the second shared secret and communicating the first shared secret encrypted by the second shared secret from a first information handling resource to a second information handling resource. If the second shared secret did not exist for the prior boot session, the method may include communicating the first shared secret unencrypted from the first information handling resource to the second information handling resource. The method may additionally include securely communicating between the first information handling resource and the second information handling resource using the first shared secret for encryption and decryption.

All data offered is derived from public sources. We do not verify or evaluate each piece of data, and makes no warranties or guarantees about any of the information offered. We do not possess or have access to secure or private financial information. People Background Check is not a credit reporting agency and does not offer consumer reports. None of the information offered by People Background Check is to be considered for purposes of determining any entity or person's eligibility for credit, insurance, employment, housing, or for any other purposes covered under the FCRA.