Welcome to EverybodyWiki 😃 ! Nuvola apps kgpg.png Log in or ➕👤 create an account to improve, watchlist or create an article like a 🏭 company page or a 👨👩 bio (yours ?)...

Cheman Shaik

From EverybodyWiki Bios & Wiki


Cheman Shaik
File:Chemain Shaik Photo.png Chemain Shaik Photo.png
Born
🏳️ NationalityIndian
🎓 Alma materAnna University
💼 Occupation
Absolute Public Key Cryptography[1][2][3][4]

Cheman Shaik is a computer scientist[5] and inventor[6] of the Indian origin currently working in the USA with VISH Consulting Services.

His primary areas of research, invention and academic publications are computer science, web technology, information security, cryptography, anti-phishing, cryptocurrency security, encrypted QR codes and other computer software or service disciplines.

Most of his inventions are applications of cryptography, encrypted QR codes and other IT techniques on identifying and checking forgery and fabrication in passports, visas, academic credentials, and election voter ID. He applied cryptography to protect cryptocurrency exchange accounts against MITM (man-in-the-middle) attacks.

Counter challenge authentication is his most notable invention that protects online users from phishing attempts. Users can authenticate web applications before engaging with them.

Early life[edit]

Cheman Shaik was born to father Mohiddin and mother Fathima Begum in Kakinada, Andhara Pradesh. He completed his primary and high school education from Peddapuram, Eleswaram and Tuni. He completed B.Tech in Civil Engineering from JNTU, Kakinada. He has done M.Tech in Aeronautical Engineering from Anna University.[7][8]

Career[edit]

In India, he worked with ISRO as a scientist in the vibration analysis sub-division of satellites in Ahmedabad[9]. He was also associated with the Structural Sciences Division, National Aerospace Laboratories, Bangalore[10].

In 2000, he moved to Saudi Arabi to work with the Saudi American Bank. He spent almost eight years in the UAE. During this period, he invented Absolute Public Key Cryptography. It’s an encryption algorithm. It helps online businesses to protect financial and personal information of their customers while they shop online, and enterprises to safeguard their database against counteract breach and compromise attempts. He received the US Patent for the invention in 2006. It brought him recognition as a scientist in the public domain.

He resigned from the job and returned to India in 2009 to continue his own scientific research in the computer science field. He succeeded in creating multiple technology solutions related to encryption, password security, web technologies, and script generation. In May 2019, he moved to the USA to work with VISH Consulting Services.

Selected Inventions[edit]

  • Absolute Public Key Cryptography[11]
  • Password self-encryption method and system[12][13][14]
  • Codeless dynamic websites including general facilities[15][16]
  • Dynamic Language Text Generation[17][18][19]
  • Counter Challenge Authentication to defeat phishing attacks[20]
  • 3-D Mouse for Computers[21]

He holds eight US patents for the six inventions listed above.

Publications[edit]

Handbook of Surveillance Technologies authored by J.K Peterson has explained Cheman Shaik's Absolute Public Key Cryptography with simplicity.[22][23]

He has published a great many articles dealing with encryption, particularly, as Microsoft itself recognizes.[24][25][26] of the Indian origin working in the USA[27] journal papers, and conference papers with International Journal of Computer Science, Engineering and Applications (IJCSEA), International Journal on Cryptography and Information Security (IJCIS), International Journal of Network Security & Its Applications (IJNSA), Computer Science and Engineering: An International Journal (CSEIJ), Advanced Computing: An International Journal (ACIJ), and SpringerLink.

Infringements & Litigations[edit]

  • His patent “Dynamic language text generation system and method” allows phone and tablet users to interact with the devices using non-English language. On May 7, 2019, the patent holding company Universal Cipher LLC charged Walmart and Target Corp for selling devices that infringed the patent. The case was settled in favor of the patent owner.[28][29][30]
  • His patent “Password self-encryption method and system and encryption by keys generated from personal secret information” is used across many software applications to help users with encrypting a password or any predefined secret information. The patent holding company filed patent infringement case against 23 litigants including Sony Pictures,[31] True Media,[32] and Mainstream Technologies,[33] between May 2017 and March 2018. Keeper Security, Inc. and Unified Patents, LLC continue to use the patent.[34]

Recognitions[edit]

Shaik has been felicitated by the Bharatiya International Society for Welfare and Solidarity (BISWAS) in 2006 for his invention and research work on encryption algorithm that was issued a patent from the USPTO.[35]

References[edit]

  1. "New data encryption technique". Kasturi & Sons. The Hindu Business Line. Retrieved 23 February 2021.
  2. "Prominent Indians Honored". Arab News (19 October 2006). Saudi Research & Publishing Company. Retrieved 23 February 2021.
  3. "Absolute public key cryptographic system and method surviving private-key compromise with other advantages". USPTO. U.S. Department of Commerce. Retrieved 23 February 2021.
  4. "Magazine Cover Page (Feb 2007)". Al, AALEM Arabic Magazine. Retrieved 28 February 2021.
  5. "Invention By Indian Can Help Local Business Save Billions". Arab News. Retrieved 28 February 2021 – via Internet Archive.
  6. "Google Patents". Retrieved 23 February 2021.
  7. "చెమన్స్ గ్లిట్టర్స్ (Telugu)". Internet Archive (in Telugu). Eenadu,Telugu Daily Newspaper. Retrieved 28 February 2021.CS1 maint: Unrecognized language (link)
  8. "Cheman's Glitters" (PDF). Internet Archive. Eenadu,Telugu to English Translation. Retrieved 28 February 2021.
  9. "Senior Consultant at VISH USA". LinkedIn. Retrieved 27 February 2021.
  10. "Development of robust finite elements for general purpose structural analysis". Indian Academy of Sciences. Retrieved 3 March 2021.
  11. "Absolute public key cryptographic system and method surviving private-key compromise with other advantages". USPTO. Retrieved 25 February 2021.
  12. "Password self encryption method and system and encryption by keys generated from personal secret information". USPTO. Retrieved 25 February 2021.
  13. "PASSWORD SELF ENCRYPTION METHOD AND SYSTEM AND ENCRYPTION BY KEYS GENERATED FROM PERSONAL SECRET INFORMATION". Canadian Intellectual Property Office. Canada Govt. Retrieved 3 March 2021.
  14. "Password Self Encryption Method and System and Encryption by Keys Generated From Personal Secret Information". IP Australia. Australian Govt. Retrieved 3 March 2021.
  15. "Codeless dynamic websites including general facilities". USPTO. Retrieved 25 February 2021.
  16. "Codeless Dynamic Websites Including General Facilities". IP Australia. Australian Govt. Retrieved 3 March 2021.
  17. "Dynamic Language Text Generation". USPTO. Retrieved 25 February 2021.
  18. "History of Pen and Gesture Computing: Annotated Bibliography in On-line Character Recognition, Pen Computing, Gesture User Interfaces and Tablet and Touch Computers". RCN Telecom Services. Retrieved 1 March 2021.
  19. "Providing a framework for organizing the researcher-based content and its requirements in the e-learning environment". CIVILICA. Retrieved 1 March 2021.
  20. "Defeating solution to phishing attacks through counter challenge authentication". USPTO. Retrieved 25 February 2021.
  21. "3d Mouse For Computers". USPTO. Retrieved 25 February 2021.
  22. Handbook of Surveillance Technologies. CRC Press. January 23, 2012. p. 946. ISBN 9781439873151. Retrieved 23 February 2021. Search this book on Amazon.com Logo.png
  23. "Handbook Of Surveillance Technologies Absolute Public Key Cryptography". Retrieved 1 March 2021 – via Internet Archive.
  24. "Microsoft Academic". Microsoft. Retrieved 23 February 2021.
  25. "Cheman Shaik". Retrieved 23 February 2021 – via Google Scholar.
  26. "Counter Challenge Authentication Method: A Defeating Solution to Phishing Attacks". AIRCC Digital Library. Retrieved 23 February 2021.
  27. "VISH USA". LinkedIn. Retrieved 23 February 2021.
  28. "Walmart, Target Sued Over Text Generation Tech Patent (1)". Bloomberg. Bloomberg Law. May 8, 2019. Retrieved 26 February 2021.
  29. "Universal Cipher, LLC v. Target Corporation". Bloomberg News. Bloomberg Law. May 8, 2019. Retrieved 26 February 2021.
  30. "May 2019 Retail Patent Litigation Report". R. David Donoghue. Retrieved 26 February 2021.
  31. "Cumberland Systems LLC v. Sony Pictures Entertainment Inc". Pace Monitor. Flitch Solutions. Retrieved 26 February 2021.
  32. "Cumberland Systems LLC v. True Media, LLC". Pace Monitor. Retrieved 26 February 2021.
  33. "Cumberland Systems LLC v. Mainstream Technologies, Inc". Pace Monitor. Retrieved 26 February 2021.
  34. "US-8023647-B2 - Password Self Encryption Method and System and Encryption by Keys Generated from Personal Secret Information". Unified Patents, LLC. Retrieved 26 February 2021.
  35. "Prominent Indians Honored" (19 October 2006). Saudi Research & Publishing Company. Arab News. Retrieved 23 February 2021.

External links[edit]


This article "Cheman Shaik" is from Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:Cheman Shaik. Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.