# Adnan A.

## Adnan A. Badwan, Naor JO

Patent application number | Description | Published |
---|---|---|

20120288529 | PHARMACEUTICAL EXCIPIENT, METHOD FOR ITS PREPARATION AND USE THEREOF - The present invention relates to a pharmaceutical excipient comprising a mixture of sugar alcohol and chitin and/or chitin derivatives, a method for its preparation and use thereof. | 11-15-2012 |

## Adnan A. Gutub, Dhahran SA

Patent application number | Description | Published |
---|---|---|

20110200185 | Method of performing elliptic polynomial cryptography with elliptic polynomial hopping - The method of performing elliptic polynomial cryptography with elliptic polynomial hopping allows for the encryption of messages through elliptic polynomial cryptography, i.e., using elliptic polynomials with multi x-coordinates, and particularly with the utilization of elliptic polynomial hopping based upon both the elliptic polynomial and its twist, regardless of whether the elliptic polynomial and its twist are isomorphic with respect to one another. Each plaintext block is encrypted by a different elliptic polynomial, and the elliptic polynomials used are selected by an initial secret key and a random number generator. The method is particularly useful for symmetric encryption systems, and provides a block cipher fundamentally based upon a computationally hard problem. | 08-18-2011 |

20110200186 | Method of cipher block chaining using elliptic curve cryptography - The method of cipher block chaining using elliptic curve cryptography allows for the encryption of messages through elliptic curve cryptography and, particularly, with the performance of cipher block chaining utilizing both the elliptic curve and its twist, regardless of whether the elliptic curve and its twist are isomorphic with respect to one another. The method of performing elliptic curve cryptography is based on the elliptic curve discrete logarithm problem. It is well known that an elliptic curve discrete logarithm problem is a computationally “difficult” or “hard” problem. | 08-18-2011 |

20110200187 | Elliptic polynomial cryptography with secret key embedding - Elliptic polynomial cryptography with secret key embedding is a method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the embedding of secret keys in the message bit string. The method of performing elliptic polynomial cryptography is based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem. | 08-18-2011 |

20110200188 | Method of performing cipher block chaining using elliptic polynomial cryptography - The method of performing cipher block chaining using elliptic polynomial cryptography allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the utilization of cipher block chaining based upon both the elliptic polynomial and its twist, regardless of whether the elliptic polynomial and its twist are isomorphic with respect to one another. The method of performing cipher block chaining is based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem. | 08-18-2011 |

20110202773 | Method of generating a password protocol using elliptic polynomial cryptography - The method of generating password protocols based upon elliptic polynomial cryptography provides for the generation of password protocols based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem. | 08-18-2011 |

## Adnan A. Manan, Dunlap, IL US

Patent application number | Description | Published |
---|---|---|

20090204308 | Configuring an engine control module - Method and systems are provided for configuring operations of an engine control module. In one implementation, a method is provided. According to the method, configuration parameters defining an operational range of an engine are received. Furthermore, data specifying performance requirements of the engine is received from the engine control module. The method determines whether the configuration parameters meet the performance requirements. | 08-13-2009 |

## Adnan A. Siddiquie, Houston, TX US

Patent application number | Description | Published |
---|---|---|

20120032684 | ACTIVE PIN CONNECTION MONITORING SYSTEM AND METHOD - A system for monitoring a connection to an active pin of an integrated circuit (IC) die, includes an input/output (I/O) cell of an IC die, where the I/O cell is bonded to a bonding pad on a ball grid array (BGA) substrate. The system includes a test point on a printed circuit board (PCB) coupled to the bonding pad which forms an electrical/conductive pathway between the test point and the I/O cell. The system includes a clock waveform injected through a resistor into the test point. | 02-09-2012 |

20120131256 | I/O CONTROL SYSTEMS AND METHODS - An input/output (“I/O”) port control system is provided. The system can include an I/O controller ( | 05-24-2012 |

20130187731 | MODULAR INTERFACE SYSTEMS AND METHODS - Interface systems and methods are provided. An interface system can include a first isolator ( | 07-25-2013 |

## Adnan A. Zalam, Carmel, IN US

Patent application number | Description | Published |
---|---|---|

20110191115 | INTEGRATED HEALTH CARE MANAGEMENT SYSTEM - A computer software program is operable to provide an ongoing and supported care coordination approach in which nurses and physician extenders work to actively link a patient with the best provider of care for the patient's unique condition. The program works with the patient to ensure compliance with physician orders, and assists with appointments, transportation and the delivery of medical services. | 08-04-2011 |