Patents by Inventor Daniel Chien

Daniel Chien has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240076993
    Abstract: A turbine vane in a gas turbine engine includes an inner platform, an outer platform, and a vane airfoil positioned therebetween. The vane airfoil includes a first cooling passage extending between the outer platform and the inner platform, and a second cooling passage extending between the outer platform and the inner platform. The second cooling passage is arranged downstream of the first cooling passage with respect to a flow direction. The turbine vane includes a jumper tube disposed between the second cooling passage and the inner platform. The jumper tube includes an inlet, an outlet, and a tube wall enclosing a hollow interior. The inlet is positioned a distance within the second cooling passage. The outlet is positioned at least partially through an aperture of the inner platform.
    Type: Application
    Filed: January 6, 2021
    Publication date: March 7, 2024
    Inventors: Daniel Joo, Ching-Pang Lee, Gm Salam Azad, Sin Chien Siw
  • Publication number: 20230198997
    Abstract: Computer security techniques are described. One example provides a security module. The security module executes on a computing system and determines whether to allow a user or a program (e.g., native executable, script, etc.) associated with the user to access a resource, such as by reading, writing, or executing a file. An example operation system provides a new system administration mechanism that enforces rights and limitations for specific administrative and application groups that each have their own super user. Such a system may include a safe mode superuser who is required to log in when the system is in maintenance mode (e.g., single user console mode) at which time the safe mode superuser is the only user who is allowed to make programs executable.
    Type: Application
    Filed: February 22, 2023
    Publication date: June 22, 2023
    Inventor: Daniel Chien
  • Patent number: 11677754
    Abstract: Computer security techniques are described. One example provides a security module. The security module executes on a computing system and determines whether to allow a user or a program (e.g., native executable, script, etc.) associated with the user to access a resource, such as by reading, writing, or executing a file. This decision is based at least in part on whether an access control list that is associated with the resource specifies that a source (e.g., IP address, hardware address) that is associated with the user is allowed to access the resource. This decision can also or instead be based on whether the computing system is executing in maintenance mode, such as in single-user diagnostic mode.
    Type: Grant
    Filed: December 9, 2019
    Date of Patent: June 13, 2023
    Inventor: Daniel Chien
  • Publication number: 20230139360
    Abstract: A distributed network system and method includes a processing unit configured to manage safety data for a plurality of medical devices, a database software component in communication with the processing unit, and a monitoring software component in communication with the processing unit. The monitoring software component is configured to monitor a number of messages between a number of medical devices and the processing unit, to process performance parameters to generate an overall performance index, and to generate an output that is viewable by a user. The output includes relative contributions of each of the performance parameters to the overall performance index, where the overall performance index is generated using a weighting factor associated with each of the performance parameters. The performance parameters include the number of messages waiting to be processed, which has the largest weighting factor, and a disk queue length, which has the smallest weighting factor.
    Type: Application
    Filed: November 8, 2022
    Publication date: May 4, 2023
    Inventors: Christopher Egan Kohlbrecher, Jonathan Leigh Walton, Daniel Chien-Yu Hsu, Michael Paul Myers
  • Patent number: 11509463
    Abstract: Techniques for computer security, and more specifically timestamp-based key generation techniques, are described. Some implementations provide a table of key generation processes that is shared as a secret between a first computing system and a second computing system, both of which have synchronized clocks. Both computing systems use the same technique for selecting a key generation process from the table, such as based on a random number generator seeded with a timestamp. Since the computing systems have synchronized clocks, they both select and use the same key generation process, thereby generating the same encryption key without the need to communicate the key from one system to another. Furthermore, both computing systems may synchronize their clocks to a private time server that maintains a clock that runs faster or slower than standard time.
    Type: Grant
    Filed: May 31, 2020
    Date of Patent: November 22, 2022
    Inventor: Daniel Chien
  • Patent number: 11501877
    Abstract: A distributed network system and method includes a processing unit configured to manage safety data for a plurality of medical devices, a database software component in communication with the processing unit, and a monitoring software component in communication with the processing unit. The monitoring software component is configured to monitor a number of messages between a number of medical devices and the processing unit, to process performance parameters to generate an overall performance index, and to generate an output that is viewable by a user. The output includes relative contributions of each of the performance parameters to the overall performance index, where the overall performance index is generated using a weighting factor associated with each of the performance parameters. The performance parameters include the number of messages waiting to be processed, which has the largest weighting factor, and a disk queue length, which has the smallest weighting factor.
    Type: Grant
    Filed: April 16, 2019
    Date of Patent: November 15, 2022
    Assignee: ICU Medical, Inc.
    Inventors: Christopher Egan Kohlbrecher, Jonathan Leigh Walton, Daniel Chien-Yu Hsu, Michael Paul Myers
  • Patent number: 11438145
    Abstract: Techniques for computer security, and more specifically timestamp-based key generation techniques, are described. Some implementations provide a table of key generation processes that is shared as a secret between a first computing system and a second computing system, both of which have two clocks. The first clock is a real-time clock and the second clock is a variable-time clock. The variable time clocks are synchronized and run at the same rate, faster or slower than real time. Both computing systems use the same technique for selecting a key generation process from the table, such as based on a random number generator seeded with a timestamp obtained from their variable time clocks. Since the computing systems have synchronized variable-time clocks, they both select and use the same key generation process, thereby generating the same encryption key without the need to communicate the key from one system to another.
    Type: Grant
    Filed: April 16, 2021
    Date of Patent: September 6, 2022
    Inventor: Daniel Chien
  • Publication number: 20210377008
    Abstract: Techniques for computer security, and more specifically timestamp-based key generation techniques, are described. Some implementations provide a table of key generation processes that is shared as a secret between a first computing system and a second computing system, both of which have two clocks. The first clock is a real-time clock and the second clock is a variable-time clock. The variable time clocks are synchronized and run at the same rate, faster or slower than real time. Both computing systems use the same technique for selecting a key generation process from the table, such as based on a random number generator seeded with a timestamp obtained from their variable time clocks. Since the computing systems have synchronized variable-time clocks, they both select and use the same key generation process, thereby generating the same encryption key without the need to communicate the key from one system to another.
    Type: Application
    Filed: April 16, 2021
    Publication date: December 2, 2021
    Inventor: Daniel Chien
  • Patent number: 11188622
    Abstract: Computer security techniques are described. One example determines whether to allow a program (e.g., native executable, script, etc.) to execute. This decision is based at least in part on the source of the program, such as whether the program is provided by a privileged source. A privileged program source may be any module, mechanism, or process that can provide executable instructions, such as directory or folder (e.g., on a local disk or network-accessible store), a computing device (e.g., server computer), another program (e.g., a Web server), or the like.
    Type: Grant
    Filed: April 24, 2019
    Date of Patent: November 30, 2021
    Inventor: Daniel Chien
  • Publication number: 20210176253
    Abstract: Computer security techniques are described. One example provides a security module. The security module executes on a computing system and determines whether to allow a user or a program (e.g., native executable, script, etc.) associated with the user to access a resource, such as by reading, writing, or executing a file. This decision is based at least in part on whether an access control list that is associated with the resource specifies that a source (e.g., IP address, hardware address) that is associated with the user is allowed to access the resource. This decision can also or instead be based on whether the computing system is executing in maintenance mode, such as in single-user diagnostic mode.
    Type: Application
    Filed: December 9, 2019
    Publication date: June 10, 2021
    Inventor: Daniel Chien
  • Patent number: 10848489
    Abstract: Techniques for computer security, and more specifically timestamp-abased authentication, are described. Some implementations provide an authentication method that utilizes an authentication process that is shared as a secret between a client and an authenticator. The process provides as output a number that is based on a timestamp. To authenticate the client when it attempts to access a target service, both the client and authenticator execute the authentication process using locally generated timestamps. If the outputs of the authentication process match, the client is authenticated. If not, subsequent network communications from the client are either denied or redirected to an alternative computing system that masquerades as the target service.
    Type: Grant
    Filed: March 20, 2019
    Date of Patent: November 24, 2020
    Inventor: Daniel Chien
  • Patent number: 10826912
    Abstract: Techniques for computer security, and more specifically timestamp-abased authentication, are described. Some implementations provide an authentication method that utilizes an authentication process that is shared as a secret between a first and second computing system. The process provides as output a number that is based on a timestamp. The first computing system executes the authentication process using a timestamp obtained from its clock. The resulting number is transmitted to the second computing system, possibly along with other authentication data, such as a username and/or password. In response, the second computing system executes the authentication process using a timestamp obtained from its clock. If the numbers generated by the first and second computing systems match, the first computing system is authenticated.
    Type: Grant
    Filed: December 14, 2018
    Date of Patent: November 3, 2020
    Inventor: Daniel Chien
  • Patent number: 10789149
    Abstract: Duplicate bug report detection using machine learning algorithms and automated feedback incorporation is disclosed. For each set of bug reports, a user-classification of the set of bug reports as including duplicate bug reports or non-duplicate bug reports is identified. Also for each set of bug reports, correlation values corresponding to a respective feature, of a plurality of features, between bug reports in the set of bug reports is identified. Based on the user-classifications and the correlation values, a model is generated to identify any set of bug reports as including duplicate bug reports or non-duplicate bug reports. The model is applied to classify a particular bug report and a candidate bug report as duplicate bug reports or non-duplicate bug reports.
    Type: Grant
    Filed: April 12, 2019
    Date of Patent: September 29, 2020
    Assignee: Oracle International Corporation
    Inventors: Prasad V. Bagal, Sameer Arun Joshi, Hanlin Daniel Chien, Ricardo Rey Diez, David Cavazos Woo, Emily Ronshien Su, Sha Chang
  • Publication number: 20200295932
    Abstract: Techniques for computer security, and more specifically timestamp-based key generation techniques, are described. Some implementations provide a table of key generation processes that is shared as a secret between a first computing system and a second computing system, both of which have synchronized clocks. Both computing systems use the same technique for selecting a key generation process from the table, such as based on a random number generator seeded with a timestamp. Since the computing systems have synchronized clocks, they both select and use the same key generation process, thereby generating the same encryption key without the need to communicate the key from one system to another. Furthermore, both computing systems may synchronize their clocks to a private time server that maintains a clock that runs faster or slower than standard time.
    Type: Application
    Filed: May 31, 2020
    Publication date: September 17, 2020
    Inventor: Daniel Chien
  • Publication number: 20200195639
    Abstract: Techniques for computer security, and more specifically timestamp-abased authentication, are described. Some implementations provide an authentication method that utilizes an authentication process that is shared as a secret between a client and an authenticator. The process provides as output a number that is based on a timestamp. To authenticate the client when it attempts to access a target service, both the client and authenticator execute the authentication process using locally generated timestamps. If the outputs of the authentication process match, the client is authenticated. If not, subsequent network communications from the client are either denied or redirected to an alternative computing system that masquerades as the target service.
    Type: Application
    Filed: March 20, 2019
    Publication date: June 18, 2020
    Inventor: Daniel Chien
  • Publication number: 20200195658
    Abstract: Techniques for computer security, and more specifically timestamp-abased authentication, are described. Some implementations provide an authentication method that utilizes an authentication process that is shared as a secret between a first and second computing system. The process provides as output a number that is based on a timestamp. The first computing system executes the authentication process using a timestamp obtained from its clock. The resulting number is transmitted to the second computing system, possibly along with other authentication data, such as a username and/or password. In response, the second computing system executes the authentication process using a timestamp obtained from its clock. If the numbers generated by the first and second computing systems match, the first computing system is authenticated.
    Type: Application
    Filed: December 14, 2018
    Publication date: June 18, 2020
    Inventor: Daniel Chien
  • Publication number: 20200104468
    Abstract: Computer security techniques are described. One example determines whether to allow a program (e.g., native executable, script, etc.) to execute. This decision is based at least in part on the source of the program, such as whether the program is provided by a privileged source. A privileged program source may be any module, mechanism, or process that can provide executable instructions, such as directory or folder (e.g., on a local disk or network-accessible store), a computing device (e.g., server computer), another program (e.g., a Web server), or the like.
    Type: Application
    Filed: April 24, 2019
    Publication date: April 2, 2020
    Inventor: Daniel Chien
  • Patent number: 10542006
    Abstract: Techniques for network security are disclosed. In some implementations, an evaluation module determines whether a network communication from a source computing system to a destination computing system is allowable. The allowability of the communication is determined based properties of the network communication, such as a source or destination address, a port number, a time of day, a geographic location, and the like. If the communication is disallowed, the evaluation module or a related component redirects the communication to an alternative computing system that masquerades as the destination communication system.
    Type: Grant
    Filed: March 21, 2017
    Date of Patent: January 21, 2020
    Inventor: Daniel Chien
  • Publication number: 20190311803
    Abstract: A distributed network system and method includes a processing unit configured to manage safety data for a plurality of medical devices, a database software component in communication with the processing unit, and a monitoring software component in communication with the processing unit. The monitoring software component is configured to monitor a number of messages between a number of medical devices and the processing unit, to process performance parameters to generate an overall performance index, and to generate an output that is viewable by a user. The output includes relative contributions of each of the performance parameters to the overall performance index, where the overall performance index is generated using a weighting factor associated with each of the performance parameters. The performance parameters include the number of messages waiting to be processed, which has the largest weighting factor, and a disk queue length, which has the smallest weighting factor.
    Type: Application
    Filed: April 16, 2019
    Publication date: October 10, 2019
    Inventors: Christopher Egan Kohlbrecher, Jonathan Leigh Walton, Daniel Chien-Yu Hsu, Michael Paul Myers
  • Patent number: 10387273
    Abstract: Embodiments enable a database management system (DBMS) to manage two levels of disk failure groups. These two levels of redundancy are achieved by grouping the disks of the disk group for the DBMS into two levels of failure groups (i.e., “data sites” each containing two or more “failure groups” of disks). This system of disk grouping allows a DBMS to potentially tolerate the loss of both an entire first site and part of a second site. Such a DBMS uses a multi-level voting system, based on both failure group-level votes and site-level votes, to identify the current version of administrative data structures (ADS) that store key administrative data. In addition to data sites that store database data, the DBMS includes a quorum site with a single quorum failure group that stores a copy of the ADS. The quorum site contributes a site-level vote during a multi-level voting event.
    Type: Grant
    Filed: April 21, 2017
    Date of Patent: August 20, 2019
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Mahanteshwar Chimangala Maheshwar, Hanlin Daniel Chien, Prasad V. Bagal, Harish Nandyala, Rajiv Wickremesinghe, Hemanth Pikkili, Sahaj Agarwal