Patents by Inventor Eric Yi-hua Chen
Eric Yi-hua Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230252970Abstract: Managing noise during an online conference session includes obtaining audio data from an endpoint participating in an online conference session. The audio data is derived from audio captured at the endpoint that includes musical sounds. The audio data is processed to identify a portion of the audio data in which a decibel level of the musical sounds is stable for a period of time. Non-musical noise present, if any, in the audio data with the musical sounds is identified and the non-musical noise is attenuated from the audio data to generate noise-reduced musical audio data. The noise-reduced musical audio data is transmitted for play out at one or more other endpoints participating in the online conference session.Type: ApplicationFiled: April 19, 2023Publication date: August 10, 2023Inventors: Bjørn Winsvold, Eric Yi-hua Chen, Wei-Lien Hsu, Pi-Hsin Liu
-
Patent number: 11688384Abstract: Managing noise during an online conference session includes obtaining audio data from an endpoint participating in an online conference session. The audio data is derived from audio captured at the endpoint that includes musical sounds. The audio data is processed to identify a portion of the audio data in which a decibel level of the musical sounds is stable for a period of time. Non-musical noise present, if any, in the audio data with the musical sounds is identified and the non-musical noise is attenuated from the audio data to generate noise-reduced musical audio data. The noise-reduced musical audio data is transmitted for play out at one or more other endpoints participating in the online conference session.Type: GrantFiled: August 14, 2020Date of Patent: June 27, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Bjørn Winsvold, Eric Yi-hua Chen, Wei-Lien Hsu, Pi-Hsin Liu
-
Patent number: 11568862Abstract: A system and method for training a virtual assistant to recognize and learn new context for known terms is presented. The method includes receiving a natural language input, corresponding to at least one of a desired intent and a desired entity, at a natural language processor. The method involves scoring known intents based on the natural language input to generate an intent confidence score for each known intent, and scoring known entities based on the natural language input to generate an entity confidence score for each known entity. The method involves comparing the intent confidence scores and entity confidence scores to a threshold value, and determining that the natural language input does not correspond to at least one of the known intents and the known entities based on the comparing. Finally, at least one of a new intent and a new entity are determined based on the natural language input.Type: GrantFiled: September 29, 2020Date of Patent: January 31, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Eric Yi-Hua Chen, Keith Griffin
-
Patent number: 11489682Abstract: Presented herein are techniques and systems associated with generating a predicted utilization likelihood for a shared collaboration resource. Integrated resource data associated with a meeting scheduled for a shared collaboration resource is obtained and analyzed using a machine-learned predictive model. The analysis generates a predicted utilization likelihood of the shared resource. An indication of the predicted utilization likelihood is provided to an output system, such as a graphical user interface.Type: GrantFiled: February 26, 2021Date of Patent: November 1, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Keith Griffin, Eric Yi-hua Chen, Daniel Victor Eskenazi
-
Publication number: 20220101834Abstract: A system and method for training a virtual assistant to recognize and learn new context for known terms is presented. The method includes receiving a natural language input, corresponding to at least one of a desired intent and a desired entity, at a natural language processor. The method involves scoring known intents based on the natural language input to generate an intent confidence score for each known intent, and scoring known entities based on the natural language input to generate an entity confidence score for each known entity. The method involves comparing the intent confidence scores and entity confidence scores to a threshold value, and determining that the natural language input does not correspond to at least one of the known intents and the known entities based on the comparing. Finally, at least one of a new intent and a new entity are determined based on the natural language input.Type: ApplicationFiled: September 29, 2020Publication date: March 31, 2022Inventors: Eric Yi-Hua Chen, Keith Griffin
-
Publication number: 20220083634Abstract: A system and method for authenticating a user via a single voice audio input is disclosed. The method includes obtaining voice audio from a user, converting the voice audio to text, comparing at least a portion of the text to a database, determining whether a user profile exists in the database based on the comparing, the user profile including a voiceprint, in response to determining that the user profile exists in the database, analyzing the voice audio against the voiceprint of the user profile; and authenticating the user based on the voice audio substantially matching the voiceprint of the user profile.Type: ApplicationFiled: September 11, 2020Publication date: March 17, 2022Inventor: Eric Yi-hua Chen
-
Publication number: 20220051652Abstract: Managing noise during an online conference session includes obtaining audio data from an endpoint participating in an online conference session. The audio data is derived from audio captured at the endpoint that includes musical sounds. The audio data is processed to identify a portion of the audio data in which a decibel level of the musical sounds is stable for a period of time. Non-musical noise present, if any, in the audio data with the musical sounds is identified and the non-musical noise is attenuated from the audio data to generate noise-reduced musical audio data. The noise-reduced musical audio data is transmitted for play out at one or more other endpoints participating in the online conference session.Type: ApplicationFiled: August 14, 2020Publication date: February 17, 2022Inventors: Bjørn Winsvold, Eric Yi-hua Chen, Wei-Lien Hsu, Pi-Hsin Liu
-
Publication number: 20210258180Abstract: Presented herein are techniques and systems associated with generating a predicted utilization likelihood for a shared collaboration resource. Integrated resource data associated with a meeting scheduled for a shared collaboration resource is obtained and analyzed using a machine-learned predictive model. The analysis generates a predicted utilization likelihood of the shared resource. An indication of the predicted utilization likelihood is provided to an output system, such as a graphical user interface.Type: ApplicationFiled: February 26, 2021Publication date: August 19, 2021Inventors: Keith Griffin, Eric Yi-hua Chen, Daniel Victor Eskenazi
-
Patent number: 10938587Abstract: Presented herein are techniques and systems associated with generating a predicted utilization likelihood for a shared collaboration resource. Integrated resource data associated with a meeting scheduled for a shared collaboration resource is obtained and analyzed using a machine-learned predictive model. The analysis generates a predicted utilization likelihood of the shared resource. An indication of the predicted utilization likelihood is provided to an output system, such as a graphical user interface.Type: GrantFiled: November 28, 2016Date of Patent: March 2, 2021Assignee: Cisco Technology, Inc.Inventors: Keith Griffin, Eric Yi-hua Chen, Daniel Victor Eskenazi
-
Publication number: 20180152487Abstract: Presented herein are techniques and systems associated with generating a predicted utilization likelihood for a shared collaboration resource. Integrated resource data associated with a meeting scheduled for a shared collaboration resource is obtained and analyzed using a machine-learned predictive model. The analysis generates a predicted utilization likelihood of the shared resource. An indication of the predicted utilization likelihood is provided to an output system, such as a graphical user interface.Type: ApplicationFiled: November 28, 2016Publication date: May 31, 2018Inventors: Keith Griffin, Eric Yi-hua Chen, Daniel Victor Eskenazi
-
Patent number: 7188366Abstract: When DDoS attack packets are transmitted from the attacker to the victim's server, the attack packets are detected in the edge router of the LAN accommodating the server. These packets are then destroyed, the address of the upstream routers close to the attack source are retrieved, and attack source retrieval modules are transmitted from the edge router to all the upstream routers. By executing the retrieval modules in the upstream routers, verification is performed as to whether the attack packets are passing through those upstream routers. The results are notified to the transmission source router and if the attack packets are passing through, the retrieval modules are transmitted to routers at the upper stream. When the router at the uppermost stream is reached, a protection module is executed to destroy the attack packets. When the attacks cease, the protection module deletes itself and the protection process is ended.Type: GrantFiled: September 7, 2001Date of Patent: March 6, 2007Assignee: Nippon Telegraph and Telephone CorporationInventors: Eric Yi-hua Chen, Hitoshi Fuji
-
Publication number: 20020032854Abstract: When DDoS attack packets are transmitted from the attacker to the victim's server, the attack packets are detected in the edge router of the LAN accommodating the server. These packets are then destroyed, the address of the upstream routers close to the attack source are retrieved, and attack source retrieval modules are transmitted from the edge router to all the upstream routers. By executing the retrieval modules in the upstream routers, verification is performed as to whether the attack packets are passing through those upstream routers. The results are notified to the transmission source router and if the attack packets are passing through, the retrieval modules are transmitted to routers at the upper stream. When the router at the uppermost stream is reached, a protection module is executed to destroy the attack packets. When the attacks cease, the protection module deletes itself and the protection process is ended.Type: ApplicationFiled: September 7, 2001Publication date: March 14, 2002Inventors: Eric Yi-Hua Chen, Hitoshi Fuji