Patents by Inventor Wei-Jhy Chern
Wei-Jhy Chern has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10185857Abstract: Devices, systems, and methods obtain a sequence of images, track a label-candidate area in the sequence of images, and read a value of a barcode of interest in the label-candidate area in an image in the sequence of images.Type: GrantFiled: July 6, 2017Date of Patent: January 22, 2019Assignees: Canon Information and Imaging Solutions, Inc., Canon U.S.A., Inc.Inventors: Ron S. Gutfinger, Wei-Jhy Chern
-
Publication number: 20180365462Abstract: Devices, systems, and methods obtain a sequence of images, track a label-candidate area in the sequence of images, and read a value of a barcode of interest in the label-candidate area in an image in the sequence of images.Type: ApplicationFiled: July 6, 2017Publication date: December 20, 2018Inventors: Ron S. Gutfinger, Wei-Jhy Chern
-
Patent number: 9893960Abstract: A device hub system includes: a control unit configured to: generate a workroom for providing access to a workroom accessible resource, including an enterprise multifunctional printer, protected by a network firewall; provide authentication for a participant device to access the workroom; receive a workroom request through the workroom; generate a workroom sharable information from the workroom request; and a communication unit, coupled to the control unit, configured to distribute the workroom sharable information within the workroom.Type: GrantFiled: August 11, 2015Date of Patent: February 13, 2018Assignee: S-PRINTING SOLUTION CO., LTD.Inventors: Ramon Rubio, Joseph Yang, Wei-jhy Chern
-
Publication number: 20160050340Abstract: A device hub system includes: a control unit configured to: generate a workroom for providing access to a workroom accessible resource, including an enterprise multifunctional printer, protected by a network firewall; provide authentication for a participant device to access the workroom; receive a workroom request through the workroom; generate a workroom sharable information from the workroom request; and a communication unit, coupled to the control unit, configured to distribute the workroom sharable information within the workroom.Type: ApplicationFiled: August 11, 2015Publication date: February 18, 2016Inventors: Ramon Rubio, Joseph Yang, Wei-jhy Chern
-
Patent number: 8732811Abstract: Systems and methods for providing a login context operate a virtual machine, wherein the virtual machine includes an open services platform and an authentication service, wherein the authentication service includes a classloader, and an initial classloader is designated as the classloader of the authentication service, register a login module, receive an authentication request from a first application, and responsive to receiving the authentication request designate a classloader associated with the login module as the classloader of the authentication service, generate a login context of the login module, and provide the login context of the login module to the first application, whereby the first application uses the login context to perform an authentication.Type: GrantFiled: March 14, 2012Date of Patent: May 20, 2014Assignee: Canon Kabushiki KaishaInventors: Eliza Khosrova, Harishankar Karantothu, Craig Mazzagatte, Wei-Jhy Chern
-
Patent number: 8631480Abstract: Systems and methods for providing a login context operate a virtual machine, wherein the virtual machine includes an open services platform and an authentication service, wherein the authentication service includes a classloader, and an initial classloader is designated as the classloader of the authentication service, register a login module, receive an authentication request from a first application, and responsive to receiving the authentication request designate a classloader associated with the login module as the classloader of the authentication service, generate a login context of the login module, and provide the login context of the login module to the first application, whereby the first application uses the login context to perform an authentication.Type: GrantFiled: March 28, 2011Date of Patent: January 14, 2014Assignee: Canon Kabushiki KaishaInventors: Eliza Khosrova, Harishankar Karantothu, Craig Mazzagatte, Wei-Jhy Chern
-
Patent number: 8484708Abstract: A method for delegating authentication using a challenge/response protocol is provided. The method may initiate with a challenge/response sequence between a client application and a server application to authenticate the client application. Then the server application authenticates to a second server application using the credentials associated with the client application by acting as a conduit between the client application and the second server application.Type: GrantFiled: December 11, 2009Date of Patent: July 9, 2013Assignee: Canon Kabushiki KaishaInventor: Wei-Jhy Chern
-
Patent number: 8353019Abstract: An authentication server generates a security token to be used by a client for accessing multiple service providers by obtaining a secret key for each specified service provider, generating a saltbase, generating a salt for each service providers using the saltbase, the secret key, and a hashing algorithm, generating a session key that includes the salt, assigning an order to each of the generated salts, and arranging the salts based on the orders, generating a presalt for each provider using the salt for each previous provider, generating a postsalt for each of the specified service providers using the salt for each following provider, generating a blob for each of the specified service providers using the saltbase, the respective presalt, and the respective postsalt, inserting the generated blobs for the specified service providers in the security token, and providing the generated security token to the client workstation.Type: GrantFiled: March 26, 2010Date of Patent: January 8, 2013Assignee: Canon Kabushiki KaishaInventor: Wei-Jhy Chern
-
Publication number: 20120254968Abstract: Systems and methods for providing a login context operate a virtual machine, wherein the virtual machine includes an open services platform and an authentication service, wherein the authentication service includes a classloader, and an initial classloader is designated as the classloader of the authentication service, register a login module, receive an authentication request from a first application, and responsive to receiving the authentication request designate a classloader associated with the login module as the classloader of the authentication service, generate a login context of the login module, and provide the login context of the login module to the first application, whereby the first application uses the login context to perform an authentication.Type: ApplicationFiled: March 28, 2011Publication date: October 4, 2012Applicant: CANON KABUSHIKI KAISHAInventors: Eliza Khosrova, Harishankar Karantothu, Craig Mazzagatte, Wei-Jhy Chern
-
Publication number: 20120254969Abstract: Systems and methods for providing a login context operate a virtual machine, wherein the virtual machine includes an open services platform and an authentication service, wherein the authentication service includes a classloader, and an initial classloader is designated as the classloader of the authentication service, register a login module, receive an authentication request from a first application, and responsive to receiving the authentication request designate a classloader associated with the login module as the classloader of the authentication service, generate a login context of the login module, and provide the login context of the login module to the first application, whereby the first application uses the login context to perform an authentication.Type: ApplicationFiled: March 14, 2012Publication date: October 4, 2012Applicant: CANON KABUSHIKI KAISHAInventors: Eliza Khosrova, Harishankar Karantothu, Craig Mazzagatte, Wei-Jhy Chern
-
Patent number: 8171535Abstract: A system enables a client coupled to a server via a network to exchange security policy information across the network. The client is configured to determine security policy associated with the server based on a notification returned from the server. The notification having policy information embedded therein is issued by the server in response to the server's decision to deny client's access request. Based on the policy information embedded in the notification, the client is configured to generate a new access request by either acquiring information from a client user or selecting a different credential from a library of credentials.Type: GrantFiled: December 19, 2006Date of Patent: May 1, 2012Assignee: Canon Kabushiki KaishaInventors: Ramon Rubio, Wei-Jhy Chern
-
Publication number: 20110239283Abstract: An authentication server generates a security token to be used by a client for accessing multiple service providers by obtaining a secret key for each specified service provider, generating a saltbase, generating a salt for each service providers using the saltbase, the secret key, and a hashing algorithm, generating a session key that includes the salt, assigning an order to each of the generated salts, and arranging the salts based on the orders, generating a presalt for each provider using the salt for each previous provider, generating a postsalt for each of the specified service providers using the salt for each following provider, generating a blob for each of the specified service providers using the saltbase, the respective presalt, and the respective postsalt, inserting the generated blobs for the specified service providers in the security token, and providing the generated security token to the client workstation.Type: ApplicationFiled: March 26, 2010Publication date: September 29, 2011Applicant: CANON KABUSHIKI KAISHAInventor: Wei-Jhy Chern
-
Publication number: 20110145900Abstract: A method for delegating authentication using a challenge/response protocol is provided. The method may initiate with a challenge/response sequence between a client application and a server application to authenticate the client application. Then the server application authenticates to a second server application using the credentials associated with the client application by acting as a conduit between the client application and the second server application.Type: ApplicationFiled: December 11, 2009Publication date: June 16, 2011Applicant: CANON KABUSHIKI KAISHAInventor: Wei-Jhy Chern
-
Patent number: 7925767Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.Type: GrantFiled: January 21, 2009Date of Patent: April 12, 2011Assignee: Canon Kabushiki KaishaInventors: Neil Y Iwamoto, Attullah Seikh, Jeanette Y Paek, Martin Martinez, Royce E Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
-
Publication number: 20090133104Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.Type: ApplicationFiled: January 21, 2009Publication date: May 21, 2009Inventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Y. Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
-
Patent number: 7487233Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.Type: GrantFiled: December 5, 2001Date of Patent: February 3, 2009Assignee: Canon Kabushiki KaishaInventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Y. Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
-
Publication number: 20080148344Abstract: A system enables a client coupled to a server via a network to exchange security policy information across the network. The client is configured to determine security policy associated with the server based on a notification returned from the server. The notification having policy information embedded therein is issued by the server in response to the server's decision to deny client's access request. Based on the policy information embedded in the notification, the client is configured to generate a new access request by either acquiring information from a client user or selecting a different credential from a library of credentials.Type: ApplicationFiled: December 19, 2006Publication date: June 19, 2008Applicant: CANON KABUSHIKI KAISHAInventors: Ramon Rubio, Wei-Jhy Chern
-
Patent number: 7167919Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at a server connected to the network a first level of access to the networked peripheral device, determining at the networked peripheral device a second level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access determined user-available features of the networked peripheral device based on the determined first and second levels of access.Type: GrantFiled: December 5, 2002Date of Patent: January 23, 2007Assignee: Canon Kabushiki KaishaInventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Yang Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
-
Publication number: 20030167336Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at a server connected to the network a first level of access to the networked peripheral device, determining at the networked peripheral device a second level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access determined user-available features of the networked peripheral device based on the determined first and second levels of access.Type: ApplicationFiled: December 5, 2002Publication date: September 4, 2003Applicant: Canon Kabushiki KaishaInventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Yang Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
-
Publication number: 20030105849Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.Type: ApplicationFiled: December 5, 2001Publication date: June 5, 2003Inventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Y. Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang