Patents by Inventor Wei-Jhy Chern

Wei-Jhy Chern has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10185857
    Abstract: Devices, systems, and methods obtain a sequence of images, track a label-candidate area in the sequence of images, and read a value of a barcode of interest in the label-candidate area in an image in the sequence of images.
    Type: Grant
    Filed: July 6, 2017
    Date of Patent: January 22, 2019
    Assignees: Canon Information and Imaging Solutions, Inc., Canon U.S.A., Inc.
    Inventors: Ron S. Gutfinger, Wei-Jhy Chern
  • Publication number: 20180365462
    Abstract: Devices, systems, and methods obtain a sequence of images, track a label-candidate area in the sequence of images, and read a value of a barcode of interest in the label-candidate area in an image in the sequence of images.
    Type: Application
    Filed: July 6, 2017
    Publication date: December 20, 2018
    Inventors: Ron S. Gutfinger, Wei-Jhy Chern
  • Patent number: 9893960
    Abstract: A device hub system includes: a control unit configured to: generate a workroom for providing access to a workroom accessible resource, including an enterprise multifunctional printer, protected by a network firewall; provide authentication for a participant device to access the workroom; receive a workroom request through the workroom; generate a workroom sharable information from the workroom request; and a communication unit, coupled to the control unit, configured to distribute the workroom sharable information within the workroom.
    Type: Grant
    Filed: August 11, 2015
    Date of Patent: February 13, 2018
    Assignee: S-PRINTING SOLUTION CO., LTD.
    Inventors: Ramon Rubio, Joseph Yang, Wei-jhy Chern
  • Publication number: 20160050340
    Abstract: A device hub system includes: a control unit configured to: generate a workroom for providing access to a workroom accessible resource, including an enterprise multifunctional printer, protected by a network firewall; provide authentication for a participant device to access the workroom; receive a workroom request through the workroom; generate a workroom sharable information from the workroom request; and a communication unit, coupled to the control unit, configured to distribute the workroom sharable information within the workroom.
    Type: Application
    Filed: August 11, 2015
    Publication date: February 18, 2016
    Inventors: Ramon Rubio, Joseph Yang, Wei-jhy Chern
  • Patent number: 8732811
    Abstract: Systems and methods for providing a login context operate a virtual machine, wherein the virtual machine includes an open services platform and an authentication service, wherein the authentication service includes a classloader, and an initial classloader is designated as the classloader of the authentication service, register a login module, receive an authentication request from a first application, and responsive to receiving the authentication request designate a classloader associated with the login module as the classloader of the authentication service, generate a login context of the login module, and provide the login context of the login module to the first application, whereby the first application uses the login context to perform an authentication.
    Type: Grant
    Filed: March 14, 2012
    Date of Patent: May 20, 2014
    Assignee: Canon Kabushiki Kaisha
    Inventors: Eliza Khosrova, Harishankar Karantothu, Craig Mazzagatte, Wei-Jhy Chern
  • Patent number: 8631480
    Abstract: Systems and methods for providing a login context operate a virtual machine, wherein the virtual machine includes an open services platform and an authentication service, wherein the authentication service includes a classloader, and an initial classloader is designated as the classloader of the authentication service, register a login module, receive an authentication request from a first application, and responsive to receiving the authentication request designate a classloader associated with the login module as the classloader of the authentication service, generate a login context of the login module, and provide the login context of the login module to the first application, whereby the first application uses the login context to perform an authentication.
    Type: Grant
    Filed: March 28, 2011
    Date of Patent: January 14, 2014
    Assignee: Canon Kabushiki Kaisha
    Inventors: Eliza Khosrova, Harishankar Karantothu, Craig Mazzagatte, Wei-Jhy Chern
  • Patent number: 8484708
    Abstract: A method for delegating authentication using a challenge/response protocol is provided. The method may initiate with a challenge/response sequence between a client application and a server application to authenticate the client application. Then the server application authenticates to a second server application using the credentials associated with the client application by acting as a conduit between the client application and the second server application.
    Type: Grant
    Filed: December 11, 2009
    Date of Patent: July 9, 2013
    Assignee: Canon Kabushiki Kaisha
    Inventor: Wei-Jhy Chern
  • Patent number: 8353019
    Abstract: An authentication server generates a security token to be used by a client for accessing multiple service providers by obtaining a secret key for each specified service provider, generating a saltbase, generating a salt for each service providers using the saltbase, the secret key, and a hashing algorithm, generating a session key that includes the salt, assigning an order to each of the generated salts, and arranging the salts based on the orders, generating a presalt for each provider using the salt for each previous provider, generating a postsalt for each of the specified service providers using the salt for each following provider, generating a blob for each of the specified service providers using the saltbase, the respective presalt, and the respective postsalt, inserting the generated blobs for the specified service providers in the security token, and providing the generated security token to the client workstation.
    Type: Grant
    Filed: March 26, 2010
    Date of Patent: January 8, 2013
    Assignee: Canon Kabushiki Kaisha
    Inventor: Wei-Jhy Chern
  • Publication number: 20120254968
    Abstract: Systems and methods for providing a login context operate a virtual machine, wherein the virtual machine includes an open services platform and an authentication service, wherein the authentication service includes a classloader, and an initial classloader is designated as the classloader of the authentication service, register a login module, receive an authentication request from a first application, and responsive to receiving the authentication request designate a classloader associated with the login module as the classloader of the authentication service, generate a login context of the login module, and provide the login context of the login module to the first application, whereby the first application uses the login context to perform an authentication.
    Type: Application
    Filed: March 28, 2011
    Publication date: October 4, 2012
    Applicant: CANON KABUSHIKI KAISHA
    Inventors: Eliza Khosrova, Harishankar Karantothu, Craig Mazzagatte, Wei-Jhy Chern
  • Publication number: 20120254969
    Abstract: Systems and methods for providing a login context operate a virtual machine, wherein the virtual machine includes an open services platform and an authentication service, wherein the authentication service includes a classloader, and an initial classloader is designated as the classloader of the authentication service, register a login module, receive an authentication request from a first application, and responsive to receiving the authentication request designate a classloader associated with the login module as the classloader of the authentication service, generate a login context of the login module, and provide the login context of the login module to the first application, whereby the first application uses the login context to perform an authentication.
    Type: Application
    Filed: March 14, 2012
    Publication date: October 4, 2012
    Applicant: CANON KABUSHIKI KAISHA
    Inventors: Eliza Khosrova, Harishankar Karantothu, Craig Mazzagatte, Wei-Jhy Chern
  • Patent number: 8171535
    Abstract: A system enables a client coupled to a server via a network to exchange security policy information across the network. The client is configured to determine security policy associated with the server based on a notification returned from the server. The notification having policy information embedded therein is issued by the server in response to the server's decision to deny client's access request. Based on the policy information embedded in the notification, the client is configured to generate a new access request by either acquiring information from a client user or selecting a different credential from a library of credentials.
    Type: Grant
    Filed: December 19, 2006
    Date of Patent: May 1, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventors: Ramon Rubio, Wei-Jhy Chern
  • Publication number: 20110239283
    Abstract: An authentication server generates a security token to be used by a client for accessing multiple service providers by obtaining a secret key for each specified service provider, generating a saltbase, generating a salt for each service providers using the saltbase, the secret key, and a hashing algorithm, generating a session key that includes the salt, assigning an order to each of the generated salts, and arranging the salts based on the orders, generating a presalt for each provider using the salt for each previous provider, generating a postsalt for each of the specified service providers using the salt for each following provider, generating a blob for each of the specified service providers using the saltbase, the respective presalt, and the respective postsalt, inserting the generated blobs for the specified service providers in the security token, and providing the generated security token to the client workstation.
    Type: Application
    Filed: March 26, 2010
    Publication date: September 29, 2011
    Applicant: CANON KABUSHIKI KAISHA
    Inventor: Wei-Jhy Chern
  • Publication number: 20110145900
    Abstract: A method for delegating authentication using a challenge/response protocol is provided. The method may initiate with a challenge/response sequence between a client application and a server application to authenticate the client application. Then the server application authenticates to a second server application using the credentials associated with the client application by acting as a conduit between the client application and the second server application.
    Type: Application
    Filed: December 11, 2009
    Publication date: June 16, 2011
    Applicant: CANON KABUSHIKI KAISHA
    Inventor: Wei-Jhy Chern
  • Patent number: 7925767
    Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.
    Type: Grant
    Filed: January 21, 2009
    Date of Patent: April 12, 2011
    Assignee: Canon Kabushiki Kaisha
    Inventors: Neil Y Iwamoto, Attullah Seikh, Jeanette Y Paek, Martin Martinez, Royce E Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
  • Publication number: 20090133104
    Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.
    Type: Application
    Filed: January 21, 2009
    Publication date: May 21, 2009
    Inventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Y. Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
  • Patent number: 7487233
    Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.
    Type: Grant
    Filed: December 5, 2001
    Date of Patent: February 3, 2009
    Assignee: Canon Kabushiki Kaisha
    Inventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Y. Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
  • Publication number: 20080148344
    Abstract: A system enables a client coupled to a server via a network to exchange security policy information across the network. The client is configured to determine security policy associated with the server based on a notification returned from the server. The notification having policy information embedded therein is issued by the server in response to the server's decision to deny client's access request. Based on the policy information embedded in the notification, the client is configured to generate a new access request by either acquiring information from a client user or selecting a different credential from a library of credentials.
    Type: Application
    Filed: December 19, 2006
    Publication date: June 19, 2008
    Applicant: CANON KABUSHIKI KAISHA
    Inventors: Ramon Rubio, Wei-Jhy Chern
  • Patent number: 7167919
    Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at a server connected to the network a first level of access to the networked peripheral device, determining at the networked peripheral device a second level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access determined user-available features of the networked peripheral device based on the determined first and second levels of access.
    Type: Grant
    Filed: December 5, 2002
    Date of Patent: January 23, 2007
    Assignee: Canon Kabushiki Kaisha
    Inventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Yang Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
  • Publication number: 20030167336
    Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at a server connected to the network a first level of access to the networked peripheral device, determining at the networked peripheral device a second level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access determined user-available features of the networked peripheral device based on the determined first and second levels of access.
    Type: Application
    Filed: December 5, 2002
    Publication date: September 4, 2003
    Applicant: Canon Kabushiki Kaisha
    Inventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Yang Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
  • Publication number: 20030105849
    Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.
    Type: Application
    Filed: December 5, 2001
    Publication date: June 5, 2003
    Inventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Y. Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang