Patents by Inventor Albert Choy

Albert Choy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11666492
    Abstract: Disclosed is a wearable article continuous in a longitudinal direction and a transverse direction comprising a front elastic belt region, a back elastic belt region, a crotch region, a waist opening and two leg openings; the crotch region extending longitudinally between the front elastic belt region and the back elastic belt region; the front elastic belt region having an area of A1, the crotch region having an area of A2, the back elastic belt region having an area of A3, the front elastic belt region having a front placement distance L8, and the back elastic belt region having a back placement distance L9 according to the measurements herein; wherein the total of A1, A2 and A3 is from about 1250 cm2 to about 1400 cm2, and having a relationship of A3>A1>A2; and wherein the ratio of L8 to L9 is no more than about 0.8.
    Type: Grant
    Filed: November 21, 2019
    Date of Patent: June 6, 2023
    Assignee: The Procter & Gamble Company
    Inventors: Ling Tong, Koichi Morimoto, Chunmin Cheng, Albert Choy So
  • Publication number: 20200085645
    Abstract: Disclosed is a wearable article continuous in a longitudinal direction and a transverse direction comprising a front elastic belt region, a back elastic belt region, a crotch region, a waist opening and two leg openings; the crotch region extending longitudinally between the front elastic belt region and the back elastic belt region; the front elastic belt region having an area of A1, the crotch region having an area of A2, the back elastic belt region having an area of A3, the front elastic belt region having a front placement distance L8, and the back elastic belt region having a back placement distance L9 according to the measurements herein; wherein the total of A1, A2 and A3 is from about 1250 cm2 to about 1400 cm2, and having a relationship of A3>A1>A2; and wherein the ratio of L8 to L9 is no more than about 0.8.
    Type: Application
    Filed: November 21, 2019
    Publication date: March 19, 2020
    Inventors: Ling Tong, Koichi Morimoto, Chunmin Cheng, Albert Choy So
  • Patent number: 10279070
    Abstract: An absorbent article having a belt structure, wherein the inner surface of the belt comprises a treatment and wherein the inner surface of the belt is different than the outer surface of the belt.
    Type: Grant
    Filed: June 1, 2015
    Date of Patent: May 7, 2019
    Assignee: The Procter & Gamble Company
    Inventors: Ellyne Elizabeth Prodoehl, Ronald Joseph Zink, Koichi Morimoto, Albert Choy So, Chunmin Cheng
  • Publication number: 20160317695
    Abstract: An absorbent article having a belt structure, wherein the inner surface of the belt comprises a treatment and wherein the inner surface of the belt is different than the outer surface of the belt.
    Type: Application
    Filed: June 1, 2015
    Publication date: November 3, 2016
    Inventors: Ellyne Elizabeth Prodoehl, Ronald Joseph Zink, Koichi Morimoto, Albert Choy So, Chunmin Cheng
  • Publication number: 20050198099
    Abstract: Methods, systems and computer program products are disclosed for monitoring protocol responses for a server application in a computer network. The methods, systems, and computer program products can monitor communication data between a server application and a client. The methods, systems, and computer program products can also include applying one or more detectors to the communication data to identify a variety of predetermined activity. Further, the methods, systems, and computer program products can include generating a threat score associated with the predetermined activity by comparing the identified predetermined activity with a security threshold criteria.
    Type: Application
    Filed: February 24, 2004
    Publication date: September 8, 2005
    Inventors: David Motsinger, David Logan, Kenneth Gramley, Garth Somerville, Albert Choy, Douglas Hester, Virgil Wall, Byron Hargett
  • Publication number: 20050188423
    Abstract: Methods, systems and computer program products are disclosed for monitoring user behavior for a server application in a computer network. The methods, systems, and computer program products can monitor communication data between a server application and a client. The methods, systems, and computer program products can also include applying one or more detectors to the communication data to identify a variety of predetermined activity. Further, the methods, systems, and computer program products can include generating a threat score associated with the predetermined activity by comparing the identified predetermined activity with a security threshold criteria.
    Type: Application
    Filed: February 24, 2004
    Publication date: August 25, 2005
    Inventors: David Motsinger, David Logan, Kenneth Gramley, Garth Somerville, Albert Choy, Douglas Hester, Virgil Wall, Byron Hargett
  • Publication number: 20050188222
    Abstract: Methods, systems and computer program products are disclosed for monitoring user login activity for a server application in a computer network. The methods, systems, and computer program products can monitor communication data between a server application and a client. The methods, systems, and computer program products can also include applying one or more detectors to the communication data to identify a variety of predetermined activity. Further, the methods, systems, and computer program products can include generating a threat score associated with the predetermined activity by comparing the identified predetermined activity with a security threshold criteria.
    Type: Application
    Filed: February 24, 2004
    Publication date: August 25, 2005
    Inventors: David Motsinger, David Logan, Kenneth Gramley, Garth Somerville, Albert Choy, Douglas Hester, Virgil Wall, Byron Hargett
  • Publication number: 20050188080
    Abstract: Methods, systems and computer program products are disclosed for monitoring user access for a server application in a computer network. The methods, systems, and computer program products can monitor communication data between a server application and a client. The methods, systems, and computer program products can also include applying one or more detectors to the communication data to identify a variety of predetermined activity. Further, the methods, systems, and computer program products can include generating a threat score associated with the predetermined activity by comparing the identified predetermined activity with a security threshold criteria.
    Type: Application
    Filed: February 24, 2004
    Publication date: August 25, 2005
    Inventors: David Motsinger, David Logan, Kenneth Gramley, Garth Somerville, Albert Choy, Douglas Hester, Virgil Wall, Byron Hargett
  • Publication number: 20050187934
    Abstract: Methods, systems and computer program products are disclosed for geography and time monitoring of a server application user in a computer network. The methods, systems, and computer program products can monitor communication data between a server application and a client. The methods, systems, and computer program products can also include applying one or more detectors to the communication data to identify a variety of predetermined activity. Further, the methods, systems, and computer program products can include generating a threat score associated with the predetermined activity by comparing the identified predetermined activity with a security threshold criteria.
    Type: Application
    Filed: February 24, 2004
    Publication date: August 25, 2005
    Inventors: David Lee Motsinger, David Logan, Kenneth Gramley, Garth Somerville, Albert Choy, Douglas Hester, Virgil Wall, Byron Hargett
  • Publication number: 20050188079
    Abstract: Methods, systems and computer program products are disclosed for monitoring usage of a server application in a computer network. The methods, systems, and computer program products can monitor communication data between a server application and a client. The methods, systems, and computer program products can also include applying one or more detectors to the communication data to identify a variety of predetermined activity. Further, the methods, systems, and computer program products can include generating a threat score associated with the predetermined activity by comparing the identified predetermined activity with a security threshold criteria.
    Type: Application
    Filed: February 24, 2004
    Publication date: August 25, 2005
    Inventors: David Motsinger, David Logan, Kenneth Gramley, Garth Somerville, Albert Choy, Douglas Hester, Virgil Wall, Byron Hargett
  • Publication number: 20050188221
    Abstract: Methods, systems and computer program products are disclosed for monitoring a server application in a computer network. The methods, systems, and computer program products can monitor communication data between a server application and a client. The methods, systems, and computer program products can also include applying one or more detectors to the communication data to identify a variety of predetermined activity. Further, the methods, systems, and computer program products can include generating a threat score associated with the predetermined activity by comparing the identified predetermined activity with a security threshold criteria.
    Type: Application
    Filed: February 24, 2004
    Publication date: August 25, 2005
    Inventors: David Motsinger, David Logan, Kenneth Gramley, Garth Somerville, Albert Choy, Douglas Hester, Virgil Wall, Byron Hargett