Patents by Inventor Andrew A. Chien

Andrew A. Chien has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250045736
    Abstract: Certain aspects of the present disclosure provide techniques for securely accessing a wallet on a blockchain. An example method generally includes receiving a request to access a wallet on a blockchain. The request generally includes an authorization code associated with the wallet and user credentials associated with an owner of the wallet. A first portion of a private key is decrypted based on the authorization code and a salt associated with the user credentials, and a second portion of the private key is decrypted based on credentials associated with an application through which the wallet is accessed. Access to the wallet is granted based on the decrypted first portion and the decrypted second portion of the private key.
    Type: Application
    Filed: August 1, 2024
    Publication date: February 6, 2025
    Inventors: Ming Chang DONG, Huaiting HUANG, Ming Chang SHIH, Zhiyu ZHANG, Chi Huang FAN, Jordan FORSSMAN, Jayaprakash PAKALAPATI, Ka Wai TSUI, Gagneet Singh MAC, Yi-An LIN, Li TAO, Chiang HAN-ZHEN, Tzuyu HSU, Liu Chien WEI, Debra PENG, Nikhil KUMAR, Kok Peng LIM, Andrew ZIMMER, Justin BELL, Yingying ZHENG
  • Patent number: 12213617
    Abstract: A beverage system and methods for preparing flavored beverages are provided. In one embodiment, the beverage system includes a housing, a flavorant system, and a processor. The housing includes a mixing chamber configured to operably couple to a fluid reservoir and pressurized gas source. The processor is disposed in the housing and can be configured to cause, in response to at least one input, the separate dispensing of a fluid and a flavorant into a receptacle. The processor can also cause the delivery of gas from the pressurized gas source to the mixing chamber, where it can be used to form a carbonated fluid.
    Type: Grant
    Filed: May 13, 2022
    Date of Patent: February 4, 2025
    Assignee: SharkNinja Operating LLC
    Inventors: Joshua David Anthony, John Kevin Clay, Gregory Allan Fish, Thomas James Launders, Stuart Mark Leslie, Luis Ramiro Gutierrez Montenegro, Joyce Chien Tu, Evan James White, Carl Robert Wrigglesworth, Andrew David Zdeblick
  • Patent number: 10628516
    Abstract: In one embodiment, a computing device may estimate an average dimension of several content objects. The estimation may be based on one or more calculated dimensions of one or more previously rendered content objects. The computing device may determine a first number of content objects to render for display within an area of a graphical user interface (GUI). This determination may be based at least on the average dimension of the content objects and a maximum dimension along an axis of the GUI. The computing device may also render the first number of content objects for display along the axis. The computing device may also display the first number of content objects within the area of the GUI.
    Type: Grant
    Filed: April 21, 2017
    Date of Patent: April 21, 2020
    Assignee: Facebook, Inc.
    Inventors: Vladimir Kolesnikov, Andrew Chien
  • Publication number: 20190005495
    Abstract: The present invention provides a method for verifying transactions in chip cards which effectively protects a chip card from being copied and facilitates transmission of transactional messages or transactional information over open networks. Consequently, personal information of a particular account and data stored in a chip card thereof cannot be obtained by intercepting the transmitted transactional details, effectively protecting the chip card from being copied, and facilitating the transmission of transactional messages or transactional information over open networks.
    Type: Application
    Filed: July 3, 2017
    Publication date: January 3, 2019
    Inventors: Joe Chi CHEN, Andrew Chien CHEN, Louis Chien CHEN
  • Publication number: 20170228347
    Abstract: In one embodiment, a computing device may estimate an average dimension of several content objects. The estimation may be based on one or more calculated dimensions of one or more previously rendered content objects. The computing device may determine a first number of content objects to render for display within an area of a graphical user interface (GUI). This determination may be based at least on the average dimension of the content objects and a maximum dimension along an axis of the GUI. The computing device may also render the first number of content objects for display along the axis. The computing device may also display the first number of content objects within the area of the GUI.
    Type: Application
    Filed: April 21, 2017
    Publication date: August 10, 2017
    Inventors: Vladimir Kolesnikov, Andrew Chien
  • Patent number: 9665353
    Abstract: In one embodiment, a computing device identifies a first number of content objects to render for display along an axis within an area of a graphical user interface based on an assumed dimension of every content object and a maximum dimension of the area along the axis. The computing device renders the first number of content objects for display along the axis within the area, and determines a difference between the assume dimensions and actual dimensions of the rendered content objects along the axis. The computing device adjusts the assumed dimension based on the difference, and identifies a second number of content objects to render for display along the axis within the area based on the assumed dimension as adjusted and the maximum dimension of the area along the axis. And the computing device renders the second number of content objects for display along the axis within the area.
    Type: Grant
    Filed: November 8, 2012
    Date of Patent: May 30, 2017
    Assignee: Facebook, Inc.
    Inventors: Vladimir Kolesnikov, Andrew Chien
  • Publication number: 20150060540
    Abstract: The present invention enables a cardholder to apply to a card issuing institution to set up a chip debit card. The card issuing institution builds a computing formula into the chip, and when the cardholder uses the chip debit card, the financial transaction system inserts relevant information from the financial transaction proceeding at that instance into the built-in formula of the chip debit card. Corresponding values produced by the computing formula are combined with hidden numerals input by the cardholder when carrying out their consumption transaction, and a dynamic combination code is derived. The dynamic combination code serves as a basis for the card issuing institution to authenticate the identity of the cardholder, thereby effectively preventing the risk of leaking, deciphering, and copying of personal information of the cardholder, and fraudulent use thereof.
    Type: Application
    Filed: September 4, 2013
    Publication date: March 5, 2015
    Inventors: Joe Chi CHEN, Louis Chien CHEN, Andrew Chien CHEN
  • Publication number: 20140129966
    Abstract: In one embodiment, a computing device identifies a first number of content objects to render for display along an axis within an area of a graphical user interface based on an assumed dimension of every content object and a maximum dimension of the area along the axis. The computing device renders the first number of content objects for display along the axis within the area, and determines a difference between the assume dimensions and actual dimensions of the rendered content objects along the axis. The computing device adjusts the assumed dimension based on the difference, and identifies a second number of content objects to render for display along the axis within the area based on the assumed dimension as adjusted and the maximum dimension of the area along the axis. And the computing device renders the second number of content objects for display along the axis within the area.
    Type: Application
    Filed: November 8, 2012
    Publication date: May 8, 2014
    Inventors: Vladimir Kolesnikov, Andrew Chien
  • Publication number: 20090119281
    Abstract: The application borrows terminology from data mining, association rule learning and topology. A geometric structure represents a collection of concepts in a document set. The geometric structure has a high-frequency keyword set that co-occurs closely which represents a concept in a document set. Document analysis seeks to automate the understanding of knowledge representing the author's idea. Granular computing theory deals with rough sets and fuzzy sets. One of the key insights of rough set research is that selection of different sets of features or variables will yield different concept granulations. Here, as in elementary rough set theory, by “concept” we mean a set of entities that are indistinguishable or indiscernible to the observer (i.e., a simple concept), or a set of entities that is composed from such simple concepts (i.e., a complex concept).
    Type: Application
    Filed: November 29, 2007
    Publication date: May 7, 2009
    Inventors: Andrew Chien-Chung Wang, Tsau Young Lin, I-Jen Chiang
  • Publication number: 20070290704
    Abstract: A method and circuit for adjusting packaged device output characteristics without dedicated pads or pins are disclosed. As opposed to multiple bit selection for the purpose of trimming, the method utilizes an iterative and dynamic means to trim the bits of a built-in trimming network such as an impedance network one bit at a time. Trim time will be short because each single loop trim cycle is very short. The method is robust and not overly complicated thus may be implemented very practically. The system is dynamic in nature because the operation of the device to be trimmed need not be changed from one mode to another.
    Type: Application
    Filed: June 16, 2006
    Publication date: December 20, 2007
    Inventors: Ong Lee Shyh, Wilfred King Wee Kee, Goh Fah Liang, Lester Cheung Ted Kong, Andrew Chien Kai Bing
  • Patent number: 6971064
    Abstract: A method for automatically forwarding and replying short message is provided. Firstly, a local user joins a message chat room. If the user presses a key for forwarding a message, the message chat room provides structuralized, modularized and hierarchy message menu to the user, else the local user waits for a plurality of pre-established reply messages provided by a server or a remote cellulous phone. At this time, the local user can press a modify key to modify the reply messages and the message chat room provides an editing window to facilitate modify operation. Afterward, the local user presses a send key after selecting a replay message.
    Type: Grant
    Filed: November 14, 2001
    Date of Patent: November 29, 2005
    Assignee: Lite-On Technology Corporation
    Inventors: Andrew Chien, Cadmus Chen, Xavier Sun, John Chang, Edward Kuo
  • Publication number: 20030090518
    Abstract: A method for automatically forwarding and replying short message is provided. Firstly, a local user joins a message chat room. If the user presses a key for forwarding a message, the message chat room provides structuralized, modularized and hierarchy message menu to the user, else the local user waits for a plurality of pre-established reply messages provided by a server or a remote cellulous phone. At this time, the local user can press a modify key to modify the reply messages and the message chat room provides an editing window to facilitate modify operation. Afterward, the local user presses a send key after selecting a replay message.
    Type: Application
    Filed: November 14, 2001
    Publication date: May 15, 2003
    Inventors: Andrew Chien, Cadmus Chen, Xavier Sun, John Chang, Edward Kuo
  • Publication number: 20020092003
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: July 11, 2002
    Inventors: Brad Calder, Andrew Chien
  • Publication number: 20020065876
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Andrew Chien, Brad Calder, Steve Pujia
  • Publication number: 20020065776
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Brad Calder, Ju Wang, Andrew Chien
  • Publication number: 20020066021
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Andrew A. Chien, Brad Calder
  • Publication number: 20020065945
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Brad Calder, Andrew A. Chien
  • Publication number: 20020065869
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Brad Calder, Andrew Chien
  • Publication number: 20020066022
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Brad Calder, Andrew A. Chien
  • Patent number: RE44583
    Abstract: A method for automatically forwarding and replying short message is provided. Firstly, a local user joins a message chat room. If the user presses a key for forwarding a message, the message chat room provides structuralized, modularized and hierarchy message menu to the user, else the local user waits for a plurality of pre-established reply messages provided by a server or a remote cellulous phone. At this time, the local user can press a modify key to modify the reply messages and the message chat room provides an editing window to facilitate modify operation. Afterward, the local user presses a send key after selecting a replay message.
    Type: Grant
    Filed: November 29, 2007
    Date of Patent: November 5, 2013
    Assignee: Guan Technologies, LLC
    Inventors: Andrew Chien, Cadmus Chen, Xavier Sun, John Chang, Edward Kuo