Patents by Inventor Andrew A. Chien
Andrew A. Chien has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250045736Abstract: Certain aspects of the present disclosure provide techniques for securely accessing a wallet on a blockchain. An example method generally includes receiving a request to access a wallet on a blockchain. The request generally includes an authorization code associated with the wallet and user credentials associated with an owner of the wallet. A first portion of a private key is decrypted based on the authorization code and a salt associated with the user credentials, and a second portion of the private key is decrypted based on credentials associated with an application through which the wallet is accessed. Access to the wallet is granted based on the decrypted first portion and the decrypted second portion of the private key.Type: ApplicationFiled: August 1, 2024Publication date: February 6, 2025Inventors: Ming Chang DONG, Huaiting HUANG, Ming Chang SHIH, Zhiyu ZHANG, Chi Huang FAN, Jordan FORSSMAN, Jayaprakash PAKALAPATI, Ka Wai TSUI, Gagneet Singh MAC, Yi-An LIN, Li TAO, Chiang HAN-ZHEN, Tzuyu HSU, Liu Chien WEI, Debra PENG, Nikhil KUMAR, Kok Peng LIM, Andrew ZIMMER, Justin BELL, Yingying ZHENG
-
Patent number: 12213617Abstract: A beverage system and methods for preparing flavored beverages are provided. In one embodiment, the beverage system includes a housing, a flavorant system, and a processor. The housing includes a mixing chamber configured to operably couple to a fluid reservoir and pressurized gas source. The processor is disposed in the housing and can be configured to cause, in response to at least one input, the separate dispensing of a fluid and a flavorant into a receptacle. The processor can also cause the delivery of gas from the pressurized gas source to the mixing chamber, where it can be used to form a carbonated fluid.Type: GrantFiled: May 13, 2022Date of Patent: February 4, 2025Assignee: SharkNinja Operating LLCInventors: Joshua David Anthony, John Kevin Clay, Gregory Allan Fish, Thomas James Launders, Stuart Mark Leslie, Luis Ramiro Gutierrez Montenegro, Joyce Chien Tu, Evan James White, Carl Robert Wrigglesworth, Andrew David Zdeblick
-
Patent number: 10628516Abstract: In one embodiment, a computing device may estimate an average dimension of several content objects. The estimation may be based on one or more calculated dimensions of one or more previously rendered content objects. The computing device may determine a first number of content objects to render for display within an area of a graphical user interface (GUI). This determination may be based at least on the average dimension of the content objects and a maximum dimension along an axis of the GUI. The computing device may also render the first number of content objects for display along the axis. The computing device may also display the first number of content objects within the area of the GUI.Type: GrantFiled: April 21, 2017Date of Patent: April 21, 2020Assignee: Facebook, Inc.Inventors: Vladimir Kolesnikov, Andrew Chien
-
Publication number: 20190005495Abstract: The present invention provides a method for verifying transactions in chip cards which effectively protects a chip card from being copied and facilitates transmission of transactional messages or transactional information over open networks. Consequently, personal information of a particular account and data stored in a chip card thereof cannot be obtained by intercepting the transmitted transactional details, effectively protecting the chip card from being copied, and facilitating the transmission of transactional messages or transactional information over open networks.Type: ApplicationFiled: July 3, 2017Publication date: January 3, 2019Inventors: Joe Chi CHEN, Andrew Chien CHEN, Louis Chien CHEN
-
Publication number: 20170228347Abstract: In one embodiment, a computing device may estimate an average dimension of several content objects. The estimation may be based on one or more calculated dimensions of one or more previously rendered content objects. The computing device may determine a first number of content objects to render for display within an area of a graphical user interface (GUI). This determination may be based at least on the average dimension of the content objects and a maximum dimension along an axis of the GUI. The computing device may also render the first number of content objects for display along the axis. The computing device may also display the first number of content objects within the area of the GUI.Type: ApplicationFiled: April 21, 2017Publication date: August 10, 2017Inventors: Vladimir Kolesnikov, Andrew Chien
-
Patent number: 9665353Abstract: In one embodiment, a computing device identifies a first number of content objects to render for display along an axis within an area of a graphical user interface based on an assumed dimension of every content object and a maximum dimension of the area along the axis. The computing device renders the first number of content objects for display along the axis within the area, and determines a difference between the assume dimensions and actual dimensions of the rendered content objects along the axis. The computing device adjusts the assumed dimension based on the difference, and identifies a second number of content objects to render for display along the axis within the area based on the assumed dimension as adjusted and the maximum dimension of the area along the axis. And the computing device renders the second number of content objects for display along the axis within the area.Type: GrantFiled: November 8, 2012Date of Patent: May 30, 2017Assignee: Facebook, Inc.Inventors: Vladimir Kolesnikov, Andrew Chien
-
Publication number: 20150060540Abstract: The present invention enables a cardholder to apply to a card issuing institution to set up a chip debit card. The card issuing institution builds a computing formula into the chip, and when the cardholder uses the chip debit card, the financial transaction system inserts relevant information from the financial transaction proceeding at that instance into the built-in formula of the chip debit card. Corresponding values produced by the computing formula are combined with hidden numerals input by the cardholder when carrying out their consumption transaction, and a dynamic combination code is derived. The dynamic combination code serves as a basis for the card issuing institution to authenticate the identity of the cardholder, thereby effectively preventing the risk of leaking, deciphering, and copying of personal information of the cardholder, and fraudulent use thereof.Type: ApplicationFiled: September 4, 2013Publication date: March 5, 2015Inventors: Joe Chi CHEN, Louis Chien CHEN, Andrew Chien CHEN
-
Publication number: 20140129966Abstract: In one embodiment, a computing device identifies a first number of content objects to render for display along an axis within an area of a graphical user interface based on an assumed dimension of every content object and a maximum dimension of the area along the axis. The computing device renders the first number of content objects for display along the axis within the area, and determines a difference between the assume dimensions and actual dimensions of the rendered content objects along the axis. The computing device adjusts the assumed dimension based on the difference, and identifies a second number of content objects to render for display along the axis within the area based on the assumed dimension as adjusted and the maximum dimension of the area along the axis. And the computing device renders the second number of content objects for display along the axis within the area.Type: ApplicationFiled: November 8, 2012Publication date: May 8, 2014Inventors: Vladimir Kolesnikov, Andrew Chien
-
Publication number: 20090119281Abstract: The application borrows terminology from data mining, association rule learning and topology. A geometric structure represents a collection of concepts in a document set. The geometric structure has a high-frequency keyword set that co-occurs closely which represents a concept in a document set. Document analysis seeks to automate the understanding of knowledge representing the author's idea. Granular computing theory deals with rough sets and fuzzy sets. One of the key insights of rough set research is that selection of different sets of features or variables will yield different concept granulations. Here, as in elementary rough set theory, by “concept” we mean a set of entities that are indistinguishable or indiscernible to the observer (i.e., a simple concept), or a set of entities that is composed from such simple concepts (i.e., a complex concept).Type: ApplicationFiled: November 29, 2007Publication date: May 7, 2009Inventors: Andrew Chien-Chung Wang, Tsau Young Lin, I-Jen Chiang
-
Publication number: 20070290704Abstract: A method and circuit for adjusting packaged device output characteristics without dedicated pads or pins are disclosed. As opposed to multiple bit selection for the purpose of trimming, the method utilizes an iterative and dynamic means to trim the bits of a built-in trimming network such as an impedance network one bit at a time. Trim time will be short because each single loop trim cycle is very short. The method is robust and not overly complicated thus may be implemented very practically. The system is dynamic in nature because the operation of the device to be trimmed need not be changed from one mode to another.Type: ApplicationFiled: June 16, 2006Publication date: December 20, 2007Inventors: Ong Lee Shyh, Wilfred King Wee Kee, Goh Fah Liang, Lester Cheung Ted Kong, Andrew Chien Kai Bing
-
Patent number: 6971064Abstract: A method for automatically forwarding and replying short message is provided. Firstly, a local user joins a message chat room. If the user presses a key for forwarding a message, the message chat room provides structuralized, modularized and hierarchy message menu to the user, else the local user waits for a plurality of pre-established reply messages provided by a server or a remote cellulous phone. At this time, the local user can press a modify key to modify the reply messages and the message chat room provides an editing window to facilitate modify operation. Afterward, the local user presses a send key after selecting a replay message.Type: GrantFiled: November 14, 2001Date of Patent: November 29, 2005Assignee: Lite-On Technology CorporationInventors: Andrew Chien, Cadmus Chen, Xavier Sun, John Chang, Edward Kuo
-
Publication number: 20030090518Abstract: A method for automatically forwarding and replying short message is provided. Firstly, a local user joins a message chat room. If the user presses a key for forwarding a message, the message chat room provides structuralized, modularized and hierarchy message menu to the user, else the local user waits for a plurality of pre-established reply messages provided by a server or a remote cellulous phone. At this time, the local user can press a modify key to modify the reply messages and the message chat room provides an editing window to facilitate modify operation. Afterward, the local user presses a send key after selecting a replay message.Type: ApplicationFiled: November 14, 2001Publication date: May 15, 2003Inventors: Andrew Chien, Cadmus Chen, Xavier Sun, John Chang, Edward Kuo
-
Publication number: 20020092003Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: July 11, 2002Inventors: Brad Calder, Andrew Chien
-
Publication number: 20020065876Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: May 30, 2002Inventors: Andrew Chien, Brad Calder, Steve Pujia
-
Publication number: 20020065776Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: May 30, 2002Inventors: Brad Calder, Ju Wang, Andrew Chien
-
Publication number: 20020066021Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: May 30, 2002Inventors: Andrew A. Chien, Brad Calder
-
Publication number: 20020065945Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: May 30, 2002Inventors: Brad Calder, Andrew A. Chien
-
Publication number: 20020065869Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: May 30, 2002Inventors: Brad Calder, Andrew Chien
-
Publication number: 20020066022Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: May 30, 2002Inventors: Brad Calder, Andrew A. Chien
-
Patent number: RE44583Abstract: A method for automatically forwarding and replying short message is provided. Firstly, a local user joins a message chat room. If the user presses a key for forwarding a message, the message chat room provides structuralized, modularized and hierarchy message menu to the user, else the local user waits for a plurality of pre-established reply messages provided by a server or a remote cellulous phone. At this time, the local user can press a modify key to modify the reply messages and the message chat room provides an editing window to facilitate modify operation. Afterward, the local user presses a send key after selecting a replay message.Type: GrantFiled: November 29, 2007Date of Patent: November 5, 2013Assignee: Guan Technologies, LLCInventors: Andrew Chien, Cadmus Chen, Xavier Sun, John Chang, Edward Kuo