Patents by Inventor Andrew Chien

Andrew Chien has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10628516
    Abstract: In one embodiment, a computing device may estimate an average dimension of several content objects. The estimation may be based on one or more calculated dimensions of one or more previously rendered content objects. The computing device may determine a first number of content objects to render for display within an area of a graphical user interface (GUI). This determination may be based at least on the average dimension of the content objects and a maximum dimension along an axis of the GUI. The computing device may also render the first number of content objects for display along the axis. The computing device may also display the first number of content objects within the area of the GUI.
    Type: Grant
    Filed: April 21, 2017
    Date of Patent: April 21, 2020
    Assignee: Facebook, Inc.
    Inventors: Vladimir Kolesnikov, Andrew Chien
  • Publication number: 20190005495
    Abstract: The present invention provides a method for verifying transactions in chip cards which effectively protects a chip card from being copied and facilitates transmission of transactional messages or transactional information over open networks. Consequently, personal information of a particular account and data stored in a chip card thereof cannot be obtained by intercepting the transmitted transactional details, effectively protecting the chip card from being copied, and facilitating the transmission of transactional messages or transactional information over open networks.
    Type: Application
    Filed: July 3, 2017
    Publication date: January 3, 2019
    Inventors: Joe Chi CHEN, Andrew Chien CHEN, Louis Chien CHEN
  • Publication number: 20170228347
    Abstract: In one embodiment, a computing device may estimate an average dimension of several content objects. The estimation may be based on one or more calculated dimensions of one or more previously rendered content objects. The computing device may determine a first number of content objects to render for display within an area of a graphical user interface (GUI). This determination may be based at least on the average dimension of the content objects and a maximum dimension along an axis of the GUI. The computing device may also render the first number of content objects for display along the axis. The computing device may also display the first number of content objects within the area of the GUI.
    Type: Application
    Filed: April 21, 2017
    Publication date: August 10, 2017
    Inventors: Vladimir Kolesnikov, Andrew Chien
  • Patent number: 9665353
    Abstract: In one embodiment, a computing device identifies a first number of content objects to render for display along an axis within an area of a graphical user interface based on an assumed dimension of every content object and a maximum dimension of the area along the axis. The computing device renders the first number of content objects for display along the axis within the area, and determines a difference between the assume dimensions and actual dimensions of the rendered content objects along the axis. The computing device adjusts the assumed dimension based on the difference, and identifies a second number of content objects to render for display along the axis within the area based on the assumed dimension as adjusted and the maximum dimension of the area along the axis. And the computing device renders the second number of content objects for display along the axis within the area.
    Type: Grant
    Filed: November 8, 2012
    Date of Patent: May 30, 2017
    Assignee: Facebook, Inc.
    Inventors: Vladimir Kolesnikov, Andrew Chien
  • Publication number: 20150060540
    Abstract: The present invention enables a cardholder to apply to a card issuing institution to set up a chip debit card. The card issuing institution builds a computing formula into the chip, and when the cardholder uses the chip debit card, the financial transaction system inserts relevant information from the financial transaction proceeding at that instance into the built-in formula of the chip debit card. Corresponding values produced by the computing formula are combined with hidden numerals input by the cardholder when carrying out their consumption transaction, and a dynamic combination code is derived. The dynamic combination code serves as a basis for the card issuing institution to authenticate the identity of the cardholder, thereby effectively preventing the risk of leaking, deciphering, and copying of personal information of the cardholder, and fraudulent use thereof.
    Type: Application
    Filed: September 4, 2013
    Publication date: March 5, 2015
    Inventors: Joe Chi CHEN, Louis Chien CHEN, Andrew Chien CHEN
  • Publication number: 20140129966
    Abstract: In one embodiment, a computing device identifies a first number of content objects to render for display along an axis within an area of a graphical user interface based on an assumed dimension of every content object and a maximum dimension of the area along the axis. The computing device renders the first number of content objects for display along the axis within the area, and determines a difference between the assume dimensions and actual dimensions of the rendered content objects along the axis. The computing device adjusts the assumed dimension based on the difference, and identifies a second number of content objects to render for display along the axis within the area based on the assumed dimension as adjusted and the maximum dimension of the area along the axis. And the computing device renders the second number of content objects for display along the axis within the area.
    Type: Application
    Filed: November 8, 2012
    Publication date: May 8, 2014
    Inventors: Vladimir Kolesnikov, Andrew Chien
  • Publication number: 20090119281
    Abstract: The application borrows terminology from data mining, association rule learning and topology. A geometric structure represents a collection of concepts in a document set. The geometric structure has a high-frequency keyword set that co-occurs closely which represents a concept in a document set. Document analysis seeks to automate the understanding of knowledge representing the author's idea. Granular computing theory deals with rough sets and fuzzy sets. One of the key insights of rough set research is that selection of different sets of features or variables will yield different concept granulations. Here, as in elementary rough set theory, by “concept” we mean a set of entities that are indistinguishable or indiscernible to the observer (i.e., a simple concept), or a set of entities that is composed from such simple concepts (i.e., a complex concept).
    Type: Application
    Filed: November 29, 2007
    Publication date: May 7, 2009
    Inventors: Andrew Chien-Chung Wang, Tsau Young Lin, I-Jen Chiang
  • Publication number: 20070290704
    Abstract: A method and circuit for adjusting packaged device output characteristics without dedicated pads or pins are disclosed. As opposed to multiple bit selection for the purpose of trimming, the method utilizes an iterative and dynamic means to trim the bits of a built-in trimming network such as an impedance network one bit at a time. Trim time will be short because each single loop trim cycle is very short. The method is robust and not overly complicated thus may be implemented very practically. The system is dynamic in nature because the operation of the device to be trimmed need not be changed from one mode to another.
    Type: Application
    Filed: June 16, 2006
    Publication date: December 20, 2007
    Inventors: Ong Lee Shyh, Wilfred King Wee Kee, Goh Fah Liang, Lester Cheung Ted Kong, Andrew Chien Kai Bing
  • Patent number: 6971064
    Abstract: A method for automatically forwarding and replying short message is provided. Firstly, a local user joins a message chat room. If the user presses a key for forwarding a message, the message chat room provides structuralized, modularized and hierarchy message menu to the user, else the local user waits for a plurality of pre-established reply messages provided by a server or a remote cellulous phone. At this time, the local user can press a modify key to modify the reply messages and the message chat room provides an editing window to facilitate modify operation. Afterward, the local user presses a send key after selecting a replay message.
    Type: Grant
    Filed: November 14, 2001
    Date of Patent: November 29, 2005
    Assignee: Lite-On Technology Corporation
    Inventors: Andrew Chien, Cadmus Chen, Xavier Sun, John Chang, Edward Kuo
  • Publication number: 20030090518
    Abstract: A method for automatically forwarding and replying short message is provided. Firstly, a local user joins a message chat room. If the user presses a key for forwarding a message, the message chat room provides structuralized, modularized and hierarchy message menu to the user, else the local user waits for a plurality of pre-established reply messages provided by a server or a remote cellulous phone. At this time, the local user can press a modify key to modify the reply messages and the message chat room provides an editing window to facilitate modify operation. Afterward, the local user presses a send key after selecting a replay message.
    Type: Application
    Filed: November 14, 2001
    Publication date: May 15, 2003
    Inventors: Andrew Chien, Cadmus Chen, Xavier Sun, John Chang, Edward Kuo
  • Publication number: 20020092003
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: July 11, 2002
    Inventors: Brad Calder, Andrew Chien
  • Publication number: 20020066021
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Andrew A. Chien, Brad Calder
  • Publication number: 20020066022
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Brad Calder, Andrew A. Chien
  • Publication number: 20020065874
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Andrew Chien, Ying-Hung Chen, Shawn Marlin, Kang Su Gatlin, Brad Calder
  • Publication number: 20020065945
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Brad Calder, Andrew A. Chien
  • Publication number: 20020065776
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Brad Calder, Ju Wang, Andrew Chien
  • Publication number: 20020065869
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Brad Calder, Andrew Chien
  • Publication number: 20020065876
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Andrew Chien, Brad Calder, Steve Pujia
  • Patent number: 5212778
    Abstract: A message-driven concurrent computer system stores incoming messages in a row buffer and then in a queue in main memory. A translator cache is also located in main memory, and output from the cache is through a set of comparators. Both the queue and cache are addressed in a wraparound fashion by hardware. An instruction buffer holds an entire row of instructions from memory. Translate, suspend and send instructions are available to the user. Tags provide for synchronization when objects are retrieved from remote processors and identify addresses as being physical addresses of a local processor or a node address of a remote processor.
    Type: Grant
    Filed: May 27, 1988
    Date of Patent: May 18, 1993
    Assignee: Massachusetts Institute of Technology
    Inventors: William J. Dally, Andrew A. Chien, Waldemar P. Horwat, Stuart Fiske
  • Patent number: RE44583
    Abstract: A method for automatically forwarding and replying short message is provided. Firstly, a local user joins a message chat room. If the user presses a key for forwarding a message, the message chat room provides structuralized, modularized and hierarchy message menu to the user, else the local user waits for a plurality of pre-established reply messages provided by a server or a remote cellulous phone. At this time, the local user can press a modify key to modify the reply messages and the message chat room provides an editing window to facilitate modify operation. Afterward, the local user presses a send key after selecting a replay message.
    Type: Grant
    Filed: November 29, 2007
    Date of Patent: November 5, 2013
    Assignee: Guan Technologies, LLC
    Inventors: Andrew Chien, Cadmus Chen, Xavier Sun, John Chang, Edward Kuo