Patents by Inventor Andrew Chien
Andrew Chien has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10628516Abstract: In one embodiment, a computing device may estimate an average dimension of several content objects. The estimation may be based on one or more calculated dimensions of one or more previously rendered content objects. The computing device may determine a first number of content objects to render for display within an area of a graphical user interface (GUI). This determination may be based at least on the average dimension of the content objects and a maximum dimension along an axis of the GUI. The computing device may also render the first number of content objects for display along the axis. The computing device may also display the first number of content objects within the area of the GUI.Type: GrantFiled: April 21, 2017Date of Patent: April 21, 2020Assignee: Facebook, Inc.Inventors: Vladimir Kolesnikov, Andrew Chien
-
Publication number: 20190005495Abstract: The present invention provides a method for verifying transactions in chip cards which effectively protects a chip card from being copied and facilitates transmission of transactional messages or transactional information over open networks. Consequently, personal information of a particular account and data stored in a chip card thereof cannot be obtained by intercepting the transmitted transactional details, effectively protecting the chip card from being copied, and facilitating the transmission of transactional messages or transactional information over open networks.Type: ApplicationFiled: July 3, 2017Publication date: January 3, 2019Inventors: Joe Chi CHEN, Andrew Chien CHEN, Louis Chien CHEN
-
Publication number: 20170228347Abstract: In one embodiment, a computing device may estimate an average dimension of several content objects. The estimation may be based on one or more calculated dimensions of one or more previously rendered content objects. The computing device may determine a first number of content objects to render for display within an area of a graphical user interface (GUI). This determination may be based at least on the average dimension of the content objects and a maximum dimension along an axis of the GUI. The computing device may also render the first number of content objects for display along the axis. The computing device may also display the first number of content objects within the area of the GUI.Type: ApplicationFiled: April 21, 2017Publication date: August 10, 2017Inventors: Vladimir Kolesnikov, Andrew Chien
-
Patent number: 9665353Abstract: In one embodiment, a computing device identifies a first number of content objects to render for display along an axis within an area of a graphical user interface based on an assumed dimension of every content object and a maximum dimension of the area along the axis. The computing device renders the first number of content objects for display along the axis within the area, and determines a difference between the assume dimensions and actual dimensions of the rendered content objects along the axis. The computing device adjusts the assumed dimension based on the difference, and identifies a second number of content objects to render for display along the axis within the area based on the assumed dimension as adjusted and the maximum dimension of the area along the axis. And the computing device renders the second number of content objects for display along the axis within the area.Type: GrantFiled: November 8, 2012Date of Patent: May 30, 2017Assignee: Facebook, Inc.Inventors: Vladimir Kolesnikov, Andrew Chien
-
Publication number: 20150060540Abstract: The present invention enables a cardholder to apply to a card issuing institution to set up a chip debit card. The card issuing institution builds a computing formula into the chip, and when the cardholder uses the chip debit card, the financial transaction system inserts relevant information from the financial transaction proceeding at that instance into the built-in formula of the chip debit card. Corresponding values produced by the computing formula are combined with hidden numerals input by the cardholder when carrying out their consumption transaction, and a dynamic combination code is derived. The dynamic combination code serves as a basis for the card issuing institution to authenticate the identity of the cardholder, thereby effectively preventing the risk of leaking, deciphering, and copying of personal information of the cardholder, and fraudulent use thereof.Type: ApplicationFiled: September 4, 2013Publication date: March 5, 2015Inventors: Joe Chi CHEN, Louis Chien CHEN, Andrew Chien CHEN
-
Publication number: 20140129966Abstract: In one embodiment, a computing device identifies a first number of content objects to render for display along an axis within an area of a graphical user interface based on an assumed dimension of every content object and a maximum dimension of the area along the axis. The computing device renders the first number of content objects for display along the axis within the area, and determines a difference between the assume dimensions and actual dimensions of the rendered content objects along the axis. The computing device adjusts the assumed dimension based on the difference, and identifies a second number of content objects to render for display along the axis within the area based on the assumed dimension as adjusted and the maximum dimension of the area along the axis. And the computing device renders the second number of content objects for display along the axis within the area.Type: ApplicationFiled: November 8, 2012Publication date: May 8, 2014Inventors: Vladimir Kolesnikov, Andrew Chien
-
Publication number: 20090119281Abstract: The application borrows terminology from data mining, association rule learning and topology. A geometric structure represents a collection of concepts in a document set. The geometric structure has a high-frequency keyword set that co-occurs closely which represents a concept in a document set. Document analysis seeks to automate the understanding of knowledge representing the author's idea. Granular computing theory deals with rough sets and fuzzy sets. One of the key insights of rough set research is that selection of different sets of features or variables will yield different concept granulations. Here, as in elementary rough set theory, by “concept” we mean a set of entities that are indistinguishable or indiscernible to the observer (i.e., a simple concept), or a set of entities that is composed from such simple concepts (i.e., a complex concept).Type: ApplicationFiled: November 29, 2007Publication date: May 7, 2009Inventors: Andrew Chien-Chung Wang, Tsau Young Lin, I-Jen Chiang
-
Publication number: 20070290704Abstract: A method and circuit for adjusting packaged device output characteristics without dedicated pads or pins are disclosed. As opposed to multiple bit selection for the purpose of trimming, the method utilizes an iterative and dynamic means to trim the bits of a built-in trimming network such as an impedance network one bit at a time. Trim time will be short because each single loop trim cycle is very short. The method is robust and not overly complicated thus may be implemented very practically. The system is dynamic in nature because the operation of the device to be trimmed need not be changed from one mode to another.Type: ApplicationFiled: June 16, 2006Publication date: December 20, 2007Inventors: Ong Lee Shyh, Wilfred King Wee Kee, Goh Fah Liang, Lester Cheung Ted Kong, Andrew Chien Kai Bing
-
Patent number: 6971064Abstract: A method for automatically forwarding and replying short message is provided. Firstly, a local user joins a message chat room. If the user presses a key for forwarding a message, the message chat room provides structuralized, modularized and hierarchy message menu to the user, else the local user waits for a plurality of pre-established reply messages provided by a server or a remote cellulous phone. At this time, the local user can press a modify key to modify the reply messages and the message chat room provides an editing window to facilitate modify operation. Afterward, the local user presses a send key after selecting a replay message.Type: GrantFiled: November 14, 2001Date of Patent: November 29, 2005Assignee: Lite-On Technology CorporationInventors: Andrew Chien, Cadmus Chen, Xavier Sun, John Chang, Edward Kuo
-
Publication number: 20030090518Abstract: A method for automatically forwarding and replying short message is provided. Firstly, a local user joins a message chat room. If the user presses a key for forwarding a message, the message chat room provides structuralized, modularized and hierarchy message menu to the user, else the local user waits for a plurality of pre-established reply messages provided by a server or a remote cellulous phone. At this time, the local user can press a modify key to modify the reply messages and the message chat room provides an editing window to facilitate modify operation. Afterward, the local user presses a send key after selecting a replay message.Type: ApplicationFiled: November 14, 2001Publication date: May 15, 2003Inventors: Andrew Chien, Cadmus Chen, Xavier Sun, John Chang, Edward Kuo
-
Publication number: 20020092003Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: July 11, 2002Inventors: Brad Calder, Andrew Chien
-
Publication number: 20020066021Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: May 30, 2002Inventors: Andrew A. Chien, Brad Calder
-
Publication number: 20020066022Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: May 30, 2002Inventors: Brad Calder, Andrew A. Chien
-
Publication number: 20020065874Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: May 30, 2002Inventors: Andrew Chien, Ying-Hung Chen, Shawn Marlin, Kang Su Gatlin, Brad Calder
-
Publication number: 20020065945Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: May 30, 2002Inventors: Brad Calder, Andrew A. Chien
-
Publication number: 20020065776Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: May 30, 2002Inventors: Brad Calder, Ju Wang, Andrew Chien
-
Publication number: 20020065869Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: May 30, 2002Inventors: Brad Calder, Andrew Chien
-
Publication number: 20020065876Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.Type: ApplicationFiled: November 29, 2000Publication date: May 30, 2002Inventors: Andrew Chien, Brad Calder, Steve Pujia
-
Patent number: 5212778Abstract: A message-driven concurrent computer system stores incoming messages in a row buffer and then in a queue in main memory. A translator cache is also located in main memory, and output from the cache is through a set of comparators. Both the queue and cache are addressed in a wraparound fashion by hardware. An instruction buffer holds an entire row of instructions from memory. Translate, suspend and send instructions are available to the user. Tags provide for synchronization when objects are retrieved from remote processors and identify addresses as being physical addresses of a local processor or a node address of a remote processor.Type: GrantFiled: May 27, 1988Date of Patent: May 18, 1993Assignee: Massachusetts Institute of TechnologyInventors: William J. Dally, Andrew A. Chien, Waldemar P. Horwat, Stuart Fiske
-
Patent number: RE44583Abstract: A method for automatically forwarding and replying short message is provided. Firstly, a local user joins a message chat room. If the user presses a key for forwarding a message, the message chat room provides structuralized, modularized and hierarchy message menu to the user, else the local user waits for a plurality of pre-established reply messages provided by a server or a remote cellulous phone. At this time, the local user can press a modify key to modify the reply messages and the message chat room provides an editing window to facilitate modify operation. Afterward, the local user presses a send key after selecting a replay message.Type: GrantFiled: November 29, 2007Date of Patent: November 5, 2013Assignee: Guan Technologies, LLCInventors: Andrew Chien, Cadmus Chen, Xavier Sun, John Chang, Edward Kuo