Patents by Inventor Andrew Hsieh
Andrew Hsieh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9113333Abstract: A system and machine-implemented method for providing a username and password to a system using a device, via establishing a near field communication link with the system; retrieving a username and password from storage on the device; and transmitting the username and password to the system via the near field communication link, wherein the username and password are configured to be used by the system to authenticate the user on the system.Type: GrantFiled: September 24, 2013Date of Patent: August 18, 2015Assignee: Google Inc.Inventors: Yung-Chieh Lo, Vincent Wu, Cheng-Hsueh Andrew Hsieh, Chinyue Chen
-
Publication number: 20140288097Abstract: The present invention provides methods of identifying an agent or drug candidate molecule, validating a target, and identifying normalizing therapeutics that modulates translation, such as in an oncogenic signaling pathway, in a biological sample as determined by translational profiling of one or more genes in the biological sample. The present invention also provides diagnostic and therapeutic methods using the translational profiling methods described herein.Type: ApplicationFiled: February 7, 2014Publication date: September 25, 2014Applicant: The Regents of The University of CaliforniaInventors: Davide Ruggero, Andrew Hsieh, Merritt Edlind, Kevan M. Shokat, James Appleman, Steve Worland
-
Publication number: 20140243356Abstract: The present invention provides methods of identifying an agent that modulates an oncogenic signaling pathway in a biological sample by generating a translational profile of gene translational levels in the biological sample. The present invention also provides diagnostic and therapeutic methods using the translational profiling methods described herein.Type: ApplicationFiled: February 7, 2014Publication date: August 28, 2014Applicant: The Regents of the University of CaliforniaInventors: Davide Ruggero, Andrew Hsieh, Merritt Edlind
-
Patent number: 8812601Abstract: A first client device executes a plurality of actively running applications, each having one or more checkpoints, each checkpoint identifying an execution breakpoint at which a respective application can be suspended and subsequently resumed. The first client device detects a transfer triggering condition, stores an application state for each of the plurality of actively running applications, and transmits the stored application state for each of the plurality of actively running applications to a second client device or system. The stored application state for each respective application of the plurality of actively running applications corresponds to a checkpoint of the respective application. Optionally, the transfer triggering condition includes presence of the second client device or system within a predefined proximity of the first client device or system, wherein the predefined proximity is a predefined proximity for near field communication.Type: GrantFiled: September 28, 2011Date of Patent: August 19, 2014Assignee: Google Inc.Inventors: Cheng-Hsueh Andrew Hsieh, Chinyue Chen, Yung-Chieh Lo, Jason Parks, Nicholas Julian Pelly, Jeffrey William Hamilton
-
Patent number: 8763094Abstract: Various aspects of this disclosure are directed to receiving, by a first computing device, one or more communications from a second device. The one or more communications may be transmitted using a short range wireless communication protocol. The one or more communications may include network configuration information usable to connect the first computing device to a first network and network authentication information. The first computing device may configure the first computing device to connect to the first network using the network configuration information. The first computing device may automatically connect to the first network by at least submitting, using a hypertext transfer protocol (HTTP) authentication mechanism, the authentication information to a third computing device that manages access to a second network accessible using the first network.Type: GrantFiled: September 14, 2011Date of Patent: June 24, 2014Assignee: Google Inc.Inventors: Andrew Hsieh, Chinyue Chen, Yung-chieh Lo
-
Publication number: 20140026202Abstract: A system and machine-implemented method for providing a username and password to a system using a device, via establishing a near field communication link with the system; retrieving a username and password from storage on the device; and transmitting the username and password to the system via the near field communication link, wherein the username and password are configured to be used by the system to authenticate the user on the system.Type: ApplicationFiled: September 24, 2013Publication date: January 23, 2014Applicant: Google Inc.Inventors: Yung-Chieh LO, Vincent Wu, Cheng-Hsueh Andrew Hsieh, Chinyue Chen
-
Publication number: 20140012628Abstract: A system and a method are disclosed for providing buyers of products with a customized list of products for sale that meet the buyers' criteria, capturing buyers' interactions with the products and analyzing the product's popularity based on the interactions.Type: ApplicationFiled: July 25, 2013Publication date: January 9, 2014Applicant: Lux DeluxInventor: Andrew Hsieh
-
Publication number: 20130325967Abstract: A first client device or system performs a method that includes retaining in memory registration information for a respective application indicating the respective application is registered for sharing application state with other client devices or systems. The method further includes storing an application state of a respective application, and detecting a transfer triggering condition. The transfer triggering condition includes presence of a second client device or system within a predefined proximity of the first client device or system, and the predefined proximity is a predefined proximity for near field communication. Furthermore, upon detecting the triggering condition, the first client device or system determines, in accordance with the stored registration information, that the respective application is registered for application state sharing, and transmits the application state of the respective application to the second client device or system.Type: ApplicationFiled: July 1, 2013Publication date: December 5, 2013Applicant: Google Inc.Inventors: Jason Parks, Nicholas Julian Pelly, Jeffrey William Hamilton, Cheng-Hsueh Andrew Hsieh, Chinyue Chen, Yung-Chieh Lo
-
Patent number: 8555363Abstract: A system and machine-implemented method for providing a username and password to a system using a device, via establishing a near field communication link with the system; retrieving a username and password from storage on the device; and transmitting the username and password to the system via the near field communication link, wherein the username and password are configured to be used by the system to authenticate the user on the system.Type: GrantFiled: September 16, 2011Date of Patent: October 8, 2013Assignee: Google Inc.Inventors: Yung-Chieh Lo, Vincent Wu, Cheng-Hsueh Andrew Hsieh, Chinyue Chen
-
Patent number: 8478816Abstract: A first client device or system performs a method that includes retaining in memory registration information for a respective application indicating the respective application is registered for sharing application state with other client devices or systems. The method further includes storing an application state of a respective application, and detecting a transfer triggering condition. The transfer triggering condition includes presence of a second client device or system within a predefined proximity of the first client device or system, and the predefined proximity is a predefined proximity for near field communication. Furthermore, upon detecting the triggering condition, the first client device or system determines, in accordance with the stored registration information, that the respective application is registered for application state sharing, and transmits the application state of the respective application to the second client device or system.Type: GrantFiled: May 1, 2012Date of Patent: July 2, 2013Assignee: Google Inc.Inventors: Jason Parks, Nicholas Julian Pelly, Jeffrey William Hamilton, Cheng-Hsueh Andrew Hsieh, Chinyue Chen, Yung-Chieh Lo
-
Publication number: 20130074170Abstract: A system and machine-implemented method for providing a username and password to a system using a device, via establishing a near field communication link with the system; retrieving a username and password from storage on the device; and transmitting the username and password to the system via the near field communication link, wherein the username and password are configured to be used by the system to authenticate the user on the system.Type: ApplicationFiled: September 16, 2011Publication date: March 21, 2013Applicant: GOOGLE INCInventors: Yung-Chieh LO, Vince Wu, Cheng-Hsueh Andrew Hsieh, Chinyue Chen
-
Patent number: 8381270Abstract: Various aspects of this disclosure are directed to receiving, by a first computing device, one or more communications from a second device. The one or more communications may be transmitted using a short range wireless communication protocol. The one or more communications may include network configuration information usable to connect the first computing device to a first network and network authentication information. The first computing device may configure the first computing device to connect to the first network using the network configuration information. The first computing device may automatically connect to the first network by at least submitting, using a hypertext transfer protocol (HTTP) authentication mechanism, the authentication information to a third computing device that manages access to a second network accessible using the first network.Type: GrantFiled: September 30, 2011Date of Patent: February 19, 2013Assignee: Google Inc.Inventors: Andrew Hsieh, Chinyue Chen, Yung-chieh Lo
-
Patent number: 8321922Abstract: A system and machine-implemented method for providing a username and password to a system using a device, via establishing a near field communication link with the system; retrieving a username and password from storage on the device; and transmitting the username and password to the system via the near field communication link, wherein the username and password are configured to be used by the system to authenticate the user on the system.Type: GrantFiled: September 26, 2011Date of Patent: November 27, 2012Assignee: Google Inc.Inventors: Yung-Chieh Lo, Vincent Wu, Cheng-Hsueh Andrew Hsieh, Chinyue Chen
-
Publication number: 20120290663Abstract: A first client device executes a plurality of actively running applications, each having one or more checkpoints, each checkpoint identifying an execution breakpoint at which a respective application can be suspended and subsequently resumed. The first client device detects a transfer triggering condition, stores an application state for each of the plurality of actively running applications, and transmits the stored application state for each of the plurality of actively running applications to a second client device or system. The stored application state for each respective application of the plurality of actively running applications corresponds to a checkpoint of the respective application. Optionally, the transfer triggering condition includes presence of the second client device or system within a predefined proximity of the first client device or system, wherein the predefined proximity is a predefined proximity for near field communication.Type: ApplicationFiled: September 28, 2011Publication date: November 15, 2012Inventors: Cheng-Hsueh Andrew Hsieh, Chinyue Chen, Yung-Chieh Lo, Jason Parks, Nicholas Julian Pelly, Jeffrey William Hamilton
-
Publication number: 20120290657Abstract: A first client device or system performs a method that includes retaining in memory registration information for a respective application indicating the respective application is registered for sharing application state with other client devices or systems. The method further includes storing an application state of a respective application, and detecting a transfer triggering condition. The transfer triggering condition includes presence of a second client device or system within a predefined proximity of the first client device or system, and the predefined proximity is a predefined proximity for near field communication. Furthermore, upon detecting the triggering condition, the first client device or system determines, in accordance with the stored registration information, that the respective application is registered for application state sharing, and transmits the application state of the respective application to the second client device or system.Type: ApplicationFiled: May 1, 2012Publication date: November 15, 2012Inventors: Jason Parks, Nicholas Julian Pelly, Jeffrey William Hamilton, Cheng-Hsueh Andrew Hsieh, Chinyue Chen, Yung-Chieh Lo
-
Patent number: 8171137Abstract: A first client device or system performs a method that includes retaining in memory registration information for a respective application indicating the respective application is registered for sharing application state with other client devices or systems. The method further includes storing an application state of a respective application, and detecting a transfer triggering condition. The transfer triggering condition includes presence of a second client device or system within a predefined proximity of the first client device or system, and the predefined proximity is a predefined proximity for near field communication. Furthermore, upon detecting the triggering condition, the first client device or system determines, in accordance with the stored registration information, that the respective application is registered for application state sharing, and transmits the application state of the respective application to the second client device or system.Type: GrantFiled: September 28, 2011Date of Patent: May 1, 2012Assignee: Google Inc.Inventors: Jason Parks, Nicholas Julian Pelly, Jeffrey William Hamilton, Cheng-Hsueh Andrew Hsieh, Chinyue Chen, Yung-Chieh Lo
-
Publication number: 20110224223Abstract: The present invention provides methods and compositions for selective modulation of certain protein kinases, and especially mTor complexes. The methods and compositions are particularly useful in inhibiting mTor selectively for therapeutic applications.Type: ApplicationFiled: July 8, 2009Publication date: September 15, 2011Applicants: The Regents of the University of California, a California corporation, Intellikine, Inc.Inventors: Kevan M. Shokat, David Fruman, Pingda Ren, Troy Edward Wilson, Liansheng Li, Andrew Hsieh, Morris Feldman, Beth Apsel, Yi Liu, Christian Rommel, Katrina Chan, Davide Ruggero, David Pearce, Matthew Janes
-
Patent number: 7350200Abstract: Space occupied by native code associated with a first method and stored within a native code space is reclaimed by determining whether the native code space exceeds a threshold in response to the invocation of a second method. Once the determination is made, byte code is compiled into native code associated with the second method and the native code associated with the first method may be reclaimed. In one embodiment, this reclamation occurs in response to a determination that the threshold has been exceeded and that the first method is inactive. In another embodiment, reclamation occurs in response to a determination that the threshold has been exceeded and that the first method is cold.Type: GrantFiled: March 29, 2001Date of Patent: March 25, 2008Assignee: Intel CorporationInventors: Guei-Yuan Lueh, Tatiana Shpeisman, Michal Cierniak, Cheng-Hsueh Andrew Hsieh
-
Publication number: 20020144240Abstract: Space occupied by native code associated with a first method and stored within a native code space is reclaimed by determining whether the native code space exceeds a threshold in response to the invocation of a second method. Once the determination is made, byte code is compiled into native code associated with the second method and the native code associated with the first method may be reclaimed. In one embodiment, this reclamation occurs in response to a determination that the threshold has been exceeded and that the first method is inactive. In another embodiment, reclamation occurs in response to a determination that the threshold has been exceeded and that the first method is cold.Type: ApplicationFiled: March 29, 2001Publication date: October 3, 2002Inventors: Guei-Yuan Lueh, Tatiana Shpeisman, Michal Cierniak, Cheng-Hsueh Andrew Hsieh