Patents by Inventor Anne Yeh

Anne Yeh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240135023
    Abstract: The present disclosure relates to methods and systems to settle a transaction involving a plurality of digital assets, comprising receiving a notification of a proposed transaction comprising a plurality of proposed component atomic transactions that atomically transfer at least a portion of the plurality of digital assets from one or more transferring nodes to one or more receiving nodes. The method further comprises at least in part determining or verifying that each transferring and receiving computer node is cryptographically authorized to receive and/or transfer at least some of the plurality of digital assets, and that each transferring and receiving computer node has a sufficient amount of the plurality of digital assets. The method further comprises sending an authorization notification to at least one execution node to transfer the plurality of digital assets from the transferring computer nodes to the receiving computer nodes to settle the proposed transaction.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Applicant: Digital Asset (Switzerland) GmbH
    Inventors: Walter Eric Saraniecki, Kelly Anne Mathieson, Ratko Goran Veprek, Johan Sjodin, Charng-Ching Yeh
  • Patent number: 11935037
    Abstract: The present disclosure relates to a system for locking a digital asset. In one implementation, the system may include a first computer node that reads a private data store associated with the first computer node and/or reads a distributed ledger to confirm a digital asset is unlocked and can be transferred from the first computer node. The first computer node cryptographically signs and sends a proposed digital lock to a second computer node. When activated, the digital lock prevents transfer of the digital asset from the first computer node to another computer node that is not the second computer node. The first computer node also reads a distributed ledger to confirm the distributed ledger contains the digital lock in an activated state. The first computer node transfers the digital asset from the first computer node to the second computer node.
    Type: Grant
    Filed: March 2, 2022
    Date of Patent: March 19, 2024
    Assignee: Digital Asset (Switzerland) GmbH
    Inventors: Walter Eric Saraniecki, Kelly Anne Mathieson, Ratko Goran Veprek, Johan Sjodin, Charng-Ching Yeh
  • Patent number: 11671457
    Abstract: Techniques are described for providing on-premises action execution agents used to execute orchestration, automation, and response (OAR) actions in users' IT environments. An on-premises action execution agent can be used to execute actions involving computing resources located in users' on-premises IT environments, where such resources may be located behind a firewall and thus not directly accessible to an IT and security operations application running in a cloud-based environment or elsewhere. An intermediary secure tunnel service is used to establish secure connections between an IT and security operations application and on-premises action execution agents, thereby enabling the encrypted transfer of credentials, API tokens, and other sensitive information used by an on-premises action execution agent to execute actions. The executed actions can include on-demand actions initiated by a user and automated actions included, e.g.
    Type: Grant
    Filed: April 30, 2021
    Date of Patent: June 6, 2023
    Assignee: Splunk Inc.
    Inventors: Anne Yeh, Jeffery Roberts
  • Publication number: 20220353295
    Abstract: Techniques are described for providing on-premises action execution agents used to execute orchestration, automation, and response (OAR) actions in users' IT environments. An on-premises action execution agent can be used to execute actions involving computing resources located in users' on-premises IT environments, where such resources may be located behind a firewall and thus not directly accessible to an IT and security operations application running in a cloud-based environment or elsewhere. An intermediary secure tunnel service is used to establish secure connections between an IT and security operations application and on-premises action execution agents, thereby enabling the encrypted transfer of credentials, API tokens, and other sensitive information used by an on-premises action execution agent to execute actions. The executed actions can include on-demand actions initiated by a user and automated actions included, e.g.
    Type: Application
    Filed: April 30, 2021
    Publication date: November 3, 2022
    Applicant: Splunk Inc.
    Inventors: Anne YEH, Jeffery ROBERTS
  • Patent number: 9117075
    Abstract: A computer network of an enterprise includes a central management computer linking at least one trusted host computer with at least one user computer. The trusted host computer is not used for normal day-to-day activities within the enterprise, and may also not be used for reading electronic mail nor for accessing the Internet and downloading Web site content. Antivirus software on the user computer screens for suspect activity or features and, if found, the suspect activity or features are compared to rules database. If a determination of malware cannot be made, then these unresolved activities or features are sent to the central management computer to be compared to the trusted, known activities and features of the trusted computer. The suspect activities may be deemed acceptable if activities are shared amongst a certain number of user computers all configured to perform the same function. A user computer may be compared against itself over time.
    Type: Grant
    Filed: November 22, 2010
    Date of Patent: August 25, 2015
    Assignee: Trend Micro Inc.
    Inventor: Anne Yeh
  • Patent number: 8266177
    Abstract: Computer implemented methods, apparati, and computer-readable media for empirically adjusting access to a database (1). An apparatus embodiment comprises: coupled to the database (1), a database discovery module (11) for determining authorized accesses to the database (1); coupled to the database (1), a command monitoring module (12) for monitoring actual accesses to the database (1); and coupled to the database discovery module (11) and to the command monitoring module (12), an analysis module (13) for comparing actual accesses with authorized accesses.
    Type: Grant
    Filed: March 16, 2004
    Date of Patent: September 11, 2012
    Assignee: Symantec Corporation
    Inventors: Harlan Seymour, Sourabh Satish, Anne Yeh, Benjamin Yeung