Patents by Inventor Charles Lim
Charles Lim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12332455Abstract: Users exploiting near-to-eye (NR2I) displays for augmented reality and/or correction of low vision are typically wearing these NR2I displays for specific tasks or for extended periods of time, potentially all their time awake. Conflicting tradeoffs between user comfort and minimal fatigue and strain during use, ease of attachment, minimizing intrusiveness and aesthetics should be concurrently balanced with providing an optical vision system that provides the user with a wide field of view, high image resolution, and a large exit pupil for eye placement with sufficient eye clearance. Accordingly, embodiments of the invention provide NR2I displays meeting these conflicts whilst also addressing the inherent variations between user in respect of their head dimensions, head and eye geometry, as well as adapting the displayed content to reflect the user's task at-hand, visual defects or degradations, visual focus and intent upon various regions-of-interest within their field of view.Type: GrantFiled: May 3, 2021Date of Patent: June 17, 2025Assignee: GENTEX CORPORATIONInventors: Mark Harris, Evan Fitzpatrick, Mehdi Arezmoomand Ershadi, Mukesh Kumar, James Benson Bacque, Charles Lim, Gurpreet Singh, Krishna Balekai, Rod Batterton, Phong Lieu, Jon Pawson
-
Publication number: 20250150281Abstract: A method may include: sharing, by a client computer program and a server computer program, a set of identification keys, each identification key associated with a key label, and an authentication key; selecting, by the client computer program and the server computer program, one of the key labels; preparing, by the client computer program, quantum systems using a basis, randomly chosen bit values, and intensities; sending, by the client computer program, the quantum systems to the server computer program over a quantum communication channel, wherein the server computer program may be configured to measure the quantum systems using the basis and to announce quantum systems with photon detection; and generating, by the client computer program, a client tag using a shared keyed hash function executed on the authentication key and chosen bit values from the quantum systems with photon detection, and forwarding the client tag to the server computer program.Type: ApplicationFiled: July 7, 2023Publication date: May 8, 2025Inventors: Wen Yu KON, Kaushik CHAKRABORT, Charles LIM, Omar AMER, Marco PISTOIA
-
Publication number: 20250047651Abstract: A method may include: receiving, by a webserver computer program, shared key material shared with a client application; receiving from a browser, a request for a secure connection; establishing a session with the browser over a first secure connection; establishing a shared secret key with the browser, wherein the browser creates a browser secret key encrypted with the shared secret key, encrypts the browser secret key with the shared secret key, and provides the browser secret key encrypted with the shared secret key and session information the client application over a second secure connection that is protected with the shared key material; decrypting the browser secret key encrypted with the shared secret key using the shared secret key; identifying the session with the browser from the session information; and establishing, end-to-end encryption on top of the second secure connection using the browser secret key or a derivation thereof.Type: ApplicationFiled: July 31, 2023Publication date: February 6, 2025Inventors: Omar AMER, Jefferson CHU, John S. COMBS, Andrew LANG, Charles LIM, Marco PISTOIA, Vas RAJAN, Ray VOSS
-
Publication number: 20240356738Abstract: Systems and methods for bridging gaps in cryptographic secret distribution using line-of-sight-secured networks are disclosed. In one embodiment, a system may include: a first physical location providing a cryptographic secret; a second physical location comprising a space-based vehicle transceiver that receives the cryptographic secret from the first physical location over a secure communication channel; a space-based vehicle that receives the cryptographic secret from the second physical location over a first line-of-sight communication channel; and a third physical location that receives the cryptographic secret from the space-based vehicle over a second line-of-sight communication channel, encrypts data with the cryptographic secret, and communicates the encrypted data to the first physical location over a communication network; wherein the first physical location receives the encrypted data and decrypts the encrypted data using the cryptographic secret.Type: ApplicationFiled: April 21, 2023Publication date: October 24, 2024Inventors: Omar AMER, Charles LIM, Marco PISTOIA, Andrew LANG, Vas RAJAN, Kaushik CHAKRABORTY, Saqib MALIK
-
Publication number: 20240356741Abstract: Systems and methods for secure cryptographic secret distribution are disclosed. In one embodiment, a method for secure cryptographic secret distribution may include: (1) receiving, at a key relay station, a cryptographic secret from a webserver over a first communication network; (2) storing, by the key relay station, the cryptographic secret; (3) authenticating, by the key relay station, an end user via an end user electronic device; and (4) securely communicating, by the key relay station, the cryptographic secret to the end user electronic device. The end user electronic device is configured to store the cryptographic secret in secure storage on the end user electronic device, to encrypt data with the cryptographic secret, and to communicate the encrypted data to the webserver over a second communication network.Type: ApplicationFiled: April 21, 2023Publication date: October 24, 2024Inventors: Omar AMER, Charles LIM, Marco PISTOIA, Andrew LANG, Vas RAJAN, Kaushik CHAKRABORTY, Saqib MALIK
-
Publication number: 20240291640Abstract: Systems and methods for quantum key distribution (QKD) secured vault-based application-to-application communication are disclosed. A method may include: receiving, at a vault application at a first facility, a request for a shared quantum key for communication of a secret in a vault at the first facility to an application at a second facility; distilling, by quantum devices at the first and the second facility and over a quantum communication channel, a shared quantum key using a QKD protocol; receiving, by an encryptor at the first facility, the secret; encrypting, by the encryptor at the first facility, the secret with the shared quantum key, communicating, the encrypted secret to the second facility over a communication network; decrypting, by an encryptor at the second facility, the encrypted secret with the shared quantum key; and receiving, by the application at the second facility, the secret from the encryptor at the second facility.Type: ApplicationFiled: February 27, 2023Publication date: August 29, 2024Inventors: Omar AMER, John S. COMBS, Albert HUANG, Andrew LANG, Charles LIM, Marco PISTOIA
-
Patent number: 11240017Abstract: The invention relates to a Quantum Key Distribution system comprising a transmitter 300 and a receiver 400 for exchanging a quantum key via a quantum channel 600 through a decoy-state three state protocol wherein the transmitter comprises a transmitter processing unit 340 adapted to use random numbers from a quantum random generator to select a quantum state to encode from different states of intensity and basis, a Pulsed light source 310 adapted to generate an optical pulse, a time-bin interferometer 320 through which the generated optical pulse passes and which transforms generated optical pulse into two coherent pulses separated by the time bin duration, a single intensity modulator 360 adapted to change the intensity of the two pulses individually according to the choice made by the transmitter processing unit 340, and a variable optical attenuator 370 adapted to reduce the overall signal intensity to the optimum photon number per pulse.Type: GrantFiled: May 2, 2018Date of Patent: February 1, 2022Assignee: UNIVERSITE DE GENEVEInventors: Hugo Zbinden, Boris Korzh, Charles Lim, Gianluca Boso
-
Publication number: 20200067704Abstract: The invention relates to a Quantum Key Distribution system comprising a transmitter 300 and a receiver 400 for exchanging a quantum key via a quantum channel 600 through a decoy-state three state protocol wherein the transmitter comprises a transmitter processing unit 340 adapted to use random numbers from a quantum random generator to select a quantum state to encode from different states of intensity and basis, a Pulsed light source 310 adapted to generate an optical pulse, a time-bin interferometer 320 through which the generated optical pulse passes and which transforms generated optical pulse into two coherent pulses separated by the time bin duration, a single intensity modulator 360 adapted to change the intensity of the two pulses individually according to the choice made by the transmitter processing unit 340, and a variable optical attenuator 370 adapted to reduce the overall signal intensity to the optimum photon number per pulse.Type: ApplicationFiled: May 2, 2018Publication date: February 27, 2020Inventors: Hugo ZBINDEN, Boris KORZH, Charles LIM, Gianluca BOSO
-
Patent number: 7698662Abstract: Systems and methods of laying out integrated circuits are disclosed. During the layout stage of an integrated circuit device, a fixed, physical geometry is created of the parameterized cells (PCells) included in the integrated circuit schematic. The systems include a proxy engine configured to save to cache the geometries created during the layout stage such that the geometries need not be recomputed when the design is opened after a save to disk operation, during which geometries may otherwise be destroyed. The proxy engine may further be configured to delegate requests for the creation of geometries to other components of the integrated circuit design system. In addition, the proxy engine may be configured to perform customized evaluations of PCells, other than or in addition to caching and delegation.Type: GrantFiled: July 21, 2006Date of Patent: April 13, 2010Assignee: Ciranova, Inc.Inventors: Felix Sun-Tsyr Wu, Edwin Simon Petrus, Lyndon Charles Lim
-
Patent number: 4735927Abstract: A catalyst for the selective reduction of nitrogen oxides to nitrogen in the presence of ammonia in the form of composite bodies formed from a mixture of anatase (5 to 40% by weight), a zeolite (50 to 90%), a bond material (0 to 30%, and, optionally, promoter selected from oxides of vanadium, molybdenum, and copper, in the amount of at least 0.1% by weight.Type: GrantFiled: September 23, 1986Date of Patent: April 5, 1988Assignee: Norton CompanyInventors: William H. Gerdes, Charles Lim, Thomas Szymanski
-
Patent number: 4735930Abstract: A catalyst for the selective reduction of nitrogen oxides to nitrogen in the presence of ammonia in the form of composite bodies formed from a mixture of zirconia (5 to 50% by weight), a zeolite (50 to 90%), a bond material (0 to 30%), and, optionally, a promoter selected from oxides of vanadium and copper in the amount of at least 0.1% by weight.Type: GrantFiled: February 18, 1986Date of Patent: April 5, 1988Assignee: Norton CompanyInventors: William H. Gerdes, Charles Lim, Thomas Szymanski