Patents by Inventor Ching-Chih (Jason) Han

Ching-Chih (Jason) Han has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9143514
    Abstract: A hierarchical security model for networked computer users is described. Files and resources are controlled or created by users within the network. Each user within the network has an account that is managed by a network administrator. The account specifies the user identifier and password. Users are grouped into organizations depending upon function or other organizational parameter. The groups within the network are organized hierarchically in terms of access and control privileges. Users within a higher level group may exercise access and control privileges over files or resources owned by users in a lower level group. The account for each user further specifies the group that the owner belongs to and an identifier for any higher level groups that have access privileges over the user's group. All users within a group inherit the rights and restrictions of the group.
    Type: Grant
    Filed: June 23, 2014
    Date of Patent: September 22, 2015
    Assignee: Ellie Mae, Inc.
    Inventors: Limin Hu, Ting-Hu Wu, Ching-Chih Jason Han
  • Publication number: 20140373105
    Abstract: A hierarchical security model for networked computer users is described. Files and resources are controlled or created by users within the network. Each user within the network has an account that is managed by a network administrator. The account specifies the user identifier and password. Users are grouped into organizations depending upon function or other organizational parameter. The groups within the network are organized hierarchically in terms of access and control privileges. Users within a higher level group may exercise access and control privileges over files or resources owned by users in a lower level group. The account for each user further specifies the group that the owner belongs to and an identifier for any higher level groups that have access privileges over the user's group. All users within a group inherit the rights and restrictions of the group.
    Type: Application
    Filed: June 23, 2014
    Publication date: December 18, 2014
    Inventors: Limin Hu, Ting-Hu Wu, Ching-Chih Jason Han
  • Patent number: 8762357
    Abstract: A hierarchical security model for networked computer users is described. Files and resources are controlled or created by users within the network. Each user within the network has an account that is managed by a network administrator. The account specifies the user identifier and password. Users are grouped into organizations depending upon function or other organizational parameter. The groups within the network are organized hierarchically in terms of access and control privileges. Users within a higher level group may exercise access and control privileges over files or resources owned by users in a lower level group. The account for each user further specifies the group that the owner belongs to and an identifier for any higher level groups that have access privileges over the user's group. All users within a group inherit the rights and restrictions of the group.
    Type: Grant
    Filed: February 27, 2012
    Date of Patent: June 24, 2014
    Assignee: Ellie Mae. Inc.
    Inventors: Limin Hu, Ting-Hu Wu, Ching-Chih Jason Han
  • Publication number: 20120158787
    Abstract: A hierarchical security model for networked computer users is described. Files and resources are controlled or created by users within the network. Each user within the network has an account that is managed by a network administrator. The account specifies the user identifier and password. Users are grouped into organizations depending upon function or other organizational parameter. The groups within the network are organized hierarchically in terms of access and control privileges. Users within a higher level group may exercise access and control privileges over files or resources owned by users in a lower level group. The account for each user further specifies the group that the owner belongs to and an identifier for any higher level groups that have access privileges over the user's group. All users within a group inherit the rights and restrictions of the group.
    Type: Application
    Filed: February 27, 2012
    Publication date: June 21, 2012
    Inventors: Limin Hu, Ting-Hu Wu, Ching-Chih Jason Han
  • Patent number: 8126920
    Abstract: A hierarchical security model for networked computer users is described. Files and resources are controlled or created by users within the network. Each user within the network has an account that is managed by a network administrator. The account specifies the user identifier and password. Users are grouped into organizations depending upon function or other organizational parameter. The groups within the network are organized hierarchically in terms of access and control privileges. Users within a higher level group may exercise access and control privileges over files or resources owned by users in a lower level group. The account for each user further specifies the group that the owner belongs to and an identifier for any higher level groups that have access privileges over the user's group. All users within a group inherit the rights and restrictions of the group.
    Type: Grant
    Filed: November 18, 2004
    Date of Patent: February 28, 2012
    Assignee: Ellie Mae, Inc.
    Inventors: Limin Hu, Ting-Hu Wu, Ching-Chih Jason Han
  • Patent number: 6874086
    Abstract: A computer system includes a web client having a client based program residing on it, a firewall having a protocol proxy residing on it, and a host server having an application program and a special window manager residing on it. All communications between the protocol proxy and the application program go through the special window manager. The web client communicates with the firewall through the Internet, and the firewall communicates with the host server through a LAN. The client based program employs HTTP, and the special window manager employs a persistent connection, socket-based protocol. The protocol proxy establishes and maintains a persistent connection with the special window manager, and communicates information back and forth between the client based program and the application program through the special window manager by first protocol translating the information between HTTP and the special window manager's persistent connection, socket-based protocol.
    Type: Grant
    Filed: August 10, 2000
    Date of Patent: March 29, 2005
    Assignee: Oridus, Inc.
    Inventors: Ke-Qin Gu, Tsung-Yen (Eric) Chen, Ching-Chih (Jason) Han, Kuo-Chun Lee
  • Publication number: 20050055642
    Abstract: A method of conducting an interactive design conference over the Internet, comprises: selectively admitting clients communicating through web browsers over the Internet to an interactive design conference; receiving a graphics file indicative of a design from one of the clients; and transmitting the graphics file to the other clients so as to be viewable as a graphics image through graphics file readers in the client web browsers. The graphics file is generated by a snapshot program previously transmitted to a client initiating the design conference and controlling the design database. Java applets are transmitted to each of the design conference participants to facilitate communicating annotations of the graphics image and messages between clients through their web browsers.
    Type: Application
    Filed: October 14, 2004
    Publication date: March 10, 2005
    Inventors: Tsung-Yen (Eric) Chen, Ke-Qin Gu, Ching-Chih (Jason) Han, Kuo-Chun Lee
  • Publication number: 20040041830
    Abstract: A method for automatically recording snapshots of a computer screen during a computer session for later playback, comprises receiving a start indication, and automatically recording snapshots of a computer screen periodically during the computer session after the start indication is reached. An apparatus for performing such function comprises a frame buffer for storing snapshots of the computer screen, a FIFO cache memory, a mass storage memory, and programmed means. The programmed means receives a start indication, periodically copies data from the frame buffer to the FIFO cache memory during a computer session after the start indication is reached, and compresses the stored data before storing it the mass storage memory for later playback.
    Type: Application
    Filed: August 29, 2003
    Publication date: March 4, 2004
    Inventors: Hui-Hwa Chiang, Kuo-Chun Lee, Tsung-Yen (Eric) Chen, Ching-Chih (Jason) Han
  • Patent number: 6674447
    Abstract: A method for automatically recording snapshots of a computer screen during a computer session for later playback, comprises receiving a start indication, and automatically recording snapshots of a computer screen periodically during the computer session after the start indication is reached. An apparatus for performing such function comprises a frame buffer for storing snapshots of the computer screen, a FIFO cache memory, a mass storage memory, and programmed means. The programmed means receives a start indication, periodically copies data from the frame buffer to the FIFO cache memory during a computer session after the start indication is reached, and compresses the stored data before storing it the mass storage memory for later playback.
    Type: Grant
    Filed: December 6, 1999
    Date of Patent: January 6, 2004
    Assignee: Oridus, Inc.
    Inventors: Hui-Hwa Chiang, Kuo-Chun Lee, Tsung-Yen (Eric) Chen, Ching-Chih (Jason) Han
  • Patent number: 6629103
    Abstract: A method is described that is implemented by a server for securely providing a text file to a client for execution. The method includes providing an encrypted text file and a program facilitating execution of the encrypted text file to the client. Such providing may be over the Internet or using a computer readable medium such as compact disc. The provided program responds to a run command to decrypt the encrypted text file, and feed the decrypted text file to an interpreter for execution.
    Type: Grant
    Filed: November 2, 2000
    Date of Patent: September 30, 2003
    Assignee: Oridus, Inc.
    Inventors: Ching-Chih Jason Han, Huan-Hui Zhao, Tsung-Yen Eric Chen, Kuo-Chun Lee
  • Publication number: 20030085923
    Abstract: A method for conducting a collaboration session, comprising: launching a collaboration session through a program on a computer so as to communicate with other computers concurrently logged on a network; and generating a graphics file including pixel information of a graphics image displayable on a display screen of the computer for transmission to the other computers so as to be viewable through graphics file readers associated with web browsers of the other computers during the collaboration session.
    Type: Application
    Filed: December 11, 2002
    Publication date: May 8, 2003
    Inventors: Tsung-Yen ( Eric ) Chen, Ke-Qin Gu, Ching-Chih ( Jason ) Han, Kuo-Chun Lee
  • Patent number: 6510543
    Abstract: A method and apparatus for rendering an integrated circuit design layout is described. Graphics files are generated for selected zoom-in factors from cell-based information of the integrated circuit design, and stored in memory. When a computer operator selects a zoom-in factor greater by a predetermined amount than the largest of such selected zoom-in factors, a selector enables a rendering engine to render the integrated circuit design layout from the cell-based information. On the other hand, when the computer operator selects a zoom-in factor less than the largest of such selected zoom-in factors plus the predetermined amount, the selector enables a graphics processor to render the integrated circuit design layout from appropriate ones of the graphics files.
    Type: Grant
    Filed: October 3, 2000
    Date of Patent: January 21, 2003
    Assignee: Oridus, Inc.
    Inventors: Ke-Qin Gu, Tsung-Yen (Eric) Chen, Ching-Chih (Jason) Han, Kuo-Chun Lee
  • Publication number: 20020067833
    Abstract: A method and apparatus for providing conditional access to the source code of a program are described. An encrypted version of the source code is provided along with a binary executable version of the source code to a recipient. An escrow holder holds a software key for decrypting the encrypting source code, and releases the software key to the recipient only upon satisfaction of a release condition detailed in an escrow agreement executed by the program's vendor and the recipient.
    Type: Application
    Filed: December 5, 2000
    Publication date: June 6, 2002
    Inventors: Ching-Chih (Jason) Han, Huan-Hui Zhao, Tsung-Yen (Eric) Chen, Kuo-Chun Lee