Patents by Inventor Chit Wei Saw
Chit Wei Saw has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9117094Abstract: Programs running on an open architecture, such as a personal computer, are vulnerable to inspection and modification. This is a concern as the program may include or provide access to valuable information. As a defense, the actual location of data can be hidden throughout execution of the program by way of periodic location reordering and pointer scrambling, among other things. These techniques serve to complicate static data flow analysis and dynamic data tracking thereby at least deterring program tampering.Type: GrantFiled: October 29, 2008Date of Patent: August 25, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Bertrand Raphaƫl Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Chit Wei Saw
-
Patent number: 8909565Abstract: The collection and clustering of data input characteristics from a plurality of computing devices is provided. The clustered data input characteristics define user groups to which users are assigned. Input models such as language models and touch models are created for, and distributed to, each of the user groups based on the data input characteristics of the users assigned thereto. For example, an input model may be selected for a computing device based on a current context of the computing device. The selected input model is applied to the computing device during the current context to alter the interpretation of input received from the user via the computing device.Type: GrantFiled: January 30, 2012Date of Patent: December 9, 2014Assignee: Microsoft CorporationInventors: Timothy Seung Yoon Paek, Itai Almog, Ganapathy Raman, Eric Norman Badger, Chit Wei Saw
-
Publication number: 20130198115Abstract: The collection and clustering of data input characteristics from a plurality of computing devices is provided. The clustered data input characteristics define user groups to which users are assigned. Input models such as language models and touch models are created for, and distributed to, each of the user groups based on the data input characteristics of the users assigned thereto. For example, an input model may be selected for a computing device based on a current context of the computing device. The selected input model is applied to the computing device during the current context to alter the interpretation of input received from the user via the computing device.Type: ApplicationFiled: January 30, 2012Publication date: August 1, 2013Applicant: MICROSOFT CORPORATIONInventors: Timothy Seung Yoon Paek, Itai Almog, Ganapathy Raman, Eric Norman Badger, Chit Wei Saw
-
Publication number: 20100107245Abstract: Tamper-tolerant programs enable correct and continued execution despite attacks. Programs can be transformed into tamper-tolerant versions that correct effects of tampering in response to detection thereof Tamper-tolerant programs can execute alone or in conjunction with tamper resistance/prevention mechanisms such as obfuscation and encryption/decryption, among other things. In fact, the same and/or similar mechanisms can be employed to protect tamper tolerance functionality.Type: ApplicationFiled: October 29, 2008Publication date: April 29, 2010Applicant: MICROSOFT CORPORATIONInventors: Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan
-
Publication number: 20100106920Abstract: Programs running on an open architecture, such as a personal computer, are vulnerable to inspection and modification. This is a concern as the program may include or provide access to valuable information. As a defense, the actual location of data can be hidden throughout execution of the program by way of periodic location reordering and pointer scrambling, among other things. These techniques serve to complicate static data flow analysis and dynamic data tracking thereby at least deterring program tampering.Type: ApplicationFiled: October 29, 2008Publication date: April 29, 2010Applicant: MICROSOFT CORPORATIONInventors: Bertrand Raphael Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Chit Wei Saw
-
Patent number: 7694142Abstract: A system for distributing digital content over a computer network (e.g., the Internet) uses certificates to establish a trust relationship between a content provider and a display device. The certificates identify the display device and the content provider as well as unique characteristics of the distribution. For example, the content provider may be a book publisher and the display device may be a printer/binder.Type: GrantFiled: May 16, 2005Date of Patent: April 6, 2010Assignee: Hewlett-Packard Development Company, L.P.Inventors: Chit Wei Saw, Slawomir K. Ilnicki, Christian J. van den Branden Lambrecht, Joyce E Farrell, Cormac Herley, Joan Maria Mas Ribes
-
Patent number: 7107453Abstract: Systems and methods for generating and decoding authenticatable graphical bar codes are described. In one aspect, a corroborative signed message is generated from information to be encoded, and a base image is modulated with a graphical encoding of the signed message to produce a marked image. In another aspect, a signed message is extracted from a marked image based upon a comparison of the marked image and a base image. The extracted signed message is decoded to produce a decoded message. Information encoded in the marked image is extracted from the decoded message and authenticated.Type: GrantFiled: December 1, 2000Date of Patent: September 12, 2006Assignee: Hewlett-Packard Development Company, L.P.Inventors: Jonathan Yen, Gerald Q. Maguire, Jr., Chit Wei Saw, Yihong Xu
-
Patent number: 7020781Abstract: A system for distributing digital content over a computer network (e.g., the Internet) uses certificates to establish a trust relationship between a content provider and a display device. The certificates identify the display device and the content provider as well as unique characteristics of the distribution. For example, the content provider may be a book publisher and the display device may be a printer/binder.Type: GrantFiled: May 3, 2000Date of Patent: March 28, 2006Assignee: Hewlett-Packard Development Company, L.P.Inventors: Chit Wei Saw, Slawomir K. Ilnicki, Christian J. van den Branden Lambrecht, Joyce E Farrell, Cormac Herley, Joan Maria Mas Ribes
-
Patent number: 6938017Abstract: Payment indicia generating schemes are described that enable users to customize the appearance of the payment indicium and to accommodate a wide variety of validation processing environments, while providing a substantial defense against fraudulent photocopy attack. In some embodiments, a corroborative digital token is generated from payment information, and a base image is modulated with a graphical encoding of the corroborative digital token to produce a payment indicium. In some embodiments, a payment indicium containing embedded payment information is rendered on a printing surface with a printing characteristic that degrades with photographic reproductions such that the embedded payment information is extractable from an original rendering of the payment indicium but is un-extractable from a photographic reproduction of an original rendering of the payment indicium.Type: GrantFiled: December 1, 2000Date of Patent: August 30, 2005Assignee: Hewlett-Packard Development Company, L.P.Inventors: Jonathan Yen, Chit Wei Saw, Doron Shaked, Avraham Levy
-
Patent number: 6910843Abstract: Cover authoring systems and methods for automatically composing a final content layout for a cover, including spinal content formatted to accommodate the width and height dimensions of the book spine, are described. By automatically computing the typeface parameter values based upon the selected visual fit model, this cover authoring scheme enables users to avoid the time consuming, laborious and expensive process of manually composing the final cover content layout with a conventional graphics program.Type: GrantFiled: November 26, 2001Date of Patent: June 28, 2005Assignee: Hewlett-Packard Development Company, L.P.Inventors: Chit Wei Saw, Hui Chao, Giordano B. Beretta
-
Patent number: 6742708Abstract: Fiducial mark patterns for graphical bar codes (i.e., images that contain inconspicuous graphical modulations that encode embedded information) that are characterized by high detection robustness and good local deformation tracking are described. In one bar coding method, a base image is modulated with a graphical encoding of a message to produce a graphical bar code, and a fiducial mark pattern comprising a plurality of dots arranged to track one or more reference locations and local deformation across the graphical bar code is generated. In another bar coding method, fiducial mark candidates are identified in a fiducial mark pattern, a fiducial mark path is computed based upon one or more of the identified fiducial mark candidates, and one or more reference locations are identified based upon the computed fiducial mark path.Type: GrantFiled: June 7, 2001Date of Patent: June 1, 2004Assignee: Hewlett-Packard Development Company, L.P.Inventors: Doron Shaked, Avi Levy, Jonathan Yen, Chit Wei Saw, Clayton Brian Atkins
-
Publication number: 20030228563Abstract: A system and method for helping teachers create and evaluate learning exercises is disclosed. The system comprises a creator interface module, wherein the creator interface module comprises a database comprising a plurality of questions, wherein one or more of the plurality of questions are formatted to create a learning exercise distributed to one or more students. The system also comprises a grader interface module, wherein the grader interface module assists the teacher in evaluating one or more sets of answers to the questions in the learning exercise received from the students, wherein each set of answers corresponds to one student, and wherein the grader interface module produces one or more sets of data corresponding to the sets of answers. A memory module records the sets of data.Type: ApplicationFiled: June 11, 2002Publication date: December 11, 2003Inventors: Henry W. Sang, Chuck Untulis, Chit Wei Saw
-
Publication number: 20030099526Abstract: Cover authoring systems and methods for automatically composing a final content layout for a cover, including spinal content formatted to accommodate the width and height dimensions of the book spine, are described. By automatically computing the typeface parameter values based upon the selected visual fit model, this cover authoring scheme enables users to avoid the time consuming, laborious and expensive process of manually composing the final cover content layout with a conventional graphics program.Type: ApplicationFiled: November 26, 2001Publication date: May 29, 2003Inventors: Chit Wei Saw, Hui Chao, Giordano B. Beretta
-
Publication number: 20020186884Abstract: Fiducial mark patterns for graphical bar codes (i.e., images that contain inconspicuous graphical modulations that encode embedded information) that are characterized by high detection robustness and good local deformation tracking are described. In one bar coding method, a base image is modulated with a graphical encoding of a message to produce a graphical bar code, and a fiducial mark pattern comprising a plurality of dots arranged to track one or more reference locations and local deformation across the graphical bar code is generated. In another bar coding method, fiducial mark candidates are identified in a fiducial mark pattern, a fiducial mark path is computed based upon one or more of the identified fiducial mark candidates, and one or more reference locations are identified based upon the computed fiducial mark path.Type: ApplicationFiled: June 7, 2001Publication date: December 12, 2002Inventors: Doron Shaked, Avraham Levy, Jonathan Yen, Chit Wei Saw, C. Brian Atkins
-
Publication number: 20020103764Abstract: Payment indicia generating schemes are described that enable users to customize the appearance of the payment indicium and to accommodate a wide variety of validation processing environments, while providing a substantial defense against fraudulent photocopy attack. In some embodiments, a corroborative digital token is generated from payment information, and a base image is modulated with a graphical encoding of the corroborative digital token to produce a payment indicium. In some embodiments, a payment indicium containing embedded payment information is rendered on a printing surface with a printing characteristic that degrades with photographic reproductions such that the embedded payment information is extractable from an original rendering of the payment indicium but is un-extractable from a photographic reproduction of an original rendering of the payment indicium.Type: ApplicationFiled: December 1, 2000Publication date: August 1, 2002Inventors: Jonathan Yen, Chit Wei Saw, Doron Shaked, Avraham Levy
-
Publication number: 20010047476Abstract: Systems and methods for generating and decoding authenticatable graphical bar codes are described. In one aspect, a corroborative signed message is generated from information to be encoded, and a base image is modulated with a graphical encoding of the signed message to produce a marked image. In another aspect, a signed message is extracted from a marked image based upon a comparison of the marked image and a base image. The extracted signed message is decoded to produce a decoded message. Information encoded in the marked image is extracted from the decoded message and authenticated.Type: ApplicationFiled: December 1, 2000Publication date: November 29, 2001Inventors: Jonathan Yen, Gerald Q. Maguire, Chit Wei Saw, Yihong Xu