Patents by Inventor Daniel Wong

Daniel Wong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080036908
    Abstract: A de-interlacer includes recursive motion history map generating circuitry operative to determine a motion value associated with one or more pixels in interlaced fields based on pixel intensity information from at least two neighboring same polarity fields. The recursive motion history map generating circuitry generates a motion history map containing recursively generated motion history values for use in de-interlacing interlaced fields wherein the recursively generated motion history values are based, at least in part, on a decay function.
    Type: Application
    Filed: October 19, 2007
    Publication date: February 14, 2008
    Applicant: ATI Technologies ULC
    Inventors: Daniel Wong, Philip Swan, Daniel Doswald
  • Publication number: 20080019527
    Abstract: One embodiment of the present invention provides a system for managing keys. During operation, the system authenticates a client at a key manager. Next, the system receives a token from the client at the key manager, wherein the token is associated with a customer key, and includes a token authenticator. This token authenticator comprises one-half of an authenticator pair which is used to determine if the client is the owner of the customer key. Next, the system decrypts the token using a master key. The system then verifies a client authenticator, which comprises the other half of the authenticator pair which is used to determine if the client is the owner of the customer key. If the client is the owner of the customer key, the system sends the customer key to the client, which enables the client to encrypt/decrypt data. Finally, the client deletes the customer key.
    Type: Application
    Filed: March 3, 2006
    Publication date: January 24, 2008
    Inventors: Paul Youn, Daniel Wong, Min-Hank Ho, Chon Lei
  • Patent number: 7319689
    Abstract: In infrastructure-based networks devices often move from one attachment point in the network or a sub-network thereof to another attachment point. Communications sessions may be established between Mobile Hosts attached to such nodes. Communications sessions between nodes established using Session Initiation Protocol (SIP), Mobile Internet Protocol with Location Registers (MIP-LR) or Mobile Internet Protocol version 6 (MIPv6) may fail if there is simultaneous mobility of two Mobile Hosts in an ongoing communication session. Stationary binding update proxies and stationary location proxies are introduced into such communications networks in order to provide a solution to the problem of simultaneous mobility of Mobile Hosts. Specific implementation for SIP, MIP-LR and MIPv6 are provided. IN SIP networks, the SIP server for the mobile hosts acts as the stationary binding update proxy and the stationary location proxy.
    Type: Grant
    Filed: October 12, 2005
    Date of Patent: January 15, 2008
    Assignee: Telcordia Technologies, Inc.
    Inventors: Ashutosh Dutta, Kuok-Shoong Daniel Wong, Kenneth Young, Henning Schulzrinne
  • Publication number: 20070263868
    Abstract: One embodiment of the present invention provides a system that enables a background process to access encrypted data. During operation, the system executes the background process. Next, the system obtains a set of unencrypted keys by decrypting a set of encrypted keys with a server-key. The system then makes the set of unencrypted keys available to the background process, thereby enabling the background process to encrypt and decrypt data. Finally, the system deletes the set of unencrypted keys.
    Type: Application
    Filed: May 12, 2006
    Publication date: November 15, 2007
    Inventors: Paul Youn, Daniel Wong
  • Publication number: 20070239743
    Abstract: One embodiment of the present invention provides a database system that facilitates modifying a row in a database table to include meta-data about operations performed on the row. During operation, the database receives a command to perform an operation on a row in a table of the database. The database then determines if executing the command necessitates updating an extensible row descriptor for the row, wherein the extensible row descriptor is a field in the row that contains meta-data about operations performed on the row. If so, the database updates the extensible row descriptor in a manner defined by an update rule for the extensible row descriptor.
    Type: Application
    Filed: March 28, 2006
    Publication date: October 11, 2007
    Inventor: Daniel Wong
  • Publication number: 20070230704
    Abstract: One embodiment of the present invention provides a system for managing keys. During operation, the system receives a request from a user at a database to encrypt/decrypt data at the database. In response to this request, the system sends a user-token to the user, wherein the user-token includes a user-key encrypted with a user-secret thereby enabling the user to decrypt the user-key with the user-secret. Next, the system receives the decrypted user-key from the user. The system then uses the user-key to encrypt/decrypt the data at the database. Finally, the system deletes the user-key at the database.
    Type: Application
    Filed: April 4, 2006
    Publication date: October 4, 2007
    Inventors: Paul Youn, Daniel Wong
  • Publication number: 20070173740
    Abstract: A lancet integrated test element tape includes a plurality of lancet integrated test elements. The lancet integrated test elements each include a lancet configured to form an incision in tissue and a test element configured to analyze body fluid from the incision in the tissue. A cartridge includes a supply compartment configured to store an unused section of the tape. The tape is folded within the supply compartment to limit damage to the lancet integrated test elements. The cartridge can further include a waste compartment in which a used section of the tape is stored. An indexing mechanism moves the tape between the supply and waste compartments.
    Type: Application
    Filed: January 5, 2006
    Publication date: July 26, 2007
    Inventors: Frank Chan, Daniel Wong
  • Publication number: 20070127497
    Abstract: A device for wirelessly transmitting data under a wireless protocol is contemplated. A remote wireless network device initiates a session with a network. In this manner, information is sent to a gateway associated with the access point that couples the remote wireless network device to the network. When the remote wireless network device moves, data is tunneled between the succeeding gateway and the original gateway, but for those sessions opened at the original gateway. Any sessions associated with the remote wireless network device at the new gateway are processed and maintained by the new gateway without tunneling the data.
    Type: Application
    Filed: November 22, 2006
    Publication date: June 7, 2007
    Applicants: Terabeam. Inc., Proxim Wireless Corporation
    Inventors: Daniel Wong, Gajendra Shukla, Hilton Hong
  • Publication number: 20070120838
    Abstract: A wireless communication handset (100) having a movable housing portion (204) coupled to a housing portion (202) that rotates relative to the housing portion. The movable housing portion may be a ring that rotates from one position 200 to another position 300 relative to the housing. Rotation of the ring to a first position activates a first function. Indicia 210 disposed on the ring indicates the desired mode. Rotation of the ring to a second position activates a second mode corresponding to a second indicia on the ring. The ring is interchangeable with other rings (FIG. 5 through FIG. 7) having different indicia corresponding to different modes or functions. The software that corresponds to the different modes may be stored in a memory 104 of the device or downloaded to the device upon coupling the ring thereto.
    Type: Application
    Filed: October 31, 2006
    Publication date: May 31, 2007
    Applicant: MOTOROLA, INC.
    Inventors: KEITH KINERK, DANIEL WONG
  • Publication number: 20070112871
    Abstract: One embodiment of the present invention provides a system that facilitates dynamically auditing database operations. During operation, the system receives a current database operation. The system checks to see if an audit system contains an audit policy. If so, the system compares the current session properties for a user against the audit policy and determines if the current session properties match the audit policy. If so, the system audits the current session.
    Type: Application
    Filed: November 17, 2005
    Publication date: May 17, 2007
    Inventors: Gopal Mulagund, Daniel Wong
  • Publication number: 20070064895
    Abstract: A method of providing an aliased telephone number provided. A user may request an alternate telephone number to protect his privacy when making calls. When the user transmits a call, a service provider detects that the call should be linked with an aliased telephone number. The provider may then substitute the aliased number for the originating number such that the recipient sees the aliased number on a caller identification module. Likewise, where someone sends a call to an aliased number, the service provider may cross reference the aliased number with an actual telephone number and either augment data information associated with the call with the actual number, or replace the aliased number with the actual number. The aliased number may be time sensitive and may have an expiration date. The system and method allow users to obtain telephone numbers for time-limited events.
    Type: Application
    Filed: September 9, 2005
    Publication date: March 22, 2007
    Inventors: Daniel Wong, Xuezhang Dong
  • Publication number: 20070055667
    Abstract: One embodiment of the present invention provides a system that facilitates implementing a privileged schema in a database, wherein the privileged schema is comprised of a set of database objects. Note that in relational database terminology, sometimes object stores are simply referred to as schema. The system starts by creating the privileged schema. Next, the system receives a database operation from a user. The system then authenticates the user to determine if the user is the owner of the privileged schema. If so, the system executes the database operation. On the other hand, if the user is not the owner, then the system rejects the database operation.
    Type: Application
    Filed: August 24, 2005
    Publication date: March 8, 2007
    Inventor: Daniel Wong
  • Publication number: 20070046768
    Abstract: This invention relates to an efficient way to calibrate and control a raster output scanner (ROS). The scan non-linearity of a ROS may be measured and an appropriate calibration curve setting for the ROS may be determined. The setting and other scan line parameters may then be used as an address to a memory, such as a read-only memory (ROM). The memory may store a set of calibration curve data and the address is used to look up the data from one of these curves. The ROS may then be controlled based on the calibration data retrieved from memory.
    Type: Application
    Filed: August 26, 2005
    Publication date: March 1, 2007
    Inventors: Michael Neary, Daniel Wong
  • Publication number: 20070043942
    Abstract: Systems, methodologies, and other embodiments associated with providing multi-layered security for configuration items are described. One exemplary system may include a security logic configured to process the contents of a configuration item based on the source of the configuration item and the integrity of the configuration item. The exemplary system may also include a verification logic configured to further process the contents and to selectively provide the contents. A configuration item may be provided to the security logic by a configuration item provider known to the security logic and related to the security logic by a first set of keys. The security logic may be related to the verification logic by a second set of keys different from the first set of keys.
    Type: Application
    Filed: August 18, 2005
    Publication date: February 22, 2007
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventor: Daniel Wong
  • Publication number: 20070028295
    Abstract: One embodiment of the present invention provides a system that facilitates authorizing a user during a database transaction. The system starts by receiving a request at the database to perform a database operation. Upon receiving the request, the database sends an authorization request to an authorization module to determine if the user has authorization to perform the database operation. In addition, the database continues executing the database operation without waiting for completion of the authorization request. Next, the database receives a response from the authorization module. The database then checks the response to determine if the user has authorization to perform the database operation. If so, the database commits the database operation, and if not, the database rolls back the database operation.
    Type: Application
    Filed: August 1, 2005
    Publication date: February 1, 2007
    Inventor: Daniel Wong
  • Publication number: 20070028117
    Abstract: One embodiment of the present invention provides a system that facilitates authenticating a user at a computer system. During operation, the system creates an authentication profile and assigns the authentication profile to a user, wherein the authentication profile specifies authentication criteria. Next, the computer system receives a login request from the user, and in responding to the login request, the computer system checks if the authentication criteria in the authentication profile are satisfied. If so, the system allows the user to login. If not, the user is prevented from logging into the computer system.
    Type: Application
    Filed: August 1, 2005
    Publication date: February 1, 2007
    Inventor: Daniel Wong
  • Publication number: 20060288232
    Abstract: One embodiment of the present invention provides a system that facilitates using an external security device to secure data in a database without having to modify database applications. The system operates by receiving a request at the database to perform an encryption/decryption operation, wherein the encryption/decryption operation is performed with the assistance of the external security module in a manner that is transparent to database applications. In response to the request, the system passes a wrapped (encrypted) column key (a key used to encrypt data within the database) to an external security module, wherein the wrapped column key is a column key encrypted with a master key that exists only within the external security module. The system then unwraps (decrypts) the wrapped column key in the external security module to retrieve the column key. Next, the system returns the column key to the database.
    Type: Application
    Filed: June 16, 2005
    Publication date: December 21, 2006
    Inventors: Min-Hank Ho, Paul Youn, Daniel Wong, Chon Lei
  • Publication number: 20060271783
    Abstract: One embodiment of the present invention provides a system that authorizes a sensitive database operation. During operation, the system receives a request to perform a sensitive database operation. Note that, a sensitive database operation is an operation which, in the hands of a malicious user, poses a serious security threat. Next, the system determines a multiparty authorization requirement for the sensitive database operation, wherein the multiparty authorization requirement specifies a set of approvals required for authorizing the sensitive database operation. The system then sends approval requests to one or more approving parties based on the multiparty authorization requirement. Next, the system receives approvals for authorizing the sensitive database operation. The system then determines whether the approvals satisfy the multiparty authorization requirement.
    Type: Application
    Filed: May 26, 2005
    Publication date: November 30, 2006
    Inventors: Daniel Wong, MingKang Xu, Paul Youn, MinHank Ho, Chon Hei Lei
  • Patent number: 7138977
    Abstract: A proportional force input apparatus for an electronic device includes a mechanism operable by a user of the electronic device, such as a stylus inserted into a spring-loaded socket of the device. The mechanism provides a tactile feedback to the user proportional to a force applied by the user. A variable strength sensor detects the force applied by the user to the mechanism and converts this to an electrical signal proportional to the force applied by the user. A processor operates to input the electric signal from the variable strength sensor and provide force information to an application running on the electronic device. Optionally, a second sensor can detect rotation of the stylus. As a result, a stylus can be used to provide vector information to an application such as a game.
    Type: Grant
    Filed: January 15, 2003
    Date of Patent: November 21, 2006
    Assignee: Motorola, Inc.
    Inventors: Keith Kinerk, Daniel Wong
  • Publication number: 20060236104
    Abstract: One embodiment of the present invention provides a system that decrypts an encrypted column in a row. During operation, the system receives the encrypted column in the row. The system then determines a security domain associated with the encrypted column in the row, wherein the security domain represents a set of columns in rows encrypted using the same key. Next, the system determines a key associated with the security domain. The system then decrypts the encrypted column in the row using the key. Note that using a security domain to represent a set of columns in rows enables the database to grant access to data within the database at arbitrary levels of granularity.
    Type: Application
    Filed: April 13, 2005
    Publication date: October 19, 2006
    Inventors: Daniel Wong, Chon Lei