Patents by Inventor Edward Chin
Edward Chin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240119854Abstract: Computer implemented techniques for converting a text string to an interactive media. The techniques cause a data processing system to receive a text string having one or more branching moments, process the text string to recognize indications of the one or more branching moments given the text string, convert the processed text string and the indications of the one or more branching moments into executable computer code, receive a response to a given one of the converted one or more branching moments from a predetermined set of responses, generate, from the executable computer code and media elements for the response, a virtual respondent, and store the executable computer code and the media elements as a file in the computer storage that represents the virtual respondent.Type: ApplicationFiled: October 4, 2023Publication date: April 11, 2024Inventors: Andre B. Black, Edward Chin, Yuchun Lee, Quan Do
-
Publication number: 20240076955Abstract: Provided is a subsurface safety valve (SSSV), a well system, and a method. The subsurface safety valve (SSSV), in one aspect, includes an outer housing, a valve closure mechanism coupled to the outer housing, and a bore flow management actuator disposed in the central bore, the bore flow management actuator configured to slide from a first state to a second state to move the valve closure mechanism between a closed state and an open state. The subsurface safety valve (SSSV), in this aspect, additionally includes an electromagnet positioned at: 1) a first location, the first location in the outer housing proximate where the bore flow management actuator resides when the bore flow management actuator is in the second state; or 2) a second location, the second location coupled proximate a downhole end of the bore flow management actuator.Type: ApplicationFiled: September 1, 2022Publication date: March 7, 2024Inventors: Chun Hwee Chin, Bruce Edward Scott
-
Patent number: 11108989Abstract: Computer implemented techniques that involve captured, e.g., self-captured video for educational and other uses such as improving job performance of geographically distributed employees and incremental video optimizations and compressions are described.Type: GrantFiled: March 20, 2018Date of Patent: August 31, 2021Assignee: Allego Inc.Inventors: Yuchun Lee, Andre B. Black, Edward Chin, Mark Magnacca
-
Publication number: 20180213180Abstract: Computer implemented techniques that involve captured, e.g., self-captured video for educational and other uses such as improving job performance of geographically distributed employees and incremental video optimizations and compressions are described.Type: ApplicationFiled: March 20, 2018Publication date: July 26, 2018Applicant: Allego Inc.Inventors: Yuchun Lee, Andre B. Black, Edward Chin, Mark Magnacca
-
Patent number: 9924130Abstract: Computer implemented techniques that involve captured, e.g., self-captured video for educational and other uses such as improving job performance of geographically distributed employees and incremental video optimizations and compressions are described.Type: GrantFiled: June 26, 2014Date of Patent: March 20, 2018Assignee: Allego Inc.Inventors: Yuchun Lee, Andre Black, Edward Chin, Mark Magnacca
-
Patent number: 9609323Abstract: Computer-implemented techniques that leverage available CPU resources to incrementally improve quality and compression of media for faster transfer over data networks for improved viewing are described.Type: GrantFiled: June 26, 2014Date of Patent: March 28, 2017Assignee: Allego Inc.Inventors: Yuchun Lee, Andre Black, Edward Chin, Mark Magnacca, Ruby Kennedy
-
Patent number: 9384149Abstract: A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. The secure storage appliance is configured to present to a client a virtual disk, the virtual disk mapped to the plurality of physical storage devices. The secure storage appliance is capable of executing program instructions configured to generate a plurality of secondary blocks of data by performing splitting and encrypting operations on a block of data received from the client for storage on the virtual disk and reconstitute the block of data from at least a portion of the plurality of secondary blocks of data stored in shares on corresponding physical storage devices in response to a request from the client.Type: GrantFiled: March 15, 2013Date of Patent: July 5, 2016Assignee: Unisys CorporationInventors: Robert Johnson, David Dodgson, Joseph Neill, Ralph Farina, Edward Chin, Scott Summers, Albert French
-
Publication number: 20150381989Abstract: Computer-implemented techniques that leverage available CPU resources to incrementally improve quality and compression of media for faster transfer over data networks for improved viewing are described.Type: ApplicationFiled: June 26, 2014Publication date: December 31, 2015Applicant: ALLEGO INC.Inventors: Yuchun Lee, Andre Black, Edward Chin, Mark Magnacca, Ruby Kennedy
-
Publication number: 20150015790Abstract: Computer implemented techniques that involve captured, e.g., self-captured video for educational and other uses such as improving job performance of geographically distributed employees and incremental video optimizations and compressions are described.Type: ApplicationFiled: June 26, 2014Publication date: January 15, 2015Applicant: ALLEGO INC.Inventors: Yuchun Lee, Andre Black, Edward Chin, Mark Magnacca
-
Patent number: 8788973Abstract: A method for controlling presentation to a user of a primary user experience of a software application is provided. The method includes displaying a third-person avatar in a 3D virtual scene that defines a user interface for controlling presentation of the primary user experience. The method further includes sensing controlling movements of the user within a physical space in which the user is located and causing display of controlled movements of the third-person avatar within the 3D virtual scene so that the controlled movements visually replicate the controlling movements. The method further includes detecting a predefined interaction of the third-person avatar with a user interface element displayed in the 3D virtual scene, and controlling presentation of the primary user experience in response to detecting the predefined interaction.Type: GrantFiled: May 23, 2011Date of Patent: July 22, 2014Assignee: Microsoft CorporationInventors: Charles Tremblay Lavigne, Edward Chin, Eddie Parker
-
Publication number: 20140164790Abstract: Methods and systems for administrative management of a secure data storage network are disclosed. One system includes a secure storage appliance configured to host a plurality of volumes, each volume associated with a plurality of shares stored on a corresponding plurality of physical storage devices and having a plurality of volume management settings, wherein each volume is accessible by a group of one or more users, each user assigned an administrative access level, the volume management settings are editable by a first user from the group of one or more users associated with the volume and assigned an administrative access level sufficient to edit the volume management settings, and the volume management settings are inaccessible by a second user from outside the group of one or more users associated with the volume and assigned an administrative access level at least equal to that of the first user.Type: ApplicationFiled: December 6, 2012Publication date: June 12, 2014Inventors: David Dodgson, Joseph Neill, Ralph Farina, Edward Chin, Albert French, Scott Summers, Robert Johnson
-
Patent number: 8719594Abstract: Methods and systems for maintaining data connectivity in a secure data storage network are disclosed. In one aspect, a method includes assigning a volume to a primary secure storage appliance located in a secure data storage network the primary secure storage appliance selected from among a plurality of secure storage appliances located in the secure data storage network, the volume presented as a virtual disk to a client device and mapped to physical storage at each of a plurality of storage systems. The method further includes detecting at one of the plurality of secure storage appliances a failure of the primary secure storage appliance. The method also includes, upon detecting the failure of the primary secure storage appliance, reassigning the volume to a second secure storage appliance from among the plurality of secure storage appliances, thereby rendering the second secure storage appliance a new primary secure storage appliance.Type: GrantFiled: February 15, 2012Date of Patent: May 6, 2014Assignee: Unisys CorporationInventors: David Dodgson, Joseph Neill, Ralph Farina, Edward Chin, Albert French, Scott Summers
-
Publication number: 20130212373Abstract: Methods and systems for maintaining data connectivity in a secure data storage network are disclosed. In one aspect, a method includes assigning a volume to a primary secure storage appliance located in a secure data storage network the primary secure storage appliance selected from among a plurality of secure storage appliances located in the secure data storage network, the volume presented as a virtual disk to a client device and mapped to physical storage at each of a plurality of storage systems. The method further includes detecting at one of the plurality of secure storage appliances a failure of the primary secure storage appliance. The method also includes, upon detecting the failure of the primary secure storage appliance, reassigning the volume to a second secure storage appliance from among the plurality of secure storage appliances, thereby rendering the second secure storage appliance a new primary secure storage appliance.Type: ApplicationFiled: February 15, 2012Publication date: August 15, 2013Inventors: David Dodgson, Joseph Neill, Ralph Farina, Edward Chin, Albert French, Scott Summers
-
Patent number: 8392682Abstract: Methods and systems for administrative management of a secure data storage network are disclosed. One system includes a secure storage appliance configured to host a plurality of volumes, each volume associated with a plurality of shares stored on a corresponding plurality of physical storage devices and having a plurality of volume management settings, wherein each volume is accessible by a group of one or more users, each user assigned an administrative access level, the volume management settings are editable by a first user from the group of one or more users associated with the volume and assigned an administrative access level sufficient to edit the volume management settings, and the volume management settings are inaccessible by a second user from outside the group of one or more users associated with the volume and assigned an administrative access level at least equal to that of the first user.Type: GrantFiled: December 17, 2008Date of Patent: March 5, 2013Assignee: Unisys CorporationInventors: David Dodgson, Joseph Neill, Ralph Farina, Edward Chin, Albert French, Scott Summers, Robert Johnson
-
Patent number: 8386798Abstract: A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. The secure storage appliance is configured to present to a client a virtual disk, the virtual disk mapped to the plurality of physical storage devices. The secure storage appliance is capable of executing program instructions configured to generate a plurality of secondary blocks of data by performing splitting and encrypting operations on a block of data received from the client for storage on the virtual disk and reconstitute the block of data from at least a portion of the plurality of secondary blocks of data stored in shares on corresponding physical storage devices in response to a request from the client.Type: GrantFiled: December 23, 2008Date of Patent: February 26, 2013Assignee: Unisys CorporationInventors: David Dodgson, Joseph Neill, Ralph Farina, Edward Chin, Albert French, Scott Summers
-
Publication number: 20120304126Abstract: A method for controlling presentation to a user of a primary user experience of a software application is provided. The method includes displaying a third-person avatar in a 3D virtual scene that defines a user interface for controlling presentation of the primary user experience. The method further includes sensing controlling movements of the user within a physical space in which the user is located and causing display of controlled movements of the third-person avatar within the 3D virtual scene so that the controlled movements visually replicate the controlling movements. The method further includes detecting a predefined interaction of the third-person avatar with a user interface element displayed in the 3D virtual scene, and controlling presentation of the primary user experience in response to detecting the predefined interaction.Type: ApplicationFiled: May 23, 2011Publication date: November 29, 2012Applicant: MICROSOFT CORPORATIONInventors: Charles Tremblay Lavigne, Edward Chin, Eddie Parker
-
Publication number: 20120084566Abstract: Methods and systems for providing secure access to network resources are disclosed. A method includes defining in a provisioning utility one or more communities of interest, each community of interest including one or more users and associated with a key. The method includes providing a service key to a client computing device that is useable to establish a secure connection to a service enclave including an authorization server. The method also includes transmitting from the authorization server, for each community of interest including an identified user of the client computing device, an identity of a customer enclave and a key associated with a community of interest including the user of the client computing device, the community of interest including computing resources included in the customer enclave.Type: ApplicationFiled: May 11, 2011Publication date: April 5, 2012Inventors: Edward Chin, Ted Hingman, Robert A. Johnson
-
Patent number: 8135980Abstract: A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. In one aspect, a method includes assigning a volume to a primary secure storage appliance located in a secure data storage network, the secure data storage network including a plurality of secure data paths between the primary secure storage appliance and a client device and a plurality of secure data paths between the secure storage appliance and a plurality of storage systems, the volume corresponding to physical storage at each of the plurality of storage systems. The method also includes detecting a connectivity problem on at least one of the secure data paths. The method further includes assessing whether to reassign the volume to a different secure storage appliance based upon the connectivity problem.Type: GrantFiled: December 23, 2008Date of Patent: March 13, 2012Assignee: Unisys CorporationInventors: David Dodgson, Joseph Neill, Ralph Farina, Edward Chin, Albert French, Scott Summers
-
Publication number: 20100306530Abstract: Methods and systems for managing a community of interest are disclosed. One method includes creating a workgroup key associated with a community of interest, and protecting one or more resources associated with the community of interest using the workgroup key. The method also includes encrypting the workgroup key using a public key associated with an administrator of the community of interest, the public key included with a private key in a public/private key pair associated with the administrator. The method further includes storing the encrypted workgroup key and associating the workgroup key with a user, thereby adding the user to the community of interest.Type: ApplicationFiled: June 2, 2009Publication date: December 2, 2010Inventors: Robert A. Johnson, Edward Chin, David Dodgson
-
Publication number: 20100162005Abstract: Methods and systems of presenting data in a secure data storage network are disclosed. One method includes defining a community of interest capable of accessing data stored in a secure data storage network, the community of interest including a plurality of users desiring access to a common set of data. The method also includes associating the community of interest with a workgroup key. and, upon identification of a client device as associated with a user from among the plurality of users in the community of interest, presenting a virtual disk to the client device, the virtual disk associated with the workgroup key and a volume containing the common set of data, the volume including a plurality of shares stored on a plurality of physical storage devices.Type: ApplicationFiled: December 23, 2008Publication date: June 24, 2010Inventors: David Dodgson, Joseph Neill, Ralph Farina, Edward Chin, Albert French, Scott Summers, Robert Johnson