Patents by Inventor Edward Kim
Edward Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240127306Abstract: Various examples described herein support or provide for data ingesting, aggregating, and organizing in one centralized location; enhancing data through data enrichment and artificial intelligence and machine learning automation into tailored recommendations; and distributing and integrating data into channels that help facilitating data exchange based on individual needs and/or third-party solutions.Type: ApplicationFiled: September 11, 2023Publication date: April 18, 2024Inventors: Edward Kim, Talia Koss, Reza Shahbazi, Andrew Vayanis, Rong Yan
-
Publication number: 20240111096Abstract: The present disclosure relates to semiconductor structures and, more particularly, to hybrid edge couplers with voids and methods of manufacture. The structure includes: a dielectric material; at least one waveguide structure embedded within the dielectric material; and at least one airgap within the dielectric material and extending along a length of the at least one waveguide structure.Type: ApplicationFiled: October 3, 2022Publication date: April 4, 2024Inventors: Yusheng BIAN, Sunoo KIM, Edward W. KIEWRA
-
Patent number: 11947704Abstract: Access to sensitive information in a database can be restricted to improve security and enable efficient auditing. A security engine receives a request from a requesting entity to access data in the database and determines that the requested data includes sensitive information. In response to the requesting entity being authorized to access the data, the security engine retrieves the requested data from the database and modifies the retrieved data by modifying metadata of the retrieved data to include a tag indicating that the retrieved data includes sensitive information. The security engine provides the modified data to the requesting entity and modifies a data access log to identify each attempted access to the modified data. When sensitive data is requested, an interface can include an obscuring element, requiring a user to manually select the element to view the data, enabling the logging of the explicit access request by the user.Type: GrantFiled: August 19, 2022Date of Patent: April 2, 2024Assignee: ZENPAYROLL, INC.Inventors: Christopher Joseph Scuderi, Edward Kim
-
Publication number: 20230246945Abstract: A system and method for selecting a client gateway device to establish a path between client devices is provided. A method includes associating a first client gateway device of a first geographic region and a second client gateway device of a second geographic region with a first communication endpoint of a first client device, and associating a third client gateway device with a second client device, wherein the third client gateway device is a gateway of the first geographic region. The method also includes receiving a communication invitation directed to the first communication endpoint from the second client device via the third client gateway device, and responsive to receiving the communication invitation, selecting one of the first client gateway device or the second client gateway device. The method further includes establishing a communication path between the second client device and the first client device via the selected client gateway device and the third client gateway device.Type: ApplicationFiled: April 3, 2023Publication date: August 3, 2023Inventors: Brian Tarricone, Edward Kim, Ameya Lokare, Jonas Boerjesson
-
Publication number: 20230151062Abstract: This invention relates to the field of genetic engineering. Specifically, the invention relates to the construction of operons to produce biologically active agents. For example, operons may be constructed to produce agents that control the function of biochemical pathway proteins (e.g., protein phosphatases, kinases and/or proteases). Such agents may include inhibitors and modulators that may be used in studying or controlling phosphatase function associated with abnormalities in a phosphatase pathway or expression level. Fusion proteins, such as light activated protein phosphatases, may be genetically encoded and expressed as photoswitchable phosphatases. Systems are provided for use in controlling phosphatase function within living cells or in identifying small molecule inhibitors/activator/modulator molecules of protein phosphatases associated with cell signaling.Type: ApplicationFiled: August 2, 2022Publication date: May 18, 2023Inventors: Jerome FOX, Ankur SARKAR, Akarawin HONGDUSIT, Edward KIM
-
Publication number: 20230126460Abstract: A system for predicting machine failure may include a controller for controlling a machine, a plurality of sensors, a plugin device, a first computing device, a second computing device, and/or a third computing device. The sensors and/or the plugin device may be communicatively coupled to the controller. The first computing device may be communicatively coupled to the plugin device. The plugin device may transmit data associated with the machine to the first computing device. The first computing device may execute at least one low fidelity model to determine an interesting event associated with the machine. The second computing device may be communicatively coupled to the first computing device. The first computing device may transmit data associated with the interesting event to the second computing device. The second computing device may execute at least one high fidelity model to determine a machine failure prediction.Type: ApplicationFiled: October 21, 2022Publication date: April 27, 2023Inventors: Jeremy L. Rickli, Murat Yildirim, Mohamed Kilani, Edward Kim, Jeremy Epple
-
Patent number: 11621911Abstract: A system and method for regional routing of internet protocol based real-time communication that includes registering a set of client application endpoint routes, comprising registering at least a first client gateway route of a first endpoint in a first region; receiving a communication invitation of the first endpoint; processing a set of communication instructions associated with the communication invitation and identifying a set of communication resources and at least a second endpoint; querying the client application endpoint routes and identifying a client gateway route of the second endpoint; and dynamically directing signaling path and media path of the communication according to the regional availability of the communication resources, the client gateway route of the first endpoint, and client gateway instance route of the second endpoint.Type: GrantFiled: April 10, 2020Date of Patent: April 4, 2023Assignee: Twillo Inc.Inventors: Brian Tarricone, Edward Kim, Ameya Lokare, Jonas Boerjesson
-
Publication number: 20220398342Abstract: Access to sensitive information in a database can be restricted to improve security and enable efficient auditing. A security engine receives a request from a requesting entity to access data in the database and determines that the requested data includes sensitive information. In response to the requesting entity being authorized to access the data, the security engine retrieves the requested data from the database and modifies the retrieved data by modifying metadata of the retrieved data to include a tag indicating that the retrieved data includes sensitive information. The security engine provides the modified data to the requesting entity and modifies a data access log to identify each attempted access to the modified data. When sensitive data is requested, an interface can include an obscuring element, requiring a user to manually select the element to view the data, enabling the logging of the explicit access request by the user.Type: ApplicationFiled: August 19, 2022Publication date: December 15, 2022Inventors: Christopher Joseph Scuderi, Edward Kim
-
Patent number: 11472847Abstract: This invention relates to the field of genetic engineering. Specifically, the invention relates to the construction of operons to produce biologically active agents. For example, operons may be constructed to produce agents that control the function of biochemical pathway proteins (e.g., protein phosphatases, kinases and/or proteases). Such agents may include inhibitors and modulators that may be used in studying or controlling phosphatase function associated with abnormalities in a phosphatase pathway or expression level. Fusion proteins, such as light activated protein phosphatases, may be genetically encoded and expressed as photoswitchable phosphatases. Systems are provided for use in controlling phosphatase function within living cells or in identifying small molecule inhibitors/activator/modulator molecules of protein phosphatases associated with cell signaling.Type: GrantFiled: January 5, 2021Date of Patent: October 18, 2022Assignee: The Regents of the University of ColoradoInventors: Jerome Fox, Ankur Sarkar, Akarawin Hongdusit, Edward Kim
-
Patent number: 11455424Abstract: Access to sensitive information in a database can be restricted to improve security and enable efficient auditing. A security engine receives a request from a requesting entity to access data in the database and determines that the requested data includes sensitive information. In response to the requesting entity being authorized to access the data, the security engine retrieves the requested data from the database and modifies the retrieved data by modifying metadata of the retrieved data to include a tag indicating that the retrieved data includes sensitive information. The security engine provides the modified data to the requesting entity and modifies a data access log to identify each attempted access to the modified data. When sensitive data is requested, an interface can include an obscuring element, requiring a user to manually select the element to view the data, enabling the logging of the explicit access request by the user.Type: GrantFiled: January 27, 2021Date of Patent: September 27, 2022Assignee: ZENPAYROLL, INC.Inventors: Christopher Joseph Scuderi, Edward Kim
-
Publication number: 20210206813Abstract: This invention relates to the field of genetic engineering. Specifically, the invention relates to the construction of operons to produce biologically active agents. For example, operons may be constructed to produce agents that control the function of biochemical pathway proteins (e.g., protein phosphatases, kinases and/or proteases). Such agents may include inhibitors and modulators that may be used in studying or controlling phosphatase function associated with abnormalities in a phosphatase pathway or expression level. Fusion proteins, such as light activated protein phosphatases, may be genetically encoded and expressed as photoswitchable phosphatases. Systems are provided for use in controlling phosphatase function within living cells or in identifying small molecule inhibitors/activator/modulator molecules of protein phosphatases associated with cell signaling.Type: ApplicationFiled: January 5, 2021Publication date: July 8, 2021Applicant: The Regents of the University of Colorado, a Body CorporateInventors: Jerome Fox, Ankur Sarkar, Akarawin Hongdusit, Edward Kim
-
Publication number: 20210150057Abstract: Access to sensitive information in a database can be restricted to improve security and enable efficient auditing. A security engine receives a request from a requesting entity to access data in the database and determines that the requested data includes sensitive information. In response to the requesting entity being authorized to access the data, the security engine retrieves the requested data from the database and modifies the retrieved data by modifying metadata of the retrieved data to include a tag indicating that the retrieved data includes sensitive information. The security engine provides the modified data to the requesting entity and modifies a data access log to identify each attempted access to the modified data. When sensitive data is requested, an interface can include an obscuring element, requiring a user to manually select the element to view the data, enabling the logging of the explicit access request by the user.Type: ApplicationFiled: January 27, 2021Publication date: May 20, 2021Inventors: Christopher Joseph Scuderi, Edward Kim
-
Patent number: 10943026Abstract: Access to sensitive information in a database can be restricted to improve security and enable efficient auditing. A security engine receives a request from a requesting entity to access data in the database and determines that the requested data includes sensitive information. In response to the requesting entity being authorized to access the data, the security engine retrieves the requested data from the database and modifies the retrieved data by modifying metadata of the retrieved data to include a tag indicating that the retrieved data includes sensitive information. The security engine provides the modified data to the requesting entity and modifies a data access log to identify each attempted access to the modified data. When sensitive data is requested, an interface can include an obscuring element, requiring a user to manually select the element to view the data, enabling the logging of the explicit access request by the user.Type: GrantFiled: November 7, 2019Date of Patent: March 9, 2021Assignee: ZENPAYROLL, INC.Inventors: Christopher Joseph Scuderi, Edward Kim
-
Patent number: 10819757Abstract: A system and method for communicating with a client application that can include establishing a client signaling communication channel with a first client application; receiving a communication request from the first client application through the client signaling communication channel, wherein the communication request contains at least an authentication token and a specified communication destination; verifying the authentication token; if the authentication token is verified, at the system bridge, establishing a signaling communication channel with the communication destination and a second media communication channel with the specified communication destination; at the system bridge, establishing a first media communication channel with the client application; and merging the first media communication channel with the second media communication channel.Type: GrantFiled: November 15, 2018Date of Patent: October 27, 2020Assignee: Twilio Inc.Inventors: Jeffrey Lawson, John Wolthuis, Evan Cooke, Jonas Borjesson, Rob Simutis, Brian Tarricone, Edward Kim, Ameya Lokare
-
Publication number: 20200293683Abstract: Access to sensitive information in a database can be restricted to improve security and enable efficient auditing. A security engine receives a request from a requesting entity to access data in the database and determines that the requested data includes sensitive information. In response to the requesting entity being authorized to access the data, the security engine retrieves the requested data from the database and modifies the retrieved data by modifying metadata of the retrieved data to include a tag indicating that the retrieved data includes sensitive information. The security engine provides the modified data to the requesting entity and modifies a data access log to identify each attempted access to the modified data. When sensitive data is requested, an interface can include an obscuring element, requiring a user to manually select the element to view the data, enabling the logging of the explicit access request by the user.Type: ApplicationFiled: November 7, 2019Publication date: September 17, 2020Inventors: Christopher Joseph Scuderi, Edward Kim
-
Publication number: 20200244568Abstract: A system and method for regional routing of internet protocol based real-time communication that includes registering a set of client application endpoint routes, comprising registering at least a first client gateway route of a first endpoint in a first region; receiving a communication invitation of the first endpoint; processing a set of communication instructions associated with the communication invitation and identifying a set of communication resources and at least a second endpoint; querying the client application endpoint routes and identifying a client gateway route of the second endpoint; and dynamically directing signaling path and media path of the communication according to the regional availability of the communication resources, the client gateway route of the first endpoint, and client gateway instance route of the second endpoint.Type: ApplicationFiled: April 10, 2020Publication date: July 30, 2020Inventors: Brian Tarricone, Edward Kim, Ameya Lokare, Jonas Boerjesson
-
Patent number: 10686694Abstract: A system and method for regional routing of internet protocol based real-time communication that includes registering a set of client application endpoint routes, comprising registering at least a first client gateway route of a first endpoint in a first region; receiving a communication invitation of the first endpoint; processing a set of communication instructions associated with the communication invitation and identifying a set of communication resources and at least a second endpoint; querying the client application endpoint routes and identifying a client gateway route of the second endpoint; and dynamically directing signaling path and media path of the communication according to the regional availability of the communication resources, the client gateway route of the first endpoint, and client gateway instance route of the second endpoint.Type: GrantFiled: August 3, 2018Date of Patent: June 16, 2020Assignee: Twilio Inc.Inventors: Brian Tarricone, Edward Kim, Ameya Lokare, Jonas Boerjesson
-
Patent number: 10521605Abstract: Access to sensitive information in a database can be restricted to improve security and enable efficient auditing. A security engine receives a request from a requesting entity to access data in the database and determines that the requested data includes sensitive information. In response to the requesting entity being authorized to access the data, the security engine retrieves the requested data from the database and modifies the retrieved data by modifying metadata of the retrieved data to include a tag indicating that the retrieved data includes sensitive information. The security engine provides the modified data to the requesting entity and modifies a data access log to identify each attempted access to the modified data. When sensitive data is requested, an interface can include an obscuring element, requiring a user to manually select the element to view the data, enabling the logging of the explicit access request by the user.Type: GrantFiled: March 15, 2019Date of Patent: December 31, 2019Assignee: ZenPayroll, Inc.Inventors: Christopher Joseph Scuderi, Edward Kim
-
Publication number: 20190190963Abstract: A system and method for communicating with a client application that can include establishing a client signaling communication channel with a first client application; receiving a communication request from the first client application through the client signaling communication channel, wherein the communication request contains at least an authentication token and a specified communication destination; verifying the authentication token; if the authentication token is verified, at the system bridge, establishing a signaling communication channel with the communication destination and a second media communication channel with the specified communication destination; at the system bridge, establishing a first media communication channel with the client application; and merging the first media communication channel with the second media communication channel.Type: ApplicationFiled: November 15, 2018Publication date: June 20, 2019Inventors: Jeffrey Lawson, John Wolthuis, Evan Cooke, Jonas Borjesson, Rob Simutis, Brian Tarricone, Edward Kim, Ameya Lokare
-
Patent number: D892404Type: GrantFiled: January 20, 2020Date of Patent: August 4, 2020Inventor: Edward Kim