Patents by Inventor Eric Lam

Eric Lam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240146301
    Abstract: A common gate resistor bypass arrangement for a stacked arrangement of FET switches, the arrangement including a series combination of an nMOS transistor and a pMOS transistor connected across a common gate resistor. During at least a transition portion of the transition state of the stacked arrangement of FET switches, the nMOS transistor and the pMOS transistor are both in an ON state and bypass the common gate resistor. On the other hand, during at least a steady state portion of the ON steady state and the OFF steady state of the stacked arrangement of FET switches, one of the nMOS transistor and the pMOS transistor is in an OFF state and the other of the nMOS transistor and the pMOS transistor is in an ON state, thus not bypassing the common gate resistor.
    Type: Application
    Filed: January 10, 2024
    Publication date: May 2, 2024
    Inventors: Alper GENC, Fleming LAM, Eric S. SHAPIRO, Ravindranath SHRIVASTAVA
  • Publication number: 20240143712
    Abstract: Described herein is an identity network for authenticating a user for a relying party and providing access to the user's credit report. The identity network may receive an unlock request for the digital identity and credit report of a user from a relying party. In response, the identity network may provide an identity provider link for accessing the identity provider application. The user may login to the identity provider application and provide consent for obtaining the user's credit report. The identity provider provides the identity network with verification of the digital identity of the user and the consent response from the user. The identity network can request access from a credit reporting agency and receive a credit report key in response. The identity network can provide the credit report key to the relying party, which can use the key to access the user's credit report from the credit reporting agency.
    Type: Application
    Filed: November 2, 2023
    Publication date: May 2, 2024
    Inventors: Gregory Slowiak, Eric Woodward, Philip Lam, Jeff Shultz
  • Publication number: 20240129311
    Abstract: Described herein is an identity network for validating the digital identity of a user. The identity network may receive, from a relying party, an identity validation request to validate a digital identity of the user. The identity network may provide, to the relying party, a link associated with an identity provider application based on the identity validation request. The identity network may receive, from an identity provider associated with the identity provider application, a confirmation that the user has successfully accessed the identity provider application via the link. After receiving the confirmation, the identity network may receive from the identity provider, an attribute validation request to validate identity attributes of the user, where the attribute validation request includes a plurality of identity attributes of the user. The identity network may validate the digital identity of the user based on the plurality of identity attributes.
    Type: Application
    Filed: December 26, 2023
    Publication date: April 18, 2024
    Applicant: Early Warning Services, LLC
    Inventors: Gregory Slowiak, Eric Woodward, Philip Lam, Jeff Shultz
  • Publication number: 20240099892
    Abstract: An apparatus includes a shaft, an expandable dilator, and at least one ventilation pathway. The shaft defines a longitudinal axis and includes a distal and proximal ends with at least one shaft lumen. The expandable dilator includes body with its own proximal and distal ends. The body is configured to transition between a contracted state and an expanded state. The body is configured to dilate a Eustachian tube of a patient in the expanded state. The at least one ventilation pathway is configured to provide ventilation from the distal end of the body to the proximal end of the body when the body is in the expanded state. In some examples, the ventilation pathway includes a set of transversely oriented vent openings formed through the shaft. In some other examples, the ventilation pathway includes a space defined between one or more radially outwardly protruding features of the expandable dilator.
    Type: Application
    Filed: October 27, 2023
    Publication date: March 28, 2024
    Inventors: Peter F. Campbell, Daniel T. Harfe, Hung V. Ha, Ketan P. Muni, Andy Nguyen, Sivette Lam, John Y. Chang, Eric Goldfarb
  • Patent number: 11941093
    Abstract: Disclosed herein is an identity network that provides a universal, digital identity for users to be authenticated by an identity provider for relying parties upon sign-in to the relying party. The identity network receives the sign-in request from a relying party for a user using a user device. The identity network can provide a session identifier to the relying party for the request and launch an identity provider application associated with the user via a software development kit in the relying party application. The user may sign-in to the identity provider via the software development kit, thereby authenticating the user for the relying party. Additionally, the identity provider may generate a risk validation score and provide it to the relying party that provides a confidence value that the user is validly using the user device and a risk score based on device activity on the identity network.
    Type: Grant
    Filed: August 31, 2022
    Date of Patent: March 26, 2024
    Assignee: Early Warning Services, LLC
    Inventors: Gregory Slowiak, Eric Woodward, Philip Lam, Jeff Shultz
  • Publication number: 20240095318
    Abstract: Disclosed herein is an identity network that can provide a universal, digital identity for users that can be used to authenticate the user by an identity provider for relying parties to utilize for confirming the identity of the user during sign-up. The identity network receives a request from a relying party that includes deep linking to an identity provider selected by the user. The request specifies the user and any other information about the user the relying party is requesting. A service of the identity network launches the application for the identity provider on the user's device and the user logs into the identity provider's application, which provides the user authentication/validation and information about the user to the identity network. The identity network can then provide the information to the relying party, which the relying party can rely on for creating an account with the relying party for the user.
    Type: Application
    Filed: September 26, 2023
    Publication date: March 21, 2024
    Inventors: Gregory Slowiak, Eric Woodward, Philip Lam, Jeff Shultz
  • Publication number: 20240080976
    Abstract: An electronic device may be provided with a liquid crystal polymer (LCP) printed circuit having conductive trace and a hole. A conductive flange may be soldered to the conductive trace and may extend into the hole. The end of the conductive flange may laterally surround a central opening within the hole. A conductive contact may be inserted into the central opening. Solder may be deposited over the conductive flange and in the central opening. The solder may couple the conductive contact to the conductive flange and thus the conductive trace. This may ensure a robust mechanical and electrical connection between the conductive contact and the conductive trace on the printed circuit despite the printed circuit being formed from LCP, which may not support copper-plated through vias for coupling to the conductive contact.
    Type: Application
    Filed: August 30, 2023
    Publication date: March 7, 2024
    Inventors: Peter A. Dvorak, Eric W. Bates, Ana Papio Toda, Yiren Wang, Hao Xu, Yuan Tao, Han Wang, Jack R Lanzi, Ronald Lam
  • Publication number: 20240079790
    Abstract: An electronic device may be provided with peripheral conductive housing structures having a segment that forms a resonating element for an antenna. A speaker may be mounted to a mid-chassis of the electronic device. A printed circuit may be mounted to the speaker and may have a ground trace for the antenna. A conductive spring may extend through the printed circuit and the speaker to couple the ground trace to the mid-chassis. A conductive contact pad may be welded to an aluminum layer such as an aluminum layer used to form the mid-chassis. A conductive spring such as the conductive spring coupled to the ground traces may press against the contact pad. The contact pad may include gold or nickel-plated stainless steel. The contact pad may provide a strong electrical connection between the conductive spring and the aluminum layer.
    Type: Application
    Filed: August 30, 2023
    Publication date: March 7, 2024
    Inventors: Peter A Dvorak, Eric W Bates, McKinley McQuaide, Ronald Lam, Ana Papio Toda, Yiren Wang, Hao Xu, Han Wang, Yuan Tao, Jack R Lanzi, Jingni Zhong
  • Patent number: 10327702
    Abstract: The present application provides a portable biometric monitor (10) comprising a biometric sensor, wherein the housing of said portable biometric monitor is connected to a strap for attaching the portable biometric monitor to a user, the strap comprising a first end and a second end, wherein the strap comprises spacer elements (12, 13, 14, 15) having a first end and a second end, the strap being connected from its two sides at the first end and from its two sides at the second end to two sides at the first end of the housing and to two sides at the second end of the housing via pivots (16, 17, 18, 19) connected to said spacer elements to allow pivoted movement of the housing, wherein the distance of the pivot locations between the first end of the housing and the second end of the housing is in the range of 10-30 mm.
    Type: Grant
    Filed: February 27, 2015
    Date of Patent: June 25, 2019
    Assignee: PULSEON OY
    Inventors: Jari Nousiainen, Jarkko Saunamäki, Eric Lam
  • Publication number: 20170247905
    Abstract: A collapsible shelter is provided and is in the form of a self-locking and inverting canopy that can be moved between a collapsed state to an in-use state by applying an inversion force to a central hub.
    Type: Application
    Filed: February 22, 2017
    Publication date: August 31, 2017
    Inventors: Anthony Topping, Eric Lam Chi Keung, Adam Tavin, Howard Allen Wilson, IV, Jason Hu, Artem Mishin
  • Publication number: 20170202514
    Abstract: The present application provides a portable biometric monitor (10) comprising a biometric sensor, wherein the housing of said portable biometric monitor is connected to a strap for attaching the portable biometric monitor to a user, the strap comprising a first end and a second end, wherein the strap comprises spacer elements (12, 13, 14, 15) having a first end and a second end, the strap being connected from its two sides at the first end and from its two sides at the second end to two sides at the first end of the housing and to two sides at the second end of the housing via pivots (16, 17, 18, 19) connected to said spacer elements to allow pivoted movement of the housing, wherein the distance of the pivot locations between the first end of the housing and the second end of the housing is in the range of 10-30 mm.
    Type: Application
    Filed: February 27, 2015
    Publication date: July 20, 2017
    Applicant: PulseOn Oy
    Inventors: Jari NOUSIAINEN, Jarkko SAUNAMÄKI, Eric LAM
  • Publication number: 20160212083
    Abstract: A method of creating a link of a connection to a messaging system includes receiving a protocol command message directed to a message entity of the messaging system. The protocol command message is communicated over the connection. The method includes determining that the protocol command message includes a link identifier that is unrecognized by the messaging system and in response to receiving the protocol command message and determining that the protocol command message includes the link identifier that is unrecognized by the messaging system, creating the link for the connection, the link corresponding to the link identifier.
    Type: Application
    Filed: October 12, 2012
    Publication date: July 21, 2016
    Inventors: Kartik Paramasivam, Jayteerth Katti, Hiu-Ming Eric Lam, David Leon Stucki
  • Publication number: 20150381722
    Abstract: A system and method for managing a workbook in a learning environment where a first user receives a book in electronic form, completes the activity embedded in the book and submits the activity to a second user via a server. The second user can then provide feedback regarding the activity to the first user and all inputs can be done without requiring an internet connection.
    Type: Application
    Filed: December 27, 2013
    Publication date: December 31, 2015
    Inventors: Yew Khuen Eric Lam, Mark Walter Salata, Naing Aye Nay
  • Publication number: 20140135375
    Abstract: Compositions and methods for delivery of therapeutic RNA molecules are disclosed.
    Type: Application
    Filed: April 2, 2012
    Publication date: May 15, 2014
    Applicant: Rutgers, The State University of New Jersey
    Inventor: Eric Lam
  • Publication number: 20140108523
    Abstract: A method of creating a link of a connection to a messaging system includes receiving a protocol command message directed to a message entity of the messaging system. The protocol command message is communicated over the connection. The method includes determining that the protocol command message includes a link identifier that is unrecognized by the messaging system and in response to receiving the protocol command message and determining that the protocol command message includes the link identifier that is unrecognized by the messaging system, creating the link for the connection, the link corresponding to the link identifier.
    Type: Application
    Filed: October 12, 2012
    Publication date: April 17, 2014
    Applicant: Microsoft Corporation
    Inventors: Kartik Paramasivam, Jayteerth Katti, Hiu-Ming Eric Lam, David Leon Stucki
  • Patent number: 8627409
    Abstract: Methods, systems, and machine-readable media for disseminating security metadata from one distributed entity to another in an automated fashion are disclosed. According to one embodiment of the present invention, a computer-implemented method for distributing security metadata comprises receiving at a first service a request for security metadata, the request being received from a process associated with a second service. The method further comprises generating an identifier and security metadata for the second service, the identifier and the security metadata being unique to the second service, and storing the identifier and the security metadata in a first memory accessible to the first service. The identifier and the security metadata are then transmitted to the process associated with the second service and stored in a second memory. The second service is configured to access the security metadata stored in the second memory to encrypt a first communication and decrypt a second communication.
    Type: Grant
    Filed: May 15, 2007
    Date of Patent: January 7, 2014
    Assignee: Oracle International Corporation
    Inventor: Peifung Eric Lam
  • Publication number: 20100261694
    Abstract: Compositions and methods for preventing fusarium head blight on target crop plants are disclosed.
    Type: Application
    Filed: April 7, 2010
    Publication date: October 14, 2010
    Inventors: Eric Lam, Michael Lawton, Hemelatha Seldasan
  • Publication number: 20080289019
    Abstract: Methods, systems, and machine-readable media for disseminating security metadata from one distributed entity to another in an automated fashion are disclosed. According to one embodiment of the present invention, a computer-implemented method for distributing security metadata comprises receiving at a first service a request for security metadata, the request being received from a process associated with a second service. The method further comprises generating an identifier and security metadata for the second service, the identifier and the security metadata being unique to the second service, and storing the identifier and the security metadata in a first memory accessible to the first service. The identifier and the security metadata are then transmitted to the process associated with the second service and stored in a second memory. The second service is configured to access the security metadata stored in the second memory to encrypt a first communication and decrypt a second communication.
    Type: Application
    Filed: May 15, 2007
    Publication date: November 20, 2008
    Applicant: Oracle International Corporation
    Inventor: Peifung Eric Lam
  • Publication number: 20080052271
    Abstract: This present invention is a method for converging a plurality of SQL statements into SQL skeletons to enhance database performance analysis and tuning for identifying the most influential SQL skeletons for databases on an RDBMS platform dependent on different standards. In this present invention, the SQL Normalization technique is combined with the accumulation of statistical information, which includes primarily the frequency, along with the cost and number of rows returned by the SQL skeletons. SQL normalization and collection of statistical data are thus the two principal constituents of SQL Convergence. This simple methodology can then be extended to meet various needs depending on the requirements of the RDBMS and the DBA's tuning priorities.
    Type: Application
    Filed: August 26, 2006
    Publication date: February 28, 2008
    Inventor: Eric Lam
  • Patent number: D684036
    Type: Grant
    Filed: October 24, 2012
    Date of Patent: June 11, 2013
    Assignee: VegHerb, LLC
    Inventors: Anthony Topping, Eric Lam