Patents by Inventor Eric Lam
Eric Lam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240146301Abstract: A common gate resistor bypass arrangement for a stacked arrangement of FET switches, the arrangement including a series combination of an nMOS transistor and a pMOS transistor connected across a common gate resistor. During at least a transition portion of the transition state of the stacked arrangement of FET switches, the nMOS transistor and the pMOS transistor are both in an ON state and bypass the common gate resistor. On the other hand, during at least a steady state portion of the ON steady state and the OFF steady state of the stacked arrangement of FET switches, one of the nMOS transistor and the pMOS transistor is in an OFF state and the other of the nMOS transistor and the pMOS transistor is in an ON state, thus not bypassing the common gate resistor.Type: ApplicationFiled: January 10, 2024Publication date: May 2, 2024Inventors: Alper GENC, Fleming LAM, Eric S. SHAPIRO, Ravindranath SHRIVASTAVA
-
Publication number: 20240143712Abstract: Described herein is an identity network for authenticating a user for a relying party and providing access to the user's credit report. The identity network may receive an unlock request for the digital identity and credit report of a user from a relying party. In response, the identity network may provide an identity provider link for accessing the identity provider application. The user may login to the identity provider application and provide consent for obtaining the user's credit report. The identity provider provides the identity network with verification of the digital identity of the user and the consent response from the user. The identity network can request access from a credit reporting agency and receive a credit report key in response. The identity network can provide the credit report key to the relying party, which can use the key to access the user's credit report from the credit reporting agency.Type: ApplicationFiled: November 2, 2023Publication date: May 2, 2024Inventors: Gregory Slowiak, Eric Woodward, Philip Lam, Jeff Shultz
-
Publication number: 20240129311Abstract: Described herein is an identity network for validating the digital identity of a user. The identity network may receive, from a relying party, an identity validation request to validate a digital identity of the user. The identity network may provide, to the relying party, a link associated with an identity provider application based on the identity validation request. The identity network may receive, from an identity provider associated with the identity provider application, a confirmation that the user has successfully accessed the identity provider application via the link. After receiving the confirmation, the identity network may receive from the identity provider, an attribute validation request to validate identity attributes of the user, where the attribute validation request includes a plurality of identity attributes of the user. The identity network may validate the digital identity of the user based on the plurality of identity attributes.Type: ApplicationFiled: December 26, 2023Publication date: April 18, 2024Applicant: Early Warning Services, LLCInventors: Gregory Slowiak, Eric Woodward, Philip Lam, Jeff Shultz
-
Publication number: 20240099892Abstract: An apparatus includes a shaft, an expandable dilator, and at least one ventilation pathway. The shaft defines a longitudinal axis and includes a distal and proximal ends with at least one shaft lumen. The expandable dilator includes body with its own proximal and distal ends. The body is configured to transition between a contracted state and an expanded state. The body is configured to dilate a Eustachian tube of a patient in the expanded state. The at least one ventilation pathway is configured to provide ventilation from the distal end of the body to the proximal end of the body when the body is in the expanded state. In some examples, the ventilation pathway includes a set of transversely oriented vent openings formed through the shaft. In some other examples, the ventilation pathway includes a space defined between one or more radially outwardly protruding features of the expandable dilator.Type: ApplicationFiled: October 27, 2023Publication date: March 28, 2024Inventors: Peter F. Campbell, Daniel T. Harfe, Hung V. Ha, Ketan P. Muni, Andy Nguyen, Sivette Lam, John Y. Chang, Eric Goldfarb
-
Patent number: 11941093Abstract: Disclosed herein is an identity network that provides a universal, digital identity for users to be authenticated by an identity provider for relying parties upon sign-in to the relying party. The identity network receives the sign-in request from a relying party for a user using a user device. The identity network can provide a session identifier to the relying party for the request and launch an identity provider application associated with the user via a software development kit in the relying party application. The user may sign-in to the identity provider via the software development kit, thereby authenticating the user for the relying party. Additionally, the identity provider may generate a risk validation score and provide it to the relying party that provides a confidence value that the user is validly using the user device and a risk score based on device activity on the identity network.Type: GrantFiled: August 31, 2022Date of Patent: March 26, 2024Assignee: Early Warning Services, LLCInventors: Gregory Slowiak, Eric Woodward, Philip Lam, Jeff Shultz
-
Publication number: 20240095318Abstract: Disclosed herein is an identity network that can provide a universal, digital identity for users that can be used to authenticate the user by an identity provider for relying parties to utilize for confirming the identity of the user during sign-up. The identity network receives a request from a relying party that includes deep linking to an identity provider selected by the user. The request specifies the user and any other information about the user the relying party is requesting. A service of the identity network launches the application for the identity provider on the user's device and the user logs into the identity provider's application, which provides the user authentication/validation and information about the user to the identity network. The identity network can then provide the information to the relying party, which the relying party can rely on for creating an account with the relying party for the user.Type: ApplicationFiled: September 26, 2023Publication date: March 21, 2024Inventors: Gregory Slowiak, Eric Woodward, Philip Lam, Jeff Shultz
-
Publication number: 20240080976Abstract: An electronic device may be provided with a liquid crystal polymer (LCP) printed circuit having conductive trace and a hole. A conductive flange may be soldered to the conductive trace and may extend into the hole. The end of the conductive flange may laterally surround a central opening within the hole. A conductive contact may be inserted into the central opening. Solder may be deposited over the conductive flange and in the central opening. The solder may couple the conductive contact to the conductive flange and thus the conductive trace. This may ensure a robust mechanical and electrical connection between the conductive contact and the conductive trace on the printed circuit despite the printed circuit being formed from LCP, which may not support copper-plated through vias for coupling to the conductive contact.Type: ApplicationFiled: August 30, 2023Publication date: March 7, 2024Inventors: Peter A. Dvorak, Eric W. Bates, Ana Papio Toda, Yiren Wang, Hao Xu, Yuan Tao, Han Wang, Jack R Lanzi, Ronald Lam
-
Publication number: 20240079790Abstract: An electronic device may be provided with peripheral conductive housing structures having a segment that forms a resonating element for an antenna. A speaker may be mounted to a mid-chassis of the electronic device. A printed circuit may be mounted to the speaker and may have a ground trace for the antenna. A conductive spring may extend through the printed circuit and the speaker to couple the ground trace to the mid-chassis. A conductive contact pad may be welded to an aluminum layer such as an aluminum layer used to form the mid-chassis. A conductive spring such as the conductive spring coupled to the ground traces may press against the contact pad. The contact pad may include gold or nickel-plated stainless steel. The contact pad may provide a strong electrical connection between the conductive spring and the aluminum layer.Type: ApplicationFiled: August 30, 2023Publication date: March 7, 2024Inventors: Peter A Dvorak, Eric W Bates, McKinley McQuaide, Ronald Lam, Ana Papio Toda, Yiren Wang, Hao Xu, Han Wang, Yuan Tao, Jack R Lanzi, Jingni Zhong
-
Patent number: 10327702Abstract: The present application provides a portable biometric monitor (10) comprising a biometric sensor, wherein the housing of said portable biometric monitor is connected to a strap for attaching the portable biometric monitor to a user, the strap comprising a first end and a second end, wherein the strap comprises spacer elements (12, 13, 14, 15) having a first end and a second end, the strap being connected from its two sides at the first end and from its two sides at the second end to two sides at the first end of the housing and to two sides at the second end of the housing via pivots (16, 17, 18, 19) connected to said spacer elements to allow pivoted movement of the housing, wherein the distance of the pivot locations between the first end of the housing and the second end of the housing is in the range of 10-30 mm.Type: GrantFiled: February 27, 2015Date of Patent: June 25, 2019Assignee: PULSEON OYInventors: Jari Nousiainen, Jarkko Saunamäki, Eric Lam
-
Publication number: 20170247905Abstract: A collapsible shelter is provided and is in the form of a self-locking and inverting canopy that can be moved between a collapsed state to an in-use state by applying an inversion force to a central hub.Type: ApplicationFiled: February 22, 2017Publication date: August 31, 2017Inventors: Anthony Topping, Eric Lam Chi Keung, Adam Tavin, Howard Allen Wilson, IV, Jason Hu, Artem Mishin
-
Publication number: 20170202514Abstract: The present application provides a portable biometric monitor (10) comprising a biometric sensor, wherein the housing of said portable biometric monitor is connected to a strap for attaching the portable biometric monitor to a user, the strap comprising a first end and a second end, wherein the strap comprises spacer elements (12, 13, 14, 15) having a first end and a second end, the strap being connected from its two sides at the first end and from its two sides at the second end to two sides at the first end of the housing and to two sides at the second end of the housing via pivots (16, 17, 18, 19) connected to said spacer elements to allow pivoted movement of the housing, wherein the distance of the pivot locations between the first end of the housing and the second end of the housing is in the range of 10-30 mm.Type: ApplicationFiled: February 27, 2015Publication date: July 20, 2017Applicant: PulseOn OyInventors: Jari NOUSIAINEN, Jarkko SAUNAMÄKI, Eric LAM
-
Publication number: 20160212083Abstract: A method of creating a link of a connection to a messaging system includes receiving a protocol command message directed to a message entity of the messaging system. The protocol command message is communicated over the connection. The method includes determining that the protocol command message includes a link identifier that is unrecognized by the messaging system and in response to receiving the protocol command message and determining that the protocol command message includes the link identifier that is unrecognized by the messaging system, creating the link for the connection, the link corresponding to the link identifier.Type: ApplicationFiled: October 12, 2012Publication date: July 21, 2016Inventors: Kartik Paramasivam, Jayteerth Katti, Hiu-Ming Eric Lam, David Leon Stucki
-
Publication number: 20150381722Abstract: A system and method for managing a workbook in a learning environment where a first user receives a book in electronic form, completes the activity embedded in the book and submits the activity to a second user via a server. The second user can then provide feedback regarding the activity to the first user and all inputs can be done without requiring an internet connection.Type: ApplicationFiled: December 27, 2013Publication date: December 31, 2015Inventors: Yew Khuen Eric Lam, Mark Walter Salata, Naing Aye Nay
-
Publication number: 20140135375Abstract: Compositions and methods for delivery of therapeutic RNA molecules are disclosed.Type: ApplicationFiled: April 2, 2012Publication date: May 15, 2014Applicant: Rutgers, The State University of New JerseyInventor: Eric Lam
-
Publication number: 20140108523Abstract: A method of creating a link of a connection to a messaging system includes receiving a protocol command message directed to a message entity of the messaging system. The protocol command message is communicated over the connection. The method includes determining that the protocol command message includes a link identifier that is unrecognized by the messaging system and in response to receiving the protocol command message and determining that the protocol command message includes the link identifier that is unrecognized by the messaging system, creating the link for the connection, the link corresponding to the link identifier.Type: ApplicationFiled: October 12, 2012Publication date: April 17, 2014Applicant: Microsoft CorporationInventors: Kartik Paramasivam, Jayteerth Katti, Hiu-Ming Eric Lam, David Leon Stucki
-
Patent number: 8627409Abstract: Methods, systems, and machine-readable media for disseminating security metadata from one distributed entity to another in an automated fashion are disclosed. According to one embodiment of the present invention, a computer-implemented method for distributing security metadata comprises receiving at a first service a request for security metadata, the request being received from a process associated with a second service. The method further comprises generating an identifier and security metadata for the second service, the identifier and the security metadata being unique to the second service, and storing the identifier and the security metadata in a first memory accessible to the first service. The identifier and the security metadata are then transmitted to the process associated with the second service and stored in a second memory. The second service is configured to access the security metadata stored in the second memory to encrypt a first communication and decrypt a second communication.Type: GrantFiled: May 15, 2007Date of Patent: January 7, 2014Assignee: Oracle International CorporationInventor: Peifung Eric Lam
-
Publication number: 20100261694Abstract: Compositions and methods for preventing fusarium head blight on target crop plants are disclosed.Type: ApplicationFiled: April 7, 2010Publication date: October 14, 2010Inventors: Eric Lam, Michael Lawton, Hemelatha Seldasan
-
Publication number: 20080289019Abstract: Methods, systems, and machine-readable media for disseminating security metadata from one distributed entity to another in an automated fashion are disclosed. According to one embodiment of the present invention, a computer-implemented method for distributing security metadata comprises receiving at a first service a request for security metadata, the request being received from a process associated with a second service. The method further comprises generating an identifier and security metadata for the second service, the identifier and the security metadata being unique to the second service, and storing the identifier and the security metadata in a first memory accessible to the first service. The identifier and the security metadata are then transmitted to the process associated with the second service and stored in a second memory. The second service is configured to access the security metadata stored in the second memory to encrypt a first communication and decrypt a second communication.Type: ApplicationFiled: May 15, 2007Publication date: November 20, 2008Applicant: Oracle International CorporationInventor: Peifung Eric Lam
-
Publication number: 20080052271Abstract: This present invention is a method for converging a plurality of SQL statements into SQL skeletons to enhance database performance analysis and tuning for identifying the most influential SQL skeletons for databases on an RDBMS platform dependent on different standards. In this present invention, the SQL Normalization technique is combined with the accumulation of statistical information, which includes primarily the frequency, along with the cost and number of rows returned by the SQL skeletons. SQL normalization and collection of statistical data are thus the two principal constituents of SQL Convergence. This simple methodology can then be extended to meet various needs depending on the requirements of the RDBMS and the DBA's tuning priorities.Type: ApplicationFiled: August 26, 2006Publication date: February 28, 2008Inventor: Eric Lam
-
Patent number: D684036Type: GrantFiled: October 24, 2012Date of Patent: June 11, 2013Assignee: VegHerb, LLCInventors: Anthony Topping, Eric Lam