Patents by Inventor Gary Chew

Gary Chew has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190101291
    Abstract: A swirler, such as for swirling air in a fuel injector of a gas turbine engine, includes a swirler body with opposed inlet and outlet ends with a swirler wall extending therebetween along a longitudinal axis. The inlet end of the swirler body defines an inlet opening. A plurality of swirl slots is defined through a portion of the swirler wall that converges toward the longitudinal axis in a direction from the inlet opening toward the outlet end of the swirler body. The swirl slots are radially off-set with respect to the longitudinal axis for imparting swirl on a flow passing from the inlet opening, through the swirl slots, and past the outlet end of the swirler body.
    Type: Application
    Filed: November 30, 2018
    Publication date: April 4, 2019
    Inventors: Gary Chew, Viraphand Cholvibul, Philip E. O. Buelow, Jason A. Ryon
  • Patent number: 10169754
    Abstract: A method for performing a transaction between a portable device and a transaction terminal includes establishing a communication channel between the portable device and the transaction terminal; establishing a first data link between the transaction terminal and the transaction server; and using an application program in the transaction server to perform the transaction with the transaction terminal through the data link, on behalf of the portable device.
    Type: Grant
    Filed: November 17, 2011
    Date of Patent: January 1, 2019
    Assignee: INSIDE SECURE
    Inventors: Bruno Charrat, Gary Chew
  • Patent number: 10161633
    Abstract: A swirler, such as for swirling air in a fuel injector of a gas turbine engine, includes a swirler body with opposed inlet and outlet ends with a swirler wall extending therebetween along a longitudinal axis. The inlet end of the swirler body defines an inlet opening. A plurality of swirl slots is defined through a portion of the swirler wall that converges toward the longitudinal axis in a direction from the inlet opening toward the outlet end of the swirler body. The swirl slots are radially off-set with respect to the longitudinal axis for imparting swirl on a flow passing from the inlet opening, through the swirl slots, and past the outlet end of the swirler body.
    Type: Grant
    Filed: March 4, 2013
    Date of Patent: December 25, 2018
    Assignee: Delavan Inc.
    Inventors: Gary Chew, Viraphand Cholvibul, Philip E. O. Buelow, Jason Allen Ryon
  • Patent number: 9621550
    Abstract: In a general aspect, a method can include: installing in a non-secure device a customized module for managing communications with a secure element, transmitting to the secure element first authentication data for authenticating the customized module, the customized module generating and transmitting to the secure element second authentication data for authenticating the customized module, if the secure element determines that the first and second authentication data are consistent with each other, establishing a secure communication link between the customized module and the secure element, by using the first or second authentication data, the non-secure device transmitting a command to the secure element, for an application installed in the secure element, and the secure element executing the command only if the command is sent via the secure communication link.
    Type: Grant
    Filed: September 25, 2013
    Date of Patent: April 11, 2017
    Assignee: Inside Secure
    Inventors: Gary Chew, Georges Gagnerot, Jean-François Grezes
  • Patent number: 9432086
    Abstract: A method for executing an application in an NFC device, including steps during which: a contactless link is established between a first and a second NFC devices, the first NFC device transmits through the contactless link an identifier memorized by the first NFC device, the second NFC device transmits through the contactless link an application identifier, the second NFC device transmits to an application server the identifier of the first NFC device and the application identifier, the application server transmits to an authentication server the identifier of the first NFC device and the application identifier, the authentication server verifies the identification data, and if the first NFC device and the application are identified, the authentication server authorizes the two NFC devices to execute the application by transmitting to the application server an identifier of a user of the first NFC device, corresponding to the identifier of the first NFC device.
    Type: Grant
    Filed: October 9, 2012
    Date of Patent: August 30, 2016
    Assignee: Inside Secure
    Inventor: Gary Chew
  • Publication number: 20150256537
    Abstract: The present invention relates to a method for executing a command by a secure element from a non-secure device, the method including steps of: installing in the non-secure device a customized module for managing communications with the secure element, transmitting to the secure element first authentication data for authenticating the customized module, the customized module generating and transmitting to the secure element second authentication data for authenticating the customized module, if the secure element determines that the first and second authentication data are consistent with each other, establishing a secure communication link between the customized module and the secure element, by using the first or second authentication data, the non-secure device transmitting a command to the secure element, for an application installed in the secure element, and the secure element executing the command only if the command is sent via the secure communication link.
    Type: Application
    Filed: September 25, 2013
    Publication date: September 10, 2015
    Inventors: Gary Chew, Georges Gagnerot, Jean-François Grezes
  • Publication number: 20140364058
    Abstract: A method for executing an application in an NFC device, including steps during which: a contactless link is established between a first and a second NFC devices, the first NFC device transmits through the contactless link an identifier memorized by the first NFC device, the second NFC device transmits through the contactless link an application identifier, the second NFC device transmits to an application server the identifier of the first NFC device and the application identifier, the application server transmits to an authentication server the identifier of the first NFC device and the application identifier, the authentication server verifies the identification data, and if the first NFC device and the application are identified, the authentication server authorizes the two NFC devices to execute the application by transmitting to the application server an identifier of a user of the first NFC device, corresponding to the identifier of the first NFC device.
    Type: Application
    Filed: October 9, 2012
    Publication date: December 11, 2014
    Inventor: Gary Chew
  • Patent number: 8850527
    Abstract: The invention relates to a method of executing a secure application in an NFC device, the method comprising steps during which: a contactless link is established between first and second NFC devices, the first NFC device transmits by the contactless link an identifier of a secure processor of the first NFC device, the second NFC device transmits by the contactless link an application identifier, the secure processor transmits by the contactless link first authentication data allowing the authentication of the secure processor of the first NFC device, the second NFC device transmits to an application server the first authentication data, the application server transmits to an authentication server the first authentication data and second authentication data) to authenticate the application and authorizes the two NFC devices to execute the application only if the secure processor and the application are authenticated.
    Type: Grant
    Filed: July 7, 2011
    Date of Patent: September 30, 2014
    Assignee: Inside Secure
    Inventors: Gary Chew, Charles Walton
  • Publication number: 20140245742
    Abstract: A swirler, such as for swirling air in a fuel injector of a gas turbine engine, includes a swirler body with opposed inlet and outlet ends with a swirler wall extending therebetween along a longitudinal axis. The inlet end of the swirler body defines an inlet opening. A plurality of swirl slots is defined through a portion of the swirler wall that converges toward the longitudinal axis in a direction from the inlet opening toward the outlet end of the swirler body. The swirl slots are radially off-set with respect to the longitudinal axis for imparting swirl on a flow passing from the inlet opening, through the swirl slots, and past the outlet end of the swirler body.
    Type: Application
    Filed: March 4, 2013
    Publication date: September 4, 2014
    Applicant: Delavan Inc
    Inventors: Gary Chew, Viraphand Cholvibul, Philip E. O. Buelow, Jason Allen Ryon
  • Publication number: 20140244993
    Abstract: A method of loading an operating program in a secure microcircuit, includes the steps of: downloading and installing in the microcircuit a boot program, which is launched upon activation of the microcircuit, loading into the microcircuit initialization data including a first public key, performing a mutual authentication procedure between the microcircuit and a first server having a private key corresponding to the first public key, and if the mutual authentication is successful, loading from the first server operating program profile data holding a second public key, performing a mutual authentication procedure between the microcircuit and a second server having a private key corresponding to the second public key, and if the mutual authentication is successful, loading an operating program from the second server and installing it in the microcircuit, and activating the operating program when it is in the microcircuit.
    Type: Application
    Filed: February 27, 2014
    Publication date: August 28, 2014
    Applicant: INSIDE SECURE
    Inventor: Gary CHEW
  • Publication number: 20130282570
    Abstract: A method for performing a transaction between a portable device and a transaction terminal includes establishing a communication channel between the portable device and the transaction terminal; establishing a first data link between the transaction terminal and the transaction server; and using an application program in the transaction server to perform the transaction with the transaction terminal through the data link, on behalf of the portable device.
    Type: Application
    Filed: November 17, 2011
    Publication date: October 24, 2013
    Applicant: INSIDE SECURE
    Inventors: Bruno Charrat, Gary Chew
  • Patent number: 8386518
    Abstract: When a user records confidential data in a communicating object, the user inputs the confidential data which are encoded and transmitted, with a reference of the user, towards a server in order to record the encoded confidential data in association with the reference. When a user searches for a reference of another user of a communicating object in the communicating object, the user inputs a search datum which is encoded and transmitted to the server for comparing therein the encoded search datum transmitted to all of the encoded confidential data recorded in the server. The server transmits a reference associated with an encoded confidential datum corresponding to the encoded search data to the communicating object. In this way, the user of the communicating object is put into contact with the other user without knowing the data of the other user.
    Type: Grant
    Filed: July 9, 2007
    Date of Patent: February 26, 2013
    Assignee: Gemalto SA
    Inventors: Frederic Faure, Gary Chew, Lionel Martin
  • Patent number: 8100336
    Abstract: The invention relates to a method of securing applications on a chip card which is disposed in a digital appliance. A count is made of the number of times a personal identification number of a chip card application is input erroneously. When this number reaches a threshold, the application or the chip card is blocked. The erroneous input count and unblocking the chip card or the application is restarted when the personal identification number of the chip card is input. In this way, PIN-secured applications offer a high level of security without requiring the storing of additional unblocking data.
    Type: Grant
    Filed: October 24, 2005
    Date of Patent: January 24, 2012
    Assignee: Gemalto SA
    Inventors: Gary Chew, Eric Plet, Max De Groot
  • Publication number: 20120011572
    Abstract: The invention relates to a method of executing a secure application in an NFC device, the method comprising steps during which: a contactless link is established between first and second NFC devices, the first NFC device transmits by the contactless link an identifier of a secure processor of the first NFC device, the second NFC device transmits by the contactless link an application identifier, the secure processor transmits by the contactless link first authentication data allowing the authentication of the secure processor of the first NFC device, the second NFC device transmits to an application server the first authentication data, the application server transmits to an authentication server the first authentication data and second authentication data) to authenticate the application and authorizes the two NFC devices to execute the application only if the secure processor and the application are authenticated.
    Type: Application
    Filed: July 7, 2011
    Publication date: January 12, 2012
    Applicant: INSIDE SECURE
    Inventors: Gary CHEW, Charles WALTON
  • Patent number: 8032748
    Abstract: A chip card needs to be allocated in a secured manner to a network operator via a personalization center in order to determine a final authentication key which is attributed to a subscriber of the operator without its being transmitted via a network. The following is loaded into a card by a module: an algorithm and an allocation key; an algorithm for determination of the authentication key and at least one intermediate authentication key. A module transmits an allocation message which includes a final identity number, a random number and an allocation signature from the center to the card. The card authenticates the message by means of the allocation algorithm as a function of the allocation key and the allocation signature, and determines the final authentication key as a function of the intermediate key and the random number.
    Type: Grant
    Filed: December 6, 2005
    Date of Patent: October 4, 2011
    Assignee: Gemalto SA
    Inventors: Lionel Merrien, Gary Chew, Max De Groot
  • Publication number: 20100287386
    Abstract: An integrated circuit includes a communication interface circuit, a cryptographic algorithm, a countermeasure configured to protect the cryptographic algorithm against side-channel attacks, and a mask generator configured to provide the countermeasure with mask values. The integrated circuit is configured to execute a specific command requiring the disclosure of mask values used by the countermeasures to protect the cryptographic algorithm during a cryptographic session, and, in response to such a command, to send the mask values through the communication interface circuit.
    Type: Application
    Filed: May 7, 2010
    Publication date: November 11, 2010
    Applicant: INSIDE CONTACTLESS
    Inventors: Benoît FEIX, Sébastien NEROT, Gary CHEW, Bernard VIAN
  • Publication number: 20090319488
    Abstract: When a user records confidential data in a communicating object, the user inputs the confidential data which are encoded and transmitted, with a reference of the user, towards a server in order to record the encoded confidential data in association with the reference. When a user searches for a reference of another user of a communicating object in the communicating object, the user inputs a search datum which is encoded and transmitted to the server for comparing therein the encoded search datum transmitted to all of the encoded confidential data recorded in the server. The server transmits a reference associated with an encoded confidential datum corresponding to the encoded search data to the communicating object. In this way, the user of the communicating object is put into contact with the other user without knowing the data of the other user.
    Type: Application
    Filed: July 9, 2007
    Publication date: December 24, 2009
    Applicant: GEMALTO
    Inventors: Frederic Faure, Gary Chew, Lionel Martin
  • Publication number: 20090159692
    Abstract: The invention relates to a method of securing applications on a chip card which is disposed in a digital appliance. A count is made of the number of times a personal identification number of a chip card application is input erroneously. When this number reaches a threshold, the application or the chip card is blocked. The erroneous input count and unblocking the chip card or the application is restarted when the personal identification number of the chip card is input. In this way, PIN-secured applications offer a high level of security without requiring the storing of additional unblocking data.
    Type: Application
    Filed: October 24, 2005
    Publication date: June 25, 2009
    Applicant: GEMPLUS
    Inventors: Gary Chew, Eric Plet, Max De Groot
  • Publication number: 20080276090
    Abstract: A chip card needs to be allocated in a secured manner to a network operator via a personalization center in order to determine a final authentication key which is attributed to a subscriber of the operator without its being transmitted via a network. The following is loaded into a card by a module: an algorithm and an allocation key; an algorithm for determination of the authentication key and at least one intermediate authentication key. A module transmits an allocation message which includes a final identity number, a random number and an allocation signature from the center to the card. The card authenticates the message by means of the allocation algorithm as a function of the allocation key and the allocation signature, and determines the final authentication key as a function of the intermediate key and the random number.
    Type: Application
    Filed: December 6, 2005
    Publication date: November 6, 2008
    Applicant: GEMPLUS
    Inventors: Lionel Merrien, Gary Chew, Max De Groot
  • Publication number: 20060293065
    Abstract: Systems and methods are presented for providing dynamic temporally and geographically relevant information or content to mobile communications devices, in which a profile and a current location are obtained for a mobile device, profile specific geographically and temporally relevant content from a data store according to the user profile, the current user location, and the current time, and the content is provided to mobile communications device via a communications network.
    Type: Application
    Filed: June 27, 2005
    Publication date: December 28, 2006
    Inventors: Gary Chew, Anil Macwan