Patents by Inventor Helen Wang
Helen Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230362300Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a spoofed telephone call identifier are disclosed. In one aspect, a method includes the actions of receiving, by a first computing device, data indicating a placement of a telephone call from a second computing device to a third computing device, wherein the data includes a phone number of the second computing device. The actions further include determining characteristics of the phone number of the second computing device. The actions further include, based on the characteristics of the phone number of the second computing device, determining a likelihood that the phone number of the second computing device is spoofed. The actions further include, based on the likelihood that the phone number of the second computing device is spoofed, determining whether to transmit a notification of the telephone call to the third computing device.Type: ApplicationFiled: July 13, 2023Publication date: November 9, 2023Inventors: Parag Garg, Derrick Ives, Michele Lundahl, Helen Wang
-
Patent number: 11729313Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a spoofed telephone call identifier are disclosed. In one aspect, a method includes the actions of receiving, by a first computing device, data indicating a placement of a telephone call from a second computing device to a third computing device, wherein the data includes a phone number of the second computing device. The actions further include determining characteristics of the phone number of the second computing device. The actions further include, based on the characteristics of the phone number of the second computing device, determining a likelihood that the phone number of the second computing device is spoofed. The actions further include, based on the likelihood that the phone number of the second computing device is spoofed, determining whether to transmit a notification of the telephone call to the third computing device.Type: GrantFiled: May 17, 2021Date of Patent: August 15, 2023Assignee: T-Mobile USA, Inc.Inventors: Parag Garg, Derrick Ives, Michele Lundahl, Helen Wang
-
Publication number: 20220368801Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a spoofed telephone call identifier are disclosed. In one aspect, a method includes the actions of receiving, by a first computing device, data indicating a placement of a telephone call from a second computing device to a third computing device, wherein the data includes a phone number of the second computing device. The actions further include determining characteristics of the phone number of the second computing device. The actions further include, based on the characteristics of the phone number of the second computing device, determining a likelihood that the phone number of the second computing device is spoofed. The actions further include, based on the likelihood that the phone number of the second computing device is spoofed, determining whether to transmit a notification of the telephone call to the third computing device.Type: ApplicationFiled: May 17, 2021Publication date: November 17, 2022Inventors: Parag Garg, Derrick Ives, Michele Lundahl, Helen Wang
-
Publication number: 20220212454Abstract: The invention relates to a multi-layer paneling structure having a high gloss cap and second layer of high impact resistance thermoplastic polymer or composites for exterior and interior paneling applications where chemical resistance and/or scratch resistance is desired. The invention also relates to a high gloss, multi-layer panel that can easily be repaired, once marred, to return the surface gloss to at least 90% of the original surface gloss. The invention further relates to articles made with the multi-layer paneling structure of the invention. The multi-layer structure can be used alone, or can be very thin and used as a replacement for an undercoating and coating on an article, such as a metal car part.Type: ApplicationFiled: May 14, 2020Publication date: July 7, 2022Applicant: Trinseo Europe GmbHInventors: Jing-Han (Helen) Wang, Brian Cromer
-
Publication number: 20220161496Abstract: The invention relates a material extrusion additive manufacturing method for producing a clear, internally transparent part composed of amorphous thermoplastic polymer layers at least 0.1 mm thick. The invention also relates to internally clear parts made by the method, having an internal haze of less than 25%, less than 15%, less than 10% and even less than 5%. The method creates a printed dot or line of amorphous thermoplastic polymer that remains at a high internal temperature for a long enough period of time to allow the polymer chains in each layer to be mobile and fluid, permitting sufficient inter-layer chain entanglements to reduce and eliminate layer lines. With a nearly 100% dense final part, voids are eliminated. The resultant printed article has a very high internal clarity, and can have a haze of less than 5%.Type: ApplicationFiled: March 27, 2020Publication date: May 26, 2022Applicant: Arkema FranceInventors: David Shen-Ren LIU, Mary K. CALVIN, Evan J. FISHER, Mark A. AUBART, Jing-Han (Helen) WANG
-
Publication number: 20200354560Abstract: Compounds that can be produced by a ring-opening reaction of epoxidized alkanes or epoxidized fatty acid esters having a molecular weight greater than 200 grams per mole are blended with polar polymers to improve the gloss of the polar polymers. These compounds include at least one polar functional group and are blended with polar polymers, or blends comprising at least one polar polymer, in order to improve the gloss of these polymers, such that they have suitable gloss right out of the manufacturing operation without the need for further painting or lamination steps. These compounds may also improve the impact strength of the polar polymers. Also disclosed are composite structures wherein an outer cap layer is made from the polar polymer blended with the gloss improving additive.Type: ApplicationFiled: January 4, 2019Publication date: November 12, 2020Inventors: Jing-Han (Helen) WANG, Cecile BONNET, Alex PEDERSON
-
Patent number: 10019570Abstract: Systems and methodologies for accessing resources associated with a Web-based application in accordance with one or more embodiments disclosed herein may include a browser that obtains at least first resources from a first domain and second resources from a second domain and a resource management component that facilitates controlled communication between the first resources and the second resources and prevents the first resources and the second resources from accessing other resources that the first resources and the second resources are not permitted to access. The resource management component may be further operable to contain restricted services in a sandbox containment structure and/or to isolate access-controlled resources in a service instance. In addition, the resource management component may be operable to facilitate the flexible display of resources from disparate domains and/or controlled communication therebetween.Type: GrantFiled: June 14, 2007Date of Patent: July 10, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Jiahe Helen Wang, Xiaofeng Fan, Collin Edward Jackson, Jonathan Ryan Howell, Zhenbin Xu
-
Patent number: 9906549Abstract: Processes and techniques for protecting web users from malicious executable code are described. A proxy engine is implemented that intercepts communications between a web browser and a script engine. The proxy engine can invoke a variety of custom event handlers that are configured to handle specific types of events (e.g., script events) that occur in the processing of web content. A script shield event handler detects the presence of script in pre-defined script-free zones and prevents the script from being executed on a user's device.Type: GrantFiled: September 6, 2007Date of Patent: February 27, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Xiaofeng Fan, Jiahe Helen Wang
-
Patent number: 9840547Abstract: The present invention provides methods of treating prediabetes, hyperglycemia, type 2 diabetes, AMIS syndrome, and obesity in a subject by administering to the patient HISS. The present invention also provides methods of diagnosing AMIS syndrome in a patient. Additionally, the present invention provides a method of shifting nutrient storage in meat-producing livestock to muscle rather than fat.Type: GrantFiled: May 14, 2014Date of Patent: December 12, 2017Assignee: Scimar Ltd.Inventors: W. Wayne Lautt, Helen Wang
-
Patent number: 9697365Abstract: Functionality is described herein for receiving events which characterize features in an environment, and for identifying at least one policy based on the events. The functionality consults a certificate, associated with the policy, to determine whether the policy is valid. If valid, the functionality uses the policy to govern the behavior of at least one application, such as by controlling the application's consumption of events. A trusted passport authority may be employed to generate the certificates. Each certificate may: (1) identify that it originated from the trusted passport authority; (2) contain context information which describes a context in which the policy is intended to be applied within an environment; and/or (3) contain machine-readable content that, when executed, carries out at least one aspect of the policy.Type: GrantFiled: January 28, 2014Date of Patent: July 4, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Tadayoshi Kohno, David A. Molnar, Alexander N. Moshchuk, Franziska Roesner, Jiahe Helen Wang
-
Patent number: 9497112Abstract: A virtual data center allocation architecture with bandwidth guarantees that provides for the creation of multiple virtual data centers from a single physical infrastructure. The virtual data center allocation is accomplished in three steps. First, clusters are created from the servers in the physical infrastructure. Second, a bipartite graph is built to map the virtual machines to the servers located in a particular cluster and finally a path is calculated between two virtual machines. The virtual data centers may be dynamically expanded or contracted based on changing bandwidth guarantees.Type: GrantFiled: March 3, 2014Date of Patent: November 15, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Chuanxiong Guo, Guohan Lv, Shuang Yang, Jiahe Helen Wang
-
Patent number: 9424239Abstract: A shared renderer maintains shared state information to which two or more augmented reality application contribute. The shared renderer then provides a single output presentation based on the shared state information. Among other aspects, the shared renderer includes a permission mechanism by which applications can share information regarding object properties. The shared renderer may also include: a physics engine for simulating movement of at least one object that is represented by the shared state information; an annotation engine for managing a presentation of annotations produced by plural applications; and/or an occlusion engine for managing the behavior of the output presentation when two or more objects, produced by two or more applications, overlap within the output presentation.Type: GrantFiled: September 6, 2013Date of Patent: August 23, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Alan M. Dunn, Tadayoshi Kohno, David A. Molnar, Alexander N. Moshchuk, Franziska Roesner, Jiahe Helen Wang
-
Patent number: 9413784Abstract: Functionality is described herein for managing the behavior of one or more applications, such as augmented reality applications and/or other environment-sensing applications. The functionality defines permission information in a world-driven manner, which means that the functionality uses a trusted mechanism to identify cues in the sensed environment, and then maps those cues to permission information. The functionality then uses the permission information to govern the operation of one or more applications.Type: GrantFiled: September 6, 2013Date of Patent: August 9, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Tadayoshi Kohno, David A. Molnar, Alexander N. Moshchuk, Franziska Roesner, Jiahe Helen Wang
-
Patent number: 9355268Abstract: Functionality is described herein by which plural environment-sensing applications capture information from an environment in a fine-grained and least-privileged manner. By doing so, the functionality reduces the risk that private information that appears within the environment will be released to unauthorized parties. Among other aspects, the functionality provides an error correction mechanism for reducing the incidence of false positives in the detection of objects, an offloading technique for delegating computationally intensive recognition tasks to a remote computing framework, and a visualization module by which a user may inspect the access rights to be granted (or already granted) to each application.Type: GrantFiled: September 6, 2013Date of Patent: May 31, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Loris D'Antoni, Alan M. Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David A. Molnar, Alexander N. Moshchuk, Eyal Ofek, Franziska Roesner, Timothy Scott Saponas, Margus Veanes, Jiahe Helen Wang
-
Patent number: 9230100Abstract: The subject disclosure relates to systems and methods that secure anti-virus software through virtualization. Anti-virus systems can be maintained separate from user applications and operating system through virtualization. The user applications and operating system run in a guest virtual machine while anti-virus systems are isolated in a secure virtual machine. The virtual machines are partially interdependent such that the anti-virus systems can monitor user applications and operating systems while the anti-virus systems remain free from possible malicious attack originating from a user environment. Further, the anti-virus system is secured against zero-day attacks so that detection and recovery may occur post zero-day.Type: GrantFiled: October 25, 2012Date of Patent: January 5, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Jiahe Helen Wang, Jacob R. Lorch, Bryan Jeffrey Parno
-
Patent number: 9034748Abstract: Embodiments include a method comprising depositing a hard mask layer over a first layer, the hard mask layer including; lower hard mask layer, hard mask stop layer, and upper hard mask. The hard mask layer and the first layer are patterned and a spacer deposited on the patterned sidewall. The upper hard mask layer and top portion of the spacer are removed by selective etching with respect to the hard mask stop layer, the remaining spacer material extending to a first predetermined position on the sidewall. The hard mask stop layer is removed by selective etching with respect to the lower hard mask layer and spacer. The first hard mask layer and top portion of the spacer are removed by selectively etching the lower hard mask layer and the spacer with respect to the first layer, the remaining spacer material extending to a second predetermined position on the sidewall.Type: GrantFiled: September 4, 2013Date of Patent: May 19, 2015Assignee: International Business Machines CorporationInventors: Christopher V. Baiocco, Kevin K. Chan, Young-Hee Kim, Masaharu Kobayashi, Effendi Leobandung, Fei Liu, Dae-Gyu Park, Helen Wang, Xinhui Wang, Min Yang
-
Patent number: 8990399Abstract: Resource sharing in a multi-principal browser includes managing a resource for a web entity by determining how to divide the resource for sharing among two or more web entities based at least in part on a Document Object Model (DOM)-recursive resource allocation policy or an application-specified resource allocation policy. A web entity includes a principal instance contending for the resource. The process identifies resource allocation mechanisms from each resource type based at least in part on the DOM-recursive sharing policy or the application-specified resource allocation policy along with the resource type.Type: GrantFiled: December 21, 2012Date of Patent: March 24, 2015Assignee: Microsoft CorporationInventors: Jiahe Helen Wang, Alexander Moshchuk
-
Publication number: 20150074742Abstract: Functionality is described herein for managing the behavior of one or more applications, such as augmented reality applications and/or other environment-sensing applications. The functionality defines permission information in a world-driven manner, which means that the functionality uses a trusted mechanism to identify cues in the sensed environment, and then maps those cues to permission information. The functionality then uses the permission information to govern the operation of one or more applications.Type: ApplicationFiled: September 6, 2013Publication date: March 12, 2015Applicant: Microsoft CorporationInventors: Tadayoshi Kohno, David A. Molnar, Alexander N. Moshchuk, Franziska Roesner, Jiahe Helen Wang
-
Publication number: 20150074746Abstract: Functionality is described herein for receiving events which characterize features in an environment, and for identifying at least one policy based on the events. The functionality consults a certificate, associated with the policy, to determine whether the policy is valid. If valid, the functionality uses the policy to govern the behavior of at least one application, such as by controlling the application's consumption of events. A trusted passport authority may be employed to generate the certificates. Each certificate may: (1) identify that it originated from the trusted passport authority; (2) contain context information which describes a context in which the policy is intended to be applied within an environment; and/or (3) contain machine-readable content that, when executed, carries out at least one aspect of the policy.Type: ApplicationFiled: January 28, 2014Publication date: March 12, 2015Applicant: Microsoft CorporationInventors: Tadayoshi Kohno, David A. Molnar, Alexander N. Moshchuk, Franziska Roesner, Jiahe Helen Wang
-
Publication number: 20150074506Abstract: A shared renderer maintains shared state information to which two or more augmented reality application contribute. The shared renderer then provides a single output presentation based on the shared state information. Among other aspects, the shared renderer includes a permission mechanism by which applications can share information regarding object properties. The shared renderer may also include: a physics engine for simulating movement of at least one object that is represented by the shared state information; an annotation engine for managing a presentation of annotations produced by plural applications; and/or an occlusion engine for managing the behavior of the output presentation when two or more objects, produced by two or more applications, overlap within the output presentation.Type: ApplicationFiled: September 6, 2013Publication date: March 12, 2015Applicant: Microsoft CorporationInventors: Alan M. Dunn, Tadayoshi Kohno, David A. Molnar, Alexander N. Moshchuk, Franziska Roesner, Jiahe Helen Wang