Patents by Inventor Hong C. Li

Hong C. Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9226150
    Abstract: Systems and methods may provide for identifying a virtual geo-fence for a plurality of devices. Additionally, a condition may be detected with respect to two or more devices in the plurality of devices, wherein a status determination may be conducted as to whether at least one of the two or more devices has left the virtual geo-fence based on the condition.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: December 29, 2015
    Assignee: Intel Corporation
    Inventors: Hong C. Li, Rita H. Wouhaybi, Rahul C. Shah, Chieh-Yih Wan, Douglas P. Bogia
  • Patent number: 9130939
    Abstract: Technologies for establishing and utilizing a decentralized cloud infrastructure using a plurality of mobile computing devices include broadcasting for the formation of the decentralized cloud computing and storage infrastructure and establishing wireless communications between the plurality of mobile computing devices. The plurality of mobile computing devices self-organize and cooperate with one another to establish a structured decentralized cloud infrastructure to expose and sharing resources, services, and/or applications for ad hoc or socially-driven decentralized, cloud computing purposes.
    Type: Grant
    Filed: December 28, 2012
    Date of Patent: September 8, 2015
    Assignee: Intel Corporation
    Inventors: John B. Vicente, Hong C. Li, Mark D. Yarvis, James R. Blakley
  • Patent number: 8972713
    Abstract: Technologies for performing a platform transformation on a computing device include transforming a transformable component of the computing device from a first hardware configuration in which a first set of hardware features is enabled to a second hardware configuration in which different hardware features are enabled. The computing device has a first capability when in the first configuration and a different capability when in the second configuration. In performing the platform transformation, the computing device determines a platform transformation build, establishes a communication connection with a cloud-based platform transformation service, and identifies and retrieves relevant platform definitions from the cloud-based platform transformation service. The platform definitions are used in effecting the desired platform transformation.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: March 3, 2015
    Assignee: Intel Corporation
    Inventors: John B. Vicente, Hong C. Li, Mark D. Yarvis, James R. Blakley
  • Publication number: 20140282890
    Abstract: Systems and methods may provide for receiving web content and determining a trust level associated with the web content. Additionally, the web content may be mapped to an execution environment based at least in part on the trust level. In one example, the web content is stored to a trust level specific data container.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Inventors: Hong C. Li, John B. Vicente, Prashant Dewan
  • Publication number: 20140273921
    Abstract: Systems and methods may provide for identifying a virtual geo-fence for a plurality of devices. Additionally, a condition may be detected with respect to two or more devices in the plurality of devices, wherein a status determination may be conducted as to whether at least one of the two or more devices has left the virtual geo-fence based on the condition.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Inventors: Hong C. Li, Rita H. Wouhaybi, Rahul C. Shah, Chieh-Yih Wan, Douglas P. Bogia
  • Publication number: 20140235253
    Abstract: Systems and methods may provide for identifying a plurality of devices and routing a call between a first device in the plurality of devices and a second device in the plurality of devices. The routing of the call may be in response to a visual condition with respect to a user of the first device. In one example, the visual condition is detected based on image data associated with a surrounding environment and the visual condition is one or more of a gaze of the user and a gesture of the user.
    Type: Application
    Filed: February 21, 2013
    Publication date: August 21, 2014
    Inventors: Hong C. Li, Rita H. Wouhaybi
  • Publication number: 20140189120
    Abstract: Technologies for establishing and utilizing a decentralized cloud infrastructure using a plurality of mobile computing devices include broadcasting for the formation of the decentralized cloud computing and storage infrastructure and establishing wireless communications between the plurality of mobile computing devices. The plurality of mobile computing devices self-organize and cooperate with one another to establish a structured decentralized cloud infrastructure to expose and sharing resources, services, and/or applications for ad hoc or socially-driven decentralized, cloud computing purposes.
    Type: Application
    Filed: December 28, 2012
    Publication date: July 3, 2014
    Inventors: John B. Vicente, Hong C. Li, Mark D. Yarvis, James R. Blakley
  • Publication number: 20140181489
    Abstract: Technologies for performing a platform transformation on a computing device include transforming a transformable component of the computing device from a first hardware configuration in which a first set of hardware features is enabled to a second hardware configuration in which different hardware features are enabled. The computing device has a first capability when in the first configuration and a different capability when in the second configuration. In performing the platform transformation, the computing device determines a platform transformation build, establishes a communication connection with a cloud-based platform transformation service, and identifies and retrieves relevant platform definitions from the cloud-based platform transformation service. The platform definitions are used in effecting the desired platform transformation.
    Type: Application
    Filed: December 21, 2012
    Publication date: June 26, 2014
    Inventors: John B. Vicente, Hong C. Li, Mark D. Yarvis, James R. Blakley
  • Publication number: 20140181888
    Abstract: Apparatus, systems and methods may provide a browser interface to detect an attempt by web content to manipulate data in a local data store. In addition, the data may be classified into a category if the data is remotely accessible. Additionally, a security policy may be applied to the data based on the category. In one example, a separator may separate the data from other data based on the category, the data may be encrypted/decrypted based on the category, and/or context information and user input may be determined to apply the security policy further based on the context information and the user input.
    Type: Application
    Filed: December 20, 2012
    Publication date: June 26, 2014
    Inventors: Hong C. Li, Mark D. Boucher, Conor P. Cahill, Manohar R. Castelino, Steve Orrin, Vinay Phegade, John E. Simpson, JR.
  • Patent number: 8578445
    Abstract: A method and system are disclosed. In one embodiment the method includes calculating a trust level of a first entity. The first entity has a plurality of components. Each component in the first entity has at least the trust level of the first entity.
    Type: Grant
    Filed: August 16, 2012
    Date of Patent: November 5, 2013
    Assignee: Intel Corporation
    Inventors: Rita H. Wouhaybi, John B. Vicente, Hong C. Li
  • Patent number: 7734649
    Abstract: Provided are a method, system, and program for deriving and using data access control information to determine whether to permit requested derivations of data elements. Data access control information is initialized for each of a plurality of data elements, wherein the data access control information for each associated data element includes a user access list indicating authorized users and a data access list indicating at least one data element that may be subject to a derivation operation with the associated data element. A request is received from one user to subject a first data element and a second data element to a derivation operation. The data access control information for one of the first and second data elements is processed to determine whether the user access list and data access list in the processed data access control information permits the user to perform the requested derivations of the first and second data elements.
    Type: Grant
    Filed: December 28, 2004
    Date of Patent: June 8, 2010
    Assignee: Intel Corporation
    Inventors: Hong C. Li, Sigal Louchheim
  • Publication number: 20090307191
    Abstract: Various techniques to establish trust of a web page to prevent malware redirects from web searches or hyperlinks are described. An apparatus may include a trust engine to determine an indication of trustworthiness of each of one or more web pages. The trust engine to append information in each of the tags of the one or more web pages based on the determined indication of trustworthiness for that web page. Other embodiments may be described and claimed.
    Type: Application
    Filed: June 10, 2008
    Publication date: December 10, 2009
    Inventors: Hong C. Li, Don Meyers
  • Publication number: 20040193912
    Abstract: Methods, machines, and systems manage security policies of heterogeneous infrastructure and computing devices of a network. Security policy repository houses security policies that are pushed over the network by a policy decision point PDP to appropriate security-enabled devices (policy enforcement points (PEPs)) for enforcement. Using a closed feedback loop, a policy feedback point (PFP) collects and processes data from intrusions, alerts, violations, and other abnormal behaviors from a variety of PEPs or logs produced from PEPs. This data is sent as feedback to the policy repository. The PDP detects the data and analyzes it to determine if policy updates (which can be dynamic and automatic) need to be adaptively made and dynamically pushed to PEPs. The PDP can also send console messages or alerts to consoles or administrators.
    Type: Application
    Filed: March 31, 2003
    Publication date: September 30, 2004
    Applicant: Intel Corporation
    Inventors: Hong C. Li, Ravi Sahita, Satyendra Yadav