Patents by Inventor Jay Huang

Jay Huang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180300296
    Abstract: Methods, systems, and apparatus, including computer-readable media, for document similarity analysis. In some implementations, first metadata identifying a first set of metadata objects that define characteristics of a first document is accessed. Second metadata identifying metadata objects that define characteristics of documents in a set of second documents is accessed. Similarity scores are generated indicating similarity of the second documents with respect to the first document. A similarity score for a second document is generated based on an amount of elements in common between (i) the first set of metadata objects and (ii) the set of metadata objects that define characteristics of the second document. A subset of the second documents is selected based on the similarity scores. Data indicating the selected subset of the second documents is provided to a client device.
    Type: Application
    Filed: December 12, 2017
    Publication date: October 18, 2018
    Inventors: Siamak Ziraknejad, Ren-Jay Huang
  • Patent number: 9934373
    Abstract: In some implementations, a system may control an environment in which biometric data is entered when a user enrolls data for a user account or authenticates after having enrolled user data. Enrollment and/or authentication may be required to occur under one or more conditions. In some implementations, data from an electronic device associated with a user may be used to determine whether conditions on enrollment and/or authentication have been satisfied.
    Type: Grant
    Filed: January 23, 2015
    Date of Patent: April 3, 2018
    Inventors: Siamak Ziraknejad, Ren-Jay Huang, Elaine Li, Hector Vazquez, Peng Xiao
  • Patent number: 9876788
    Abstract: In some implementations, a system may control an environment in which biometric data is entered when a user enrolls data for a user account or authenticates after having enrolled user data. Enrollment and/or authentication may be required to occur under one or more conditions. In some implementations, data from an electronic device associated with a user may be used to determine whether conditions on enrollment and/or authentication have been satisfied.
    Type: Grant
    Filed: January 23, 2015
    Date of Patent: January 23, 2018
    Inventors: Siamak Ziraknejad, Ren-Jay Huang, Elaine Li, Hector Vazquez, Peng Xiao
  • Patent number: 9823869
    Abstract: Embodiments of the claimed subject matter provide systems and methods for protecting data in dynamically allocated regions of memory. The method can include receiving the read request where the read request comprises a virtual address associated with a memory and determining a physical address associated with the virtual address. The further includes determining whether the physical address associated with the virtual address is read protected and determining whether the read request is from a component allowed to access read protected memory. The read protected memory was dynamically allocated on a per page basis. The method further includes in response to determining that the read request is to a read protected physical address and determining that the component is allowed to access read protected memory, sending the data from the physical address in the memory.
    Type: Grant
    Filed: January 8, 2015
    Date of Patent: November 21, 2017
    Assignee: Nvidia Corporation
    Inventors: Franciscus Sijstermans, Steven Molnar, Gilberto Contreras, Jay Huang, Jay Gupta, Michael Wasserman, James Deming
  • Publication number: 20170243006
    Abstract: One embodiment of the present invention includes a boot read only memory (ROM) with an embedded, private key provision key (KPK) set that enables secure provisioning of chips. As part of taping-out a chip, the chip provider establishes the KPK set and provides the boot ROM exclusive access to the KPK. For each Original Equipment Manufacturer (OEM), the chip provider assigns and discloses an OEM-specific KPK that is included in the KPK set at a particular KPK index. Upon receiving a secured provisioning image and the associated KPK index, the boot ROM accesses the KPK set to reconstruct the KPK and then decrypts and executes the secured provisioning image. Advantageously, this enables the manufacturing factory to provision the chip without the security risks attributable to conventional provisioning approaches that require disclosing security keys to the manufacturing factory.
    Type: Application
    Filed: March 7, 2017
    Publication date: August 24, 2017
    Inventors: Jay HUANG, Paul CHOU, Anthony WOO
  • Patent number: 9742764
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving an enrollment biometric identifier of a user. Determining a matching threshold based on a characteristic of the enrollment biometric identifier of the user. Storing the matching threshold in an enrollment profile for the use in association with the enrollment biometric identifier.
    Type: Grant
    Filed: August 9, 2016
    Date of Patent: August 22, 2017
    Assignee: MicroStrategy Incorporated
    Inventors: Siamak Ziraknejad, Ren-Jay Huang, Burak Sahin
  • Publication number: 20170235930
    Abstract: A computer system comprising a processor and a memory for storing instructions, that when executed by the processor performs a copy protection method. The copy protection method comprises executing a software loop of a first software application in a first operating system. A first call is executed in the software loop to a code portion. A decrypted code portion of the first software application is executed in a second operating system in response to the first call. The code portion is decrypted in response to a successful validation of the first software application.
    Type: Application
    Filed: November 8, 2016
    Publication date: August 17, 2017
    Inventors: Anthony Michael Tamasi, Timothy Paul Lottes, Bojan Skaljak, Fedor Fomichev, Andrew Leighton Edelsten, Jay Huang, Ashutosh Gajanan Rege, Keith Brian Galocy
  • Patent number: 9590806
    Abstract: One embodiment of the present invention includes a boot read only memory (ROM) with an embedded, private key provision key (KPK) set that enables secure provisioning of chips. As part of taping-out a chip, the chip provider establishes the KPK set and provides the boot ROM exclusive access to the KPK. For each Original Equipment Manufacturer (OEM), the chip provider assigns and discloses an OEM-specific KPK that is included in the KPK set at a particular KPK index. Upon receiving a secured provisioning image and the associated KPK index, the boot ROM accesses the KPK set to reconstruct the KPK and then decrypts and executes the secured provisioning image. Advantageously, this enables the manufacturing factory to provision the chip without the security risks attributable to conventional provisioning approaches that require disclosing security keys to the manufacturing factory.
    Type: Grant
    Filed: May 27, 2015
    Date of Patent: March 7, 2017
    Assignee: NVIDIA Corporation
    Inventors: Jay Huang, Paul Chou, Anthony Woo
  • Publication number: 20160352514
    Abstract: One embodiment of the present invention includes a boot read only memory (ROM) with an embedded, private key provision key (KPK) set that enables secure provisioning of chips. As part of taping-out a chip, the chip provider establishes the KPK set and provides the boot ROM exclusive access to the KPK. For each Original Equipment Manufacturer (OEM), the chip provider assigns and discloses an OEM-specific KPK that is included in the KPK set at a particular KPK index. Upon receiving a secured provisioning image and the associated KPK index, the boot ROM accesses the KPK set to reconstruct the KPK and then decrypts and executes the secured provisioning image. Advantageously, this enables the manufacturing factory to provision the chip without the security risks attributable to conventional provisioning approaches that require disclosing security keys to the manufacturing factory.
    Type: Application
    Filed: May 27, 2015
    Publication date: December 1, 2016
    Inventors: Jay HUANG, Paul CHOU, Anthony WOO
  • Patent number: 9489541
    Abstract: A computer system comprising a processor and a memory for storing instructions, that when executed by the processor performs a copy protection method. The copy protection method comprises executing a software loop of a first software application in a first operating system. A first call is executed in the software loop to a code portion. A decrypted code portion of the first software application is executed in a second operating system in response to the first call. The code portion is decrypted in response to a successful validation of the first software application.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: November 8, 2016
    Assignee: NVIDIA CORPORATION
    Inventors: Anthony Michael Tamasi, Timothy Paul Lottes, Bojan Skaljak, Fedor Fomichev, Andrew Leighton Edelsten, Jay Huang, Ashutosh Gajanan Rege, Keith Brian Galocy
  • Patent number: 9430629
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving an enrollment biometric identifier of a user. Determining a matching threshold based on a characteristic of the enrollment biometric identifier of the user. Storing the matching threshold in an enrollment profile for the use in association with the enrollment biometric identifier.
    Type: Grant
    Filed: January 23, 2015
    Date of Patent: August 30, 2016
    Assignee: MicroStrategy Incorporated
    Inventors: Siamak Ziraknejad, Ren-Jay Huang, Burak Sahin
  • Publication number: 20160187863
    Abstract: A calibration method applicable for an automation apparatus includes building a first stereoscopic characteristic model corresponding to an object, obtaining a stereoscopic image of the object, building a second stereoscopic characteristic model corresponding to the object based on the stereoscopic image, obtaining at least one error parameter corresponding to the second stereoscopic characteristic model by comparing the second stereoscopic characteristic model with the first stereoscopic characteristic model, and calibrating a processing parameter of the automation apparatus based on the at least one error parameter.
    Type: Application
    Filed: April 24, 2015
    Publication date: June 30, 2016
    Inventors: Chung-Li TAI, Yao-Yang TSAI, Jay HUANG, Ko-Shyang WANG, Chih-Kai CHIU
  • Patent number: 9262862
    Abstract: A method and an apparatus for reconstructing a three dimensional model of an object are provided. The method includes the following steps. A plurality of first depth images of an object are obtained. According to a linking information of the object, the first depth images are divided into a plurality of depth image groups. The linking information records location information corresponding to a plurality of substructures of the object. Each depth image group includes a plurality of second depth images, and the substructures correspond to the second depth images. According to the second depth image and the location information corresponding to each substructure, a local module of each substructure is built. According to the linking information, the local models corresponding to the substructures are merged, and the three-dimensional model of the object is built.
    Type: Grant
    Filed: November 28, 2012
    Date of Patent: February 16, 2016
    Assignee: Industrial Technology Research Institute
    Inventors: Yao-Yang Tsai, Hian-Kun Tenn, Jay Huang
  • Patent number: 9177121
    Abstract: Methods for code protection are disclosed. A method includes using a security processing component to access an encrypted portion of an application program that is encrypted by an on-line server, after a license for use of the application program is authenticated by the on-line server. The security processing component is used to decrypt the encrypted portion of the application program using an encryption key that is stored in the security processing component. The decrypted portion of the application program is executed based on stored state data. Results are provided to the application program that is executing on a second processing component.
    Type: Grant
    Filed: November 30, 2012
    Date of Patent: November 3, 2015
    Assignee: NVIDIA CORPORATION
    Inventors: Andrew Edelsten, Fedor Fomichev, Jay Huang, Timothy Paul Lottes
  • Publication number: 20150301761
    Abstract: Embodiments of the claimed subject matter provide systems and methods for protecting data in dynamically allocated regions of memory. The method can include receiving the read request where the read request comprises a virtual address associated with a memory and determining a physical address associated with the virtual address. The further includes determining whether the physical address associated with the virtual address is read protected and determining whether the read request is from a component allowed to access read protected memory. The read protected memory was dynamically allocated on a per page basis. The method further includes in response to determining that the read request is to a read protected physical address and determining that the component is allowed to access read protected memory, sending the data from the physical address in the memory.
    Type: Application
    Filed: January 8, 2015
    Publication date: October 22, 2015
    Inventors: Franciscus SIJSTERMANS, Steven MOLNAR, Gilberto CONTRERAS, Jay HUANG, Jay GUPTA, Michael WASSERMAN, James DEMING
  • Publication number: 20150123161
    Abstract: A method is provided for manufacturing a LED package base including providing a metal core substrate having a top surface and a bottom surface and forming two first trenches in the metal core substrate. The first trenches extend from the top surface to the bottom surface, The method further includes at least partially filling in the first trenches with first dielectric material to form dielectric isolations. The dielectric isolations divide the metal core substrate into three metal core portions. Two of the metal core portions may be configured to serve as LED package electrodes. The method also includes applying a second dielectric material to cover at least a portion of the first dielectric material, and forming a conductive layer over the second dielectric material to form circuit contacts. The conductive layer includes a first conductive material.
    Type: Application
    Filed: November 6, 2013
    Publication date: May 7, 2015
    Applicant: Starlite LED Inc.
    Inventors: Pao Chen, Chung Chi Chang, Min Jay Huang
  • Publication number: 20140157423
    Abstract: Methods for code protection are disclosed. A method includes using a security processing component to access an encrypted portion of an application program that is encrypted by an on-line server, after a license for use of the application program is authenticated by the on-line server. The security processing component is used to decrypt the encrypted portion of the application program using an encryption key that is stored in the security processing component. The decrypted portion of the application program is executed based on stored state data. Results are provided to the application program that is executing on a second processing component.
    Type: Application
    Filed: November 30, 2012
    Publication date: June 5, 2014
    Applicant: NVIDIA CORPORATION
    Inventors: Andrew Edelsten, Fedor Fomichev, Jay Huang, Timothy Paul Lottes
  • Publication number: 20140099017
    Abstract: A method and an apparatus for reconstructing a three dimensional model of an object are provided. The method includes the following steps. A plurality of first depth images of an object are obtained. According to a linking information of the object, the first depth images are divided into a plurality of depth image groups. The linking information records location information corresponding to a plurality of substructures of the object. Each depth image group includes a plurality of second depth images, and the substructures correspond to the second depth images. According to the second depth image and the location information corresponding to each substructure, a local module of each substructure is built. According to the linking information, the local models corresponding to the substructures are merged, and the three-dimensional model of the object is built.
    Type: Application
    Filed: November 28, 2012
    Publication date: April 10, 2014
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Yao-Yang Tsai, Hian-Kun Tenn, Jay Huang
  • Patent number: 8625901
    Abstract: A method for dynamically adjusting a waiting time of handwriting inputs is applied to an electronic equipment having a handwriting input device. When a waiting-for-input time after the handwriting input device receives a handwriting input exceeds a waiting time of the electronic equipment, the electronic equipment performs a handwriting recognition upon the handwriting input so as to display a candidate word list. The method includes the following steps: receiving the handwriting input; generating a writing speed according to the handwriting input; and setting the waiting time of the electronic equipment according to the writing speed.
    Type: Grant
    Filed: November 22, 2010
    Date of Patent: January 7, 2014
    Assignee: HTC Corporation
    Inventor: Yuh-Jay Huang
  • Patent number: 8525879
    Abstract: A depth detection method includes the following steps. First, first and second video data are shot. Next, the first and second video data are compared to obtain initial similarity data including r×c×d initial similarity elements, wherein r, c and d are natural numbers greater than 1. Then, an accumulation operation is performed, with each similarity element serving as a center, according to a reference mask to obtain an iteration parameter. Next, n times of iteration update operations are performed on the initial similarity data according to the iteration parameter to generate updated similarity data. Then, it is judged whether the updated similarity data satisfy a character verification condition. If yes, the updated similarity data is converted into depth distribution data.
    Type: Grant
    Filed: July 23, 2010
    Date of Patent: September 3, 2013
    Assignee: Industrial Technology Research Institute
    Inventors: Chih-Pin Liao, Yao-Yang Tsai, Jay Huang, Ko-Shyang Wang