Patents by Inventor June-Ray Lin

June-Ray Lin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190018867
    Abstract: A computer-implemented method and a computer system are proposed. According to the method, content and a rule are obtained. The rule specifies a condition associated with the content and an action to be performed if the condition is satisfied. A profile, instructions and chain code are determined at least based on the rule. The profile is used for recording a result of the action. The instructions are used for monitoring whether the condition is satisfied and for updating the profile. The chain code is used for operating a blockchain. In response to the condition being satisfied, the profile is updated and the updated profile is stored in association with the content and the rule into the blockchain by the chain code.
    Type: Application
    Filed: July 13, 2017
    Publication date: January 17, 2019
    Inventors: Guo Qiang Li, June-Ray Lin, Chih-Hsiung Liu, Hao-Ting Shih
  • Publication number: 20180293403
    Abstract: A masking system and method for automatically masking sensitive user information on a webpage is provided. The method includes the steps of identifying a location of the first user data of the first type of sensitive user information on the webpage, updating an initial path to the first user data to account for changes to the initial path detected in response to repeated visits to the webpage, wherein the updated initial path to the first user data is stored as a stable path, locating a second user data associated with a second type of sensitive user information on the webpage, by accessing a central database containing path information to a location of the second user data on the webpage, and masking the first user data and the second user data on the webpage, using the stable path and the path information obtained from the central database.
    Type: Application
    Filed: March 29, 2018
    Publication date: October 11, 2018
    Inventors: Ching-Wei Cheng, Tzu-Ching Kuo, June-Ray Lin, Yi-Chun Tsai
  • Patent number: 10091228
    Abstract: A method, computer system, and a computer program product for a monitor security process is provided. The present invention may include configuring monitors in a chain configuration by configuring a network address of a primary monitor to a backup monitor. The present invention may include configuring a sensor to communicate with the monitors. The present invention may include receiving a first set of information from the sensor to a primary and backup monitor and broadcasting the information to a plurality of monitors and logging the information. The present invention may include receiving a second set of information from the chain of monitors. The present invention may include determining the information conflicts and marking a temporary log within the plurality of temporary logs as conflicting. The present invention may include determining a conflicting threshold has been exceeded, generating and executing an audit and recovery plan that isolates the affected monitor.
    Type: Grant
    Filed: September 11, 2017
    Date of Patent: October 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Guo Qiang Li, June-Ray Lin, Ronald Williams
  • Publication number: 20180219893
    Abstract: A method, computer system, and a computer program product for a monitor security process is provided. The present invention may include configuring monitors in a chain configuration by configuring a network address of a primary monitor to a backup monitor. The present invention may include configuring a sensor to communicate with the monitors. The present invention may include receiving a first set of information from the sensor to a primary and backup monitor and broadcasting the information to a plurality of monitors and logging the information. The present invention may include receiving a second set of information from the chain of monitors. The present invention may include determining the information conflicts and marking a temporary log within the plurality of temporary logs as conflicting. The present invention may include determining a conflicting threshold has been exceeded, generating and executing an audit and recovery plan that isolates the affected monitor.
    Type: Application
    Filed: September 11, 2017
    Publication date: August 2, 2018
    Inventors: Guo Qiang Li, June-Ray Lin, Ronald Williams
  • Publication number: 20180219883
    Abstract: A method, computer system, and a computer program product for a monitor security process is provided. The present invention may include configuring monitors in a chain configuration where sensors communicate with the monitors. The present invention may include receiving a first set of information from the sensor to a primary and backup monitor based on an event. The present invention may include broadcasting the information from the primary and backup monitor to a plurality of monitors and logging the information. The present invention may include receiving a second set of information from within the chain of monitors. The present invention may include determining that the sets of information conflict. The present invention may include marking at least one temporary log within the plurality of temporary logs as conflicting. The present invention may include determining that a conflicting threshold has been exceeded and then generate an audit and recovery plan.
    Type: Application
    Filed: January 27, 2017
    Publication date: August 2, 2018
    Inventors: Guo Qiang Li, June-Ray Lin, Ronald Williams
  • Publication number: 20180191864
    Abstract: Automatically reserving a requested resource in real-time is provided. In response to posting a resource request message that includes a set of resource request criteria on a network, a set of resource availability options is received from a set of resource service providers via the network using a negotiation communication channel. The set of resource availability options received from the set of resource service providers is ranked based on an amount of matching between constraints of each respective resource availability option and the set of resource request criteria. The set of resource availability options is displayed by rank from a greatest amount to a least amount of matching in a resource negotiation table.
    Type: Application
    Filed: January 5, 2017
    Publication date: July 5, 2018
    Inventors: Nan Dong, Wen Hui Fan, June-Ray Lin, Jin Zhang, Li Bo Zhang
  • Patent number: 9965648
    Abstract: A masking system and method for automatically masking sensitive user information on a webpage is provided. The method includes the steps of identifying a location of the first user data of the first type of sensitive user information on the webpage, updating an initial path to the first user data to account for changes to the initial path detected in response to repeated visits to the webpage, wherein the updated initial path to the first user data is stored as a stable path, locating a second user data associated with a second type of sensitive user information on the webpage, by accessing a central database containing path information to a location of the second user data on the webpage, and masking the first user data and the second user data on the webpage, using the stable path and the path information obtained from the central database.
    Type: Grant
    Filed: April 6, 2017
    Date of Patent: May 8, 2018
    Assignee: International Business Machines Corporation
    Inventors: Ching-Wei Cheng, Tzu-Ching Kuo, June-Ray Lin, Yi-Chun Tsai
  • Publication number: 20180121929
    Abstract: Generating a solution keyword tag cloud is provided. Keywords are identified in a question asking how to resolve an issue experienced by a user with a product. The keywords identified in the question are matched with keyword tags included in a set of condition-solution trees corresponding to the product. The solution keyword tag cloud for the product is generated based on the matching of the keywords identified in the question with the keyword tags included in the set of condition-solution trees corresponding to the product. The solution keyword tag cloud is presented in a graphical user interface display on a client device corresponding to the user.
    Type: Application
    Filed: October 31, 2016
    Publication date: May 3, 2018
    Inventors: Ching-Wei Cheng, Tzuching Kuo, June-Ray Lin, Yi Chun Tsai
  • Publication number: 20170337492
    Abstract: Computing systems, methods and management tools for scheduling, optimizing and completing a dynamically adjustable workflow process. The computing systems, methods and management tools being capable of evaluating the availability of resources available for completing the workflow process and ascertaining the reliability of the resources in order to pre-generate a workflow process schedule. The computing systems, methods and management tools are further able to communicate with the assigned resources to incrementally negotiate and receive approval for proposed improvements to the pre-generated workflow schedule prior to implementation of the workflow schedule in order to optimize the cycle time of the process and increase probability of successfully completing the workflow process. The computing systems, methods and management tools may dynamically track the due dates for completing particular tasks and generate amended workflow process schedules in the event a failure occurs.
    Type: Application
    Filed: May 20, 2016
    Publication date: November 23, 2017
    Inventors: David S.C. Chen, Kuo-Liang Chou, June-Ray Lin, Pohsun Tseng, Der-Joung Wang
  • Publication number: 20160125447
    Abstract: Administering reward schemes. A first reward scheme is predefined by a computer system, the first reward scheme defining a first reward event. A second reward scheme is obtained externally by the computer system, the second reward scheme defining a second reward event. In response to an action by a user, the computer system determines whether the first reward event or the second reward event has been triggered. If the first reward event has been triggered, the computer system calculates a first reward for the user according the first reward scheme and if the second reward event has been triggered, the computer system calculates a second reward for the user according the second reward scheme. The second reward scheme may be obtained by, and shared to, the computer system as an inheritance of rules within an organization.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 5, 2016
    Inventors: Chia-Ru CHANG, Vincent Y. DENG, Pao-Chuan LIAO, June-Ray LIN
  • Publication number: 20160089608
    Abstract: Aspects are related to automatically determining game mechanics in business process gamification. Execution data of prior users of a first task in a business process is accessed in a history database. The execution data of the prior users of the first task is analyzed. The game mechanics for the first task is determined according to a result of the analyzing.
    Type: Application
    Filed: September 29, 2015
    Publication date: March 31, 2016
    Inventors: Vincent Yw Deng, Pao-Chuan Liao, Raymund June-Ray Lin, Binh Q. Nguyen
  • Publication number: 20150161718
    Abstract: Device and method for implementing a vehicle sharing reward program. The present invention provides for a cost-sharing plan where two or more constituencies share the rental cost associated with a user who rents a shared vehicle in a vehicle sharing program. This results in a reimbursement of the rental cost to the user. When enrolling in the vehicle sharing reward program, the user is given a health prescription to adhere to on any trip taken while using a shared vehicle. On a selected travel route, the user visits a vehicle sharing station, where the sharing station includes a kiosk that the user uses to check-in and upload relevant information such as distance traveled and locations visited. By complying with the health prescription issued to the user, the user can have its total rental cost reimbursed.
    Type: Application
    Filed: December 6, 2013
    Publication date: June 11, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chun-Yen Chen, Jian-Ren Chen, Su-Chen Huang, June-Ray Lin
  • Publication number: 20150161350
    Abstract: A device, method, and optical machine-readable code for providing context-aware guidance for healthcare. The device includes: a wireless communication module configured to receive contextual information pertaining to a user's health from one or more devices; an optical code reader to read an optical code encoded with a plurality of healthcare guidance messages; a processor to decode the optical code encoded with the plurality of healthcare guidance messages into a selected context-aware healthcare guidance message using the received contextual information pertaining to the user's health; and a screen for providing the selected context-aware healthcare guidance message to the user. The optical machine-readable code including: an optical code storing a plurality of healthcare guidance messages and encoded in a manner that one of the plurality of healthcare guidance messages can be selected using a decode key, wherein the optical code is provided on a container for medication.
    Type: Application
    Filed: December 6, 2013
    Publication date: June 11, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hung-Yang Chang, Jian-Ren Chen, Pei-Yun Sabrina Hsueh, Su-Chen Huang, Yu-Shan Huang, June-Ray Lin
  • Publication number: 20140188507
    Abstract: A method for generating a lifestyle progression (LSP) plan for a patient subject includes collecting patient data including a list of exercise activities performed over a plurality of non-overlapping periods for a plurality of patients and patient health records. The collected patient data is clustered into related groups using k-mean clustering. An LSP model for each cluster is created by averaging the exercise activities performed and respective period durations. Patient data for a patient subject including patient health records is received. A vector is calculated for the received patient data. A shortest distance between the calculated vector for the received patient data and vectors calculated for each LSP model is found. An LSP is built for the patient subject bases on the LSP model with the shortest distance to the calculated vector for the received patient data.
    Type: Application
    Filed: December 28, 2012
    Publication date: July 3, 2014
    Applicants: Industrial Technology Research Institute, International Business Machines Corporation
    Inventors: Matthew Chen, Christina CHUNG, Rick HUANG, June-Ray LIN, Ya-Fan YEH, Xinxin ZHU
  • Publication number: 20140185954
    Abstract: A method for matching social network participants includes receiving activity data pertaining to a plurality of participants in a social network. The activity data is parsed to generate activity pattern summaries for each of the participants. The participants are clustered into a plurality of groups according to the activity pattern summaries. At least one participant of influence is determined within at least one group according to the activity data. A social connection is established within the social network between the determined participant of influence and at least one other participant clustered into the same group.
    Type: Application
    Filed: December 28, 2012
    Publication date: July 3, 2014
    Applicants: Industrial Technology Research Institute, International Business Machines Corporation
    Inventors: Mark JH Hsiao, Yue-Min Jiang, June-Ray Lin, Alfred SH Tzao, Xinxin Zhu
  • Publication number: 20140038146
    Abstract: A method and system of teaming via a social network service for activity coaching include creating a stage model that comprises a first and second stages, wherein a value of a performing parameter for use in the first stage is less than a value of the performing parameter for use in the second stage; receiving initial activity data of users at social network service; determining users involved in the first stage according to initial activity data; teaming the users involved in the first stage; communicating to users via social network service the value of the performing parameter for use in the second stage; setting a team goal to achieve the value; waiting for feedback from the users; determining whether the team goal is achieved; moving the users in the same team to the second stage; and providing rewards to the users, if the determination is affirmative.
    Type: Application
    Filed: July 31, 2013
    Publication date: February 6, 2014
    Applicant: Inrternational Business Machines Corporation
    Inventors: Pao-Chuan LIAO, June-Ray LIN, Sreeram RAMAKRISHNAN, Kai-Quan ZHENG
  • Patent number: 8412535
    Abstract: Systems for negotiation support. First and second negotiation agent modules respectively receive multiple first proposals, calculate preference scores (PSs) for each first proposal using utility models and select a portion of the first proposals as second proposals in descending order according to the calculated PSs therewith. The negotiation management module receives the second proposals from the first and second negotiation modules, and generates third proposals according to the received proposals. The first and second negotiation agent modules respectively receive the third proposals, calculate PSs for received proposals using utility models, and arrange the third proposals in descending order according to PSs therewith to generate voting results. The negotiation management module receives the voting results, and generates a final agreement according to the received voting results.
    Type: Grant
    Filed: December 6, 2004
    Date of Patent: April 2, 2013
    Assignee: Institute of Information Industry
    Inventors: June-Ray Lin, Hung-Wen Tung
  • Patent number: 7653575
    Abstract: Methods for auction negotiation support executed by a negotiator agent module are provided. The best bid corresponding to a product/service and a total number of negotiator agent modules placing the best bid are received. It is determined that a bid is placed by a following strategy or an exceeding strategy. The following strategy indicates that, when the received best bid is not equal to the prior bid placed by the negotiator agent module, the negotiator agent module places the bid equal to the received best bid. The exceeding strategy indicates that, when the inverse of the total number of negotiator agent modules placing the best bid is lower than a predetermined threshold, the negotiator agent module places the bid advanced to the received best bid.
    Type: Grant
    Filed: January 4, 2006
    Date of Patent: January 26, 2010
    Assignee: Institute for Information Industry
    Inventors: June-Ray Lin, Hung-Wen Tung
  • Publication number: 20070150323
    Abstract: A method and a system for generating supply chain planning information are provided, which are used to dynamically adjust the control factors of the supply information provided by an original supplier and an original logistics provider, after the first supply chain planning information has been generated through a conventional supply chain planning information system, so as to generate much more supply information to process. Then, the information is processed by a planning engine of the supply chain planning information system to further generate other supply chain planning information among which to select in decision making. Hence, a decision maker can select and find out improved ways to negotiate with suppliers, so as to reduce the total cost and also meet customers' service quality requirements.
    Type: Application
    Filed: June 21, 2006
    Publication date: June 28, 2007
    Inventors: June-Ray Lin, Chi-Hung Huang, Chun-Kai Wang, Chia-Chun Shih
  • Publication number: 20070094092
    Abstract: Methods for auction negotiation support executed by a negotiator agent module are provided. The best bid corresponding to a product/service and a total number of negotiator agent modules placing the best bid are received. It is determined that a bid is placed by a following strategy or an exceeding strategy. The following strategy indicates that, when the received best bid is not equal to the prior bid placed by the negotiator agent module, the negotiator agent module places the bid equal to the received best bid. The exceeding strategy indicates that, when the inverse of the total number of negotiator agent modules placing the best bid is lower than a predetermined threshold, the negotiator agent module places the bid advanced to the received best bid.
    Type: Application
    Filed: January 4, 2006
    Publication date: April 26, 2007
    Inventors: June-Ray Lin, Hung-Wen Tung