Patents by Inventor Keng Lim

Keng Lim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080013630
    Abstract: A scalable coder having a grid motion estimation and compensation module (110), a motion compensation temporal filtering module (105), a scalable coding module (115), a discrete transformation module (120), and a packetization module (135). The grid-motion estimation and compensation module (110) outputs a scalable motion vector from the source video data, supplied resolution and bit rate parameters. The motion compensation temporal filtering module (105) generates, from the source video data and the scalable motion vector, a residual image corresponding to the difference between the present and previous image frames. The scalable coding module (115) is coupled to receive and encode the scalable motion vector. The discrete transformation module (120) is configured to receive and domain transform the supplied video to a sequence of coefficients.
    Type: Application
    Filed: June 23, 2005
    Publication date: January 17, 2008
    Inventors: Zhengguo Li, Xiaokang Yang, Keng Lim, Xiao Lin, Susanto Rahardja, Feng Pan
  • Patent number: 7256303
    Abstract: A method for producing alkylated cyclopentadienyl manganese tricarbonyls, in particular a method for producing methyl cyclopentadienyl manganese tricarbonyl. It involves a process for synthesizing organometallic compounds. Alkylated cyclopentadienyl manganese tricarbonyls are antiknock additives used in engine fuels.
    Type: Grant
    Filed: February 5, 2007
    Date of Patent: August 14, 2007
    Inventor: Tee Keng Lim
  • Publication number: 20070179987
    Abstract: In an information management system, activity data is collected and analyzed for patterns. The information management system may be policy based. Activity data may be organized as entries including information on user, application, machine, action, object or document, time, and location. When checking for patterns in the activity or historical data, techniques may include inferencing, frequency checking, location and distance checking, and relationship checking, and any combination of these. Analyzing the activity data may include comparing like types or categories of information for two or more entries.
    Type: Application
    Filed: December 22, 2006
    Publication date: August 2, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070169168
    Abstract: A policy language for an information management system has a three-layer structure that allows specifying one or more policies using policy abstractions. The policies and policy abstractions are in two different layers and decoupled from one another, so policies and policy abstractions may be specified and altered separately from each other. A third layer includes entity objects. A policy may refer to any number of policy abstractions. Multiple policies may reference a single policy abstraction, and a change to that policy abstraction will result in multiple policies being changed. Further, policy abstractions may be nested, so one policy abstraction may reference another policy abstraction, and so forth.
    Type: Application
    Filed: December 22, 2006
    Publication date: July 19, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070162749
    Abstract: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.
    Type: Application
    Filed: May 12, 2006
    Publication date: July 12, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070156694
    Abstract: An information management system approves or denies user requests to access information of the system. The information includes all types of information including documents and e-mail. The information management system is driven using a policy language having policies and policy abstractions. The information management system may approve or deny many different types of requests including opening a document or file, copying a file, printing a file, sending an e-mail, reading an e-mail, cut and paste of a portion of a document, saving a document, executing an application on a file, and many others.
    Type: Application
    Filed: December 22, 2006
    Publication date: July 5, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070156727
    Abstract: Code is associated to a target based on an inspection of the code. A target may be a device or a user. A number of code components may be inspected at one time and then transferred or otherwise associated to a target based on the target's profile. A code component may be a policy of an information management system.
    Type: Application
    Filed: December 22, 2006
    Publication date: July 5, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070157203
    Abstract: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.
    Type: Application
    Filed: May 12, 2006
    Publication date: July 5, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070156695
    Abstract: To prevent conflicts of interest, an information management system is used to make sure two or more groups are kept apart so that information does not circulate freely between these groups. The system has policies to implement an “ethical wall” to separate users or groups of users. The user or groups of user may be organized in any arbitrary way, and may be in the same organization or different organizations. The two groups (or two or more users) will not be able to access information belonging to the other, and users in one group may not be able to pass information to the other group. The system may manage access to documents, e-mail, files, and other forms of information.
    Type: Application
    Filed: December 22, 2006
    Publication date: July 5, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070156670
    Abstract: In an information management system, policies are optimized before they are associated to a device in order to increase evaluation speed or reduce space requirements, or both. Optimization techniques may include common subexpression elimination, constant folding, constant propagation, comparison optimization, dead code or subexpression removal, map or lookup table generation, policy rewriting, redundant policy elimination, heuristic-based policy ordering, or policy-format transformation, and combinations of these.
    Type: Application
    Filed: December 22, 2006
    Publication date: July 5, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070156897
    Abstract: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.
    Type: Application
    Filed: May 12, 2006
    Publication date: July 5, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070156659
    Abstract: In an information management system, relevant policies are deployed to targets while policies which are not relevant are not. By deploying relevant policies, this reduces the amount of space requirements at the target to store the policies and the amount of data that needs to be sent to the target. Also, execution speed at the target may increase since the target does not need to evaluate policies that are not relevant.
    Type: Application
    Filed: December 22, 2006
    Publication date: July 5, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070157287
    Abstract: A policy language for an information management system allows specifying or more policies using policy abstractions. The policies and policy abstractions are decoupled from one another, so policies and policy abstractions may be specified and altered separately from each other. A policy may refer to any number of policy abstractions. Multiple policies may reference a single policy abstraction, and a change to that policy abstraction will result in multiple policies being changed. Further, policy abstractions may be nested, so one policy abstraction may reference another policy abstraction, and so forth.
    Type: Application
    Filed: December 22, 2006
    Publication date: July 5, 2007
    Applicant: Blue Jungle
    Inventor: Keng Lim
  • Publication number: 20070156696
    Abstract: Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile.
    Type: Application
    Filed: December 22, 2006
    Publication date: July 5, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070157288
    Abstract: In an information management system, policies are deployed to targets and targets can evaluate the policies whether they are connected or disconnected to the system. The policies may be transferred to the target, which may be a device or user. Relevant policies may be transferred while not relevant policies are not. The policies may have policy abstractions.
    Type: Application
    Filed: December 22, 2006
    Publication date: July 5, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070140337
    Abstract: A method for inter-mode prediction in video coding, the method comprising checking a data block of an image for zero motion; computing frame difference of the data block based on the checking for zero motion; and making an inter-mode prediction selection based on the computed frame difference.
    Type: Application
    Filed: August 25, 2004
    Publication date: June 21, 2007
    Inventors: Keng Lim, Dajun Wu, Si Wu, Susanto Rahardja, Feng Pan, Xiao Lin, Zhengguo Li
  • Publication number: 20070043341
    Abstract: A platform Smart Scalpel system using rapid real-time feedback for effecting laser treatment. The platform system includes an imaging system for rapid real-time detection of tissue characteristics, a processing system for processing the detected characteristics, and a treatment system for effecting treatment in accordance with results of the processing. The platform system provides for preprogramming and real-time inputting conditions and parameters for diagnosis using the imaging system and/or treatment using the treatment system.
    Type: Application
    Filed: October 19, 2006
    Publication date: February 22, 2007
    Inventors: R. Anderson, Ian Hunter, Colin Brenan, Keng Lim, Elizabeth Sebern
  • Publication number: 20060140270
    Abstract: A method for rate control for encoding video sequence, wherein the video sequence comprises a plurality of Group Of Pictures, wherein each Group of Picture comprises at least and I-frame and an Inter-frame, the rate control method comprising the following steps for the encoding of the Inter-frame in the Group of Picture: determining a desired frame rate based on an available bandwidth of a channel for transmitting the video sequence and an available computational resources for the encoding process; determining a target buffer level based on the desired frame rate and the position of the Inter-frame with respect to the I-frame; and determining a target bit rate based on the target buffer level and the available channel bandwidth, wherein the target bit rate is used for controlling the rate of encoding the video sequence.
    Type: Application
    Filed: September 5, 2002
    Publication date: June 29, 2006
    Inventors: Zhengguo Li, Feng Pan, Keng Lim, Dajun Wu, Rongshan Yu, Genan Feng, Dusheng Wang
  • Publication number: 20050255420
    Abstract: Direct Thermal Transport focused on the fundamental and significant improvement of thermal transfer between fluid and the source surfaces. The significant improvement of this transfer capacity and efficiency, would remove the bottleneck of the whole system, as well as possibility of simplifying the system design. This invention detailed the approach, means of how higher speed flow fluid that is sent to scrubbing the heat source surface through a prolonged contact can attain accelerated speed, swirl and therefore able to improve the heat transfer effect. With this improvement, Direct Thermal Transport is made possible. This patent also described some examples of how this could be achieved. Through these means, other advantages are derived.
    Type: Application
    Filed: May 9, 2005
    Publication date: November 17, 2005
    Inventor: Swee Keng Lim
  • Publication number: 20050187987
    Abstract: An decoder module for normalizing log records generated by a computer system is provided. Based on a plurality of instruction sets stored in a database, the decoder module scans the log records and outputs the scanned results in a normalized format. A computer system for receiving a batch of log records from a plurality of remote computer systems, is able to process and normalize the log records using the decoder module.
    Type: Application
    Filed: February 4, 2005
    Publication date: August 25, 2005
    Inventor: Keng Lim