Patents by Inventor Kin K. Choi
Kin K. Choi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10769285Abstract: Technical solutions are described for securing data by a communication apparatus. An example computer-implemented method includes receiving, by an encryption engine, a request to apply cryptography to input data. The computer-implemented method also includes generating metadata for the input data, where the metadata identifies characteristics of content included in the input data. The method further includes applying a cryptographic technique to the input data to generate output data, and outputting the output data and metadata in response to the request.Type: GrantFiled: May 18, 2016Date of Patent: September 8, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
-
Patent number: 10733324Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.Type: GrantFiled: March 19, 2019Date of Patent: August 4, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
-
Publication number: 20190213358Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.Type: ApplicationFiled: March 19, 2019Publication date: July 11, 2019Inventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
-
Patent number: 10255459Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.Type: GrantFiled: May 18, 2016Date of Patent: April 9, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
-
Publication number: 20170337382Abstract: Technical solutions are described for securing data by a communication apparatus. An example computer-implemented method includes receiving, by an encryption engine, a request to apply cryptography to input data. The computer-implemented method also includes generating metadata for the input data, where the metadata identifies characteristics of content included in the input data. The method further includes applying a cryptographic technique to the input data to generate output data, and outputting the output data and metadata in response to the request.Type: ApplicationFiled: May 18, 2016Publication date: November 23, 2017Inventors: VICTOR G. ALONZO, ZACHARY A. BURNS, YUK L. CHAN, GISELA C. CHENG, KIN K. CHOI, KIN NG
-
Publication number: 20170337399Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.Type: ApplicationFiled: May 18, 2016Publication date: November 23, 2017Inventors: VICTOR G. ALONZO, ZACHARY A. BURNS, YUK L. CHAN, GISELA C. CHENG, KIN K. CHOI, KIN NG
-
Publication number: 20160377448Abstract: A computer implemented prediction and alert method automatically executable by a processing unit of a portable computing device. The method includes determining that an event begins from event information of the portable computing device, generating a list of likely event results based on current conditions of the event and historical data, alerting a user to an event result problem for each likely event result in accordance with first and second determinations as the event information indicates that an event decision of the event is upcoming, removing unlikely event results from the list once the event decision is passed and repeating the generating, alerting and removing until only a single event result remains on the list.Type: ApplicationFiled: June 29, 2015Publication date: December 29, 2016Inventors: Zachary A. Burns, Yuk L. Chan, Kin K. Choi, David J. Flaherty
-
Patent number: 9436859Abstract: Embodiments are directed to a method of identifying an identification (ID) tag. The method includes using a movable reader to determine a presence of an ID tag, an absence of the ID tag and that the ID tag has moved. The method further includes using the movable reader to determine a localization probability score of the ID tag, and, based on the localization probability score, adjust the movable reader's determination of the presence of the ID tag.Type: GrantFiled: September 29, 2014Date of Patent: September 6, 2016Assignee: GLOBALFOUNDRIES INC.Inventors: Zachary A. Burns, Yuk L. Chan, Kin K. Choi, David J. B. Flaherty
-
Publication number: 20160092708Abstract: Embodiments are directed to a method of identifying an identification (ID) tag. The method includes using a movable reader to determine a presence of an ID tag, an absence of the ID tag and that the ID tag has moved. The method further includes using the movable reader to determine a localization probability score of the ID tag, and, based on the localization probability score, adjust the movable reader's determination of the presence of the ID tag.Type: ApplicationFiled: September 29, 2014Publication date: March 31, 2016Inventors: Zachary A. Burns, Yuk L. Chan, Kin K. Choi, David J.B. Flaherty
-
Publication number: 20140324983Abstract: Embodiments relate to customizing instant messaging traffic. An aspect includes receiving a first association between a contact and a category and a second association between the category and one or more receiving client devices. A status from the one or more receiving client devices is routed to the contact based on the first and second associations. Additionally, a message from the contact is routed to the one or more receiving client devices based on the first and second associations.Type: ApplicationFiled: April 30, 2013Publication date: October 30, 2014Applicant: International Business Machines CorporationInventors: Zachary A. Burns, Yuk L. Chan, Kin K. Choi, David J. Flaherty, Mark A. Scott