Patents by Inventor Patricia Lu

Patricia Lu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11944702
    Abstract: A customized skin care composition. The skin care composition includes a base composition comprising one of an aqueous alcohol composition or an aqueous emulsion. The skin care composition further includes at least two booster compositions selected from the group consisting of a first grade exfoliating agent; a second grade exfoliating agent, the second grade exfoliating agent providing greater exfoliating than the first grade exfoliating agent; a first grade whitening agent; a second grade whitening agent, the second grade whitening agent providing greater whitening than the first grade whitening agent; a first grade anti-aging agent; and a second grade anti-aging agent, the second grade anti-aging agent providing greater anti-aging effects than the first grade anti-aging agent. The base composition and the at least two booster compositions have been mixed to form a composition that is stable and has efficacious concentrations of active ingredients corresponding to skin conditions of a consumer.
    Type: Grant
    Filed: April 16, 2020
    Date of Patent: April 2, 2024
    Assignee: L'OREAL
    Inventors: Gloria Lu, Donna McCann, Patricia Brieva
  • Publication number: 20070076627
    Abstract: Computer networks are provided with a resource efficient ability to generate link performance statistics. To calculate the average link utilization per I/O operation, a first counter accumulates the number of I/O operations processed by a link and a second counter accumulates the time required by the link to complete each I/O operation. The second value is then divided by the first value. The number of operations per second for a link may be computed by dividing the first number by a predetermined period of time and the average number of operations using the link may be computed by dividing the second number by the predetermined period of time. A third counter may be employed to accumulate the number of bytes transferred by a link during each I/O operation. Then, average size of an I/O operation may be computed by dividing the third number by the first number and the average bandwidth per link operation may be computed by dividing the third number by the predetermined period of time.
    Type: Application
    Filed: November 2, 2006
    Publication date: April 5, 2007
    Applicant: IBM CORPORATION
    Inventors: Matthew Kalos, Michael Benhase, James Chen, Patricia Lu
  • Publication number: 20070022317
    Abstract: Provided are a method, system, and program monitoring paths between a first controller and second controller. A determination is made as to whether one path has been unavailable for a predetermined time period in response to detecting that the path is unavailable. Indication is made that the path is in a first failed state if the path has been unavailable for more than the predetermined time period and indication is made that the path is in a second failed state if the path has not been unavailable for the predetermined time period.
    Type: Application
    Filed: September 28, 2006
    Publication date: January 25, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James Chen, Chung Fung, Patricia Lu, Minh-Ngoc Huynh
  • Publication number: 20060041664
    Abstract: Computer networks are provided with a resource efficient ability to generate link performance statistics. To calculate the average link utilization per I/O operation, a first counter accumulates the number of I/O operations processed by a link and a second counter accumulates the time required by the link to complete each I/O operation. The second value is then divided by the first value. The number of operations per second for a link may be computed by dividing the first number by a predetermined period of time and the average number of operations using the link may be computed by dividing the second number by the predetermined period of time. A third counter may be employed to accumulate the number of bytes transferred by a link during each I/O operation. Then, average size of an I/O operation may be computed by dividing the third number by the first number and the average bandwidth per link operation may be computed by dividing the third number by the predetermined period of time.
    Type: Application
    Filed: August 4, 2004
    Publication date: February 23, 2006
    Applicant: International Business Machines (IBM) Corporation
    Inventors: Matthew Kalos, Michael Benhase, James Chen, Patricia Lu
  • Publication number: 20050154846
    Abstract: Provided are a method, system, and program for copying tracks between a primary controller and secondary controller. A track is received from the primary controller that is part of a copy job comprising a sequence of tracks to copy along with a sequence number of the received track and a context number identifying computational resources in the primary controller used to transmit the track, sequence number, and context number. The context number and sequence number transmitted with the track are used to determine if a track preceding the received track was written to storage. The secondary-controller writes the received track to storage if the track preceding the received track was written to storage.
    Type: Application
    Filed: January 9, 2004
    Publication date: July 14, 2005
    Inventors: James Chen, Minh-Ngoc Huynh, Chung Fung, Patricia Lu, Edwin Scott, Carol Mellgren, Richard Ripberger
  • Publication number: 20050138489
    Abstract: Provided are a method, system and article of manufacture, wherein in certain embodiments an I/O command from a host is received at a first storage unit. An identifier is generated that identifies a destination to which the I/O command is to be transmitted from the first storage unit. The I/O command is augmented with the generated identifier at the first storage unit. The augmented I/O command is transmitted. In certain other embodiments, an I/O command is received at a storage unit, wherein the storage unit is associated with a storage unit identifier. A determination is made at the storage unit, whether the I/O command is associated with an identifier that identifies a destination for which the I/O command is intended. A further determination is made, at the storage unit, whether the identifier is the same as the storage unit identifier, in response to determining that the identifier associated with the I/O command identifies the destination for which the I/O command is intended.
    Type: Application
    Filed: November 20, 2003
    Publication date: June 23, 2005
    Inventors: Michael Benhase, James Chen, Patricia Lu, Frederick Carberry
  • Publication number: 20050114476
    Abstract: Methods, system and computer program product are provided to configure a path between nodes through a fabric in a fibre channel storage area network (SAN). A node name is provided for a target node on the SAN and a port name is provided for each port in the target node. A relationship is established in a data structure between each port name and a slot in which each port is physically located in the target node. Prior to configuring a path between a source node and a port in the target node, the ports which are physically connected and logged in to the fabric are identified by port address. The port names corresponding to the port addresses are then identified. The port names are used to generate interface_ids of the ports corresponding to the physical slots in which the ports are located. A data structure is created to maintain the relationship between interface_ids and port names.
    Type: Application
    Filed: November 20, 2003
    Publication date: May 26, 2005
    Applicant: International Business Machines (IBM) Corporation
    Inventors: James Chen, Patricia Lu, Chung Fung, Minh-Ngoc Huynh, Christopher Sansone, Dung Dang, Gail Spear, Richard Ripberger
  • Publication number: 20050114460
    Abstract: Disclosed is a technique for assigning priorities. A request to manipulate data is received. A type of the request is determined. A priority is assigned to the request based on the type of the request.
    Type: Application
    Filed: November 20, 2003
    Publication date: May 26, 2005
    Inventors: James Chen, Gail Spear, Minh-Ngoc Huynh, Chung Fung, Patricia Lu, Dung Dang
  • Publication number: 20050114741
    Abstract: Provided are a method, system, and program monitoring paths between a first controller and second controller. A determination is made as to whether one path has been unavailable for a predetermined time period in response to detecting that the path is unavailable. Indication is made that the path is in a first failed state if the path has been unavailable for more than the predetermined time period and indication is made that the path is in a second failed state if the path has not been unavailable for the predetermined time period.
    Type: Application
    Filed: November 20, 2003
    Publication date: May 26, 2005
    Inventors: James Chen, Chung Fung, Patricia Lu, Minh-Ngoc Huynh
  • Publication number: 20050114488
    Abstract: Provided are a method, system, and article of manufacture, wherein in certain embodiments a first device determines a possibility of an invalidation of a second device, wherein the first device is coupled to the second device via a fabric. A query is sent from the first device to validate the second device, in response to determining the possibility of the invalidation of the second device. A determination is made, at the first device, whether to continue I/O operations from the first device to the second device based on receiving a response to the query within a time period.
    Type: Application
    Filed: November 20, 2003
    Publication date: May 26, 2005
    Inventors: Steven Klein, James Chen, Patricia Lu, Matthew Kalos