Patents by Inventor Paul Zhang
Paul Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7464025Abstract: A computer-automated system and method identify text in a first “citing” court case, near a “citing instance” (in which a second “cited” court case is cited), that indicates the reason(s) for citing (RFC). The automated method of designating text, taken from a set of citing documents, as reasons for citing (RFC) that are associated with respective citing instances of a cited document, has steps including: obtaining contexts of the citing instances in the respective citing documents (each context including text that includes the citing instance and text that is near the citing instance), analyzing the content of the contexts, and selecting (from the citing instances' context) text that constitutes the RFC, based on the analyzed content of the contexts. A related computer-automated system and method selects content words that are highly related to the reasons a particular document is cited, and gives them weights that indicate their relative relevance.Type: GrantFiled: February 14, 2005Date of Patent: December 9, 2008Assignee: Lexis-Nexis GroupInventors: Timothy L. Humphrey, Xin Allan Lu, Afsar Parhizgar, Salahuddin Ahmed, James S. Wiltshire, Jr., John T. Morelock, Joseph P. Harmon, Spiro G. Collias, Paul Zhang
-
Patent number: 7334124Abstract: Network data files are secure through the operation of an infrastructure gateway-based network file access appliance. Network file data, corresponding to network pocket payload data, are further reduced to a sequence of data blocks that are secured through any combination of block encryption, compression, and digital signatures. File meta-data, including encryption, compression and block-level digital signatures are persistently stored with the file data, either in-band in the file as stored or out-of-band key as a separately stored file or file policy record. File meta-data is recovered with accesses of the file data to support bidirectional encryption and compression and to detect tampering with the file data by comparison against block-level digital signatures.Type: GrantFiled: July 22, 2002Date of Patent: February 19, 2008Assignee: Vormetric, Inc.Inventors: Duc Pham, Tien Le Nguyen, Pu Paul Zhang, Mingchen Lo
-
Publication number: 20070239706Abstract: A visualization-based interactive legal research tool that generates from a multi-dimensional citation network a semantics-constrained citation sub-network that focuses on one individual issue in which a user is interested, and puts the sub-network on an interactive user interface (“UI”), which allows the researcher to browse, navigate, and jump over to start new sub-networks on different issues that are relevant to original issues.Type: ApplicationFiled: April 5, 2006Publication date: October 11, 2007Inventors: Paul Zhang, Lavanya Koppaka
-
Patent number: 7143288Abstract: A data server platform includes a security file system layer interposed between the platform operating system kernel and file system. The secure file system layer is structured to implement a file access control function that selectively constrains data transfer operations initiated through the operating system kernel by an application program to transfer file data through the file system with respect to a persistent data store. A file access controller, implemented independent of the operating system kernel, is coupled to the security file system layer and supports the file access control function by defining permitted file data transfers through the file system. Management of the file access controller separate from the data server platform ensures that any security breach of the platform operating system kernel cannot compromise the function of the security file system layer.Type: GrantFiled: October 16, 2002Date of Patent: November 28, 2006Assignee: Vormetric, Inc.Inventors: Duc Pham, Tien Le Nguyen, Pu Paul Zhang, Mingchen Lo
-
Patent number: 6931530Abstract: A network file access appliance operates as a secure portal for network file access operations between client computer systems and network storage resources. The file access appliance terminates network file access transactions, identified by packet information including client system, mount point, and file request identifiers, between client systems and mount points supported by the access controller. A policy parser determines, based on the packet information, to selectively initiate network file access transactions between the access controller and network storage resources to enable completion of selected network file access transactions directed from the clients to the network file access appliance. The network file access transactions directed to the network storage resources are modified counterparts of policy selected client network file access transactions modified to reference mapped network storage resource mount points and support the secure transfer and storage of network file data.Type: GrantFiled: July 22, 2002Date of Patent: August 16, 2005Assignee: Vormetric, Inc.Inventors: Duc Pham, Tien Le Nguyen, Pu Paul Zhang, Mingchen Lo
-
Publication number: 20050149524Abstract: A computer-automated system and method identify text in a first “citing” court case, near a “citing instance” (in which a second “cited” court case is cited), that indicates the reason(s) for citing (RFC). The automated method of designating text, taken from a set of citing documents, as reasons for citing (RFC) that are associated with respective citing instances of a cited document, has steps including: obtaining contexts of the citing instances in the respective citing documents (each context including text that includes the citing instance and text that is near the citing instance), analyzing the content of the contexts, and selecting (from the citing instances' context) text that constitutes the RFC, based on the analyzed content of the contexts. A related computer-automated system and method selects content words that are highly related to the reasons a particular document is cited, and gives them weights that indicate their relative relevance.Type: ApplicationFiled: February 14, 2005Publication date: July 7, 2005Inventors: Timothy Humphrey, Xin Lu, Afsar Parhizgar, Salahuddin Ahmed, James Wiltshire, John Morelock, Joseph Harmon, Spiro Collias, Paul Zhang
-
Publication number: 20050149523Abstract: A computer-automated system and method identify text in a first “citing” court case, near a “citing instance” (in which a second “cited” court case is cited), that indicates the reason(s) for citing (RFC). The automated method of designating text, taken from a set of citing documents, as reasons for citing (RFC) that are associated with respective citing instances of a cited document, has steps including: obtaining contexts of the citing instances in the respective citing documents (each context including text that includes the citing instance and text that is near the citing instance), analyzing the content of the contexts, and selecting (from the citing instances' context) text that constitutes the RFC, based on the analyzed content of the contexts. A related computer-automated system and method selects content words that are highly related to the reasons a particular document is cited, and gives them weights that indicate their relative relevance.Type: ApplicationFiled: February 14, 2005Publication date: July 7, 2005Inventors: Timothy Humphrey, Xin Lu, Afsar Parhizgar, Salahuddin Ahmed, James Wiltshire, John Morelock, Joseph Harmon, Spiro Collias, Paul Zhang
-
Publication number: 20050144169Abstract: A computer-automated system and method identify text in a first “citing” court case, near a “citing instance” (in which a second “cited” court case is cited), that indicates the reason(s) for citing (RFC). The automated method of designating text, taken from a set of citing documents, as reasons for citing (RFC) that are associated with respective citing instances of a cited document, has steps including: obtaining contexts of the citing instances in the respective citing documents (each context including text that includes the citing instance and text that is near the citing instance), analyzing the content of the contexts, and selecting (from the citing instances' context) text that constitutes the RFC, based on the analyzed content of the contexts. A related computer-automated system and method selects content words that are highly related to the reasons a particular document is cited, and gives them weights that indicate their relative relevance.Type: ApplicationFiled: February 14, 2005Publication date: June 30, 2005Inventors: Timothy Humphrey, Xin Lu, Afsar Parhizgar, Salahuddin Ahmed, James Wiltshire, John Morelock, Joseph Harmon, Spiro Collias, Paul Zhang
-
Patent number: 6856988Abstract: A computer-automated system and method identify text in a first “citing” court case, near a “citing instance” (in which a second “cited” court case is cited), that indicates the reason(s) for citing (RFC). The automated method of designating text, taken from a set of citing documents, as reasons for citing (RFC) that are associated with respective citing instances of a cited document, has steps including: obtaining contexts of the citing instances in the respective citing documents (each context including text that includes the citing instance and text that is near the citing instance), analyzing the content of the contexts, and selecting (from the citing instances' context) text that constitutes the RFC, based on the analyzed content of the contexts. A related computer-automated system and method selects content words that are highly related to the reasons a particular document is cited, and gives them weights that indicate their relative relevance.Type: GrantFiled: December 21, 1999Date of Patent: February 15, 2005Assignee: Lexis-Nexis GroupInventors: Timothy L. Humphrey, Xin Allan Lu, Afsar Parhizgar, Salahuddin Ahmed, James S. Wiltshire, Jr., John T. Morelock, Joseph P. Harmon, Spiro G. Collias, Paul Zhang
-
Publication number: 20040107342Abstract: A secure network file access appliance supports the secure access and transfer of data between the file system of a client computer system and a network data store. An agent provided on the client computer system and monitored by the secure network file access appliance ensures authentication of the client computer system with respect to file system requests issued to the network data store. The secure network file access appliance is provided in the network infrastructure with the client computer system and network data store to apply qualifying access policies to file system requests. The secure network file access appliance maintains an encryption key store and associates encryption keys with corresponding filesystem files to permit encryption and decryption of file data as transferred to and read from the network data store.Type: ApplicationFiled: November 12, 2003Publication date: June 3, 2004Inventors: Duc Pham, Tien Le Nguyen, Pu Paul Zhang, Mingchen Lo
-
Publication number: 20040078568Abstract: A data server platform includes a security file system layer interposed between the platform operating system kernel and file system. The secure file system layer is structured to implement a file access control function that selectively constrains data transfer operations initiated through the operating system kernel by an application program to transfer file data through the file system with respect to a persistent data store. A file access controller, implemented independent of the operating system kernel, is coupled to the security file system layer and supports the file access control function by defining permitted file data transfers through the file system. Management of the file access controller separate from the data server platform ensures that any security breach of the platform operating system kernel cannot compromise the function of the security file system layer.Type: ApplicationFiled: October 16, 2002Publication date: April 22, 2004Inventors: Duc Pham, Tien Le Nguyen, Pu Paul Zhang, Mingchen Lo
-
Publication number: 20040015723Abstract: A network file access appliance operates as a secure portal for network file access operations between client computer systems and network storage resources. The file access appliance terminates network file access transactions, identified by packet information including client system, mount point, and file request identifiers, between client systems and mount points supported by the access controller. A policy parser determines, based on the packet information, to selectively initiate network file access transactions between the access controller and network storage resources to enable completion of selected network file access transactions directed from the clients to the network file access appliance. The network file access transactions directed to the network storage resources are modified counterparts of policy selected client network file access transactions modified to reference mapped network storage resource mount points and support the secure transfer and storage of network file data.Type: ApplicationFiled: July 22, 2002Publication date: January 22, 2004Inventors: Duc Pham, Tien Le Nguyen, Pu Paul Zhang, Mingchen Lo
-
Publication number: 20040015724Abstract: Network data files are secure through the operation of an infrastructure gateway-based network file access appliance. Network file data, corresponding to network pocket payload data, are further reduced to a sequence of data blocks that are secured through any combination of block encryption, compression, and digital signatures. File meta-data, including encryption, compression and block-level digital signatures are persistently stored with the file data, either in-band in the file as stored or out-of-band key as a separately stored file or file policy record. File meta-data is recovered with accesses of the file data to support bidirectional encryption and compression and to detect tampering with the file data by comparison against block-level digital signatures.Type: ApplicationFiled: July 22, 2002Publication date: January 22, 2004Inventors: Duc Pham, Tien Le Nguyen, Pu Paul Zhang, Mingchen Lo
-
Patent number: 6678828Abstract: A secure network file access appliance supports the secure access and transfer of data between the file system of a client computer system and a network data store. An agent provided on the client computer system and monitored by the secure network file access appliance ensures authentication of the client computer system with respect to file system requests issued to the network data store. The secure network file access appliance is provided in the network infrastructure between the client computer system and network data store to apply qualifying access policies and selectively pass through to file system requests. The secure network file access appliance maintains an encryption key store and associates encryption keys with corresponding filesystem files to encrypt and decrypt file data as transferred to and read from the network data store through the secure network file access appliance.Type: GrantFiled: July 22, 2002Date of Patent: January 13, 2004Assignee: Vormetric, Inc.Inventors: Duc Pham, Tien Le Nguyen, Pu Paul Zhang, Mingchen Lo
-
Publication number: 20030115447Abstract: A network media access controller operates as a centralized control point for managing secure data storage in a network-attached data storage subsystem. The network media access controller includes first and second network interfaces. The first network interface is coupleable through a first network connection to a network-attached data storage subsystem including a storage device. The network-attached data storage subsystem is responsive to a data storage command to store first data to the storage device. The second network interface is coupleable through a second network connection to a client computer system. The client computer system selectively provides the data storage command with respect to second data. A network data processor is coupled to the first network interface to provide the data storage command and first data and to the second network interface to receive the data storage command and second data.Type: ApplicationFiled: December 18, 2001Publication date: June 19, 2003Inventors: Duc Pham, Nam Pham, Pu Paul Zhang, Tien Le Nguyen
-
Publication number: 20030105830Abstract: A secure storage access controller provides for the proxy routing of data transfer requests and responses between network clients and storage servers. The controller includes first and second network interface processors coupleable to client and data storage networks and a plurality of data packet processors coupled to the first and second network interface processors. Each data packet processor is operative to terminate respective client network connections routed to the plurality of data packet processors through the first network interface processor and to establish respective storage network connections through the second network interface processor. The data packet processors provide for the proxy transport of data transfer requests and responses between the client and storage network connections.Type: ApplicationFiled: December 3, 2001Publication date: June 5, 2003Inventors: Duc Pham, Nam Pham, Pu Paul Zhang, Tien Le Nguyen