Patents by Inventor Ping Gan

Ping Gan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8180623
    Abstract: In general terms, the invention can be described as a computer system for enhancing the performance of underlying policies and execution-rules of real-world activities. The computer system includes a demand input section for providing demand information to drive the system. A real-time software application has a series of discrete steps for implementing the underlying policies and execution-rules of the activities and converts the demand information into instructions. A simulation-time operations-simulation model implements the underlying policies and execution-rules of the activities and receives the instructions. A control section includes a synchronization clock which synchronizes the discrete steps of the software application with the operations-simulation model by delaying the execution of some of the discrete steps and which communicates the instructions from the software application to the operations-simulation model.
    Type: Grant
    Filed: February 20, 2008
    Date of Patent: May 15, 2012
    Assignee: Agency for Science, Technology And Research
    Inventors: Peter Lendermann, Nirupam Julka, Lai Peng Chan, Boon Ping Gan
  • Patent number: 7885413
    Abstract: A computer system is disclosed that contains cryptographic keys and cryptographic key identifiers. The system has a repository cryptographic engine that communicates securely with a remote cryptographic engine, and the repository cryptographic engine is associated with a user data store. The user data store includes a hidden link including a session key identifier encrypted with a protection key. The hidden link is associated with a remote data entity. A key data store associated with the repository server includes a session key encrypted with a session-key-protection key. The session key is used to encrypt and decrypt the remote data entity. The system also includes a repository key exchange module operable to exchange the session key with a remote key exchange module.
    Type: Grant
    Filed: October 31, 2007
    Date of Patent: February 8, 2011
    Assignee: Eruces, Inc.
    Inventors: Ognjen Vasic, Suhail Ansari, Ping Gan, Jinhui Hu, Bassam Khulusi, Adam A. Madoukh, Alexander Tyshlek
  • Publication number: 20080301445
    Abstract: A computer system is disclosed that contains cryptographic keys and cryptographic key identifiers. The system has a repository cryptographic engine that communicates securely with a remote cryptographic engine, and the repository cryptographic engine is associated with a user data store. The user data store includes a hidden link including a session key identifier encrypted with a protection key. The hidden link is associated with a remote data entity. A key data store associated with the repository server includes a session key encrypted with a session-key-protection key. The session key is used to encrypt and decrypt the remote data entity. The system also includes a repository key exchange module operable to exchange the session key with a remote key exchange module.
    Type: Application
    Filed: October 31, 2007
    Publication date: December 4, 2008
    Inventors: Ognjen VASIC, Suhail Ansari, Ping Gan, Jinhui Hu, Bassam Khulusi, Adam A. Madoukh, Alexander Tyshlek
  • Publication number: 20080154570
    Abstract: In general terms, the invention can be described as a computer system for enhancing the performance of underlying policies and execution-rules of real-world activities. The computer system includes a demand input section for providing demand information to drive the system. A real-time software application has a series of discrete steps for implementing the underlying policies and execution-rules of the activities and converts the demand information into instructions. A simulation-time operations-simulation model implements the underlying policies and execution-rules of the activities and receives the instructions. A control section includes a synchronization clock which synchronizes the discrete steps of the software application with the operations-simulation model by delaying the execution of some of the discrete steps and which communicates the instructions from the software application to the operations-simulation model.
    Type: Application
    Filed: February 20, 2008
    Publication date: June 26, 2008
    Inventors: Peter Lendermann, Nirupam Julka, Lai Peng Chan, Boon Ping Gan
  • Publication number: 20040102940
    Abstract: In general terms, the invention can be described as a computer system for enhancing the performance of underlying policies and execution-rules of real-world activities. The computer system includes a demand input section for providing demand information to drive the system. A real-time software application has a series of discrete steps for implementing the underlying policies and execution-rules of the activities and converts the demand information into instructions. A simulation-time operations-simulation model implements the underlying policies and execution-rules of the activities and receivers, the instructions. A control section includes a synchronization clock which synchronizes the discrete steps of the software application with the operations-simulation model by delaying the execution of some of the discrete steps and which communicates the instructions from the software application to the operations-simulation model.
    Type: Application
    Filed: November 22, 2002
    Publication date: May 27, 2004
    Applicant: SINGAPORE INSTITUTE OF MANUFACTURING
    Inventors: Peter Lendermann, Nirupam Julka, Lai Peng Chan, Boon Ping Gan
  • Publication number: 20030021417
    Abstract: A computer system is disclosed that contains cryptographic keys and cryptographic key identifiers. The system has a repository cryptographic engine that communicates securely with a remote cryptographic engine, and the repository cryptographic engine is associated with a user data store. The user data store includes a hidden link including a session key identifier encrypted with a protection key. The hidden link is associated with a remote data entity. A key data store associated with the repository server includes a session key encrypted with a session-key-protection key. The session key is used to encrypt and decrypt the remote data entity. The system also includes a repository key exchange module operable to exchange the session key with a remote key exchange module.
    Type: Application
    Filed: May 15, 2002
    Publication date: January 30, 2003
    Inventors: Ognjen Vasic, Suhail Ansari, Ping Gan, Jinhui Hu, Bassam Khulusi, Adam A. Madoukh, Alexander Tyshlek